CSCI-2203 test 1
Which of the following elements of File Explorer is collapsed by default? Navigation pane Folder pane Ribbon Quick Access toolbar
Ribbon
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next. True False
True
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. True False
True
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical. True False
True
Which of the following Office features has both a button you click to apply a feature and an arrow you click to display a drop-down list of options? button drop-down list split buttons gallery
Split Buttons
Which of the following is the file extension given to an Access database? .docx .xlsx .accdb .pptx
.accdb
Which of the following is the file extension given to an Excel 2016 workbook? .docx .xlsx .accdb .pptx
.xlsx
If you have been using an application already and want to create a new file, you create it from the Backstage view. True False
True
The keyboard shortcut for closing a file is Ctrl+W. True False
True
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure). True False
True
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image. True False
True
Which of the following is true about Tell Me? It is an Office help feature. If is available in Office 2016 applications. If is available in Office 365 applications. all of the above
all of the above
People that collect and sell personal data are called _______. direct marketers fund-raisers information resellers government agencies
information resellers
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. Spyware Freeware Employee-monitoring software Cookies
Employee-monitoring software
The process of coding information to make it unreadable except to those who have a special piece of information known as a key. Restriction Security Protection Encryption
Encryption
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account. True False
False
Identity theft and mistaken identity are the same. True False
False
If copyright-protected music is uploaded to a website, it is legal to download it. True False
False
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for. True False
False
The Minimize button in the upper right of the file window closes the window. True False
False
The Quick Access toolbar is located at the bottom of each Office application window. True False
False
The essential element that controls how computers are used is a law. True False
False
The keyboard shortcut for renaming a file is F4. True False
False
The mini toolbar displays below the Ribbon in each application window. True False
False
Which of the following is not malware? Trojan horses Viruses Worms Ad-Aware
Ad-Aware
Which of the following is true about the Windows 10 Action Center? It displays notifications such as emails. It displays notifications such as Windows update notifications. Click the Action Center button on the right side of the Taskbar to open the Action Center pane. All of the above
All of the Above
Which of the following features can you add to the Quick Access toolbar? Quick Print New Spelling & Grammar All of the above
All of the above
Computer criminals that create and spread viruses are punished under this law. Gramm-Leach-Bliley Act Freedom of Information Act Family Educational Rights and Privacy Act Computer Fraud and Abuse Act
Computer Fraud and Abuse Act
Small data files that are deposited on a user's hard disk when they visit a website are called _______. cookies codes cache proxies
Cookies
Which of the following lets you search for content on your computer, on the Internet, and in the Microsoft Store? File Explorer Cortana Microsoft account Taskbar
Cortana
Which of the following keyboard shortcuts invokes the Select All command? Ctrl+R Ctrl+A Ctrl+Home Ctrl+End
Ctrl+A
Which of the following keyboard shortcuts opens the Open dialog box? Ctrl+F6 Ctrl+F8 Ctrl+F10 Ctrl+F12
Ctrl+F12
Which of the following keyboard shortcuts opens a new blank file from within an Office application? Ctrl+O Ctrl+N Ctrl+P Ctrl+D
Ctrl+N
Which of the following keyboard shortcuts opens the Print area on the Backstage view? Ctrl+O Ctrl+N Ctrl+P Ctrl+D
Ctrl+P
Which of the following keyboard shortcuts lets you create a new folder in a Windows folder? Ctrl+N Shift+N Alt+N Ctrl+Shift+N
Ctrl+Shift+N
Which of the following keyboard shortcuts lets you paste a paragraph in another location? Ctrl+C Ctrl+M Ctrl+V Ctrl+X
Ctrl+V
Which of the following keyboard shortcuts lets you cut a range of worksheet cells from their current location? Ctrl+C Ctrl+M Ctrl+V Ctrl+X
Ctrl+X
Which among the following is a way to shut down an ISP or website? Denial of service attack Viruses Trojan horses Worms
Denial of service attack
Which of the following categories in the Settings window control Bluetooth, printers, and your mouse? System Devices Personalization Ease of Access
Devices
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away" Digital Millennium Copyright Act Computer Abuse Amendments Act The Gramm-Leach-Bliley Act Computer Fraud and Abuse Act
Digital Millennium Copyright Act
A(n) _______ acts as a security buffer between a corporation's private network and all external networks. firewall password disaster recovery plan virus checker
Firewall
Which of the following is not a measure to protect computer security? Restricting access Encrypting data Copying data and storing it at a remote location Keeping the same password on all systems consistently
Keeping the same password on all systems consistently
Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Cookie Global positioning system Keystroke logger Web bug
Keystroke logger
Which of the following Microsoft Office applications would you use to create a presentation on a new product or sales trends? Microsoft Word Microsoft Excel Microsoft Access Microsoft PowerPoint
Microsoft PowerPoint
Which of the following Microsoft Office applications would you use to create a professional-looking catalog or brochure? Microsoft Outlook Microsoft OneNote Microsoft Publisher Office Web Apps
Microsoft Publisher
Which of the following applications is not part of applications typically included in Office 365? Microsoft Word Microsoft Windows Microsoft Outlook Microsoft OneNote
Microsoft Windows
In Windows 10 and Office 2016, which of the following do you need so that your files and account settings are portable? Microsoft account File Explorer Cortana All of the above
Microsoft account
Which of the following places an open window on the Windows Taskbar? Minimize button Restore Down button Maximize button Close button
Minimize button
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Illusion of anonymity Browser cache History files Privacy mode
Privacy mode
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. Worm Fake Virus Rogue
Rogue
When using Office 2016 on a tablet, which of the following gestures moves an object or selected text? pinch stretch slide swipe
Slide
These are used by advertisers to keep track of your web activity as you move from one site to the next. Web bugs History files First-party cookies Third-party cookies
Third-party cookies
How does the Start page display different apps?
Titles
Which of the following optimizes the Office working environment when using a computer with a touch screen? Touch mode Screen mode Laptop mode Action Center
Touch mode
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites. True False
True
Spy removal programs are designed to detect and remove various types of privacy threats. True False
True
The Action Center displays notifications such as emails and Windows update notifications. True False
True
The archiving and search features of the web make your online identity available indefinitely. True False
True
A program that replicates itself and clogs computers and networks. Virus Worm Denial-of-service attack Trojan horse
Worm
Which of the following is not a true statement?
You can open pdf files in word but not edit them
Which of the following statements is not true? Compressing files and folders decreases their size. You can't attach a zipped folder to an email message. You can¿t attach an entire folder to an email message. If you receive a zipped folder from someone via email, save the zipped folder and then you can extract its contents.
You can't attach a zipped folder to an email message.
Which of the following displays when you right-click text, a cell, or an object such as a picture, drawing object, chart or SmartArt? context menu keyboard shortcut mini toolbar Quick Access toolbar
context menu