130 likes | 538 Views
ICS 100 – Example/Practice Quiz – Chapter 1 & 2. Spring 2007 1/24/07. All of the following are examples of real security and privacy risks EXCEPT: . spam. Viruses. hackers. identity theft. .
E N D
ICS 100 – Example/Practice Quiz – Chapter 1 & 2 Spring 2007 1/24/07
All of the following are examples of real security and privacy risks EXCEPT: • spam. • Viruses. • hackers. • identity theft.
________ is the science that attempts to produce machines that display the same type of intelligence that humans do • Nanotechnology • Artificial intelligence (AI) • Simulation • Nanoscience
________ is data that has been organized or presented in a meaningful fashion. • Software • A program • A process • Information
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: • data. • the process. • input. • output.
________ is any part of the computer that you can physically touch • A peripheral • A device • An application • Hardware
The most common keyboard uses the ________ layout • Alpha • Numeric • Dvorak • QWERTY
The ________ is the largest and most important chip in the computer. • RAM chip • memory chip • motherboard • central processing unit (CPU)
The hard disk drive is considered ________ storage. • legacy • temporary • nonvolatile • read-only
Data can be a number, a word, a picture, or a sound. • TRUE • FALSE
The four main functions of a computer are: input the data, process the data, output the data or information, and communicate the data or information. • TRUE • FALSE • Input process output store data
The Windows key is on both PC and Macintosh keyboards. • TRUE • FALSE • Windows key not on a Mac
Modern operating systems recommend that users shut down the system by pushing the main power button. • TRUE • FALSE • Shut Down Through OS using the Mouse • “Start Turn Off Computer” in Windows