Skip to document
This is a Premium Document. Some documents on Studocu are Premium. Upgrade to Premium to unlock it.

BTM final questions

Sample multiple choice questions for the final exam
Course

Business Technology Management (BTM 200)

477 Documents
Students shared 477 documents in this course
Academic year: 2020/2021
Uploaded by:
Anonymous Student
This document has been uploaded by a student, just like you, who decided to remain anonymous.
Concordia University

Comments

Please sign in or register to post comments.
  • Student
    a very useful document. well - clear organized . questions listed with their answers which is handy for references/ Thank you for sharing

Related Studylists

BTM 200btmbtm 200

Preview text

BTM FINAL

  1. Which transmission medium transmits data the fastest? Fiber-optic cable 2) Boot-sector viruses are often transmitted by a flash drive left in a usb _port.

  2. Most word processing programs come with a search & replace tool that_ allows you to locate/replace specific text. TRUE

  3. Which of the following is not a user interface? Application programming interface (API)

  4. Which of the following is the most common audio compression format? MP

  5. Hyperthreading provides high speed info processing by enabling a new set of instructions to start before the previous set has been finished.

  6. Each device attached to your computer has a special program called device driver that enables the device/os to communicate with eachother.

  7. File names in Windows are case-sensitive. FALSE

  8. A HAN network is located in your residence that connects to all your digital devices

  9. Multimedia software includes all the following except utility software.

  10. Starting a computer when it is powered off is called a warm boot. FALSE

  11. Most computers today come with Ethernet adapters already installed. TRUE

  12. A full software installation enables you to choose which program features you want installed on your hard drive. FALSE

  13. All of the following are examples of software suites except Microsoft OneNote

  14. An encryption virus replicates itself onto a hard drive’s master boot record. FALSE

  15. The processor market for desktop/laptop computers is dominated by Intel.

  16. A NAS device facilitates file sharing/data backup

  17. A router acts like a traffic signal on a network. FALSE

  18. Which of the following is not a wired broadband internet connection option? Dial-up

  19. Each of these is a basic type of touch screen except Reflective

  20. Brightness ratio is the difference in light intensity between white/darkest black produced by a monitor. FALSE

  21. Which of the following optical storage media has the greatest storage capacity? BD

  22. There is clear ownership of mineral rights in outer space. FALSE

  23. Utilitarianism focuses on adherence to moral duties and rights. FALSE

  24. If you 3D print a faulty bicycle helmet, there are clear-cut responsibilities if someone is hurt using the helmet. FALSE

  25. The terms data/info can be used interchangeably. FALSE

  26. When using Windows File Explorer, which view provides the most info at a glance? Details

  27. Wizards are step-by-step guides for performing complicated tasks in application software. TRUE

  28. Which of the following is not an example of a general productivity software application? Image editing

  29. A computer network is 2 or more computers connected using software/hardware so that they can communicate with each other.

  30. The unique number assigned to a network adapter by the manufacturer is referred to as the MAC address.

  31. Some of the cache memory of a CPU is inside the CPU itself_._

  32. Which of the following does NOT determine processor power? Speed of the motherboard

  33. A macro virus is a virus that is attached to a file such as a word document or excel workbook. TRUE

  34. Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive into.

  35. Currently, there are no antivirus programs for mobile devise. FALSE

  36. All of the following are extra precautions you can take to secure a wireless network except enable SSID broadcast_._

  37. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Cybercrime

  38. Optical discs store data using tiny pits & lands. TRUE

  39. Wireless network devices use radio waves to communicate with each other.

  40. A printer connected to a wireless network is considered to be a node on that network. TRUE

  41. Which of the following capabilities of UNIX is false? C) It is only for fupercomputers

  42. Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. FALSE

  43. Creating and distributing computer viruses is one of the most widespread types of cybercrimes.

  44. All of the following are types of multimedia & entertainment software except productivity software_._

  45. Bluebugging occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send/receive text messages & more.

  46. Which Microsoft program is used to create technical drawings, map basic black diagrams? Visio

  47. When a network is created to provide internet access to a specific geographic area, that network will generally be designated as a MAN. TRUE

  48. When referring to hard drives, access time is measured in miliseconds_._

  49. 2P2 networks are more commonly used in small businesses than in homes. FALSE

  50. A virus signature is a portion of a virus code that is unique to a particular computer virus. TRUE

  51. Notebooks are often equipped with a express card slot that allows you to read flash memory cards such as compact flash, memory sticks and secure digital cards.

  52. Which of the following was the first widelt used os installed in personal computers? MS-DOS

  53. Ram is considered a volatile storage, which means it is temporary.

  54. You are more vulnerable to a hacker attack on a windows system than you are on a Linux system. TRUE

  55. System software does all the following except add graphics & pics to files.

  56. Which of the following statements is true about optical media? A blu-ray burner will most likely burn both CDs & DVDs

  57. Which of the following is software that you can use for an unlimited time at no charge. Freeware

  58. Function keys are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.

  59. Custom software, developed to address the needs of a specific company, is known as proprietary software.

  60. Which type of software lets you dictate letters, emails & voice commands? Speech recognition

  61. Running the Disk clean-up utility is a quick way to clear out unnecessary files.

  62. QuartXpress & Adobe InDesign are examples of desktop publishing software.

  63. Windows 7 incorporates windows easy transfer, which enables you to migrate files & settings from a Windows Vista system to a Windows 7 system via a network connection.

  64. The type of monitor that looks like a traditional television set is called a Cathode ray tube (CRT) monitor.

  65. Spyware is an unwanted piggyback program that usually downloads with software you are installing from the internet.

  66. The CPU consists of which 2 parts? The control unit and the arithmetic logic unit.

  67. Throughput, the actual speed of data transfer that is achieved in a network, is usually less than or equal to the data transfer rate.

  68. Modre’s Law predicts that the # of transistors inside a CPU will triple every 18 months. FALSE

  69. Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today? Both a wireless/wired network adapter.

  70. A zombie is another persons’ computer controlled by a hacker. TRUE

  71. Theft of a computer is considered cybercrime. FALSE

  72. CPU speed, also called clock speed, is measured in Gigahertz.

  73. Which of the following devices is neede to share an internet connection on a wireless network? Wireless router.

  74. Software refers to a set of instructions that tells the computer what to do. These instruction sets are called programs.

  75. Bootcamp is a utility that allows you to run Windows & Mac Os X at the same time. FALSE

  76. An expansion card that translates binary data into images is a video card.

  77. The powersupply housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.

  78. A single computer can function as both a client & a server, but performance will be degraded. TRUE

  79. Level 1 cache memory always contains more storage area than Level 2 cache. FALSE

  80. A denial of service attack can be used to deny hacker access to a computer system. FALSE

  81. Devices such as monitors & printers that are connected to the computer are called peripheral devices.

  82. Computer-aided design software is used primarily by engineers to create models.

  83. Front side bus speed is measured in Megahertz.

  84. DDOS attack floods a computer with requests until it shuts down and refuses to answer any requests for info.

  85. Quickbooks & Peachtree are examples of accounting software.

  86. ROM is a form of permanent memory that holds all the instructions the computer needs to start up.

  87. A wireless network uses which of the following as its transmission medium? Radio waves

  88. Which of the following about cookies is not true? Cookies obtain your personal info by searching your hard drive.

  89. You can download a version of Linux from the internet for free. FALSE

  90. Presentation software includes all of the following features except formulas.

  91. PnP stands for plug and play. TRUE

  92. Any computer parts that you can actually touch are considered to be hardware.

  93. A multiuser os is also described as a network os. TRUE

  94. Creating & spreading online viruses is a cybercrime. TRUE

  95. Software that is distributed for free, but often with the condition that you pay for it if you like & intend to use it is called shareware.

  96. Wireless networks are more vulnerable to attack than wired networks. TRUE

  97. The most recent version of the Mac Os X is snow leopard. TRUE

  98. Every computer is designed with a max limit on the amount of RAM it can support. TRUE

  99. Hackers most often obtain access to someone’s computer via direct access. FALSE

  100. In binary language, each letter of the alphabet, each # and each special character is made up of a unique combination of 8 bits.

  101. On a windows system, you can determine the amount of RAM by looking in the system properties window.

  102. USB ports are now the most common poAS for connecting input and output devices to the computer.

  103. In a windows folder, to display files and folders as icons in list form we use tiles view.

  104. Which of the following is not a function of os? It manages the removal of spyware.

  105. When an os receives an interrupt from the printer & pauses the CPU, it is performing which of the following functions? Processor management

  106. It is generally better to extend your wired network using wireless technology than to use repeaters or splice cable. TRUE

  107. Computers process data into info by working exclusively with numbers.

  108. The cell address F7 indicates that the cell is at column F, row 7 of the worksheet.

  109. RAM is the place in a computer where the programs & data the computer is currently using are stored.

  110. Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network? Routers/switches

  111. The use of multiple cons on one CPU chip allows the execution of 2 or more sets of instructions at the exact same time. TRUE

  112. A optical mouse uses an internal sensor/laser to detect the mouse’s movement.

  113. The CPU is located on the motherboard. TRUE

  114. With windows explorer, you can perform all of the following file management actions except editing files.

  115. During the virtual memory process, the os moves data to a temporary storage area on the hard drive call the swap file.

  116. The windows backup and restore utility allows you to make a duplicate copy of all data on your hard drive. TRUE

  117. Which of the following devices translates electronic data into radio waves? Transceiver

  118. It is not possible to configure a client/server network for home use. FALSE

  119. The type of processor in the computer dictates which os a desktop uses. FALSE

  120. A cyberspace hoax is an attempt to make someone believe something that is untrue.

  121. Software you can use to create a budget is called spreadsheet software.

  122. Which file format enables users to share, view, and print any file as long as they have the appropriate program installed? PDF

  123. Due to the expansion of media files on home computers, home network server options are now being marketed; however, they are not as full featured as their business world counterparts.

  124. Which of the following classifications of viruses can change its own code to avoid detection? Polymorphic

  125. Rules for creating passwords include all except keep your password written down and stored in any easy-to-remember location.

  126. The process of replacing repeated patterns of letters in a file with a shorter placeholder is called file compression.

  127. Which of the following activities is carried out by the ALU? Completion of all arithmetic calculations.

  128. Which of the following is not an example of a network node? Mouse

  129. Software that does “back office” operations/processing functions such as billing production, inventory management, and human resources management is called enterprise resource planning software.

  130. A computer virus normally attaches itself to another computer program known as host program.

  131. Many photocopies have hard drives just as computers do, which moves them a potential target for identity thieves. TRUE

  132. In windows, which character is used as a path separator? Backslash (1)

  133. A person with malicious intent can take almost complete control of your computer by using a backdoor program. TRUE

  134. One way to increase security on a network is by installing a firewall.

  135. Every software program has a set of system requirements that specify the minimum recommended standards for the os, processor, RAM, hard drive capacity.

  136. Before upgrading your os, you should back up your data files.

  137. Video files cannot transmit viruses. FALSE

  138. Cache memory is a form of ROM. FALSE

  139. Installing a device driver can sometimes cause system instability. TRUE

  140. The % of the time that your CPU is working is referred to as a processing time. FALSE

  141. Ethernet cables are always connected using twisted pair. FALSE

  142. With the PnP standard, adding hardware to your computer becomes easier. TRUE

  143. After a picture has been taken with a digital camera & processed appropriately, the actual print of the picture is considered output.

  144. XO-1 is the name of the computer being provided by the one laptop per child project.

  145. Illegally copying an application onto another computer is called software privacy.

  146. When a network is created to provide Internet access to a specific geographic area, that network is MAN. TRUE

  147. Which of the following is the 1st step to boot process? The BIOS is activated by powering on the CPU.

  148. Temporary data/instructions are not stored in the hard drive because it is faster to retrieve data from RAM. TRUE

  149. Upgrading your os to the newest version might help increase system reliability. TRUE

  150. The primary benefit of a spreadsheet program is the ability to automatically recalculate formulas & functions.

  151. Level 2 cache is slightly farther away from the CPU than Level 1 cache or on a separate chip. TRUE

  152. Which type of software is used at colleges to keep track of student’s records? Database software.

  153. If you want to automatically defragment your hard drive every week, you can set a predetermined time using the task scheduler.

  154. A port is where a peripheral device can attach to a computer so that data can be exchanged between it and the os.

  155. Adware/spyware are referred to collectivelt as grayware.

  156. The cost of a P2P network is slightly greater than the cost of a client/server network. FALSE

  157. Hard drives have the largest capacity of any storage device. TRUE

  158. The Modem port resembles a standard phone jack.

  159. Solid-state drives have no platter or motors. TRUE.

  160. When virtual memory is in use, the condition of excessive paging is referred to as thrashing. TRUE

  161. Which of the following statements about a graphical user interface (GUI) is false? A GUI is a command-driven interface.

  162. The most essential software in your computer is the operating system software.

  163. Video cards often include their own RAM. TRUE

  164. WPA stands for wifi protected access.

  165. Drive-by downloads occur when a website downloads harmful software into your computer.

  166. Microsoft office and corel wordperfect office are examples of software suites.

  167. 3D sound cards are bidirectional. FALSE

  168. A virus signature is the portion of virus code that is unique to a particular computer virus.

  169. A printer connected to a wireless network is considered to be a node on that network. TRUE

  170. For complete protection when backing up your files, you should use a program that creates a image backup of your entire system.

  171. The video subsystem is make up of the video card and speakers. FALSE

  172. The basic input/output system us store in a ROM chip.

  173. Mac os x snow leopard includes a backup utility called time machine.

  174. The term “bit” is short for binary digit.

  175. Windows 7 will run with 1 GB of RAM, but the system might be challenged by limited resources especially with geographic-intensive programs. TRUE

  176. Hard drives have been growing in storage capavity by about 50% each year. TRUE

  177. Limiting your signal range does not help increase wireless network security. FALSE

  178. Which of the following os is used primarily with mainframes as a network operating system? UNIX

  179. The windows os has a built-in password protection of files as well as the entire desktop. TRUE

  180. _The combination of os/processor in a computer is referred to as a computer’s _________________

  181. _A computer’s memory subsystem is made up only of RAM _____________

  182. _The location of a file is specified by its ________________

  183. _In a windows os, the hard drive is represented as the ______________

  184. All the following are forms of RAM except____________________

  185. Angel & blackboard are examples of___________________

  186. Which of the following us not a step in the boot process?____________

  187. USB ports are fast replacing traditional _______________ parts because of their ability to transfer data quickly.

  188. _Which of the following is a single-user, multitask os?


  1. The terms virus & worm actually mean the same thing________________T or F

  2. _The small circuit boards that hold a series of RAM chips are called


  1. Normal telephone wire is twisted-pair cable.
  2. The BIOS is a program that manages the data between the os and all input/output devices attached to the system.
  3. When virtual memory is in use, the condition of excessive paging is called swapping. FALSE
  4. Which of the following is not a main characteristic associated with the desktop computers as compared to notebooks? A desktop is more expensive.
  5. A custom virus temporarily erases its code from the files where it resides and then hides in the computers active memory.
  6. A firewall can come in either software or hardware form. TRUE
  7. Software designed for a specific industry is known as vertical market software.
Was this document helpful?
This is a Premium Document. Some documents on Studocu are Premium. Upgrade to Premium to unlock it.

BTM final questions

Course: Business Technology Management (BTM 200)

477 Documents
Students shared 477 documents in this course
Was this document helpful?

This is a preview

Do you want full access? Go Premium and unlock all 14 pages
  • Access to all documents

  • Get Unlimited Downloads

  • Improve your grades

Upload

Share your documents to unlock

Already Premium?
BTM FINAL
1) Which transmission medium transmits data the fastest? Fiber-optic cable
2) Boot-sector viruses are often transmitted by a flash drive left in a usb
port.
3) Most word processing programs come with a search & replace tool that
allows you to locate/replace specific text. TRUE
4) Which of the following is not a user interface? Application
programming interface (API)
5) Which of the following is the most common audio compression format?
MP3
6) Hyperthreading provides high speed info processing by enabling a new
set of instructions to start before the previous set has been finished.
7) Each device attached to your computer has a special program called
device driver that enables the device/os to communicate with eachother.
8) File names in Windows are case-sensitive. FALSE
9) A HAN network is located in your residence that connects to all your
digital devices
10) Multimedia software includes all the following except utility software.
11) Starting a computer when it is powered off is called a warm boot. FALSE
12) Most computers today come with Ethernet adapters already installed.
TRUE
13) A full software installation enables you to choose which program features
you want installed on your hard drive. FALSE
14) All of the following are examples of software suites except Microsoft
OneNote
15) An encryption virus replicates itself onto a hard drive’s master boot
record. FALSE
16) The processor market for desktop/laptop computers is dominated by
Intel.
17) A NAS device facilitates file sharing/data backup
18) A router acts like a traffic signal on a network. FALSE
19) Which of the following is not a wired broadband internet connection
option? Dial-up
20) Each of these is a basic type of touch screen except Reflective
21) Brightness ratio is the difference in light intensity between white/darkest
black produced by a monitor. FALSE
22) Which of the following optical storage media has the greatest storage
capacity? BD
23) There is clear ownership of mineral rights in outer space. FALSE

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.

Why is this page out of focus?

This is a Premium document. Become Premium to read the whole document.