• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/150

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

150 Cards in this Set

  • Front
  • Back

1. Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?


a. digital security risk


b. information liability


c. technical terrorism


d. network compromise

a. digital security risk

2. Which of the following is someone who demands payment in order to stop an attack on an organization’s technology infrastructure?


a. hacker


b. script kiddie


c. cyberextortionist


d. cyberterrorist

c. cyberextortionist

3. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?


a. hacker


b. script kiddie


c. cyberextortionist


d. cyberterrorist

b. script kiddie

4. Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?


a. hacker


b. script kiddie


c. cyberextortionist


d. cyberterrorist

d. cyberterrorist

5. Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?a. malware


b. untrusted sources


c. threats


d. cybermalls

a. malware

6. What is the term for a program that performs a repetitive task on a network?


a. zombie


b. rootkit


c. bot


d. Trojan horse

c. bot

7. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


a. distributed


b. delayed


c. limited


d. staggered

a. distributed

8. Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?


a. rebuking


b. spoofing


c. transmitting


d. victimizing

b. spoofing

9. Which of the following is a federally funded Internet security research and development center?


a. W3C


b. NSF


c. CERT/CC


d. Internet2

c. CERT/CC

10. Which of the following is a program or set of instructions in a program that allows users to bypass security controls?


a. keygens


b. indices


c. rootkit


d. back door

d. back door

11. Which of the following is not a security product developer?


a. Adobe


b. AVG


c. McAfee


d. Symantec

a. Adobe

12. Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?


a. PIN


b. password


c. secure key


d. passterm

b. password

13. Which of the following is not a possessed object?


a. PIN


b. badge


c. smart card


d. key

a. PIN

14. How much do fingerprint readers typically cost?


a. less than $10


b. less than $100


c. between $250 and $500


d. more than $1000

b. less than $100

15. Into which of the following kinds of ports do external fingerprint readers plug?


a. parallel


b. MIDI


c. USB


d. serial

c. USB

16. Which of the following can transmit germs?a. iris recognition systems


b. digital forensics systems


c. face recognition systems


d. hand geometry systems

d. hand geometry systems

17. Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?


a. site


b. network


c. distributed


d. multipurpose

a. site

18. Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?


a. network


b. distributed


c. site


d. multipurpose

c. site (license)

19. To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?


a. re-securing


b. decryption


c. assessment


d. digitization

b. decryption

20. What occurs when someone steals personal or confidential information?


a. information theft


b. corruption


c. fraud


d. compaction

a. information theft

21. Which type of individual may steal credit card numbers to make fraudulent purchases?


a. corrupt


b. Caesar


c. administrator


d. kiddie

a. corrupt

22. What is another name for public key encryption?


a. controlled key encryption


b. virtual key encryption


c. asymmetric key encryption


d. secure key encryption

c. asymmetric key encryption

23. Which of the following provides the mobile user with a secure connection to the company network server?


a. XPN


b. SPN


c. TPN


d. VPN

d. VPN

24. What is the term for a website that uses encryption techniques to protect its data?


a. virtual site


b. locked site


c. secure site


d. vault

c. secure site

25. How long can digital certificates be valid?


a. six months


b. two years


c. four years


d. five years

b. two years

26. Which of the following is an authorized person or company that issues and verifies digital certificates?


a. certificate authority


b. certificate agency


c. certificate office


d. certificate bureau

a. certificate authority

27. Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?


a. assigned


b. secure


c. protected


d. digital

d. digital

28. Which of the following terms means in a location separate from the computer site?


a. off-scope


b. off-shore


c. off-line


d. off-site

d. off-site

29. Which of the following terms refers to making a copy of a file?


a. restoring


b. backing up


c. encrypting


d. deciphering

b. backing up

30. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?


a. They reset the files.


b. The index the files.


c. They restore the files.


d. They resource the files.

c. they restore the files

31. Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?


a. restored file


b. bot


c. IP file


d. backup

d. backup

32. With a three-generation backup policy, the grandparent is which of the following?


a. most recent copy of the file


b. second oldest copy of the file


c. oldest copy of the file


d. original file

c. oldest copy of the file

33. Which of the following copies all of the files in a computer?


a. full backup


b. incremental backup


c. differential backup


d. selective backup

a. full backup

34. With which of the following do users choose which folders and files to include in a backup?


a. full backup


b. incremental backup


c. differential backup


d. selective backup

d. selective backup

35. One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?


a. 25


b. 35


c. 55


d. 75

a. 25

36. Which of the following categories are the rights to which creators are entitled for their work?


a. community property


b. intellectual property


c. creative


d. ethical

b. intellectual property

37. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?


a. PGP


b. DoS


c. IP


d. TCP

c. IP

38. Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?


a. intellectual property deed


b. content license


c. access right


d. copyright

d. copyright

39. Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?


a. CAN-SPAM Act


b. Computer Abuse Amendments Act


c. COPPA


d. Electronic Communication Privacy Act

d. Electronic Communication Privacy Act

40. An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?


a. practical


b. permissible


c. acceptable


d. ethical

d. ethical

41. Personal computers, display devices, and printers should comply with guidelines of which of the following programs?


a. ENERGY STAR


b. SECURE ELECTRONICS


c. ACCEPTABLE USE


d. GREEN COMPUTING

a. energy star

42. Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?


a. data rights


b. acceptable use


c. social restrictions


d. information privacy

d. information privacy

43. Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?


a. worm


b. spike


c. cookie


d. payload

c. cookie

44. Websites use which of the following to keep track of items in a user’s shopping cart?


a. session cookie


b. zombie


c. adware


d. shopping bot

a. session cookie

45. Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?


a. spam


b. spit


c. phishing


d. spyware

c. phishing

46. Internet advertising firms often use which of the following to collect information about users web browsing habits?


a. comware


b. postware


c. spyware


d. billware

c. spyware

47. Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?


a. Electronic Communications Privacy Act (ECPA)


b. Fair Credit Reporting Act


c. Computer Fraud and Abuse Act


d. Computer Matching and Privacy Protection Act

a. ECPA

48. Which of the following is the process of restricting access to certain material on the web?a. text remastering


b. content filtering


c. indexing


d. material masking

b. content filtering

49. Many businesses use which of the following to limit employees’ web access?


a. content filtering


b. web bugs


c. honeypots


d. spyware

a. content filtering

50. Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


a. manager filtering


b. employee monitoring


c. job spamming


d. employee indexing

b. employee monitoring



1. Which kind of tablet typically does not include a physical keyboard and puts the case behind the display?


a. slate


b. convertible


c. console


d. integrated

a. slate

2. Which of the following is another term for the system unit?a. form factor b. chassisc. motherboard d. chip

b. chassis

3. Which of the following is a case on a desktop that contains and protects the item shown in the accompanying figure and other electronic components?


a. system unit


b. master section


c. control port


d. base chip

a. system unit

4. Which kind of tablet positions the case below a keyboard, providing functionality similar to that of a laptop?


a. slate


b. console


c. integrated


d. convertible

d. convertible

5. Which of the following is the main circuit board of the system unit?


a. control board


b. system board


c. master board


d. index board

b. system board

6. Which of the following is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched?


a. computer plug


b. computer port


c. computer chip


d. computer roster

c. computer chip

7. Which of the following circuits contains many microscopic pathways capable of carrying electrical current?


a. indexed


b. systematized


c. calibrated


d. integrated

d. integrated

8. Which of the following is contained on an integrated circuit and can act as an electronic switch that opens or closes the circuit for electrical charges?


a. transistor


b. switcher


c. capacitor


d. resistor

a. transistor

9. Which of the following interprets and carries out the basic instructions that operate a computer?


a. control unit


b. binary device


c. CPU


d. compressor

c. CPU

10. Some computer and chip manufacturers use which of the following terms to refer to a personal computer processor chip?


a. microprocessor


b. parallel processor


c. coprocessor


d. perpendicular processor

a. microprocessor

11. Which of the following processors is a single chip with two or more separate processor cores?a. parallel


b. compressed


c. multi-core


d. binary

c. multi-core

12. Which of the following is the component of the processor that directs and coordinates most of the operations in the computer?


a. control unit


b. concatenation unit


c. compression unit


d. micro unit

a. control unit

13. Which of the following is the component of the processor that performs arithmetic, comparison, and other operations?


a. machine unit


b. control unit


c. ALU


d. CPU

c. ALU

14. Which of the following are small high-speed storage locations contained by the processor that temporarily hold data and instructions?


a. indices


b. switchers


c. capacitors


d. registers

d. registers

15. Which of the following is measured by the number of ticks per second?


a. temporal rate


b. system rate


c. processor speed


d. clock speed

d. clock speed

16. Which of the following is a register function?a. storing the location from where an instruction was fetched


b. storing a control while the instruction unit decodes it


c. storing the operand for a calculation


d. storing data while the AXU calculates it

a. storing the location from where an instruction was fetched

17. The processor relies on which of the following to control the timing of all computer operations?


a. system clock


b. master clock


c. unit clock


d. control clock

a. system clock

18. One gigahertz (GHz) equals how many ticks of the system clock per second?


a. one thousand


b. one million


c. one billion


d. one trillion

c. one billion

19. The faster the clock speed, the more of these the processor can execute per second. What are they?


a. registers


b. functions


c. arguments


d. instructions

d. instructions

20. AMD is the leading manufacturer of which of the following kinds of processors, which have an internal design similar to Intel processors, perform the same functions, can be as powerful, but often are less expensive?


a. Macintosh-compatible


b. Intel-compatible


c. Celeron-compatible


d. Xeon-compatible

b. intel-compatible

21. Which of the following refers to an environment of servers that house and provide access to resources users access via the Internet?


a. peripheral computing


b. dynamic computing


c. embedded computing


d. cloud computing

c. embedded copmuting

22. Which of the following can track your pulse and heart rate, as well as accept calls and display notifications from a smartphone?


a. Smart tags


b. RFID devices


c. Wearable technology


d. Big data

c. wearable technology

23. Which of the following is an application that incorporates data from multiple providers into a new application?


a. combo


b. mashup


c. aggregate


d. integrated app

b. mashup

24. Which of the following consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processed data (information)?


a. concepting


b. dynamism


c. concatenation


d. memory

d. memory

25. The role of memory to store both data and programs is known as which of the following concepts?


a. stored program


b. random memory


c. ROM


d. store and send

a. stored program

26. Which of the following is the most common type of volatile memory?


a. ROM


b. Flash memory


c. CMOS


d. RAM

d. RAM

27. The accompanying figure shows which of the following kinds of modules, which are small circuit boards where RAM chips usually reside, being inserted into the motherboard?


a. index


b. memory


c. insertion


d. cooling

b. memory

28. In the accompanying figure, what on the motherboard holds the memory modules?


a. memory slots


b. memory contacts


c. memory sleeves


d. memory pins

a. memory slots

29. Which of the following types of memory modules, such as that shown in the accompanying figure, positions the pins on opposite sides of the circuit board so they do not connect and thus form two sets of contacts?a. SIMM


b. RIMM


c. DIMM


d. CIMM

c. DIMM

30. Which of the following is true of synchronous DRAM (SDRAM) chips?


a. They transfer data twice for each clock cycle, when compared to DRAM.


b. They are synchronized to the system clock.


c. They do not have to be re-energized as often as DRAM chips.


d. They use pipelining techniques.

b. They are synchronized to the system clock.

31. Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips because which of the following is true?


a. They transfer data twice for each clock cycle.


b. They are synchronized to the system clock.


c. They do not have to be re-energized as often.


d. They use pipelining techniques.

a. They transfer data twice for each clock cycle.

32. What is the process of copying items from RAM to a storage device?


a. pipelining


b. synchronization


c. restating


d. saving

d. saving

33. Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?


a. L1 cache


b. L2 cache


c. L3 cache


d. L4 cache

b. L2 cache

34. Which of the following is a kind of ROM chip that contains permanently written data, instructions, or information that is recorded when the chip is manufactured?


a. L1 cache


b. Flash memory


c. firmware


d. microcode

c. firmware

35. Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?


a. Flash memory


b. L1 cache


c. firmware


d. microcode

a. flash memory

36. Which of the following should you have if you plan to connect your computer or mobile device to a wired computer network?


a. Ethernet port


b. FireWire router


c. MIDI link


d. cable modem

a. Ethernet port

37. As shown in the accompanying figure, which of the following kinds of card is a circuit board that enhances functions of a component of the system unit and/or provides connections to peripherals?


a. peripheral


b. adapter


c. conversion


d. microcode

b. adapter

38. Which of the following means the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them?


a. concatenation


b. GIGO


c. daisy chaining


d. Plug and Play

d. plug and play

39. Which of the following cards converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen?


a. output


b. graphics


c. express


d. PC

b. graphics

40. Which of the following describes a computing environment where everyday objects are connected to the Internet?


a. IoP


b. IoC


c. IoT


d. IoJ

c. loT

41. Which of the following is an alternate term for an adapter card?


a. expansion card


b. router


c. register


d. bus card

a. expansion card

42. Which of the following adapter cards connects to musical instruments?


a. USB


b. serial


c. parallel


d. MIDI

d. MIDI

43. Which of the following is the International Electronics Commission working to make the universal connector standard for charging mobile devices?


a. FireWire


b. micro USB


c. MIDI


d. serial

b. micro USB

44. Within the circuitry of a computer, each channel along which bits transfer allows the various devices both inside and attached to the system unit to communicate with each other. What are these channels, shown in the accompanying figure, called?


a. charters


b. gender changers


c. buses


d. words

c. buses

45. What is the unit of measurement for the clock speed for the channel shown in the accompanying figure?


a. hertz


b. gigabytes/second


c. picahertz


d. kilobytes/nanosecond

a. hertz

46. Which of the following determines the number of bits that the computer can transmit at one time?


a. bus diameter


b. bus width


c. bus circumference


d. bus interpolation

b. bus width

47. Which of the following allows the processor to communicate with peripheral devices?


a. expansion bus


b. index bus


c. interpolated bus


d. power bus

a. expansion bus

48. Which of the following is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires?


a. power surge


b. power supply


c. energy spotter


d. electricity changer

b. power supply

49. How many fans are typically in a desktop case?


a. one


b. two


c. at least three


d. six

c. at least three

50. On which of the following does battery life depend?


a. indices


b. dimensionality


c. usage


d. resolution

c. usage

1. What is the definition of a command?


a. a collection of unprocessed text, numbers, images, audio, and video


b. a series of instructions that tells a computer what to do and how to do it


c. an instruction issued by replying to a question that is displayed


d. an instruction that causes a program or app to perform a specific action

d

2. What is the definition of software?


a. a collection of unprocessed text, numbers, images, audio, and video


b. a series of related instructions that tells a computer or mobile device the tasks to perform and how to perform them


c. an instruction issued by replying to a question that is displayed


d. an instruction that causes a single specific action to be performed

b

3. Which of the following kinds of keyboard has a design that reduces the chance of wrist and hand injuries?


a. basal


b. enhanced


c. strength-building


d. ergonomic

d

4. In a graphical user interface, which of the following is a small symbol on the screen whose location and shape changes as a user moves a pointing device?


a. index


b. keypad


c. pointer


d. keystroke

c

5. What kind of mouse, like the ones shown in the accompanying figure, uses devices that emit and sense light to detect movement?


a. mechanical


b. tracking


c. optical


d. enhanced

c

6. The kind of mouse on the right in the accompanying figure is motion-sensing. What kind of mouse is this?


a. resolution


b. traction


c. optical


d. touch

d

7. What kind of mouse is a battery-powered mouse that sometimes uses Bluetooth technology to pair with the device?


a. light


b. optical


c. wireless


d. radio

c

8. Which of the following is a pressure-sensitive input device that allows a user to control a pointer on the screen?


a. tracking screen


b. pointing stick


c. basal pin


d. pad mat

b

9. Which of the following is a small, flat, rectangular pointing device that is sensitive to pressure and motion?


a. trackball


b. touchpad


c. optical mouse


d. stylus

b

10. What is the term for a motion you make on a touch screen with the tip of one or more fingers or your hand?


a. gesture


b. flip


c. click


d. flick

a

11. Which of the following is a touch-sensitive display device that users interact with by touching the screen with a finger or a stylus?


a. trackpad


b. touch screen


c. touchpad


d. stylus

b

12. Which kind of software allows users to record, compose, mix, and edit music and sounds?


a. music conversion


b. music production


c. sound indexing


d. sound recognition

b

13. What term refers to the process of entering input by speaking into a microphone?


a. voice matter


b. voice input


c. voice output


d. voice outreach

b

14. Which of the following is a type of DV camera that enables a home or small business user to capture video and still images, send email messages with video attachments, add live images to instant messages, broadcast live images over the Internet, and make video calls?a. online cam


b. webcam


c. conference cam


d. video cam

b

15. Which of the following kinds of scanners works in a manner similar to a copy machine except it creates a file of the document in memory instead of a paper copy?


a. drum


b. baseline


c. roller


d. flatbed

d

16. Many scanners include a certain kind of software, which can read and convert text documents into electronic files. What is that kind of software?


a. DCR


b. ECR


c. OCR


d. SCR

c

17. Which of the following is a device that uses a light source to read characters, marks, and codes and then converts them into digital data that a computer can process?


a. character reader


b. literature translator


c. legibility lexicon


d. optical reader

d

18. Most of these types of device include a small optical scanner for reading characters and sophisticated software to analyze what is read. What kind of device is this?


a. DCR


b. ECR


c. OCR


d. SCR

c

19. Which of the following is a technology that reads hand-drawn marks such as small circles or rectangles?


a. OMR


b. TCR


c. OCR


d. MICR

a

20. Which of the following is an identification code that consists of a set of vertical lines and spaces of different widths?


a. RFID


b. OCR


c. bar code


d. turnaround

c

21. Retail and grocery stores use which kind of bar code?


a. UPC (Universal Product Code)


b. Interleaved 2 of 5


c. Codabar


d. POSTNET (Postal Numeric Coding Technique)

a

22. Which of the following is a technology, as shown in the accompanying figure, that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person?


a. OCR


b. RFID


c. OMR


d. TMR

b

23. Many retailers see the technology shown in the accompanying figure as an alternative to bar codes because which of the following is true?


a. It utilizes direct contact.


b. It does not require line-of-sight transmission.


c. It requires each item to be checked out individually.


d. All of the above.

b

24. Which of the following reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, and other similar cards?


a. MICR reader


b. magstripe reader


c. OCR reader


d. OMR reader

b

25. Which of the following is used almost exclusively by the banking industry for check processing?


a. MICR


b. OCR


c. MIDI


d. OCM

a

26. Which of the following devices read text printed with magnetized ink?


a. ACR


b. SCR


c. OCR


d. MICR

d

27. Instead of reading or scanning data from a source document, which of the following kinds of devices obtain data directly at the location where the transaction or event takes place?


a. transmission


b. data collection


c. scanning


d. recognition

b

28. Which of the following is data that has been processed into a useful form?


a. Input


b. Throughput


c. Output


d. Memory

c

29. Displays are geared for a specific resolution. What is this resolution called?


a. indexed


b. baseline


c. native


d. broadband

c

30. An important measure of LCD monitors is the time in milliseconds (ms) that it takes to turn a pixel on or off. What is this called?


a. contrast time


b. pixel time


c. pitch time


d. response time

d

31. What is pixel pitch sometimes called?


a. dot pitch


b. display pitch


c. ratio pitch


d. contrast pitch

a

32. To display the highest quality images, an LCD monitor should plug in which of the following?


a. DVI port


b. DisplayPort


c. HDMI port


d. any of the above

d

33. Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor?


a. GPU


b. Contrast ratio


c. Color matrix


d. Format indicia

b

34. Which of the following is the most advanced form of digital television?


a. GTV


b. XTV


c. HDTV


d. CTV

c

35. Which kind of monitor sandwiches a layer of gas between two glass plates?


a. toner


b. plasma


c. large-format


d. NLQ

b

36. Which of the following are NOT commonly used nonimpact printers?


a. ink-jet printers and photo printers


b. laser printers and thermal printers


c. mobile printers and label and postage printers


d. line printers and dot-matrix printers

d

37. Which kind of printer forms characters and graphics on a piece of paper without actually striking the paper?


a. nonimpact


b. dot matrix


c. shuttle-matrix


d. line

a

38. Which of the following printer is a color printer that produces photo-lab-quality pictures?a. output


b. image


c. photo


d. pic

c

39. A printer, such as that shown in the accompanying figure, creates images using a laser beam and powdered ink. What is this ink called?


a. laser dust


b. spoiler


c. toner


d. cracker

c

40. Which of the following is a disadvantage of an all-in-one printer?


a. it requires more space than having a separate printer, scanner, copy machine, and fax machine


b. it is significantly more expensive than purchasing a printer, scanner, copy machine, and fax machine separately


c. if the device breaks down, users lose all four functions


d. all of the above

c

41. Over time, which of the following is true of thermal printers?


a. They are inexpensive, but the print quality is low and the images tend to fade.


b. They are inexpensive, but the print quality is high and the images tend to last.


c. They are expensive, but the print quality is high although the images tend to fade.


d. They are expensive, but the print quality is low although the images tend to last.

a

42. Which of the following kinds of printer is a small printer that prints on an adhesive-type material that can be placed on a variety of items such as envelopes, packages, optical discs, photos, and file folders?


a. mobile


b. thermal wax


c. label


d. dye-sublimation

c

43. Which of the following use a row of charged wires to draw an electrostatic pattern on specially coated paper and then fuse toner to the pattern?


a. Impact printers


b. Plotters


c. Large-format printers


d. NLQ printers

b

44. Using ink-jet printer technology, but on a much larger scale, which of the following creates photo-realistic-quality color prints?


a. large-format printer


b. impact printer


c. NLQ printer


d. plotter

a

45. Which of the following are audio output devices that cover or are placed outside the ear?a. earphones


b. earbuds


c. headphones


d. VoIPs

c

46. Which of the following are audio output devices that rest inside the ear canal?


a. earbuds


b. headphones


c. VoIP


d. e-phones

a

47. Which of the following is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen?


a. Braille printer


b. utility manager


c. accessibility wizard


d. interactive whiteboard

d

48. Some input devices include a kind of output that provides the user with a physical response from the device. What kind of output is this?


a. utility


b. interactive


c. tactile


d. physical

c

49. Which of the following requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers?


a. ADA


b. AMA


c. W3C


d. Smith-Rakoff Act of 1997

a

50. Which of the following kinds of printers offers an alternative for blind users?


a. Braille


b. utility


c. high-contrast


d. magnifier

a