In this Chapter You Learned How to

Concepts Assessments

Matching

Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.

_____

1.

Computer programs.

A

Application software

_____

2.

Programs that enable you to accomplish the tasks and use the computer in a productive manner.

B

Computer

_____

3.

Two or more computers connected together to enable resource sharing.

C

Computer network

_____

4.

Used to manage network resources, this type of computer can be dedicated to a specific task.

D

Console/system unit

_____

5.

Floppy disks use this type of storage media.

E

CPU

_____

6.

The layout or design/arrangement of computers connected to a network.

F

Hardware

_____

7.

Peripheral devices use this to attach to the computer.

G

Magnetic

_____

8.

An electronic system that contains input, processing, output, and storage units.

H

Memory (RAM)

_____

9.

The physical components of a computer system.

I

Motherboard/system board

_____

10.

Hardware connected outside the main computer system unit.

J

Peripherals

_____

11.

The hardware unit that contains the CPU, memory, hard disk, and power supply.

K

Ports

_____

12.

The unit that contains the circuitry that enables a computer system to operate.

L

Server

_____

13.

The temporary storage available inside the computer.

M

Software

_____

14.

The processing unit.

N

Spyware

_____

15.

Threatens privacy.

O

Topography


Fill in the Blank

Write the correct answer in the space provided.

1.

Used to perform complex, dedicated tasks, the __________ is the fastest and most expensive computer.

2.

The four basic functions of a computer are __________, __________, __________, and __________.

3.

Someone with the basic skills and knowledge of a responsible computer user is considered to be computer __________.

4.

Personal digital assistants (PDAs) are also known as __________ computers.

5.

__________ is data that has been processed and presented in an organized format.

6.

The control unit and the arithmetic logic unit are located in the __________.

7.

__________ measures how quickly the CPU processes data.

8.

An object connected to a network is known as a(n) __________.

9.

A(n) __________ network is often found in homes and allows each node to communicate with all the others.

10.

A(n) __________ records system settings and can be used to rollback a system to an earlier date in case a software installation has unexpected results.

11.

When information is displayed on a monitor it is known as __________ copy.

12.

The number of pixels displayed on the screen determines a monitor's __________.

13.

__________ printers use a drum and toner in the printing process.

14.

The quality of a printed page is measured in dpi, which is an acronym for __________.

15.

The point-and-click format that modern operating systems use is called a(n) __________.


Multiple Choice

Circle the letter of the item that correctly answers the question.

1.

Which of the following requires one byte of storage?

  1. Page
  2. Paragraph
  3. Sentence
  4. Character

2.

Which of the following terms represents the fastest computer speed?

  1. 733 MHz
  2. 286 MHz
  3. 2 GHz
  4. 2 GB

3.

Which of the following is not an input device?

  1. Keyboard
  2. Speaker
  3. Mouse
  4. Stylus

4.

Which of the following is an example of optical storage?

  1. Disk drive
  2. Monitor
  3. Memory
  4. Compact disc

5.

Which of the following is not a type of computer?

  1. Mainframe
  2. Multitask
  3. Minicomputer
  4. Supercomputer

6.

Before a computer can process data, where must it be stored?

  1. On a disk
  2. In computer memory
  3. In the control unit
  4. On the monitor

 
7.

What term, related to computers, means billions?

  1. Byte
  2. Mega
  3. Giga
  4. Hertz

8.

Which of the following is not a type of microcomputer?

  1. Desktop
  2. Notebook
  3. Personal digital assistant
  4. Microprocessor

9.

Which of the following can make a computer invisible to hackers?

  1. Disk defragmenter
  2. Antivirus software
  3. Firewall
  4. Key logger

10.

Which of the following is capable of opening a "back door" on a computer and is able to spread without human interaction?

  1. Trojan horse
  2. Worm
  3. Adware
  4. Zombie

Word 2003

Категории