Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Test Review Lessons 3 and 4.

Similar presentations


Presentation on theme: "Computer Test Review Lessons 3 and 4."— Presentation transcript:

1 Computer Test Review Lessons 3 and 4

2 Adding random access memory is relatively simple because additional memory expansion cards fit easily into slots on the computer’s motherboard. True

3 A ____ is used to add memory or connect peripheral devices to a notebook computer.
hacker card b. modem clip c. PC card d. Mac disk c. PC card

4 The speed of the CPU, which is measured in megahertz, is determined by the system clock.
True

5 Graphical interfaces and ____ interfaces are the two most common types of user interfaces.
d. command-line information DOS operations d. command-line

6 In a GUI, ____ represent files, disks, programs, and other objects.
a. PCs b. symbols c. commands d. windows b. symbols

7 Unix is a type of utility program.
False

8 A digital camera is an example of a peripheral that connects to new computers with a ____ port.
Serial Fan MIDI USB d. USB

9 Which of the following is NOT a routine maintenance task for computer systems?
visual inspection checking deleting temporary files checking cables for wear b. checking

10 A PS/2 port is also sometimes called a camera port.
False

11 An alliance that was formed in 1993 to produce the PowerPC family of CPU chips included IBM, Motorola, and ____. Apple Walmart Honda Dell Apple

12 A file management program is an example of a utility program.
True

13 Install a(n) ____ to avoid losing data if the power goes off during a thunderstorm.
surge protector uninterruptible power source universal serial bus CD-ROM drive b. uninterruptible power source

14 ____ is software you can use on a trial basis before paying a registration fee.
Bundle Shareware Plug and play Freeware b. Shareware

15 With a graphical interface, you must type the exact command you wish to execute.
False

16 Adding or changing components of a computer to make it faster or more efficient is called ____.
maintaining upgrading operating troubleshooting b. upgrading

17 Windows 98 was the first version of Windows to integrate ____ into the operating system.
the Internet algorithms icons the monitor the Internet

18 The Windows operating system works with the Motorola processor.
False

19 A good source of help with computer problems is ____.
computer manuals support technicians a technical support telephone number all of the above d. all of the above

20 A ____ is a device that allows one computer to talk to another via a cable connection.
Scanner Mouse Modem USB port c. Modem

21 Regular visual inspection is an important part of routine maintenance for computer components.
True

22 How many bits of data can a serial port transmit at a time?
One Two Eight 12 million One

23 Software developers have had a tremendous impact on the history of computers.
True

24 IBM introduced its first IBM PC around ____.
1975 1980 1985 1990 b. 1980

25 Another word for "program" is "hardware."
False

26 Which is one of the most widely used command-line interfaces for microcomputers?
DOS RAM Visual Basic BASIC DOS

27 A command-line interface allows you to see files and disks represented as images you can select.
False

28 Systems software refers to the computer's ____ system.
computing operating applications productivity b. operating

29 Most hardware components available today are called park and play because they must be carefully positioned before using. False

30 When you turn on a computer, you ____ the system.
bug kick boot skip c. boot

31 A small computer system interface port found in many older computer models is more commonly called a(n) ____ port. d. SCSI MIDI parallel cable SCSI

32 It is not necessary to register new equipment to have access to technical support.
False

33 When you start your computer, the first action that the computer performs is ____.
BIOS CHKDSK ROM POST d. POST

34 Skilled computer users who invade computer systems and write virus programs are called ____.
bugs firewalls spikes hackers d. hackers

35 The Mac OS is not commonly used in conjunction with DOS.
True

36 Which of the following is NOT a utility program?
file recovery disk defragmentation antivirus calendar d. calendar

37 One computer can run a combination of operating systems.
True

38 Which statement about multitasking is true?
It prohibits multiple programs from running simultaneously. It is a character-based operating system. It manipulates programs that reside on the hard drive. It allows a single user to work on two programs at one time. d. It allows a single user to work on two programs at one time.

39 Increasing storage capacity or adding more memory are reasons for considering a computer upgrade.
True

40 An error in programming code is called a(n) ____.
syntax algorithm bug moth c. bug

41 Computers only understand ____, so programs written in programming languages must be translated before computers can use them. standard English machine language Visual Basic Mac OS b. machine language

42 Which of the following factors will damage removable storage media?
extreme temperatures magnetic fields touching the surface of the media all of the above d. all of the above

43 Computers with Windows operating systems often have Intel Pentium chips.
True

44 A ____ operating system allows a group of computers to be connected.
network system BIOS graphical network

45 The final step in the troubleshooting process should always be to ____.
contact a support technician avoid similar problems in the future clean the computer’s case check the cables b. avoid similar problems in the future

46 Which is NOT a category of systems software?
operating systems utilities multimedia language translators c. multimedia

47 Application software is developed for the end user.
True

48 The Macintosh computer was introduced in the ____.
a. 1960s b. 1970s c. 1980s d. 1990s c. 1980s

49 A peripheral device must be physically connected to the computer.
True

50 Analyzing computer problems to correct faults in the system is called ____.
maintenance fragmenting hacking troubleshooting d. troubleshooting

51 You should never try to replicate a computer problem when trying to solve the problem.
False


Download ppt "Computer Test Review Lessons 3 and 4."

Similar presentations


Ads by Google