University of Maryland, University College IFSM 201 All Module Quizzes
Question 1
Points: 10 out of 10
Which of the following best describes the system unit?
Feedback
An electronic component made up of the modem and
storage devices
Any hardware component that allows you to enter
data
A case that contains the electronic components used
to process data
Hardware that sends and receives data over
transmission media
Correct. Whether it is a desktop, laptop, tablet, handheld PC, or
smartphone, the components needed to process data are found in the case.
Question 2
Points: 10 out of 10
Which of the following type of system unit is not considered to belong to
the family of PCs?
Notebook
Feedback
Smart phone
Desktop
Workstation
Correct. The processing power of the workstation puts it in a different class
from standard PCs.
Question 3
Points: 10 out of 10
When purchasing a PC, you should upgrade to the
largest amount or number your budget will afford.
Feedback
Correct. You should purchase as much Random Access Memory (RAM) as
your budget allows because it helps with processing speed of the computer.
Question 4
Points: 10 out of 10
What is the purpose of an adapter card?
It provides battery power to retain information even
when the power is turned off.
RAM
Feedback
It provides access to flash memory.
It joins a cable to a peripheral.
It enhances functions of a component of the system
unit and/or provides connections to peripherals.
Correct. Additional functionality such as enhanced video or sound is
supported by an adapter card.
Question 5
Points: 0 out of 10
What is the purpose of a heat sink?
Feedback
To absorb heat generated by the memory modules
To keep the keyboard from overheating
To absorb heat generated by the processor chip
To keep the hard drive from overheating
Incorrect. The hard drive generates very little heat while being used.
Question 6
Points: 10 out of 10
What is an expansion slot?
Feedback
A port used for special equipment
A socket on the motherboard that can hold an adapter
card
A device that connects memory to the CPU
A device that joins a cable to a peripheral
Correct. An expansion slot is a socket or slot on the motherboard where
expansions cards are inserted.
Question 7
Points: 10 out of 10
A bay would most likely hold a .
Feedback
Correct. A hard drive is a component that is installed in a bay inside the
system case.
Question 8
hard drive
Points: 10 out of 10
How would a port most likely be used?
Feedback
To provide a place for plugging in expansion cards
To connect additional input, output, storage, and
communication devices to a PC
To connect the battery to the computer’s internal
circuitry
To provide a place to insert a DVD drive via an
opening in the system case
Correct. Peripherals or external devices are connected via ports.
Question 9
Points: 10 out of 10
Edwin is a consultant working for a large engineering firm. He travels to
visit clients and uses his laptop and a smartphone to stay in touch with the
home office. His computer must handle business-related software, and he
must have a means of contacting clients and the home office. Into what
category of user type would you put Edwin?
Power user
Feedback
Home user
Mobile user
Small business/home user
Correct. A mobile user typically has access to a mobile device (laptop or
tablet PC), loaded with sophisticated business software. Edwin also needs
mobile communication devices (a smartphone, and perhaps a wifi or
datacard for internet access).
Question 10
Points: 10 out of 10
Which type of user is most likely to require (not just prefer) a tablet PC?
A satellite user whose primary access to the internet is
via a satellite download
A power user working in a corporate office
A mobile user who needs to carry his/her computing
device on the road
Feedback
A home user working solely at home
Correct. The tablet PC is small and easy to carry, making it a good choice
for someone who needs to travel with a computing device.
Question 11
Points: 10 out of 10
You have been diagnosed with carpal tunnel syndrome in your wrists
(related to extensive computer usage). What might be a solution for
reducing stress on your wrists?
Feedback
Use a flat waterproof keyboard.
Use a keypad that is projected on an external flat
surface.
Use a split-style keyboard that separates and angles
groups of keys into right- and left-hand portions.
Use a keyboard with internal lighting to support work
in low-light conditions.
Correct. The angle of the two sections of the keyboard provides a less
stressful position of the wrists during typing.
Question 12
Points: 10 out of 10
You want to make a system image disk - a copy of the drives that allow the
operating system to run (it is used to restore your computer if your hard
drive or computer stops working). The system image normally requires up
to 32 GB of storage space. Which of the following storage devices would not
be appropriate as a backup device?
Feedback
A 64 GB flash or thumb drive inserted via a USB port
The 500 GB hard drive installed inside your PC system
A 1 TB external hard drive
A single read/write DVD disk
Correct. A single DVD disk can, at most, hold up to 17 GB, not enough for
the system image. Multiple DVD disks would be required.
Question 13
Points: 10 out of 10
Which of the following are typically used as input devices?
Printer, USB flash drive, web camera
Feedback
Modem, system unit, CD drive
Mouse, microphone, scanner
Memory, motherboard, speaker
Correct. All three of these devices assist or prepare data for input into the
computer.
Question 14
Points: 10 out of 10
Which of the following is not an input device?
Feedback
Keyboard
Printer
Mouse
Trackball
Correct. The printer is an output device by which information is printed in a
form that is usable for the user.
Question 15
Points: 10 out of 10
Which of the following statements best describes cloud storage?
Feedback
Data resides on a server (computer) that you access
via the internet.
Data resides on an external drive connected to your
computer.
Data resides on a website that you access via the
internet.
Data resides on the hard drive installed in your
computer.
Correct. Cloud storage means your data resides not on your machine, but
on the provider’s servers.
Question 16
Points: 10 out of 10
What are the four basic categories of output?
Feedback
Memory, storage, drives, and language
Text, graphics, audio, and video
Commands, responses, programs, and data
Instructions, pictures, commands, and graphics
Correct. These are all types of output.
Question 17
Points: 10 out of 10
A cable is a digital device that sends and receives digital
modem
data over the cable television network.
Feedback
Correct. This is also called a broadband modem, and it connects to a cable
television jack.
Question 18
Points: 10 out of 10
If you want to create a home network and want the greatest flexibility in
where to locate various computers and other connected equipment around
your house, which transmission media provides the most flexibility and least
installation effort?
Feedback
Fiber optic cable
Coaxial cable
Wireless radio waves
Telephone line
Correct. The use of wireless transmission means that computers and other
equipment can connect to a wireless router without using cable or wire
connections to each piece of equipment.
Question 19
Points: 10 out of 10
To protect the information and data you send or receive over the network,
what other component is critical to install in your home network?
An uninterruptible power source
Wire, cable, or fiber optic connection between
computers
Feedback
Parental controls
A hardware or software firewall
Correct. A firewall is needed to protect your data and your network from
unauthorized access.
Question 20
Points: 10 out of 10
Considering the various media options when constructing a home network,
which media would be the least secure unless additional security measures
are taken?
Feedback
Category 5 twisted pair phone wire
Fiber optic cable
Coaxial Cable (used for TV signals)
Wireless connections (radio waves)
Correct. Because data is being transmitted via unprotected radio waves, the
data can more easily be intercepted and viewed. Thus it is important to
encrypt data sent over wireless connections.
Question 1
Points: 0 out of 10
Which of the following statements would be most likely to appear in a
professional association’s code of ethics for its members?
Feedback
I will be use organizational supplies for official
purposes only.
I will use my network account only for the purpose
specified in my job description.
I will maintain the confidentiality of my username and
password.
I will keep my personal knowledge up-to-date and
insure that proper expertise is available when needed.
Incorrect. This statement is likely to appear in a company’s code of conduct
rather than in a professional association’s code of ethics.
Question 2
Points: 0 out of 10
You apply for a new credit card but are denied by the issuing institution.
When you inquire as to the reason for the denial, you find out that your
credit record has been compromised because someone else has used your
PII to open an account and has run up a large volume of unpaid bills. This
situation reflects which of the following?
Feedback
Availability of your credit reports
Confidentially of your credit reports
Integrity of your credit reports
Incorrect The confidentiality of a resource refers to who is able to read or
access it. The credit card issuer has the right to ask for information from
the credit reporting companies before issuing a credit card.
Question 3
Points: 10 out of 10
Which of the following would most likely prevent your becoming a victim of
cyberstalking while using social networking?
Minimizing interaction with others on the social
network
Feedback
Reading the privacy policy of the social networking
site
Monitoring your privacy settings and adjusting as
necessary
Posting photos of friends
Correct. Monitoring your privacy settings and adjusting as necessary is the
most important thing you can do to ensure that this information does not
get into the hands of a cyberstalker.
Question 4
Points: 10 out of 10
What is the most vulnerable information that should be protected to prevent
unauthorized access to your online files and records?
Feedback
Your name and address
Your user ID and password
Your driver’s license number and credit card number
Correct. Most of your records can be accessed only with a valid user ID and
password.
Question 5
Points: 10 out of 10
True or false? A friend gives you his single-user copy of a copyrighted
software application program so that you can load it on your computer. Both
of you are guilty of an inappropriate use of digital content sharing.
Feedback
True
False
Correct. You are guilty of copyright infringement for accepting the
copyrighted material, but so is your friend who gave it to you.
Question 6
Points: 10 out of 10
Marissa maintains an account on a social networking site. She always
performs updates on her own time, making sure to avoid visiting the site at
work. Lately she has been upset by a new policy at her company and has
made comments about it on her social networking page. Which of the
following parts of a code of conduct is Marissa violating?
Take care of any property assigned to you
Feedback
Use the organization’s supplies and services for
official purposes only
Maintain the security and confidentiality of your user
ID and password
Use your knowledge of organizational information in a
responsible way
Correct. Marissa, by making any comments about her company’s policies, is
not treating the knowledge that she has about those policies in a
responsible way; her actions may harm the reputation of her company.
Therefore, she is violating a code of conduct provision that mandates using
organizational information in a responsible way.
Question 7
Points: 0 out of 10
Medical records are protected by the Health Insurance Portability and
Accountability Act (HIPAA). Can your medical records be made available to
others who request this information (employers, insurance companies, other
doctors)?
Yes
No
Feedback
Incorrect. Confidential information is shared on a need-to-know basis
among authorized people. This means that people who legitimately need the
information can exchange it, with proper authorization.
Question 8
Points: 10 out of 10
The tools that cyber criminals often use, including computer viruses,
worms, trojan horses and spyware, are called .
Feedback
Correct. Malware, short for malicious software, is specialized software that
takes advantage of vulnerabilities in computer hardware and software.
Question 9
Points: 0 out of 10
Which of the following is good practice to ensure that you do not get
malware on your computer from an online source?
Update your antivirus software either manually or
automatically each time you connect to the internet.
Use only the latest version(s) of the browser(s) you
normally use to access the internet.
Do not open email attachments.
malware
Feedback
Block all popups (activate the popup blocker for all
sites).
Incorrect. Some browsers use popup blockers to block unwanted popups
such as advertising on websites. Blocking ALL popups may mean that you
are unable to load certain sites. Instead, set your system internet security
settings to notify you if a popup is needed. You can then make a decision to
allow or disallow the popup.
Question 10
Points: 10 out of 10
Having your personally identifiable information compromised is most
closely related to .
Feedback
Correct. Identity theft is closely related to having one’s PII compromised.
Once a criminal has your PII, the most likely consequence is that the PII will
be used to steal your identity.
Question 11
Points: 10 out of 10
identity thef t
Which option here would be a way to remember the user IDs and passwords
that poses less risk than other options listed.
Use the same ID and password for all, and change
them frequently (every 30 days).