Unformatted text preview:

1) HTML is used to ____________________________.a) modify the contents of written documentsb) create Web sitesc) search the Internetd) create applications programs2) A modem transforms signalsa) from analog to digital only b) from digital to analog only c) from analog to analog and from digital to digital d) from analog to digital and from digital to analog 3) A device, connected to a network, that requests resources available from other devices is called a _____________.a) clientb) serverc) hostd) NOS4) Assume you are creating a table in Word. It will have 10 columns and 20 rows, and will measure 10 inches wide by 6½ inches high.Which option would you select on the Paper Size tab in Page Setup?.a) Portraitb) Landscapec) Neither landscape or portraitd) either landscape or portrait5) The ability to have more than one phone call per line is called ________..1a) Multiprocessingb) Multitaskingc) Multiplexingd) Multimedia6) On the Internet, signal-carrying capacity refers to __________________.a) deliveryb) streamingc) bandwidthd) all of the above7) Which of the following technologies does not attempt to solve the last mile problem?a) ISDNb) ADSLc) SONETd) FTP8) “AND,” “OR,” and “NOT” are examples of ________. a) False dropsb) Boolean operatorsc) Proximity operatorsd) Selection statements9) Programs that are offered free to anyone are said to be __________. a) In the public domainb) In the public domicilec) Public filesd) copyrighted10) Lycos, AltaVista and Google are all examples ofa) hyperlinksb) clients2c) search toolsd) browsers11) You are ______________files when you transfer files from a server to your computer.a) uploadingb) downloading c) hyperlinkingd) all of the above12) In ________________ compression, some part of the original file is permanently removed.a) Losslessb) Lossyc) Losseryd) Codecs13) In the World Wide Web, the string of characters which precisely identifies Internet resource’s type and location is called _______________________________.a) Filenameb) Usernamec) Uniform Resource Locator (URL)d) Internet Protocol Address14) 14) A commonly used wildcard symbol is the __________________.i) a. minus b.plus c.asterisk d.tilde15) The principle of __________________ permits users to access other types of computers.3i) a. platforms b.domain namesii) c. hypertext d.interoperability16) 16The second part of a complete URL specifies the __________________.i) a. resource nameb.serverii) c. protocol d.path17) In word processing, the term paragraph means a unit of text the starts and ends with an Enter keystroke.a. Trueb. False18) Use the Delete key to delete characters to the left of the cursor.a) Trueb) False19) You need to press the __________________ key at the end ofa paragraph.a) tabb) escc) enterd) backspace20) __________________ occurs when you reach the end of a line of text.a) Word wrappingb) Word formattingc) Word processingd) None of the above421) Use the __________________ feature to help correct mistakes.a) word wrappingb) autocorrectc) paginationd) autosave22) 22 A terabyte is equal to approximately one __________________.a. thousand b. million c. billion d. trillion23) 23 All the programs that help the computer to function properly are included inA. application software. B. utility software.C. interface software. D. system software.24) 24. . An anti-virus program is an example of aA. user interface. B. operating system.C. object code. D. utility program.25) 25. One megabyte is equal to how many bytes?A. 1,024 bytes B. 1,048,576 bytesC. 1 billion bytes D. 1 trillion bytes26) 26The portion of the operating system that resides in memory at all times is theA. system utility. B. system software.C. kernel. D. application program.27) 27. The signal that generated by a peripheral device to inform the operating system that something has happened is called theA. conflict. B. interrupt.C. device driver. D. registry.28) 28 This enables a user to work with two or more programs at once.5A. multi-tasking B. multi-processingC. multi-managing D. multi-threading29) 29. Which of the following software is not copyrighted software?A. Public domain B. CommercialC. Shareware D. Freeware30) 30. What happens if you click and drag a file from drive C to drive A?i) The file is moved to drive A.ii) The file is copied to drive A.iii) A menu appears that allows you to choose between moving and copying.iv)The file is sent to the recycle bin.31) 31. Which of the following enables the operating system to regain control if an application stops running?a.Multithreadingb.Preemptive multitaskingc.Cooperative multitaskingd.Multiprocessing32) 32. The best way to uninstall application software is to manually delete its files from the hard disk.A. true B. false33) 33. The title bar in Microsoft applications displays the name of the application and the current document.A. true B. false34) 34. A byte is the equivalent of eight binary digits.A. true B. false35) 35This includes all of the programs that give the computer’s hardware the step-by-step orders.6A. hardware B. softwareC. peripherals D. compiler36) 36. All the programs that help the computer to function properly are included inA. application software. B. utility software.C. interface software. D. system software.37) 37. Virtual memory is a way to utilize the main memory better by:a.using a part of ROM as an extension of RAM to conserve the main memory.b.using a hard disk swap file when memory is full.dividing data and instructions into multi-tasking units.creating pages of variable size to use when the swap file is full.38) _______ is a process that describes a modem transforming a computer’s digital signals into analog tones.i) A. De-modulation B. Modulation39) ________ are used to do Boolean searches in a search engine.i) A. AND, OR, NOT B. +, –, *, /40) 54. The resource name of this URL: http://cs.wpunj.edu/cs201/slide.ppt is _________.i) A. cs.wpunj.edu B. slide.ppt41 Which of the following commands does not place data onto the clipboard?a. Cut b. Copy c. Paste d. All of the above42..The Open commanda. Brings a document from disk into memory7b. Brings a document from disk into memory, then erases the document on diskc. Stores the document in memory on diskd. Stores the document in memory on disk, then erases the document from memory43. The Save commanda. Brings a document from disk into memoryb.. Brings a document from disk into memory, then erases the document on diskc. Stores the document in memory on diskd.


View Full Document

WPU CS 2010 - CS 2010 LECTURE NOTES

Download CS 2010 LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 2010 LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 2010 LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?