CIS 100 INTRODUCTION TO
COMPUTERS FINAL EXAM
Being ________ means being familiar enough with computers that you understand their
capabilities and
limitations.
Select one:
a. computer savvy
b. technology literate
c. computer competent
d. computer literate - Correct Answers -d. computer literate
The ability to recover and read deleted or damaged files from a criminal's computer is
an example of a law
enforcement specialty called:
Select one:
a. HALO animation.
b. computer forensics.
c. robotics.
d. RFID simulation. - Correct Answers -b. computer forensics.
________ tags, when placed on an animal, can be used to record and track in a
database all of the animal's
movements.
Select one:
A.. RFID
b. PPS
c. POS
d. GPS - Correct Answers -A.. RFID
Surgeons use ________ to perform delicate operations by manipulating devices
through computers instead of
manually.
Select one:
a. robotics
b. forecasting
c. simulation
,d. computer forensics - Correct Answers -a. robotics
All of the following are examples of real security and privacy risks EXCEPT
Select one:
a. viruses.
b. hackers.
c. spam.
d. identity theft. - Correct Answers -c. spam.
Unwanted electronic e-mail is called
Select one:
a. software.
b. spam.
c. adware.
d. spyware. - Correct Answers -b. spam.
Children who do not have access to ________ and ________ won't be prepared for
future employment.
Select one:
a. television, video games
b. databases, data mining
c. the Internet, computers
d. information, data - Correct Answers -c. the Internet, computers
The difference between people with access to computers and the Internet and those
without this access is
known as the:
Select one:
a. Internet divide.
b. broadband divide.
c. digital divide.
d. Web divide. - Correct Answers -c. digital divide.
Which of the following is NOT necessarily part of being computer literate?
Select one:
a. being able to build a computer
b. using the Internet wisely
c. avoiding hackers and viruses
d. protecting your privacy - Correct Answers -a. being able to build a computer
The process of searching huge amounts of data with the hope of finding a pattern is
called
Select one:
a. data warehousing.
b. data searching.
c. data retrieval.
, d. data mining. - Correct Answers -d. data mining.
Information technology careers are on the rise.
Select one:
a. True
b. False - Correct Answers -True
Hardware refers to the programs that give commands to the computer.
Select one:
a. True
b. False - Correct Answers -false
________ is a type of wireless communication that transmits data through radio waves.
Select one:
a. POS technology
b. USB technology
c. Bluetooth technology
d. Nanotechnology - Correct Answers -c. Bluetooth technology
Employers have the right to monitor network traffic on employee systems used at work.
Select one:
a. True
b. False - Correct Answers -False
Being computer literate enables you to form educated opinions in today's digital society
and to take a stand
based on accurate information rather than media hype and misinformation.
Select one:
a. True
b. False - Correct Answers -True
Ensuring that two devices, for example, a PC and a cell/smartphone, have the same
files is the process of:
Select one:
a. syndicating.
b. standardizing.
c. unifying.
d. synchronizing. - Correct Answers -d. synchronizing.
Text messaging is also called:
Select one:
a. short message service (SMS).
b. sending messages shortly (SMS).
c. short text messaging (STM).
d. test messaging system (TMS). - Correct Answers -a. short message service (SMS).
COMPUTERS FINAL EXAM
Being ________ means being familiar enough with computers that you understand their
capabilities and
limitations.
Select one:
a. computer savvy
b. technology literate
c. computer competent
d. computer literate - Correct Answers -d. computer literate
The ability to recover and read deleted or damaged files from a criminal's computer is
an example of a law
enforcement specialty called:
Select one:
a. HALO animation.
b. computer forensics.
c. robotics.
d. RFID simulation. - Correct Answers -b. computer forensics.
________ tags, when placed on an animal, can be used to record and track in a
database all of the animal's
movements.
Select one:
A.. RFID
b. PPS
c. POS
d. GPS - Correct Answers -A.. RFID
Surgeons use ________ to perform delicate operations by manipulating devices
through computers instead of
manually.
Select one:
a. robotics
b. forecasting
c. simulation
,d. computer forensics - Correct Answers -a. robotics
All of the following are examples of real security and privacy risks EXCEPT
Select one:
a. viruses.
b. hackers.
c. spam.
d. identity theft. - Correct Answers -c. spam.
Unwanted electronic e-mail is called
Select one:
a. software.
b. spam.
c. adware.
d. spyware. - Correct Answers -b. spam.
Children who do not have access to ________ and ________ won't be prepared for
future employment.
Select one:
a. television, video games
b. databases, data mining
c. the Internet, computers
d. information, data - Correct Answers -c. the Internet, computers
The difference between people with access to computers and the Internet and those
without this access is
known as the:
Select one:
a. Internet divide.
b. broadband divide.
c. digital divide.
d. Web divide. - Correct Answers -c. digital divide.
Which of the following is NOT necessarily part of being computer literate?
Select one:
a. being able to build a computer
b. using the Internet wisely
c. avoiding hackers and viruses
d. protecting your privacy - Correct Answers -a. being able to build a computer
The process of searching huge amounts of data with the hope of finding a pattern is
called
Select one:
a. data warehousing.
b. data searching.
c. data retrieval.
, d. data mining. - Correct Answers -d. data mining.
Information technology careers are on the rise.
Select one:
a. True
b. False - Correct Answers -True
Hardware refers to the programs that give commands to the computer.
Select one:
a. True
b. False - Correct Answers -false
________ is a type of wireless communication that transmits data through radio waves.
Select one:
a. POS technology
b. USB technology
c. Bluetooth technology
d. Nanotechnology - Correct Answers -c. Bluetooth technology
Employers have the right to monitor network traffic on employee systems used at work.
Select one:
a. True
b. False - Correct Answers -False
Being computer literate enables you to form educated opinions in today's digital society
and to take a stand
based on accurate information rather than media hype and misinformation.
Select one:
a. True
b. False - Correct Answers -True
Ensuring that two devices, for example, a PC and a cell/smartphone, have the same
files is the process of:
Select one:
a. syndicating.
b. standardizing.
c. unifying.
d. synchronizing. - Correct Answers -d. synchronizing.
Text messaging is also called:
Select one:
a. short message service (SMS).
b. sending messages shortly (SMS).
c. short text messaging (STM).
d. test messaging system (TMS). - Correct Answers -a. short message service (SMS).