INTRODUCTION TO COMPUTERS-
FINAL EXAM QUESTIONS AND
ANSWERS
Digital literacy - Correct Answers -having a current knowledge and understanding of
computers, mobile devices, the internet, and related technologies
Computer - Correct Answers -electronic device, operating under the control of
instructions stored in its own memory (laptop, tablet, desktop, server)
Memory Card - Correct Answers -removable flash memory, usually no bigger than 1.5
inches, that you insert in and remove from a slot in a computer, mobile device, or card
reader
Web Server - Correct Answers -computer that delivers requested webpages to your
computer or mobile device
HDMI, USB, Lightening - Correct Answers -ports that can be used for audio
Host - Correct Answers -any computer that provides services and connections to other
computers on a network
Tools or utilities - Correct Answers -programs that enable you to perform maintenance-
type tasks usually related to managing devices, media, and programs used by
computers an mobile devices
Custom Software - Correct Answers -software that performs functions specific to a
business or industry
Trojan Horse - Correct Answers -destructive program disguised as a real program
Resolving name, TLD, Root, DNS, authoritative - Correct Answers -server types that are
used when finding an IP address using the DNS process
Information - Correct Answers -conveys meaning and is useful to users
, Software - Correct Answers -consists of a series of related instructions that tells the
computer what tasks to perform and how to perform them
SSDs - Correct Answers -memory that is very durable and shock resistant
VoIP - Correct Answers -enables users to speak to other users over the internet
Byte - Correct Answers -basic storage unit on a mobile device; represents a single
character
gov, org, net - Correct Answers -valid TLDs
Registar - Correct Answers -organization that sells domain names
Tower - Correct Answers -house of desktop's system; unit made of metal
Linux - Correct Answers -operating system besides Windows and Mac OS
PDF - Correct Answers -file type that Adobe Reader allows you to view
Botnet - Correct Answers -group of compromised computers connected to a network
that attacks other networks
DDoS Attack - Correct Answers -a zombie army is used to attack computers or
networks
Firewall - Correct Answers -hardware/ software that protects a network's resources from
intrusion
PIN - Correct Answers -acronym for personal identification number
Keygen - Correct Answers -can be used to create a software registration number,
sometimes illegally
ARPANET - Correct Answers -root of the Internet that became functional in 1969; linked
scientific and academic researchers across the US
DSL - Correct Answers -technology that provides high-speed internet connection using
the telephone network
Megabyte - Correct Answers -equal to approximately one million characters
Streaming - Correct Answers -process of transferring data in a continuous and even
flow, which allows users to access and use a file while its transmitting
FINAL EXAM QUESTIONS AND
ANSWERS
Digital literacy - Correct Answers -having a current knowledge and understanding of
computers, mobile devices, the internet, and related technologies
Computer - Correct Answers -electronic device, operating under the control of
instructions stored in its own memory (laptop, tablet, desktop, server)
Memory Card - Correct Answers -removable flash memory, usually no bigger than 1.5
inches, that you insert in and remove from a slot in a computer, mobile device, or card
reader
Web Server - Correct Answers -computer that delivers requested webpages to your
computer or mobile device
HDMI, USB, Lightening - Correct Answers -ports that can be used for audio
Host - Correct Answers -any computer that provides services and connections to other
computers on a network
Tools or utilities - Correct Answers -programs that enable you to perform maintenance-
type tasks usually related to managing devices, media, and programs used by
computers an mobile devices
Custom Software - Correct Answers -software that performs functions specific to a
business or industry
Trojan Horse - Correct Answers -destructive program disguised as a real program
Resolving name, TLD, Root, DNS, authoritative - Correct Answers -server types that are
used when finding an IP address using the DNS process
Information - Correct Answers -conveys meaning and is useful to users
, Software - Correct Answers -consists of a series of related instructions that tells the
computer what tasks to perform and how to perform them
SSDs - Correct Answers -memory that is very durable and shock resistant
VoIP - Correct Answers -enables users to speak to other users over the internet
Byte - Correct Answers -basic storage unit on a mobile device; represents a single
character
gov, org, net - Correct Answers -valid TLDs
Registar - Correct Answers -organization that sells domain names
Tower - Correct Answers -house of desktop's system; unit made of metal
Linux - Correct Answers -operating system besides Windows and Mac OS
PDF - Correct Answers -file type that Adobe Reader allows you to view
Botnet - Correct Answers -group of compromised computers connected to a network
that attacks other networks
DDoS Attack - Correct Answers -a zombie army is used to attack computers or
networks
Firewall - Correct Answers -hardware/ software that protects a network's resources from
intrusion
PIN - Correct Answers -acronym for personal identification number
Keygen - Correct Answers -can be used to create a software registration number,
sometimes illegally
ARPANET - Correct Answers -root of the Internet that became functional in 1969; linked
scientific and academic researchers across the US
DSL - Correct Answers -technology that provides high-speed internet connection using
the telephone network
Megabyte - Correct Answers -equal to approximately one million characters
Streaming - Correct Answers -process of transferring data in a continuous and even
flow, which allows users to access and use a file while its transmitting