

























Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A wide range of topics related to computer fundamentals and applications, including software piracy, network security, password security, internet connectivity, hardware and software components, data management, project management tools, database concepts, and various software applications and features. A comprehensive overview of essential computer knowledge and skills, making it a valuable resource for students, it professionals, and lifelong learners interested in understanding the core principles and practical applications of modern computing technology. The content covers a diverse range of subjects, from basic computer terminology and concepts to more advanced topics like data manipulation, programming, and troubleshooting, providing a solid foundation for further study or professional development in the field of information technology.
Typology: Exams
1 / 33
This page cannot be seen from the preview
Don't miss anything!
The unauthorized copying of software is referred to as: ✔✔Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? ✔✔Public Domain The best security for passwords is: ✔✔Memorize it Eight bits equal how many bytes? ✔✔ 1 One megabyte equals how many bytes? ✔✔1,048, Storing data for the long term is called what? ✔✔Archiving A logical series of instructions given to a computer is called a what? ✔✔Program
A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? ✔✔Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? ✔✔Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? ✔✔Class C Of the following printers, which one actually touches the paper to print? ✔✔Impact What is the most popular port that can connect peripheral devices like printers? ✔✔USB A single-sided, single density DVD recordable has a capacity of what? ✔✔4.7 GB In Excel, the intersection of a row and a column is called what? ✔✔Cell A database file that contains all the information about a single entity is called what? ✔✔Record
Select the most secure password from the list below: 07SuhBW36 ; Hbabies78 ; Password ; 67Eww98 ✔✔07SuhBw The slowest connection to the internet is a connection. ✔✔Dial-up Which of the following transmits data using light pulses? ✔✔Fiber optic cables Use Bluetooth technology for connecting: ✔✔Wireless accessories To make it easier for people to get to places on the World Wide Web, a server translates a public domain name into its IP address. ✔✔DNS The OSI networking model contains _______ layers. ✔✔ 7 A national or global network of computers is called a: ✔✔LAN A widely used method to display a network topology is a: ✔✔Network Chart
A type of virus that copies itself repeatedly using up system resources is called? ✔✔Worm Entering the statement ("cat and dog"), without the parenthesis will return what results? ✔✔Precisely "cat and dog" only What software is required to access .pdf files? ✔✔Acrobat Reader The general way to transfer files over the internet is to use? ✔✔FTP A/An is an address for a web page or other resource online. ✔✔URL On the World Wide Web, the is also known as the server. ✔✔Web host On the World Wide Web, the is also known as the client. ✔✔Web browser An email address is a combination of a user name and what name? ✔✔Domain
A router is a device that makes decisions about? ✔✔What network path packets should follow One difference between RAM and ROM is: ✔✔That RAM is volatile and ROM is non-volatile A type of chart designed to analyze and represent tasks involved in completing a given project is known as a: ✔✔PERT chart A chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project. ✔✔Gantt When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a: ✔✔Flowchart A properly attached wrist strap decreases the chance of: ✔✔ESD A technician runs a program to determine the system's reachability across the network. ✔✔Ping
Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run? ✔✔Tracert Organizing a solution that proceeds from the general to the specific is called? ✔✔Top-down design A program of logical series of that tell a computer what to do. ✔✔Instructions Input/output devices are also known as? ✔✔Peripherals The term computer ethics, refers to ✔✔A person's conduct and behavior as a computer operator A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the: ✔✔Ethernet Cable Select the most secure password from the list below: 078uhBU38 ; hbacon68 ; 93niGhkL ; kruystall23 ✔✔078uhBU
The two methods to consolidate data from multiple spreadsheets are position and: ✔✔Category The term, prioritizing, relates to: ✔✔Managing time Use Bluetooth technology for connecting: ✔✔Wireless accessories A router is a device that makes decisions about: ✔✔What network path packets should follow To navigate to the next cell horizontally and the vertically in a word processing table, press the key. ✔✔Tab The best method to test whether RAM is faulty is to ✔✔Replace faulty RAM with working RAM The two basic ways to retrieve records in most database programs are: ✔✔Find command and queries
Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the of September. ✔✔fourth Employees in the ABC Company have limited access to company information. This security measure is called: ✔✔Access Control A set of moral standards for judging whether something is right or wrong is known as: ✔✔Ethics A/An is an address for a web page or other resource on the internet. ✔✔URL The crime of occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts. ✔✔Identity Theft In presentation applications, which of the following options is selected to add transitions to all slides? ✔✔Apply to all A file sent with an email message is called: ✔✔An attachment
A function in a spreadsheet program that gives the user a set number of entries to choose from when entering data is: ✔✔A drop-down list For the assistance in exporting a data list from a spreadsheet, the user can use a: ✔✔Wizard The information processing cycle includes: ✔✔Input, processing, output, storage Demonstrating a professional attitude at work involves which of the following characteristics? ✔✔Working with others in your group for the good of the company The process of adding all the numbers in a range of cells can be performed by using a: ✔✔Sum function A GUI program focuses on - centered design styles. ✔✔Beginner The programming style allows users to interact with the computer via graphics instead of commands. ✔✔GUI
Which of the following domains indicated an accredited United States educational organization. ✔✔.edu When developing an online help system, allow users to follow along step-by-step. ✔✔screenshots A customized animation effect created by the user for presentations is called ✔✔motion path The is exclusively designed for temporary data storage. ✔✔RAM A devices that directs traffic on a network is called a ✔✔router To create a heading to span across two or more columns, the user should ✔✔merge cells To simultaneously edit the background of the slides in a presentation, use the ✔✔slide master The computer's clipboard is ✔✔a place in the memory to aid in cutting, copying, and pasting
Unit testing is defined as the process of testing ✔✔each module individually to discover errors in the code When listening to a customer's complain, which of the following is the most important ✔✔repeat in concise terms the problem as understood What spreadsheet function returns the largest number in a range? ✔✔MAX Preset margins, tabs, line spacing, and fonts are all called settings ✔✔default The most common networking protocol of the internet is ✔✔TCP/IP The provides an interface between the user or application program and the computer hardware ✔✔operating system An approach that combines visual, audio, and interactive technologies is called ✔✔multimedia
In a command prompt, which utility scans a hard drive for problems with the file system and also for bad sectors ✔✔chkdisk Which of the following sentences illustrates correct capitalization? ✔✔The White House is located in Washington, D.C. The wireless encryption of is the weakest encryption used. ✔✔WEP A database is a piece of code that is sent to a database in order to get information back from the database ✔✔query Which of the following codes is produced by a compiler from the source code and is executed by the machine ✔✔object If all computers on the network segments do not have network connectivity, the computer technicians to examine the ✔✔switch When reviewing step-by-step procedures, an easy way to review the logical steps in a process is by creating a ✔✔flowchart
The unit of measurement for a CPU speed is ✔✔hertz To view all the slides in presentation at the same time, use view ✔✔slide sorter The ability to process both numerical and word processing data by collecting, deleting, modifying, analyzing, and summarizing is referred to as ✔✔data manipulation To give a list of options in a database, users are typically provided choices from a box ✔✔control A VPN is used to link ✔✔home office (SOHO) users to headquarters internal network To change the word "Nebraska" to "New York" throughout a document with a single instruction, the user should choose ✔✔find and replace In an ERD, the are known as independent items that can be identified uniquely, and are also referred to as nouns ✔✔entities
The purpose of a substring function is to ✔✔separate an alpha field into smaller parts Meeting the unique physiological needs of a worker by providing adjustable equipment is called what? ✔✔ergonomics Buying a site license for software allows you to do what? ✔✔install it on multiple computers If you don't have an electrostatic wristband and are working inside the computer, what can you do to prevent electrostatic discharge? ✔✔touch the metal frame A method of preventing ESD is? ✔✔stand on an antistatic mat All the employees are trained to cooperate themselves. ✔✔among When talking face-to-face with customers, ✔✔maintain appropriate interpersonal space