

Foundations of Computing Exam Bank
Course Introduction
Foundations of Computing introduces students to the fundamental concepts and principles that underpin computer science. The course covers topics such as logic, algorithms, discrete mathematics, set theory, and the basics of computational models. Emphasis is placed on developing problem-solving skills, understanding the theoretical basis for computation, and exploring the limits of what can be computed. Through lectures and hands-on exercises, students gain a solid foundation necessary for more advanced studies in computer science and related disciplines.
Recommended Textbook
Technology In Action Complete 12th Edition by Alan Evans
Available Study Resources on Quizplus
17 Chapters
1126 Verified Questions
1126 Flashcards
Source URL: https://quizplus.com/study-set/450

2

Chapter 1: Using Technology to Change the World
Available Study Resources on Quizplus for this Chatper
73 Verified Questions
73 Flashcards
Source URL: https://quizplus.com/quiz/7981
Sample Questions
Q1) ________ applies computer systems and techniques to gather legal evidence.
Answer: Computer forensics
Q2) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.
A) Social networking
B) Crowdsourcing
C) Crisis-mapping
D) Affective computing
Answer: C
Q3) Autonomy is defined as ________.
A) working for something larger
B) feeling confident and excited about learning new skills
C) working without continual direction and control
D) repressing inappropriate behavior
Answer: C
Q4) Cognitive surplus is the combination of leisure time and creativity tools.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Looking at Computers: Understanding the Parts
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/7982
Sample Questions
Q1) An Apple iPad and a Samsung Galaxy Tab are examples of ________ computers.
A) tablet
B) netbook
C) desktop
D) laptop
Answer: A
Q2) The area that holds all of the instructions the computer needs to start up is the RAM.
A)True
B)False
Answer: False
Q3) RAM is a ________ storage location.
A) permanent
B) peripheral
C) volatile
D) nonvolatile
Answer: C
Q4) ________ is the set of computer programs that allows the hardware to perform different tasks.
Answer: Software
To view all questions and flashcards with answers, click on the resource link above. Page 4
Chapter 3: Using the Internet: Making the Most of the Web's Resources
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7983
Sample Questions
Q1) A subject directory is an outline of websites organized by topics.
A)True
B)False
Answer: True
Q2) The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.
A) dotted quad
B) path
C) dotted decimal
D) IP address
Answer: B
Q3) When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
A)True
B)False
Answer: False
Q4) Feedspot and iTunes are examples of RSS ________ which locate and download RSS series to which you have subscribed.
Answer: aggregators

Page 5
To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Application Software: Programs That Let You
Work and Play
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7984
Sample Questions
Q1) Most word processing programs come with a find-and-replace tool that enables you to locate and replace specific text.
A)True
B)False
Q2) The intersection of a row and column in a spreadsheet program is known as a
A) label
B) formula
C) function
D) cell
Q3) Traditional databases are organized into fields, records, and ________.
Q4) Which of the following is the most common audio compression format?
A) WAV
B) AU
C) MP3
D) WMA
Q5) Before installing any software, it's always important to back up your system and to create a(n)________, which enables you to go back to your computer's previous settings if anything goes wrong during a new software installation.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 6: Understanding and Assessing Hardware:
Evaluating Your System
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7986
Sample Questions
Q1) A ________ uses electronic memory and has no motors or moving parts.
A) mechanical hard drive
B) solid-state drive
C) Blu-ray disc
D) digital video disc
Q2) Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
A)True
B)False
Q3) The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.
A)True
B)False
Q4) Mac OS X uses ________ software to automatically backup and restore data.
Q5) ________ improves disk writing performance because data is written across two drives.
Q6) Dolby Digital 7.1 requires a total of eight speakers.
A)True
B)False
Q7) The audio subsystem consists of the speakers and a(n)________. Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 7: Networking: Connecting Computing Devices
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7987
Sample Questions
Q1) When using a wireless connection, ________ translates data so that it is protected.
Q2) Normal telephone cable is a type of ________.
A) fiber-optic cable
B) twisted-pair cable
C) coaxial cable
D) Ethernet cable
Q3) P2P networks are most commonly used in home networks.
A)True
B)False
Q4) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
A) Cat 5E
B) Cat 6
C) Cat 6A
D) Cat 7B
Q5) Someone who breaks into computer systems to create mischief or steal information is a(n)________.
Q6) SSID stands for ________.
Q7) WEP stands for ________.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Digital Devices and Media: Managing a Digital Lifestyle
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7988
Sample Questions
Q1) A tablet uses a full traditional operating system.
A)True
B)False
Q2) The Apple iPhone uses iOS, a version of Apple's ________ as its operating system.
Q3) You can send messages that include photos and videos between mobile devices using ________ technology.
A) short message service (SMS)
B) multimedia message service (MMS)
C) delivery multimedia service (DMS)
D) multimedia delivery service (MDS)
Q4) The most common file types supported by digital cameras are raw uncompressed (RAW)data and ________.
Q5) The distance between two near field communication (NFC)devices is limited to about ________.
A) 1.5 inches
B) 1.5 feet
C) 1.5 meters
D) 10 meters
Q6) iOS and Android are ________ for tablets and smartphones.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Securing Your System: Protecting Your Digital
Data and Devices
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7989
Sample Questions
Q1) Currently, there are no antivirus programs for mobile devices.
A)True
B)False
Q2) A(n)________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
Q3) Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
Q4) Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A) packet filtering
B) packet switching
C) static addressing
D) logical port blocking
Q5) Which type of virus was the famous Michelangelo virus?
A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Q6) The most common kind of pretexting in cyberspace is ________.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Behind the Scenes: Software Programming
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7990
Sample Questions
Q1) Corona and Magmito can be used to develop ________.
A) complex web applications
B) apps for smartphones
C) Mac software
D) Web pages
Q2) The final step of the system development life cycle (SDLC)is ________.
A) testing and installation
B) maintenance and evaluation
C) analysis
D) design
Q3) ________ is a combination of natural language and programming language that is used to document an algorithm.
A) Flowcharting
B) Pseudocode
C) Diagramming
D) Debugging
Q4) SQL stands for ________.
Q5) ________ design is a systematic approach that is used to break down a problem into a series of high-level tasks.
Page 12
Q6) A(n)________ translates source code into an intermediate form, line by line.
To view all questions and flashcards with answers, click on the resource link above.
Chapter 11: Behind the Scenes: Databases and Information Systems
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7991
Sample Questions
Q1) ________ is used to analyze large amounts of data and identify unseen patterns or trends.
Q2) Data that describe other data are called________.
Q3) A group of related records is called a table.
A)True
B)False
Q4) When working with a relational database, each record must have a(n)________ key field, which has a value unique to that record.
Q5) When using Access, the text of the Gettysburg Address would be stored in a short text field.
A)True
B)False
Q6) A(n)________ is a way of retrieving information from one or more tables that defines a particular subset of data.
A) validation rule
B) field constraint
C) enquiry
D) query

13
Q7) In a database, another term for a table is a(n)________.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Behind the Scenes: Networking and Security in the Business World
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7992
Sample Questions
Q1) A ________ sends data from one collision domain to another.
A) switch
B) bridge
C) link
D) router
Q2) Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
A) viewing
B) sniffing
C) scanning
D) screening
Q3) Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
A)True
B)False
Q4) ________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
Q5) A(n)________ server is a server used to fulfill one specific purpose.
Q6) ________ cable is the most costly to install.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Behind the Scenes: How the Internet Works
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/7993
Sample Questions
Q1) JavaScript commands are executed on a server computer.
A)True
B)False
Q2) CGI scripts are known as ________ programs because these programs run on a web server.
Q3) IPV6 was needed when IPV4 ________.
A) became too old
B) was eliminated
C) no longer had enough unique addresses
D) was revoked
Q4) Which of the following was created for the transfer of hypertext documents across the Internet?
A) SSL
B) HTTP
C) FTP
D) HTML
Q5) ________ combines HTML, cascading style sheets, and JavaScript.
Q6) When a(n)________ address is assigned to a computer, its IP address will not change.
Q7) MIME stands for ________.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: The History of the Personal Computer
Available Study Resources on Quizplus for this Chatper
38 Verified Questions
38 Flashcards
Source URL: https://quizplus.com/quiz/7980
Sample Questions
Q1) ________ was the first electronic spreadsheet application.
Q2) DOS stands for ________.
Q3) The Z1 is thought to be the first computer to include features such as a control unit and separate memory functions.
A)True
B)False
Q4) Prior to the 1980s, IBM built and sold primarily ________ computers to large corporations.
Q5) The world's first integrated circuit was developed at Texas Instruments.
A)True
B)False
Q6) Introduced in 1983, the ________ was the first successful personal computer that used a graphical user interface (GUI).
Q7) Released in 1993, ________ was the first Internet web browser.
A) Internet Explorer
B) Mosaic
C) Safari
D) Chrome
Q8) ________ was founded by Bill Gates and Paul Allen.
To view all questions and flashcards with answers, click on the resource link above. Page 16
Chapter 5: System Software: The Operating System, Utility Programs,
and File Management
Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/7985
Sample Questions
Q1) The Windows path separator is the ________ character.
Q2) If your computer is thrashing, increase ________ to solve the problem.
Q3) In the Windows operating system, the C:\ path is commonly referred to as the ________ directory.
Q4) iOS was developed by ________ as the operating system for its tablets and smartphones.
Q5) CMOS is a special kind of memory that uses a great deal of power.
A)True
B)False
Q6) Each device attached to your computer comes with a special program called a(n)________ that enables the device and operating system to communicate with each other.
A) device driver
B) translator
C) interpreter
D) device configurator
Q7) Every computer has an operating system.
Page 17

A)True
B)False
Q8) PnP stands for ________.
To view all questions and flashcards with answers, click on the resource link above.
Page 18

Chapter 15: Information Technology Ethics
Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/7979
Sample Questions
Q1) The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.
Q2) Microsoft agreed to censor search results and partnered with Baidu.com to provide English-language search results in China
A)True
B)False
Q3) Harassing individuals through electronic means such as video or cell phones is called ________.
Q4) Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.
Q5) It is estimated that the global loss in 2013 due to software piracy is in the billions of dollars.
A)True
B)False
Q6) Most states have enacted antibullying laws.
A)True
B)False
Q7) ________ is the right to be left alone to do as one pleases.
Page 19
To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Under the Hood
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/7978
Sample Questions
Q1) The base-sixteen number system is also known as the ________ number system.
Q2) The ________ encoding scheme for character data uses 16 bits.
Q3) Mathematical operations and comparisons are performed in the ________.
Q4) ________ are the most expensive, fastest memory in a computer.
Q5) ________ language consists of a series of 0s and 1s.
Q6) ________ is the semiconductor material used to make transistors.
A) Silicon
B) Titanium oxide
C) Carbon
D) Strontium nitrate
Q7) IEEE's ________ standard describes how numbers containing fractional parts are represented in the binary number system.
Q8) All data input into a computer will be stored as 0s and 1s.
A)True
B)False
Q9) The collection of commands that a CPU executes is called the instruction set.
A)True
B)False
Q10) A binary digit is called a(n)________.
Q11) The decimal number 11 equals B in the ________ number system. Page 20
To view all questions and flashcards with answers, click on the resource link above.
Page 21

Chapter 17: Careers in IT
Available Study Resources on Quizplus for this Chatper
36 Verified Questions
36 Flashcards
Source URL: https://quizplus.com/quiz/7977
Sample Questions
Q1) If you travel from place to place as needed and perform short-term jobs at each site, your job is ________-based.
Q2) The primary benefit of offshoring and outsourcing is cost savings.
A)True
B)False
Q3) ________ install and configure servers, design and plan networks, and test new networking equipment.
Q4) Which of the following in NOT a website for finding IT employment?
A) Monster
B) LinkedIn
C) Twitter
D) CareerBuilder
Q5) Game development jobs typically are divided into two paths: designers and ________.
Q6) ________ provide feedback to a website's customers by answering e-mail, sending requested information, and directing questions to appropriate personnel.
Q7) Web social media directors need to understand HTML, Perl, and JavaScript.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 22