Home

Friday, June 29, 2012

ATEC sample examption Test

1.      A microphone and a scrolling track pad are examples of ______________. 
A.     Input Devices  
B.     Storage Devices  
C.     Output Devices  
D.     Communication Devices  

2.      A ____________ is a collection of computers and other devices that are connected together to share data, resources, hardware and software. 
A.     Mainframe  
B.     Cloud  
C.     Computer System  
D.     Network  
3.      ___________ is a technology that allows a processor to execute an instruction before it completes the previous instruction. 
A.     Serial Processing  
B.     Pipelining  
C.     Reduced Instruction Set Computing  
D.     Complex Instruction Set Computing  
4.      No matter the size, all computers can perform the following four general operations: 
A.     Process, Send, Receive, Reply  
B.     Input, Process, Output, Storage  
C.     Interface, Process, Display, Storage  
D.     Print, Send, Process, Display  
5.      On the motherboard, you would find the____________ which is known as the computer’s brain. 
A.     Primary storage unit  
B.     Central Processing Unit  
C.     Read Only Memory  
D.     Random Access Memory  
6.      _____________ is the capability of a computer to run two or more programs at the same time. 
A.     Mail Merge  
B.     Hyperthreading  
C.     Multitasking  
D.     Sequential Processing  
7.      Computers are generally classified and arranged according to size, speed, processing capabilities and price. In the below list, the proper order from smallest to largest is 
A.     Microcomputer, mainframe, minicomputer, supercomputer  
B.     Minicomputer, mainframe, supercomputer, microcomputer  
C.     Microcomputer, minicomputer, mainframe, supercomputer  
D.     Minicomputer, supercomputer, microcomputer, mainframe  
8.      This type of memory is known as ‘volatile memory’ since programs and data stored inside are deleted when the computer’s power is turned off. 
A.     Read Only Memory  
B.     Random Access Memory  
C.     Virtual Memory  
D.     DVDROM  
9.      The transmission medium that carries several channels at once, transporting high volumes of data at high speeds is called _____________. 

A.     WiFi  
B.     Broadband  
C.     WiMAX  
D.     Cat5
10.  __________is a language that uses a tag system of code to create pages that are interpreted by browsers and are displayed as the language instructs. 
A.     JavaScript  
B.     Internet Protocol  
C.     HTML  
D.     XML  
11.  ____________ is defined as the transmission capacity of a communications channel. 
A.     Packet switching  
B.     Bandwidth  
C.     Protocol  
D.     Megahertz  
12.  Which of the following is considered a legal issue? 
A.     Telemarketing  
B.     Allowing untested programs to be marketed to the public  
C.     Software piracy  
D.     Vaporware  

13.  A ___________ stores approximately 1 billion bytes while a ____________ stores approximately 1 trillion bytes. 
A.     Megabyte, Terabyte  
B.     Petabyte, Gigabyte  
C.     Kilobyte, Megabyte  
D.     Gigabyte, Terabyte  
14.  In a spreadsheet, the intersection of a row and a column is known as a ________. 
A.     Address  
B.     Box  
C.     Cell  
D.     Square  
15.  _____________ is where data and program instructions are while they are being processed. 
A.     The CPU  
B.     Read Only Memory  
C.     Random Access Memory  
D.     The Hard Drive 
16.  ______________ is defined as the time that it takes to find and retrieve data from different types of computer memory. 
A.     RAM  
B.     ROM  
C.     Megahertz (MHz)  
D.     Access speed  
17.  How many bits are in a byte? 
A.     18  
B.     6  
C.     8  
D.     28  
18.  Which of the following is an example of a web browser? 

A.     Google  
B.     Firefox  
C.     Bing  
D.     Windows Explorer  
19.  Collectively known as ____________, this provides more opportunities for collaboration, blogging, use of wikis, podcasts, and other sharing services. 
A.     Internet 2   
B.     WebEX  
C.     Web 2.0  
D.     The Internet  
20.  ____________ is a type of software that is designed to damage or infiltrate a computer system without the owner’s consent and can be extremely damaging or disruptive for the owner. 
A.     Adware  
B.     Spyware  
C.     Malware  
D.     All of the above  
21.  Which of the following Internet addresses would be for a business? 
A.     cancer.org  
B.     beekystoys.com  
C.     haverd.edu  
D.     army.mil  
22.  Most microcomputers use a type of interface which consists of icons, buttons and pull down menus and is called a __________________? 
A.     Browser  
B.     Graphical User Interface  
C.     Menu Driven Interface  
D.     Command Driven Interface  
23.  On a computer screen, the characters or graphics are constructed out of a matrix of small dots and form a pattern called
A.     Monitor resolution  
B.     Bitmap display  
C.     Characterbased display  
D.     Resolution
24.  Which of the following file extensions are for a graphic? 
A.     .BMP  
B.     .PNG  
C.     .GIF  
D.     All of the above are file extensions for graphics.  
25.  A __________ is used to protect data and to secure a computer network against unauthorized access, often a combination of letters, numbers and symbols 
A.     Primary key  
B.     User I.D.  
C.     Password  
D.     Log In  
26.  A ___________ license allows the user to use software on a single computer while a __________ license, priced at a flat rate, permits it to be used on any and all computers at a location.
A.     Site, Multiple User  
B.     Single User, Multiple User  
C.     Single User, Site  
D.     Site, Concurrent Use  
27.  To prevent physical damage to computer users, _______________ is a field of study which addresses the design of display devices, keyboards and workspaces ensuring comfort and safety. 
A.     Biometrics  
B.     Ergonomics  
C.     Reengineering  
D.     Ethics  
28.  Mobile devices including smartphones and basic cell phones have ________________________ capabilities as a result of the e911 mandate enabling emergency services personnel to pinpoint the location of the 911 caller. 
A.     Automatic callback  
B.     Global Positioning System  
C.     Location Signaling Beacon  
D.     Operator Assistance  
29.  Which of the following items in a microcomputer system is used for storing data long term? 
A.     Random Access Memory  
B.     Hard Drive  
C.     DVDROM or BDROM  
D.     Flash Drive 
30.  .These type of computers are small systems intended to be used by one person at a time, and includes desktops, laptops, tablets and hand held computers. 
A.     Midrange computers  
B.     Microcomputers  
C.     Mainframe computers  
D.     Minicomputers  
31.  Digital computers represent numerical data by using the: 
A.     Base 10 numbering system.  
B.     Hexadecimal numbering system.  
C.     Binary numbering system.  
D.     Base 8 numbering system.  
32.  Which of the following types of software would be best suited for organizing, sorting and retrieving information stored about a customer? 
A.     Word Processor  
B.     Spreadsheet  
C.     Database  
D.     Presentation Graphics  
33.  A collection of instructions that tells a computer what to do is called a ____________. 
A.     Software package  
B.     Program  
C.     Browser  
D.     Operation  
34.  Manipulating materials on an atomic or molecular scale in order to build microscopic devices is called ____________. 
A.     Microtechnology  
B.     Nanotechnology  
C.     Exotechnology  
D.     Hypertechnology  
35.  The____________ contains billions of electronic documents and enables millions of users to research, get advice and read about current events.
A.     Internet  
B.     World Wide Web  
C.     Uniform Resource Locator  
D.     Operating System 
36.  Software whether via a copy shared by a friend or via an online torrent sharing service is still illegally obtained and is called 
A.     Malware  
B.     Pirated Software  
C.     Shareware  
D.     Public Domain Software  
37.  Which of the following is largest in size? 
A.     Gigabyte  
B.     Petabyte  
C.     Terabyte  
D.     Megabyte  
 To regain disk performance after random access storage files have become fragmented and stored in nonadjacent clusters, you can perform a _______________ process to rearrange the clusters. 
A.     Backup  
B.     Archiving  
C.     Sequential access  
D.     Defragmentation 
38.  The path on which data travels to and from processor, memory and other ports is called ___________
A.     Bandwidth  
B.     Buses  
C.     Clusters  
D.     Expansion slots
39.  A computer’s operating system maintains a list of files which contains information such as the file name, date and time when created, and size. The list is called a _______________
A.     File specification  
B.     File extension  
C.     Directory  
D.     Operating list  
40.  A business, such as a national bank, with a highvolume of business transactions and paperwork would normally be processed using which type of computer? 
A.     Supercomputer  
B.     Mainframe computer  
C.     Desktop computer  
D.     Minicomputer  
41. 
42.  A website with the primary purpose of allowing a user to review, post and share their own videos online is called. 
A.     Google  
B.     YouTube  
C.     Pandora  
D.     FaceBook  
43.  _____________ is the term that refers to the physical components of a computer system such as input and output devices, storage devices and communication devices. 
A.     Software  
B.     Hardware  
C.     Information processing  
D.     Computer programs  
44.  An enormous and rapidly growing system of linked computer networks, worldwide in scope, which facilitates data communication services, file transfer, electronic mail and other services is called __________
A.     An intranet  
B.     The World Wide Web  
C.     The Internet  
D.     Internet 2  
45.  Federal and state legislators have passed a variety of laws since the _________, and include such items as the Computer Fraud and Abuse Act and the USA Patriot Act. 
A.     1960’s  
B.     1970’s  
C.     1980’s  
D.     1990’s  
46.  The language used by a computer to process all instructions is called__________. 
A.     JavaScript  
B.     Java  
C.     Machine language  
D.     UNIX  
47.  A single dot on a monitor display screen is called a ____________.
A.     Bitmap  
B.     Cursor  
C.     Matrix  
D.     Pixel  
48.  A ____________ grants select exclusive rights to the author of a computer program pertaining to copying, distributing, selling, and/or modifying the program. 
A.     Site License  
B.     Multiple User License  
C.     Copyright  
D.     Concurrent Use License  
49.  Primary storage is also called which of the following:
A.     Memory  
B.     Read Only Memory  
C.     Flash Drive  
D.     Hard Drive  
50.  The following organization would be a good candidate to possess a supercomputer
A.     A large research university  
B.     NASA  
C.     The Weather Channel  
D.     All of the above        
51.  Which of the following is an example of an optical storage device? 

A.     Biometric reader  
B.     BluRay Disk  
C.     Flash Drive  
D.     Hard Disk  
52.  A printer and a monitor are examples of 
A.     Input devices  
B.     Output devices  
C.     Storage devices  
D.     Communication devices
53.  A __________ is a simple Web page or collection of Web pages on which any visitor can post text, images read previous posts, change posted information and track earlier changes. The site usually requires a user to be registered. 
A.     Wiki  
B.     RSS Feed  
C.     Podcast  
D.     Hyperlink  
54.  ____________ programs can be used to determine if your computer usage and activities are being monitored by a hacker or another unauthorized individual. 
A.     Antivirus software  
B.     Antispy software  
C.     Antispoof software  
D.     Antiphish software  
55.  ____________ is a more recent phenomenon where users access their applications and information over the Internet resulting in a lesser powered machine being needed. 
A.     HyperNetworking  
B.     Cloud Computing  
C.     Virtual computer services  
D.     Neural Networking  
56.  The typical home or small business would have this category of computer:
A.     Minicomputer  
B.     Mainframe computers  
C.     Microcomputer  
D.     Supercomputer  
57.  A flash drive (or jump drive) and a DVD are examples of ______________. 
A.     Input Devices  
B.     Storage Devices  
C.     Output Devices  
D.     Communication Devices  

58.  The minimum hardware and operating software requirements needed for a software program to work correctly is usually listed on the outside of the software package and is referred to as the __________. 
A.     Multimedia requirements  
B.     Compatibility  
C.     System requirements  
D.     Interface requirements  
59.  This device uses laser light to read data on the medium 
A.     BDROM drive  
B.     CDROM drive  
C.     DVDROM drive  
D.     All of the Above  
60.  The number of bits that the central processing unit (CPU) can process at one time is called ________.
A.     Bus width  
B.     Clock Speed  
C.     Word Size  
D.     Megahertz  
61.  This type of application software would be best suited for creating a multimedia slide show that can be used as a visual aid for a speech or report. 
A.     Word Processor  
B.     Spreadsheet  
C.     Database  
D.     Presentation Graphics  
62.  This performs all the addition, subtraction, multiplication, division and data comparisons such as greater than, less than, or equal to other data.
A.     Control Unit  
B.     Cache  
C.     Arithmetic/Logic unit  
D.     Motherboard  
63.  If a user wanted to create sophisticated documents, photo editing or financial management, the user would likely do so on a ___________.
A.     Smart Phone  
B.     Mainframe Computer  
C.     Personal Computer  
D.     Supercomputer
64.  Called _________, this is a location where data can be left on a permanent basis when it is not needed for processing. 
A.     Input  
B.     Processor  
C.     Memory  
D.     Storage 
65.  This device converts signals from digital to analog and back so that data can travel over telephone lines to other computers. 
A.     Network  
B.     Modem  
C.     Hard Drive  
D.     CPU  
66.  This type of computer is designed to support a network of other computers in sharing data, application software, resources and hardware. 
A.     Workstation  
B.     Server  
C.     Netbook  
D.     Desktop 
67.  The system clock generates pulses at a fixed rate that synchronizes and controls the timing of all computer operations and is measured in _______________
A.     Bits  
B.     Seconds  
C.     Hertz  
D.     Bytes
68.  A web location where users can join groups set up by region, job, school or other item and they can invite and communicate with other users is called. 
A.     An intranet  
B.     A Social Network  
C.     A Wiki  
D.     A Web Page 
69.  Which of the following is not an example of an operating system: 
A.     Windows 7  
B.     Ubuntu  
C.     Mac OSX  
D.     D.  Mozilla Firefox   . 
70.  This type of cable uses light rather than electricity to transmit data between one or more computers and is called _________________
A.     Twisted pair wire  
B.     Copper wire  
C.     Fiber optic cable  
D.     Coaxial cable
71.  The following type of application software would typically be used to analyze a business decision by creating a model and graphically determining if the price should be raised or lowered.
A.     Word Processor  
B.     Spreadsheet  
C.     Database  
D.     Presentation Graphics 
72.  Software that is used most often to create text reports, resumes, letters, labels, envelopes or essays is called ____________. 
A.     Spreadsheet  
B.     Database  
C.     Word Processing  
D.     Presentation Graphics  
73.  Only two digits are used to represent data in the electronic circuits of a computer. The low voltage state is used to represent the digit 0, and a higher voltage state is used to represent the digit 1. Each one of these electronically represented digits is called a ________.
A.     Bit  
B.     Byte  
C.     Kilobyte  
D.     Minibyte  
74.  ________________________ is the most widely used encoding system in the US. It is used to represent 256 characters and symbols in most personal computers. 
A.     Unicode  
B.     ASCII  
C.     EBCDIC  
D.     SecurIT  
75.  Software that helps a computer carry out its basic operating functions such as moving data from one storage device to another, listing fields stored on a disk or displaying data in the screen and other functions is called ____________
A.  A utility  
B.  Application software  
C.  System software  
 D.  Operating software  

No comments:

Post a Comment