Поможем написать учебную работу
Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.
Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.
Certification Exam SSD2 (1)
Please complete this assessment by Wed Dec 02 2009 15:01:02 GMT+0600.
1.Which of the following statements is (are) true?
1. Examples of the kinds of output a computer can accept
include temperatures from a thermostat, audio signals from
a microphone, and instructions from a computer program.
2. A computer can be defined by its ability to accept
input, process data, store data, and produce output, all
according to a set of instructions from a computer program.
(a) I and II
(b) None
(c) II only
(d) I only
2. Information transferred to a computer from an external source
such as a mouse or keyboard is known as
(a) hardware
(b) software
(c) input
(d) output
3. Which of the following is (are) true regarding computer input?
1. Input can be supplied to a computer by another computer.
2. Input can be supplied to a computer by the environment.
(a) None
(b) I only
(c) I and II
(d) II only
4. Which of the following statements is (are) true?
1. A hard disk drive is usually mounted inside
the computer's system unit.
2. A small external light indicates when a hard
disk drive is reading or writing data.
(a) I and II
(b) None
(c) I only
(d) II only
5. Which of the following statements is (are) true?
1. Today's videogame consoles contain microprocessors that
are similar to processors found in fast personal computers.
2. Today, it is rare for a computer to use a microprocessor
as its CPU.
(a) None
(b) II only
(c) I and II
(d) I only
6. Which of the following is (are) true regarding computer output?
1. Documents and reports are examples of computer output.
2. An output device transforms the gathered input into a
series of electronic signals for the computer.
(a) I and II
(b) None
(c) II only
(d) I only
7. Systems of computer software that can simulate three-dimensional
environments include which of the following?
1. Movie-making software
2. Video-gaming software
3. Animation-design software
(a) II only
(b) II and III only
(c) I and III only
(d) I, II, and III
8. Which of the following is (are) true regarding the abacus?
1. It uses gears to perform calculations.
2. It uses punched cards to store information.
3. It has beads that represent the quantities 1, 5, 10, etc.
(a) I only
(b) II and III only
(c) III only
(d) I and II only
9.
Which of the following is (are) true of transistors?
1. They are typically smaller than vacuum tubes.
2. They are generally more expensive than vacuum tubes.
3. They are typically more reliable than vacuum tubes.
(a) I and II only
(b) II and III only
(c) I and III only
(d) I , II, and III
10. Thin slices of silicon packed with thousands of microscopic
circuit elements are known as
(a) vacuum tubes
(b) transistors
(c) punched cards
(d) microchips
11. Applications that manage and track raw components,
their usage in the manufacturing process, and delivery
of finished products are known as _____ software.
(a) virtual reality
(b) project management
(c) customer relations
(d) supply chain management
12. Which of the following companies offers service as its
primary product?
(a) IBM
(b) Intel
(c) Microsoft
(d) AOL
13.
Computers represent numeric data using the _____ number system.
(a) ASCII
(b) binary
(c) analog
(d) digital
14.The 1s and 0s that a digital device works with are referred
to as _____ digits.
(a) binary
(b) analog
(c) master
(d) index
15.
Which of the following statements regarding RAM is (are) true?
1. Hard drive capacity is usually larger than RAM capacity.
2. RAM is typically a single chip or circuit board that
plugs into the motherboard.
(a) None
(b) I only
(c) I and II
(d) II only
16. Which of the following statements regarding microprocessors
is (are) true?
1. A modern microprocessor is about the size of a finger nail.
2. A microprocessor is easy to identify inside a personal
computer, as it is the only chip on the motherboard.
(a) None
(b) II only
(c) I and II
(d) I only
17. The number of bits that a microprocessor can manipulate at
one time is its _____ size.
(a) word
(b) register
(c) processor
(d) ALU
18. The ALU uses _____ to hold data that is being processed.
(a) control units
(b) cache
(c) registers
(d) words
19. The _____ speed specifications in computer ads indicate
the speed of the microprocessor.
(a) register
(b) clock
(c) cache
(d) control unit
20. Which of the following statements regarding microprocessors is
(are) true?
1. Microprocessor word size refers to the number of bits that
can be manipulated at one time.
2. A 1-gigahertz microprocessor executes 1 million cycles per
second.
(a) I and II
(b) II only
(c) None
(d) I only
21. Cathode-ray-tube computer monitors use _____ color mixing,
whereas color printers typically use _____ color mixing.
(a) ROY, BIV
(b) BIV, ROY
(c) CMYK, RGB
(d) RGB, CMYK
22. Graphics cards, sound cards, and Ethernet cards are
typically connected to a PC via
(a) USB
(b) FireWire
(c) parallel ports
(d) expansion slots
23. Which of the following specifies the maximum number
of horizontal and vertical pixels displayed on a computer monitor?
(a) Color depth
(b) Dot pitch
(c) Bit depth
(d) Resolution
24.
The width of a computer bus is typically measured in
(a) pixels
(b) bits
(c) bytes per second
(d) hertz
25. Printer resolution is measured in terms of
(a) dots per inch
(b) pixels
(c) dot pitch
(d) millimeters
26. Data is typically transferred between the disk controller
and storage devices by the _____ bus.
(a) front side
(b) AGP
(c) memory
(d) IDE
27. Advantages of floppy disks over hard disks include which of
the following?
1. Faster access times
2. Easy to carry from one computer to another
3. Lower cost per byte of storage
(a) I, II, and III
(b) I and II only
(c) II only
(d) II and III only
28. Examples of optical storage include which of the following?
1. CD-ROM disks
2. CD-RW disks
3. DVD-ROM disks
(a) I and II only
(b) II and III only
(c) I, II, and III
(d) I and III only
29. Which of the following is (are) true regarding data transfer
rates of storage devices?
1. Sequential-access devices have faster transfer rates
than random-access devices.
2. A device with 50 ms access time is faster than a device
with 10 ms access time.
(a) I and II
(b) None
(c) I only
(d) II only
30. Which of the following is (are) true regarding removable
optical and magnetic media?
1. Optical media are generally more durable than magnetic
media.
2. Optical media generally have a lower cost per megabyte
of storage when compared to magnetic media.
(a) I and II
(b) None
(c) II only
(d) I only
31.
Which of the following is (are) true regarding hard disks?
1. Data on hard disks is stored as volatile electric charges.
2. Personal computers typically have more RAM than hard drive
capacity.
3. Accessing data on a hard disk is faster than accessing data
in RAM.
(a) II and III only
(b) None
(c) I only
(d) I and III only
32. Which of the following is (are) true regarding DVDs?
1. They can have tracks on both sides of the disk.
2. They can have two layers of tracks on one side of the disk.
(a) None
(b) II only
(c) I and II
(d) I only
33. Which of the following is the term for a step in a process
that takes a much longer time to complete than do other steps
in the process, thus reducing overall performance?
(a) Latency
(b) Backup
(c) A bottleneck
(d) A benchmark
34. Use of which of the following can help identify the
bottlenecks in a computer system?
(a) A cache
(b) Bandwidth
(c) Benchmarks
(d) Bus speed
35.
The heart of the operating system that performs
the functions that are most crucial for keeping everything
running is the
(a) user interface
(b) kernel
(c) API
(d) BIOS
36. The helper program that the operating system uses to
communicate with a specific model of a device is known as the
(a) device driver
(b) user interface
(c) kernel
(d) BIOS
37. The BIOS resides in a _____ chip on the motherboard.
(a) ROM
(b) RAM
(c) SDRAM
(d) CMOS
38. Which Windows operating system utility can be used to see
what processes are currently running?
(a) Device Manager
(b) Add/Remove Programs
(c) Task Manager
(d) Disk Defragmenter
39. Which of the following is a signal to the processor
that some event has occurred that requires immediate attention?
(a) A process
(b) A driver
(c) A kernel
(d) An interrupt
40. A Windows utility called _____ can be used to view information
on the drivers and resources that pieces of hardware are using.
(a) Device Manager
(b) Disk Defragmenter
(c) Driver Manager
(d) Task Manager
41. In Windows, to adjust display properties such as resolution
or color scheme, the user right-clicks on an empty spot of
the desktop and clicks _____ on the shortcut menu.
(a) Refresh
(b) Properties
(c) New
(d) Configure
42. Which of the following occurs when the computer's hardware
is requested to do something that it cannot do, such as access
a nonexistent memory location?
(a) An IRQ
(b) A fault
(c) A nested interrupt
(d) A trap
43. In a file-sharing system, access to files by various users
is controlled by
(a) virtual memory
(b) spooling
(c) page tables
(d) ACLs
44. In a virtual memory system, memory is divided into chunks called
(a) clusters
(b) pages
(c) blocks
(d) segments
45. Which of the following statements regarding file sizes is (are)
true?
1. The more bits used by a file the smaller the file size.
2. Operating systems typically keep track of file size
information.
(a) None
(b) I and II
(c) I only
(d) II only
46. The operating system uses a _____ system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.
(a) naming
(b) file
(c) tracking
(d) storage
47. The formatting process creates the equivalent of electronic storage bins by dividing a disk into
(a) valleys
(b) pits
(c) tracks
(d) pods
48.
Which of the following statements regarding subdirectories is (are) true?
1. Windows subdirectories are depicted as folders because they operate similar to folders in a filing cabinet, storing an assortment of related items.
2. Rather than storing them in subdirectories, data files should be stored in the root directory.
(a) II only
(b) None
(c) I and II
(d) I only
49.
A file of machine-language instructions that is executable is called _____ code.
(a) object
(b) interpreted
(c) source
(d) assembly
50.
A file that is opened in order to begin execution of a computer program is a(n) _____ file.
(a) active
(b) interpreter
(c) compiler
(d) executable
51. The method of using an interpreter to convert high-level instructions into machine language while the program is running is common with Web-based programs called
(a) modules
(b) scripts
(c) Javadocs
(d) batch codes
52.
A program that is stored in ROM and contains the instructions needed by the operating system to load the kernel into memory is called the _____ program.
(a) bootstrap
(b) energizer
(c) loader
(d) core
53. An interface that features menus and icons that can be manipulated with a mouse is a(n) _____ interface.
(a) command line
(b) button
(c) graphical
(d) workstation
54.
The combination of hardware and software that enables computer users to provide input to and receive output from their computers is called a
(a) user control panel
(b) computer reference facility
(c) user interface
(d) computer montage
55.
The mechanism used by a computer to ensure that all keyboard strokes are properly recorded, regardless of how fast a user may type, is a keyboard
(a) buffer
(b) GUI
(c) interpreter
(d) index
56. Which of the following filenames would be listed by the DOS command dir c*.txt?
1. cat.txt
2. c.txt
3. cat.doc
(a) I and II only
(b) I only
(c) II only
(d) I, II, and III
57.
Consider the following DOS Help entry.
DEL [drive:][path]filename [/P]
The items enclosed within square brackets are _____ parts of the command.
(a) literal
(b) required
(c) optional
(d) repeatable
58.
Consider the following DOS command.
dir /w c:\
The c:\ is known as a(n)
(a) wildcard
(b) pipe
(c) argument
(d) switch
59.
Consider the following DOS command.
dir | more
Linking the output of the dir command to the input of the more command as shown above is known as
(a) piping
(b) batching
(c) redirection
(d) argument
60.
The smallest unit of meaningful information in a database is a
(a) record
(b) structure
(c) definition
(d) field
61.
Of the following database models, which is simplest?
(a) Hierarchical
(b) Relational
(c) Object-oriented
(d) Network
62.
A data file that contains records each of which has the same type is called a _____ file.
(a) flat
(b) cardinal
(c) level
(d) fundamental
63.
A programming language that allows the programmer to use instructions that resemble human language is said to be a(n) _____ language.
(a) fundamental
(b) high-level
(c) ordinary
(d) low-level
64. In a software engineering project, the people who focus on the software components of the system to be constructed are called the software
(a) coders
(b) engineers
(c) analysts
(d) managers
65. A series of steps performed manually that mimic the steps the computer would perform in executing an algorithm, using realistic data, is called a(n) _____ of the algorithm.
(a) walkthrough
(b) assessment
(c) codification
(d) objectification
66. In a software engineering project, the people who plan the entire system to be constructed are called the system
(a) engineers
(b) programmers
(c) managers
(d) analysts
67. A conversion system called _____ enables digital photos, sounds, and other media to be represented as ASCII text that can travel over the Internet as email attachments.
(a) IMAP
(b) MIME
(c) SMTP
(d) POP
68. Accessing email from a POP server requires email _____ software.
(a) client
(b) management
(c) resource
(d) forwarding
69. Consider the following URL.
http://www.carnegietech.org
In the URL, "www.carnegietech.org" is the
(a) folder name
(b) Web server name
(c) filename
(d) protocol standard
70. Consider the following URL.
http://www.carnegietech.org
In the URL, "http" is the
(a) Web server name
(b) folder name
(c) filename
(d) protocol standard
71. Which of the following is (are) true regarding protocols used over the Internet?
1. The Post Office Protocol transfers mail from an e-mail server to a client inbox.
2. The Internet Mail Access Protocol transfers e-mail messages from client computers to an e-mail server.
(a) I only
(b) I and II
(c) None
(d) II only
72. Which of the following statements about client-server systems is (are) true?
1. Both the client and the server can be software programs.
2. The client runs on the user's computer and interacts with both the user and the server.
(a) II only
(b) I only
(c) None
(d) I and II
73. Which of the following is an example (are examples) of a client-server system?
1. The World Wide Web
2. Email
3. Usenet News
(a) I and III only
(b) I and II only
(c) II and III only
(d) I, II, and III
74. A widely used email client program is
(a) Access
(b) Outlook
(c) Apache
(d) Excel
75. Which of the following is (are) true regarding STP and UTP cables?
1. Twisted pairs of STP cables are encased with a foil shield, while twisted pairs of UTP cables contain no such shielding.
2. UTP is more expensive than STP, but offers greater protection against noise interference.
(a) None
(b) II only
(c) I and II
(d) I only
76. Which of the following is (are) true regarding network devices?
1. A hub is a device that connects several nodes of a local area network.
2. A router is a device that is connected to more than one network and makes decisions regarding the best route for data.
3. A repeater is a device that amplifies and regenerates signals so that they can retain the necessary strength to reach their destinations.
(a) II and III only
(b) I and III only
(c) I, II, and III
(d) I and II only
77. Which of the following is (are) true regarding the use of cable television connections to provide Internet access?
1. An Ethernet card and a cable modem are required to access the Internet over a cable television system.
2. The connection speed of a cable television connection depends on the current amount of traffic over the CATV cables.
(a) I only
(b) I and II
(c) None
(d) II only
78. What is the maximum number of units of information that can be conveyed using 10 bits?
(a) 20
(b) 10
(c) 100
(d) 1024
79. Which of the following means of connecting to the Internet uses (use) standard copper telephone lines?
1. 56 Kbps modems
2. Cable modems
3. xDSL
(a) III only
(b) I and III only
(c) I and II only
(d) I, II, and III
80. How many bytes long is an IP address?
(a) Eight
(b) Two
(c) Six
(d) Four
81. A device to connect two or more networks is known as a(n)
(a) DNS server
(b) router
(c) domain
(d) NIC
82. Which of the following is a layer of protocol on top of IP that guarantees that packets will be received in the same order they were sent and that none will be lost?
(a) DNS
(b) Ethernet
(c) TRACERT
(d) TCP
83. What system is used to translate domain names to IP addresses?
(a) TCP
(b) Routers
(c) DNS
(d) ISP
84. An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.
(a) cracking
(b) brute force
(c) social engineering
(d) spoofing
85. Home computers are generally vulnerable to security threats for which of the following reasons?
1. Cable modem networks and wireless networks can be eavesdropped on.
2. Many home computers are not securely configured.
3. Many home users would not detect that their computer's security has been breached.
(a) II and III only
(b) I and III only
(c) I and II only
(d) I, II, and III
86. Intruders can gain information about a computer system by which of the following means?
1. Creating an excessive amount of network traffic
2. Capturing network packets
3. Asking users for information
(a) I and II only
(b) II only
(c) II and III only
(d) I, II, and III
87. Modification of network packets by intruders to make the packets appear to be coming from inside a private network is an example of a _____ attack.
(a) brute force
(b) cracking
(c) spoofing
(d) social engineering
88. A miniature program that contains legitimate instructions to automate document and spreadsheet production is known as a(n)
(a) macro
(b) automator
(c) instruction set
(d) dynamic program
89. Which of the following is (are) true regarding the use of the signature-search technique for virus detection?
1. This is the technique used by most of today's anti-virus software.
2. This technique can even detect viruses whose signature is unknown when the technique is first applied.
(a) I only
(b) None
(c) I and II
(d) II only
90. The identification of individuals based on their physiological or behavioral characteristics is known as _____ identification.
(a) SSL
(b) digital-signature
(c) digital-identifier
(d) biometric
91. Which of the following URLs make(s) use of the SSL protocol?
1. http://abc.com/ssl/def.htm
2. https://ghi.com/jkl.html
3. https://mno.co.in/pqr/stu.jsp
(a) I, II, and III
(b) II and III only
(c) II only
(d) I and III only
92. The set of all possible keys for an encryption algorithm is known as its
(a) cryptography factor
(b) cipher count
(c) keyspace
(d) brute force
93. Features used for identification in biometrics include which of the following?
1. Fingerprints
2. Name
3. Voice
(a) I and II only
(b) II and III only
(c) I and III only
(d) I, II, and III
94. Which of the following is (are) true regarding digital signatures?
1. Digitally signing a message automatically encrypts the message.
2. Senders use their private key to create the digital signature, while receivers use the sender's public key to decrypt the digital signature.
(a) I and II
(b) I only
(c) II only
(d) None
95. Which of the following is (are) true regarding the use of writable optical disks as backup devices?
1. Writable optical disks provide good storage capacities and are quite inexpensive.
2. The speed of writing is very fast for writable optical disks.
(a) I only
(b) None
(c) II only
(d) I and II
96. Functions of network monitoring systems include which of the following?
1. Analyzing network packets and decoding the analyzed data
2. Testing the availability of network services
3. Notifying system administrators regarding network problems
(a) I and III only
(b) I, II, and III
(c) II and III only
(d) I and II only
97. Which of the following is (are) true regarding computer intrusion detection systems?
1. Malicious packets cannot easily circumvent them.
2. Little or no security and configuration knowledge is necessary for setting up an intrusion detection system.
(a) II only
(b) None
(c) I and II
(d) I only
98. Which of the following is (are) true regarding computer intrusion detection systems?
1. They are capable of tracing each step of an attack.
2. Their effectiveness depends upon the strength of their signature database.
(a) None
(b) I only
(c) I and II
(d) II only
99. Assume that a full backup is taken on Saturdays and an incremental backup is taken on all other days of the week. If a disk crash occurs on Thursday, which of the following backup disks would be needed for restoration?
1. The full backup disk taken the last Saturday before the crash
2. The incremental backup disk taken on Wednesday (the day before the crash)
3. The incremental backup disks taken on Sunday, Monday, and Tuesday
(a) II and III only
(b) I only
(c) I, II, and III
(d) I and II only
100. Which of the following is (are) true regarding computer security?
1. Extreme computer security measures may adversely affect the functionality of the computer.
2. Using antivirus software and installing a firewall can keep a computer safe from all intrusions.
3. Most intrusions result from virus attacks or known vulnerabilities that could be prevented by keeping the operating system and applications updated.
(a) I, II, and III
(b) I and II only
(c) I and III only
(d) II and III only