admin管理员组

文章数量:1567570

2024年1月4日发(作者:)

CHAPTER 1

A common term that describes the combination of traditional computer and communication

technologies is

b. information technology

Procedures are typically documented in manuals written by

b. computer specialists

Which of the following is an example of connectivity?

a. Internet

Windows XP, windows Vista, and Macintosh OS X are all examples of

b. browsers

Because of their size and cost, these computers are relatively rare.

d. supercomputers

The system component that controls and manipulates data in order to produce information is

called the

d. microprocessor

A system component that translates data and programs that humans can understand into a form

that the computer can process is called a(n)

c. output device

A CD is an example of a(n)

c. optical disc

If you want to communicate a message or persuade other people, you would typically use this

type of software.

d. presentation

Many experts are predicting that this revolution is expected to dramatically affect the way we

communicate and use computer technology.

d. wireless

CHAPTER 2

The Internet was launched in 1969 when the United States funded a project that developed a

national computer network called

d. ARPANET

__ is the most popular Internet activity.

a. communication

A(n) __ program provides access to Web resources.

c. ISP

Rules for exchanging data between computers are called

c. protocols

The last part of the domain name following the dot (.) is the top __ domain.

a. level

__ are widely used to add interest and activity to a Web site by presenting animation, displaying

graphics, providing interactive games, and more.

a. Applets

Unwanted and unsolicited e-mails are called __.

a. spam

Programs that automatically submit your search request to several search engines simultaneously

are called __.

a. metasearch engines

__ cash is the Internet’s equivalent to traditional cash.

d. Digital

These programs allow parents as well as organizations to block out selected sites and set time

limits on Internet access.

b. filters

CHAPTER 3

This type of software works with end users , application software, and computer hardware t

handle the majority of technical details.

d. system software

__ are narrowly focused on specific disciplines and occupations.

c. Specialized applications

The primary purpose of this type of software is to create text-based document.

b. word processing

Organizations create newsletters, manuals, and contracts are all examples of

d. documents

Numbers and formulas entered in a cell are called

a. numeric entries

The acronym DBMS stands for what?

b. database management system

Database __ are primarily used to enter new records and to make changes to exciting records.

c. queries

A file that includes predefined settings that can be used to create many common types of

presentations is called a

c. template

A(n) __ is a single program that provides the functionality of a word processor, spreadsheet,

database manager, and more.

b. integrated package

CHAPTER 4

Graphic programs widely used in the graphic arts profession include __.

a. desktop publishing programs, image editors, and illustration programs

Image editors are used for creating and editing __.

a. bitmap imagine

Programs used to create or modify vector images are called __.

a. illustration programs

Pages in a multimedia presentation typically provide __ or connections to related information.

b. links

When determining the overall objective of a multimedia project, the resources required, and the

people who will work on the project, you are in __ step.

a. planning

Many individuals create their own personal sites called Web logs, or

b. blogs

A special effect in which one image seems to melt into another is referred to as

c. morphing

Users can interact in a fully immersed 3-D environment using __.

b. virtual reality

Fuzzy logic is

a. used to respond to questions in a humanlike way

Robots used in automobile plants would be classified as

b. industrial robots

CHAPTER 5

Software that allows your computer to interact with the user, applications, and hardware is called

c. system software

In order for a computer to understand a program, it must be converted into machine language by

a(n) __.

d. language translator

“GUI” stands for

c. graphical user interface

To connect several computer together, one generally needs to be running a(n) __ operating

system.

a. network

__ is the most widely used operating system.

a. Windows

This operating system is most popular with graphic designers and those who work in multimedia

c. Mac OS

This operating system was originally designed to run on minicomputers used in a network

environment.

b. UNIX

These programs guard your computer against malicious programs that may invade your computer

system.

b. antivirus program

A concentric ring on a hard disk is referred to as a

a. track

Every time the computer system is started ,the operating system loads these into memory.

c. device drivers

CHAPTER 6

The container that house most of the electronic components that make up a computer system

is known as the

d. system unit

The smallest unit in a digital system is a

b. bit

The communication medium for the entire computer system is the

c. motherboard

These provide expansion capability for a computer system.

b. slots

The __tells the rest of the computer how to carry out a program’s instructions.

b. control unit

A 32-bit word computer can access __ bytes at a time.

a. 4

These chips are specifically designed to handle the processing requirements ralated to display

and manipulating 3-D image.

a. graphics coprocessors

This type of memory improves processing by acting as a temporary high-speed holding area

between the memory and the CPU.

c. cache memory

__ is a set of hardware and software standards.

b. Plug and Play

__ ports connect special types of music instruments to sound cards

d. MIDI

CHAPTER 7

Hardware used to translate words, sounds, images, and actions that people understand into a

form that the system unit can process is known as

a. input devices

This type of keyboard provides the greatest amount of flexibility and convenience by eliminating

cables connected to the system unit.

b. wireless keyboard

The mouse __ usually appears in the shape of an arrow.

a. pointer

This type of pointing device is located in the middle of the keyboard.

b. pointing stick

This type of pointing device has crisscrossed invisible beams of infrared light that are protected

with a clear plastic outer layer.

d. touch screen

A universal product code is read by what type of scanner?

a. bar code

__ input devices convert sounds into a form that can be processed by the system unit

d. Audio

The most important characteristic of a monitor is its

c. clarity

Which of the following printer types requires special paper?

d. thermal

__ is a specialized input and output device for receiving and sending voice communication.

b. Internet telephone

CHAPTER 8

Primary storage is referred to as __storage.

a. volatile

The amount of time required by a storage device to retrieve data and programs is its

a. access speed

How tightly the bits can be packed next to one another on a disk is referred to an

c. density

Thick, rigid metal platters that are capable of storing and retrieving information at a high rate of

speed are known as

a. hard disks

The data on an optical disc is represented by flat areas called __ on the disc surface.

c. lands

A CD-RAM disc

a. cannot be erased and rewritten

DVD stands for

c. digital versatile disc

This type of storage device has no moving parts.

d. solid state

Tape is described as using this type of access

d. sequential

Specialized high-capacity secondary storage device designed to meet organizational demands for

data.

c. mass storage

CHAPTER 9

Connectivity is a concept related to

c. using computer networks to link people and resources

The transmission medium that carries the message is referred to as the

b. communication channel

Bluetooth is a type of radio wave information transmission system that is good for about

a. 30 feet

Special high-speed lines used by large corporations to support digital communications are known

as

d. T1, T2, T3 and T4 lines

The rules for exchanging data between computers are called

c. protocols

Two or more computer connected so that they can communicate with each other and share

information are called a

d. network

A device, connected to a network, that shared resources with other nodes is called a

b. server

The arrangement of the computers in a network is called the

b. topology

A way of coordinating the sharing of information and resources is called a network __ .

b. strategy

A(n) __ protects an organization’s network from outside attack.

d. firewall

CHAPTER 10

The standards of moral conduct that control how computers are used are called

a. ethics

The ethical issue that involves who is able to read and use data is

a. access

Two types of cookies are __.

d. ad network and traditional

People who gain unauthorized access to computers for the fun of it, but do not intentionally do

damage, are__

b. hackers

A program that migrates through networks and operating systems by attaching itself to different

programs and databases is a __.

a. virus

An attempt to slow down or stop a computer system or network by flooding the system with

requests for information is called a

c. denial-of-service attack

Secret words or numbers used to gain access to a computer system are called

d. passwords

One of the more common type of technological failures is when your computer experiences too

much electricity. This is known as__

c. a voltage surge

__ is the study of human factors relating to things people use

b. ergonomics

The computer industry response to the Energy Star program is the

d. Green PC

本文标签: 影印版单选题习题