100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 100 INTRODUCTION TO COMPUTERS FINAL EXAM QUESTIONS WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
02-10-2025
Written in
2025/2026

CIS 100 INTRODUCTION TO COMPUTERS FINAL EXAM QUESTIONS WITH COMPLETE SOLUTIONS

Institution
Introduction To Computers
Module
Introduction to Computers










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Introduction to Computers
Module
Introduction to Computers

Document information

Uploaded on
October 2, 2025
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIS 100 INTRODUCTION TO
COMPUTERS FINAL EXAM

Being ________ means being familiar enough with computers that you understand their
capabilities and
limitations.
Select one:
a. computer savvy
b. technology literate
c. computer competent
d. computer literate - Correct Answers -d. computer literate

The ability to recover and read deleted or damaged files from a criminal's computer is
an example of a law
enforcement specialty called:
Select one:
a. HALO animation.
b. computer forensics.
c. robotics.
d. RFID simulation. - Correct Answers -b. computer forensics.

________ tags, when placed on an animal, can be used to record and track in a
database all of the animal's
movements.
Select one:
A.. RFID
b. PPS
c. POS
d. GPS - Correct Answers -A.. RFID

Surgeons use ________ to perform delicate operations by manipulating devices
through computers instead of
manually.
Select one:
a. robotics
b. forecasting
c. simulation

,d. computer forensics - Correct Answers -a. robotics

All of the following are examples of real security and privacy risks EXCEPT
Select one:
a. viruses.
b. hackers.
c. spam.
d. identity theft. - Correct Answers -c. spam.

Unwanted electronic e-mail is called
Select one:
a. software.
b. spam.
c. adware.
d. spyware. - Correct Answers -b. spam.

Children who do not have access to ________ and ________ won't be prepared for
future employment.
Select one:
a. television, video games
b. databases, data mining
c. the Internet, computers
d. information, data - Correct Answers -c. the Internet, computers

The difference between people with access to computers and the Internet and those
without this access is
known as the:
Select one:
a. Internet divide.
b. broadband divide.
c. digital divide.
d. Web divide. - Correct Answers -c. digital divide.

Which of the following is NOT necessarily part of being computer literate?
Select one:
a. being able to build a computer
b. using the Internet wisely
c. avoiding hackers and viruses
d. protecting your privacy - Correct Answers -a. being able to build a computer

The process of searching huge amounts of data with the hope of finding a pattern is
called
Select one:
a. data warehousing.
b. data searching.
c. data retrieval.

, d. data mining. - Correct Answers -d. data mining.

Information technology careers are on the rise.
Select one:
a. True
b. False - Correct Answers -True

Hardware refers to the programs that give commands to the computer.
Select one:
a. True
b. False - Correct Answers -false

________ is a type of wireless communication that transmits data through radio waves.
Select one:
a. POS technology
b. USB technology
c. Bluetooth technology
d. Nanotechnology - Correct Answers -c. Bluetooth technology

Employers have the right to monitor network traffic on employee systems used at work.
Select one:
a. True
b. False - Correct Answers -False

Being computer literate enables you to form educated opinions in today's digital society
and to take a stand
based on accurate information rather than media hype and misinformation.
Select one:
a. True
b. False - Correct Answers -True

Ensuring that two devices, for example, a PC and a cell/smartphone, have the same
files is the process of:
Select one:
a. syndicating.
b. standardizing.
c. unifying.
d. synchronizing. - Correct Answers -d. synchronizing.

Text messaging is also called:
Select one:
a. short message service (SMS).
b. sending messages shortly (SMS).
c. short text messaging (STM).
d. test messaging system (TMS). - Correct Answers -a. short message service (SMS).

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2812
Member since
3 year
Number of followers
1959
Documents
40914
Last sold
13 hours ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

534 reviews

5
234
4
83
3
103
2
31
1
83

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions