[ report this test ]
BTM 200 Review
50 multiple choice question to help review. There is only 1 (one) correct answer to each question.
The study of the general nature of morals and of the specific moral choices individuals make is called ________.
A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency.
A person who does not conform to the approved standards of social or professional behaviour ________.
violates socail norms
practices situational ethics
follows rule utilitarianism
commits unethical behaviour
________ is the theory that holds that actions that generate greater happiness are judged to be better than actions that lead to unhappiness.
An Apple iPad and a Microsoft Surface are examples of ________ computers.
The ________ contains the central electronic components of the computer.
Arithmetic Logi Unit (ALU)
A(n) ________ is an input device that looks like a pen.
Apple's OS X and Microsoft Windows are examples of ________ software.
Which of the following is NOT one of the four major functions of a computer?
Which of the following display screens does not require a backlight to function?
organic light-emitting diode (OLED) display
liquid crystal display (LCD)
light-emitting diode (LED) display
cathode ray tube (CRT)
What type of printer sprays tiny drops of ink onto paper?
When buying a monitor, which factor is NOT important to consider?
You are most likely to find an RTOS ______.
on a supercomputer.
on an iPad.
on a mainframe.
in a robotic camera.
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
Which of the following capabilities of UNIX is false?
It is multi-user.
It is multi-tasking
It is a network operating system.
It is only for super computers.
Most smartphones use operating systems developed by ________.
Google and Apple
Apple and Microsoft
Microsoft and Google
Symbian and Apple
______ regroups related pieces of files on the hard disk.
Software that is available on demand via the Internet is called
Software as a Service (SaaS).
open source software.
Which type of program takes advantage of automatic recalculation and what-if analysis?
Which of the following is true about open source software?
The program code is confidential.
The program can be changed and is freely distributed.
The program can be freely distributed as long as the program code is not changed.
The program code is subject to copyright protection.
Which of the following statements about compressed audio files is FALSE?
WAV is a compressed audio file format.
he sound is noticeably different on compressed audio files than on uncompressed audio files.
Compressed audio files have a smaller file size than uncompressed audio files.
Downloaded songs are compressed audio files.
RAM is an example of ________ storage.
Which of the following activities is carried out by the ALU?
Moves read/write heads
Performs arithmetic calculations
Creates virtual memory
Renders video images
How do optical discs store data?
A laser burns tiny pits onto a platter.
A magnet aligns iron particles on a platter.
Electronic memory records data on chips.
A digital spectrometer leaves grooves in a platter.
Which of the following is the lightest computer?
In most current systems, ________ is the type of RAM used.
To securely erase data, the U.S. Department of Defense suggests that data be ________.
overwritten multiple times
Which of the following is NOT a permanent storage option?
Random access memory
Internal hard drive
All of the following are part of the machine cycle EXCEPT ________.
Which network device acts as a traffic signal on a network?
a network navigation device
a network navigation device
The current standard for home wireless Ethernet networks is:
all of the above
The type of network used for communication among a laptop and smartphone using Bluetooth is a:
The fastest broadband Internet service is usually _______.
The device used to move data between two networks is called a:
wireless range extender
How can you tell what wireless devices are connected to your router?
Look at the deviceâ€™s wireless settings.
Look at the router itself.
Log-in to the routerâ€™s IP address and check the configuration page.
All of the above.
All of the following are methods to secure your wireless network except:
changing your network name (SSID).
creating a passphrase.
disabling SSID broadcast.
What would you use to see what network adapters are installed in your Windows computer?
the Ethernet Manager utility
the Device Manager utility
the Programs and Utilities manager
the Home Network manager
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.
A ________ enables the computer to drive the speaker system.
_______ software helps run the computer and coordinates instructions between other software and the hardware devices.
A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as ______.
Deleted files on a Mac computer are moved to the ________.
The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as ______.
Small text files that some websites automatically store on your computerâ€™s hard drive are known as ______.
Firewalls work by closing ___________ in your computer.
A large group of software programs used to launch coordinated DoS attacks is known as a __________.
Viruses that are often launched from infected USB drives left in a computer are known as ______.
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ______________ attack.
A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as ______.
[ edit test ]