MTTC Computer Science: Practice & Study Guide Final Exam
Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come
to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will
Click it to see your results. Good luck!
Question 11.Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?
Question 22.Bill is the new Chief Technology Officer at Z Corp. He plans to use _____ to prevent theft and protect the integrity of Z Corps. data.
Question 33.Which is true about closed source software?
Question 44.In the context of video cards, GPU stand for?
Question 55.Which hardware is used to input data signals to a computer by touching a monitor?
Question 66.Millie is a recording artist seeking to buy a device that processes audio output. Which device is she interested in?
Question 77.What is data encryption?
Question 88.Which of the following best describes the role of a system administrator?
Question 99.Which of the following file systems is recommended when working with multiple operation systems?
Question 1010.All of the following are valid reasons for having different file types EXCEPT:
Question 1111.While both spreadsheet and database software can be used to organize and manipulate data, when would you benefit most from using database software?
Question 1212.Which of the following depicts a typical FTP site?
Question 1313.In the context of specialized software for educators LMS stand for _____.
Question 1414.The online encyclopedia Wikipedia is an example of a _______.
Question 1515.How are the existence of intranets and extranets critical for organizational growth?
Question 1616._____ are important because they make it possible for hardware and software produced by different companies easily share information and work together.
Question 1717.Which internet protocol is responsible for re transmitting lost or erroneous data packets?
Question 1818.A computer virus is one type of _____.
Question 1919.The term modem is short for _____.
Question 2020.Which of the following is not a network operating system?
Question 2121.How is WAN different from WWAN?
Question 2222.Which of the following is an example of network topology?
Question 2323.What is a search engine?
Question 2424.Which of the following about XHTML is FALSE?
Question 2525.A set of computer instructions that you can record and execute later as needed is called a(n) _____.
Question 2626.Which of the following is a characteristic of an Automated Online Search Tool?
Question 2727.What is the definition of Assistive Technology?
Question 2828.What is a student response system?
Question 2929.Technology ethics may include:
Question 3030.To fully participate in a webinar, all users must have:
Question 3131.In a business context, what is a wiki?
Question 3232.What is a virtual meeting?
Question 3333.What is the difference between newsgroups and discussion forums?
Question 3434.How do functions differ from methods?
Question 3535.Which of the following represents the simplest algorithm to search an unsorted list of items in order to determine whether a particular item occurs in the list or not?
Question 3636.Instead of a list of steps, algorithms can be written using:
Question 3737.The measure of how much computing resources and time an algorithm requires is known as _____, and is denoted by _____.
Question 3838.A data type where values can only represent one of a limited number of pre-defined categories is called a(n) _______ data type.
Question 3939.Helen is writing code that relies heavily on recursive functions. Which of these programming languages would she be using?
Question 4040.Why is FORTRAN considered a procedural programming language?
Question 4141.Top down program design starts with the _____ and ends with the _____.
Question 4242.How are the programming languages Java and C++ different?
Question 4343.Which of the following languages uses codes such as MOVE, ADD and SUB?
Question 4444.Programs that handle asynchronous input are:
Question 4545.Which of the following program robustness characteristics is often revamped on old systems?
Question 4646.What is the most important thing to do to incorporate multiple intelligences into your teaching?
Question 4747.The main difference between interim and summative assessment is...
Question 4848._____ assessments are constructed by experts and published for use in schools.
Question 4949.How have technological advances made lifelong learning more convenient?
MTTC Computer Science: Practice & Study Guide Final Exam Instructions
Choose your answers to the questions and click 'Next' to see the next question. You can skip questions if you would like and come back
to them later with the "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will
appear. Click it to see your results. You will lose your work if you close or refresh this page. Good luck!