1 |
The microphone converts the sound into. |
Mechanical signals
Electrical signals
Computer file
Software
|
2 |
Smallest unit of memory is |
Byte
Bits
Character
Word
|
3 |
The name for the screen clarity is. |
Resolution
Discrete
Pixel
LCD
|
4 |
A computer derives its basic strength from. |
Speed
Accuracy
Memory
All of above
|
5 |
Software program designed to be managed, rather than manipulated by the user, are called. |
Icons
knowledge workers
Enablers
Agents
|
6 |
May experts predict that the most important enhancement to the user interface of the future will be. |
A new menu structure.
Talk writers
Knowledge
A new type of pointing device.
|
7 |
Broadband fiber optic cables can simultaneously transmit. |
Telephone cells and television signals
Two way computer communications
Software and firmware
a and b
|
8 |
Computer scientist still have not. |
Developed tools that will allow programmers to quickly produce error free software.
Gotten anywhere past the theory of virtual reality
Developed the first intelligent agent
Had any real success with speech recognition
|
9 |
The information infrastructure of computers and networks can be compared with. |
The railroads of the nineteenth century
The airline industry
Our modern highway system
All of the above
|
10 |
Researchers today are developing RISC processors and parallel processing in a quest for. |
Smaller computers
A society that only uses embedded computer
Speed
Agents
|
11 |
Flat-Panel displays and solid state storage devices are. |
Rapidly improving because of intensive industry research
Ideal that aren't expected to become products.
Futuristics devices only seen on Star Trek
a and c.
|
12 |
Research is bringing down the cost of solid state semiconductor storage , which me. |
the cost computers will rise.
Rewritable cards will probably replace most disks and ROM
Storage capacity will become fixed
We will conserve our store of silicon.
|
13 |
If the experts are right, we can expect the price - to - performance ratio of hardware. |
To double every year or two for several years.
To go down every year or two for several years
To stay the same for a while
None of the abvoe
|
14 |
Which of the following is decreasing as computer technology progresses. |
Hardware reliability
Efficiency
Speed
Hardware cost.
|
15 |
The Acronym SILK represents. |
The name of a new desktop computer with futuristic capabilities.
One researcher's vision of the themes emerging in user interface technology
The minimum qualifications of a software agent.
A new type of multimedia software application
|
16 |
What is liable to be the biggest obstracte to the advancement of computer technology in the next few years? |
Keeping hardware costs down.
Finding new tasks for computers to do.
Increasing the speed of software.
Designing reliable software .
|
17 |
A computer product becomes so entrenched that humans use it without conscious though. |
The product has failed and will no longer sell
It will soon be replaced.
The product has succeeded enough to move into the fourth phase of any information technology or media.
The product will never be replaced by new inventions.
|
18 |
According to Alan Kay's for rules for predicting the future, how long does it take for new technology to go from the research lab to the market place? |
About six months
About three years
About ten years
About a generation
|
19 |
Alan Kay says we can predict the future by recognizing the four phases of any technology or media. |
Hardware, software, people finance,
Hardware, software, service, way of lime
People , machines, service, finance.
Hardware, program, people , ideas
|
20 |
Which of the following is not a logical prediction for the future? |
Computers will be smaller and lighter.
Computer will be less expensive
Computer are not going to get any faster, we've reached a limit already
Computer will be easier to use.
|
21 |
According to Alan Kay of Apple Computer, what is the best way to predict the future. |
Invent it
Look at the major research tabs.
Project current trends into the future.
Figure out what made past products successful.
|
22 |
A complex system that can assume complete responsibility for a task without human input is called an. |
Independent weapons system
Autonomous system
Generated system
Smart weapon system.
|
23 |
For many who understand computers, the biggest issue of concern related to autonomous military system is. |
The unpredictability of the enemy
The these systems might not react quickly enough to an attack
Software reliability
Hardware capacity
|
24 |
One problem with high-tech weapons is that. |
they have become too large to store securely
they reduce the amount of time people have to make life and death decisions.
When people try to control them manually, they are unpredictable
There is no problem with high tech weapons.
|
25 |
Selling information about people is. |
Always against the law in the UNited States.
Highly unethical in a capitalist society
A contradiction of terms information can't sold
An increasingly important aspect of modern business
|
26 |
Why do many companies use call-back security systems, in which the computer calls the user on the phone before allowing access. |
To identify user by voice recognition
A check phone lines for modern taps
To prevent unauthorized use stolen passwords
Actually, call back systems are outdated.
|
27 |
Will are the two inherent characteristics computers have that most leave them open to attack or operating error? |
A computer is difficult to hide/hardware is portable.
Every computer network is easily accessible/files are easy to copy
A computer will do exactly what it's programmed to do a computer can do only what what it's programmed to do.
Computers are so programmable that they don't have any inherent characteristics.
|
28 |
Why are computer crimes so hard to detect? |
Disk can easily be creased to get rid of the evidence.
Someone can steal information and leave the original behind.
Most computer crimes are committed by insiders.
All of these make computer crimes hard to detect
|
29 |
One way a database manager might be able to see if an intruder has been on the system is by using. |
A encryption device
Audit control software
A copy protection scheme
A password
|
30 |
What is the most common computer crime of these listed below? |
Extortion of bank funds
IRS database sabotage
Putting people on junk mailing lists
Software piracy
|
31 |
A virus program is usually hidden in. |
The operating system only
An application program only
The disk drive
The operating system of application programs
|
32 |
A program that performs a useful task and at the same, time, carries out some secret destructive act, is known as a. |
Sabotage
Trojan horse
Worm
Logic bomb
|
33 |
What is the standard method of allowing only known and authorized users on a multi user computer system. |
Identification by fingerprints.
Passwords and or login name
Expert systems
voice recognition
|
34 |
The purpose of intellectual property law is to. |
Allow the creator to make money
Justly reward mental labor
Encourage innovation
All of the above
|
35 |
Information . |
Is a marketable commodity
Can be stolen while leaving the original behind
Should be free, according to the original hacker ethic .
All of the above
|
36 |
Copyright are issued by the Federal Government to protect. |
The pricing of software
Intellectual property
Textbooks only
The author's identity
|
37 |
The problem of protecting the privacy in computer systems is aggravated by the increased use of. |
Command line user interfaces
Work stations
New CPU hardware.
Network
|
38 |
The most common from of computer crime is. |
Stealing hardware
Theft of money, goods, information, and computer resources
Spying on other people in the network
Writing viruses.
|
39 |
Most computer crimes are committed by. |
Hackers
International spies
Highly trained computer consultants
Company insiders who have no extraordinary technical ingenuity
|
40 |
According to the FBI, the average computer crime is worth. |
About the same as a car theft
Left than most other crime because information is free
For more than most other crime
the FBI doesn't know because computer crime to a relatively new type of crime.
|
41 |
Nobody knows the true extent of computer crime because. |
Many computer crimes are never detected
Companies often do not report computer crime because they are afraid of bad publicity.
a and b
None of the above.
|
42 |
Computer crime is likely to continue to grow unless. |
Electronic bulletin board operators are held responsible for information others post on their BBS.
Corporations and government agencies recognize the importance of security with their walls.
Law-enforcement agencies stop worrying about corporate insiders and, instead, increase their efforts to arrest teenage hackers.
We decide that freedom of the press does not apply to on-line magazines.
|
43 |
People are currently using smart cards. |
To pay highway tolls
As keys to access sensitive data on computers
as food stump
All of the above
|
44 |
Three major issue that have an impact on the success of successes of educational technology. |
Money, teacher training, motivation of students.
Money, teacher training, restructuring of schools.
Geographical location of school,parental communitment, student interest.
IQ of the students teacher interest, student involvemnt.
|
45 |
Why would computer programs that teach reading sills be a good idea in adult literacy education? |
Most teachers refuse to work with adults
Adults adapt to computers more quickly than children to.
Illiterate adults know that the computer will not think they are stupid all of these
All of these
|
46 |
The form of computer assisted instruction known as drill and practice. |
Helps students lern to think in ways that aren't possible otherwise
Does Not help students learn to think, but helps students memorize facts and skills
Doesn't help students learn to think better or to memorize facts and sills, in fact, it's nearly worthless
Allow students to program computers with easy-to understand languages.
|
47 |
When it comes to educational simulations, people believe. |
that children learn best through exploration and invention.
that games are no way to spend classroom time
That simulations are no substitute for reality
People believe all of these thing about educational simulations, whether they are true or not.
|
48 |
A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of. |
Visualization
Distance learning
CAD/CAM
Virtual reality
|
49 |
Smart cards. |
Have a microprocessor and memory in them
Are currently only used for checking and credit card services.
a and b
None of these
|
50 |
Which of the following will be technologies in the home the the future. |
Fiber optics will allow cable companies to do narrowcasting like "the surfing channel"
CD-ROM will allow software companies to make interactive movies like surfing in your garage.
Virtual reality software will allow you to explore a surfer's home
All of the above
|
51 |
The programming language LOGO |
Tells a turtle to draw graphics on a screen
I sued to teach young children programming and problem solving skills
A and b
Neither a nor b and true
|
52 |
Which of the following is a major benefit of drill and practice computer assisted instructions |
Students who use CAI develop their social skills
There is immediate feedback for the student
All strudents can learn at the same, fixed pace none of the above.
None of the above
|
53 |
Instructional software is often referred to as |
Eduware
Courseware
Firmware
School ware
|
54 |
Computer class rooms. |
Improve memorization skills, but provide no help with learning analytical skills
Decrease school budgets by replacing teachers.
Allow students to work at their own pace
Improve student analytical sills, but provide no help with creative work
|
55 |
A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of |
Visualization
Distance learning
CAD/CAM
Virtual reality
|
56 |
Smart cards |
Have a microprocessor and memory in them
Are currently only used for checking and credit card services
a and b
None of these
|
57 |
Instructional software is often referred to as. |
Eduware
Courseware
Firmware
School ware
|
58 |
Which of the following is not used in educational software? |
Simulation
Drill and practice
Hypermedia
All of these are used
|
59 |
What is a major problem of using computer in education? |
The students can't work at their own pace
Creativity is eliminated by computers
The lack of teacher training
The students must work without a teacher
|
60 |
The main advantage of computer assisted instruction (CAI) is |
It's inexpensive
It can replace out of date textbooks
It exposes students todifferentuser interfaces
It allow individuals to learn at their own pace
|
61 |
Steve Wozniak and Steve Job major contribution to the world of computers was. |
popularizing the personal computer
Developing the BASIC language
Introducing the concept of computer assisted instruction
Founding Microsoft
|
62 |
A management information system (MIS) can be used by. |
Only top -level managers in the company
Only mid - level managers in the company
Only low level managers in the company
Only MIS can be used by all levels of management
|
63 |
Offices that are set up so workers can commute to a location near their home are called. |
Regional work centers
Portable computer centers
BEHEMOTHS
Modem stations
|
64 |
Some analysis suggest that telecommuting will become more popular with managers and workers when. |
Worker ae forced to telecommute
Managers finally give up the idea of controlling workers
Multimedia teleconferencing system become affordable
Automobiles become outdated
|
65 |
Document imaging system include. |
Scanners
Magnetic and optical storage disk drives
Fax machines
All of the above
|
66 |
Document imaging systems include |
Scanners
Magnetic and optical storage disk drives
Fax machines
All of the above
|
67 |
In the paperless office of the future, it is predicated that. |
Magnetic archives will replace fill cabinets
Electronic communication will replace memos and letters
Information utilities will replace newspapers
All of the above
|
68 |
Computer supported cooperative work is possible if. |
Groupware and telecommunications are available
Workers have close proximity
Workers live in the same time zone for interactivity to take place
None of these CSCW is a futuristic ideal that, for the most part, hasn't been acknowledged
|
69 |
Electronic sweatshope |
Are increasingly located across nadonal border
May soon decline in number because of improvements in automated input technology
Both a and b
Neither a nor b
|
70 |
One common problem with computer monitoring is that workers who are monitored may |
Develop carpal tunnel syndrome
Assume that if it's not being counted, it's not important enough to do
Require ongoing training
Come in contact with computer viruses
|