MicroComputer Applications Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The average speed for 4G devices is often advertised as ______________ three times faster than 3G. a. 10 b. 50 c. 3 d. 100

a. 10

In what year was the first Mac OS released? a. 1984 b. 2000 c. 1980 d. 1992

a. 1984

When was Google+ launched? a. 2011 b. 2006 c. 2010 d. 2012

a. 2011

According to McAfee Threats Reports for early 2012, _________________ computers worldwide were infected by botnets. a. 4 to 5 million b. at least 1 billion c. just over 1 million d. about 500,000

a. 4 to 5 million

The common plug-in used to view PDF documents a. Adobe Reader b. Java c. QuickTime d. Shockwave Players

a. Adobe Reader

Chapter 6 shows how this company maintains a customer service support page on Facebook. a. Amazon b. Verizon c. General Electric d. Dell

a. Amazon

You can use buttons in the ___________ group of the SMARTART TOOLS DESIGN tab to add shapes or change the direction of the layout, and move shapes up or down the layout. a. Create Graphic b. SmartArt Styles c. Reset d. Layouts

a. Create Graphic

To change a presentation's theme after the presentation has been created, begin by clicking the ________ tab. a. DESIGN b. HOME c. REVIEW d. INSERT

a. DESIGN

In a Windows operating system, which utility would you use to delete temporary Internet files and files moved to the Recycle Bin? a. Disk Cleanup b. Repair Disk c. Windows Explorer d. File Explorer

a. Disk Cleanup

______________ a cell to open it for editing in the worksheet area. a. Double-click b. Hover the mouse pointer over c. Right-click d. Click

a. Double-click

You can delete the contents of the active cell by clicking the Clear button in the ___________ group of the __________ tab. a. Editing; HOME b. Data Tools; DATA c. Text; INSERT d. Formula Auditing; FORMULAS

a. Editing; HOME

The file management utility in Windows 8 is called a. File explorer b. Windows Explorer c. Magellan d. Finder

a. File Explorer

In Mac OS X, file management tasks are handled through the ______________ utility a. Finder b. Time Machine c. File Explorer d. Disk Cleanup

a. Finder

The nonprofit organization in charge of keeping track of the Internet addresses and names all over the work is known by the initials: a. ICANN b. DNS c. HTML d. HTTP

a. ICANN

When a computing device is connected to the Internet, it is assigned a unique address called a(n) _____________ address. a. Internet Protocol (IP) b. hypertext transfer protocol (HTTP) c. top level domain (TLD) d. Uniform Resource Locator (URL)

a. Internet Protocol (IP)

The ___________ displays the active cell address or the name assigned to the active cell. a. Name box b. Status bar c. Sheet tab d. Formula bar

a. Name box

__________________ is similar to phishing except that the individual is tricked into typing in personal information at a phony website a. Pharming b. Phooling c. Phaking d. Phrauding

a. Pharming

Which popular plug-in come from Apple? a. QuickTime b. Real Player c. Silverlight d. Shockwave Player

a. QuickTime

Text messages on mobile devices are sent using a service abbreviated as a. SMS b. BBM c. VoIP d. B2C

a. SMS

The decline of these two mobile operating systems is cited in Chapter 4 as an example of how the mobile market can change. a. Symbian and Blackberry b. iOS and Windows Phone c. Android and iOS d Windows Phone and Blackberry

a. Symbian and Blackberry

How are rootkits different from other kinds of malware? a. Their objective is not to spread to other computers b. They do not typically do any real damage c. They do not try to steal information d. They cannot take control of the infected computer

a. Their objective is not to spread to other computers

Three social bookmarking sites are discussed in Chapter 6. Which of the following is not one of them? a. Tumblr b. Pinterest c. Delicious d. StumbleUpon

a. Tumblr

____________ are collection of different syle and color schemes included in a theme family. a. Variants b. Templates c. Effects d. Moods

a. Variants

What is the name of Quicken's legal software application? a. WillMaker b. LegalEagle c. QuickLaw d. LegalDocs

a. WillMaker

Font and paragraph formatting options in PowerPoint are the same as those in a. Word and Excel b. Outlook and Word c. Access and Outlook d. Excel and Access

a. Word and Excel

Which of the following is the International Standards Organization (ISO) date format used by many global businesses? a. YYYY-MM-DD b. DD-MM-YY c. DD-MM-YYYY d. MM-DD-YYYY

a. YYYY-MM-DD

When a column's width has been made too narrow to show all of the characters, ___________ display's instead. a. a series of pound symbols (#####) b. a shaded gray box c. a red flag icon d. a series of amersands (&&&&&)

a. a series of pound symbols (#####)

OneNote allows you to enter hand-written notes on a touch-enabled device via the use of a. a stylus b. any standard writing utensil c. your finger d. a standard pencil

a. a stylus

The mixed addresses referred to in Chapter 9 are called mixed because they have both ____________ a. absolute and relative references b. uppercase and lowercase letters c. addresses and ranges d. built-in and user-defined functions

a. absolute and relative references

In Pinterest, you organize a collection of related pictures into a(n) a. board b. scrapbook c. album d. gallary

a. board

Starting a computer is called a. booting b. burning c. surfing d. ripping

a. booting

In Google+, the people you interact with are organized into categories called a. circles b. pods c. groups d. tribes

a. circles

In this technique, a button, graphic, or link on a web page appears to be real, but when clicked, causes malicious software to run. a. clickjacking b. spoofing c. pharming d. phishing

a. clickjacking

Server rooms are specially designed and maintained to avoid all of the following except a. drafts b. humidity c. heat d. dust

a. drafts

IPv6 uses _______________ groups of characters separated by _________________ a. eight;colons b. ten; semicolons c. six; periods d. four; slashes

a. eight; colons

Macro viruses are viruses that are a. embedded in a document b. attached to a hyperlink c. part of a web page d. not capable of replicating themselves

a. embedded in a document

What type of operating systems will you find on devices such as ATMs and GPS units? a. embedded operating systems b. desktop operating systems c. server operating systems d. mobile operating systems

a. embedded operating systems

Solid state drives (SSDs) use _______________ to store information. a. flash memory b. magnetic tape c. magnetic drives d. optical drives

a. flash memory

In the URL http://www.census.gov. the top level domain is a. gov. b. http. c. census. d. www.

a. gov.

Chapter 6 explains that blogs are basically ______________ posted on a website with the most recent entry at the top of the page. a. journals b. tweets c. essays d. pictures

a. journals

Database management software a. keeps track of large amounts of data b. allows you to create slide shows c. allows you to send emails d. graphs numerical data

a. keeps track of large amounts of data

Each cell in a worksheet is identified with a _____________ for the column and a _________ for the row. a. letter, number b. number, letter c. name, symbol d. symbol, name

a. letter, number

The device used to connect a computer to a network is called a a. network adapter b. CPU c. network protocol d. modem

a. network adapter

The SmartArt List layout would be best used for a. non-sequential tasks or processes b. showing the sequence of steps in a looped process c. showing how parts of an element are related to each other d. organizational charts

a. non-sequential tasks or processes

Resize an image in your slide by clicking and dragging a. one of the corner selection handles b. the rotation handle at the top of the image c. in the center of the image d. anywhere along the image border

a. one of the corner selection handles

In a DoS attack, a network or web server is a. overwhelmed with network traffic b. physically damaged c. powered off d. taken over, and new software is installed on it

a. overwhelmed with network traffic

Microsoft Outlook is an example of this type of productivity software. a. personal information management b. database management c. spreadsheet d. accounting

a. personal information management

A message that appears to be from a bank directs the user to click a link and enter his or her account information, which is then used fradulently. This is known as a. phishing b. cracking c. hacking d. clickjacking

a. phishing

Connecting to someone else's wireless network without their consent is called a. piggybacking b. hacking c. clickjacking d. phishing

a. piggybacking

Suppose someone sneaks into your house and unlocks the back door so other criminals can enter and steal your possessions. This is similar to what a _________________ does. a. rootkit b. Trojan horse c. worm d. virus

a. rootkit

One of the things you can edit in an inserted photo is the purity of the colors, which is a characteristic referred to as _________________. a. saturation b. hue c. opacity d. tone

a. saturation

A ______________ is a computer with hardware and software that allows it to link together other computers in order to provide services and share resources a. server b. desktop PC c. client d. petaflop

a. server

When inserting a new slide, the _____________ you choose determines the number, position, and type of content placeholders. a. slide layout b. theme c. variant d. style

a. slide layout

The AutoFormat feature converts straight apostrophes and quotation marks to ______________. a. smart quotes b. braces c. brackets d. italicized text

a. smart quotes

Most receipts you receive from retail stores are printed with a __________ printer. a. thermal b. laser c. inkjet d. photo

a. thermal

Chapter 6 reports that as of June 2012, individuals are joining LinkedIn at a rate of a. two new members per second b. 20 new members per minute c. 1,000 new members per hour d. 1,000 new members per day

a. two new members per second

Pinterest describes itself as a a. virtual pinboard b. worldwife flea market c. social scrapbook d. community photo alub

a. virtual pinboard

In Chapter 1, Google's Project Glass eyeglasses are discussed as an example of a(n) a. wearable computer b. ultra-mobile PC c. portable media player d. embedded computer

a. wearable computer

Microsoft Word is best described as a ____________ application. a. word processing b. desktop publishing c. presentation d. text editing

a. word processing

Files that you save in Excel are called a. workbooks b. spreadsheets c. worksheets d. databases

a. workbooks

Computer-related tendonitis usually affects the a. wrist b. neck c. back d. shoulder

a. wrist

Can you send private messages on Facebook? if so, how? a. Yes, with the Message tool b. Yes, by posting on the recipient's Facebook page c. No, Facebook does not allow private messages d. Yes, by poking

a. yes, with the Message tool.

Use the Pictures button to insert into your document pictures from ______________. a. your PC b. Flickr c. Instagram d. Office.com

a. your PC

Most personal finance software applications allow you to download activity from ____________ into the program. a. your banking account b. the stores where you shop c. shopping websites d. the IRS

a. your banking account

The generation of web pages that allowed people to collaborate and share information with the website are known collectively as Web a. 1.0 b. 2.0 c. 4.0 d. 3.0

b. 2.0

Which of the following is a free, open source audio recording and edition software application? a. Premier Elements b. Audacity c. Final Cut Pro d. Flash

b. Audacity

As you type, these two Word features help you fix common typing errors and format common characters. a. AutoCorrect and AutoCheck b. AutoCorrect and AutoFormat c. AutoSpell and AutoFix d. AutoErase and AutoReplace

b. AutoCorrect and AutoFormat

On a Windows system, the hard disk drive is usually assigned the drive letter a. A b. C c. B d. Z

b. C

What is the name of Google's entry in the web browser market? a. Safari b. Chrome c. Internet Explorer d. Firefox

b. Chrome

Which of the following is discussed in Chapter 5 as an example of a document management system? a. Project b. Dokmee c. Basecamp d. Lotus Notes

b. Dokmee

____________ involves the design of equipment and workspace to promote safe and comfortable operation by the individual. a. Optimization b. Ergonomics c. Plyometrics d. Biometrics

b. Ergonomics

A network interface card (NIC) is often referred to in computer advertisements as a(n) ____________ port. a. Serial b. Ethernet c. FireWire d. USB

b. Ethernet

This financial function calculates the future value of a series of regular payments that earn a constant interest rate. a. NPV b. FV c. PMT d. PV

b. FV

Which acronym describes a company that provides access to the Internet's infrastructure for a fee? a. ICANN b. ISP c. USB d. DNS

b. ISP

You can add a chart to a slide using the Insert Chart button in the ________ group of the ____________ tab. a. Slides; HOME b. Illustrations; INSERT c. Images; INSERT d. Drawing; HOME

b. Illustrations; INSERT

Ultrabooks were originally named by ______________ to differentiate them from older, bigger notebooks a. Apple b. Intel c. Toshiba d. Samsun

b. Intel

Scrobbler is the app from this music sharing website a. Spotify b. Last.fm c. Pandora d. Napster

b. Last.fm

Which of the following operating systems is open source? a. Mac OS X b. Linux c. Windows 8 d. UNIX

b. Linux

Apple devices contain three personal information management applications. Which of the following is not one of them? a. Contacts b. Notes c. Mail d. iCal

b. Notes

What is the name of Microsoft's note-taking software? a. EverNote b. OneNote c. Lotus Notes d. NoteBook

b. OneNote

Once a picture has been inserted in a presentation, it can be resized using tool on the _______ tab. a. DESIGN b. PICTURE TOOLS FORMAT c. SLIDE SHOW d. INSERT

b. PICTURE TOOLS FORMAT

A supercomputer named ___________ at the Lawrence LIvermore National Laboratory was named the top supercomputer in the Top 500 list of most powerful computers. a. HAL 9000 b. Sequoia c. Watson d. Intrepid

b. Sequoia

In Normal view, this pane displays at the left side of the screen. a. Comments pane b. Slide Thumbnail pane c. Notes pane d. Slide Master pane

b. Slide Thumbnail pane

_____________ is a PowerPoint feature that uses graphics to visually communicate relationships in lists, processes, cycles, and hierarchies. a. Word Art b. SmartArt c. Business Art d. Clip ARt

b. SmartArt

In Mac OS X, the utility used to back up and restore files is called a. File Explorer b. Time Machine c. Disk Repair d. Finder

b. Time Machine

__________________ was designed as a server operating system. a. Mac OS X b. UNIX c. Linux d. Windows 8

b. UNIX

Which of the following is the latest security standard for wireless routers? a. AUP b. WPA2 c. EULA d. WEP

b. WPA2

Which of the following operating systems is the most popular? a. Linux b. Windows c. Unix d. Mac OS

b. Windows

When you select a layout in the center pane of the Choose a SmartARt Graphic dialog box, what displays in the right pane? a. a text box displaying the layout category to which it belongs b. a description of the layout and suggestions for its use c. a thumbnail of the current slide with the layout inserted into it d. a preview of the layout with your slide text inserted

b. a description of the layout and suggestions for its use

Apple uses _____________ to designate versions of its Mac OS X family of operating systems. a. plant names b. animal names c. musical terms d. years

b. animal names

A search phrase enclosed in quotations will return pages where the keywords a. or words that are similar appear in the web page b. are in the same sequence c. do not appear in the web page d. appear in any order in the web page.

b. are in the same sequence

A header is text that appears ___________________. a directly under the document's title b. at the top of each page c. above a picture or figure d. next to the page number

b. at the top of each page

A collection of zombie computers used to conduct an attack on another network is called a a. malnet b. botnet c. zombisphere d. horde

b. botnet

A software program used to view web pages is referred to as a web a. reader b. browser c. surfer d. interpreter

b. browser

How do smart power strips reduce energy consumption? a. by slightly reducing the amount of power delivered to each device plugged into it b. by controlling the flow of power to peripheral devices when the main device is not active c. by automatically shutting down devices that remain inactive for a specified period of time d. by automatically shutting down power to devices at a specified time

b. by controlling the flow of power to peripheral devices when the main device is not active

In a table, the box that is the intersection of a row and a column is called a table ____________. a. matrix b. cell c. coordinate d. marker

b. cell

Which of the following is not considered a mobile computer? a. ultrabook b. desktop computer c. laptop computer d. netbook

b. desktop computer

All the physical components and devices comprising a computer are referred to as a. software b. hardware c. the CPU d. peripherals

b. hardware

The Show/Hide button turns on or off the display of ____________. a. file extensions b. hidden formatting symbols c. hyperlinks d. hidden folders

b. hidden formatting symbols

You can select cells using the keyboard by a. pressing F2 and then pressing the Tab Key b. holding down the Shift key while you press an arrow key c. holding down the Alt key while you press Page Up or Page Down d. pressing F2 and then pressing an arrow key

b. holding down the Shift key while you press an arrow key

What is the name of Apple's cloud based operating system? a. Chrome OS b. iCloud c. Symbian d. iOS

b. iCloud

What is the name of Apple's mobile operating system? a. OS X Mountain Lion b. iOS c. Symbian OS d OS X Leopard

b. iOS

Spiders and crawlers are used by search engines to generate a. website content b. index entries c. users' web usage history d. advertising metrics

b. index entries

Chapter 7 lists three common ways a computer can become infected with software that turns it into a zombie. Which of the following is not one of them? a. downloading an infected image, video, or program b. installing an infected piece of hardware c. clicking a link or attachment in an email d. visiting an infected website

b. installing an infected piece of malware

What is the name for the process in which a CPU retrieves, decodes, executes, and stores and instruction? a. basic input output system b. instruction cycle c. information processing cycle d. fragmentation

b. instruction cycle

Pressing Shift + Enter inserts a ______________, which moves the insertion point to the next line without creating a new paragraph. a. hard return b. line break c. page break d. section break

b. line break

On Windows computers, hard disk drives are assigned a drive letter; on a Mac computer they are assigned a a. color b. name c. number d. symbol

b. name

A(n) _______________ is two or more computers or other devices that are linked together to share resources and communicate with each other. a. web server b. network c. ISP d. Intranet

b. network

Laptop computers are also referred to as a. netbooks b. notebooks c. ultrabooks d. tablets

b. notebooks

Dates typed into a cell are stores as ___________ values a. currency b. numerical c. binary d. text

b. numerical

Flickr is a popular ___________ sharing website. a. music b. photo c. video d. ebook

b. photo

Productivity software suites usually include all of the following applications except a. word processing b. photo editing c. spreadsheets d. database management

b. photo editing

Resolution refers to the number of picture elements, or ___________, that make up the image. a. packets b. pixels c. kernels d. raster

b. pixels

If you create a range with the name PricePerPound, which of the following would be recognized by Excel as the same name? a. price.per.pound b. pricerperpound c. price$per$pound d. ppp

b. priceperpound

Characters that are typed or otherwise entered into a computer called a. outputs b. raw data c. information d. storabge

b. raw data

A personal computer (PC) is a computer in which the input, processing, and storage are a. cloud-based b. self-contained c. manufactured by IBM d. distinct devices.

b. self-contained

When positioning an image in your slide, you can precisely align the image relative to adjacent text placeholders and margins with PowerPoint's horizontal and vertical a. snap-to handles b. smart guides c. grids d. rulers

b. smart guides

Programs like Dragon NaturallySpeaking convert __________ into ____________. a. video; text b. speech; text c. text; audio d. video; audio

b. speech; text

Phishing and pharming scams use _____________ techniques where a sender's email or IP address is altered to appear to be a trusted source. a. clickjacking b. spoofing c. hacking d. worming

b. spoofing

This type of software tracks your online activity without your knowledge a. keyware b. spyware c. adware d. bloatware

b. spyware

To uninstall a program from your Windows system, you would begin by clicking Programs in a. the Start Button b. the Control Pane c. the Desktop d. the System Tray

b. the Control Panel

The COUNT function returns the ____________ from the specified range. a. number of rows and columns b. numbers of cells that have values c. number of cells that have non-zero values d. sum of the cell values

b. the number of cells that have values

According to Experian Hitwise's 2012 report, where does Pinterest rank in the United States in terms of the number of site visits? a. first b. third c. fifth d. tenth

b. third

Chapter 7 lists several reasons why a DoS attack may be launched, including all of the following except a. to gain notoriety b. to steal personal information c. to embarrass a company or government agency d. to draw attention to a political or social cause

b. to steal personal information

This type of malware is a self-replicating program that requires no action on the part of the user to copy itself to another computer. a. root kit b. worm c. Trojan horse d. virus

b. worm

What is the storage capacity of a single-layer Blu-ray disc? a. 8.5 GB b. 4.7 GB c. 25 GB d. 700 MB

c. 25 GB

Google+ has four default circles. Which of the following is not one of them? a. Following b. Acquaintances c. Celebrities d. Family

c. Celebrities

In its discussion of ___________, Chapter 6 describes an import utility that will import bookmarks you have saved in your browser. a. Pinterest b. StumbleUpon c. Delicious d. LinkedIn

c. Delicious

Google _____________ is the SaaS formerly known as Google Docs. a. Maps b. Play c. Drive d. Chrome

c. Drive

The Android mobile OS is based on a. iOS b. Symbian c. Linux d. Windows

c. Linux

The open source OpenOffice productivity suite has been modified and repackaged under the name a. Google Drive b. Zoho c. Lotus Symphony d. LibreOffice

c. Lotus Symphony

Chapter 6 discusses three social networking sites, including all of the following except a. Facebook b. LinkedIn c. MySpace d. Google+

c. MySpace

This feature automatically searches for and loads the appropriate driver when a new device is attached to the computer. a. Bootstrap b. Click and Drag c. Plug and Play d. Warm Boot

c. Plug and Play

Which of the following is a popular program used for managing personal finances? a. QuickBooks b. OneNotes c. Quicken d. Numbers

c. Quicken

What is the Mac OS X equivalent of the Windows Disk Cleanup utility? a. Disk Utility b. Time Machine c. Repair Disk d. Finder

c. Repair Disk

When you are using software that is not installed on your computing device, you are using a(n) _________ application. a. open source b. ERP c. SaaS d. proprietary

c. SaaS

The first time you save a document, clicking the Save button on the Quick Access Toolbar will cause the ____________ to appear. a. Create a Backup dialog box b. Save dialog box c. Save as Backstage view d. New Backstage view

c. Save As Backstage view

The ___________ feature is common to both PowerPoint and Word and allows you to organize text in columns and rows. a. Graph b. Live Preview c. Table d. Spreadsheet

c. Table

In Chapter 6, these two sites are categorized as microblogging services a. Blogger and Wordpress b. LiveJournal and Twitter c. Twitter and Tumblr d. Xanga and Squarespace

c. Twitter and Tumblr

___________ computing refers to the fact that computing technology is everywhere and is used all the time. a. Embedded b. Mobile c. Ubiquitous d. Wearable

c. Ubiquitous

Chapter 5 discusses three web-based productivity application suites. Which of the following is not one of them? a. Google Drive b. Microsoft Web Apps c. Ubuntu d. Zoho

c. Ubuntu

What is the latest version of Microsoft's operating system? a. Windows ME b. Windows 2013 c. Windows 8 d. Windows 7

c. Windows 8

Microsoft's earlier mobile OS, Windows Mobile, was replaced by a. Windows 8 b. Windows 7 c. Windows Phone d. Windows XP

c. Windows Phone

Updating your family budget or writing a report for school are tasks you would accomplish with the ________ on your computer. a. utilities b. plug-in programs c. application software d. operating system

c. application software

The inputs you supply for a function are referred to as parameters or _________________ a. products b. citations c. arguments d. references

c. arguments

The illegal activities involving computers discussed in Chapter 7 are collectively known as a. cloudcrime b. cracking c. cybercrime d. cyberjacking

c. cybercrime

These are the small programs the OS uses to communicate with devices connected to the computer. a. shells b. apps c. drivers d. kernals

c. drivers

Buying or selling over the Internet is known by this term a. i-business b. click-business c. e-commerce d. cloud-commerce

c. e-commerce

From the Word Start screen, you can do any of the following except ______________________. a. open an existing document b. create a new blank document c. email a document to another user d. search for and select a document template

c. email a document to another user

Digital cameras, game consoles, and electronic thermostats are examples of devices that include a. analog inputs b. hard drives c. embedded computers d. an operating system

c. embedded computers

ERP software is used for a. enrollment and retention projections b. evaluating redesign progress c. enterprise resource planning d. election result predictions

c. enterprise resource planning

In a database table, columns are called _____________ and rows are called ________________. a. matrices; cells b. records; ranges c. fields; records d. cells; ranges

c. fields; records

A _______________ is hardware, software, or a combination of hardware and software that blocks unwanted access to your network. a. stonewall b. non-computer barrier c. firewall d. biometric device

c. firewall

All of the popular social networking sites discussed in Chapter 6 have __________ for use on your smartphone. a. special browsers b. inexpensive mobile apps c. free mobile apps d. ring tones

c. free mobile apps

A CPU's clock speed is usually measured in a. gigabytes (GB) b. bits per second (bps) c. gigahertz (GHz) d. gauss

c. gigahertz (GHz)

Chapter 4 mentions that Mac computers have been popular with _______________ because of their hardware design. a. accountants b. cartographers c. graphic artists d. writers

c. graphic artists

In a worksheet, the active cell displays with a ______________ border around it. a. dashed yellow b. thick black c. green d. scrolling marquee

c. green

The alignment guides that help you position an inserted picture display as ______________ horizontal and vertical lines. a. yellow b. red c. green d. blue

c. green

Chapter 7 lists three things you can do to prevent your computer from becoming a zombie, including 1)using antivirus software, 2)updating the OS regularly, and 3) a. never leaving your computer power on overnight b. using only one broser c. having an active firewall d. disconnecting from the Internet when the computer is not in use

c. having an active firewall

The goal of Google's Android@Home project is to control ______________ via an Android device. a. home energy use b. web browsing c. household objects like a dishwasher or a heating system d. home budget information

c. household objects like a dishwasher or a heating system

Any device used to enter raw data or communicate instruction to the computer is referred to as a(n) _________ device. a. output b. storage c. input d. processing

c. input

How does LinkedIn differ from Facebook and Google+? a. You do not post a profile with your account. b. It does not allow connections to individuals c. It is more business-related d. It provides a much better engine for searching for connections.

c. it is more business-related

In a pie chart, each pie slice is sized to show a. a trend over time b. equal portions of the total c. its proportion to the total d. its value on the y-axis

c. its proportion to the total

Chapter 6 categorizes websites such as YouTube, Flickr, and Last.fm as _______ sites a. social bookmarking b. blogging c. media sharing d. microblogging

c. media sharing

Midrange servers used to be known as a. desktop PCs b. mainframes c. minicomputers d. supercomputers

c. minicomputers

Handheld computing devices smaller than notebooks are referred to by the general term a. ultrabooks b. smartphones c. mobile devices d. personal digital assistants

c. mobile devices

The main circuit board in a computer is called the a. BIOS b. CPU c. motherboard d. power supply

c. motherboard

Chrome OS is designed for people who spend most of their computing time a. playing games b. reading email c. on the Web d. developing applications

c. on the Web

Which type of productivity software makes heavy use of Gantt charts to display data? a. database management software b. accounting software c. project management software d. document management systems

c. project management software

A rectangular-shaped group of cells is referred to as a ______________ a. matrix b. table c. range d. block

c. range

A ______________ is a device that uses optical technology to analyze text and/or images and convert them into data that can be used by the computer. a. printer b. plotter c. scanner d. monitor

c. scanner

When you add color behind text, it is call ____________. a. bolding b. bordering c. shading d. watermarking

c. shading

What does SaaS stand for? a. system architecture and standards b. synchronous application and architecture services c. software as a service d. software and application services

c. software as a service

Apple's iPad is an example of a(n) a. notebook b. netbook c. tablet PC d. ultrabook

c. tablet PC

The Convert to SmartArt button converts existing _______________ to a SmartArt graphic. a. Excel workbooks b. PowerPoint slides c. text d. pictures

c. text

A cookie is a small ____________ placed on your computer by a web server. a. executable file b. virus c. text file d. image file

c. text file

Moore's Law predicts a trend involving a. the clock speed of a processor b. the price of hard disk drives c. the number of transistors that could be placed on a circuit d. the minimum amount of RAM needed to run applications

c. the number of transistors that could be placed on a circuit

A _________ is a video camera built into a computer or plugged in as a peripheral. a. camcorder b. skimmer c. webcam d. skype

c. webcam

A ___________________ is a collection of related web pages for one organization or individual. a. domain b. web server c. website d. browser

c. website

QR codes are usually used to direct the reading device to a a. settings menu b. document c. website d. database

c. website

The price you pay your ISP for Internet access likely depends on a. the number of devices that will be connecting to the Internet b. the type of computer you use c. your connection speed d. your distance from the nearest server

c. your connection speed

One kilobyte equals _____________ bytes. a. 1,000,000 b. 2,048 c. 1,024 d. 1,000

d. 1,000

USB 3.0 is approximately _____________ times faster than USB 2.0. a. 50 b. 2 c. 100 d. 10

d. 10

Chapter 5 mentions that in the area of entertainment software, World of Warcraft (WoW) has more than ___________ subscribers? a. 150,000,000 b. 7,000,000 c. 10,000,000 d. 1000,000,000

d. 100,000,000

Firefox was originally released in a. 2010 b. 1996 c. 2000 d. 2004

d. 2004

As of June 2012, Facebook reported that it has ____________ active users. a. nearly 10 million b. over 6 billion c. 500,000 d. 955 million

d. 955 million

This mobile operating system has the biggest market share for mobile devices. a. Blackberry OS b. Windows Phone c. iOS d. Android

d. Android

The ____________ feature automatically scales the font size and adjusts spacing between points to fit text within a placeholder. a. Fit to Print b. Live Preview c. AutoCorrect d. AutoFit

d. AutoFit

The company Research in Motion (RIM) developed which of the following mobile operating systems? a. Symbian b. Windows Phone c. Android d. Blackberry OS

d. Blackberry OS

How do you display the Numbering Library? a. Click the Numbering button b. Double-click the Numbering button c. Right-click the Numbering button d. Click the Numbering button arrow

d. Click the Numbering button arrow

What does EULA stand for? a. End User Liability Acceptance b. European Union License Agreement c. Extensible Universal Language for Applications d. End User License Agreement

d. End User License Agreement

In which tab will you find the New Slide button? a. DESIGN b. VIEW c. SLIDE SHOW d. HOME

d. HOME

The markup language used to create web pages is known by these initials a. FTP b. ISP c. HTTP d. HTML

d. HTML

In Google+, you can conduct video chats with this feature. a. Timeline b. ChitChat c. Facetime d. Hangout

d. Hangout

To add the copyright symbol to your document, begin by clicking the Symbol button on the __________ tab. a. DESIGN b. REFERENCES c. HOME d. INSERT

d. INSERT

Two popular desktop publishing software programs are Adobe's ____________ and Microsoft's ____________. a. Acrobat; QuickBooks b. Flash; Pages c. Photoshop; Presentation d. InDesign; Publisher

d. InDesign; Publisher

This alternative to LCD displays is more expensive but consumes less energy. a. VDP b. CRT c. Plasma d. LED

d. LED

Chapter 7 mentions that this type of computer was once considered safe from viruses but is now the focus of new malware. a. PCs b. Linux machines c. UNIX machines d. Macs

d. Macs

Buttons in the __________ tab are used to edit an image inserted into a document. a. PAGE LAYOUT b. INSERT c. DESIGN d. PICTURE TOOLS FORMAT

d. PICTURE TOOLS FORMAT

You can add a border to an inserted picture with options in the __________ group of the PICTURE TOOLS LAYOUT tab. a. Arrange b. Adjust c. Size d. Picture Styles

d. Picture Styles

What type of malware disguises itself as a useful program? a. virus b. worm c. root kit d. Trojan horse

d. Trojan horse

What is the mathematical operator for exponentiation? a. * b. = c. - d. ^

d. ^

What displays when you click the WordArt button? a. the choose a SmartArt Graphic dialog box b. the Insert Picture dialog box c. the DRAWING TOOLS FORMAT tab d. a drop-down list of WordArt styles

d. a drop-down list of WordArt styles

QuickBooks is a popular __________________ application used by many small businesses. a. project management b. personal information management c. document management d. accounting software

d. accounting software

Social bookmarking is similar to using the Favorites list in your browser except that the links a. are stored on your local device b. automatically update when new content is added to the website c. are not stored permanently d. are stored online on your social network

d. are stored online on your social network

The smallest unit of digital data in the binary system is called a a. dongle b. byte c. pixel d. bit

d. bit

A group of eight __________ is called a _____________. a. bytes; bit b. bytes; megabyte c. bits; megabit d. bits; byte

d. bits; byte

A category of social networking that provides tools with which you can organize, store, and share content with others is known as social a. blogging b. climbing c. browsing d. bookmarking

d. bookmarking

High-speed Internet access is referred to as a. dial-up b. hotspot c. 3G d. broadband

d. broadband

In Chapter 1, Dropbox and Flickr are cited as examples of a. input devices b. ubiquitous computing c. embedded computing d. cloud storage

d. cloud storage

A cable modem connects to your cable network using a ____________ cable, and from the cable modem to your computer or wireless router using a _______________ cable. a. FireWire; USB b. HDMI; coaxial c. twisted pair; USB d. coaxial; twisted pair

d. coaxial; twisted pair

The combination of hardware architecture and software design that allows applications to run on your computer is referred to as the a. Windows environment b. basic input-output system (BIOS) c. operating system d. computing platform

d. computing platform

Technological ______________ is the term used to describe the merging of several technologies into a single device. a. innovation b. obsolescence c. integration d. convergence

d. convergence

In terms of the topics discussed in Chapter 7, DoS stands for a. disk operating system b. disruption of system c. destruction of software d. denial of service

d. denial of service

A USB wireless adapter is sometimes referred to as a a. cookie b. stylus c. pixel d. dongle

d. dongle

Software programs for creating, editing, and manipulating drawings, photos, clip art, and scanned images are called ______________ software. a. web authoring b. multimedia c. desktop publishing d. graphics

d. graphics

The PMT function cannot be sued to estimate loan payments where the ______________ a. number of payments is greater than 60 b. loan amount is greater than $1,000,000 c. interest rate is greater than 15% d. interest rate is variable

d. interest rate is variable

In Chapter 3, what reason is given for why OLED may replaced LED in the screens of mobile devices? a. it cost much less b. it is more popular c. it produces more life-like color d. it consumes far less power

d. it consumes far less power

Debit and credit cards are read by a. bar code readers b. biometric scanners c. RFID readers d. magnetic strip readers

d. magnetic strip readers

In the example given in the discussion of ubiquitous computing, a restaurant in California is using a sophisticated computer system to a. reduce the amount of wasted ingredients. b. allow patrons to place their orders electronically c. control cooking times d. manage sound levels

d. manage sound levels

Broadband connectivity speed is usually expressed as a. a baud rate b. kilobits per second (Kbps) c. bytes per hour (bph) d. megabits per second (Mbps)

d. megabits per second (Mbps)

What does Word do automatically when you use the Insert Caption feature? a. builds a table of figures b. centers the caption under the picture c. builds a table of contents d. numbers the pictures

d. numbers the picture

Chapter 5 explains that for professional publications, desktop publishing software is preferred over word processing software because of its advances ______________ capabilities. a. font color b. text sizing c. page numbering d. page layout

d. page layout

In terms of video display, what does RGB stand for? a. resolution, granularity, and bioluminescence b. red, green, and black c. realistically generated backgrounds d. red, green, and blue

d. red, green, and blue

In a(n) ______________ formula containing two addresses, both addresses will update if the formula is copied to a new location. a. mixed b. relatively absolute c. absolute d. relative

d. relative

In contrast to Facebook, Google+ lets you more easily a. post pictures b. access your profile on a mobile device c. find friends to connect with d. share information with a targeted group of people in your network

d. share information with a targeted group of people in your network

In social bookmarking, bookmarks are created by ___________ a website. a. poking b. visiting c. permalinking d. tagging

d. tagging

Several features new to Word 2013 are mentioned in Chapter 7. Which of the following is not one of them? a. the ability to choose photos directly from an online service b. live layout and alignment guides (smart guides) c. the ability to add and play videos within a Word document d. the ability to add clip art from Office.com

d. the ability to add clip art from Office.com

At the Caption dialog box, what do you enter in the Caption text box? a. the name of the picture to which the caption belongs b. the position of the caption relative to the picture c. the type of caption you want d. the text that will appear as the caption

d. the text that will appear as the caption

The first slide in a presentation is a a. a cover page b. banner slide c. slide master d. title slide

d. title slide

The first slide in a presentation is a a. cover page b. banner page c. slider master d. title slide

d. title slide

How many possible values are there for the smallest unit of data in a binary system? a. ten b. twelve c. nine d. two

d. two

A _______ is a form of malware that once installed on a host computer, can replicate itself and spread to other computers a. worm b. Trojan horse c. root kit d. virus

d. virus

The web pages and resources needed for a website are stored on computers known as a. mainframes b. file servers c. DNS servers d. web servers

d. web servers

_______________ is a wiki described in Chapter 6; it contains over 140,000 how-to articles. a. wiki-a-group b. DoItWiki c. wikiDYI d. wikiHOW

d. wikiHow

Table 7.1 lists several signs that your computer may be a zombie, including all of the following except a. a different default website appears when you open your browser b. hard disk activity occurs when you are not running any programs c. your Internet connection slows down consistently and dramatically d. your login password no longer works

d. your login password no longer works

An internet-connected computer that is controlled by a hacker or other cybercriminal without the owner's knowledge is called a ______________ computer. a. viral b. black hat c. Trojan horse d. zombie

d. zombie


Kaugnay na mga set ng pag-aaral

NW internship Life Insurance CH 3- scenarios

View Set

Chapter 6 - Planning, Strategy, and Competitive Advantage

View Set

Business Analytics Test 1 - Chp 14

View Set