Computers Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal. True False

False

It is illegal for employers to use software programs that monitor employees. True False

False

One effective strategy for creating strong passwords includes changing common words to symbols. True False

False

Research indicates that the more text messages students send, the more easily they find formal writing. True False

False

The distinction among categories of computers is always very clear. True False

False

The terms web and Internet can be used interchangeably. True False

False

USB flash drives and memory cards usually hold more than hard disks like the kind shown in the accompanying figure. True False

False

Using document properties is unlikely to save users time locating a particular file because they cannot view a document's properties without opening the document. True False

False

If a company does not have a formal email policy, it can read email messages without employee notification. True False

True

In a networked environment, each computer on the network can access the hardware on the network. True False

True

Which of the following copies all of the files in a computer? a. full backup b. incremental backup c. differential backup d. selective backup

a. full backup

A ____ is a prewritten formula that is built into Excel. a. function b. feature c. task d. calculation

a. function

A ____ is text and graphics that print at the top of each page. a. header b. topper c. margin d. crown

a. header

As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research. True False

True

CAM is used by a variety of industries, including oil drilling, power generating, food production, and automobile manufacturing. True False

True

Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network. True False

True

Most dialog boxes in Windows apps requiring navigation follow a similar procedure. True False

True

Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion. True False

True

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits. True False

True

The most common error when entering a formula is to reference the wrong cell in the formula. True False

True

Websites often collect data about you so that they can customize advertisements and send you personalized email messages. True False

True

Your browsing history is a list of all websites you have visited over a period of time. True False

True

What term is used to illustrate the gap between those with and those without access to technology? a. digital divide b. mobile stratification c. technology caste system d. none of the above

a. digital divide

In Internet terminology, what is the term, google.com, called? a. domain name b. Internet service provider c. webpage protocol d. TLD

a. domain name

When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low? a. embedded computer b. server c. online linked computer d. analog computer

a. embedded computer

A ____ is a series of two or more adjacent cells in a column or row or a rectangular group of cells, as shown in the accompanying figure. a. range b. bunch c. nearby cell d. neighbor

a. range

A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer? a. supercomputer b. game console c. personal computer d. mobile computer

a. supercomputer

A word with a meaning similar to that of another word is called a ____. a. synonym b. thesaurus c. replacer d. duplicate

a. synonym

Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use? a. input device b. Computer c. output device d. both a and c

b. Computer

To find all customers whose names begin with S, enter ____ in the Criteria row of the Customer Name field. a. S? b. S* c. S# d. S&

b. S*

You can enter the correct range in a function by typing the beginning and ending cell references separated by a ____. a. semi-colon (;) b. colon (:) c. period (.) d. none of the above

b. colon (:)

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? a. rebuking b. spoofing c. transmitting d. victimizing

b. spoofing

Press the ENTER key in all of the following circumstances EXCEPT ____. a. to insert a blank line into a document b. when the insertion point reaches the right margin c. to begin a new paragraph d. in response to prompts in Word dialog boxes

b. when the insertion point reaches the right margin

A ____ in Excel is like a notebook. a. onenote b. workbook c. placeholder d. cell reference

b. workbook

The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in the range. a. DIVSUM b. RANGEAVG c. AVERAGE d. MAX

c. AVERAGE

To select nonadjacent items, select the first item as usual, press and hold down the ____ key, and then while holding down the key, select the additional items. a. HOME b. F1 c. CTRL d. ALT

c. CTRL

To paste copied cell contents, you can press the ____ keys. a. CTRL+C b. CTRL+P c. CTRL+V d. CTRL+X

c. CTRL+V

Which of the following happens when you enter the formula =G15 into a cell? a. Excel recalculates all formulas in the worksheet b. Excel assigns the sum of the values in the previous 15 cells to the active cell c. Excel assigns the value in cell G15 to the active cell d. Nothing; =G15 is an invalid formula

c. Excel assigns the value in cell G15 to the active cell

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? a. spam b. spit c. Phishing d. spyware

c. Phishing

Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space? a. IrDA b. POP c. VR d. TCP

c. VR

Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal? a. disperse b. digital c. cloud d. liberated

c. cloud

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure? a. hacker b. script kiddie c. cyberextortionist d. cyber terrorist

c. cyberextortionist

The ____ is the small black square located in the lower-right corner of the heavy border around the active cell. a. selection handle b. sizing handle c. fill handle d. copy handle

c. fill handle

You ____ a worksheet to emphasize certain entries and make the worksheet easier to read and understand. a. save b. print c. format d. clear

c. format

Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution? a. shareware b. custom software c. open source software d. system software

c. open source software

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount? a. network b. distributed c. site d. multipurpose

c. site

According to netiquette, Internet users should assume which of the following? a. all material is accurate b. all material is up-to-date c. the use of all capital letters is the equivalent of shouting d. all of the above

c. the use of all capital letters is the equivalent of shouting

What happens during a DDoS attack? a. An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic. b. Antivirus software disables a virus and protects the computer or network from unauthorized access. c. The police use a virus and other measures to take down a network of computer criminals. d. A zombie army is used to attack computers or computer networks.

d. A zombie army is used to attack computers or computer networks.

To move to the end of the document, press the ____ key(s). a. DOWN ARROW b. END c. CTRL+DOWN ARROW d. CTRL+END

d. CTRL+END

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them? a. data rights b. acceptable use c. social restrictions d. Information privacy

d. Information privacy

What is the purpose of an Internet Protocol address (IP address)? a. It specifies whether a computer is using a broadband network or a direct-dial network. b. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. c. It contains the protocol schema used to identify whether the computer is on a wired or wireless network. d. It uniquely identifies the location of each computer or device connected to the Internet.

d. It uniquely identifies the location of each computer or device connected to the Internet.

____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen. a. Screen view b. Ribbon resolution c. Pixel resolution d. Screen resolution

d. Screen resolution

____ properties are associated with all Microsoft Office files and include author, title, and subject. a. Automatic b. Hidden c. Replacement d. Standard

d. Standard

Essential business letter elements include the ____. a. date line and inside address b. message c. signature block d. all of the above

d. all of the above

In Excel, a number can contain the characters ____. a. 0 1 2 3 4 5 6 7 8 9 b. + - ( ) , / c. . $ % E e d. all of the above

d. all of the above

The ____ preceding a formula alerts Excel that you are entering a formula or function and not text. a. quotation mark (") b. colon (:) c. plus (+) d. equal sign (=)

d. equal sign (=)

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? a. practical b. permissible c. acceptable d. ethical

d. ethical

What is the term for the smallest element in an electronic image? a. icon b. optic c. state d. pixel

d. pixel

A letterhead should contain all of the following EXCEPT ____. a. the complete legal name of the individual or company b. the telephone number c. the mailing address d. the company's objective

d. the company's objective

Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this? a. function b. index c. formula d. value

d. value


Kaugnay na mga set ng pag-aaral

Mental Health Exam 4 Practice Q's

View Set

HSC4713: Planning and Evaluation, HSC 4713 Module 10: Program Resources and Management, HSC 4713 Module 12: Implementation, HSC 4713 - Module 14 Evaluation Approaches and Design, Module 13 - Purposes and Logistics of Evaluation; Evaluation Approaches...

View Set