CLEP EXAM 2025 QUESTIONS AND
ANSWERS
File extensions such as .txt, .bmp, and .mp3 are used to identify a file's
(A) output
(B) creator
(C) size
(D) location
(E) format - ANSWER✔✔-(E) format
Which of the following network technologies allows secure transmission of data over an
unsecured public network link between private networks?
(A) Local area network
(B) Wide area network
(C) Virtual private network
(D) Intranet
(E) Extranet - ANSWER✔✔-(C) Virtual private network
COPYRIGHT © 2025 ALL RIGHTS RESERVED
,Which of the following is a goal of green computing?
(A) Reducing the potential for a computer to become infected with malware
(B) Reducing the number of people experiencing computer vision syndrome
(C) Reducing power consumption of computers and peripherals
(D) Optimizing the human-computer interface
(E) Building relationships between computer manufacturers and environmental groups
- ANSWER✔✔-(C) Reducing power consumption of computers and peripherals
Which of the following is true about E D I?
Select all that apply.
(A) The EDI documents generally contain the same information found in paper
documents.
(B) The EDI documents are more likely than paper documents to contain errors.
(C) The speed in which the EDI documents are exchanged is much faster than that of
paper documents. - ANSWER✔✔-(A) The EDI documents generally contain the same
information found in paper documents.
(C) The speed in which the EDI documents are exchanged is much faster than that of
paper documents.
COPYRIGHT © 2025 ALL RIGHTS RESERVED
,A spreadsheet contains the values 4 and 6 in cells C 4and D 4, respectively. What value
will be displayed in cell F 4if it contains the formula (C4^2+D4/4) ?
(A) 2.5
(B) 5.5
(C) 16
(D) 17.5
(E) 128 - ANSWER✔✔-(D) 17.5
Which of the following would NOT be considered an input device for a computer
system? (A) Image scanner
(B) Webcam
(C) Keyboard
(D) Mouse
(E) PC speaker - ANSWER✔✔-(E) PC speaker
In a relational database, each column represents
(A) a record
(B) an attribute
(C) a key
(D) an entity
COPYRIGHT © 2025 ALL RIGHTS RESERVED
, (E) a file - ANSWER✔✔-(B) an attribute
Which of the following violates intellectual property rights?
(A) Software piracy
(B) Data mining of social networks
(C) Launching a denial of service attack
(D) Hacktivism
(E) Spamming - ANSWER✔✔-(A) Software piracy
Conversion of data files is part of which of the following phases of the system
development process?
(A) Analysis
(B) Design
(C) Implementation
(D) Development
(E) Maintenance - ANSWER✔✔-(C) Implementation
Enforcing programming standards in the software development process has which of
the following impacts?
Select all that apply.
COPYRIGHT © 2025 ALL RIGHTS RESERVED
ANSWERS
File extensions such as .txt, .bmp, and .mp3 are used to identify a file's
(A) output
(B) creator
(C) size
(D) location
(E) format - ANSWER✔✔-(E) format
Which of the following network technologies allows secure transmission of data over an
unsecured public network link between private networks?
(A) Local area network
(B) Wide area network
(C) Virtual private network
(D) Intranet
(E) Extranet - ANSWER✔✔-(C) Virtual private network
COPYRIGHT © 2025 ALL RIGHTS RESERVED
,Which of the following is a goal of green computing?
(A) Reducing the potential for a computer to become infected with malware
(B) Reducing the number of people experiencing computer vision syndrome
(C) Reducing power consumption of computers and peripherals
(D) Optimizing the human-computer interface
(E) Building relationships between computer manufacturers and environmental groups
- ANSWER✔✔-(C) Reducing power consumption of computers and peripherals
Which of the following is true about E D I?
Select all that apply.
(A) The EDI documents generally contain the same information found in paper
documents.
(B) The EDI documents are more likely than paper documents to contain errors.
(C) The speed in which the EDI documents are exchanged is much faster than that of
paper documents. - ANSWER✔✔-(A) The EDI documents generally contain the same
information found in paper documents.
(C) The speed in which the EDI documents are exchanged is much faster than that of
paper documents.
COPYRIGHT © 2025 ALL RIGHTS RESERVED
,A spreadsheet contains the values 4 and 6 in cells C 4and D 4, respectively. What value
will be displayed in cell F 4if it contains the formula (C4^2+D4/4) ?
(A) 2.5
(B) 5.5
(C) 16
(D) 17.5
(E) 128 - ANSWER✔✔-(D) 17.5
Which of the following would NOT be considered an input device for a computer
system? (A) Image scanner
(B) Webcam
(C) Keyboard
(D) Mouse
(E) PC speaker - ANSWER✔✔-(E) PC speaker
In a relational database, each column represents
(A) a record
(B) an attribute
(C) a key
(D) an entity
COPYRIGHT © 2025 ALL RIGHTS RESERVED
, (E) a file - ANSWER✔✔-(B) an attribute
Which of the following violates intellectual property rights?
(A) Software piracy
(B) Data mining of social networks
(C) Launching a denial of service attack
(D) Hacktivism
(E) Spamming - ANSWER✔✔-(A) Software piracy
Conversion of data files is part of which of the following phases of the system
development process?
(A) Analysis
(B) Design
(C) Implementation
(D) Development
(E) Maintenance - ANSWER✔✔-(C) Implementation
Enforcing programming standards in the software development process has which of
the following impacts?
Select all that apply.
COPYRIGHT © 2025 ALL RIGHTS RESERVED