Name:     ID: 
 
Email: 

Internet Applications Pre-Test

True/False
Indicate whether the statement is true or false.
 

 1. 

Digital technology has changed the way we view privacy.
 

 2. 

In the binary number system, 2 is used to represent the value 2.
 

 3. 

An interpreter converts and executes one statement at a time.
 

 4. 

Most processors in today’s personal computers use RISC technology.
 

 5. 

Currently, hard drive capacity is measured in gigabytes (GB) or terabytes (TB).
 

 6. 

DVD-RW technology allows you to write data to a disc, and then later change that data.
 

 7. 

A keyboard is an example of a pointing device.
 

 8. 

Desktop widgets come with a computer and are not available from other sources.
 

 9. 

Spreadsheets have built-in formulas.
 

 10. 

Open source software is copyrighted.
 

 11. 

Product activation and registration represent the same function with different names.
 

 12. 

Antivirus software does not require any updates.
 

 13. 

In a dual boot system, you must select which operating system to use.
 

 14. 

The D drive must refer to a CD or DVD drive.
 

 15. 

One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms and other attacks is because of hackers with anti-establishment sentiments.
 

 16. 

A file is deleted when you hit the Delete key.
 

 17. 

Software specifically designed to do backups of your files also scans the files for viruses so you don’t have to worry about it.
 

 18. 

MAC addresses are used for some low-level network functions and can also be employed to establish network security.
 
 
nar006-1.jpg
 

 19. 

When two packets collide in an Ethernet network,, as illustrated in the accompanying figure, the two devices wait for random time periods before retransmitting to prevent a collision from reoccurring.
 

 20. 

Microwaves cannot be aimed in a single direction and have less carrying capacity than radio waves.
 

 21. 

A cryptographic algorithm is a word, number, or phrase that must be known to encrypt or decrypt a message.
 

 22. 

You must pay for a domain name.
 

 23. 

You may use an analog modem even if your phone is digital.
 

 24. 

Any server that creates a cookie on your hard drive can request that cookie the next time you connect to one of its Web pages.
 

 25. 

Digital audio is music, speech, and other sounds represented in a binary format for use in digital devices.
 
 
nar010-1.jpg
 

 26. 

Monochrome bitmaps, like the one shown in the accompanying figure, require a lot of storage space.
 
 
nar011-1.jpg
 

 27. 

With vector graphics, like the one found in the accompanying figure, objects may be layered over other objects.
 

 28. 

Text contained in a vector graphic image is stored as actual text, not just a series of colored dots.
 

 29. 

Because desktop, Web-based, and PDA videos are shown on a small computer screen at a fairly low resolution, recording with an inexpensive camera will not make a difference on the quality of the final video.
 

 30. 

CDs with copy protection cannot be duplicated and music that is ripped to another format does not play back correctly.
 

 31. 

DRM technologies such as watermarks and copy generation management are used to limit how you can use movies you have downloaded.
 

 32. 

All major companies in the IT industry are headquartered in the Silicon Valley.
 

 33. 

It is less expensive to replace software with brand-new software than to purchase an upgrade.
 

 34. 

In the United States, the IT industry is regulated by the FCC.
 

 35. 

In IT,  job titles are standardized.
 

 36. 

Most information systems rely on computers and communications networks to store, process, and transmit information with far more efficiency than would be possible with manual systems.
 

 37. 

A small business might require several information systems be integrated into an enterprise information system to support a variety of business activities.
 

 38. 

A modified waterfall SDLC allows overlap between SDLC phases.
 

 39. 

In the SDLC, the goal of the activities in the planning phase is to create a list of requirements for the new or revised information system.
 

 40. 

Acceptance testing is designed to verify that the new information system works as required.
 

 41. 

The simplest model for storing data is the flat file.
 
 
nar016-1.jpg
 

 42. 

In the accompanying figure, the relationship shown in the top row is a one-to-many relationship.
 

 43. 

A relational database stores data in a collection of related tables.
 

 44. 

Database tables should be indexed by any field or fields that are commonly used as search fields.
 

 45. 

The average American is in less than 10 commercial databases.
 

 46. 

A simple high-level command does the work of multiple low-level commands.
 

 47. 

One type of control structure is directing.
 

 48. 

Signed certificates assure the original software is free of viruses and bugs.
 

 49. 

It is easy for most consumers to fix a problem that occurs at run-time. That is why the box appears asking if you want to debug.
 

 50. 

OO programmers often use flowcharts to plan the classes to be programmed.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 51. 

An ordinary personal computer that is connected to a network is a ____.
a.
mainframe
c.
server
b.
workstation
d.
console
 

 52. 

A super-thin slice of semiconducting material packed with microscopic circuit elements is a ____.
a.
integrated circuit
c.
microchip
b.
computer chip
d.
all of the above
 

 53. 

A ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
a.
compiler
c.
converter
b.
interpreter
d.
instruction
 

 54. 

The ____ is a command word for an operation such as add, compare or jump.
a.
op code
c.
ALU
b.
operand
d.
instruction code
 

 55. 

The ____ fetches each instruction.
a.
op code
c.
ALU
b.
operand
d.
control unit
 
 
Case-Based Critical Thinking Questions

Case 1-3
Jim has just purchased a new computer and it has made him think about how it works.  He is particularly  interested in how information is processed and stored in his computer.  He has come to you for help.
 

 56. 

When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add.  He wants to know where the result of the add goes.  You tell him it goes to ____.
a.
the ALU
c.
the accumulator
b.
another register
d.
the printer
 
 
nar003-1.jpg
 

 57. 

In the accompanying figure, the item marked B is a(n) ____.
a.
USB port
c.
parallel port
b.
serial port
d.
keyboard port
 

 58. 

Software most commonly associated with productivity software is ____.
a.
Windows
c.
Word processing
b.
Real-time players
d.
Browsers
 

 59. 

When creating a formula in a spreadsheet, for flexibility, each operand is a ____.
a.
number
c.
cell reference
b.
cell number
d.
location
 

 60. 

A shrink wrap license goes into effect as soon as ____.
a.
you use it
c.
you open it
b.
you purchase it
d.
you register it
 

 61. 

Portable software is ____.
a.
designed for portable devices
c.
designed to run from removable storage
b.
licensed only for portable devices
d.
designed to run on portable devices
 

 62. 

Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key and temp is ____.
a.
ear training
c.
compuer-aided music
b.
notation
d.
MIDI
 

 63. 

An extension of .ocx designates a ____ type of file.
a.
configuration
c.
sound
b.
support
d.
database
 
 
nar004-1.jpg
 

 64. 

The figure above is an example of a(n) ____ tool.
a.
file management
c.
find file
b.
explore
d.
file organization
 

 65. 

Information kept about a file includes ____.
a.
size
c.
deletion date
b.
print settings
d.
all the above
 
 
Case-Based Critical Thinking Questions

Case 4-1
Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way that they can easily find and share the files.
 

 66. 

Tom and Andy both have Microsoft Word. It would be best to store their files in its native format with an extension of ____.
a.
.doc
c.
.rtf
b.
.txt
d.
all the above
 

 67. 

The physical arrangement of devices in a network is referred to as its physical ____.
a.
topography
c.
logology
b.
logography
d.
topology
 

 68. 

To configure a file server, open a browser from any workstation, enter the file server’s ____ address, and provide the administrator ID and password.
a.
TCP
c.
LAN
b.
network
d.
IP
 

 69. 

____, also referred to as personal mode, is a type of WPA used on most home networks.
a.
WSA
c.
WEP2
b.
WEP
d.
PSK
 

 70. 

____ is a crucial technology for e-commerce and e-mail.
a.
Symmetric key encryption
c.
Public key encryption
b.
Network security key
d.
all of the above
 

 71. 

Every domain name corresponds to a unique IP address that has been entered into a ____.
a.
domain database
c.
name server
b.
domain name server
d.
none of the above
 

 72. 

A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.
a.
DSL filter
c.
DSL modem
b.
DSL converter
d.
DSL adapter
 

 73. 

____ wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities.
a.
Mobile
c.
WiFi
b.
Cellular
d.
Fixed
 

 74. 

The disadvantage of WAP-enabled devices is their ____.
a.
access speed
c.
battery life
b.
screen size
d.
all of the above
 
 
nar007-1.jpg
 

 75. 

The figure above is a screenshot of FileZilla, the file to be downloaded is indicated by ____.
a.
box A
c.
box C
b.
box B
d.
none of the above
 

 76. 

The average “survival time” for an unprotected computer to remain uncompromised is only ____.
a.
9 seconds
c.
9 hours
b.
9 minutes
d.
9 days
 

 77. 

Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is ____.
a.
1G
c.
2.5G
b.
2G
d.
3G
 

 78. 

____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
a.
HTML
c.
HTTP
b.
URL
d.
FTP
 

 79. 

When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.
a.
cache
c.
converter
b.
plug-in
d.
source
 

 80. 

____ allow a Web site to store information on the client computer for later retrieval.
a.
Tags
c.
Biscuits
b.
Cookies
d.
Labels
 

 81. 

To use POP e-mail you must install e-mail ____ software on your computer.
a.
server
c.
resource
b.
database
d.
client
 
 
Case-Based Critical Thinking Questions

Case 7-2

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online, and just how much she is compromising her privacy by doing so.  Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web.  In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties.
 

 82. 

As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive.  What do these sites use to store visit information? 
a.
certificate authorities
c.
digital certificates
b.
cookies
d.
Web servers
 
 
Case-Based Critical Thinking Questions

Case 7-3
Melissa has decided to obtain an e-mail account. Although she plans to use the email account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers.  Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients.
 

 83. 

Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the potential employers will successfully make it to them.  She should try to limit the size of the attachment to ____ or less for dial-up connections.
a.
10 KB
c.
100 KB
b.
50 KB
d.
200 KB
 

 84. 

____ compression can be applied to video footage to eliminate redundant or unnecessary data between frames.
a.
Framed
c.
Key
b.
Temporal
d.
Indexed
 

 85. 

____ is the process of recording a broadcast so that it can be played back at a more convenient time.
a.
Time shifting
c.
Program
b.
Format
d.
Delay
 

 86. 

The type of manual calculator first used in ancient Rome, Greece, India, China and Japan is called a/n ____.
a.
slide rule
c.
abacus
b.
algorithm
d.
Napier’s Bones
 

 87. 

An experimental device that typically must be further developed and perfected before going into production is called a ____.
a.
alpha
c.
prototype
b.
beta
d.
omega
 

 88. 

The general-purpose electronic computer designed to calculate trajectory tables for the U.S. Army was the ____.
a.
COLOSSUS
c.
ENIAC
b.
Enigma
d.
UNIVAC
 

 89. 

A vacuum tube can have ____ states.
a.
one
c.
three
b.
two
d.
unlimited
 

 90. 

Factors affecting the success of the IT industry include:
a.
population growth & business globalization
c.
population growth & interest rate declines
b.
gaining population & business globalization
d.
Internet declines & business globalization
 
 
nar012-1.jpg
 

 91. 

The file cycle of a new computer model is shown above.  In the figure above, Box C represents ____.
a.
Product Development
c.
Introduction
b.
Product Announcement
d.
Product Design
 
 
nar013-1.jpg
 

 92. 

The figure shown above represents computer and software marketing channels.  In that figure, Box A represents ____.
a.
Distribution centers
c.
Mail-order suppliers
b.
Value-added Resellers
d.
Retail Stores
 

 93. 

____ is a special type of retailing in which a vendor takes orders by phone or an Internet site.
a.
Manufacturer direct
c.
VAR
b.
Mail-order
d.
All of the above
 

 94. 

A hypertext version of your resume is called a ____.
a.
web page
c.
web portfolio
b.
web-based resume
d.
web resume
 
 
Case-Based Critical Thinking Questions

Case 9-2
Jimmy recently graduated and is looking for his first full-time job.  He has turned to you for help.  Jimmy knows you recently graduated and got a new job.  He thinks you can give him some advise to help with his search.
 

 95. 

You advise Jimmy that one of the problems for job hunters using the Internet is ____.
a.
making sure to only apply for jobs that meet his requirements
c.
job titles are non-standard
b.
posting his resume
d.
all of the above
 

 96. 

Which quality of service (QoS) metric is defined as the number of errors occurring in a particular time interval for a particular function?
a.
response time
c.
user levels
b.
accuracy
d.
capacity
 
 
nar017-1.jpg
 

 97. 

In the SQL query in the accompanying figure, how many tables will be accessed?
a.
four
c.
one
b.
two
d.
zero
 

 98. 

A single programmer can, on average, write, test, and document only ____ lines of code per day.
a.
10
c.
20
b.
15
d.
25
 

 99. 

Assembly languages are considered ____ generation languages.
a.
first
c.
third
b.
second
d.
fouth
 

 100. 

Microsoft’s ____ technology uses Internet Explorer as the verification client.
a.
code wrapping
c.
Verisign
b.
Authenticode
d.
DigiSign
 

Completion
Complete each statement.
 

 101. 

Probably the most significant force driving research into fast computers and more sophisticated graphics processing is computer ____________________.
 

 

 102. 

Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is ____________________.
 

 
 
nar002-1.jpg
 

 103. 

In the figure above, as indicated by Box B, the sound wave has been sliced into samples and so has been ____________________.
 

 

 104. 

____________________ is special high-speed memory that allows the processor to access data more rapidly than from memory located elsewhere on the motherboard.
 

 

 105. 

RAM is ____________________, which means that it requires electrical power to hold data.
 

 

 106. 

The segment of the data bus that connects RAM to peripheral devices is called the ____________________ bus.
 

 

 107. 

Word processing, desktop publishing, and web authoring are the three most popular types of a kind of production software classified as ____________________.
 

 

 108. 

A collection of software applications sold as a single package is called a software ____________________.
 

 

 109. 

The key ingredients necessary to install new software that contains the programs and data are ____________________.
 

 

 110. 

A database that keeps track of your computer’s pheripheral devices, software preferences, and settings is the Windows____________________.
 

 

 111. 

Activities competing for the attention of your computer’s microprocessor are called ____________________.
 

 

 112. 

Microsoft Windows’ two major weaknesses are reliability and ____________________.
 

 

 113. 

The ability to use one computer to simulate the hardware and software of another is called a virtual ____________________.
 

 

 114. 

A named collection of data that exists on a storage medium is a computer ____________________.
 

 

 115. 

A section of a hard disk drive that is treated as a separate storage unit is a disk ____________________.
 

 

 116. 

A list of files is called a(n) ____________________.
 

 

 117. 

The process of creating equivalent electronic storage bins on a disk is ____________________.
 

 

 118. 

The arrangement of devices in a network is referred to as its ____________________.
 

 

 119. 

A communications ____________________, or link, is a physical path or a frequency used for signal transmission.
 

 

 120. 

High-bandwidth communications systems are sometimes referred to as ____________________.
 

 

 121. 

A(n) ____________________ is a parcel of data that is sent across a computer network.
 

 

 122. 

Most wireless networks transport data using ____________________ signals.
 

 

 123. 

The term ____________________ was first used in the mid-1960s to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read.
 

 

 124. 

Web ____________________ software provides tools specifically designed to enter and format Web page text, graphics, and links.
 

 

 125. 

A series of program instructions (e.g., written in JavaScript or VBScript) embedded directly into the text of an HTML document is called a(n) ____________________.
 

 

 126. 

If you click an ad, a third party can surreptitiously create a(n) ____________________ cookie and use it to track your activities at any site containing banner ads from that third party.
 

 

 127. 

A MIDI-capable sound card contains a(n) ____________________, which is a set of pre-recorded musical instrument sounds.
 

 

 128. 

____________________ works by superimposing a grid over a vector image and determining the color for each pixel.
 

 

 129. 

____________________ cameras capture video data in digital format and attach directly to a computer.
 

 

 130. 

Popular ____________________ include MPEG, Sorenson, Cinepak, DivX, and Windows Media Video.
 

 

 131. 

____________________ video sends a small segment of a video to your computer and begins to play it.  While the segment plays the next segment  is sent then played, and so on, until the video ends.
 

 

 132. 

A vacuum tube is an electronic device that controls the flow of ____________________.
 

 

 133. 

The first electronic spreadsheet was ____________________.
 

 

 134. 

The use of components or labor from outside suppliers is called ____________________.
 

 

 135. 

The sharp rise in the stock value of the dot com industry is called the dot com ____________________.
 

 

 136. 

Publicizing information about new product features takes place in the phase known as product ____________________.
 

 

 137. 

Computer hardware and software are sold through outlets called marketing ____________________.
 

 

 138. 

Some information systems collect and store ____________________ information generated by the organization itself.
 

 
 
nar015-1.jpg
 

 139. 

The items in the figure above are symbols from a(n) ____________________.
 

 

 140. 

A(n) ____________________ diagram depicts the detailed sequence of interactions that take place for a use case.
 

 

 141. 

During the ____________________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.
 

 

 142. 

Each column of a relational database table is equivalent to a(n) ____________________.
 

 

 143. 

In the context of object-oriented databases, a(n) ____________________ defines a group of objects by specifying the attributes and methods these objects share.
 

 

 144. 

A(n) ____________________ is software optimized for the object-oriented database model.
 

 

 145. 

A(n) ____________________ database is one which is stored on several computers, on multiple networks, or in different geographical locations.
 

 

 146. 

The ____________________ data type is used to store dates in a format that allows them to be manipulated.
 

 

 147. 

A(n) ____________________ represents a value that can change.
 

 

 148. 

A template for a group of objects whith similar characteristics is a(n) ____________________.
 

 

 149. 

A(n) ____________________ is any class that inherits attributes from a superclass.
 

 

 150. 

A software program that identifies its source and carries a digital certificate attesting to its authencity is code identified as ____________________.
 

 



 
         Start Over