Foundations of Computing Exam Bank - 1126 Verified Questions

Page 1


Foundations of Computing Exam Bank

Course Introduction

Foundations of Computing introduces students to the fundamental concepts and principles that underpin computer science. The course covers topics such as logic, algorithms, discrete mathematics, set theory, and the basics of computational models. Emphasis is placed on developing problem-solving skills, understanding the theoretical basis for computation, and exploring the limits of what can be computed. Through lectures and hands-on exercises, students gain a solid foundation necessary for more advanced studies in computer science and related disciplines.

Recommended Textbook

Technology In Action Complete 12th Edition by Alan Evans

Available Study Resources on Quizplus

17 Chapters

1126 Verified Questions

1126 Flashcards

Source URL: https://quizplus.com/study-set/450

2

Chapter 1: Using Technology to Change the World

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/7981

Sample Questions

Q1) ________ applies computer systems and techniques to gather legal evidence.

Answer: Computer forensics

Q2) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking

B) Crowdsourcing

C) Crisis-mapping

D) Affective computing

Answer: C

Q3) Autonomy is defined as ________.

A) working for something larger

B) feeling confident and excited about learning new skills

C) working without continual direction and control

D) repressing inappropriate behavior

Answer: C

Q4) Cognitive surplus is the combination of leisure time and creativity tools.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Looking at Computers: Understanding the Parts

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/7982

Sample Questions

Q1) An Apple iPad and a Samsung Galaxy Tab are examples of ________ computers.

A) tablet

B) netbook

C) desktop

D) laptop

Answer: A

Q2) The area that holds all of the instructions the computer needs to start up is the RAM.

A)True

B)False

Answer: False

Q3) RAM is a ________ storage location.

A) permanent

B) peripheral

C) volatile

D) nonvolatile

Answer: C

Q4) ________ is the set of computer programs that allows the hardware to perform different tasks.

Answer: Software

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Using the Internet: Making the Most of the Web's Resources

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7983

Sample Questions

Q1) A subject directory is an outline of websites organized by topics.

A)True

B)False

Answer: True

Q2) The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.

A) dotted quad

B) path

C) dotted decimal

D) IP address

Answer: B

Q3) When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.

A)True

B)False

Answer: False

Q4) Feedspot and iTunes are examples of RSS ________ which locate and download RSS series to which you have subscribed.

Answer: aggregators

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Application Software: Programs That Let You

Work and Play

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7984

Sample Questions

Q1) Most word processing programs come with a find-and-replace tool that enables you to locate and replace specific text.

A)True

B)False

Q2) The intersection of a row and column in a spreadsheet program is known as a

A) label

B) formula

C) function

D) cell

Q3) Traditional databases are organized into fields, records, and ________.

Q4) Which of the following is the most common audio compression format?

A) WAV

B) AU

C) MP3

D) WMA

Q5) Before installing any software, it's always important to back up your system and to create a(n)________, which enables you to go back to your computer's previous settings if anything goes wrong during a new software installation.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 6: Understanding and Assessing Hardware:

Evaluating Your System

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7986

Sample Questions

Q1) A ________ uses electronic memory and has no motors or moving parts.

A) mechanical hard drive

B) solid-state drive

C) Blu-ray disc

D) digital video disc

Q2) Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.

A)True

B)False

Q3) The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.

A)True

B)False

Q4) Mac OS X uses ________ software to automatically backup and restore data.

Q5) ________ improves disk writing performance because data is written across two drives.

Q6) Dolby Digital 7.1 requires a total of eight speakers.

A)True

B)False

Q7) The audio subsystem consists of the speakers and a(n)________. Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 7: Networking: Connecting Computing Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7987

Sample Questions

Q1) When using a wireless connection, ________ translates data so that it is protected.

Q2) Normal telephone cable is a type of ________.

A) fiber-optic cable

B) twisted-pair cable

C) coaxial cable

D) Ethernet cable

Q3) P2P networks are most commonly used in home networks.

A)True

B)False

Q4) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?

A) Cat 5E

B) Cat 6

C) Cat 6A

D) Cat 7B

Q5) Someone who breaks into computer systems to create mischief or steal information is a(n)________.

Q6) SSID stands for ________.

Q7) WEP stands for ________.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Digital Devices and Media: Managing a Digital Lifestyle

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7988

Sample Questions

Q1) A tablet uses a full traditional operating system.

A)True

B)False

Q2) The Apple iPhone uses iOS, a version of Apple's ________ as its operating system.

Q3) You can send messages that include photos and videos between mobile devices using ________ technology.

A) short message service (SMS)

B) multimedia message service (MMS)

C) delivery multimedia service (DMS)

D) multimedia delivery service (MDS)

Q4) The most common file types supported by digital cameras are raw uncompressed (RAW)data and ________.

Q5) The distance between two near field communication (NFC)devices is limited to about ________.

A) 1.5 inches

B) 1.5 feet

C) 1.5 meters

D) 10 meters

Q6) iOS and Android are ________ for tablets and smartphones.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Securing Your System: Protecting Your Digital

Data and Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7989

Sample Questions

Q1) Currently, there are no antivirus programs for mobile devices.

A)True

B)False

Q2) A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

Q3) Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

Q4) Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A) packet filtering

B) packet switching

C) static addressing

D) logical port blocking

Q5) Which type of virus was the famous Michelangelo virus?

A) A worm

B) A time bomb

C) A script virus

D) An e-mail virus

Q6) The most common kind of pretexting in cyberspace is ________.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Behind the Scenes: Software Programming

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7990

Sample Questions

Q1) Corona and Magmito can be used to develop ________.

A) complex web applications

B) apps for smartphones

C) Mac software

D) Web pages

Q2) The final step of the system development life cycle (SDLC)is ________.

A) testing and installation

B) maintenance and evaluation

C) analysis

D) design

Q3) ________ is a combination of natural language and programming language that is used to document an algorithm.

A) Flowcharting

B) Pseudocode

C) Diagramming

D) Debugging

Q4) SQL stands for ________.

Q5) ________ design is a systematic approach that is used to break down a problem into a series of high-level tasks.

Page 12

Q6) A(n)________ translates source code into an intermediate form, line by line.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Behind the Scenes: Databases and Information Systems

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/7991

Sample Questions

Q1) ________ is used to analyze large amounts of data and identify unseen patterns or trends.

Q2) Data that describe other data are called________.

Q3) A group of related records is called a table.

A)True

B)False

Q4) When working with a relational database, each record must have a(n)________ key field, which has a value unique to that record.

Q5) When using Access, the text of the Gettysburg Address would be stored in a short text field.

A)True

B)False

Q6) A(n)________ is a way of retrieving information from one or more tables that defines a particular subset of data.

A) validation rule

B) field constraint

C) enquiry

D) query

13

Q7) In a database, another term for a table is a(n)________.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Behind the Scenes: Networking and Security in the Business World

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/7992

Sample Questions

Q1) A ________ sends data from one collision domain to another.

A) switch

B) bridge

C) link

D) router

Q2) Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

A) viewing

B) sniffing

C) scanning

D) screening

Q3) Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

A)True

B)False

Q4) ________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

Q5) A(n)________ server is a server used to fulfill one specific purpose.

Q6) ________ cable is the most costly to install.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Behind the Scenes: How the Internet Works

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/7993

Sample Questions

Q1) JavaScript commands are executed on a server computer.

A)True

B)False

Q2) CGI scripts are known as ________ programs because these programs run on a web server.

Q3) IPV6 was needed when IPV4 ________.

A) became too old

B) was eliminated

C) no longer had enough unique addresses

D) was revoked

Q4) Which of the following was created for the transfer of hypertext documents across the Internet?

A) SSL

B) HTTP

C) FTP

D) HTML

Q5) ________ combines HTML, cascading style sheets, and JavaScript.

Q6) When a(n)________ address is assigned to a computer, its IP address will not change.

Q7) MIME stands for ________.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: The History of the Personal Computer

Available Study Resources on Quizplus for this Chatper

38 Verified Questions

38 Flashcards

Source URL: https://quizplus.com/quiz/7980

Sample Questions

Q1) ________ was the first electronic spreadsheet application.

Q2) DOS stands for ________.

Q3) The Z1 is thought to be the first computer to include features such as a control unit and separate memory functions.

A)True

B)False

Q4) Prior to the 1980s, IBM built and sold primarily ________ computers to large corporations.

Q5) The world's first integrated circuit was developed at Texas Instruments.

A)True

B)False

Q6) Introduced in 1983, the ________ was the first successful personal computer that used a graphical user interface (GUI).

Q7) Released in 1993, ________ was the first Internet web browser.

A) Internet Explorer

B) Mosaic

C) Safari

D) Chrome

Q8) ________ was founded by Bill Gates and Paul Allen.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 5: System Software: The Operating System, Utility Programs,

and File Management

Available Study Resources on Quizplus for this Chatper

68 Verified Questions

68 Flashcards

Source URL: https://quizplus.com/quiz/7985

Sample Questions

Q1) The Windows path separator is the ________ character.

Q2) If your computer is thrashing, increase ________ to solve the problem.

Q3) In the Windows operating system, the C:\ path is commonly referred to as the ________ directory.

Q4) iOS was developed by ________ as the operating system for its tablets and smartphones.

Q5) CMOS is a special kind of memory that uses a great deal of power.

A)True

B)False

Q6) Each device attached to your computer comes with a special program called a(n)________ that enables the device and operating system to communicate with each other.

A) device driver

B) translator

C) interpreter

D) device configurator

Q7) Every computer has an operating system.

Page 17

A)True

B)False

Q8) PnP stands for ________.

To view all questions and flashcards with answers, click on the resource link above.

Page 18

Chapter 15: Information Technology Ethics

Available Study Resources on Quizplus for this Chatper

34 Verified Questions

34 Flashcards

Source URL: https://quizplus.com/quiz/7979

Sample Questions

Q1) The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.

Q2) Microsoft agreed to censor search results and partnered with Baidu.com to provide English-language search results in China

A)True

B)False

Q3) Harassing individuals through electronic means such as video or cell phones is called ________.

Q4) Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.

Q5) It is estimated that the global loss in 2013 due to software piracy is in the billions of dollars.

A)True

B)False

Q6) Most states have enacted antibullying laws.

A)True

B)False

Q7) ________ is the right to be left alone to do as one pleases.

Page 19

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Under the Hood

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/7978

Sample Questions

Q1) The base-sixteen number system is also known as the ________ number system.

Q2) The ________ encoding scheme for character data uses 16 bits.

Q3) Mathematical operations and comparisons are performed in the ________.

Q4) ________ are the most expensive, fastest memory in a computer.

Q5) ________ language consists of a series of 0s and 1s.

Q6) ________ is the semiconductor material used to make transistors.

A) Silicon

B) Titanium oxide

C) Carbon

D) Strontium nitrate

Q7) IEEE's ________ standard describes how numbers containing fractional parts are represented in the binary number system.

Q8) All data input into a computer will be stored as 0s and 1s.

A)True

B)False

Q9) The collection of commands that a CPU executes is called the instruction set.

A)True

B)False

Q10) A binary digit is called a(n)________.

Q11) The decimal number 11 equals B in the ________ number system. Page 20

To view all questions and flashcards with answers, click on the resource link above.

Page 21

Chapter 17: Careers in IT

Available Study Resources on Quizplus for this Chatper

36 Verified Questions

36 Flashcards

Source URL: https://quizplus.com/quiz/7977

Sample Questions

Q1) If you travel from place to place as needed and perform short-term jobs at each site, your job is ________-based.

Q2) The primary benefit of offshoring and outsourcing is cost savings.

A)True

B)False

Q3) ________ install and configure servers, design and plan networks, and test new networking equipment.

Q4) Which of the following in NOT a website for finding IT employment?

A) Monster

B) LinkedIn

C) Twitter

D) CareerBuilder

Q5) Game development jobs typically are divided into two paths: designers and ________.

Q6) ________ provide feedback to a website's customers by answering e-mail, sending requested information, and directing questions to appropriate personnel.

Q7) Web social media directors need to understand HTML, Perl, and JavaScript.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 22

Turn static files into dynamic content formats.

Create a flipbook