

Computing Fundamentals
Final Test Solutions
Course Introduction
Computing Fundamentals provides an essential introduction to the basic concepts, terminology, and practices of modern computing. Students will explore hardware components, software applications, and operating system features, alongside foundational topics such as data representation, networks, the Internet, and cybersecurity basics. The course also covers problem-solving strategies and introduces programming logic, equipping learners with the necessary skills to use technology effectively and paving the way for further study in computer science and related fields.
Recommended Textbook
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1795 Verified Questions
1795 Flashcards
Source URL: https://quizplus.com/study-set/1723

Page 2

Chapter 1: Computers and Digital Basics
Available Study Resources on Quizplus for this Chatper
147 Verified Questions
147 Flashcards
Source URL: https://quizplus.com/quiz/34239
Sample Questions
Q1) To ensure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.
A)True
B)False
Answer: False
Q2) The digital revolution became a significant factor in the 1980s but ended in the 1990s when the "dot com" bubble burst.
A)True
B)False
Answer: False
Q3) Data transmission speeds are typically expressed as ____.
A) bits
B) bytes
C) hertz
D) none of the above
Answer: A
Q4) A term that refers to the gap between people who have access to technology and those who do not is the digital ____________________.
Answer: divide
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Computer Hardware
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34240
Sample Questions
Q1) Tablet computers,handheld devices,retail store self checkouts,and information kiosks collect input from a ____.
A) pointing stick
B) joystick
C) trackball
D) touch screen
Answer: D
Q2) The ____ is a security mechanism that is factory-installed on many personal computers.
A) STOP plate
B) EPA
C) Kensington Security Slot
D) slate tablet
Answer: C
Q3) DVD-RW technology allows you to write data to a disc and then later change that data.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Chapter 3: Software
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/34241
Sample Questions
Q1) Uses rows and columns of numbers to create a model or representation of a real situation
A)application software
B)zip
C)multiple-user license
D)desktop publishing
E)virus hoax
F)spyware
G)spreadsheet
H)virus definition
I)drawing software
J)hash value
K)setup program
L)raster graphics editor
Answer: G
Q2) Most Web apps,like the one shown in the accompanying figure,require installation on your local computer or handheld device.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
Page 5
Chapter 4: Operating Systems and File Management
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34242
Sample Questions
Q1) The first versions of Windows were referred to as operating environments rather than operating systems because ____.
A) they required DOS to supply the operating system kernel
B) they were DOS with a GUI
C) DOS was not required by the operating system kernel
D) they were so new they really didn't know what to call them
Q2) Within a single program,____ allows multiple parts to run simultaneously.
A) multitasking
B) multithreading
C) multiprocessing
D) multicomputing
Q3) The D drive must refer to a CD or DVD drive.
A)True
B)False
Q4) Files maintained by the Macintosh operating system can have two parts,called ____.
A) components
B) segments
C) forks
D) identifier and size

Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Local Area Networks
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34243
Sample Questions
Q1) The original wireless encryption was called ____.
A) WEP
B) WPA
C) WPA2
D) WSA
Q2) If you are using a file server without its own keyboard or monitor,server configuration software is accessible using a(n)browser._________________________
A)True
B)False
Q3) Most wireless networks transport data using ____________________ signals.
Q4) A protocol known as ____ is designed to automatically distribute IP addresses.
A) DHCP
B) packet switching
C) CSMA/CD
D) a piconet
Q5) If there are not unsecured networks in an area,networks with ____________________ encryption are the easiest to breach.
Q6) Transmission signals can be disrupted by interference called ____________________,which has the potential to corrupt data.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: The Internet
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/34244
Sample Questions
Q1) A high-speed,digital,always-on,Internet access technology that runs over standard phone lines is ____________________.
Q2) ____ is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.
A) ftp
B) http
C) P2P
D) BitTorrent
Q3) Any access to data or programs by hackers,criminals,or other unauthorized persons is called ____________________.
Q4) VoIP systems are offered by companies such as ____.
A) AT&T
B) magicJack
C) Vonage
D) all of the above
Q5) The rate of data arriving at your computer is ____________________ speed.
Q6) A communications protocol that provides Internet access from handheld devices is called ____________________.
Q7) NSP equipment and links are tied together by ____________________.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: The Web and E-Mail
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34245
Sample Questions
Q1) ____________________ is typically used to describe business transactions that are conducted over a computer network.
Q2) An HTTP exchange takes place over a pair of ____.
A) sockets
B) packets
C) switches
D) networks
Q3) Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.
A) packing
B) stuffing
C) archiving
D) indexing
Q4) To identify the creator of an ActiveX control,Amelia tells Mark that he should look at the control's ____.
A) digital receipt
B) ActiveX certificate
C) digital certificate
D) ActiveX applet
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Digital Media
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34246
Sample Questions
Q1) Which of the following is NOT a DRM encryption technology?
A) CDHA
B) HDCP
C) CSS
D) AACS
Q2) Joseph has noticed that a visually impaired co-worker has a ____ to read the computer screen aloud when she browses the Internet.
A) speech recognizer
B) rasterizer
C) speech synthesizer
D) MIDI
Q3) ____________________ is a graphics format designed to improve on the GIF format.
Q4) The more pixels in a bitmap,the more ____________________ needed to store the file.
Q5) One minute of CDDA music requires in excess of ____ of storage space.
A) 1 MB
B) 10 MB
C) 100 MB
D) 1 GB
To view all questions and flashcards with answers, click on the resource link above. Page 10
Q6) You can select a portion of a bitmap graphic by ____________________ it.

Chapter 9: The Computer Industry: History, careers, and Ethics
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34247
Sample Questions
Q1) Susan is a teacher and is concerned about her use of copyrighted materials.You suggest she look at the ____.
A) Trademarks Provision of the U.S. Constitution
B) Digital Millennium Copyright Act
C) Fair Use Doctrine
D) CAN-SPAM Act
Q2) All of the following are essential for secure business data transmitted over the Internet EXCEPT ____.
A) virtual private networks
B) encryption
C) secure connections
D) high-speed connections
Q3) ____________________ circuit technology made it possible to pack the equivalent of thousands of vacuum tubes or transistors onto a single miniature chip.
Q4) The first commercially successful digital computer was the ____.
A) COLOSSUS
B) Enigma
C) Enivac
D) UNIVAC
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Information Systems Analysis and Design
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34248
Sample Questions
Q1) In the accompanying figure,the Student item represents a data store.
A)True
B)False
Q2) A small business might require several information systems to be integrated into an enterprise information system to support a variety of business activities.
A)True
B)False
Q3) A DSS can be used to tackle diverse problems because it contains a good selection of decision support tools.
A)True
B)False
Q4) In the planning phase of the SDLC,a(n)____ is assigned to analyze and develop the information system.
A) RFP team
B) project team
C) mission team
D) beta team
Q5) The items in the accompanying figure are symbols from a(n)____________________.
Page 12
Q6) EIS stands for ____________________.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Databases
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34249
Sample Questions
Q1) ____ is a markup language that allows field tags,data,and tables to be incorporated into a Web document.
A) HTML
B) XML
C) Java
D) ASP
Q2) The intern needs to complete the following query so that it draws data from two different tables.Which command should she use to complete the query? SELECT FROM CompactDiscs ____ Tracks ON CompactDiscs.ItemNumber = Tracks.ItemNumber
A) AND
B) INSERT
C) JOIN
D) UPDATE
Q3) A(n)____________________ is a database management system that is optimized for handling data that exists in XML format.
Q4) A lookup ____________________ validates an entry by searching for the same data in a file or database table.
Q5) Describe the seven principles that contribute to good user interface design.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Computer Programming
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34250
Sample Questions
Q1) A ____ control structure tells a computer what to do based on whether a condition is true or false.
A) sequence
B) selection
C) repetition
D) directing
Q2) You should perform a walkthrough to verify that your algorithm works.
A)True
B)False
Q3) A(n)____ is a unit of data that represents an abstraction or a real-world entity such as person,place,or thing.
A) class
B) object
C) attribute
D) variable
Q4) A way of conceptualizing and structuring the tasks a computer performs is a programming ____________________.
Q5) COBOL and Fortran are considered second-generation languages.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14