Title: ICS 100 – Example/Practice Quiz – Chapter 1 & 2
1ICS 100 Example/Practice Quiz Chapter 1 2
2All of the following are examples of real
security and privacy risks EXCEPT
- spam.
- Viruses.
- hackers.
- identity theft.
3________ is the science that attempts to produce
machines that display the same type of
intelligence that humans do
- Nanotechnology
- Artificial intelligence (AI)
- Simulation
- Nanoscience
4________ is data that has been organized or
presented in a meaningful fashion.
- Software
- A program
- A process
- Information
5After a picture has been taken with a digital
camera and processed appropriately, the actual
print of the picture is considered
- data.
- the process.
- input.
- output.
6________ is any part of the computer that you can
physically touch
- A peripheral
- A device
- An application
- Hardware
7The most common keyboard uses the ________ layout
- Alpha
- Numeric
- Dvorak
- QWERTY
8The ________ is the largest and most important
chip in the computer.
- RAM chip
- memory chip
- motherboard
- central processing unit (CPU)
9The hard disk drive is considered ________
storage.
- legacy
- temporary
- nonvolatile
- read-only
10Data can be a number, a word, a picture, or a
sound.
11The four main functions of a computer are input
the data, process the data, output the data or
information, and communicate the data or
information.
- TRUE
- FALSE
- Input ? process ? output ? store data
12The Windows key is on both PC and Macintosh
keyboards.
- TRUE
- FALSE
- Windows key not on a Mac ?
13Modern operating systems recommend that users
shut down the system by pushing the main power
button.
- TRUE
- FALSE
- Shut Down Through OS using the Mouse
- Start ? Turn Off Computer in Windows