Exam
What files extension is used for Word?
.doc
what is the default format for text?
12 point arial
Connects computers computers through telephone or cable television lines
A modem Card
What is a green wavy underline mean?
A possible grammar error
Kilobyte
A_________is equal to exactly 1,024 bytes,but computer users often round it down to 1,000 bytes to simplify memory and storage definitions
Terabytes
A________equals approximately 1 billion bytes
Megabyte
A_______is equal to approximately 1 million bytes
Ram
An_________is the basic storage unit in memory
Multi-Core
An______processor is a chip with two or more seperate processors.
MAN
Collection of local area networks, usually the size of a city or town
Router
Connects two or more networks not computers.
What is the shortcut for copying ?
Ctrl C
what is the keyboard shortcut ofr cutting text?
Ctrl C
what is the shortcut for pasting text?
Ctrl V
Address
Each byte resides temporarily in a location in memory called an_______.
LAN
Networks or computers that are located near each other.
_____ is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information.
Phishing
Topology
Specifies how a network is laid out/set -up
chassis
The cases of the system unit sometimes called the____________, is made of metal or plastic and protects the internal electronic components from damage.
Binary
The______ System is a number system that has just two unique digits,0 and 1,called bits,
system
The_____board is the main circuit board of the system unit
Where is the name of the document displayed in WOrd?
Title bar
Machine
Together,four operations comprise an_________cycle
byte
When 8 bits are grouped together as a unit,they form an___________.
Hub
When one computer sends and receives data, all the other computers connected can send and receive data
Nonvolatile
________ memory does not lose its content when power is removed from the computer
parallel
_________ port us an interface that connects decives by transferring more than one bit at a time
Ram
_______is the most common type of volatile memory
serial
a ______ port is a type interface that connects a device to the system unit by trasnmitting data one bit at a time
hub
a device that provides a central pioint for cables in a network
logo
a distinctive symbol, shape or color that is recognizable as belonging to a specific organization
publication
a document created in publishes
backdoor
a program or set of instructions ina program that allow uses to bypass security controls when accessing a program, computer or network
worm
a program that copies itself repeatedly in memory or a network
What marker indiactes a misspelled word?
a red wavy underline
modem
a type of comunication device that connects a communication channel to a sending or recieving device
what kind of program is Word 2003
word processing
WAN
connects local area metropolitan networks together.
What task does Word not have the abbility to do?
create slides for presentations
receiving
device that accepts an sintruction to transmit data, instruction and informaiton
sending
device that initiates an sintruction to transmit data, instruction and informaiton
small caps and supercript are examples of what?
font effects
to change the font, which tool would you use?
font list arrow
which tool would you use to change the foramt of text to 20 pts?
font list arrow
bold and italics are examples of what?
font styles
Where would you find teh button for applying bold to a text in Word?
formatting toolbar
Executing
in the machine cycle steps is the process of carrying out commands
Each character asses to a password significantly __________ it might take for someone or a hacker to guess the password
increases the number of combinations and the length of time
Virus
is a potentially damaging computer program that effects,or infect,a computer negatively by altering the way the computer works without the users knowledge or permission
Fetching
is the process of obtaning a program instruction or data item from memory
When users purchase software a single users license agreement like the one does not permit users to do any of the following except
make one copy of the software as backup
trojan horse
malicios-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action
a network sever is a dedicated server that....
manages network traffic activity
a print server is a dedicated server that
manges printers and prints jobs
"cut and paste" describes what operation?
moving text
hacker
now has a derogatory meaning and refers to someone who access a computer or network illegally
Billion
one gigahertz equals one________ ticks of the system clock per seconds
computer crime
online or internet-based illegal acts
examples of biometric devies and systems include all of the following except
personal identification numbers and passwords.
acceptable use policy
prevents unauthorizes access and outlines the computer activites for which a computer pr network may or may not use
Decoding
refers to the process of translating instructions into signals the computer can execute
when uses purchase software, a singles user license agreement permits uses to do all of the following except....
rent or lease the software....
What element of Word contains buttons for performing operating commands?
standard toolbar
a file server is a dedicated server that ......
stores and manages files
Memory stores.......
the operating system and other system software application programs that carry out a specific task the data being processed and the resulting information
text box button
used to create a text box
SMS..
users type and send short text messages in a smart phone or PDA
Switch
when one computer recives data,it will only transfer the data to and form that computer
Terminators
absorb signals
MMS
allows users to send graphics, pictures, video clips, and sound files