0% found this document useful (0 votes)
1K views12 pages

CS105 - Intro To Computer Science Test Bank

Chapters 1-5 Random Test bank with correct answers for true/false, short answer, and fill in the blank for CS105 - Intro to computer science

Uploaded by

warren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views12 pages

CS105 - Intro To Computer Science Test Bank

Chapters 1-5 Random Test bank with correct answers for true/false, short answer, and fill in the blank for CS105 - Intro to computer science

Uploaded by

warren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Question 1

2 out of 2 points
Examples of volatile storage are mass storage devices such as disks and
tapes.
Selected Answer:
Correct Answer:

False
False

Question 2

0 out of 2 points
It is the responsibility of the ____________________ to safeguard the
password file that stores all valid user name/password combinations.
Selected Answer:
Correct Answer:
Evaluation Method

user
Correct Answer

Exact Match

OS

Exact Match

operating system

Exact Match

OS (operating
system)

Exact Match

operating system
(OS)

Case Sensitivity

Question 3

0 out of 2 points
The first line of defense against illicit use of, or threats to, computer
resources and sensitive information is a strong ____ and authorization
process.
Selected Answer:
Correct Answer:

encryption
authentication

Question 4

0 out of 2 points
____ games allow a large number of players, often thousands or tens of
thousands, to interact, form groups, and compete against one another
within a simulated virtual world.
Selected Answer:

MMRPG
Correct Answer:

MMOG

Question 5

2 out of 2 points
The history of mathematics begins ____ years ago.
Selected Answer:
Correct Answer:

3,000 or more
3,000 or more

Question 6

0 out of 2 points
The ____ was the first fully electronic general-purpose programmable
computer.
Selected Answer:

Mark I

Correct Answer:

ENIAC

Question 7

2 out of 2 points
A(n) ____ handles the details of input/output and compensates for any
speed differences between I/O devices and other parts of the computer.
Selected Answer:
Correct Answer:

I/O controller
I/O controller

Question 8

0 out of 2 points
The ____ are the devices that allow a computer system to communicate
and interact with the outside world as well as store information.
Selected Answer:
Correct Answer:
Question 9

registers
input/output units

0 out of 2 points
The sequence of operations that must be completed successfully to
produce a realistic three-dimensional image sequence is termed the ____.
Selected Answer:

graphics perspective

Correct Answer:

graphics pipeline

Question 10

0 out of 2 points
Wireless communications are a(n) ____________________-generation
innovation in computing.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

first
Correct Answer

Case Sensitivity

fifth

Question 11

0 out of 2 points
One way to achieve speedup in real-time graphics is to avoid the use of
____________________ that, although they produce high-quality images,
simply take too much time.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

gif
Correct Answer

Case Sensitivity

algorithms

Question 12

2 out of 2 points
____, such as text editors, are sometimes organized into collections called
program libraries.
Selected Answer:
Correct Answer:
Question 13

Utilities
Utilities

0 out of 2 points
The ____ of a disk is the time needed to position the read/write head over
the correct track.
Selected Answer:

latency

Correct Answer:

seek time

Question 14

0 out of 2 points
In 1952, a UNIVAC I cost $12 million.
Selected Answer:
Correct Answer:

True
False

Question 15

0 out of 2 points
Leibnizs ____________________ could carry out addition, subtraction,
multiplication, and division.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

calculator
Correct Answer

Case Sensitivity

Wheel

Question 16

2 out of 2 points
Algorithms usually contain a set of instructions to be executed in any
order.
Selected Answer:
Correct Answer:

False
False

Question 17

0 out of 2 points
In a ____, the original contents of the memory cell are unchanged.
Selected Answer:
Correct Answer:

random access memory


nondestructive fetch

Question 18

2 out of 2 points
The exchange of setup information between the client and server,
preparatory to exchanging real data, is known as a ____.
Selected Answer:
Correct Answer:

handshake
handshake

Question 19

0 out of 2 points
In a ____ cipher a single letter of plaintext generates a single letter of
ciphertext.
Selected Answer:
Correct Answer:

shift
substitution

Question 20

0 out of 2 points
System software acts as a(n) ____ between the users and the hardware.
Selected Answer:
Correct Answer:

translator
intermediary

Question 21

0 out of 2 points
The star topology connects the network nodes in a circular fashion, with
messages circulating in either a clockwise or counterclockwise direction
until they reach their destination.
Selected Answer:
Correct Answer:

True
False

Question 22

2 out of 2 points
____ is the ability to share physical resources, such as a printer or storage
device, as well as logical resources, such as software and information.

Selected Answer:

Resource sharing

Correct Answer:

Resource sharing

Question 23

0 out of 2 points
While WiMAX is great for communicating with a nearby router, its
transmission limit means it cannot provide mobile Internet access from a
car or outdoor site far from any base station.
Selected Answer:
Correct Answer:

True
False

Question 24

0 out of 2 points
Related recordssay, the records of all the employees in a single
companyare kept in a ____.
Selected Answer:

data network

Correct Answer:

data file

Question 25

2 out of 2 points
Any positive ____________________ is either a prime number or a number
that can be written in a unique way as a product of prime factors.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

integer
Correct Answer

Case Sensitivity

integer

Question 26

2 out of 2 points
A standard data DVD holds ____ GB of data.
Selected Answer:
Correct Answer:

4.7
4.7

Question 27

2 out of 2 points
A text file can be hidden in an image file by changing (if needed) the least
significant bit of each byte of the image file to match the
____________________ form of the characters in the text.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

binary
Correct Answer

Case Sensitivity

binary

Question 28

2 out of 2 points
The ____ hides from the user the messy details of underlying hardware.
Selected Answer:
Correct Answer:

interface
interface

Question 29

0 out of 2 points
Building massive, integrated government databases raises fewer technical
questions than legal, political, social, and ethical ones.
Selected Answer:
Correct Answer:

False
True

Question 30

2 out of 2 points
Icons displayed on the screen are selected with a mouse and a button
using a technique called ____.
Selected Answer:
Correct Answer:
Question 31

0 out of 2 points
Translators for ____ are called compilers.

point-and-click
point-and-click

Selected Answer:
Correct Answer:

machine language
high-level languages

Question 32

2 out of 2 points
In the SIMD parallel processing model, the control unit ____ instructions to
every ALU.
Selected Answer:
Correct Answer:

broadcasts
broadcasts

Question 33

2 out of 2 points
____ are fully modeled and fully rendered objects stored in a video library
in video memory.
Selected Answer:
Correct Answer:

Cut-ins
Cut-ins

Question 34

0 out of 2 points
____ allow the physical data to reside at separate and independent
locations that are electronically networked together.
Selected Answer:
Correct Answer:

Discrete databases
Distributed databases

Question 35

2 out of 2 points
To solve the problem of two users having the same password, some
operating systems keep a third entry for each user in the password file,
namely ____ at which the user created the password.
Selected Answer:

the exact time

Correct Answer:

the exact time

Question 36

0 out of 2 points
____ means keeping information securethat is, protected from those who
should not have access to it.
Selected Answer:
Correct Answer:

Information assurance
Information security

Question 37

2 out of 2 points
In theoretical computer science, researchers study the logical and ____ of
problems and their solutions.
Selected Answer:
Correct Answer:

mathematical properties
mathematical properties

Question 38

2 out of 2 points
A ____ executes instructions in parallel with the CPU, the main processor,
and carries out all graphics operations including modeling, motion,
rendering, and display.
Selected Answer:

GPU

Correct Answer:

GPU

Question 39

0 out of 2 points
Charles Babbage gave up on his second ____________________ because the
current technology could not support his project.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

calculator
Correct Answer
Difference Engine

Case Sensitivity

Question 40

2 out of 2 points
Atari released its first product in 1974, an arcade game called ____.
Selected Answer:
Correct Answer:

Pong
Pong

Question 41

2 out of 2 points
The main difficulty with a symmetric algorithm is how to securely transmit
the secret key.
Selected Answer:
Correct Answer:

True
True

Question 42

0 out of 2 points
A block cipher encodes one character at a time.
Selected Answer:
Correct Answer:

True
False

Question 43

2 out of 2 points
The instructions that can be decoded and executed by the control unit of a
computer are represented in machine language.
Selected Answer:
Correct Answer:

True
True

Question 44

2 out of 2 points
A movie is an interactive environment.
Selected Answer:
Correct Answer:

False
False

Question 45

0 out of 2 points
In the early 1980s, TCP/IP was used only in the United States.

Selected Answer:
Correct Answer:

True
False

Question 46

2 out of 2 points
An operation that is unambiguous is called a ____ operation of the
computing agent carrying out the algorithm.
Selected Answer:
Correct Answer:

primitive
primitive

Question 47

0 out of 2 points
The first slide rule appeared around ____.
Selected Answer:
Correct Answer:

1183
1622

Question 48

2 out of 2 points
____ operation codes are restricted to be used in the operating system or
other system software.
Selected Answer:
Correct Answer:

Privileged
Privileged

Question 49

0 out of 2 points
A database management system works much like a simple file manager.
Selected Answer:
Correct Answer:

True
False

Question 50

0 out of 2 points
During the ____ generation of computing, the desktop machine shrunk to
the size of a typewriter.

Selected Answer:
Correct Answer:
Thursday, November 12, 2015 12:30:08 AM EST
OK

third
fourth

You might also like