亚洲精品自慰成人无码三级片|伊人乱码一区一站|美女黄片免费在线观看|手机在线观看无码片子|中文字幕日本强奸|91大神无码六月婷国产|日韩一区二区三区激情精品|亚洲成人网日韩有码|欧美日韩精品一区二区三区视频播放|Av在线收看日韩无天操

Computer Knowledge Assessment

This exam covers all topics from the provided material. Questions and options are randomly ordered. Please answer all questions in English.
1. Basic Information
Name:
Department:
Employee ID:
2. The binary system consists of only two digits: 0 or 1, called a:
3. This controls communications for the entire computer system with every component within the system unit connecting to it.
4. The number of times the CPU can fetch and process data or instructions in one second is known as its:
5. These chips hold the program (sequence of instructions) and data that the CPU is presently processing.
6. These chips have information stored in them that cannot be changed by the user.
7. The expansion card that is used to connect a computer to a network.
8. The number of bits that can travel simultaneously down a bus is known as the:
9. A socket for external devices to connect to the system unit.
10. Keyboard that does not have a physical keyboard, but has the keys displayed on a screen.
11. This mouse emits and senses light to detect mouse movements.
12. A penlike device commonly used with tablets and PMs.
13. A type of reader that interprets encoded information from credit and debit cards.
14. Often used to score standardized multiple-choice tests, this device senses the presence or absence of a mark, such as a pencil mark.
15. This indicates a monitor's ability to display colors.
16. The most common LCD display in which each pixel is independently activated producing a high quality and energy efficient image.
17. Using a technology similar to that used in a photocopying machine, this printer employs a light beam to produce images with excellent letter and graphics quality.
18. This device typically combines the capabilities of a scanner, printer, fax, and copy machine.
19. This Internet telephone service provides free domestic calling, supports video as well as audio, and does not require any special equipment.
20. The concept related to using computer networks to link people and resources.
21. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.
22. A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet.
23. The speed with which a modem transmits data is called its:
24. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
25. Every computer on the Internet has a unique numeric address called a(n):
26. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
27. A device that allows one LAN to be linked to other LANs or to larger networks. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.
28. Bus, ring, star, tree, and mesh are five types of network.
29. Electronic systems that transmit data from one location to another.
30. Which system is responsible for translating domain names into IP addresses?
31. The range of Wi-Fi networks is being extended over greater distances using this new technology.
32. This wireless technology is sometimes referred to as line-of-sight communication because the light waves can only travel in a straight line.
33. This generation of mobile telecommunications started in the 2000s providing services capable of effective connectivity to the Internet and marked the beginning of smartphones.
34. The capacity of a communication channel is measured by its.
35. A specialized server that manages resources, such as user accounts, for an entire network.
36. Operating systems that control and coordinate the activities of all computers and other devices on a network.
37. This type of network spans up to 100 miles and is often used to connect office buildings that are located throughout a city.
38. The network topology in which each device is connected directly to a central network switch.
39. Security hardware and software that control access to a company’s intranet and other internal networks is called a(n).
40. RAM is sometimes referred to as.
41. The actual physical material that holds the data and programs.
42. Measures how tightly these charges can be packed next to one another on the disk.
43. When a read/write head makes contact with the hard disk’s surface, it causes a head.
44. This hard-disk performance enhancement anticipates data needs.
45. This type of storage uses pits and lands to represent 1s and 0s.
46. DVD stands for.
47. USB drives are also known as.
48. An organizational strategy to promote efficient and safe use of data across the networks.
49. A mass storage device that provides access to data archived on tapes.
50. This type of storage provides only temporary or volatile storage.
51. A characteristic of secondary storage that measures how much a particular storage medium can hold.
52. This type of storage uses rigid metallic platters that are stacked one on top of another.
53. Improves hard disk performance connecting several inexpensive hard disk drives together.
54. Improves hard disk performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
55. This type of optical disc provides access to data but cannot be written on.
56. The next generation of optical disc that provides the greatest capacity is called.
57. Small solid-state storage devices widely used within smartphones, digital media players, and GPS navigation systems are called.
58. Another name for cloud storage is.
59. Dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data are known as.
60. Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that data.
61. What is the illegal assumption of someone's identity for the purposes of economic gain called?
更多問卷 復(fù)制此問卷