1.File extensions such as .txt, .bmp, and .mp3 are used to identify a file's
(A) output
(B) creator
(C) size
(D) location
(E) format
Answer (E) format
2.Which of the following network technologies allows secure transmission
of data over an unsecured public network link between private networks?
(A) Local area network
(B) Wide area network
(C) Virtual private network
(D) Intranet
(E) Extranet
Answer (C) Virtual private network
3.Which of the following is a goal of green computing?
(A) Reducing the potential for a computer to become infected with malware
(B) Reducing the number of people experiencing computer vision syndrome
(C) Reducing power consumption of computers and peripherals
(D) Optimizing the human-computer interface
(E) Building relationships between computer manufacturers and
,environmen- tal groups
Answer (C) Reducing power consumption of computers and peripherals
4.Which of the following is true about E D
I? Select all that apply.
(A) The EDI documents generally contain the same information found in
paper documents.
(B) The EDI documents are more likely than paper documents to
contain errors.
(C) The speed in which the EDI documents are exchanged is much faster
than that of paper documents.
Answer (A) The EDI documents generally contain the same information
found in paper documents.
(D) The speed in which the EDI documents are exchanged is much faster
than that of paper documents.
5.A spreadsheet contains the values 4 and 6 in cells C 4and D 4,
respectively. What value will be displayed in cell F 4if it contains the formula
(C4^2+D4/4) ?
(A) 2.5
(B) 5.5
(C) 16
(D) 17.5
(E) 128
Answer (D) 17.5
,6.Which of the following would NOT be considered an input device for
a computer system? (A) Image scanner
(B) Webcam
(C) Keyboard
(D) Mouse
(E) PC speaker
Answer (E) PC speaker
7.In a relational database, each column represents
(A) a record
(B) an attribute
(C) a key
(D) an entity
(E) a file
Answer (B) an attribute
8.Which of the following violates intellectual property rights?
(A) Software piracy
(B) Data mining of social networks
(C) Launching a denial of service attack
(D) Hacktivism
(E) Spamming
Answer (A) Software piracy
, 9.Conversion of data files is part of which of the following phases of
the system development process?
(A) Analysis
(B) Design
(C) Implementation
(D) Development
(E) Maintenance
Answer (C) Implementation
10.Enforcing programming standards in the software development
process has which of the following impacts?
Select all that apply.
(A) Establishing common expectations
(B) Making it easier to modify code
(C) Enhancing the end-user experience
Answer (A) Establishing common expectations
(B) Making it easier to modify code
11.The ABC Charity Association, a nonprofit foundation, has a home page
on the World Wide Web. Which of the following is the most likely URL for its
home page?
(A) http;//www.abc-charity.gov
(B) http;//www.abc-charity.edu
(C) http;//www.abc-charity.com
(D) http;//www.abc-charity.org