Будь умным!


У вас вопросы?
У нас ответы:) SamZan.net

Which of the following sttements is re true 1

Работа добавлена на сайт samzan.net:

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 24.11.2024

Certification Exam SSD2 (1)

Please complete this assessment by Wed Dec 02 2009 15:01:02 GMT+0600.

1.Which of the following statements is (are) true?

 1. Examples of the kinds of output a computer can accept

include temperatures from a thermostat, audio signals from

a microphone, and instructions from a computer program.

 2. A computer can be defined by its ability to accept

input, process data, store data, and produce output, all

according to a set of instructions from a computer program.

(a) I and II

(b) None

(c) II only

(d) I only

2. Information transferred to a computer from an external source

such as a mouse or keyboard is known as

(a) hardware

(b) software

(c) input

(d) output

3. Which of the following is (are) true regarding computer input?

 1. Input can be supplied to a computer by another computer.

2. Input can be supplied to a computer by the environment.

(a) None

(b) I only

(c) I and II

(d) II only

4. Which of the following statements is (are) true?

1. A hard disk drive is usually mounted inside

the computer's system unit.

  2. A small external light indicates when a hard

disk drive is reading or writing data.

(a) I and II

(b) None

(c) I only

(d) II only

5. Which of the following statements is (are) true?

1. Today's videogame consoles contain microprocessors that

are similar to processors found in fast personal computers.

  2. Today, it is rare for a computer to use a microprocessor

as its CPU.

(a) None

(b) II only

(c) I and II

(d) I only

6. Which of the following is (are) true regarding computer output?

1. Documents and reports are examples of computer output.

  2. An output device transforms the gathered input into a

series of electronic signals for the computer.

(a) I and II

(b) None

(c) II only

(d) I only

7. Systems of computer software that can simulate three-dimensional

environments include which of the following?

1. Movie-making software

  2. Video-gaming software

  3. Animation-design software

(a) II only

(b) II and III only

(c) I and III only

(d) I, II, and III

8. Which of the following is (are) true regarding the abacus?

1. It uses gears to perform calculations.

  2. It uses punched cards to store information.

  3. It has beads that represent the quantities 1, 5, 10, etc.

(a) I only

(b) II and III only

(c) III only

(d) I and II only

9.

Which of the following is (are) true of transistors?

1. They are typically smaller than vacuum tubes.

  2. They are generally more expensive than vacuum tubes.

  3. They are typically more reliable than vacuum tubes.

(a) I and II only

(b) II and III only

(c) I and III only

(d) I , II, and III

10. Thin slices of silicon packed with thousands of microscopic

circuit elements are known as  

(a) vacuum tubes

(b) transistors

(c) punched cards

(d) microchips

11.  Applications that manage and track raw components,

their usage in the manufacturing process, and delivery

of finished products are known as _____ software.  

(a) virtual reality

(b) project management

(c) customer relations

(d) supply chain management

12. Which of the following companies offers service as its

primary product?

(a) IBM

(b) Intel

(c) Microsoft

(d) AOL

13.

Computers represent numeric data using the _____ number system.

 (a) ASCII

(b) binary

(c) analog

(d) digital

14.The 1s and 0s that a digital device works with are referred

to as _____ digits.

 (a) binary

(b) analog

(c) master

(d) index

15.  

Which of the following statements regarding RAM is (are) true?

 1. Hard drive capacity is usually larger than RAM capacity.

  2. RAM is typically a single chip or circuit board that

plugs into the motherboard.

(a) None

(b) I only

(c) I and II

(d) II only

16. Which of the following statements regarding microprocessors

is (are) true?

  1. A modern microprocessor is about the size of a finger nail.

  2. A microprocessor is easy to identify inside a personal

computer, as it is the only chip on the motherboard.

(a) None

(b) II only

(c) I and II

(d) I only

17. The number of bits that a microprocessor can manipulate at

one time is its _____ size.

(a) word

(b) register

(c) processor

(d) ALU

18. The ALU uses _____ to hold data that is being processed.

(a) control units

(b) cache

(c) registers

(d) words

19. The _____ speed specifications in computer ads indicate

the speed of the microprocessor.

(a) register

(b) clock

(c) cache

(d) control unit

20. Which of the following statements regarding microprocessors is

(are) true?

1. Microprocessor word size refers to the number of bits that

can be manipulated at one time.

  2. A 1-gigahertz microprocessor executes 1 million cycles per

second.

(a) I and II

(b) II only

(c) None

(d) I only

21. Cathode-ray-tube computer monitors use _____ color mixing,

whereas color printers typically use _____ color mixing.  

(a) ROY, BIV

(b) BIV, ROY

(c) CMYK, RGB

(d) RGB, CMYK

22. Graphics cards, sound cards, and Ethernet cards are

typically connected to a PC via  

(a) USB

(b) FireWire

(c) parallel ports

(d) expansion slots

23. Which of the following specifies the maximum number

of horizontal and vertical pixels displayed on a computer monitor?

(a) Color depth

(b) Dot pitch

(c) Bit depth

(d) Resolution

24.  

The width of a computer bus is typically measured in  

(a) pixels

(b) bits

(c) bytes per second

(d) hertz

25. Printer resolution is measured in terms of  

(a) dots per inch

(b) pixels

(c) dot pitch

(d) millimeters

26. Data is typically transferred between the disk controller

and storage devices by the _____ bus.  

(a) front side

(b) AGP

(c) memory

(d) IDE

27. Advantages of floppy disks over hard disks include which of

the following?

1. Faster access times

  2. Easy to carry from one computer to another

  3. Lower cost per byte of storage

(a) I, II, and III

(b) I and II only

(c) II only

(d) II and III only

28. Examples of optical storage include which of the following?

  1. CD-ROM disks

  2. CD-RW disks

  3. DVD-ROM disks

(a) I and II only

(b) II and III only

(c) I, II, and III

(d) I and III only

29. Which of the following is (are) true regarding data transfer

rates of storage devices?

 1. Sequential-access devices have faster transfer rates

than random-access devices.

  2. A device with 50 ms access time is faster than a device

with 10 ms access time.

(a) I and II

(b) None

(c) I only

(d) II only

30. Which of the following is (are) true regarding removable

optical and magnetic media?

1. Optical media are generally more durable than magnetic

media.

  2. Optical media generally have a lower cost per megabyte

of storage when compared to magnetic media.

(a) I and II

(b) None

(c) II only

(d) I only

31.

Which of the following is (are) true regarding hard disks?

 1. Data on hard disks is stored as volatile electric charges.

  2. Personal computers typically have more RAM than hard drive

capacity.

  3. Accessing data on a hard disk is faster than accessing data

in RAM.

(a) II and III only

(b) None

(c) I only

(d) I and III only

32. Which of the following is (are) true regarding DVDs?

1. They can have tracks on both sides of the disk.

  2. They can have two layers of tracks on one side of the disk.

(a) None

(b) II only

(c) I and II

(d) I only

33. Which of the following is the term for a step in a process

that takes a much longer time to complete than do other steps

in the process, thus reducing overall performance?

(a) Latency

(b) Backup

(c) A bottleneck

(d) A benchmark

34. Use of which of the following can help identify the

bottlenecks in a computer system?

(a) A cache

(b) Bandwidth

(c) Benchmarks

(d) Bus speed

35.

The heart of the operating system that performs

the functions that are most crucial for keeping everything

running is the

(a) user interface

(b) kernel

(c) API

(d) BIOS

36. The helper program that the operating system uses to

communicate with a specific model of a device is known as the

(a) device driver

(b) user interface

(c) kernel

(d) BIOS

37. The BIOS resides in a _____ chip on the motherboard.

(a) ROM

(b) RAM

(c) SDRAM

(d) CMOS

38. Which Windows operating system utility can be used to see

what processes are currently running?

(a) Device Manager

(b) Add/Remove Programs

(c) Task Manager

(d) Disk Defragmenter

39. Which of the following is a signal to the processor

that some event has occurred that requires immediate attention?

(a) A process

(b) A driver

(c) A kernel

(d) An interrupt

40. A Windows utility called _____ can be used to view information

on the drivers and resources that pieces of hardware are using.

(a) Device Manager

(b) Disk Defragmenter

(c) Driver Manager

(d) Task Manager

41. In Windows, to adjust display properties such as resolution

or color scheme, the user right-clicks on an empty spot of

the desktop and clicks _____ on the shortcut menu.

(a) Refresh

(b) Properties

(c) New

(d) Configure

42. Which of the following occurs when the computer's hardware

is requested to do something that it cannot do, such as access

a nonexistent memory location?

(a) An IRQ

(b) A fault

(c) A nested interrupt

(d) A trap

43. In a file-sharing system, access to files by various users

is controlled by

(a) virtual memory

(b) spooling

(c) page tables

(d) ACLs

44. In a virtual memory system, memory is divided into chunks called

(a) clusters

(b) pages

(c) blocks

(d) segments

45. Which of the following statements regarding file sizes is (are)

true?

 1. The more bits used by a file the smaller the file size.

  2. Operating systems typically keep track of file size

information.

(a) None

(b) I and II

(c) I only

(d) II only

46. The operating system uses a _____ system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.

(a) naming

(b) file

(c) tracking

(d) storage

47. The formatting process creates the equivalent of electronic storage bins by dividing a disk into

(a) valleys

(b) pits

(c) tracks

(d) pods

48.

Which of the following statements regarding subdirectories is (are) true?

 1. Windows subdirectories are depicted as folders because they operate similar to folders in a filing cabinet, storing an assortment of related items.

  2. Rather than storing them in subdirectories, data files should be stored in the root directory.

(a) II only

(b) None

(c) I and II

(d) I only

49.

A file of machine-language instructions that is executable is called _____ code.

(a) object

(b) interpreted

(c) source

(d) assembly

50.

A file that is opened in order to begin execution of a computer program is a(n) _____ file.

(a) active

(b) interpreter

(c) compiler

(d) executable

51. The method of using an interpreter to convert high-level instructions into machine language while the program is running is common with Web-based programs called

(a) modules

(b) scripts

(c) Javadocs

(d) batch codes

52.

A program that is stored in ROM and contains the instructions needed by the operating system to load the kernel into memory is called the _____ program.

(a) bootstrap

(b) energizer

(c) loader

(d) core

53. An interface that features menus and icons that can be manipulated with a mouse is a(n) _____ interface.

(a) command line

(b) button

(c) graphical

(d) workstation

54.

The combination of hardware and software that enables computer users to provide input to and receive output from their computers is called a

(a) user control panel

(b) computer reference facility

(c) user interface

(d) computer montage

55.

The mechanism used by a computer to ensure that all keyboard strokes are properly recorded, regardless of how fast a user may type, is a keyboard

(a) buffer

(b) GUI

(c) interpreter

(d) index

56. Which of the following filenames would be listed by the DOS command dir c*.txt?

1. cat.txt

  2. c.txt

 3. cat.doc

(a) I and II only

(b) I only

(c) II only

(d) I, II, and III

57.

Consider the following DOS Help entry.

 DEL [drive:][path]filename [/P]

The items enclosed within square brackets are _____ parts of the command.

(a) literal

(b) required

(c) optional

(d) repeatable

58.

Consider the following DOS command.

dir /w c:\

The c:\ is known as a(n)

(a) wildcard

(b) pipe

(c) argument

(d) switch

59.

Consider the following DOS command.

dir | more

Linking the output of the dir command to the input of the more command as shown above is known as

 (a) piping

(b) batching

(c) redirection

(d) argument

60.

The smallest unit of meaningful information in a database is a

(a) record

(b) structure

(c) definition

(d) field

61.

Of the following database models, which is simplest?

(a) Hierarchical

(b) Relational

(c) Object-oriented

(d) Network

62.

A data file that contains records each of which has the same type is called a _____ file.

(a) flat

(b) cardinal

(c) level

(d) fundamental

63.

A programming language that allows the programmer to use instructions that resemble human language is said to be a(n) _____ language.

(a) fundamental

(b) high-level

(c) ordinary

(d) low-level

64. In a software engineering project, the people who focus on the software components of the system to be constructed are called the software

(a) coders

(b) engineers

(c) analysts

(d) managers

65. A series of steps performed manually that mimic the steps the computer would perform in executing an algorithm, using realistic data, is called a(n) _____ of the algorithm.

(a) walkthrough

(b) assessment

(c) codification

(d) objectification

66. In a software engineering project, the people who plan the entire system to be constructed are called the system

(a) engineers

(b) programmers

(c) managers

(d) analysts

67. A conversion system called _____ enables digital photos, sounds, and other media to be represented as ASCII text that can travel over the Internet as email attachments.

(a) IMAP

(b) MIME

(c) SMTP

(d) POP

68. Accessing email from a POP server requires email _____ software.

(a) client

(b) management

(c) resource

(d) forwarding

69. Consider the following URL.

  http://www.carnegietech.org

In the URL, "www.carnegietech.org" is the

(a) folder name

(b) Web server name

(c) filename

(d) protocol standard

70. Consider the following URL.

http://www.carnegietech.org

In the URL, "http" is the

(a) Web server name

(b) folder name

(c) filename

(d) protocol standard

71. Which of the following is (are) true regarding protocols used over the Internet?

 1. The Post Office Protocol transfers mail from an e-mail server to a client inbox.

  2. The Internet Mail Access Protocol transfers e-mail messages from client computers to an e-mail server.

(a) I only

(b) I and II

(c) None

(d) II only

72. Which of the following statements about client-server systems is (are) true?

 1. Both the client and the server can be software programs.

  2. The client runs on the user's computer and interacts with both the user and the server.

(a) II only

(b) I only

(c) None

(d) I and II

73. Which of the following is an example (are examples) of a client-server system?

1. The World Wide Web

  2. Email

  3. Usenet News

(a) I and III only

(b) I and II only

(c) II and III only

(d) I, II, and III

74. A widely used email client program is

(a) Access

(b) Outlook

(c) Apache

(d) Excel

75. Which of the following is (are) true regarding STP and UTP cables?

1. Twisted pairs of STP cables are encased with a foil shield, while twisted pairs of UTP cables contain no such shielding.

  2. UTP is more expensive than STP, but offers greater protection against noise interference.

(a) None

(b) II only

(c) I and II

(d) I only

76. Which of the following is (are) true regarding network devices?

 1. A hub is a device that connects several nodes of a local area network.

  2. A router is a device that is connected to more than one network and makes decisions regarding the best route for data.

  3. A repeater is a device that amplifies and regenerates signals so that they can retain the necessary strength to reach their destinations.

(a) II and III only

(b) I and III only

(c) I, II, and III

(d) I and II only

77. Which of the following is (are) true regarding the use of cable television connections to provide Internet access?

 1. An Ethernet card and a cable modem are required to access the Internet over a cable television system.

  2. The connection speed of a cable television connection depends on the current amount of traffic over the CATV cables.

(a) I only

(b) I and II

(c) None

(d) II only

78. What is the maximum number of units of information that can be conveyed using 10 bits?

(a) 20

(b) 10

(c) 100

(d) 1024

79. Which of the following means of connecting to the Internet uses (use) standard copper telephone lines?

 1. 56 Kbps modems

 2. Cable modems

  3. xDSL

(a) III only

(b) I and III only

(c) I and II only

(d) I, II, and III

80. How many bytes long is an IP address?

(a) Eight

(b) Two

(c) Six

(d) Four

81. A device to connect two or more networks is known as a(n)

(a) DNS server

(b) router

(c) domain

(d) NIC

82. Which of the following is a layer of protocol on top of IP that guarantees that packets will be received in the same order they were sent and that none will be lost?

(a) DNS

(b) Ethernet

(c) TRACERT

(d) TCP

83. What system is used to translate domain names to IP addresses?

(a) TCP

(b) Routers

(c) DNS

(d) ISP

84. An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.  

(a) cracking

(b) brute force

(c) social engineering

(d) spoofing

85. Home computers are generally vulnerable to security threats for which of the following reasons?

 1. Cable modem networks and wireless networks can be eavesdropped on.

  2. Many home computers are not securely configured.

  3. Many home users would not detect that their computer's security has been breached.

(a) II and III only

(b) I and III only

(c) I and II only

(d) I, II, and III

86. Intruders can gain information about a computer system by which of the following means?

1. Creating an excessive amount of network traffic

  2. Capturing network packets

  3. Asking users for information

(a) I and II only

(b) II only

(c) II and III only

(d) I, II, and III

87. Modification of network packets by intruders to make the packets appear to be coming from inside a private network is an example of a _____ attack.  

(a) brute force

(b) cracking

(c) spoofing

(d) social engineering

88. A miniature program that contains legitimate instructions to automate document and spreadsheet production is known as a(n)

(a) macro

(b) automator

(c) instruction set

(d) dynamic program

89. Which of the following is (are) true regarding the use of the signature-search technique for virus detection?

1. This is the technique used by most of today's anti-virus software.

  2. This technique can even detect viruses whose signature is unknown when the technique is first applied.

(a) I only

(b) None

(c) I and II

(d) II only

90. The identification of individuals based on their physiological or behavioral characteristics is known as _____ identification.  

(a) SSL

(b) digital-signature

(c) digital-identifier

(d) biometric

91. Which of the following URLs make(s) use of the SSL protocol?

 1. http://abc.com/ssl/def.htm

  2. https://ghi.com/jkl.html

  3. https://mno.co.in/pqr/stu.jsp

(a) I, II, and III

(b) II and III only

(c) II only

(d) I and III only

92. The set of all possible keys for an encryption algorithm is known as its  

(a) cryptography factor

(b) cipher count

(c) keyspace

(d) brute force

93. Features used for identification in biometrics include which of the following?

 1. Fingerprints

  2. Name

  3. Voice

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III

94. Which of the following is (are) true regarding digital signatures?

  1. Digitally signing a message automatically encrypts the message.

  2. Senders use their private key to create the digital signature, while receivers use the sender's public key to decrypt the digital signature.

(a) I and II

(b) I only

(c) II only

(d) None

95. Which of the following is (are) true regarding the use of writable optical disks as backup devices?

1. Writable optical disks provide good storage capacities and are quite inexpensive.

  2. The speed of writing is very fast for writable optical disks.

(a) I only

(b) None

(c) II only

(d) I and II

96. Functions of network monitoring systems include which of the following?

 1. Analyzing network packets and decoding the analyzed data

  2. Testing the availability of network services

  3. Notifying system administrators regarding network problems

(a) I and III only

(b) I, II, and III

(c) II and III only

(d) I and II only

97. Which of the following is (are) true regarding computer intrusion detection systems?

 1. Malicious packets cannot easily circumvent them.

  2. Little or no security and configuration knowledge is necessary for setting up an intrusion detection system.

(a) II only

(b) None

(c) I and II

(d) I only

98. Which of the following is (are) true regarding computer intrusion detection systems?

 1. They are capable of tracing each step of an attack.

  2. Their effectiveness depends upon the strength of their signature database.

(a) None

(b) I only

(c) I and II

(d) II only

99. Assume that a full backup is taken on Saturdays and an incremental backup is taken on all other days of the week. If a disk crash occurs on Thursday, which of the following backup disks would be needed for restoration?

1. The full backup disk taken the last Saturday before the crash

2. The incremental backup disk taken on Wednesday (the day before the crash)

3. The incremental backup disks taken on Sunday, Monday, and Tuesday

(a) II and III only

(b) I only

(c) I, II, and III

(d) I and II only

100. Which of the following is (are) true regarding computer security?

1. Extreme computer security measures may adversely affect the functionality of the computer.

  2. Using antivirus software and installing a firewall can keep a computer safe from all intrusions.

  3. Most intrusions result from virus attacks or known vulnerabilities that could be prevented by keeping the operating system and applications updated.

(a) I, II, and III

(b) I and II only

(c) I and III only

(d) II and III only




1. і Б~л дипломды~ жобада NEC 78KOR-KG3 о~узертханалы~ стендіне ба~дарламалы~ кешен ж~не методикалы~ н~с~аулы~тар
2. Классификация налогов
3. Исследование устойчивости систем регулирования с помощью алгебраических критериев Рауса, Гурвица и Льенара-Шипара
4. Задание 1.1 Были ли предпосылки маркетинговой деятельности в первобытнообщинном строе Почему Возмо
5. темам 22 Дерево интерфейса 2
6. ХРИСТИАНСТВО И ПСИХОЛОГИЯ ЛЕКЦИИ
7. Капиталы решили остаться в России
8. ВАРИАНТ 1 Где располагается центр голода dв латеральных ядрах гипоталамуса 2
9. Призначення котельної установки
10. Основы туризма Определение туризма туриста
11. техническим потенциалом инфраструктурой социальной сферой продукция и услуги которых экспортируются за п
12. Тема 2. Межличностные отношения и общение
13. педагогического исследования Оглавление [1] Оглавление [2] ВВЕДЕНИЕ
14. Virtul memory технология управления памятью ЭВМ разработанная для многозадачных операционных систем
15. Договор лизинга.html
16. 6 ЕЮ Мелешкина Самарская область входит в число десяти наиболее развитых регионов России около 80 ее н
17. ЛЕКЦИЯ 1 Я попытаюсь рассказать вам историю философии как историю некой единой хотя и растянувшейся во в
18. за значительной зависимости результатов агропромышленного производства и связанных с ним отраслей от пог
19. Задание на типовой расчет Красноярск 2012 Содержан
20. Тема- Государство и права древнего востока План- Возникновение и общие черты развития древних вост