cmcps

61
VIRUS , ANTIVIRUS AND NETWORK SECURITY Practice set networking and security: connecting computers and keeping them safe from hackers and viruses MULTIPLE CHOICE: 1. Which of the following is NOT an example of a network node? A. printer B. computer C. NOS network operating system D. modem 2. The network architecture used in most home networks is: A. client-server LAN. B. peer-to-peer LAN. C. client-server WAN. D. peer-to-peer WAN. 3. You must install a(n) ____________ on a network if you want to share a broadband Internet connection. A. router B. modem C. node D. cable 4. Which of the following statements concerning peer-to-peer networks is FALSE? A. A peer-to-peer network is the most common example of a locally controlled network. B. Peer-to-peer networks cost more than client/server networks and are more difficult to maintain. C. Each node on a peer-to-peer network can communicate directly with every other node on the network. D. Peer-to-peer networks are the most common type of home network. 5. The design of the network is called the network: A. architecture. B. server. C. transmission. D. type. 6. Data transfer rate (also called bandwidth) is the ____________ speed at which data can be transmitted between two nodes on a network. A. average B. minimum C. actual D. maximum 7. ____________ are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks). A. NICs B. Routers C. Switches D. Modems

Upload: g24uall

Post on 24-Oct-2015

47 views

Category:

Documents


0 download

DESCRIPTION

gg

TRANSCRIPT

Page 1: cmcps

VIRUS , ANTIVIRUS AND NETWORK SECURITYPractice setnetworking and security: connecting computers and keeping them safe from hackers and viruses

MULTIPLE CHOICE:

1.             Which of the following is NOT an example of a network node?A.     printerB.     computerC.     NOS network operating systemD.     modem

2.             The network architecture used in most home networks is:A.     client-server LAN.B.     peer-to-peer LAN.C.     client-server WAN.D.     peer-to-peer WAN.

3.             You must install a(n) ____________ on a network if you want to share a broadband Internet connection.

A.     routerB.     modemC.     nodeD.     cable

4.             Which of the following statements concerning peer-to-peer networks is FALSE?A.     A peer-to-peer network is the most common example of a locally controlled network.B.     Peer-to-peer networks cost more than client/server networks and are more difficult to maintain.C.     Each node on a peer-to-peer network can communicate directly with every other node on the network.D.     Peer-to-peer networks are the most common type of home network.

5.             The design of the network is called the network:A.     architecture.B.     server.C.     transmission.D.     type.

6.             Data transfer rate (also called bandwidth) is the ____________ speed at which data can be transmitted between two nodes on a network.

A.     averageB.     minimumC.     actualD.     maximum

7.             ____________ are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks).

A.     NICsB.     RoutersC.     SwitchesD.     Modems

8.             Which of the following statements is FALSE concerning Ethernet networks?A.     Cat 5e UTP cable is recommended for Ethernet networks.B.     Cat 5 UTP supports a data transmission rate of 1 Gbps.C.     Ethernet typically uses an RJ-45 connector.D.     When using UTP, a cable run cannot exceed 328 feet.

9.             Devices installed on long cable runs to amplify the signal are called:A.     repeaters.B.     adapters.C.     switches.D.     routers.

10.         A network navigation device that merely retransmits a signal to all other nodes attached to it is a(n):A.     router.

Page 2: cmcps

B.     NIC. C.     hub. D.     adapter.

11.         The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n):

A.     router.B.     switch.C.     NIC.D.     adapter.

12.         A ____________ is a device, contained in a wireless network adapter, that translates the electronic data on a network into radio waves and broadcasts the radio waves to other nodes on the network.

A.     routerB.     switchC.     hubD.     transceiver

13.         A switch is also known as a(n):A.     smart hub.B.     DSL modem.C.     smart router.D.     cable modem.

14.         When creating a phone line network, it is necessary to install a(n) ____________ adapter.A.     wirelessB.     phone cordC.     home phoneline networkD.     Digital Subscriber Line (DSL)

15.         ____________ adapters, used on a power-line network, are available in either USB or Ethernet versions.

A.     Power-line networkB.     Peer-to-peer networkC.     Phoneline networkD.     Wireless network

16.         All of the following statements concerning client/server networks are true EXCEPT:A.     one computer on a client/server network must act as a server.B.     there is no centralized security or administration on a client/server network.C.     most networks that have 10 or more nodes are client/server networks.D.     the Internet is an example of a client/server network.

17.         Which of the following types of network adapter card is most likely to be preinstalled in a typical home computer?

A.     EthernetB.     power-line adapterC.     wireless adapterD.     HPNA adapter

18.         If a home network is connected to the Internet a ____________ is required to send data between the two networks.

A.     routerB.     repeaterC.     switchD.     network operating system

19.         CAT 5, CAT 5E, and CAT 6 are all types of:A.     network adapters.B.     Ethernet ports.C.     UTP cables.D.     connector jacks.

20.         A wireless network uses ____________ as its transmission media.A.     cablesB.     radio wavesC.     twisted pair D.     fiber optics

Page 3: cmcps

21.         The main difference between the various 802.11 standards is the:A.     data transfer rate.B.     maximum allowable cable length.C.     simplicity of installation.D.     collision detection rate.

22.         The transceiver is the device that converts electronic data into ____________ for broadcast to other network nodes.

A.     packetsB.     radio wavesC.     WAPsD.     802.11 standards

23.         If you wish to extend the length of the network without having the signal degrade, you would use a:A.     repeater.B.     router.C.     gateway.D.     switch.

24.         If computers in a wireless network are unable to connect to the wireless router, adding a(n) ____________ extends the range of the wireless network by providing a second point to which the nodes can connect to the network.

A.     routerB.     Internet portalC.     cable modemD.     wireless access point

25.         In network terminology, a(n) ____________ is a wireless router that combines the capabilities of a wired router with the ability to receive wireless signals.

A.     hubB.     gatewayC.     adapterD.     Ethernet port

26.         If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice?

A.     EthernetB.     wirelessC.     power-lineD.     phoneline

27.         The ____________ operating system assists with configuring home networks with a Network Setup Wizard.

A.     Windows 98B.     Windows MEC.     Windows XPD.     DOS

28.         In a(n) ____________ network, any electrical outlet provides a network connection.A.     wirelessB.     power-lineC.     phonelineD.     Ethernet

29.         In a(n) ____________ network, any phone jack provides a network connection.A.     phonelineB.     power-lineC.     802.11gD.     Ethernet

30.         A computer virus attaches itself to and attempts to hide within the code of a(n) ____________ program.

A.     zombieB.     Trojan horseC.     host

Page 4: cmcps

D.     worm

31.         ____________ viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded.

A.     ZombieB.     Trojan horseC.     WormD.     Boot-sector

32.         ____________ viruses are often transmitted by a floppy disk left in the floppy disk drive.A.     Boot-sectorB.     Trojan horseC.     ScriptD.     Logic bomb

33.         ____________ are viruses that are triggered when certain logical conditions are met.A.     Boot-sector virusesB.     Logic bombsC.     Macro virusesD.     Worms

34.         ____________viruses attach themselves to documents such as Word and Excel.A.     Boot-sectorB.     Trojan horseC.     DOSD.     Macro

35.         A numbered communication gateway or path, used to organize requests for information, that is assigned for a commonly used network service such as SMTP or HTTP is called a:

A.     protocol.B.     physical port.C.     logical port.D.     packet filter.

36.         Which of the following would most likely NOT be a symptom of a virus?A.     Existing program files and icons disappear.B.     The CD-ROM stops functioning.C.     The Web browser opens to an unusual home page.D.     Odd messages or images are displayed on the screen.

37.         Blocking access to logical ports is a common method used by ____________ for maximizing computer security.

A.     switchesB.     Web browsersC.     firewallsD.     access points

38.         ____________ are a series of commands, actually mini programs that are executed without your knowledge.

A.     ScriptsB.     Trojan horsesC.     WormsD.     Boot-sector viruses

39.         A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as:

A.     packet filtering.B.     logical port blocking.C.     Network Address Translation.D.     network key distribution.

40.         Classifications of viruses by the methods they take to avoid detection by antivirus software include all of the following EXCEPT:

A.     polymorphic.B.     multipartite.C.     encryption.

Page 5: cmcps

D.     stealth.41.         The purpose of Network Address Translation is to:

A.     translate an IP address to a text-based URL.B.     hide user IP addresses from the Internet.C.     convert logical ports to physical port configurations.D.     dynamically assign IP addresses via an ISP.

42.         When you set up a router for a wireless network, the router uses a default network name known as the:

A.     service set identifier (SSID).B.     router address.C.     MAC address.D.     IP identifier.

43.         Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of:A.     packet filtering services.B.     network address translation protocols.C.     security protocols.D.     service set identifiers.

44.         A ____________ is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests.

A.     zombieB.     wormC.     DoSD.     Trojan horse

45.         Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) use ____________ to protect data.

A.     packet filteringB.     network address translationC.     encryptionD.     service set identifiers

46.         ____________ are viruses that are triggered by the passage of time or on a certain date.A.     Boot-sector virusesB.     Macro virusesC.     Time bombsD.     Worms

47.         Unlike other viruses, ____________ are viruses that can run independently of host file execution and are much more active in spreading themselves.

A.     boot-sector virusesB.     time bombsC.     Trojan horsesD.     worms

48.         ____________ viruses temporarily erase their code from the files where they reside and hide in active memory.

A.     MultipartiteB.     StealthC.     PolymorphicD.     Script

49.         All of the following are recommended to secure a wireless network EXCEPT:A.     changing the default password on your router.B.     turning on security protocols.C.     using static IP addressing.D.     restricting access to the network to certain MAC addresses.

50.         If a virus signature or other suspicious activity is detected by the antivirus software, it places the virus in a secure area of the hard drive so that it won’t spread infection to other files. This procedure is known as:

A.     inoculation.B.     automatic updating.C.     encryption.

Page 6: cmcps

D.     quarantining.

FILL IN THE BLANK:

51.         The Internet is a good example of a(n) ____________ network.Answer: client/server      52.         A(n) ____________ network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network.Answer: peer-to-peer (P2P)  53.         A(n) ____________ network is one in which the nodes are located within a small geographical area.Answer: local area network (LAN54.         ____________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.Answer: Coaxial        55.         Normal telephone wire is composed of ____________ cable, which consists of copper wires wrapped around each other and covered in a plastic jacket.Answer: twisted pair                56.         All network nodes (computers and peripherals) are connected to each other and to the network by ____________.Answer: transmission media        57.         ____________ transfer packets of data between two or more networks.Answer: Routers                     58.         Bundles of data sent over transmission media are called ____________.Answer: packets                      59.         The 802.11 wireless standard is also known as ____________.Answer: WiFi (Wireless Fidelity)  60.         Windows Server 2003 is an example of specialized software known as ____________ software.Answer: network operating system (NOS)   61.         ____________ viruses, the newest form of virus, compress common data files into a file using a complex encryption key rendering your files unusable.Answer: Encryption                62.         A(n) ____________ is required for each node on a wireless network .Answer: wireless network adapter      63.         The best defense against viruses is to install ____________, which is software specifically designed to detect viruses and protect your computer.Answer: antivirus software    64.         When setting up a network, each computer on the network needs a(n) ____________ so that the network can identify it and know which computer is requesting data and services so that the data can be delivered correctly.Answer: unique name      65.         ____________ networks move data through the network using conventional phone lines.Answer: Phone line                  66.         When setting up a wireless network, using Windows XP, the ____________ encryption is recommended for the best security.Answer: WPA   Wi-Fi Protected Access     67.         Using millions of computers during their inactive periods to provide a network-based maximization of productivity is called ____________ computing.Answer: grid         68.         Anyone who breaks into a computer system (an individual computer or a network) is generally referred to as a(n) ____________.Answer: hacker                       69.         A(n) ____________ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data to use for illegal purposes.Answer: packet sniffer            70.         A(n) ____________ is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background.Answer: Trojan horse              71.         When legitimate users are denied access to a computer system due to repeated bogus requests made by a hacker through a “zombie” computer systems, this is called a(n) ____________.Answer: denial of service (DoS) attack     72.         ____________ is characterized by someone using personal information about you to assume your identity for the purpose of defrauding others.Answer: Identity theft             73.         ____________ are software programs or hardware devices designed to keep computers safe from hackers.Answer: Firewalls                    74.         128.15.9.21 is an example of a(n) ____________.Answer: Internet Protocol (IP) address                                                                       

Page 7: cmcps

75.         The process firewalls use to assign internal IP addresses on a network (which are not shared with devices not on the network) so the address is safe from hackers is called ____________.Answer: Network Address Translation (NAT)                                                           

TRUE AND FALSE:76.         Wide Area Networks (WANs) are made up of LANs connected over long distances.Answer: True                           77.         Networking standards set by organizations such as the IEEE make it easier for manufacturers to produce devices that work with a variety of computers and peripherals.Answer: True        78.          Throughput is the maximum speed at which data can be transferred.Answer: False (Data transfer rate / bandwidth)  79.         Public places at which you can wirelessly connect to the Internet are known as “hot spots.”Answer: True                          80.         A Trojan horse program can install backdoor programs that allow hackers to take almost complete control of your computer without your knowledge.Answer: True                          81.         If a firewall is configured to ignore all incoming packets on a particular logical port, this is known as packet filtering.Answer: False (logical port blocking)  82.         Static addressing means retaining the same IP address for a period of time.Answer: True                          83.         Dynamic addressing makes broadband users more vulnerable to hackers because the hackers have a more permanent IP address with which to locate the computer.Answer: False (Static)             84.         Some popular software firewalls are BlackICE PC Protection and ZoneAlarm.Answer: True                      85.         Mac OS X does not support peer-to-peer networking.Answer: False (it does)             86.         LANs are made up of WANs connected over long distances.Answer: False (WANs are made up of LANs)      87.         A computer virus’s main purpose is to replicate itself and copy its code to as many other files as possible.Answer: True                          88.         Time bombs are viruses that are triggered when certain logical conditions are met.Answer: False (logic bombs) 

MATCHING:

89.         Match the following devices to their purposes:            I.    switch                    A. enables individual nodes to communicate in a network            II.   adapter                   B. converts digital signals to radio waves            III. repeater                  C. facilitates data packet transmission            IV. wireless transceiver   D. sends data packets between networks            V.  router                     E. amplifies signals to prevent degradation on long cablesAnswer: C, A, E, B, D             

90.         Match the following terms to their meanings:            I.    packet                    A. software that controls an installed hardware device            II.   Wi-Fi                     B. server-side software that controls network communications            III. driver                     C. unit of data transmitted in a network            IV. NOS                       D. software that is written to read-only memory            V.  firmware                E. another name for the 802.11 standardAnswer: C, E, A, B, D             

91.         Match the following computer threats to their meanings:            I.    logic bomb             A. virus that executes based on specified conditions            II.   Trojan horse          B. software allowing hackers to take control of a computer            III. backdoor program C. simultaneous requests from multiple zombie computers            IV. DDoS                     D. program appearing to do useful work but doing harm in the background            V.  worm                     E. infectious program that runs independent of host files

Page 8: cmcps

Answer: A, D, B, C, E             

92.         Match the following terms to their meanings:            I.    logical port             A. technique of assigning hidden internal IP addresses protected from hackers            II.   packet filtering       B. virtual communication gateway for a specific service, such as HTTP or FTP            III. static address         C. method for selectively allowing certain requests to access ports            IV. firewall                  D. hardware or software for protecting computers from hackers            V.  NAT                      E. IP number that is typically assigned for a long period of timeAnswer: B, C, E, D, A             

93.         Match the following acronyms to their meanings:            I.    WAN                     A. protocol for Internet-based e-mail formats            II.   Mbps                     B. type of transmission medium            III. HPNA                    C. measure of data transfer            IV. UTP                       D. type of network adapter            V.  SMTP                     E. network spanning a large geographical areaAnswer: E, C, D, B, A             

94.         Match the following acronyms to their definitions:            I.    HTTP                     A. protects IP addresses from hackers            II.   SMTP                     B. a protocol associated with Web pages            III. HPNA                    C. a protocol used for e-mail            IV. WAP                      D. an access point on a wireless network            V.  NAT                      E. a network adapter used on a phoneline networkAnswer: B, C, E, D, A             

95.         Match the following terms to their meanings:            I.    Wi-Fi                     A. a virus that changes its own code to avoid detection            II.   packet sniffer        B. addresses are assigned out of available pool of IP addresses            III. polymorphic virus C. also known as the 802.11 wireless standard            IV. dynamic addressing     D. a computer controlled by a hacker            V.  zombie                   E. a program that looks at each packet as it travels over the networkAnswer: C, E, A, B, D              96.         Match the following acronyms to their definitions:            I.    FTP                        A. Internet service provider            II.   UTP                       B. a protocol used on the Internet for sending and receiving files            III. ISP                         C. a type of denial of service attack            IV. DDOS                    D. type of cable            V.  IP                           E. part of the TCP/IP suite of protocolsAnswer: B, D, A, C, E             

97.         Match the following terms to their meanings:            I.    firmware                      A. a list of commands (mini program) that is executed            II.   computer virus             B. a program that executes whenever the computer boots up            III. script                            C. read-only memory (ROM) that has software written to it            IV. Master Boot Record     D. a short series of commands that automates repetitive tasks

      V.  macro      E. a program that attaches itself to another program and attempts to spread  itself to other computers through the exchange of files

Answer: C, E, A, B, D             

98.         Match the following acronyms to their definitions:            I.    WPA                      A. unique number assigned to the network adapter by the manufacturer            II.   SSID                      B. wireless security protocol            III. MAC                      C. provides a means of wirelessly connecting to a network            IV. WAP                      D. default network name used by a router            V.  WAN                     E. network made up of LANsAnswer: B, D, A, C, E             

99.         Match the following terms to their meanings:            I.    bandwidth                    A. these devices handle data traffic between networks            II.   throughput                   B. these devices handle data traffic between nodes on the same network            III. routers                         C. maximum speed at which data can be transmitted            IV. switches                      D. a unique number assigned by the manufacturer to every NIC

      V.  MAC address               E. actual speed of data transferAnswer: C, E, A, B, D             

Page 9: cmcps

100.     Match the following terms to their meanings  I.  server A. two or more computers connected together via software so they can communicate          II.   client                    B. can be a computer, peripheral, or communication device         III. network                 C. a network device that retransmits a signal to all nodes attached to it        IV. node                      D. accomplishes specific tasks and makes requests on the network

            V.  hub                        E. provides information, resources, and central control for functions on a networkAnswer: E, D, A, B, C             

HARDWARE MULTIPLE CHOICE:

1.             Any computer parts that you can actually touch are considered to be:A.     hardware.B.     software.C.     systems.D.     platforms. 

2.             The box that contains the central electronic components of the computer is the:A.     motherboard.B.     system unit.C.     peripheral.D.     input device.

3.             Devices, such as monitors and printers, that are connected to the computer are called:A.     processing devices.B.     system devices.C.     peripheral devices.D.     input devices.

4.             A(n) ____________device enables you to enter data and instructions into the computer.A.     inputB.     outputC.     digitalD.     CRT

5.             A ____________, when attached to a computer, can translate a user’s handwriting into digital input.A.     microphoneB.     graphics tabletC.     digital cameraD.     keyboard

6.             The most common input devices are the ____________ and the ____________.A.     microphone, printerB.     scanner, monitorC.     digital camera, speakersD.     keyboard, mouse

7.             The most common keyboard uses the ____________ layout.A.     DvorakB.     numericC.     QWERTYD.     alpha

8.             The ____________ on the keyboard enables you to enter numbers quickly.A.     alphabetic keysB.     numeric keypadC.     Control keysD.     Function keys

9.             ____________ designed keyboards provide a more natural typing position for a user’s hands and help prevent repetitive strain injuries.

A.     AlphabeticB.     QWERTY

Page 10: cmcps

C.     DvorakD.     Ergonomically

10.         The ____________ key and the ____________ key can be used in combination with other keys to perform shortcuts and special tasks.

A.     Control, AltB.     Function, toggleC.     Delete, InsertD.     Caps Lock, Num Lock

11.         The Delete key, Num Lock key, and Caps Lock key are considered ____________ keys because their function changes each time you press them.

A.     FunctionB.     toggleC.     cursor controlD.     Control

12.         ____________ keyboards are more compact and generally have fewer keys.A.     LaptopB.     WindowsC.     MacintoshD.     QWERTY

13.         An I-beam or an arrow is known as the mouse:A.     control.B.     button.C.     input.D.     pointer.

A ____________ is the traditional way to enter data into a PDA and can be used on Tablet PCs for handwriting recognition.

E.      joystickF.      trackballG.     mouseH.     stylus

      14.         The small, touch-sensitive screen at the base of the keyboard on a laptop is known as the:

A.     stylus.B.     touchpad.C.     game control.D.     trackball.

15.         A _______ allows you to capture sound waves and transfer them to digital format on your computer.A.     speakerB.     microphoneC.     keyboardD.     stylus

16.         A ____________ is an output device that creates tangible hard copies.A.     monitorB.     printerC.     scannerD.     CRT

17.         The type of monitor that looks like a traditional television set is called a ____________ monitor.A.     displayB.     cathode-ray tube (CRT)C.     liquid crystal display (LCD)D.     flat-panel

      18.         ____________ monitors use a technology similar to that used in digital watches.

A.     Cathode-ray tube (CRT)B.     GraphicsC.     Electron beamD.     Liquid crystal display (LCD)

      

Page 11: cmcps

19.         The ____________ is the number of times per second the electron beam scans the monitor and recharges the illumination of each pixel.

A.     refresh rateB.     sharpnessC.     resolutionD.     dot pitch

20.         ____________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.A.     InkjetB.     ImpactC.     NonimpactD.     Laser

21.         Inkjet printers and laser printers are examples of ____________ printers.A.     nonimpactB.     impactC.     dot-matrixD.     thermal

22.         ____________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.

A.     Dot-matrix printersB.     Thermal printersC.     Multifunction printersD.     Plotters

23.         A printer’s speed is measured in:A.     dots per inch (dpi).B.     color output.C.     megabytes.D.     pages per minute (ppm).

24.         Restarting the system when it is already powered on is called:A.     hibernation.B.     standby mode.C.     a warm boot.D.     a cold boot.

25.         ____________ is when the computer saves an image of the desktop and powers down.A.     Standby modeB.     A warm bootC.     HibernationD.     A cold boot

26.         ____________ is when the more power-hungry components, such as the monitor and the hard drive, are put in idle.

A.     HibernationB.     Standby mode C.     Power down D.     The shutdown procedure

27.         ____________ data and programs are stored in the hard drive.A.     RandomB.     VolatileC.     NonpermanentD.     Permanent

28.         Hard disk drives are considered ____________ storage.A.     nonvolatileB.     flashC.     temporaryD.     nonpermanent

29.         All of the following storage media have Read and Write capabilities EXCEPT:A.     flash memory cards.B.     CD-ROMs.

Page 12: cmcps

C.     hard disk drives.D.     floppy disks.

30.         ____________ are devices used to transmit data over telecommunications lines.A.     DrivesB.     Drive baysC.     ModemsD.     Platforms

31.         The ____________ port sends data one bit at a time and is often used to connect a modem to the computer.

A.     USBB.     serialC.     parallelD.     FireWire

32.         The ____________ port transmits data in groups of bits, is faster than a serial port, and is generally used to connect a printer.

A.     EthernetB.     peripheralC.     connectivityD.     parallel

33.         USB ports are fast replacing traditional ____________ and ____________ ports because of their ability to transfer data quickly.

A.     parallel, serialB.     Ethernet, speakerC.     video, audioD.     monitor, modem

34.         The ____________ port resembles a standard phone jack.A.     FireWireB.     peripheralC.     modemD.     serial

35.         The ____________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.

A.     motherboardB.     CPUC.     RAMD.     power supply

36.         The ____________ enables your computer to connect to other computers.A.     video cardB.     network interface card (NIC)C.     sound cardD.     controller card

37.         ____________ plug into the expansion slots on the motherboard.A.     PortsB.     Expansion boardsC.     USB devicesD.     Drive bays

38.         ____________ is referred to as primary storage.A.     RAMB.     ROMC.     The CPUD.     The system unit

39.         RAM is considered volatile storage, which means it is:A.     permanent.B.     random.C.     read-only.D.     temporary.

Page 13: cmcps

40.         ____________ is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off.

A.     RAMB.     ROMC.     The CPUD.     The NIC

41.         ____________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

A.     ErgonomicsB.     PositioningC.     Occupational safetyD.     Repetitive strain prevention

42.         ____________ speed is measured in nanoseconds.A.     ModemB.     RAMC.     Expansion boardD.     Hard disk drive

43.         A(n) ____________ is a combination of hardware and software that facilitates the sharing of information between computing devices.

A.     expansion boardB.     digital deviceC.     networkD.     peripheral

44.         In addition to connecting your computer to a network, the Ethernet port can be used to connect to:A.     a printer.B.     a modem.C.     a DSL modem.D.     a digital camera.

45.         Flash drives plug into a(n):A.     USB port.B.     serial port.C.     expansion slot.D.     drive bay.

46.         Storage devices, such as floppy disk drives and Zip disk drives that are no longer standard on many new computers, are known as ____________ technologies.

A.     peripheralB.     comboC.     legacyD.     media

47.         ____________ ports and ____________ ports are considered connectivity ports.A.     Parallel, USBB.     USB, audioC.     Modem, EthernetD.     Audio, video

48.         ____________ is a series of small cards (called memory cards or memory modules) that plug into slots on the motherboard.

A.     RAMB.     ROMC.     The CPUD.     The power supply

FILL IN THE BLANK:

49.         The central electronic components of the computer are located in the ____________.Answer: system unit                 50.         ____________ devices, such as monitors, modems, and printers, are devices that are externally connected to the computer.

Page 14: cmcps

Answer: Peripheral                  51.         The cursor control keys are also known as the ____________ keys.Answer: arrow                        52.         QWERTY is a type of ____________.Answer: keyboard                    53.         ____________ keys sometimes perform different functions for different software packages.Answer: Function (F)               54.         A(n)____________ mouse uses an internal sensor or laser instead of a rollerball, and therefore does not need a mousepad.Answer: optical                        55.         ____________ keyboards have a much shorter range than radio frequency (RF) keyboards.Answer: Bluetooth                  56.         ____________ technology allows a person sitting at a computer equipped with a personal video camera and a microphone to transmit video and audio across the Internet.Answer: Videoconferencing                                                                                       57.         In ____________ systems, you operate your computer through a microphone, telling it to perform specific commands or translate spoken words into data input.Answer: speech-recognition                                                                                        58.         Regarding monitors, the higher the ____________, the sharper and clearer the image.Answer: resolution                  59.         A cathode-ray tube (CRT) monitor is a grid made up of millions of ____________.Answer: pixels                         60.         A monitor’s refresh rate is measured in ____________, a unit of frequency indicating cycles per second.Answer: hertz (Hz)                 61.         Less expensive LCD monitors use ____________ displays.Answer: passive-matrix           62.         A smaller ____________ means that there is less blank space between pixels, and thus a sharper, clearer image.Answer: dot pitch                    63.         The most common impact printer is the ____________ printer.Answer: dot-matrix                 64.         Although more expensive to buy than inkjet printers, ____________ printers are more economical for high-volume black-and-white printing.Answer: laser                          65.         A printer’s resolution is measured in ____________.Answer: dots per inch (dpi)                                                                                        66.         Two power-management settings on a computer are ____________ and ____________.Answer:  hibernation and Stand By mode       67.         The ____________, generally located in an internal drive bay, holds all permanently stored programs and data.Answer: hard disk drive          68.         ____________drives, sometimes referred to as jump drives or thumb drives, are a newer alternative to storing portable data.Answer: Flash                    69.         ____________ are the places on the system unit where peripheral devices attach to the computer.Answer: Ports                                70.         Typical ____________ cards, found in the system unit are the sound card and the video card.Answer: expansion (or adapter)       71.         The ____________ is the largest printed circuit board to which all other boards are connected.Answer: motherboard                    72.         ____________ is the storage space nearby the CPU where data and commands are stored and can be located, opened, and delivered to the CPU for processing in a few billionths of a second.Answer: RAM                                73.         A monitor that doubles as an input device is known as a(n) ____________.Answer: touch-screen monitor          74.         The speed of RAM is measured in ____________ (billionths of a second).Answer: nanoseconds                   75.         The port that resembles a standard telephone jack and uses a traditional telephone signal for connectivity is the ____________ port.Answer: modem                            76.         Devices such as digital video cameras, MP3 players, and digital media players benefit from using a(n) ____________ port, one of the newer and faster interfaces available, which can transfer data from 400 Mbps to 800 Mbps.Answer: FireWire                             

Page 15: cmcps

TRUE AND FALSE:77.         The Dvorak keyboard is the leading alternative to the QWERTY keyboard.Answer: True                          78.         The four main functions of a computer are: input the data, process the data, output the data or information, and communicate the data or information.Answer: False (store)               79.         When toggled off, the Insert key replaces or overwrites existing characters with new characters as you type.Answer: True                           80.         One of the disadvantages of a liquid crystal display (LCD) monitor is its limited viewing angle.Answer: True                           81.         There are two types of CRT monitors on the market: passive-matrix displays and active-matrix displays.Answer: False (LCD)               82.         In CRT monitors, the faster the refresh rate, the more the screen will flicker and the more eyestrain you will experience.Answer: False                          83.         Studies have shown that users of MP3 players may experience hearing damage due to excessive volume from ear buds.Answer: True                           84.         Thermal printers are ideal for mobile computing because they are compact, lightweight, and require no ink cartridges.Answer: True                           85.         Modern operating systems recommend that users shut down the system by pushing the main power button.Answer: False                         86.         You can take a computer out of standby mode by tapping a key on the keyboard or by moving the mouse.Answer: True                           87.         CRT monitors cause less eyestrain than LCD monitors.Answer: False                          88.         Data projectors are devices used to project images from your computer onto a wall or viewing screen for use in conference rooms and classrooms.Answer: True                           89.         USB ports can connect a wide variety of peripherals to the computer, including keyboards, printers, mice, and digital cameras.Answer: True                          90.         When purchasing a new CRT monitor, choose one with the highest refresh rate, the highest maximum resolution, and the smallest dot pitch.Answer: True                           91.         Speakers connect to the VGA port.Answer: False (audio)                   

MATCHING:

92.         Match the following terms with their meanings:            I.    port                        A. provides power to and controls all the expansion boards            II.   CRT                       B. a type of monitor            III. NIC                        C. the place on the system where a peripheral device is attached            IV. motherboard          D. enables a computer to connect to other computers            V.  nanosecond           E. one billionth of a secondAnswer: C, B, D, A, E             

93.         Match the following ports with the devices most likely to be connected to them:            I.    VGA port               A. flash drive            II.   parallel port           B. monitor            III. serial port               C. printer            IV. Ethernet port          D. modem            V.  USB port                E. DSL or cable modemAnswer: B, C, D, E, A             

94.         Match the following acronyms with their functions:            I.    CPU                       A. type of technology used on a flat-screen monitor            II.   RAM                      B. standard keyboard layout            III. ROM                      C. temporary storage, also known as primary storage            IV. LCD                      D. controls all the other functions performed by the computer’s other components and

processes all the commands issued to it by software instructions            V.  QWERTY              E. permanent storage that is not erased when the computer’s power is turned off

Page 16: cmcps

Answer: D, C, E, A, B           

95.         Match the following terms with their meanings:            I.    stylus                                 A. an input device used to enter data on a PDA            II.   hertz (Hz)                          B. the clearness or sharpness of an image            III. resolution                           C. temporary            IV. volatile                               D. a unit of frequency indicating cycles per second            V.  system unit                        E. contains the central electronic components of the computerAnswer: A, D, B, C, E             

96.         Match the following terms with their meanings:            I.    peripheral devices  A. an example of permanent storage            II.   modem port           B. external devices that exchange data with the computer through ports            III. dot-matrix              C. an example of an impact printer            IV. ergonomics            D. an example of a connectivity port            V.  hard disk drive       E. the science involved with minimizing the risk of injury or discomfortAnswer: B, D, C, E, A             

97.         Match the following terms with their meanings:            I.    CD-ROM                           A. an example of a nonimpact printer            II.   audio ports                         B. a type of LCD monitor            III. pixels   C. used to connect headphones, microphones, and speakers to the computer            IV. active-matrix display         D. an example of read-only storage            V.  ink-jet                                E. a CRT screen is made up of millions of theseAnswer: D, C, E, B, A             

98.         Match the following terms with their meanings:            I.    refresh rate                                    A. measurement of printing speed            II.   dot pitch                                        B. 0.28 mm or less is the sign of a good CRT monitor            III. thermal                                          C. commonly between 75 and 85 hertz            IV. ppm                                               D. measurement of printer resolution            V.  dpi                                                 E. emerging technology for mobile and portable printingAnswer: C, B, E, A, D 

HARDWARE AND MEMORYHARDWARE AND MEMORY MCQ

1.             According to Moore’s law:A.     computer prices will decrease dramatically every year.B.     memory storage size will double every year.C.     hard disk space will increase into the terabyte range within a decade.D.     CPU capacity will double every 18 months.

2.             The portion of the CPU that coordinates the activities of all the other computer components is the:A.     motherboard.B.     coordination board.C.     control unit.D.     arithmetic logic unit.

3.             The CPU does all of the following EXCEPT:A.     store data.B.     process instructions.C.     manage the flow of information through the computer system.D.     process data that has been inputted into the system.

4.             Mathematical calculations and comparison decisions are performed by the ____________ of the CPU.

A.     numerical calculatorB.     central calculation unitC.     control unitD.     arithmetic logic unit (ALU)

Page 17: cmcps

5.             The terms megahertz and gigahertz refer to the number of ____________ per second that a CPU can perform.

A.     machine cyclesB.     arithmetic calculationsC.     video updatesD.     program instructions

6.             All of the following are considered subsystems EXCEPT:A.     CPU.B.     memory.C.     device.D.     storage.

7.             Every time the CPU performs a program instruction it goes through all the following steps EXCEPT:

A.     the CPU fetches the required piece of data from RAMB.     the CPU executes the instruction and stores it on an external device.C.     the CPU decodes the instruction so that the computer can understand it.D.     the CPU executes the instruction and stores it in RAM.

8.             DRAM, SRAM, and DDR RAM are all types of:A.     CPUs.B.     read-only memory.C.     random access memory.D.     operating systems.

9.             Which of the following statements is FALSE concerning RAM?A.     RAM is an example of volatile storage.B.     When the power is turned off, data remains in RAM.C.     RAM is located in memory modules on the motherboard.D.     The speed of retrieving data from RAM is measured in nanoseconds.

10.         All of the following statements concerning RAM are true EXCEPT:A.     RAM is the temporary holding space for all data and instructions that the computer uses while it is on.B.     At a minimum, you need enough RAM to run the operating system and whatever software applications you are

running.C.     Adding more RAM will not improve system performance.D.     The amount of RAM on the memory modules, in the computer, is referred to as physical memory.

11.         Which of the following statements is TRUE concerning virtual memory?A.     Virtual memory is the space on the hard drive where the operating system begins to store data when it

becomes memory-bound.B.     Accessing data from RAM is a slower than accessing data from virtual memory.C.     When it is using virtual memory, the operating system builds a file called the RAM file.D.     If a computer is memory-bound, adding more RAM will not solve the problem.

12.         ____________ storage refers to storage that loses its data when the power is turned off.A.     PermanentB.     VolatileC.     NonvolatileD.     Virtual

13.         The time it takes a CPU to retrieve data from RAM is measured in:A.     milliseconds.B.     microseconds.C.     nanoseconds.D.     picoseconds.

14.         The ____________ of the hard drive is the sum of seek time and latency (rotational delay).A.     rpmB.     access timeC.     spin timeD.     read time

Page 18: cmcps

15.         The speed of a hard drive is measured in:A.     milliseconds.B.     MHz.C.     GHz.D.     nanoseconds.

16.         Rotational delay, on a hard disk drive, is also known as:A.     latency.B.     seek time.C.     access time.D.     rpm.

17.         When using virtual memory, accessing data from the hard drive is over ____________ than accessing data from RAM.

A.     100 times fasterB.     1,000 times fasterC.     1,000,000 times slowerD.     10,000,000 times slower

18.         The PF Usage portion of the Task Manager’s Performance tab indicates the:A.     processing frequency of the CPU.B.     size of the page file in virtual memory.C.     number of page swaps per second that are taking place.D.     total RAM that is installed on the system.

19.         The number of pixels displayed on a screen is known as the screen:A.     resolution.B.     color depth.C.     refresh rate.D.     viewing size.

20.         Low-level formatting of a hard disk will:A.     initialize the file allocation table.B.     reallocate data in order to make disk access more efficient.C.     defragment the disk.D.     create tracks and sectors on the magnetic surface.

21.         Which of the following statements, concerning sound cards, is FALSE?A.     Most computers ship with a 3D sound card.B.     Most sound cards do not include a microphone in port.C.     Sound cards are expansion cards that attach to the motherboard.D.     3D sound convinces the ear that the sound is omnidirectional.

22.         Which of the following is TRUE concerning read/write heads?A.     Read/write heads retrieve and record data to and from the hard disk.B.     Read/write heads move from the center of the platter to the outer edges.C.     Read/write heads actually touch the surface of the platter.D.     Read/write heads move over the spinning platters up to 1,000 times per second.

23.         Which of the following statements is TRUE?A.     The newer version of USB (USB 2.0) transfers data at a rate of 12 Mbps.B.     Bluetooth 2.0 has a maximum transfer rate of 3 Mbps.C.     IrDA does not need a clear line of sight.D.     Ethernet ports are most commonly used to connect digital cameras.

24.         The gridlike pattern, created on a hard disk drive by low-level formatting, is composed of:A.     read heads and write heads.B.     tracks and sectors.C.     platters and segments.D.     megabits and megabytes.

25.         The hard disk’s access time is determined by the sum of which two factors?A.     latency and rotational delayB.     seek time and rpmC.     data transfer time and platter spin rateD.     seek time and latency

Page 19: cmcps

26.         Which of the following portable storage devices is likely to have the least storage capacity?A.     Zip diskB.     CDC.     Floppy diskD.     DVD

27.         All of the following should be considered when purchasing a monitor EXCEPT:A.     viewing size.B.     VRAM.C.     refresh rate.D.     dot pitch.

28.         CRT and LCD are types of:A.     ports.B.     video cards.C.     monitorsD.     memory.

29.         When reporting the speed of a CD-RW drive as 48x12x48, the order of the speeds is:A.     record à rewrite à playback.B.     record à playback à rewrite.C.     playback à rewrite à record.D.     playback à record à rewrite.

30.         Which of the following statements is FALSE concerning flash drives?A.     Flash drives fit into a USB port only one way.B.     Flash drives can be damaged by moisture and dust.C.     Flash drives should be removed while the activity LED is lit.D.     Flash drives should be removed when the “Safe to Remove Drive” message appears.

31.         Which of the following statements, concerning speakers, is FALSE?A.     Amplified speakers need no external power.B.     Unamplified speakers use internal power.C.     Amplified speakers produce better quality sound.D.     For better bass sounds, a subwoofer is recommended.

32.         The device that converts binary data into the images that display on the monitor is called a(n):A.     CRT.B.     video card.C.     image processor.D.     Ethernet card.

33.         All of the following terms apply to random access memory (RAM) EXCEPT:A.     volatile storage.B.     physical memory.C.     DIMMs.D.     permanent storage.

34.         ____________ ports have a maximum throughput of 4 Mbps and require that a line of sight be maintained between the ports on the two devices.

A.     IrDAB.     RJ-45C.     BluetoothD.     Analog/Digital

35.         ____________ refers to the number of bits used to represent a pixel.A.     ResolutionB.     Dot pitchC.     Refresh rateD.     Bit depth

36.         Screen resolution is changed in:A.     refresh rate mode.B.     Add/Remove Programs.C.     Performance Properties.D.     Display Properties.

Page 20: cmcps

37.         Increasing the resolution of a monitor will:A.     decrease the size of the images.B.     increase the size of the images.C.     increase the number of colors displayed.D.     result in a slower refresh rate.

38.         The ____________ port transfers data at 800 Mbps but is available only on some Macs.A.     parallelB.     FireWire 800C.     RJ-45D.     DVI

39.         Which of the following can be connected to an RJ-45 jack?A.     digital camerasB.     miceC.     printersD.     network connections

40.         Which of the following can NOT be connected to a parallel port?A.     cable modemsB.     printersC.     Zip drivesD.     scanners

41.         ____________ ports are replacing traditional parallel and serial ports.A.     Line inputB.     USBC.     RJ-45D.     Ethernet

42.         All of the following are wireless transmission standards EXCEPT:A.     Bluetooth.B.     IrDA.C.     Gigabit Ethernet.D.     WiFi.

43.         A(n) ____________ is necessary for the most recent surround sound standard.A.     amplified speakerB.     3D sound cardC.     graphic equalizerD.     Dolby 7.1 sound card

44.         Most basic sound cards contain all of the following input/output jacks EXCEPT:A.     microphone in.B.     speaker in.C.     Ethernet port.D.     gaming port.

45.         Which of the following will NOT make your system more reliable?A.     installing the latest version of the software.B.     adding an expansion hub.C.     installing new patches as they become available.D.     checking for and installing bug fixes.

46.         Connecting to the Internet using a cable modem is best accomplished via a(n) ____________ port.A.     serialB.     USB 1.1C.     FireWireD.     Ethernet

47.         Which of the following statements is FALSE concerning CPUs?A.     Replacement CPUs are expensive but reasonably easy to install.B.     All CPUs are interchangeable.C.     Replacement CPUs must be compatible with the motherboard.D.     Upgrading the CPU affects only the processing portion of the system performance.

Page 21: cmcps

48.         Another term for IEEE 1394 is:A.     IrDA.B.     USB.C.     FireWire.D.     Bluetooth.

49.         Which of the following statements concerning Bluetooth is FALSE?A.     Bluetooth requires a clear line of sight.B.     The maximum distance between two devices that Bluetooth supports is 30 feet.C.     Bluetooth technology uses radio waves.D.     Bluetooth is a good solution for short-distance connections such as wireless keyboards.

 

FILL IN THE BLANK:

50.         The series of steps the CPU goes through, every time it performs a program instruction, is called a(n) ____________.Answer: machine 51.         The speed of newer CPUs is measured in ____________.Answer: gigahertz (GHz)         52.         Your system is considered ____________ if it is limited in how fast it can send data to the CPU because there is not enough RAM installed.Answer: memory-bound         53.         The memory that your operating system uses is referred to as ____________.Answer: kernel memory           54.         The ____________ in the CPU coordinates the activities of all the other computer components.Answer: control unit               55.         Logic and comparison decisions, such as comparing items to determine if one is greater than, less than, equal to, or not equal to another, is the job of the ____________ in the CPU.Answer: arithmetic logic unit (ALU)   56.         The ____________ of the hard disk drive is expressed in either megabits or megabytes.Answer: data transfer rate       57.         Rented storage that is accessible from any Web browser is known as____________.Answer: online storage            58.         When using virtual memory, your system builds a file called a(n) ____________.Answer: page file                    59.         When the read/write heads and/or dust particles make contact with the platter this is known as a(n) ____________.Answer: head crash                 60.         Most monitors sold today support the ____________ technology, meaning that once you have connected the new monitor to your system and booted up Windows will automatically recognize the monitor and configure it to work with your system.Answer: Plug and Play            61.         A ____________ is an interface through which external devices are connected to your computer.Answer: port                            62.         The ____________ are the concentric circles formed on a hard disk drive through low-level formatting.Answer:   tracks                      63.         Because floppy disks and Zip disks use magnetized film to store data, they are referred to as ____________ media.Answer:  magnetic      64.         The ____________ port is generally used for printers and transfers data between devices in groups of bits.Answer:   parallel                     65.         Because CDs and DVDs use a laser to read and write data, they are referred to as ____________ media.Answer:  optical          66.         Video card memory is known as ____________.Answer: VRAM                      67.         A monitor’s ____________ is the number of times per second that its pixel illumination is recharged.Answer: refresh rate                68.         A flash drive fits into the ____________ port only one way.Answer: USB               69.         A(n) ____________ port allows the transfer of data, one bit at a time, over a single wire at speeds of up to 56 Kbps.Answer: serial                         

Page 22: cmcps

70.         A(n) ____________ port is a port that allows you to connect electronic musical instruments (such as synthesizers) to your computer.Answer: MIDI                         71.         A(n) ____________ port uses infrared light waves to wirelessly transmit data.Answer: IrDA                         72.         A(n) ____________ is a sequence of peripheral devices, each connected to the other through USB ports, with the last one connected directly to the computer.Answer: daisy chain                 73.         ____________technology uses radio waves to transmit data over short distances.Answer: Bluetooth                  74.         Programs located in the Startup folder run every time your computer ____________.Answer: reboots                      75.         The ____________ utility reorganizes the files on the hard disk, improving the efficiency of the hard drive.Answer: Disk Defragmenter    

TRUE AND FALSE:

76.         When purchasing a monitor, a low dot pitch is preferable.Answer: True                           77.         The Intel series of processors that can work on two separate sets of instructions at the same time (in parallel) are known as Core Duo processors.Answer: True                          

78.         The number of times per second the illumination of each pixel is recharged is the refresh rate.Answer: True                          

79.         IDE is a type of port.Answer: False (hard drive)      

80.         To check the total capacity of the hard drive, double-click the My Computer icon, right-click the C drive icon, and select Properties from the shortcut menu.Answer: True                          

81.        Hard disk drives, CD drives, DVD drives, and floppy disk drives are all examples of volatile storage devices.Answer: False (permanent)     

82.         The Performance tab of the Windows Task Manager shows how much physical memory is installed in the system.Answer: True                          

83.         The hard disk drive is the fastest of all permanent storage devices.Answer: True                          

84.         Processor speed is measured in machine cycles per second.Answer: True                          

85.        Running Disk Defragmenter is a quick and easy way to delete temporary Internet files that have accumulated on the hard drive.Answer: False (Disk Cleanup) 

86.        In addition to running your regular antivirus program, it is recommended that you run antispyware and antiadware programs.Answer: True                          

87.        Using expansion hubs is a good way to enable your computer to support more USB and FireWire devices.Answer: True                          

88.         The FireWire port is used to connect your computer to a local network or cable modem.Answer: False (Ethernet)         

MATCHING:

89.         Match the following acronyms to their descriptions:            I.    IDE                        A. type of memory module            II.   ALU                      B. memory for graphics display            III. VRAM                   C. port for wireless data transmission            IV. IrDA                      D. type of hard disk drive            V.  DIMM                    E. CPU component that performs mathematical operationsAnswer: D, E, B, C, A             

90.         Match the following terms to their meanings:            I.    seek                       A. measurement of machine cycle speed            II.   latency                   B. measurement of pixel color representation capability            III. hertz                      C. measurement of data transfer rate            IV. bit depth                D. time to wait for disk to spin to proper position            V.  bps                         E. time to wait for disk arm to position to proper trackAnswer: E, D, A, B, C            

Page 23: cmcps

91.         Assume that you have one port of each type specified. Match each device listed with the most appropriate port, given this limitation:            I.    56K modem           A. USB 1.1            II.   printer                    B. FireWire            III. mouse                    C. Ethernet            IV. camcorder              D. serial            V.  cable modem         E. parallelAnswer: D, E, A, B, C              92.         Match the following terms to their meanings:            I.    control unit            A. measure of virtual memory dependence            II.   daisy chain            B. CPU component            III. format                    C. sequence of peripheral devices connected via ports            IV. amplified               D. establish tracks and sectors on a disk            V.  PF usage                E. type of speaker requiring external power sourceAnswer: B, C, D, E, A             

93.         Match the following terms to their meanings:            I.    tracks                     A. binary digits            II.   sectors                   B. a hard drive is composed of several of these stacked onto a spindle            III. bits                         C. the time it takes a storage device to locate and retrieve stored data            IV. platters                   D. concentric circles on a hard drive            V.  access time            E. pie-shaped wedges on a hard driveAnswer: D, E, A, B, C          

94.         Match the following storage media to their capacity:            I.    floppy disk            A. 9.4 GB            II.   Zip disk                 B. 1.44 MB            III. CD                         C. 128 MB to 8 GB (and up)            IV. DVD                      D. 100 MB to 750 MB            V.  flash memory        E. 700 MBAnswer: B, D, E, A, C              95.         Match the following acronyms with their definitions:            I.    VRAM                   A. a rewritable compact disk            II.   CRT                       B. memory resident on video cards            III. LCD                       C. a type of display similar to a TV            IV. GB                         D. a type of display with a small footprint            V.  CD-RW                  E. one billion bytesAnswer: B, C, D, E, A             

96.         Match the following ports to their data transfer speeds:            I.    Serial                     A. 480 Mbps            II.   Parallel                   B. 56 Kbps            III. USB 2.0                 C. 12 Mbps            IV. FireWire 800          D. 10 Mbps–100 Mbps            V.  Ethernet                 E. 800 MbpsAnswer: B, C, A, E, D            

97.         Match the following acronyms with their definitions:            I.    FAT                       A. speed at which data is transferred            II.   Mbps                     B. fast becoming the most common port on computers today            III. USB                       C. an interface used to connect musical instruments            IV. MIDI                      D. Institute of Electrical and Electronics Engineers V.  IEEE    E. the name of the catalog that the computer uses to keep track of where each  file is

located on the hard driveAnswer: E, A, B, C, D             

98.         Match the following terms to their meanings:            I.    Bluetooth               A. also known as Fast Ethernet            II.   100Base-T             B. transmits data between devices using infrared light waves            III. IrDA                      C. Ethernet with a transfer rate of up to 1,000 Mbps            IV. Gigabit Ethernet     D. previously called the IEEE 1394 port            V.  FireWire                 E. uses radio waves to send data over short distancesAnswer: E, A, B, C, D             

Page 24: cmcps

99.         Match the following terms to their meanings:            I.    nanosecond           A. “machine cycles per second”            II.   hertz                      B. portable devices also known as thumb drives            III. flash drives            C. memory used by the operating system            IV. kernel memory      D. one-thousandth of a second            V.  millisecond            E. one-billionth of a secondAnswer: E, A, B, C, D            

100.     Match the following terms to their meanings:            I.    GHz                       A. standard adopted by the music industry that transfers data at a rate of 31.5 Kbps            II.   RJ-45 jack             B. technical name for an Ethernet port            III. WiFi                       C. wireless transmission standard that transfers data up to 54 Mbps            IV. MIDI                      D. one billion cycles per second            V.  expansion hub       E. a device that connects to one port and provides four or eight new portsAnswer: D, B, C, A, E             

NETWORKING MCQ

MULTIPLE CHOICE:     NETWORKING MCQ FOR IBPS PO3

1.             Which of the following is NOT an advantage of using networks compared to a stand-alone computer?

A.     ease of maintenance and administrationB.     enhanced resource sharingC.     increased productivityD.     increased communication capabilities

2.             ____________ networks may experience significant slowdowns if more than ten (10) users are on the network.

A.     Wide areaB.     Peer-to-peerC.     Server-basedD.     Metropolitan area

3.             All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:A.     P2P networks do not require servers.B.     security cannot be implemented centrally on P2P networks.C.     each computer must be updated individually in P2P networks.D.     P2P networks are decentralized and not easily scalable.

4.             Individual users must take responsibility for data backups and security on a peer-to-peer network because this kind of network is considered:

A.     scalable.B.     centralized.C.     decentralized.D.     dedicated.

5.             The ability to easily add additional users means that a network is:A.     scalable.B.     dedicated.C.     decentralized.D.     secure.

6.             In a client/server network, all clients are connected to a server that performs tasks for them, such as backup and security; therefore, it is known as a ____________ network.

A.     local areaB.     dedicatedC.     decentralizedD.     centralized

Page 25: cmcps

7.             A(n) ____________ is a small group of computers and peripherals linked together in a small geographic area.

A.     LANB.     PANC.     CAND.     MAN

8.             The Internet is most accurately categorized as a:A.     LAN.B.     PAN.C.     WAN.D.     MAN.

9.             PANs are used to connect ____________ devices (such as Bluetooth-enabled devices) in close proximity to each other.

A.     peripheralB.     wirelessC.     dedicatedD.     client

10.         A(n) ____________ is a private corporate network, used exclusively by company employees.A.     InternetB.     local area networkC.     peer-to-peerD.     intranet

11.         ____________ is specialized software that runs on a server computer to control network functionality.

A.     NOS softwareB.     NCP softwareC.     TCP softwareD.     MAC software

12.         The layout and structure of the network is known as the network’s:A.     NOS.B.     topology.C.     components.D.     protocol.

13.         Cable and wireless communication technologies are types of:A.     network adapters.B.     topologies.C.     transmission media.D.     network operating systems.

14.         Network navigation devices include all of the following EXCEPT:A.     servers.B.     routers.C.     switches.D.     hubs.

15.         ____________ servers store and manage files for network users.A.     FileB.     WebC.     AuthenticationD.     Main

16.         A(n) ____________ server keeps track of users logging onto the network and the services available to the users.

A.     fileB.     authenticationC.     WebD.     e-mail

Page 26: cmcps

17.         ____________ servers are used to fulfill one specific function, such as handling e-mail.A.     DedicatedB.     NetworkC.     ProtocolD.     Peer-to-peer

18.         ____________ servers are used to manage all client-requested printing jobs for all printers.A.     DatabaseB.     NetworkC.     PrintD.     E-mail

19.         A(n) ____________ server, on a network, delivers the software to the clients because the software does not reside on the client computers.

A.     WebB.     applicationC.     communicationsD.     database

20.         The ____________ server, on a network, is the single point of contact with the outside world and is often the only device connected to the Internet.

A.     intranetB.     databaseC.     applicationD.     communications

21.         In a(n) ____________ topology, all computers are connected in sequence, using a single cable.A.     busB.     starC.     hybridD.     ring

22.         In a bus topology, a ____________, located at each end of the network, absorbs the signal to prevent it from being reflected back onto the cable.

A.     nodeB.     terminatorC.     packetD.     network device

23.         In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ____________ topology.

A.     client/serverB.     activeC.     passiveD.     terminated

24.         Active topologies differ from passive topologies in that nodes on the active topology network:A.     help pass the data along the network.B.     listen for signals on the line before transmitting.C.     ultimately send their messages to a terminator.D.     actively search for packets intended for themselves.

25.         When two computers send data at the same time on a bus network it is called a(n):A.     access method.B.     data collision.C.     active topology.D.     data termination.

26.         In a ring topology, the computer in possession of the ____________can transmit data.A.     packetB.     dataC.     access methodD.     token

Page 27: cmcps

27.         Because each node on the network is responsible for retransmitting the token and the data to the next node, the ____________ topology is considered an active topology.

A.     ringB.     busC.     starD.     hybrid

28.         Which of the following statements about ring topology networks is TRUE?A.     A ring topology network is plagued with data collisions.B.     A ring topology network uses the CSMA/CD access method to transmit data.C.     A ring topology network allows only one node to transmit data at a time.D.     A ring topology network is considered passive.

29.         In the star topology, the central point of failure is the:A.     client.B.     switch.C.     terminator.D.     access point.

30.         Which of the following statements, concerning star topology networks, is FALSE?A.     Star topology networks use the CSMA/CD access method.B.     If one computer fails, it does not affect the rest of the network.C.     There are no data collisions on a star topology network.D.     If the switch fails, the network no longer functions.

31.         When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):A.     token.B.     packet.C.     jam signal.D.     warning.

32.         On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what happens next?

A.     The signals are encrypted to avoid a second collision.B.     A token is resent by the two computers that caused the collision.C.     The two computers wait random amounts of time, and then resend their signals.D.     The switch notifies the network of the collision.

33.         Which of the following statements is FALSE concerning bandwidth?A.     Bandwidth defines the speed at which the data flows on the network.B.     Cable is rated by the maximum amount of bandwidth it supports.C.     Bandwidth is the amount of data transmitted across the transmission medium in a certain amount of time.D.     Bandwidth is measured in bits per second (bps).

34.         ____________ defines whether the transmission media uses electrical impulses or pulses of light to transmit data.

A.     BandwidthB.     Susceptibility to interferenceC.     Signal transmission methodD.     Access method

35.         EMI and RFI are types of:A.     signal interference.B.     bandwidth measurements.C.     twisted pair cable.D.     wireless transmission media.

36.         All of the following statements concerning twisted pair cable are true EXCEPT:A.     Twisted pair uses pulses of light to send data.B.     The number of twists in twisted pair is significant because it makes the wires less susceptible to interference.C.     UTP is not recommended in areas with significant sources of interference.D.     The two most common types of UTP in use today are Cat 5e and Cat 6.

Page 28: cmcps

37.         UTP and STP are examples of:A.     CATV cable.B.     thicknet coaxial cable.C.     fiber-optic cable.D.     twisted pair cable.

38.         The core of a coaxial cable is usually made from:A.     magnesium oxide.B.     copper.C.     silicon.D.     glass fibers.

39.         All of the following statements regarding fiber-optic cable are true EXCEPT:A.     the core of fiber-optic cable is composed of copper.B.     fiber-optic cable uses pulses of light to transmit data.C.     data passes through fiber-optic cable in one direction only.D.     the outer jacket of fiber-optic cables is often made of Kevlar.

40.         The wired medium least susceptible to signal interference is:A.     STP cable.B.     coaxial cable.C.     fiber-optic cable.D.     UTP cable.

41.         ____________ wireless devices have largely been replaced with faster technology.A.     802.11bB.     802.11gC.     802.11nD.     802.11a

42.         All of the following protocols are proprietary EXCEPT:A.     TCP/IP.B.     IPX.C.     NetBEUI.D.     AFP.

43.         The major network operating systems for installation on the server, in a client/server environment, include all of the following EXCEPT:

A.     Windows Server 2003.B.     UNIX.C.     Windows XP.D.     Novell NetWare.

44.         The OSI model is divided into ____________ processes called layers.A.     fiveB.     sixC.     sevenD.     eight

45.         In the OSI model, the ____________ layer handles data encryption and compression.A.     applicationB.     presentationC.     data linkD.     session

46.         In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.A.     sessionB.     transportC.     data linkD.     network

47.         The device that acts as an interface to connect with and communicate on a network is known as the:A.     network adapter.B.     hub.C.     repeater.D.     switch.

Page 29: cmcps

48.         Which of the following statements concerning MAC addresses is TRUE?A.     A MAC address is used to externally identify a computer on a network.B.     The MAC address and the IP address can be used interchangeably.C.     A MAC address must match the IP address.D.     The first three numbers in the address identify the manufacturer.

49.         If a network requires a cable to connect two devices farther apart than the normal maximum run length of the media, the way to prevent signal degradation is to install a(n):

A.     adapter.B.     repeater.C.     bridge.D.     switch.

50.         Another name for a “smart” hub is a:A.     bridge.B.     repeater.C.     firewall.D.     switch.

FILL IN THE BLANK:

51.         ____________ are designed to send information between two networks.Answer: Routers                     52.         The special communications software, installed on a computer to enable the network adapter to communicate with the operating system is called the ____________.Answer: device driver              53.         Entering a user ID and password is known as ____________.Answer: authentication            54.         The acronym NOS stands for ____________.Answer: Network Operating System  55.         NetBEUI, AFP, and IPX are known as ____________ protocols, which means that they do not work with another vendor’s NOS.Answer: proprietary                56.         The ____________ identifies a computer internally on the network.Answer: MAC address                        57.         In the OSI model, the ____________ layer converts the data into signals for transmission over the network.Answer: physical                    58.         Combining multiple topologies into one network is known as a(n) ____________ network.Answer: hybrid                                    59.         CSMA/CD is the access method used on ____________ networks.Answer: Ethernet                     60.         The ____________ passing method is used on a ring topology to avoid collisions.Answer: token                          61.         ____________ is the amount of data that can be transmitted over transmission media in a certain amount of time.Answer: Bandwidth                 62.         A(n) ____________ is a set of rules for exchanging communication.Answer: protocol                    63.         ____________ cable is composed of a glass or plastic fiber (or bundle of fibers) as its core.Answer: Fiber-optic       64.         ____________ networks do not need specialized network operating system software.Answer: Peer-to-peer               65.         The 802.11 wireless standard is also known as ____________.Answer: Wi-Fi                         66.         In wireless networks, wireless NICs connect to ____________, which provide wireless devices with a sending and receiving connection to the network.Answer: wireless access points                       67.         ____________ are containers that hold multiple data packets.Answer: Frames                                   68.         The acronym MAC, as in MAC address, stands for ____________.Answer: Media Access Control                       69.         A(n) ____________ sends data only to the intended recipient as opposed to a hub, which sends the data to all devices connected to it.Answer: switch                                   

Page 30: cmcps

70.         ____________ are devices used to send data between different segments (collision domains) on a network.Answer: Bridges                      71.         ____________ amplify a signal and retransmit it to extend cable runs beyond the maximum run length.Answer: Repeaters                  72.         ____________ is the open protocol used by the Internet.Answer: TCP/IP                       73.         EMI and RFI are types of ____________.Answer: interference               74.         The term packet screening refers to the examination of incoming data packets by the ____________to ensure that they originate or are authorized by valid users on the internal network.Answer: firewall                      75.         ____________ use IP addresses to send information between two networks.Answer: Routers                     

TRUE AND FALSE:

76.         In a ring topology, if one computer fails it can bring the entire network to a halt.Answer: True                          77.         An application server acts as a go-between for computers on an internal network and the external network (Internet).Answer: False (proxy)              78.         The hub is responsible for breaking down data into packets and preparing the packets for transmission across the network.Answer: False (network adapter or NIC)          79.         In the OSI model, the session layer sets up and manages the virtual (not physical) connection between the sending and receiving devices.Answer: True                           80.         Twisted pair cable has the lowest susceptibility to interference.Answer: False (highest)   81.         Throughput is another name for bandwidth.Answer: True                           82.         Crosstalk interference is the tendency of signals on one twisted pair wire to interfere with signals on a wire next to it.Answer: True                          83.         The ring topology is the most widely deployed client/server topology in businesses today.Answer: False (star)                 84.         Token passing and CSMA/CD are methods of avoiding data collisions.Answer: True                          85.         A bus topology provides a fairer allocation of resources than a ring topology by giving all the nodes on the network an equal opportunity to send data.Answer: False                          86.         MAC addresses enable computers on one network to communicate with computers on another network.Answer: False (IP addresses)                87.         Bridges are relatively simple devices whose sole purpose is to amplify a signal and retransmit it.Answer: False             (Repeaters)      88.         In a star network, the failure of one computer affects the other computers on the network.Answer: False  89.         Hubs receive a signal from a device, reconstruct it, and transmit it to all the ports on the hub.Answer: True                           90.         Authentication can be achieved through passwords, biometric access devices, and possessed objects.Answer: True                          

MATCHING:

91.         Match the following acronyms to their descriptions:            I.    MAC                      A. type of interference            II.   CSMA/CD             B. device address            III. OSI                        C. Ethernet access method            IV. EMI                       D. type of cable            V.  UTP                       E. protocol standardAnswer: B, C, E, A, D             

Page 31: cmcps

92.         Match the following terms to their meanings:            I.    frame                     A. packet granting transmission rights            II.   bastion                   B. assemblage of packets            III. token                     C. a Novell protocol            IV. IPX                        D. host configured as proxy server            V.  jam                        E. signal indicating data collisionsAnswer: B, D, A, C, E              93.         Match the following devices to their functions:            I.    repeater                  A. sends data to a specific device, not to all devices            II.   hub                        B. transmits data between two different networks            III. switch                    C. device used for signal amplification and retransmission            IV. bridge                    D. multiport device used for signal amplification and broadcast            V.  router                     E. connects collision domains of a networkAnswer: C, D, A, E, B             

94.         Match the following terms to their meanings:            I.    topology                A. communication rules            II.   proxy                     B. large size coaxial cable            III. intranet                  C. server controlling Internet access of network            IV. protocol                 D. private Web-based network            V.  ThickNet                E. layout of a networkAnswer: E, C, D, A, B             

95.         Match the following acronyms to their descriptions:            I.    TCP/IP                   A. proprietary communications protocol            II.   IPX                        B. software controlling communications in a network            III. NOS                       C. network spanning a metropolitan area            IV. MAN                     D. type of network adapter            V.  NIC                        E. open communications protocolAnswer: E, A, B, C, D             

96.         Match the following OSI layers to their functions:            I.    Session                  A. reformats, compresses, and encrypts data            II.   Presentation           B. sets up a virtual connection between sending and receiving devices and  manages

communication            III. Data Link               C. determines where to send the data packets on the network            IV. Transport               D. assembles the data packets into frames and delivers them to the physical layer            V.  Network                 E. handles packet acknowledgmentAnswer: B, A, D, E, C             

97.         Match the following terms to their meanings:            I.    bandwidth              A. entering a user ID and password            II.   bend radius            B. examining incoming data packets to ensure they originated from an authorized

user            III. ThinNet                 C. degree of flexibility in a cable            IV. authentication        D. a type of coaxial cable used for cable TV            V.  packet screening    E. amount of data that can be transmitted in a certain amount of timeAnswer: E, C, D, A, B             

98.         Match the following terms to their meanings:            I.    firewall                  A. a security measure, composed of hardware or software, to protect a network from

attacks over the Internet            II.   terminator              B. a device that absorbs the signal to prevent its reflection back onto the network            III. passive topology    C. a special data packet on a ring topology            IV. access method       D. nodes on a network do nothing to move data along the network            V.  token                     E. controls how computers can use the transmission mediaAnswer: A, B, D, E, C             

99.         Match the following terms to their meanings:            I.    active topology                  A. combining multiple topologies into one network            II.   hybrid                                B. the routes data takes to flow between devices            III. transmission media            C. each node on the network is responsible for retransmitting the signal            IV. device driver                      D. a chunk of data containing the address of the receiving computer            V.  packet                                E. enables a device to communicate with the operating system

Page 32: cmcps

Answer: C, A, B, E, D             

100.     Match the following terms to their meanings:            I.    crosstalk                A. tendency of signals on one wire to interfere with signals on a wire next to it            II.   CAT 6                    B. can handle bandwidth of 1 Gbps            III. open protocol        C. computers connected in sequence on a single cable            IV. centralized             D. not associated with one particular vendor            V.  bus                         E. characteristic of client/server networksAnswer: A, B, D, E, C             

MS EXCEL MCQ Practice Question

Ms EXCEL1.   All formula in Excel start witha.   %b.   +c.   =d.   -

2.   You can use a function to combine text from two cells into one cell. But you can use an operator to do the same thing. Which operator is that?

a.   & (ampersand)b.   = (equal sign)c.   (space)d.   All of the above

3.   Two common wildcard characters that Excel recognizes area.   * and ?b.   < and >c.   ^ and /d.   + and -

4.   The divide symbol isa.   /b.   Dc.   \d.   )

5.   The multiplication arithmetic operator is represented by which of the following symbols?a.   ^b.   *c.   /d.   X

6.   To add two cells (A1 and A2) together you use the following formulaa.   =A1 + A2b.   =Add(A1+A2)c.   =together(A1:A2)d.   A1 plus A2

7.   To make a number in cell C1 10% smaller than the number in C3 you entera.   =C3*1.10b.   +C3*110c.   =C3%10d.   =C3*.90

8.   On an excel sheet the active cell in indicated by …a.   A dark wide boarderb.   A dotted borderc.   A blinking borderd.   None of above

Page 33: cmcps

9.   On an Excel sheet the active cell in indicated bya.   A dark wide borderb.   A dotted borderc.   A blinking borderd.   None of above

10. Using the F11 shortcut key to create a chart on chart sheet createsa.   A default chartb.   A 2-dimensional column chartc.   A 2-dimensional bar chartd.   A 3-dimensional  line chart

11. You can printa.   A range of cells by range nameb.   An entire worksheetc.   A single worksheetd.   All of the above

12. You can create only a horizontal page break by first selectinga.   A row below the row where you want the page break to occureb.   A cell in row 1c.   A cell in column Ad.   a and c

13. You can create hyperlinks from the Excel workbook toa.   A webpage on company internetb.   A web page on the internetc.   Other Office 97 application documentsd.   All

14. The cell reference fro a range of cells that starts in cell B1 and goes over to column G and down to row 10 is……

a.   B1-G10b.   B1.G10c.   B1;G10d.   B1:G10

15. The advantage of using a spreadsheet is:a.   calculations can be done automatically.b.   changing data automatically updates calculationsc.   more flexibilityd.   all of the above

16. The intersection of a row and column is called :a.   datab.   a field.c.   a celld.   an equation.

17. There are three types of data found in a spreadsheet.a.   data, words, numbersb.   equations, data, numbersc.   words, numbers, labelsd.   numbers formulas, labels

18. To select a column the easiest method is to……a.   Double click any cell in the columnb.   Drag from the top cell in the column to the last cell in the columnc.   click the column headingd.   click the column label

19. If you press ……, the cell accepts your typing as its contents.a.   Enterb.   Ctrl+Enterc.   Tab

Page 34: cmcps

d.   Insert

20. which of the following special function keys allow the content in cella.   escb.   shiftc.   returnd.   Tab

41. Late for your investors meeting? How can you quickly apply professional formatting to your sales forecast worksheet?

a.   Apply special attributes using Format Painterb.   Apply an Auto Format Stylec.   Apply a selected background colord.   All of above

42. What excel feature can you use if you want to work with one record at a time?a.   Auto Completeb.   Auto Filterc.   Data Formd.   Sub Totals

43. Excel uses the …. Function when creating a data tablea.   Averageb.   Countc.   Sumd.   Table

44. You can copy cell formats from one cell to another by using thea.   Backspace keyb.   Default fontc.   Format painterd.   Formatting toolbar

45. The accounting style shows negative numbers ina.   Boldb.   Bracketsc.   Parenthesesd.   Quotes

46. You can use drag and drop to embed excel worksheet data in a word documenta.   By dragging a range of excel data to the word button on the taskbar while pressing the Ctrl keyb.   By dragging a range of excel data to the Word    button on the taskbar while pressing Shift keyc.   By displaying both applications side-by-side and dragging a selected range of Excel data into the word application

window while pressing the Ctrl keyd.   a and c

47. A ….. is a group of cells that form a rectangle on the screen.a.   Calculationb.   Formulac.   Ranged.   Range address

48. What term describes explanatory text attached to a cella.   Calloutb.   Commentc.   Dialogd.   Extension

49. The drag and drop method of copying or movinga.   Can be used between worksheets but not workbooksb.   Can be used between workbooks but not worksheetsc.   Can be used between workbooks but not worksheetsd.   None

Page 35: cmcps

50. 3-D reference in a formulaa.   Can not be modifiedb.   Only appears on summary worksheetsc.   Limits the formatting optionsd.   Spans worksheets

51. The auto calculate featurea.   Can only add values in a range of cellsb.   Provides a quick way to view the results of an arithmetic operation on a range of cellsc.   Automatically creates formulas and adds them to a worksheetd.   a and c

52. The chart wizarda.   Can place a chart on a new chart sheet or on any sheet in the workbookb.   Can only place a chart on new chart sheetc.   Can only place a chart on a new blank worksheetd.   Can only be used to create embedded charts

53. What chart object is horizontal or vertical line that extends across the plot area to make it easier to read and follow the values?

a.   Category axisb.   Data markerc.   Data pointd.   Gridline

54. A value used in a formula that does not change is called aa.   Cell addressb.   Constantc.   Functiond.   Range

55. Suppose you have columns of data that span more than one printed page. How can you automatically print the column headings on each page.

a.   Click page setup on the file menu, click the sheet tab, and enter the row that contains these column headings under print titles.

b.   Click page setup on the file menu, click the page tab, click the options button, then enter your choices.c.   Click page setup on the file menu, click the sheet tab, and make a selection under the print heading.d.   All of above

56. a fast way to add up this column of number is to click in the cell below  the numbers and then:a.   click subtotals on the data menub.   view the sum in the formula barc.   click the auto sum button on the standard toolbar, then press enterd.   all of above

57. to view a cell commenta.   click the edit comment commands on the Insert menub.   click the Display comment command on the window menuc.   position the mouse pointer over the celld.   click the comment command on the view menu

58. When you want to insert a blank embedded excel object in w word document you cana.   Click the object command on the insert menub.   Click the office links button on the standard toolbarc.   Click the create worksheet button on the formatting toolbard.   Click the import excel command on the file menu

59. Say that you want to paste a formula result – but not the underlying formula – to another cell. In excel 2002, you would copy the cell with the formula, then place the insertion point in the cell you want to copy to what next?

a.   Click the Paste button on the standard toolbarb.   Click the arrow on the paste button on the standard toolbar, hen click formulasc.   Click the arrow on the paste button on the standard toolbar, then click values.d.   All of above

Page 36: cmcps

60. You can select a single range of cells bya.   Clicking the upper-left cell in a group of cells and then pressing the Shift key while clicking the lower right cell in a

group of cellsb.   Pressing the Ctrl key while dragging over the desired cellsc.   Pressing the Shift key and an arrow keyd.   Dragging over the desired cells

61. Which of these will not select all the cells in a document?a.   Clicking three times with the right mouse button in the spreadsheetb.   Using the Edit – Select All menuc.   Pressing Ctrl + A on the keyboardd.   Pressing Ctrl + A on the keyboard

62. The default style for new data keyed in a new workbook isa.   Commab.   Currencyc.   Normald.   Percent

63. The LEN function does what?a.   Compares the content in two cellsb.   Counts the numbers of characters in a cellc.   Deletes extra space in textd.   All of above

64. Which function converts miles to kilometers, kilograms to pounds, and so on?a.   Convertb.   Productc.   Changed.   All of above

65. You can use the drag and drop method toa.   Copy cell contentsb.   Delete cells contentsc.   Add cell contentsd.   All of above

66. To balance your checkbook in Excel, your best method isa.   Copy your check amounts into Excel so that you’ll have a neat printout to work onb.   Use Excel to check your arithmeticc.   Download the Checkbook register templates from Templates on Microsoft Office Onlined.   All of above

67. Which formula can add the all the numeric values in a range of cells, ignoring those which are not numeric, and place the resulting a different cella.   Countb.   Averagec.   Sumd.   None of above

68. To name a constant, you use the …… dialog boxa.   Create namesb.   Define namec.   Paste named.   Format cells

69. To cancel the marquee, pressa.   Ctrl + Endb.   Endc.   Escd.   Shift + Esc

70. To access the Go To Special feature, you can pressa.   Ctrl + Gb.   Ctrl + O

Page 37: cmcps

c.   Ctrl + Shift + G d.   Ctrl + 1 71. which do you press to enter the current date in a cell?a.   Ctrl + Shift + :b.   Ctrl + ;c.   Ctrl + F10d.   All of above

72. It is acceptable to let long text flow into adjacent cells on a worksheet whena.   Data will be entered in the adjacent cellsb.   No data will be ente4red in the adjacent cellsc.   There is no suitable abbreviation for the textd.   There is not time to format the text

73. Which function calculates depreciation at the same amount each year over an asset’s useful life?a.   DB (fixed-declining balance)b.   SLN (straight line)c.   DDB (double-declining)d.   All of above

74. Documentations should includea.   Destination and users of the output datab.   Source of input datac.   Information on the purpose of the workbookd.   All of above Correct Answer:  

75. Which of the following is not an underline option in the format cells dialog box?a.   Doubleb.   Single Engineeringc.   Single Accountingd.   Double Accounting

76. To select a column the easiest method is to …a.   Double click any cell in the columnb.   Drag from the top cell in the column to the last cell in the columnc.   Click the column headingd.   Click the column label

77. To select an individual data marker or data label, you musta.   Double click the data seriesb.   Right click selected markerc.   Click once to select the series markers or labels and click the desired marker or label againd.   Double click the marker or label

78. To delete and embedded object, firsta.   Double click the objectb.   Select the object by clicking itc.   Press the Shift + Delete keysd.   Select it and then press Delete key

79. This type of software contains rows and columns.a.   Drawingb.   Spreadsheetc.   Databased.   Word processing

80. To open an existing workbook, you can click the Open button on the …… toolbar.a.   Drawingb.   Formattingc.   Formsd.   Standard

81. Which of the following is not an option in the spelling dialog box?a.   Editb.   Ignorec.   Ignore all

Page 38: cmcps

d.   Change82. You can quickly change the appearance of your work by choosing Auto Format from the …. Menua.   Editb.   Viewc.   Formatd.   Tools

83. To protect a worksheet, you can choose Protection and the Protect Sheet from the ….. menua.   Editb.   Formatc.   Toolsd.   Data

84. You can open the Highlight Changes dialog box by choosing Track Changes from the …. Menu.a.   Editb.   Insertc.   Formatd.   Tools

85. Which of the following is not a worksheet design criterion?a.   Efficiencyb.   Auditabilityc.   Descriptiond.   Clarity Correct Answer:   

86. To copy cell contents using drag and drop, press thea.   End keyb.   Shift keyc.   Esc keyd.   None of above

87. If you press …., the cell accepts your typing as its contents.a.   Enterb.   Ctrl + Enterc.   TABd.   Insert

88. The autofill featurea.   Extends a sequential series of datab.   Automatically adds a range of cell valuesc.   Applies a boarder around selected cellsd.   None of above

89. What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells?a.   F3b.   F5c.   F7d.   F11

90. you can use the formula palette toa.   format cells containing numbersb.   create and edit formulas containing functionsc.   entered assumptions datad.   copy a range of cells

91. What Pivot Table toolbar button updates the data ina Pivot Table or Pivot Chart report if the source data has changeda.   Format Reportb.   Pivot Tablec.   Refresh Datad.   Show Detail

Page 39: cmcps

92. What is an expression that tells how the numbers in a determined set of cells are to be calculated?a.   Formulab.   Fieldc.   Datad.   Query Correct Answer:   

93. “Qtr 1, Qtr 2, Qtr 3” is an example of aa.   Formulab.   Functionc.   Seriesd.   Syntax

94. You can convert existing Excel worksheet data and charts to HTML document by using thea.   FTP Wizardb.   Internet Assistant Wizardc.   Intranet Wizardd.   Import Wizard

95. The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is ….a.   G1-G10b.   B1.G10c.   B1;G10d.   B1:G10

96. A user wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this?a.   Go to File-Save As – Save As Type – Excel worksheetb.   Right click on the spreadsheet tab and select DELETEc.   Right click on the spreadsheet and select Insert – Entire Columnd.   None of above

97. What feature enables you to adjust or back solve the value in a cell to reach a desired outcome in a formula?a.   Goal Seekb.   Scenario Summary reportc.   Forecastingd.   Trend line

98. what term describes a background that appears as a grainy, non smooth surfacea.   gradientb.   patternc.   solidd.   texture

99. Excel is aa.   Graphic programb.   None of thesec.   Word processord.   A spreadsheet

100.    To create an interactive Pivot Table for the web, you use a Microsoft Office Web component calleda.   HTMLb.   Pivot Table Field Listc.   Pivot Table Listd.   Pivot Table Report

 What function  displays row data in a column or column data in a row?a.   Hyperlinkb.   Indexc.   Transposed.   Rows

Page 40: cmcps

102.    When you insert an Excel file into a Word document, the data area.   Hyperlinkedb.   Placed in a word tablec.   Linkedd.   Embedded103.    Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a resulta.   IFb.   ANDc.   ORd.   NOT

104.    Macros are “run” or executed from the ….. menu.a.   Insertb.   Frmatc.   Toolsd.   Data

105.    You can open the consolidate dialog box byt choosing Consolidate from the ….. menu.a.   Insertb.   Formatc.   Toolsd.   Data

106.    Each excel file is called a workbook becausea.   It can contain text and datab.   It can be modifiedc.   It can contain many sheets including worksheets and chart sheetsd.   You have to work hard to create it

107.    Which types of charts can excel produce?a.   Line graphs and pie charts onlyb.   Only line graphsc.   Bar charts, line graphs and pie chartsd.   Bar charts and line graphs only

108.    How are data organized in a spreadsheet?a.   Lines and spacesb.   Layers and planesc.   Rows and columnsd.   Height and width

109.    What does the VLOOKUP function do?a.   Looks up text that contain ‘v’b.   Checks whether text is the same in one cell as in the nextc.   Finds related recordsd.   All of above

110.    Gridlinesa.   May be turned off for display but turned on for printingb.   May be turned on or off for printingc.   The be turned off for display and printingd.   a, b and c 

111.    You can print only an embedded chart bya.   Moving the chart to a chart sheet before you print.b.   Formatting the chart before you printc.   Selecting the chart before you printd.   a  and c

112.    Which of the following is a correct order of precedence in a formula calculation?a.   Multiplication and division, exponential positive and negative valueb.   Multiplication and division, positive and negative values, addition and subtractionc.   Addition and subtraction, positive and negative values, exponentiationd.   None of above

Page 41: cmcps

113.    A function inside another function is called a ….. function.a.   Nestedb.   Roundc.   Sumd.   Text114.    How should you print a selected area of a worksheet, if you’ll want to print a different area next time?a.   On the file menu, point to print area, and then click set print area.b.   On the file menu, click print, and then click selection under print whatc.   On the view menu, click custom views, then click addd.   All of above

115.    Youar German supplier still invoices for parts in deutsche marks. How can you have Excel convert those sums to Euros?a.   On the Insert menu, click Symbol and from the currency symbols subset, select the Euro sign.b.   On the tools menu, click Add-Ins, and select the Euro Currency Tools check boxc.   Apply a selected background colord.   All of above

116.    Which function calculates your monthly mortage payment?a.   PMT (payments)b.   NPER (number of periods)c.   PV (present value)d.   All of above

117.    If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate this feature?a.   Point to speech on the tools menu, and then click show text to speech toolbar.b.   Click validation on the data menuc.   Point to speech on the tools menu, and then click speech recognitiond.   All of above

118.    Which of the following methods can not be used to enter data in a cell?a.   Pressing an arrow keyb.   Pressing the tab keyc.   Pressing the Esc keyd.   Clicking the enter button to the formula bar

119.    Which of the following will not set text in selected cells to italics?a.   Pressing Ctrl + I on the keyboardb.   Using the Tools – Wizard – Web Form menu itemc.   Using the Format – Cells – Font menu itemd.   None of the above

120.    Which of the following methods cannot be used to edit the content of cell?a.   Pressing the Alt keyb.   Clicking the formula barc.   Pressing F2d.   Double clicking the cell

121.    You can activate a cell bya.   Pressing the Tab keyb.   Clicking the cellc.   Pressing an arrow keyd.   All of above

122.    Which of the following setup options can not be set in the page setup dialog box?a.   Printer selectionb.   Vertical or horizontal placementc.   Orientationd.   Row and column titles

Page 42: cmcps

123.    What term refers to a specific set of values saved with the workbook?a.   Rangeb.   Scenarioc.   Trend lined.   What-if analysis

124.    Got functions? No? You need the insert function dialog box. How do you get it?e.   Right click a cell and then click insertf.    Click the insert menu and then click functiong.   Type = in a cellh.   All of the above

125.    Which of the following describes how to select all the cells in a single column?a.   Right click on column and select Pick from listb.   Use data – text to columns menu itemc.   Left click on the gray column title buttond.   Pressing Ctrl + A on the keyboard

126.    when you use the fill effects in the format data series dialog box, you can nota.   rotate text on the chartb.   select a fore ground colorc.   select a patternd.   select a background color

127.    Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?a.   Rows and columnsb.   Headingsc.   Speedd.   None

128.    Which of the following is not a basic step in creating a worksheet?a.   Save the workbookb.   Modify the worksheetc.   Enter text and datad.   Copy the worksheet

129.    What’s a quick way to extend these numbers to a longer sequence, for instance 1 through 20?a.   Select both cells, and then drag the fill handle over the range you want, for instance 18 more rowsb.   Select the range you want, include both cells, point to fill on the Edit menu, and then click down.c.   Copy the second cell, click in the cell below it, on the standard toolbar click the down arrow on the Paste button, and then click Paste Speciald.   All of above

130.    To insert three columns between columns D and E you woulda.   Select column Db.   Select column Ec.   Select columns E, F and Gd.   Select columns D, E, and F.

131.    To center worksheet titles across a range of cell, you musta.   Select the cells containing the title text and use the fill handle to center the text across a range of cellsb.   Widen the columnsc.   Select the cells containing the title text and use the fill handle to center the text across a range of cellsd.   Widen the column

132.    When integrating Ms-Word and Excel, Word is usually thea.   Serverb.   Sourcec.   Clientd.   None

Page 43: cmcps

133.    Charts tips cana.   Show the formatting of a data labelb.   Show the name of a data seriesc.   Show the value of data pointd.   b and c

134.    The Name boxa.   Shows the location of the previously active cellb.   Appears t the left of the formula barc.   Appears below the status bard.   Appears below the menu bar

135.    How do you change column width to fit the contents?a.   Single-click the boundary to the left to the column headingb.   Double click the boundary to the right of the column headingc.   Press Alt and single click anywhere in the columnd.   All of above

136.    when you work with large worksheets, you may need toa.   size the worksheet to fit on the specific number of pagesb.   add and remove page breaksc.   specify only certain print areasd.   all of above

137.    Hyperlinks cannot bea.   Special shapes like stars and bannersb.   Drawing objects like rectangles ovalsc.   Picturesd.   All can be hyperlinks

138.    You can use the horizontal and vertical scroll bars toa.   Split a worksheet into two panesb.   View different rows and columnsc.   Edit the contents of a celld.   View different worksheets

139.    What do we call a computer program that organizes data in rows and columns of cells? You might use this type of program to keep a record of the money you earned moving lawns over the summer.a.   Spreadsheet programb.   Database programc.   Word processor programd.   Desktop publisher program

140.    You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar.a.   Standardb.   Formattingc.   Drawingd.   Picture

141.    To drag a selected range of data to another worksheet in the same workbook, use thea.   Tab keyb.   Alt keyc.   Shift keyd.   Ctrl key

142.    When creating a vertical page breaka.   The active cell must be A1b.   The active cell can be anywhere in the worksheetc.   The active cell must be in row 1d.   The active cell must be in column A

Page 44: cmcps

143.    to activate the previous cell in a pre-selected range, pressa.   the Alt keyb.   the Tab keyc.   the Enter keyd.   none of above

144.    When the formula bar is activated, you can seea.   The Edit Formula buttonb.   The Cancel buttond.   All of above145.    In a worksheet you can selecta.   The entire worksheetb.   Rowsc.   Columnsd.   a, b, and c

146.    when you print preview a worksheeta.   the entire worksheet is displayedb.   the selected range is displayedc.   the active portion of the worksheet is displayedd.   a, b and c

147.    You can group noncontiguous worksheets witha.   The group button on the standard toolbarb.   The shift key and the mousec.   The ctrl key and moused.   The alt+enter key

148.    Weight refers toa.   The print density of charactersb.   The height of the printed characterc.   Upright or slanted shaped.   The design and appearance of characters

149.    When you link data maintained in Excel workbook to a Word documenta.   The Word document cannot be editedb.   The Word document contains a reference to the original source applicationc.   The word document must contain a hyperlinkd.   The word document contains a copy of the actual data

150.    When you see a cell with a red triangle in the top right corner, what does this signify?a.   There is an error in the cellb.   There is a comment associated with the cellc.   The font color for text in the cell is redd.   A formula cannot be entered into the cell

151.    To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click thea.   Unfreeze panes command on the window menub.   Freeze panes command on the window menuc.   Hold titles command on the edit menud.   Split command on the window menu

152.    Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?a.   Use Ctrl to select all three cells, then click the paste button on the standard toolbarb.   Copy the selected cell, then select the other two cells, click style on the Format menu, then click Modifyc.   Click format painter on the Formatting toolbar twice then click in each cell you want to copy the formatting tod.   All of above

153.    To edit data in an embedded Excel worksheet object in a Word documenta.   Use the Excel menu bar and toolbars inside the word applicationb.   Edit the hyperlinkc.   Edit the data in a Excel source applicationd.   Use the Word menu bar and toolbars

Page 45: cmcps

154.    Status indicators are located on thea.   Vertical scroll barb.   Horizontal scroll barc.   Formula bard.   Formatting toolbar

155.    You can open the scenario Manager dialog box by choosing scenarios from the ….. menu.a.   Viewb.   Insertc.   Formatd.   Tools

156.    You can open the Sort dialog box by choosing Sort from the ….. menua.   Viewb.   Formatc.   Toolsd.   Data

157.    when working in the page break preview, you cana.   view exactly where each page break occursb.   add or remove page breaksc.   change the print aread.   all of above

158.    A data map is helpfula.   When you have too much data to chartb.   To show a geographic distribution of datac.   To compare data pointsd.   To show changes in data over time

159.    Rounding errors can occura.   When you use multiplication, division or exponentiation in a formulab.   When you use addition and subtraction in a formulac.   Because Excel uses hidden decimal places in computationd.   When you show the results of formulas with different decimal places than the calculated results

160.    You can copy data or formulasa.   With the copy, paste and cut commands on the edit menub.   With commands on a shortcut menuc.   With buttons on the standard toolbard.   All of the above

161.    You can zoom a worksheeta.   With the mouse pointer in Print Previewb.   With the zoom button on the Print Preview toolbarc.   With the Zoom command on the view menud.   All of the above

162.    You can not link Excel worksheet data to a Word documenta.   With the right drag methodb.   With a hyperlinkc.   With the copy and paste special commandsd.   With the copy and paste buttons on the standard toolbar

163.    This type of software is similar to an accountant’s worksheeta.   Word processingb.   Databasec.   Spreadsheetsd.   Graphics

164.    which function will calculate the number of workdays between 6/9/2004 and 8/12/2004?a.   Workdayb.   Datec.   Networkdaysd.   All of the above

Page 46: cmcps

165.    Data marker on a chart are linked to data points in a worksheet, therefore,a.   You can automatically apply formatting to a data seriesb.   You can change the position of a data marker and automatically change the data point value in the worksheetc.   You can change a data print value and automatically are draw the chartd.   a and b

166.    When you group worksheetsa.   You can enter variable data on multiple worksheets at one timeb.   You can print more than one worksheet at a timec.   You can enter common data, formats, and formulas on multiple worksheets at one timed.   b, and c

167.    You can use the format painter multiple times before you turn it off bya.   You can use the format painter button only one time when you click itb.   Double clicking the format painter buttonc.   Pressing the Ctrl key and clicking the format painter buttond.   Pressing Alt key and clicking the format painter button

168.    The default header for a worksheet isa.   Your nameb.   The date and timec.   Noned.   The sheet tab name