Info Tech Tutorial Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

Multiple Choice

1. Automated bot accounts use social media


a. responsibly.
b. to help humans who are busy.
c. to manipulate opinion by posting news stories and quotes massive numbers of times.
d. in some countries but they are illegal in the U.S.
a.
2. The digital divide occurred because
a. the United States has the fastest Internet access.
b. not everyone has equal access to the Internet.
c. crowdfunding is increasing.
d. everyone now has a smartphone.
b.
3. Cognitive surplus means that we now find many people with
a. more money than free time.
b. limited access to the Internet.
c. mobile devices.
d. excess time and free tools for collaboration.
c.
4. Being computer literate means that you can
a. read about computers.
b. program in Java.
c. use Twitter.
d. use computers efficiently and safely.
d.
5. Collaborative consumption is when people get together to
a. find the best prices on products.
b. increase the use of a single product by sharing access to it.
c. fight diseases of the respiratory tract.
d. exchange reviews on services and goods they have purchased.

1. _________ is a branch of computer science that focuses on creating computer systems or


computer-controlled machines that have an ability to perform tasks usually associated with
human intelligence.
a. Computer literacy
e. Artificial intelligence
f. Natural language
g. Information technology
6. AI systems that help people discover things they may like but are unlikely to discover on their
own are known as
a. crowdsourcing systems.
b. Turing testers.
c. recommendation engines.
d. intelligent personal assistants.

7. A working definition of ethics is


a. impossible because it means different things to different people.
b. the laws of a given society.
c. the study of the general nature of morals and of the specific moral choices individuals
make.
d. the rules of conduct presented in Christian religions.

8. The set of formal or informal ethical principles you use to make decisions is your
a. mindset.
b. instinct.
c. personal ethics.
d. personality.

9. Digital forensics is the study of


a. digital art.
b. digital data that is evidence of a crime.
c. using data to predict stocks.
h. d. writings on the nature of the digital divide.

10. The crisis-mapping tool Ushahidi


a. prevents two-way dialog between people.
b. is only available in the United States.
c. shows that a free software product can have great value.
d. relies on people using their desktop computing power to help others.

11. Sophisticated modeling software is helping international researchers


a. create more intricate screenplays and movie scripts.
b. analyze computer systems to gather potential legal evidence.
c. market new types of products to a wider audience.
d. increase the pace of research in finding and producing vaccines.
1.

12. Which of the following would NOT impact the digital divide?
a. A decline in the price of internet access
b. Less sharing of the work we produce
c. Expansion of free Wi-Fi connectivity in major cities
d. Legislation allowing communications companies to charge per website for access

2. Crowdfunding sites include


Citi Bike and Zipcar.
a. Bing and Google.
b. Kickstarter and GoFundMe.
c. Facebook and Instagram

13. The sharing economy is exemplified by


a.Citi Bike and Zipcar.
b. Bing and Google.
c. Kickstarter and GoFundMe.
d. Amazon and Netflix.
2.
14. Being computer literate includes being able to
a. avoid spam, adware, and spyware.
b. use the web effectively.
c. diagnose and fix hardware and software problems.
d. all of the above

15. Unsupervised learning in an artificial training system improves


a. without being given specific data examples.
b. by using training data.
c. by using virtual reality scenarios.
d. by using augmented reality data.

16. Which of the following statements is FALSE?


a. Unethical behavior is always illegal.
b. Ethical decisions are usually influenced by personal ethics.
c. Individuals who have no sense of right or wrong exhibit amoral behavior.
d. Life experience affects an individual’s personal ethics.

17. Which of the following actions would NOT help to identify your personal ethics?
a. Describe yourself.
b. Conduct a genealogic study of your extended family.
c. Identify the influences of your work environment.
d. Prepare a list of values that are most important to you.

18. Intellectual property


a. is the result of someone’s creative work and design.
b. can be protected legally by the patent system.
c. can include works of music, film, or engineering design.
d. all of the above.

3. Intellectual property can be legally protected even though it is not a physical object.

4. The move toward access instead of ownership is a sign of cognitive surplus.


5.
6. Machine learning systems analyze patterns in data to improve their performance automatically.
7.
8. Web-based databases cannot be used to help investigators solve criminal cases.

9. Hactivism is different from cyberterrorism.

1. How technology is changing our cognitive processes.

2. What are some ways in which technology can make you provide impact as

students?

3. List four social networking tools and explain how they can enable you to

connect and exchange ideas.

4. How does one utilize technology in the healthcare system?

5. What are 4 disadvantages and advantages of modern technology in

comparison to ancient times?

6. Summarize how technology has impacted the way we choose and consume

products and services.


7. What are some of the factors affecting the digital devide

1. Define the Internet, and explain how it works.

2. Describe methods for accessing the Internet.

3. Differentiate between the Internet and the World Wide Web and describe the elements that
enable Web content to be displayed.

4. Describe several methods of finding information on the Web including the use of a URL, surfing,
conducting searches, and sharing with other Web users through RSS feeds, blogs, wikis, and
podcasts.

5. Identify features to look for when evaluating a Web site or its content.

6. List the most popular Internet services and explain what they do.

7. Describe the three types of e-commerce.

8. List the rules of netiquette.

9. List safe surfing procedures, and identify hazards of the Web.

Multiple Choice

1. Which statement is not true about the web?


a. The web was based on a protocol developed by Tim Berners-Lee.

b. Special links are used to navigate from page to page on the web.

c. The web is based on the WWW protocol.

d. The web is a subset of the Internet.

2. Which of the following describes an IP address?

a. It is referred to as a dotted quad.

b. It identifies any computer connecting to the Internet.

c. It identifies a website.

d. all of the above

3. Which type of social networking site would best describe LinkedIn?

a. business networking

b. social payment

c. social communication

d. media sharing

4. What web browser feature would be particularly useful when using public computers?

a. pinned tabs

b. privacy browsing

c. session restore

d. all of the above


5. In the URL http://www.whitehouse.gov/blog, which part is considered the top-level domain

name?

a. .gov

b. www.whitehouse.gov

c. http

d. /blog

6. Which of the following is not a component of a search engine?

a. spider

b. indexer program

c. search assistant

d. search engine software

7. Which of the following is NOT considered appropriate e-mail etiquette?

a. Avoiding text abbreviations such as LOL, u, and r

b. Adding a signature line that includes your contact information

c. Always using Reply to All when responding to e-mail sent to multiple people.

d. Including a meaningful subject in the subject line

8. Ensuring that website content is not slanted in its point of view is checking for:

a. Audience

b. Authority

c. Bias

9. Relevance
10. Which of the following is a good precaution to take when making online purchases?

a. use the same strong password for all online accounts

b. pay by debit card

c. make sure http: and an open padlock displays in the address bar

11. use a private browser when purchasing items from a public computer

12. Which of the following would NOT be a concern with relying completely on cloud

computing?

a. security and privacy of stored data and information

b. the collaborative nature of cloud-based applications

c. creating an offline back-up of critical documents

d. accessing files when Internet access is not available

True/False

___ 1. Deepfakes are mirror websites that are stored in the deep web.

Answer:

___ 2. Podcasts can only be created by professional organizations.

Answer:

___ 3. Conducting business with stores that have an online and physical presence is referred tgo as

C2C

Answer:
___ 4. The History feature of a browser enables you to retrace your browsing history over a short

period of time.

Answer:

____5. Google Docs is an example of cloud computing.

Answer:

True and False

1. The control unit in a personal computer interprets program instructions and


initiates control operations
2. The speed of a computer processor (CPU) is determine by the access time
3. The ROM and the RAM loses its contents when power is turn off.
4. A plotter and flatbed scanner are an example of an output device
5. The system boards allow user to add components and capabilities to a computer
system
06. SSD device is a faster and more durable alternative to the hard drive?
7 Resolution is the number of horizontal and vertical pixels in a display device
08 Most computers and electronic devices are analog, which uses only two discrete
states: on and off
09 The power supply unit of computers converts the wall outlet DC power into AC
power.
10 Each letter, number and character consisting of a series of eight 0s and 1s is
called a Bit
11 Machine Language is the “Natural language” of a particular computer It is
defined by the hardware design of that computer
12 OCR is a device that scans written or typed text and transforms it into computer
readable form.
13 What are the most important specifications you look for when buying a computer

Tutorial 5

Chapter 2

1.
Which of the following is the smallest unit of measure?
A) Megabyte
B) Gigabyte
C) Petabyte
D) Terabyte

2.
Apple's macOS and Microsoft Windows are examples of software.
A) utility
B) application
C) operating system
D) communication

3.
computers are specially designed computer chips that reside inside other devices, such as a
car.
A) Tablet
B) Desktop
C) Embedded
D) Netbook

4.
A keyboard and touch screen are the most common types of devices.
A) output
B) processing
C) input
D) storage

5.
The number of pixels displayed on the screen is known as the screen's .
A) contrast ratio
B) aspect ratio
C) brightness resolution
D) resolution

6. The most common type of monitor for laptops and desktop computers is a(n) .
A) liquid crystal display (LCD)
B) light-emitting diode (LED)
C) organic light-emitting diode (OLED)
D) cathode ray tube (CRT)

7.
The two main categories of home and office printers are and laser printers.
A) inkjet
B) large format
C) cloud-based
D) thermal

8.
Wireless modules provide connectivity to Wi-Fi networks.
A) video
B) network interface
C) sound
D) controller

9.
The computer stores currently running programs and data in .
A) ROM
B) CPU
C) RAM
D) USB

10.
Which of the following is not an example of nonvolatile storage?
A) Hard drive
B) Cloud storage
C) RAM
D) Flash drive

13. Dropbox is an example of .


A) SSD technology
B) cloud storage
C) optical storage
D) Bluetooth technology

CPU has two processing paths, allowing it to process more than one instruction at a time.
A) all-in-one
B) bimodal
C) dual-core
D) dual-mode
A

13. Which type of software distribution would NOT be hosted and accessed online?
i. Open source software
j. Software as a Service (SaaS)
k. Locally installed software
l. Subscription software

14. Beta software is never


a. system software.
b. the final finished version of the software.
c. open-source software.
d. application software.

15. Choosing which features of the software you want to install is what kind of installation?
m. Custom installation
n. Full installation
o. Restore installation
p. Single installation
16. Which type of software is not upgraded automatically?
q. Software as a Service
r. Mobile apps
s. Locally installed
t. Subscription based

17. Which best describes copyleft?


a. A single license covering a single user on a single device
b. A license that grants users the right to modify and redistribute the software
c. A license covering one user with multiple installations
d. A pirated license
18. Which type of productivity software would you most likely use to do calculations and what-if
analyses?
a. Database
b. Tax Preparation
c. Spreadsheet
d. Financial Planning

. The firmware is held in non-volatile memory


2. Primary storage is permanent while secondary storage is temporary
3 A machine cycle is a series of operation required to process a single machine
instruction
4. Firewall and Antivirus program are an example of a System software
5. A nanosecond is one millionth of a second
6. The main purpose of the disk defragmenter is to clean the temporary file off the
hard drive
Short Answer Questions
`7. State three things that the boot process does

8. List the following storage in increasing order from the (smallest to the largest)
Megabyte, kilobyte, terabyte, gigabyte, Petabyte, Exabyte?

9) What are the Four (4) different types of hardware?


10) list four Examples of storage devices
11) Consist of programs to control the operations of computer equipment such as
writing to a disk and sending a document to your printer.
12) What stores the machine instructions and data during processing?
13) A legal contract defining ways you may use a computer program
14) What is a function of the operating system that enables the user to interact with
the computer?

15) Application software focuses on how the computer operates.


16) What is the function of the Firewall?

17) Is the firewall a hardware device?

18) Utility software is Application software designed to help


analyze,
configure, optimize or maintain a computer.

Tutorial 5 (Chapter 6) (Assessing hardware)

1. Software that is hosted by the vendor and accessed online is called

a) application software
b) productivity software
c) Software as a Service (SaaS)
d) open source software.

2. LibreOffice is an example of which type of software?

a) Freeware
b) open source software
c) beta software
d) Software as a Service (Saas)
3. Beta software is made available because

a) new programmers have been hired


b) wireless networking must be added
c) a company is making an early release to test bugs
d) the company needs more profits.

4. When you install all the most commonly used files and programs to your
computer’s hard drive, you have completed which kind of software
installation?

a) Custom
b) Full
c) Complete
d) common

5. The minimum recommended standards for the operating system,


processor, primary memory (RAM), and storage capacity for certain
software are called

a) redistributing standards
b) system requirements
c) hardware
d) minimum standards

6. Jane downloads and modifies an open source software program, then uploads
the program with a different name. Which type of software license is she most
likely to be working under?

a) Copyleft
b) GNU General Public License
c) Open Source License
d) No license is necessary

Calendars, tasks, and e-mail can be found in which application?

e) Excel
f) Outlook
g) OneNote
h) Access

7. Which of the following is an example of financial management software?


a) Lumosity
b) AudioAcrobat
c) Photos
d) Quicken

8. Image-editing software allows you to

a) compute complex formulas


b) remove red eye
c) create drafting blueprints
d) conduct product simulations

9. Digital audio software can be used to

a) compute complex formulas


b) compose songs or soundtracks with virtual instruments
c) create drafting blueprints
d) perform mathematical simulations

10. Google Docs is an example of Software as a Service. (T/F)

11. App creation software includes tools like Adobe Photoshop. (T/F)

12. Course management software creates a virtual learning experience for


students and houses course materials, tests, and discussion boards. (T/F)

13. When you subscribe to software, no license is necessary. (T/F)

14. A macro is a program released early to the public for testing and evaluation.
(T/F)

16. Which of the following is NOT a major way that technology has impacted society?
a) Better hygiene and health
b) human productivity
c) Free and available information helping to level the playing field
d) Changing the nature of human relationships -- less emotional connection

17 Which of the following is not a contributing factor to the digital divide?


a) High literacy and income levels
b) geographical restrictions
c) lack of physical access to technology
d) digital illiteracy.
18 What type of software would a business use to create a Corel presentation?
A) System Software
b) Utility Software
c) Custom Software
d) End user Software

19. Which of the following entity does not belong to word processing?
(A) Paragraphs
(B) Character
(C) images
(D) Cells

20. The system clock on a computer is 3.0 GHz. What does this mean?
(A) 3 Million cycles per second
(B) 3 Billion cycles per second
(C) 3 Thousand cycles per second
(D) 3 Trillion cycles per second

21. A part of the computer processor which is used to hold a computer instruction,
perform mathematical operation as storage address
(A) Cache
(B) ROM
(C) Register
(D) RAM

22. The part of a computer's central processing unit (CPU) that directs the operation
of the processor:
(A) Main memory
(B) Arithmetic Unit
(C) Logic Unit
(D) Control Unit

23. It initializes your hardware before booting an operating system from your hard
drive
a) BIOS
b) Utility programs
c) By application software
d) Operating System

22. Providing file management, networking, device drivers are all functions of:
a) An Operating System
b) An Application Software
c) A Utility Software
d) A Server Software

True and false

1) All computer programs that run on a computer are referred to as Applications

2)Utility software is generally used by people with an advanced level of computer


knowledge
3) Application software focuses on how the computer operates.

4) Read-only memory (ROM) Holds the Critical startup instructions

5) Business application programs include tax planning and preparation programs

6) Educational software includes tutorial programs and reference program

Short Answer Questions

1) This is a software developed by software publisher or an individual who retains


ownership of the product and makes it available for a small contribution fee.

2) This is a software whose programming code is owned by the original developer


but it is made available free to the general public, who is encouraged to experiment
with the software, make improvements, and share the improvements with the user
community.

3) software that allows users to create impressive documents that include text,
drawings, photographs, and various graphics elements in full colour.
4 software that allows users to create computerized slide shows that combine text,
numbers, animation, graphics, sounds, and videos.

5 Software that is provided free of charge to anyone wanting to use it.

6) Software that enables users to perform different type of activities and work that
computers were designed for.

7. A general license agreement granted by a copyright owner permitting anyone to freely


use copyrighted property but under specific terms.
1
2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy