Kuis Online Pengenalan Komputasi - Asyrofi

Rabu, 13 November 2019

Kuis Online Pengenalan Komputasi

Hardware Basics: Peripherals

1. Match the term on the left to its corresponding definition on the right

·         unchangeable information that serves as reference material for the CPU (ROM)
·         temporary storage area (RAM)
·         printer, scanner, or mouse, for example (peripheral)
·         area in the computer box for disk drives or other devices (bay)
·         low-energy, battery powered memory (CMOS)
·         wires that move data from one component to another (bus)
·         adds an additional feature to a computer system (expansion card)
·         similar to RAM but nonvolatile (flash memory)
·         socket on the outside of the computer (port)
·         memory chips on small circuit boards (DIMMs)
·         contained on the CPU to perform a variety of simple tasks (instructions)

2.  A file is an organized collection of information, such as a term paper or a set of names and addresses, stored in a computer-readable form. (True)

3. Storage devices serve as short-term repositories for data. (False)

4. The operating system is loaded from the hard disk onto ROM when the computer is starting up. (False)

5. A computer doesn't understand words, numbers, pictures, musical notes, or even letters of the alphabet. (True)

6. In modern integrated circuits, high and low electrical charges represent bits, but these circuits work as if they were really made up of tiny (switches)

7. The wire groups that transfer data between components on the motherboard are known as the (internal) buses.
8. The ________ number system is a system that denotes all numbers with combinations of two digits.
Answer: binary

9. ASCII is a subset of this larger coding scheme: (Unicode)

10. The primary difference between RAM and secondary storage devices is
(the length of time data is stored)

11. This type of memory is located in the CPU and is used to store data that is likely to be used next:
A) flash memory.
B) Level 1 cache.
C) Level 2 cache.
D) virtual storage.
Answer: C

12. When newer processors can process all of the instructions handled by earlier models, the
processor is considered
A) Core 2 Duo.
B) backward compatible.
C) Motorola.
D) Apple.
Answer: B

13. The binary system uses the power of
A) 10.
B) 4.
C) 256.
D) 2.
Answer: D

14. This is an open area in the system unit used to hold a disk drive:
A) bay.
B) port.
C) sack.
D) transducer.
Answer: A

15. When information is sent from the CPU to memory or some other device this is considered
A) backflow.
B) garbage collection.
C) writeback.
D) communication.
Answer: C

16. Program instructions are represented in binary notation through the use of
A) buzzwords.
B) pacts.
C) sets.
D) codes.
Answer: D

17. The actual execution of instructions is usually carried out by the
A) prefetch unit.
B) decode unit.
C) control unit.
D) arithmetic logic unit.
Answer: D

18. RAM chips are usually grouped on small circuit boards called
A) CMOS.
B) ROM.
C) DIMMs.
D) RAM boards.
Answer: C

19. Increasing the clock speed of CPUs creates a negative side effect of
A) loss of digits.
B) slower performance.
C) incompatibility.
D) heat.
Answer: D

20. The word size of a typical PC's CPU is
A) 1 or 2 bytes.
B) 32 or 64 bits.
C) 32 or 64 bytes.
D) 8 or 16 bits.
Answer: B


Software Basics: The Ghost in the Machine

1. Match the term on the left to its corresponding definition on the right
·         organization into compact submenus (hierarchical menus)
·         operating system by Apple Inc (Mac OS)
·         also known as a folder (directory)
·         Replaced Windows Vista (WIndows 7)
·         C (A Windows PC's primary hard disk is usually given the letter ________)
·         choices depend on the onscreen object currently selected (context-sensitive menus)
·     GUI (The Mac was the first low-cost computer that had an operating system designed with a graphical user interface, known as a ________)

2. Cross-platform software can be used on PCs and Macs. (TRUE)

3. Restarting a computer is also known as rebooting. (TRUE)

4. The operating system is responsible for authentication and authorization. (TRUE)

5. Virtual memory is broken into same-sized blocks called (pages)

6. The process of printing a term paper while entering data into a spreadsheet while also downloading clip art from the Internet is known as (fetch)

7. When you discover a problem or mistake within a software program, you have found a(n) (bug)

8. A(n) (patent) protects mechanical inventions.

9. The multiuser operating system historically used by academic and government institutions is (UNIX)

10. When the operating system requests an application program to be executed, it is temporarily stored in memory, also known by the acronym (RAM)

11. What handles communication between the CPU and the disk drive(s)? (the operating system)

12. Typical computer programming languages used today include all of the following EXCEPT: (machine language)

13. Windows Phone ________ is a relatively new operating system for mobile phones. (7)

14. Errors in a software program are referred to as (bugs)

15. What is the name of the operating system that is rarely found on personal computers or laptops but is used in servers and high-end workstations? (UNIX)

16. revisions. 

17. The instruction execution cycle three-step rhythm is (fetch the instruction, increment the program counter, and perform the specified task.)

18. When a computer is off, what is in RAM? (nothing)

19. The program that allows I/O devices to communicate with the computer is known as a(n) (device driver)

20. Java is referred to as a(n) (high-level language.)

Tags: 
Kuis Online Pengenalan Komputasi | Kuis Online Pengenalan Komputasi PTI B | TPB ITB | 2019

Tidak ada komentar:

Posting Komentar

Post Bottom Ad