Docstoc

Practice exam

Document Sample
Practice exam Powered By Docstoc
					         TEJ3M SUMMATIVE PRACTICE EXAM
Part A: Multiple Choice
1. What is false about binary numbers
   a. Operations are performed on them in the ALU
   b. They are used to represent letters, numbers and symbols as ASCII code
   c. They are used as storage in the CPU
   d. They are the main number system a human uses

2. Eight bits together represent a
   a. nibble                   b. byte                      c. word                     d. sentence

3. This logic gate will output a zero when at least one input is a one
   a. NOT                       b. NAND                     c. XOR                      d. NOR

4. This logic gate will output a one when at least one input is a one
   a. OR                        b. AND                     c. NOR                       d. XOR

5. Which part of the CPU handles mathematics and logic decisions?
   a. Control Unit                                     c. ALU
   b. Primary Storage                                  d. Registers

6. Which type of primary storage allows data and instructions to be stored and changed?
   a. ROM                     b. RAM                      c. permanent               d. built-in

7. What type of secondary storage is best suited for storing smaller data files that changes often over
   time and is used in more than one location, for example, an assignment typed in MSWord or a
   budget done in MS Excel?
   a. flash drive (USB key)                                c. floppy disk
   b. hard disk                                            d. CD-R disk

8. Which of the following remains even when the computer is off?
   a. temporary storage                               c. program
   b. ROM                                             d. RAM

9. The two basic categories of software are:
   a. application programs and DOS                 c. operating systems and system programs
   b. DOS and system programs                      d. application programs and system programs

10. What is the term applied to an operating system program that is stored on disk?
    a. DOS                      b. BIOS                   c. RAM                        d. ROM

11. The two types of busses are:
    a. data and local                                       c. data and address
    b. RAM and ROM                                          d. address and local

12. What are the areas called on the back of a computer that allows you to attach peripheral devices?
    a. expansion cards                                     c. drives
    b. cache                                               d. ports

13. Examples of external storage devices are:
    a. RAM and ROM                                          c. Floppy Drive and Registers
    b. Hard Disk Drive and DVD drive                        d. CD Drive and Registers

14. Two examples of peripherals are:
    a. printers and monitors                                c. input and output
    b. memory and storage                                   d. processing and control

15. Three types of network mediums are:
    a. analog, digital, twisted copper wire
    b. steel wire, TV cable, microwaves
    c. telephone line, coaxial cable, fiber-optic cable
    d. coaxial cable, fiber-optic cable, twisted copper wire
16. A terabyte is approximately ____ bytes.
    a. 1000                                                 c. 1,000,000
    b. 1,000,000,000                                        d. 1,000,000,000,000

17. What is true for peer-to-peer networks?
    a. Provide greater security and more control than a server based network
    b. Recommended for networks with 10 or fewer users on the network
    c. Require a powerful, central computer
    d. Users are typically located in a large geographical area

18. What best describes a bus topology network?
    a. Needs significantly more cabling than other topologies
    b. Easier to troubleshoot than other topologies
    c. Media is inexpensive and easy to work with
    d. The number of computers on the network does not affect performance

19. What best describes a ring topology network?
    a. Needs less cabling than other topologies
    b. Media is inexpensive and easy to work with
    c. Equal access for all computers
    d. Requires terminators to function properly

20. Which of the following best describes a star topology?
    a. Needs significantly less cabling than other topologies
    b. Break in a single cable segment takes down the entire network
    c. More difficult to reconfigure than other networks
    d. Centralized monitoring and management

21. Which of the following is false?
    a. a modem is a peripheral device
    b. a modem provides an entry point of analog signals to a computer
    c. modems can be used to connect telephone lines to your computer
    d. the word modem comes from the terms modulation and demodulation combined
22. The base unit of memory for any computer is a
    a. bit                    b. byte                       c. hertz                d. ohm
23. The term for the physical layout of a network is:
    a. topology                 b. architecture             c. category             d. type

24. The computer term bit comes from
    a. the actual meaning of the word in English, as it applies to a computer
    b. the short form of binary information tip
    c. very small morsels of food
    d. the short form of a binary digit

25. A hard disk drive is divided up into circular sections known as:
    a. tracks                   b. clusters                  c. sectors             d. partitions

26. In any number system what is the very first 2 digit number in its counting sequence?
    a. 20                    b. A0                         c. 10                       d. AA

27. What are 3 basic types of “infections” a computer can get?
    a. worm, virus, spam                                   c. virus, spam, spyware
    b. worm, Trojan horse, virus                           d. Trojan horse, spam, spyware
28. When you attach a new component to your computer system, most computers recognize it right
    away. This is called:
    a. booting                  b. partitioning            c. formatting             d. plug n’ play

29. What kind of software would help to protect against hacking:
    a. anti-virus             b. pop-up                   c. firewall               d. anti-
                                 blocking                                              spyware

30. A USB port is a type of _______________ port.
    a. parallel                b. serial                    c. ethernet             d. firewire
31. Besides Turing what is another similar programming language?
    a. VBA                     b. C++                    c. Pascal                          d. a, b, & c

32. What is the extension of Turing files?
    a. turing                  b. tur                         c. t                          d. ring

33. Anything you type after this symbol is ignored by the computer, generally it is used for
    commenting your program:
    a. @                        b. %                       c. *                         d. $

34. Which commands are used for looping or repeating information when you run a program:
    a. if, end if                                        c. repeat, end
    b. begin, end                                        d. loop, end loop

35. Which statement is correct in its syntax (programming grammar)?
    a. for x : 1 .. 50                                    c. for x: 1 to 50
    b. for x = 1 to 50                                    d. for x = 1 .. 50

Part B: What do each of the following stand for (the longer name)?
1. WAN         __________________________________________________________________
2. NOS         __________________________________________________________________
3. NIC         __________________________________________________________________
4. P2P         __________________________________________________________________
5. Internet    __________________________________________________________________
6. OSI         __________________________________________________________________
7. ALU _____________________________________________________________________
8. GB ______________________________________________________________________
9. MHz _____________________________________________________________________
10. BIOS _____________________________________________________________________
11. RPM _____________________________________________________________________
12. Bit _______________________________________________________________________
13. Modem ___________________________________________________________________
14. var (used in Turing) __________________________________________________________
15. int (used in Turing) ___________________________________________________________
16. DOS _____________________________________________________________________
17. PCI        __________________________________________________________________
18. USB        __________________________________________________________________
19. HTTP       __________________________________________________________________
20. POST       __________________________________________________________________
Part C: Matching
1. _____ NIC                  a. connects a wireless network to a wired one
2. _____ Modem                b. any device attached to a network
3. _____ Node                 c. usually the entry point to a different type of network
4. _____ Server               d. allows one individual node to “talk” to a network
5. _____ Repeater             e. regenerates a signal so it can go farther
6. _____ Hub                  f. translates data from analog to digital and vice-versa
7. _____ Gateway              g. sends the data to only the node that needs it
8. _____ WAP                  h. contains most resources and provides them to the network
9. _____ Switch               i. translates info. to/from different forms for different networks
10. _____ Router              j. sends data to all connected nodes, whether or not the it needs it
Part D: Short Answer
1. Write the most efficient Turing statement that would produce the following output line in a
   generally longer program:
     The perimeter of a square with one side of 4.5 cm is: 18.0 cm

2. Write a group of Turing statements that will draw a quarter slice of watermelon with a different
   color for the inside of the melon and the rind (outside surface).

3. Conversions from one number system to another. (Show the work for full marks.)
   a. Convert the following decimal number to binary AND hexadecimal
               89

   b. Convert the following binary number to decimal AND hexadecimal
               10110101

   c. Convert the following hexadecimal number to decimal AND binary
               6C

4. How many rows would be in a 5 input Truth Table? What about an 8 input Truth Table?

5. Given the following circuit diagram:         A                    D
   a. Write a Boolean expression for it
                                                B                                     F
      (NOT simplified!)
                                                                                                     G
   b. Complete a full Truth Table for it                        E
                                                 C

6. Given the following Truth Table:                                         A     B       C Output
   a. Write a simplified Boolean expression using any method                0     0       0   1
   b. Draw a circuit diagram for it                                         0     0       1   1
                                                                            0     1       0   0
                                                                            0     1       1   0
                                                                            1     0       0   1
                                                                            1     0       1   1
                                                                            1     1       0   0
Part E: Long Answer                                                         1     1       1   1

1. When working with computer hardware, name at least 4 things you can do in order to prevent ESD

   (basically static electricity) from destroying your computer parts.

2. What is the OSI model? Name only 3 layers and give a very brief description of how each work.

3. What are five functions of any type of computer system today? Give a very brief description of

   each and explain how they relate to each other.

4. What are the 3 parts of a CPU? Explain what each does with one sentence.

5. Describe a hard drive and how it works. Refer to the physical parts as well as how the actual disc(s)
   read and write data.

6. Organize the appropriate media and some characteristics to each basic type: (some terms might be
   used more than once in a column)
      Twisted Pair                      Coaxial Cable                        Fibre Optic


     UTP            CAT3           185m              Thinnet        2km or more               500m
     Thicknet       100m           STP               10 Mbps        CAT6                      10 Gbps
     RJ45           BNC            copper            light          0.5” diam.                CAT1
Part F: Label the diagrams (for ports, I want the GENERAL term)

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:13
posted:10/30/2011
language:English
pages:5