Name: 
 

Computer Literacy Lesson 3



True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

A peripheral device must be physically connected to the computer.
 

 2. 

Application software files do not have to be compatible with the computer’s operating system.
 

 3. 

Firewalls connect peripherals to the computer.
 

 4. 

Computers with Windows operating systems often have Intel Pentium chips.
 

 5. 

You evaluate available computer models based on what you want a computer to do.
 

 6. 

It is not necessary to register new equipment to have access to technical support.
 

 7. 

Most hardware components available today are called park and play because they must be carefully positioned before using.
 

 8. 

The speed of the CPU, which is measured in megahertz, is determined by the system clock.
 

 9. 

All models of microcomputers have exactly the same kinds of disk drives.
 

 10. 

Adding random access memory is relatively simple because additional memory expansion cards fit easily into slots on the computer’s motherboard.
 

 11. 

A PS/2 port is also sometimes called a camera port.
 

 12. 

Regular visual inspection is an important part of routine maintenance for computer components.
 

 13. 

You should never try to replicate a computer problem when trying to solve the problem.
 

 14. 

Storage media can be damaged by magnetic and electric fields.
 

 15. 

Increasing storage capacity or adding more memory are reasons for considering a computer upgrade.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 16. 

A ____ is a device that allows one computer to talk to another via a cable connection.
a.
scanner
c.
modem
b.
mouse
d.
USB port
 

 17. 

Adding or changing components of a computer to make it faster or more efficient is called ____.
a.
maintaining
c.
operating
b.
upgrading
d.
troubleshooting
 

 18. 

A ____ is used to add memory or connect peripheral devices to a notebook computer.
a.
hacker card
c.
PC card
b.
modem clip
d.
Mac disk
 

 19. 

____ is software you can use on a trial basis before paying a registration fee.
a.
Bundle
c.
Plug and play
b.
Shareware
d.
Freeware
 

 20. 

A digital camera is an example of a peripheral that connects to new computers with a ____ port.
a.
serial
c.
MIDI
b.
fan
d.
USB
 

 21. 

Which of the following is NOT a routine maintenance task for computer systems?
a.
visual inspection
c.
deleting temporary files
b.
checking e-mail
d.
checking cables for wear
 

 22. 

Analyzing computer problems to correct faults in the system is called ____.
a.
maintenance
c.
hacking
b.
fragmenting
d.
troubleshooting
 

 23. 

A good source of help with computer problems is ____.
a.
computer manuals
c.
a technical support telephone number
b.
support technicians
d.
all of the above
 

 24. 

Skilled computer users who invade computer systems and write virus programs are called ____.
a.
bugs
c.
spikes
b.
firewalls
d.
hackers
 

 25. 

How many bits of data can a serial port transmit at a time?
a.
one
c.
eight
b.
two
d.
12 million
 

 26. 

The final step in the troubleshooting process should always be to ____.
a.
contact a support technician
c.
clean the computer’s case
b.
avoid similar problems in the future
d.
check the cables
 

 27. 

Install a(n) ____ to avoid losing data if the power goes off during a thunderstorm.
a.
surge protector
c.
universal serial bus
b.
uninterruptible power source
d.
CD-ROM drive
 

 28. 

Which of the following factors will damage removable storage media?
a.
extreme temperatures
c.
touching the surface of the media
b.
magnetic fields
d.
all of the above
 

 29. 

An alliance that was formed in 1993 to produce the PowerPC family of CPU chips included IBM, Motorola, and ____.
a.
Apple
c.
Honda
b.
Walmart
d.
Dell
 

 30. 

A small computer system interface port found in many older computer models is more commonly called a(n) ____ port.
a.
MIDI
c.
cable
b.
parallel
d.
SCSI
 

Completion
Complete each sentence or statement.
 

 31. 

____________________ ports connect computers to electronic instruments.
 

 

 32. 

One ______________________________ port, found in older computers, can provide connection for one or more peripheral devices.
 

 

 33. 

A(n) ____________________ device transmits data one bit at a time.
 

 

 34. 

The ____________________ standard supports data transfer rates of up to 12 million bits per second.
 

 

 35. 

Hardware components that install easily because the computer’s operating system recognizes the device and handles the configuration tasks are called ______________________.
 

 

 36. 

A(n) ____________________ device transfers several bits of data at a time.
 

 

 37. 

A computer program written to corrupt data is called a(n) ____________________.
 

 

 38. 

A(n) _____________________ can shield computer components against power spikes if it is used and maintained properly.
 

 

 39. 

Never eat around your computer to avoid problems with a “sticky” mouse or ____________________.
 

 

 40. 

The toner or ink for a laser or inkjet printer comes in a plastic ____________________ that can be recycled.
 

 

 41. 

The process of analyzing and correcting computer problems is referred to as ____________________.
 

 

 42. 

Viruses are often spread on the Internet by way of ____________________ attachments.
 

 

 43. 

A(n) ____________________ creates a line of defense against unauthorized entry into a network from an outside source on the Internet.
 

 

 44. 

Padded bags are available to protect ____________________ computers when they are being transported.
 

 

 45. 

It is easy to add ____________________ to the motherboard in order to make a computer processor work faster.
 

 

 46. 

A single ____________________ port can connect up to 127 peripheral devices.
 

 

 47. 

Computer users should regularly _____________________ important data files to a removable storage device in case the primary system becomes inaccessible.
 

 

 48. 

Skilled but unscrupulous computer users who access another computer’s files through an Internet connection are called ____________________.
 

 

 49. 

Worn or brittle ____________________ that connect peripherals are often a source of communication problems between computer components.
 

 

 50. 

Most computer components come with a limited ____________________, which provides for the part to be repaired or replaced if it fails within a certain time period.
 

 



 
Check Your Work     Reset Help