[ report this test ]

BTM 200 Review

50 multiple choice question to help review. There is only 1 (one) correct answer to each question.



1)

The study of the general nature of morals and of the specific moral choices individuals make is called ________.

 
 
 
 

2)

A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency.

 
 
 
 

3)

A person who does not conform to the approved standards of social or professional behaviour ________.

 
 
 
 

4)

________ is the theory that holds that actions that generate greater happiness are judged to be better than actions that lead to unhappiness.

 
 
 
 

5)

An Apple iPad and a Microsoft Surface are examples of ________ computers.

 
 
 
 

6)

The ________ contains the central electronic components of the computer.

 
 
 
 

7)

A(n) ________ is an input device that looks like a pen.

 
 
 
 

8)

Apple's OS X and Microsoft Windows are examples of ________ software.

 
 
 
 

9)

Which of the following is NOT one of the four major functions of a computer?

 
 
 
 

10)

Which of the following display screens does not require a backlight to function?

 
 
 
 

11)

What type of printer sprays tiny drops of ink onto paper?

 
 
 
 

12)

When buying a monitor, which factor is NOT important to consider?

 
 
 
 

13)

You are most likely to find an RTOS ______.

 
 
 
 

14)

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.

 
 
 
 

15)

Which of the following capabilities of UNIX is false?

 
 
 
 

16)

Most smartphones use operating systems developed by ________.

 
 
 
 

17)

______ regroups related pieces of files on the hard disk.

 
 
 
 

18)

Software that is available on demand via the Internet is called

 
 
 
 

19)

Which type of program takes advantage of automatic recalculation and what-if analysis?

 
 
 
 

20)

Which of the following is true about open source software?

 
 
 
 

21)

Which of the following statements about compressed audio files is FALSE?

 
 
 
 

22)

RAM is an example of ________ storage.

 
 
 
 

23)

Which of the following activities is carried out by the ALU?

 
 
 
 

24)

How do optical discs store data?

 
 
 
 

25)

Which of the following is the lightest computer?

 
 
 
 

26)

In most current systems, ________ is the type of RAM used.

 
 
 
 

27)

To securely erase data, the U.S. Department of Defense suggests that data be ________.

 
 
 
 

28)

Which of the following is NOT a permanent storage option?

 
 
 
 

29)

All of the following are part of the machine cycle EXCEPT ________.

 
 
 
 

30)

Which network device acts as a traffic signal on a network?

 
 
 
 

31)

The current standard for home wireless Ethernet networks is:

 
 
 
 

32)

The type of network used for communication among a laptop and smartphone using Bluetooth is a:

 
 
 
 

33)

The fastest broadband Internet service is usually _______.

 
 
 
 

34)

The device used to move data between two networks is called a:

 
 
 
 

35)

How can you tell what wireless devices are connected to your router?

 
 
 
 

36)

All of the following are methods to secure your wireless network except:

 
 
 
 

37)

What would you use to see what network adapters are installed in your Windows computer?

 
 
 
 

38)

Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.

 
 
 
 

39)

A ________ enables the computer to drive the speaker system.

 
 
 
 

40)

_______ software helps run the computer and coordinates instructions between other software and the hardware devices.

 
 
 
 

41)

A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as ______.

 
 
 
 

42)

Deleted files on a Mac computer are moved to the ________.

 
 
 
 

43)

The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.

 
 
 
 

44)

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ______.

 
 
 
 

45)

Small text files that some websites automatically store on your computerâs hard drive are known as ______.

 
 
 
 

46)

Firewalls work by closing ___________ in your computer.

 
 
 
 

47)

A large group of software programs used to launch coordinated DoS attacks is known as a __________.

 
 
 
 

48)

Viruses that are often launched from infected USB drives left in a computer are known as ______.

 
 
 
 

49)

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ______________ attack.

 
 
 
 

50)

A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as ______.

 
 
 
 


[ report this test ]

[ edit test ]

Copyright ©2005-2017 Darrell C. Sydlo ---- Privacy Policy ---- Contact ----
NerdTests.com - Make Your Online Test or Quiz!