

Computing for Non-Majors Practice Exam
Course Introduction
Computing for Non-Majors introduces fundamental concepts in computer science and digital literacy, designed for students with little to no prior programming experience. The course covers essential topics such as basic programming principles, problem-solving techniques, information security, and the societal impact of computing. Through practical exercises and real-world examples, students will develop critical thinking skills and learn to effectively utilize various software tools and technologies applicable to their fields of study and everyday life.
Recommended Textbook
New Perspectives on Computer Concepts 2018 Comprehensive 20th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1312 Verified Questions
1312 Flashcards
Source URL: https://quizplus.com/study-set/1984

Page 2

Chapter 1: Digital Content
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/39421
Sample Questions
Q1) Which of the following is the technique for adding light and shadows to a 3D image?
A) Rendering
B) Ray tracing
C) Wireframe
D) Rasterize
Answer: B
Q2) Text-to-speech software analyzes the words in a section of text, finds corresponding phonemes, and combines them into sentences for output.
A)True
B)False Answer: True
Q3) Data refers to the symbols that represent people, events, things, and ideas.
A)True
B)False Answer: True
Q4) One of the main disadvantages of MIDI is that it cannot produce vocals.
A)True
B)False Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Digital Devices
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/39422
Sample Questions
Q1) A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
A)True
B)False
Answer: False
Q2) What type of computer should you consider purchasing if you want a portable system that is good for students and on-the-go professionals who want to create content and be productive, in addition to consuming content?
A) Desktop
B) Laptop
C) Tablet
D) Smartphone
Answer: B
Q3) Athlon and A-series processors manufactured by AMD are NOT x86 compatible.
A)True
B)False
Answer: False
Q4) A(n) ____________ is an integrated circuit designed to process instructions. Answer: microprocessor
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networks
Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/39423
Sample Questions
Q1) Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.
Answer: stack
Q2) What organization is the top-level authority for supervising domain name requests?
A) DNS
B) HTTP
C) ISPs (Internet service providers)
D) ICANN (Internet Corporation for Assigned Names and Numbers)
Answer: D
Q3) Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?
A) Category 6 cables
B) Fiber-optic cables
C) Coaxial cables
D) All of the above
Answer: B
Q4) The maximum speed of a dial-up connection is _____ Kbps.
Answer: 56, fifty six
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Web
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/39424
Sample Questions
Q1) Your search history is the same as your browser history.
A)True
B)False
Q2) A file with a .css file extension indicates that it is a(n) ________ CSS.
Q3) What does the HTML tag <p> designate in an HTML document?
A) New paragraph
B) Personal data
C) Print command
D) Show photos
Q4) You can create HTML documents with simple text editors such as Notepad or TextEdit.
A)True
B)False
Q5) A(n) ________ is a software component that extends a browser's ability to work with file formats.
Q6) Which of the following is a function of the browser cache?
A) Any elements that it stores do not have to be downloaded again.
B) Your passwords are securely stored.
C) Your cookies are downloaded.
D) All of the above.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Social Media
Available Study Resources on Quizplus for this Chatper
105 Verified Questions
105 Flashcards
Source URL: https://quizplus.com/quiz/39425
Sample Questions
Q1) Your online reputation is how you see yourself, but your online identity is how others see you.
A)True
B)False
Q2) __________ is/are online service(s) that facilitate communication and interaction among people who want to share information.
A) Email
B) Social media
C) Crowdsourcing
D) Geolocation
Q3) Along with a profile image, which of the following would also be included in a user profile?
A) Sockpuppet
B) Anonymity
C) Tagline
D) Tweet
Q4) Social media services such as Facebook emphasize _______ over the other six factors found in social media honeycombs.
Q5) Twitter messages, called _________, carry a limit of 140 characters.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Software
Available Study Resources on Quizplus for this Chatper
114 Verified Questions
114 Flashcards
Source URL: https://quizplus.com/quiz/39426
Sample Questions
Q1) Two of the most common open source and free software licenses are
A) BSD (Berkeley Software Distribution) and GPL (General Public License)
B) EULA (end-user license agreement) and VoIP
C) EULA and GPL
D) None of the above
Q2) Which one of the following types of operating systems would most likely be found on a laptop computer?
A) Desktop operating system
B) Mobile operating system
C) Server operating system
D) Multitasking operating system
Q3) Microsoft Access, FileMaker Pro, and LibreOffice Base are three examples of popular ___________ software.
Q4) Because it is so easy to experiment with different numbers, word processing software is particularly useful for what-if analysis.
A)True
B)False
Q5) Desktop and laptop computers require an operating system with a file __________ system that allows users to view and manipulate data files.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Digital Security
Available Study Resources on Quizplus for this Chatper
109 Verified Questions
109 Flashcards
Source URL: https://quizplus.com/quiz/39427
Sample Questions
Q1) A(n) __________ is an undocumented method of accessing a digital device.
Q2) Password _________ is a measure in bits of a password's unpredictability.
Q3) Any software that secretly gathers personal information without the victim's knowledge is classified as __________.
Q4) Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.
Q5) An original message or file that has not yet been encrypted is referred to as ciphertext.
A)True
B)False
Q6) A(n) _______ password is difficult to hack.
Q7) A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.
A)True
B)False
Q8) Any data entering a digital device could be malware.
A)True
B)False
Q9) _________ redirects Web site traffic to fraudulent Web sites.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The ICT Industry
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/39428
Sample Questions
Q1) The Atanasoff-Berry Computer is often considered the first electronic digital computer.
A)True
B)False
Q2) Telephone networks are based on a hierarchy of interconnected stars.At the center of the star is a telephone ___________ that manages connections between callers.
Q3) Thomas de Colmar's _________ became the first mass-produced mechanical calculator.
Q4) Colossus used binary arithmetic.
A)True
B)False
Q5) It was not until the ______ generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
Q6) ____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
Q7) Second-generation computers used ________ instead of vacuum tubes.
Q8) 1996 was the year that cable _______ service made its debut.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Information Systems
Available Study Resources on Quizplus for this Chatper
121 Verified Questions
121 Flashcards
Source URL: https://quizplus.com/quiz/39429
Sample Questions
Q1) One type of UML diagram documents the users, or actors, of an information system and the functions they perform.Any task an actor performs is called a use _______.
Q2) Fraud alerts interfere with your ability to receive instant credit.
A)True
B)False
Q3) In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.
A)True
B)False
Q4) In addition to sales, CRM, and SCM, the modules in an ERP system support business activities such as _____________.
A) product planning
B) manufacturing and purchasing
C) inventory control and distribution
D) all of the above
Q5) A(n) ___________ is a specialized facility designed to hold and protect computer systems and data.
Q6) _________ determine organizational goals and plan how to achieve those goals.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Databases
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/39430
Sample Questions
Q1) Modern database tools support ________________, which entails separating data from the programs that manipulate data.
A) predictive analytics
B) cardinality
C) data independence
D) data dependence
Q2) SQL keywords must be entered in all uppercase letters because they are case-sensitive.
A)True
B)False
Q3) In the context of database security, intermediary servers allow users to directly access the database.
A)True
B)False
Q4) Decision makers can access analytical databases using an executive __________.
Q5) 1024 Zettabytes = 1 _______.
Q6) A process called ____________ helps database designers create a database structure that minimizes storage space and increases processing efficiency.
Q7) A primary key is a(n) ____________ that contains data unique to a record.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Programming
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/39431
Sample Questions
Q1) Procedural languages encourage programmers to approach problems by breaking down the solution into a series of steps.
A)True
B)False
Q2) _____________ programmers create productivity software such as Microsoft Office, as well as enterprise applications such as CRM and ERP.
Q3) A(n) _________ represents a value that can change.
Q4) Programmers specify the actual solution in the problem statement.
A)True
B)False
Q5) __________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications.
A) First
B) Second
C) Third
D) Fourth
Q6) In the context of programming, a problem ____________ defines certain elements that must be manipulated to achieve a result or goal.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module Py: Coding With Python
Available Study Resources on Quizplus for this Chatper
89 Verified Questions
89 Flashcards
Source URL: https://quizplus.com/quiz/39420
Sample Questions
Q1) In object-oriented jargon, ______ refers to passing certain characteristics from one class to other classes.
Q2) Syntax errors and ____ errors are the two faults most frequently encountered when debugging a program.
Q3) Statements that tell a computer what to do are referred to as code. A)True B)False
Q4) A(n) ____ is a named memory location that holds data specified by a programmer or entered by an end user.
Q5) ___________, sometimes called overloading, is the ability to redefine a method in a subclass.
Q6) An accumulator is a numeric variable in which values are repetitively subtracted. A)True B)False
Q7) In programming, a sequence of characters is called a ____.
Q8) The process of tracking down bugs and correcting them is called ______.
Q9) In programming, a(n) ______ is a symbol that represents an action.
To view all questions and flashcards with answers, click on the resource link above. Page 14
Q10) A(n) ______ is a segment of code that defines an action belonging to a class.