Computer Test Review Lessons 3 and 4 Adding random access memory is relatively simple because additional memory expansion cards fit easily into slots on the.
Download ReportTranscript Computer Test Review Lessons 3 and 4 Adding random access memory is relatively simple because additional memory expansion cards fit easily into slots on the.
Computer Test Review Lessons 3 and 4 Adding random access memory is relatively simple because additional memory expansion cards fit easily into slots on the computer’s motherboard. •True A ____ is used to add memory or connect peripheral devices to a notebook computer. a. hacker card b. modem clip c. PC card d. Mac disk c. PC card The speed of the CPU, which is measured in megahertz, is determined by the system clock. •True Graphical interfaces and ____ interfaces are the two most common types of user interfaces. a. information b. DOS c. operations d. command-line d. command-line In a GUI, ____ represent files, disks, programs, and other objects. a. PCs b. symbols c. commands d. windows b. symbols Unix is a type of utility program. •False A digital camera is an example of a peripheral that connects to new computers with a ____ port. a. Serial b. Fan c. MIDI d. USB d. USB Which of the following is NOT a routine maintenance task for computer systems? a. visual inspection b. checking e-mail c. deleting temporary files d. checking cables for wear b. checking e-mail A PS/2 port is also sometimes called a camera port. •False An alliance that was formed in 1993 to produce the PowerPC family of CPU chips included IBM, Motorola, and ____. a. Apple b. Walmart c. Honda d. Dell a. Apple A file management program is an example of a utility program. •True Install a(n) ____ to avoid losing data if the power goes off during a thunderstorm. a. surge protector b. uninterruptible power source c. universal serial bus d. CD-ROM drive b. uninterruptible power source ____ is software you can use on a trial basis before paying a registration fee. a. Bundle b. Shareware c. Plug and play d. Freeware b. Shareware With a graphical interface, you must type the exact command you wish to execute. •False Adding or changing components of a computer to make it faster or more efficient is called ____. a. maintaining b. upgrading b. upgrading c. operating d. troubleshooting Windows 98 was the first version of Windows to integrate ____ into the operating system. a. the Internet b. algorithms c. icons d. the monitor a. the Internet The Windows operating system works with the Motorola processor. •False A good source of help with computer problems is ____. a. computer manuals b. support technicians c. a technical support telephone number d. all of the above d. all of the above A ____ is a device that allows one computer to talk to another via a cable connection. a. Scanner b. Mouse c. Modem d. USB port c. Modem Regular visual inspection is an important part of routine maintenance for computer components. •True How many bits of data can a serial port transmit at a time? a. One b. Two c. Eight d. 12 million a. One Software developers have had a tremendous impact on the history of computers. •True IBM introduced its first IBM PC around ____. a. 1975 b. 1980 c. 1985 d. 1990 b. 1980 Another word for "program" is "hardware." •False Which is one of the most widely used command-line interfaces for microcomputers? a. DOS b. RAM c. Visual Basic d. BASIC a. DOS A command-line interface allows you to see files and disks represented as images you can select. •False Systems software refers to the computer's ____ system. a. computing b. operating c. applications d. productivity b. operating Most hardware components available today are called park and play because they must be carefully positioned before using. •False When you turn on a computer, you ____ the system. a. bug b. kick c. boot d. skip c. boot A small computer system interface port found in many older computer models is more commonly called a(n) ____ port. a. MIDI b. parallel c. cable d. SCSI d. SCSI It is not necessary to register new equipment to have access to technical support. •False When you start your computer, the first action that the computer performs is ____. a. b. c. d. BIOS CHKDSK ROM POST d. POST Skilled computer users who invade computer systems and write virus programs are called ____. a. bugs b. firewalls c. spikes d. hackers d. hackers The Mac OS is not commonly used in conjunction with DOS. •True Which of the following is NOT a utility program? a. file recovery d. calendar b. disk defragmentation c. antivirus d. calendar One computer can run a combination of operating systems. •True Which statement about multitasking is true? a. It prohibits multiple programs from running simultaneously. b. It is a character-based operating system. c. It manipulates programs that reside on the hard drive. d. It allows a single user to work on two programs at one time. d.It allows a single user to work on two programs at one time. Increasing storage capacity or adding more memory are reasons for considering a computer upgrade. •True An error in programming code is called a(n) ____. a. syntax b. algorithm c. bug d. moth c. bug Computers only understand ____, so programs written in programming languages must be translated before computers can use them. a. standard English b. machine language c. Visual Basic d. Mac OS b. machine language Which of the following factors will damage removable storage media? a. extreme temperatures b. magnetic fields c. touching the surface of the media d. all of the above d. all of the above Computers with Windows operating systems often have Intel Pentium chips. •True A ____ operating system allows a group of computers to be connected. a. network b. system c. BIOS d. graphical a. network The final step in the troubleshooting process should always be to ____. a. contact a support technician b. avoid similar problems in the future c. clean the computer’s case d. check the cables b. avoid similar problems in the future Which is NOT a category of systems software? a. operating systems c. b. utilities c. multimedia d. language translators multimedia Application software is developed for the end user. •True The Macintosh computer was introduced in the ____. a. b. c. d. 1960s 1970s 1980s 1990s c. 1980s A peripheral device must be physically connected to the computer. •True Analyzing computer problems to correct faults in the system is called ____. a. maintenance d. troubleshooting b. fragmenting c. hacking d. troubleshooting You should never try to replicate a computer problem when trying to solve the problem. •False