亚洲精品自慰成人无码三级片|伊人乱码一区一站|美女黄片免费在线观看|手机在线观看无码片子|中文字幕日本强奸|91大神无码六月婷国产|日韩一区二区三区激情精品|亚洲成人网日韩有码|欧美日韩精品一区二区三区视频播放|Av在线收看日韩无天操
Computer Knowledge Assessment
This exam covers all topics from the provided material. Questions and options are randomly ordered. Please answer all questions in English.
1. Basic Information
Name:
Department:
Employee ID:
2. The binary system consists of only two digits: 0 or 1, called a:
bit
motherboard
power supply
memory
3. This controls communications for the entire computer system with every component within the system unit connecting to it.
motherboard
circuits
chips
processors
4. The number of times the CPU can fetch and process data or instructions in one second is known as its:
clock speed
bus
frequency rate
cycle rate
5. These chips hold the program (sequence of instructions) and data that the CPU is presently processing.
RAM
Flash
card
ROM
6. These chips have information stored in them that cannot be changed by the user.
ROM
card
flash
RAM
7. The expansion card that is used to connect a computer to a network.
Network interface
modem
LAN
converter
8. The number of bits that can travel simultaneously down a bus is known as the:
bus width
digital width
slate distance
byte path
9. A socket for external devices to connect to the system unit.
port
dock
chip
slot
10. Keyboard that does not have a physical keyboard, but has the keys displayed on a screen.
virtual
thumb
notebook
traditional
11. This mouse emits and senses light to detect mouse movements.
optical
dynamic
cordless
mechanical
12. A penlike device commonly used with tablets and PMs.
stylus
pointer
joystick
nothing stick
13. A type of reader that interprets encoded information from credit and debit cards.
card
bank
master
charge
14. Often used to score standardized multiple-choice tests, this device senses the presence or absence of a mark, such as a pencil mark.
OMR
CRT
MFD
OWR
15. This indicates a monitor's ability to display colors.
contrast ratio
dot pitch
resolution
aspect ratio
16. The most common LCD display in which each pixel is independently activated producing a high quality and energy efficient image.
TFT-LCD
LED
CRT
AMOLED
17. Using a technology similar to that used in a photocopying machine, this printer employs a light beam to produce images with excellent letter and graphics quality.
laser
dot-matrix
photo
thermal
18. This device typically combines the capabilities of a scanner, printer, fax, and copy machine.
MFD
laser
dot-matrix
LFT
19. This Internet telephone service provides free domestic calling, supports video as well as audio, and does not require any special equipment.
Skype
Vonage
MagicJack
Ooma
20. The concept related to using computer networks to link people and resources.
connectivity
GPS
Wi-Fi
TCP/IP
21. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.
coaxial
hi def
twisted pair
3-D
22. A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet.
Bluetooth
TCP/IP
broadband
DSL
23. The speed with which a modem transmits data is called its:
transfer rate
dynamic rate
modular rating
digital velocity
24. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
broadband
medium band
voiceband
baseband
25. Every computer on the Internet has a unique numeric address called a(n):
IP address
DNS
packet
broadcast
26. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
NIC
server
PCMCLA
VPN
27. A device that allows one LAN to be linked to other LANs or to larger networks. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.
hotspot
PAN
IDS
network gateway
28. Bus, ring, star, tree, and mesh are five types of network.
topologies
LANs
extranets
hotspots
29. Electronic systems that transmit data from one location to another.
communication systems
devices
topologies
protocols
30. Which system is responsible for translating domain names into IP addresses?
DNS
delivery systems
VPS
communication systems
31. The range of Wi-Fi networks is being extended over greater distances using this new technology.
WMax
TCP/IP
infrared
PAN
32. This wireless technology is sometimes referred to as line-of-sight communication because the light waves can only travel in a straight line.
infrared
Wi-Fi
satellite
microwave
33. This generation of mobile telecommunications started in the 2000s providing services capable of effective connectivity to the Internet and marked the beginning of smartphones.
3G
4G
2G
1G
34. The capacity of a communication channel is measured by its.
bandwidth
bus width
server capacity
density
35. A specialized server that manages resources, such as user accounts, for an entire network.
directory server
peer server
node server
client server
36. Operating systems that control and coordinate the activities of all computers and other devices on a network.
NOS
Windows
BIOS
network utility
37. This type of network spans up to 100 miles and is often used to connect office buildings that are located throughout a city.
MAN
WAN
PAN
LAN
38. The network topology in which each device is connected directly to a central network switch.
star
tree
ring
mesh
39. Security hardware and software that control access to a company’s intranet and other internal networks is called a(n).
firewall
client
proxy
NIC
40. RAM is sometimes referred to as.
primary storage
secondary storage disk
read only memory
random access memory
41. The actual physical material that holds the data and programs.
storage media
sectors
density
cylinders
42. Measures how tightly these charges can be packed next to one another on the disk.
density
crash
land
pit
43. When a read/write head makes contact with the hard disk’s surface, it causes a head.
crash
file compression
disk-caching
file decompression
44. This hard-disk performance enhancement anticipates data needs.
disk caching
dynamic video disc
file decompression
RAID
45. This type of storage uses pits and lands to represent 1s and 0s.
optical disc
optical drives
flash drives
universal state bus
46. DVD stands for.
digital versatile disc
digital video disc
dynamic video disc
dynamic versatile disc
47. USB drives are also known as.
flash drives
optical drives
universal state bus
ports
48. An organizational strategy to promote efficient and safe use of data across the networks.
enterprise storage system
cloud
ports
dynamic
49. A mass storage device that provides access to data archived on tapes.
tape library
RAID
file system
MAS
50. This type of storage provides only temporary or volatile storage.
RAM
ROM
world state
DVD-RW
51. A characteristic of secondary storage that measures how much a particular storage medium can hold.
capacity
media
volume
flash
52. This type of storage uses rigid metallic platters that are stacked one on top of another.
hard disk
optical disk
cloud disk
cache
53. Improves hard disk performance connecting several inexpensive hard disk drives together.
RAID
disk caching
CPU-RAM
CPU-RM
54. Improves hard disk performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
disk caching
CPU-RAM
CPU-RM
CPU-RW
55. This type of optical disc provides access to data but cannot be written on.
CD-ROM
CD-RW
DVD-RAM
hi def
56. The next generation of optical disc that provides the greatest capacity is called.
Blu-ray
hi def
DVD-RW
CD-RW
57. Small solid-state storage devices widely used within smartphones, digital media players, and GPS navigation systems are called.
flash memory cards
SSDs
USB drives
flash drives
58. Another name for cloud storage is.
online storage
USB storage
optical storage
solid state storage
59. Dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data are known as.
file servers
RAID systems
Blu-ray servers
NAS
60. Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that data.
access
security
property
accuracy
61. What is the illegal assumption of someone's identity for the purposes of economic gain called?
identity theft
fraud
scanning
nonitory transmission
關(guān)閉
更多問卷
復(fù)制此問卷