Foundations of Information Technology Exam Bank - 849 Verified Questions

Page 1


Foundations of Information Technology Exam Bank

Course Introduction

Foundations of Information Technology introduces students to the essential concepts and tools of modern computing systems. The course covers the basics of computer hardware and software, the fundamentals of operating systems, databases, networks, and the Internet, as well as key concepts in cybersecurity and data management. Students will develop a practical understanding of digital technologies and how information is created, processed, stored, and communicated in organizations and society. Through hands-on activities and real-world examples, this course prepares learners for further study in information technology and equips them with the foundational skills to navigate the digital world effectively.

Recommended Textbook Invitation to Computer Science 6th Edition by G.Michael Schneider

Available Study Resources on Quizplus

17 Chapters

849 Verified Questions

849 Flashcards

Source URL: https://quizplus.com/study-set/1994 Page 2

Chapter 1: An Introduction to Computer Science

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39624

Sample Questions

Q1) Charles Babbage gave up on his second ____________________ because the current technology could not support his project.

Answer: Difference Engine

Q2) Algorithms are exclusive to the field of computer science.

A)True

B)False

Answer: False

Q3) The first electronic programmable computer, ENIAC, was built during World War I.

A)True

B)False

Answer: False

Q4) In 1614, John Napier invented ____ as a way to simplify difficult mathematical computations.

A) algorithms

B) logarithms

C) electronic computers

D) mechanical calculators

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Algorithm Discovery and Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39625

Sample Questions

Q1) A(n) ____ is a named storage location that can hold a data value.

A) expression

B) variable

C) computation

D) constant Answer: B

Q2) What is the definition of a library in terms of algorithms?

Answer: In the world of algorithms, a library is a collection of useful, prewritten algorithms, which are an important tool in the design and development of algorithms.

Q3) Having an infinite loop in an algorithm is an error.

A)True

B)False

Answer: True

Q4) ____ statements are the "question-asking" operations of an algorithm.

A) Primitive

B) Iterative

C) Sequential

D) Conditional Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: The Efficiency of Algorithms

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39626

Sample Questions

Q1) Part of the job of program ____ is to make clear any assumptions or restrictions about the input size the program was designed to handle.

A) design

B) implementation

C) documentation

D) maintenance

Answer: C

Q2) The study of the efficiency of algorithms is called the ____ of algorithms.

A) design

B) analysis

C) implementation

D) testing

Answer: B

Q3) No one has yet found a solution algorithm that works in polynomial time, but neither has anyone proved that such an algorithm does not exist.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Building Blocks: Binary Numbers, Boolean

Logic, and Gates

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39627

Sample Questions

Q1) An integrated circuit, also known as a(n) <u>chip</u>, is mounted on a circuit board.

A)True

B)False

Q2) A(n) ____ is a distinct point located on an image's surface.

A) pitch

B) amplitude

C) pixel

D) bit

Q3) A(n) ____ is a circuit that performs binary addition on two unsigned N-bit integers.

A) adding circuit

B) compare-for-equality

C) full adder

D) calculator

Q4) Describe at length what a multiplexor is.

Q5) The Boolean AND is a(n) <u>unary</u> operator.

A)True B)False

Q6) Briefly describe the two types of information representation. Page 6

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 5: Computer Systems Organization

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39628

Sample Questions

Q1) To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.

A) one

B) two

C) three

D) multi

Q2) Both RAM and ROM are memory chips into which information has been prerecorded during manufacture.

A)True

B)False

Q3) The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.

A) registers

B) arithmetic/logic units

C) control units

D) input/output units

Q4) Registers can be accessed much more quickly than random access memory.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: An Introduction to System Software and Virtual Machines

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39629

Sample Questions

Q1) The variable used to determine the address of a given instruction or piece of data is called the <u>program</u> counter. _________________________

A)True

B)False

Q2) A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed

B) virtual

C) assembler

D) naked

Q3) A(n) ____ invokes a service of the assembler.

A) compiler

B) pseudo-op

C) loader

D) operation

Q4) What is the most important task of the operating system?

Q5) Typically, all requests to a(n) ____________________ operating system are prioritized.

Q6) Briefly explain the function of the operating system as a security guard.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Computer Networks, The Internet, and the World Wide Web

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39630

Sample Questions

Q1) Explain what the function of a WWAN network is in the context of the transmission limitations of Wi-Fi.

Q2) Generally, it is difficult to intercept transmissions and gain unauthorized access to wireless networks.

A)True

B)False

Q3) What is a protocol stack?

Q4) ____ is a general term applied to any use of computers and networking to support the paperless exchange of goods, information, and services in the commercial sector.

A) Electronic exchange

B) Commerce exchange

C) Electronic commerce

D) Commercial networking

Q5) While <u>WiMAX</u> is great for communicating with a nearby router, its transmission limit means it cannot provide mobile Internet access from a car or outdoor site far from any base station. _________________________

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Information Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39631

Sample Questions

Q1) Provide at least four suggestions for choosing passwords, and three suggestions for using passwords.

Q2) The exchange of setup information between the client and server, preparatory to exchanging real data, is known as a ____.

A) handshake

B) training exchange

C) linkage

D) synchronization

Q3) How does Triple DES improve the security of DES?

Q4) ____ verifies who has the right to gain access to the computer, whether it is your local machine or the Web server.

A) Authorization

B) Authentication

C) Access

D) Encryption

Q5) Explain what a denial-of-service attack is, including the terms DDOS and zombie army in your response.

Q6) Provide at least five examples of ways in which you can protect yourself from online threats.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Introduction to High-Level Language Programming

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39632

Sample Questions

Q1) What question should a feasibility study address, and what are some of the possible answers?

Q2) Ada, Java, C++ and C# require a ____ to terminate an executable program statement.

A) semicolon

B) period

C) blank space

D) comma

Q3) In assembly language, the programmer must take a microscopic view of a task, breaking it down into tiny subtasks at the level of what is going on in individual ____.

A) memory locations

B) programs

C) subtasks

D) tasks

Q4) Newer languages such as Java and C# were developed specifically to run on a variety of hardware platforms without the need for a separate ____________________ for each type of machine.

Q5) What is the purpose of the feasibility study?

Q6) Define coding.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: The Tower of Babel

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39633

Sample Questions

Q1) ____ was originally designed for systems programming, in particular for writing the operating system UNIX.

A) COBOL

B) C

C) Python

D) Java

Q2) There are multiple programming languages not so much because there are tasks that one programming language cannot do but because each programming language was designed to meet specific needs.

A)True

B)False

Q3) FORTRAN does not allow the use of external libraries.

A)True

B)False

Q4) ____ is the FORTRAN implementation of "input."

A) FETCH

B) GET

C) READ

D) INPUT

Q5) With what is SQL designed to be used?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Compilers and Language Translation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39634

Sample Questions

Q1) List three possible local optimizations.

Q2) A(n) ____ is a compiler embedded with a collection of supporting software. A) debugger

B) reusable code library

C) visual development library

D) integrated development environment

Q3) What does this BNF rule say?

&lt;addition operator&gt; ::= +

Q4) Online debuggers help programmers locate and correct errors in programs. A)True B)False

Q5) Regardless of which programming language is being analyzed, every scanner performs virtually the same set of operations. What are they?

Q6) ____________________ for high-level languages like C++ or Java are very large.

Q7) <u>Parsing</u> is the first phase of the compilation process. A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Q8) Present what each individual BNF rule looks like, and briefly explain its components.

Chapter 12: Models of Computation

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/39635

Sample Questions

Q1) The ____ states that if there exists an algorithm to do a symbol manipulation task, then there exists a Turing machine to do that task.

A) Church-Turing thesis

B) Church-Alan theorem

C) Church-Zimmerman thesis

D) Alan-Zimmerman thesis

Q2) The ____ thesis can never be proved because the definition of an algorithm is descriptive, not mathematical.

A) Church-Zimmerman

B) Church-Turing

C) Church-Alan

D) Alan-Zimmerman

Q3) The symbols for a Turing machine must come from a finite set of symbols called the tape ____.

A) alphabet

B) placeholder

C) blank

D) palette

Q4) Explain how a Turing machine differs in scale from any real computing agent.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Simulation and Modeling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39636

Sample Questions

Q1) We can experiment on the model and use these results to understand the behavior of the actual system.

A)True

B)False

Q2) A ____ is a representation of the system being studied, which we claim behaves much like the original.

A) problem

B) concept

C) replica

D) model

Q3) What is the difference between computer graphics and scientific visualization?

Q4) ____ is concerned with how to visually display a large data set in a way that is most helpful to users and that maximizes its comprehension.

A) Scientific visualization

B) Computer graphics

C) Engineering graphics

D) Scientific graphics

Q5) Which advantage of simulation models makes computational modeling a particularly attractive tool for designing totally new systems?

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Electronic Commerce and Databases

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39637

Sample Questions

Q1) A ____ gives the user, or the user's application software, the ability to combine and manipulate data easily in ways that would be very difficult if the data were kept in separate and unrelated files.

A) file

B) database

C) datastore

D) data system

Q2) Each record in a file contains information about an item in the "universe of discourse" that the file describes.

A)True

B)False

Q3) What, in detail, is cybersquatting?

Q4) Transmission of Web pages between a client and server is <u>stateless</u>.

A)True

B)False

Q5) What is typosquatting?

Q6) How do you manage a relational table?

Q7) Explain what distributed databases allow.

Page 17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Artificial Intelligence

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39638

Sample Questions

Q1) A(n) ____ attempts to mimic the human ability to engage pertinent facts and string them together in a logical fashion to reach some conclusion.

A) inference engine

B) back propagation system

C) intelligent agent

D) rule-based system

Q2) Computers fall below humans where there seems to be a high level of complexity and perhaps approximation or ambiguity.

A)True

B)False

Q3) The term ____ means "method of assertion."

A) QED

B) forward chaining

C) knowledge engineering

D) modus ponens

Q4) A robot must not only gather sensory information, but filter out the possibly vast amount of data its surroundings might present to it.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: Computer Graphics and Entertainment: Movies, Games,

and Virtual Communities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39639

Sample Questions

Q1) With a GPU, all imaging responsibilities are offloaded from the GPU to the CPU.

A)True

B)False

Q2) ____ games allow a large number of players, often thousands or tens of thousands, to interact, form groups, and compete against one another within a simulated virtual world.

A) MMPRG

B) MMRPG

C) MMORG

D) MMOG

Q3) Using computers for entertainment had by the late 1970s become an important, not to mention financially lucrative, industry and that growth has continued unabated.

A)True

B)False

Q4) How are graphics operations handled in the absence of a GPU?

Q5) What is rigid motion, and what are the types of rigid motion?

Q6) In 1952, a UNIVAC I cost $12 million.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: Making Decisions About Computers,

Information, and Society

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/39640

Sample Questions

Q1) Using the utilitarians' criterion requires <u>subjective</u> judgments.

A)True

B)False

Q2) A fundamental question in ____________________ is what criteria to use when "measuring" the rightness or wrongness of a particular act.

Q3) In ____, the Fraunhofer Institute patented MP3 in Germany, and a few years later MP3 became an international standard.

A) 1989

B) 1999

C) 2000

D) 2002

Q4) Some people view hackers as social gadflies, people who raise important, but irritating, questions about society.

A)True

B)False

Q5) What is Anonymous? What are its best-known actions?

Q6) Define cyberbullying.

20

Q7) What are the components of the "hacker ethic" described in the text?

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook