Name: 
 

CPTE-100 Practice Exam



True/False
Indicate whether the statement is true or false.
 

 1. 

A handheld computer is sometimes called a PDA.
 

 2. 

Images such as photos, pictures, line art, and graphs are not small, discrete objects like numbers or the letters of the alphabet.
 

 3. 

The system unit is the case that holds the main circuit boards, microprocessor, power supply, and storage devices of a personal computer system.
 

 4. 

Today, a home computer system offers a hardware platform with super-charged support for most computer applications.
 

 5. 

A CISC processor performs most instructions faster than a RISC processor.
 

 6. 

A USB flash drive is a portable storage device featuring a built-in connector that plugs directly into a computer’s USB port.
 

 7. 

When a spreadsheet cell contains a formula, it displays the result of the formula rather than the formula itself.
 

 8. 

Educational software teaches basic arithmetic and reading skills.
 

 9. 

Depending on the speed of your Internet connection, downloads can tie up your computer for a few hours.
 

 10. 

Support programs and data files can not be modified without changing the main executable file.
 

 11. 

Windows provides a Help system that you can use to find out how various commands work.
 

 12. 

When you move a file, it is erased from its original location.
 

 13. 

Formatting prepares the surface of a disk to hold data.
 

 14. 

Wireless LANs are easy to install, and it is typically not necessary to secure them from intrusions.
 

 15. 

A standalone computer with an always-on DSL, ISDN, or cable modem connection is particularly susceptible to intrusions.
 

 16. 

Privacy advocates question the wisdom of search engines retaining queries.
 

 17. 

If you turn off cookies, you probably will not be able to make online purchases.
 

 18. 

Fake sites might offer a secure connection for transmitting your credit card number.
 

 19. 

The controls for a digital camera are very similar to those for an analog, or film, camera.
 
 
nar006-1.jpg
 

 20. 

The item featured in the figure above creates vector graphics.
 

 21. 

Card readers can be connected to your computer’s USB port, built into a computer system unit, or built into a photoprinter.
 

 22. 

Whether you acquire an image from a digital camera or from a scanner, bitmap graphics tend not to require very much storage space.
 

 23. 

BMP is a handy format to use for designing Windows controls that you might incorporate into a computer program.
 

 24. 

One clue that an image might be a bitmap graphic is a flat, cartoon-like quality.
 

 25. 

Bitmaps resize better than vector graphics.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 26. 

MySpace and Friendster are examples of ____.
a.
bulletin boards
c.
online social networks
b.
blogs
d.
chat groups
 

 27. 

____ refers to voice conversations that are routed over the Internet, rather than landlines or cellular telephony.
a.
Convergence
c.
COBOL
b.
VoIP
d.
Unicode
 

 28. 

A ____ is one or more collaborative documents posted on the Web that can be viewed and changed by users.
a.
blog
c.
compiler
b.
Wiki
d.
client
 

 29. 

____ is usually a prefix that means 1,000.
a.
Kilo
c.
Exa
b.
Mega
d.
Giga
 

 30. 

____ protocols that use more than one means of identification are more secure than others.
a.
Validation
c.
Concatenation
b.
Authentication
d.
Collaboration
 

 31. 

PINs are typically used with ____-factor authentication protocols.
a.
single
c.
triple
b.
two
d.
multiple
 

 32. 

Which of the following is NOT true?
a.
You should strive to select a unique user ID for every Web site you visit and every online resource you access.
c.
You can maintain two or three tiers of passwords.
b.
People with your name who selected user IDs before you might have already taken the obvious user IDs.
d.
Use low-security passwords in situations where you don’t really care if your security is compromised.
 
 
Critical Thinking questions
(Multiple Choice)
 

 33. 

Which of the following is a kind of input that computers can accept?
a.
words in a document
c.
audio signals from a microphone
b.
pictures
d.
All of the above
 

 34. 

To divide a message into several packets that can be routed independently to their destination, use ____.
a.
broadband
c.
handshaking
b.
circuit switching
d.
packet switching
 

 35. 

____ is based on a convention established by hobos during the Great Depression of the 1930s.
a.
War driving
c.
LAN jacking
b.
War chalking
d.
All of the above
 

 36. 

You want to access the Internet with a PDA. You can use any of the following EXCEPT ____.
a.
Palm Treo
c.
Yahoo! Messenger
b.
Blackberry
d.
Dell Axim
 

 37. 

Java applets ____.
a.
are installed on your computer
c.
leave a permanent footprint
b.
cannot start other programs
d.
can create files on your computer
 

 38. 

You want to include your boss on a message to your hired freelancer, but do not want the hired freelancer to see that your boss is included on the message. How can you achieve this?
a.
Cc: your boss on the message
b.
Bcc: your boss on the message
c.
add a priority to the message
d.
Cc: both your boss and your hired freelancer
 

 39. 

____ memory is a type of chip that requires no power to hold data.
a.
RAM
c.
ROM
b.
EEPROM
d.
BIOS
 

 40. 

Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ____.
a.
60 GB
c.
500 GB
b.
100 GB
d.
900 GB
 

 41. 

A printer’s ____ determines how many pages a printer is able to churn out.
a.
resolution
c.
duty cycle
b.
duplex index
d.
PCL
 
 
Case 2
Laura wants to buy a new computer. She is interested in the technical features of RAM, ROM, EEPROM, gigabyte capacity, and speed. She is also concerned with making sure that documents scroll faster, games respond more quickly, and many graphics operations take less time.
 

 42. 

One of the computer ads Laura is looking at specifies “1 GB 400 MHz SDRAM (max 2GB).” What does the 1 GB specify?
a.
EEPROM
c.
RDRAM
b.
RAM
d.
SDRAM
 

 43. 

The ____ for a document refers to the way that all of the elements of a document are arranged on the page.
a.
format
c.
font
b.
style
d.
readability
 

 44. 

____ software is typically sold in computer stores or at Web sites.
a.
Shareware
c.
Open source
b.
Commercial
d.
Public domain
 

 45. 

Most local applications contain a ____ program that guides you through the installation process.
a.
start
c.
bootstrap
b.
setup
d.
jumpstart
 
 
Case 2
Claire is worried about computer viruses spreading. Also, with the proliferation of network traffic and e-mail, worms have become a major concern in the computing community. She is interested in tracking the sources of the viruses and worms to stop the threat.
 

 46. 

Claire is having difficulty tracking the worms on her computer. She’s noticing that the “From” line of the infected message sometimes contains a ____ of a randomly selected person from the address book rather than the address of the computer that actually sent the mail.
a.
macro
c.
spoofed address
b.
mass-mailing worm
d.
Trojan horse
 

 47. 

Claire has discovered that ____ are the biggest threat to computer security.
a.
worms
c.
hoaxes
b.
viruses
d.
bots
 

 48. 

GUIs were originally conceived at the prestigious ____ research facility.
a.
Xerox PARC
c.
NSF
b.
Bell Labs
d.
W3C
 

 49. 

Which of the following is a version of Windows for PCs?
a.
Windows Server 2005
c.
Windows Vista
b.
Windows CE
d.
Windows Mobile OS
 

 50. 

In the file specification in the figure above, mp3 is the ____.
a.
drive letter
c.
filename
b.
primary folder
d.
file extension
 

 51. 

On computers with Mac OS, the file management utility is called the ____.
a.
Explorer
c.
Messenger
b.
Navigator
d.
Finder
 

 52. 

What is the average capacity of a removable hard disk?
a.
1.44 MB
c.
250 GB
b.
35 GB
d.
680 MB
 

 53. 

A(n) ____ backup makes a backup of the files that were added or changed since the last backup.
a.
selective
c.
differential
b.
incremental
d.
indexed
 

 54. 

The type of network that covers a large geographical area is known as a ____.
a.
LAN
c.
MAN
b.
WAN
d.
PAN
 

 55. 

For Internet-based multiplayer games, ____ is usually the limiting factor.
a.
the frequency of the wireless signal
c.
the speed of the Internet connection
b.
the brand of network hub
d.
the LAN
 

 56. 

The most popular wireless LAN technology is ____.
a.
Ethernet
c.
FCC
b.
Wi-Fi
d.
WiMAX
 

 57. 

Bluetooth version 2.0 offers a peak transmission rate of ____ over a range of 3-300 feet.
a.
.5 Mbps
c.
2 Mbps
b.
1 Mbps
d.
3 Mbps
 

 58. 

Most private LAN parties max out at ____ or so attendees.
a.
12
c.
30
b.
20
d.
42
 

 59. 

A wireless ____ key is the basis for scrambling and unscrambling the data transmitted between wireless devices.
a.
link
c.
hashing
b.
network
d.
algorithm
 

 60. 

____ transforms a message in such a way that its contents are hidden from unauthorized readers.
a.
Encryption
c.
Concatenation
b.
Encapsulation
d.
Polymorphism
 

 61. 

____ encryption eliminates the key-distribution problem, by using one key to encrypt a message but another key to decrypt the message.
a.
Symmetric
c.
Asymmetric
b.
Public key
d.
Force
 

 62. 

When personal computer users want to encrypt e-mail or other documents, they turn to ____.
a.
SMTP
c.
HTTP
b.
PGP
d.
URL
 
 
Case Based Critical Thinking Questions

Case 1
Thomas is learning about networks, such as their organizational structure, topology, and geographical scope. The different types of networks touch his life both at home and at school.
 

 63. 

When Thomas uses file-sharing networks, such as Kazaa and Microsoft Networking, he is using a ____ network.
a.
PAN
c.
peer-to-peer
b.
LAN
d.
client/server
 

 64. 

A voiceband modem ____ a digital signal into an analog signal that can travel over phone lines.
a.
modulates
c.
pings
b.
demodulates
d.
maps
 

 65. 

____ is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.
a.
FTP
c.
Grid computing
b.
VoIP
d.
VPN
 
 
nar005-1.jpg
 

 66. 

Computer ____ generate massive processing power by using many off-the-shelf personal computers, which work together to achieve processing speeds that rival some of the world’s top supercomputers, as with the example of the application shown in the figure above.
a.
ports
c.
messaging
b.
anonymous FTP
d.
grids
 

 67. 

____ is the process your router uses to keep track of packets and their corresponding private or public IP addresses.
a.
SMTP
c.
VoIP
b.
UDP
d.
NAT
 

 68. 

Prices for cellular service provider plans fluctuate but can range from ____ per month and up.
a.
$10
c.
$75
b.
$30
d.
$100
 

 69. 

Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.
a.
packing
c.
archiving
b.
stuffing
d.
indexing
 

 70. 

In addition to using search engines, you can also find Web-based information using a(n) ____ engine that searches a series of other search engines and compiles the search results.
a.
compiled
c.
metasearch
b.
stuffed
d.
secure
 

 71. 

A ____ watermark is a pattern of bits inserted at various placed in an image or a content stream that can be used to track, identify, verify, and control content use.
a.
patent
c.
digital
b.
copyright
d.
protected
 

 72. 

____ is the most well-known DRM technology for DVDs.
a.
DeCSS
c.
CSS
b.
AACS
d.
Revocation
 

 73. 

Apple uses a DRM technology called ____ to control music downloaded from the iTunes store.
a.
Zune
c.
TrackManager
b.
FairPlay
d.
Vongo
 
 
Case Based Critical Thinking Questions

Case 1
Alison is a full-fledged member of the digital revolution taking pictures with her digital camera. She has recently purchased a scanner and a program that enables her to manipulate digital images.
 

 74. 

Alison has only taken 10 pictures with her digital camera, but she has run out of storage. Why might this have occurred?
a.
Her images were taken in color
b.
Her images have a very low resolution
c.
Her images have a very high resolution
d.
Her images were not taken properly
 
 
Case 2
Anita fancies herself to be an artist on the computer. She is drawing stylized images of the Parthenon with a series of roughly long and rectangular objects for the columns and a triangular object for the roof. These objects are layered according to the artist’s specifications. For instance, the roof object is layered in front of the columns and sky. The characteristic of using this type of graphics gives a great deal of flexibility in arranging and editing image elements.
 

 75. 

Which of the following are Anita’s graphics?
a.
roof.bmp, columns.bmp, clouds.bmp
b.
roof.gif, columns.gif, clouds.gif
c.
roof.jpg, columns.gif, clouds.jpg
d.
roof.wmf, columns.eps, clouds.eps
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
minicomputer
i.
personal computer
b.
PIN
j.
keylogger
c.
password
k.
bulletin boards
d.
handheld computer
l.
password manager
e.
mainframe
m.
online social networks
f.
supercomputer
n.
cyberspace
g.
server
o.
convergence
h.
identity theft
 

 76. 

When someone gains unauthorized access to your personal data and uses it illegally
 

 77. 

Supplies computers on a network with data
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
BSoD
i.
PCMCIA slot
b.
notebook
j.
Plug and Play
c.
Mac
k.
virtual memory
d.
ROM
l.
CISC
e.
Level 1 cache
m.
expansion slot
f.
Level 2 cache
n.
refresh rate
g.
dot matrix
o.
laser
h.
system unit
 

 78. 

Automatic installation of a peripheral device
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
service pack
i.
software
b.
mail merge
j.
MySQL
c.
format
k.
QBE
d.
data file
l.
CAD
e.
quarantined
m.
copyright
f.
record
n.
database
g.
what-if analysis
o.
public domain
h.
patch
 

 79. 

A popular server database software package
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
extension
i.
format
b.
Symbian OS
j.
Windows Explorer
c.
path
k.
Linux
d.
logical storage model
l.
root
e.
physical storage model
m.
Windows NT
f.
cluster
n.
Windows XP
g.
file system
o.
NTFS
h.
defragmentation
 

 80. 

Describes what happens on disks
 

 81. 

A utility program designed to help you organize and manipulate the files that are stored on your computer
 

 82. 

To create the equivalent of electronic storage bins by dividing a disk into tracks
 

 83. 

File system used by Windows NT, 2000, XP, and Vista
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
cryptographic key
i.
MAC address
b.
ciphertext
j.
collision
c.
gateway
k.
packet
d.
node
l.
RF signals
e.
narrowband
m.
RJ45
f.
infrared light
n.
Ethernet
g.
communications protocol
o.
Wi-Fi
h.
bandwidth
 

 84. 

Also called radio waves
 

 85. 

Simultaneously broadcasts data packets to all network devices
 

 86. 

Occurs when two network devices attempt to transmit packets at the same time
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
firewall
i.
FTP
b.
routable
j.
anonymous
c.
private
k.
intrusion
d.
NAT
l.
grid
e.
WiMAX
m.
BitTorrent
f.
VPN
n.
port probe
g.
chat
o.
P2P
h.
ATA
 

 87. 

Used to access a remote server in a secure way
 

 88. 

Type of IP address that can be accessed by packets on the Internet
 

 89. 

A device that converts analog voice signals into digital data packets
 

 90. 

IP address that can be used within a LAN but not for Internet data transport
 

 91. 

Provides a way to transfer files from one computer to another over any TCP/IP network
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
pharming
i.
B2C
b.
spam
j.
helper application
c.
HTTP
k.
stateless protocol
d.
cookie
l.
browser
e.
phishing
m.
electronic wallet
f.
podcast
n.
HTTP status code
g.
Ajax
o.
plug-in
h.
socket
 

 92. 

An exploit that redirects users to fake sites by “poisoning” a domain name server with a false IP address
 

 93. 

Small chunk of data generated by a Web server
 

 94. 

A type of helper application that can be activated from an EMBED tag inserted in an HTML document
 

 95. 

Also known as a browser add-on
 

 96. 

Offers tools and techniques for extending basic HTML and making Web pages more interactive
 

 97. 

Included in a Web server’s response to a browser’s request
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
bitmap
i.
pixelated
b.
sound card
j.
audio compression
c.
linear editing
k.
speech synthesis
d.
iPod
l.
codec
e.
GIF
m.
cropping
f.
PNG
n.
digitizing tablet
g.
rasterization
o.
resolution
h.
phonemes
 

 98. 

Software that compresses a file when a desktop video is created and decompresses the file when the video is played
 

 99. 

Process by which machines, such as computers, produce sound that resembles spoken words
 

 100. 

Also called a raster graphic
 



 
Check Your Work     Start Over