1. A data warehouse is which of the following?
(1) Can be updated by the end users
(2) Contains numerous naming conventions and formats
(3) Organized around important subject areas
(4) Contains only current data
(5) None of these
2. ______________ servers store and manage files for network users.
(1) Authentication
(2) Main
(3) Web
(4) File
(5) None of these
3. All of the following are examples of real security and privacy risks Except _____
(1) hackers
(2) spam
(3) viruses
(4) identify theft
(5) None of these
4.___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(1) Data
(2) Sales
(3) Query
(4) (Point-of-sale (POS)
(5) None of these
5. The OSI model is divided into _______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
6. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
7. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
8. The following are all computing devices, except………?
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
9. In a ring topology , the computer in possession of the ______ can transmit data.
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
10.This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____?
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these
11.________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse
(2) Boot sector
(3) Script
(4) Logic bomb
(5) None of these
12.________ controls the way in which the computer system functions and provides a means : by which users can interact with the computer
(1) The platform
(2) Application software
(3) Operating system
(4) The motherboard
(5) None of these
13. Servers are computers that provide resources to other computers connected to a ___________?
(1) mainframe
(2) network
(3) supercomputer
(4) client
(5) None of these
14. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
15. A database management system (DBMS) is a …………
(1) hardware system used to create , maintain and provide controlled access to a database
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) software system used to create, maintain, and provide uncontrolled access to a database.
(4) is a collection of programs that enables you to store, modify, and extract information from a database
(5) None of these
ANSWERS
1.3
2.4
3.2
4.4
5.3
6.4
7.2
8.3
9.4
10.1
11.2
12.3
13.2
14.3
15.4
(1) Can be updated by the end users
(2) Contains numerous naming conventions and formats
(3) Organized around important subject areas
(4) Contains only current data
(5) None of these
2. ______________ servers store and manage files for network users.
(1) Authentication
(2) Main
(3) Web
(4) File
(5) None of these
3. All of the following are examples of real security and privacy risks Except _____
(1) hackers
(2) spam
(3) viruses
(4) identify theft
(5) None of these
4.___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(1) Data
(2) Sales
(3) Query
(4) (Point-of-sale (POS)
(5) None of these
5. The OSI model is divided into _______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
6. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
7. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
8. The following are all computing devices, except………?
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
9. In a ring topology , the computer in possession of the ______ can transmit data.
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
10.This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____?
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these
11.________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse
(2) Boot sector
(3) Script
(4) Logic bomb
(5) None of these
12.________ controls the way in which the computer system functions and provides a means : by which users can interact with the computer
(1) The platform
(2) Application software
(3) Operating system
(4) The motherboard
(5) None of these
13. Servers are computers that provide resources to other computers connected to a ___________?
(1) mainframe
(2) network
(3) supercomputer
(4) client
(5) None of these
14. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
15. A database management system (DBMS) is a …………
(1) hardware system used to create , maintain and provide controlled access to a database
(2) hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) software system used to create, maintain, and provide uncontrolled access to a database.
(4) is a collection of programs that enables you to store, modify, and extract information from a database
(5) None of these
ANSWERS
1.3
2.4
3.2
4.4
5.3
6.4
7.2
8.3
9.4
10.1
11.2
12.3
13.2
14.3
15.4
No comments:
Post a Comment