Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Fundamentals and Applications, Exams of Computer Programming

A wide range of topics related to computer fundamentals and applications, including software piracy, network security, password security, internet connectivity, hardware and software components, data management, project management tools, database concepts, and various software applications and features. A comprehensive overview of essential computer knowledge and skills, making it a valuable resource for students, it professionals, and lifelong learners interested in understanding the core principles and practical applications of modern computing technology. The content covers a diverse range of subjects, from basic computer terminology and concepts to more advanced topics like data manipulation, programming, and troubleshooting, providing a solid foundation for further study or professional development in the field of information technology.

Typology: Exams

2024/2025

Available from 10/18/2024

Holygrams
Holygrams 🇺🇸

3.7

(3)

2.2K documents

1 / 33

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
The unauthorized copying of software is referred to as: ✔✔Pirated Software
There are images online that you want to use. The website states that the images are not
copyrighted. You think you can use these without breaking the law. These images are referred to
being in the what? ✔✔Public Domain
The best security for passwords is: ✔✔Memorize it
Eight bits equal how many bytes? ✔✔1
One megabyte equals how many bytes? ✔✔1,048,576
Storing data for the long term is called what? ✔✔Archiving
A logical series of instructions given to a computer is called a what? ✔✔Program
Nocti Practice Test Questions and Answers/LATEST UPDATE 2025
Already GRADED A+)
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21

Partial preview of the text

Download Computer Fundamentals and Applications and more Exams Computer Programming in PDF only on Docsity!

The unauthorized copying of software is referred to as: ✔✔Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? ✔✔Public Domain The best security for passwords is: ✔✔Memorize it Eight bits equal how many bytes? ✔✔ 1 One megabyte equals how many bytes? ✔✔1,048, Storing data for the long term is called what? ✔✔Archiving A logical series of instructions given to a computer is called a what? ✔✔Program

Nocti Practice Test Questions and Answers/LATEST UPDATE 2025

Already GRADED A+)

A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? ✔✔Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? ✔✔Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? ✔✔Class C Of the following printers, which one actually touches the paper to print? ✔✔Impact What is the most popular port that can connect peripheral devices like printers? ✔✔USB A single-sided, single density DVD recordable has a capacity of what? ✔✔4.7 GB In Excel, the intersection of a row and a column is called what? ✔✔Cell A database file that contains all the information about a single entity is called what? ✔✔Record

Select the most secure password from the list below: 07SuhBW36 ; Hbabies78 ; Password ; 67Eww98 ✔✔07SuhBw The slowest connection to the internet is a connection. ✔✔Dial-up Which of the following transmits data using light pulses? ✔✔Fiber optic cables Use Bluetooth technology for connecting: ✔✔Wireless accessories To make it easier for people to get to places on the World Wide Web, a server translates a public domain name into its IP address. ✔✔DNS The OSI networking model contains _______ layers. ✔✔ 7 A national or global network of computers is called a: ✔✔LAN A widely used method to display a network topology is a: ✔✔Network Chart

A type of virus that copies itself repeatedly using up system resources is called? ✔✔Worm Entering the statement ("cat and dog"), without the parenthesis will return what results? ✔✔Precisely "cat and dog" only What software is required to access .pdf files? ✔✔Acrobat Reader The general way to transfer files over the internet is to use? ✔✔FTP A/An is an address for a web page or other resource online. ✔✔URL On the World Wide Web, the is also known as the server. ✔✔Web host On the World Wide Web, the is also known as the client. ✔✔Web browser An email address is a combination of a user name and what name? ✔✔Domain

A router is a device that makes decisions about? ✔✔What network path packets should follow One difference between RAM and ROM is: ✔✔That RAM is volatile and ROM is non-volatile A type of chart designed to analyze and represent tasks involved in completing a given project is known as a: ✔✔PERT chart A chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project. ✔✔Gantt When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a: ✔✔Flowchart A properly attached wrist strap decreases the chance of: ✔✔ESD A technician runs a program to determine the system's reachability across the network. ✔✔Ping

Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run? ✔✔Tracert Organizing a solution that proceeds from the general to the specific is called? ✔✔Top-down design A program of logical series of that tell a computer what to do. ✔✔Instructions Input/output devices are also known as? ✔✔Peripherals The term computer ethics, refers to ✔✔A person's conduct and behavior as a computer operator A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the: ✔✔Ethernet Cable Select the most secure password from the list below: 078uhBU38 ; hbacon68 ; 93niGhkL ; kruystall23 ✔✔078uhBU

The two methods to consolidate data from multiple spreadsheets are position and: ✔✔Category The term, prioritizing, relates to: ✔✔Managing time Use Bluetooth technology for connecting: ✔✔Wireless accessories A router is a device that makes decisions about: ✔✔What network path packets should follow To navigate to the next cell horizontally and the vertically in a word processing table, press the key. ✔✔Tab The best method to test whether RAM is faulty is to ✔✔Replace faulty RAM with working RAM The two basic ways to retrieve records in most database programs are: ✔✔Find command and queries

Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the of September. ✔✔fourth Employees in the ABC Company have limited access to company information. This security measure is called: ✔✔Access Control A set of moral standards for judging whether something is right or wrong is known as: ✔✔Ethics A/An is an address for a web page or other resource on the internet. ✔✔URL The crime of occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts. ✔✔Identity Theft In presentation applications, which of the following options is selected to add transitions to all slides? ✔✔Apply to all A file sent with an email message is called: ✔✔An attachment

A function in a spreadsheet program that gives the user a set number of entries to choose from when entering data is: ✔✔A drop-down list For the assistance in exporting a data list from a spreadsheet, the user can use a: ✔✔Wizard The information processing cycle includes: ✔✔Input, processing, output, storage Demonstrating a professional attitude at work involves which of the following characteristics? ✔✔Working with others in your group for the good of the company The process of adding all the numbers in a range of cells can be performed by using a: ✔✔Sum function A GUI program focuses on - centered design styles. ✔✔Beginner The programming style allows users to interact with the computer via graphics instead of commands. ✔✔GUI

Which of the following domains indicated an accredited United States educational organization. ✔✔.edu When developing an online help system, allow users to follow along step-by-step. ✔✔screenshots A customized animation effect created by the user for presentations is called ✔✔motion path The is exclusively designed for temporary data storage. ✔✔RAM A devices that directs traffic on a network is called a ✔✔router To create a heading to span across two or more columns, the user should ✔✔merge cells To simultaneously edit the background of the slides in a presentation, use the ✔✔slide master The computer's clipboard is ✔✔a place in the memory to aid in cutting, copying, and pasting

Unit testing is defined as the process of testing ✔✔each module individually to discover errors in the code When listening to a customer's complain, which of the following is the most important ✔✔repeat in concise terms the problem as understood What spreadsheet function returns the largest number in a range? ✔✔MAX Preset margins, tabs, line spacing, and fonts are all called settings ✔✔default The most common networking protocol of the internet is ✔✔TCP/IP The provides an interface between the user or application program and the computer hardware ✔✔operating system An approach that combines visual, audio, and interactive technologies is called ✔✔multimedia

In a command prompt, which utility scans a hard drive for problems with the file system and also for bad sectors ✔✔chkdisk Which of the following sentences illustrates correct capitalization? ✔✔The White House is located in Washington, D.C. The wireless encryption of is the weakest encryption used. ✔✔WEP A database is a piece of code that is sent to a database in order to get information back from the database ✔✔query Which of the following codes is produced by a compiler from the source code and is executed by the machine ✔✔object If all computers on the network segments do not have network connectivity, the computer technicians to examine the ✔✔switch When reviewing step-by-step procedures, an easy way to review the logical steps in a process is by creating a ✔✔flowchart

The unit of measurement for a CPU speed is ✔✔hertz To view all the slides in presentation at the same time, use view ✔✔slide sorter The ability to process both numerical and word processing data by collecting, deleting, modifying, analyzing, and summarizing is referred to as ✔✔data manipulation To give a list of options in a database, users are typically provided choices from a box ✔✔control A VPN is used to link ✔✔home office (SOHO) users to headquarters internal network To change the word "Nebraska" to "New York" throughout a document with a single instruction, the user should choose ✔✔find and replace In an ERD, the are known as independent items that can be identified uniquely, and are also referred to as nouns ✔✔entities

The purpose of a substring function is to ✔✔separate an alpha field into smaller parts Meeting the unique physiological needs of a worker by providing adjustable equipment is called what? ✔✔ergonomics Buying a site license for software allows you to do what? ✔✔install it on multiple computers If you don't have an electrostatic wristband and are working inside the computer, what can you do to prevent electrostatic discharge? ✔✔touch the metal frame A method of preventing ESD is? ✔✔stand on an antistatic mat All the employees are trained to cooperate themselves. ✔✔among When talking face-to-face with customers, ✔✔maintain appropriate interpersonal space