Deck 11: Computers

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is the best definition of digital information?

A)Information that is stored on a computer
B)Information that is stored as discrete data
C)Information that is accessible online
D)Information that can be read from a computer screen
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not an advantage that LCD monitors have over CRT monitors?

A)They are cheaper.
B)They take up less space.
C)The screens are perfectly flat.
D)The image isn't distorted near the edges.
سؤال
Where does the term floppy disk come from?

A)The fact that the data can be changed easily
B)The fact that the encoding protocol is considered sloppy by some
C)The fact that the disks used to be bendable
D)The fact that they go between computers, i.e. flip flop
سؤال
What is random about random access memory (RAM)?

A)It begins looking for data randomly.
B)It stores data in a random place.
C)Its actual total capacity is somewhat random.
D)It isn't literally random, but it can access any data point at any time.
سؤال
What role does the BIOS play?

A)The BIOS loads the operating system.
B)The BIOS mediates between the operating system and the computer.
C)The BIOS mediates between the operating system and the user.
D)The BIOS is a backup in case the operating system fails.
سؤال
What is the main disadvantage of backwards compatibility?

A)Older programs aren't as good as new ones.
B)Old programs may run, but they often run badly.
C)Systems that are backwards compatible must be more complex.
D)Old programs and new programs often have runtime conflicts.
سؤال
What is Moore's law?

A)Processing speed will double every two years.
B)Memory cost will halve every 18 months.
C)Computer power will triple every five years.
D)Computer access will go up ten percent every year.
سؤال
What would happen if you ran a computer without a graphics card?

A)The computer wouldn't be able to play videos.
B)The computer wouldn't be able to render 3D graphics.
C)The system would slow down a great deal.
D)There would be no image.
سؤال
Which of the following is not an example of malware?

A)A computer virus
B)Trojan horses
C)A hacker accessing your system
D)Adware
سؤال
Which of the following processes is not controlled by the operating system?

A)Process management
B)Maintaining interoperability
C)File management
D)Memory management
سؤال
Which is not an example of an algorithm?

A)Software documentation
B)A cooking recipe
C)A computer program
D)Standard cryptographic attacks
سؤال
Which of the following algorithms is the least complex?

A)Dynamic programming
B)The greedy method
C)Search and enumeration
D)Exhaustive search
سؤال
How does prototyping work in software engineering?

A)A shorter, simpler version is designed as a proof of concept.
B)Software is written to solve easier problems of a similar type.
C)A rough, approximate version is designed quickly as a proof of concept.
D)The prototype is only the logic of the program, not the code.
سؤال
Why is C considered to be a low-level programming language?

A)It gives the programmer direct control over memory and hardware.
B)It is usually learned early in a programmer's education.
C)It is not as powerful as some other languages.
D)It is only useful for simple tasks.
سؤال
In object-oriented programming, what is an object?

A)Any data set that the program will operate on
B)A function that the program can call on
C)A piece of hardware that the program must interact with
D)A data set or field along with its associated methods
سؤال
Which of the following is a major advantage of cloud computing?

A)Programs are easier to design for cloud computing.
B)Resources are used more efficiently.
C)Cloud computing is inherently more secure.
D)Programs use less processing power when running on the cloud.
سؤال
What is the difference between an algorithm and a protocol?

A)Algorithms say what needs to be done; protocols also say who is responsible for doing it.
B)Protocols do not necessarily solve problems.
C)Protocols always involve more than one actor.
D)Protocols are specifically used in software engineering.
سؤال
Does modern encryption rely more heavily on private key or public key encryption?

A)Public key encryption
B)Private key encryption
C)A combination of public and private key encryption
D)Neither technique is used much anymore
سؤال
Why is the JPEG format considered to be lossy?

A)It loses data during data compression.
B)The file marker is easy to lose.
C)The encoding can be lost, making the picture useless.
D)Lossy is programming jargon referring to the algorithms that JPEG uses.
سؤال
What determines the maximum size of an Ethernet network?

A)There is no maximum size.
B)The maximum size depends on the strength of the transmitter.
C)The maximum size is limited by the collision domain.
D)The maximum size is limited by the server's processing power.
سؤال
What computer network is generally considered to be the origin of the Internet?

A)ARPANET
B)FTP
C)HTTP
D)The World Wide Web
سؤال
What agency is responsible for regulating IP addresses?

A)WWW
B)ICANN
C)Each company is responsible for maintaining its own IP address.
D)The job is split between regional registries.
سؤال
What open-source software?

A)Software that is available free of charge
B)Software that was developed by a non-profit organization
C)Software that can work on any operating system
D)Software with freely available source code
سؤال
What is the main disadvantage of relational databases?

A)The relationships between datasets must be known.
B)Data tags must be determined in advance.
C)They restrict the possible uses of the database.
D)There is redundant data.
سؤال
What activity reduces huge amounts of data to smaller sets of meaningful, usable data?

A)Data mining
B)Data silos
C)Data warehousing
D)SQL querying
سؤال
In terms of online security, what is re-identification?

A)Validating a user's identity before granting access to secure content
B)Validating a user's identity throughout a secure session
C)Requiring a user to log back in after a session has expired
D)Determining a user's actual identity from anonymous information
سؤال
What is error encoding?

A)A form of copy protection that intentionally creates errors to prove authenticity
B)Code that corrects errors that occur during routine operation
C)Errors made when writing data to memory
D)Mistakes made when writing a computer program
سؤال
What is a white-hat hacker?

A)White-hat hackers are security experts who do not break the law.
B)White-hat hackers expose security vulnerabilities so that they can be corrected.
C)White-hat hackers are hackers who work for the government.
D)White-hat hackers are programmers who track down cybercriminals.
سؤال
Which of the following might be included in a document's metadata?

A)The date of creation
B)The number of times the document has been accessed
C)The usernames of everyone who has accessed the document
D)All of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Computers
1
Which of the following is the best definition of digital information?

A)Information that is stored on a computer
B)Information that is stored as discrete data
C)Information that is accessible online
D)Information that can be read from a computer screen
Information that is stored as discrete data
2
Which of the following is not an advantage that LCD monitors have over CRT monitors?

A)They are cheaper.
B)They take up less space.
C)The screens are perfectly flat.
D)The image isn't distorted near the edges.
They are cheaper.
3
Where does the term floppy disk come from?

A)The fact that the data can be changed easily
B)The fact that the encoding protocol is considered sloppy by some
C)The fact that the disks used to be bendable
D)The fact that they go between computers, i.e. flip flop
The fact that the disks used to be bendable
4
What is random about random access memory (RAM)?

A)It begins looking for data randomly.
B)It stores data in a random place.
C)Its actual total capacity is somewhat random.
D)It isn't literally random, but it can access any data point at any time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
5
What role does the BIOS play?

A)The BIOS loads the operating system.
B)The BIOS mediates between the operating system and the computer.
C)The BIOS mediates between the operating system and the user.
D)The BIOS is a backup in case the operating system fails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the main disadvantage of backwards compatibility?

A)Older programs aren't as good as new ones.
B)Old programs may run, but they often run badly.
C)Systems that are backwards compatible must be more complex.
D)Old programs and new programs often have runtime conflicts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is Moore's law?

A)Processing speed will double every two years.
B)Memory cost will halve every 18 months.
C)Computer power will triple every five years.
D)Computer access will go up ten percent every year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
8
What would happen if you ran a computer without a graphics card?

A)The computer wouldn't be able to play videos.
B)The computer wouldn't be able to render 3D graphics.
C)The system would slow down a great deal.
D)There would be no image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not an example of malware?

A)A computer virus
B)Trojan horses
C)A hacker accessing your system
D)Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following processes is not controlled by the operating system?

A)Process management
B)Maintaining interoperability
C)File management
D)Memory management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which is not an example of an algorithm?

A)Software documentation
B)A cooking recipe
C)A computer program
D)Standard cryptographic attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following algorithms is the least complex?

A)Dynamic programming
B)The greedy method
C)Search and enumeration
D)Exhaustive search
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
13
How does prototyping work in software engineering?

A)A shorter, simpler version is designed as a proof of concept.
B)Software is written to solve easier problems of a similar type.
C)A rough, approximate version is designed quickly as a proof of concept.
D)The prototype is only the logic of the program, not the code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
14
Why is C considered to be a low-level programming language?

A)It gives the programmer direct control over memory and hardware.
B)It is usually learned early in a programmer's education.
C)It is not as powerful as some other languages.
D)It is only useful for simple tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
15
In object-oriented programming, what is an object?

A)Any data set that the program will operate on
B)A function that the program can call on
C)A piece of hardware that the program must interact with
D)A data set or field along with its associated methods
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is a major advantage of cloud computing?

A)Programs are easier to design for cloud computing.
B)Resources are used more efficiently.
C)Cloud computing is inherently more secure.
D)Programs use less processing power when running on the cloud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is the difference between an algorithm and a protocol?

A)Algorithms say what needs to be done; protocols also say who is responsible for doing it.
B)Protocols do not necessarily solve problems.
C)Protocols always involve more than one actor.
D)Protocols are specifically used in software engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
18
Does modern encryption rely more heavily on private key or public key encryption?

A)Public key encryption
B)Private key encryption
C)A combination of public and private key encryption
D)Neither technique is used much anymore
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
19
Why is the JPEG format considered to be lossy?

A)It loses data during data compression.
B)The file marker is easy to lose.
C)The encoding can be lost, making the picture useless.
D)Lossy is programming jargon referring to the algorithms that JPEG uses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
20
What determines the maximum size of an Ethernet network?

A)There is no maximum size.
B)The maximum size depends on the strength of the transmitter.
C)The maximum size is limited by the collision domain.
D)The maximum size is limited by the server's processing power.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
21
What computer network is generally considered to be the origin of the Internet?

A)ARPANET
B)FTP
C)HTTP
D)The World Wide Web
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
22
What agency is responsible for regulating IP addresses?

A)WWW
B)ICANN
C)Each company is responsible for maintaining its own IP address.
D)The job is split between regional registries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
23
What open-source software?

A)Software that is available free of charge
B)Software that was developed by a non-profit organization
C)Software that can work on any operating system
D)Software with freely available source code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the main disadvantage of relational databases?

A)The relationships between datasets must be known.
B)Data tags must be determined in advance.
C)They restrict the possible uses of the database.
D)There is redundant data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
25
What activity reduces huge amounts of data to smaller sets of meaningful, usable data?

A)Data mining
B)Data silos
C)Data warehousing
D)SQL querying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
26
In terms of online security, what is re-identification?

A)Validating a user's identity before granting access to secure content
B)Validating a user's identity throughout a secure session
C)Requiring a user to log back in after a session has expired
D)Determining a user's actual identity from anonymous information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is error encoding?

A)A form of copy protection that intentionally creates errors to prove authenticity
B)Code that corrects errors that occur during routine operation
C)Errors made when writing data to memory
D)Mistakes made when writing a computer program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is a white-hat hacker?

A)White-hat hackers are security experts who do not break the law.
B)White-hat hackers expose security vulnerabilities so that they can be corrected.
C)White-hat hackers are hackers who work for the government.
D)White-hat hackers are programmers who track down cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following might be included in a document's metadata?

A)The date of creation
B)The number of times the document has been accessed
C)The usernames of everyone who has accessed the document
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.