Computer Concepts Quiz Questions
_____ refers to features that make a computer easier to use for people who might have trouble viewing the screen or using a mouse. Accessibility Cloud computing Local-only user account Power plan
Accessibility
_____ control how text and other objects appear onto and exit from the slide. Animations Answers: AutoDisplay Transitions WordArt Animations
Animations
If the number 4311.50 is rounded to the nearest 100 dollars, it would display as _____. $4,400.00 $4,000.00 $4,310.00 $4,300.00
$4,300.00
Which character should NOT BE USED in an Office filename? - _ = *
*
Which of the following is a good example of a system file? .dll .exe .mp4 .docx .rtf .zip
.dll
Word document templates have a(n) _____ file extension. .rtf .docxt .dotx .wtemp
.dotx
Which of the following is a good example of a media file? .dll .exe .mp4 .docx .rtf .zip
.mp4
Which of the following is a good example of a compression utility file? .dll .exe .mp4 .docx .rtf Correct .zip
.zip
A computer user has 4.5 gigabytes of data they want to store. Which of the following will be the best option--accomodating the files with the fewest pieces of media? 3 CD-R discs 2 CD-R discs 1 CD-R disc 2 DVD-R discs 1 DVD-R disc
1 DVD-R
Which quantity best matches a kilobit? 1,000,000 bits 1,000,000 bytes 1,000 bits 1,000,000 bytes
1,000 bits
If the six cells in the range B3:B8 have the content 5, 6, 3, empty, 8, and 10, the MIN function would display ______. 3 5 an error message 0
3
A computer user has 10 gigabytes of photos and audio they want to backup. Which of the following will be the best option--accomodating the files with the fewest pieces of media? 3 CD-R discs 2 DVD-R discs 1 CD-R disc 3 DVD-R discs 1 DVD-R disc
3 DVD-R
If the six cells in the range B3:B8 have the content 5, 6, 3, empty, 8, and 10, the COUNT function would display _____. 0 an error message 5 6
5
Which HTML tag is used to create a hyperlink in a web page? <link> <src> <web> <a>
<a>
Which of the following is used to create a headline in a web page? <h1> <title> <headline> <head>
<h1>
A formula with an absolute reference to cell B3 would be _____. =$B$3 =B3 =$B3$ =!B3
=$B$3
Which Excel function is used to the middle value within a specified range of cells? =ROUND =CENTRAL =AVERAGE =MID =MEDIAN
=MEDIAN
A family member asks you how a Blu-ray disc can hold so much more data than a standard DVD. Which of the following is the best non-technical response? A Blu-ray burner uses a smaller laser beam than a standard DVD; so more data can be stored on the surface of the disc. A Blu-ray burner uses a larger laser beam than a standard DVD; so more of the surface of the disc can be used for data storage. A Blu-ray disc allows the use of multiple layers and multiple sides; so the storage capacity is almost quadrupled. A Blu-ray disc work in conjunction with a separate magnetic hard disk; so the storage capacity is almost quadrupled. A Blu-ray disc really doesn't hold any more than a standard DVD, but the data stored is limited to video, which doesn't take up as much space as programs and computer files.
A Blu-ray burner uses a smaller laser beam than a standard DVD; so more data can be stored on the surface of the disc.
A(n) _____ is a list of sources used in a paper, which are listed at the end of a document. table of contents index parenthetical citation Bibliography
Bibliography
Fingerprint scanners and retina scanners are best described as _____ devices. pixelazation biometric LCD Digital Light Processing
Biometric
_____ are paragraph formats. Only indents Both tabs and indents Only columns Both indents and columns
Both tabs and indents
Which type of storage device relies on pits and lands for storing bits of data? SCSI drive USB external drive magnetic hard drive CD-R DVD-RW
CD-R
The _____ is a single computer chip that contains all the electronic circuitry for performing a personal computer's processing tasks. CPU RAM OSU PCU
CPU
Gigahertz is a common unit of measurement describing a computer's _____. hard drive speed CPU clock speed Internet access speed ability to multitask
CPU Clock Speed
What language is used to control the colors and fonts of a web page? CSS XML Python C++ HTTPS
CSS
The keyboard shortcut to insert a page break is _____. SHIFT + ENTER INSERT + ENTER CTRL + ENTER CTRL + PAUSE/BREAK
CTRL + ENTER
_____ will move the insertion point to the very end of the document. CTRL + PAGE DOWN CTRL + E CTRL + DOWN ARROW CTRL + END
CTRL+END
Windows passwords, like most password systems are ______, meaning ALincoln12 is different than alincoln12. capitalization insensitive case sensitive hybrid sensitive alt insensitive
Case Sensitive
The _____ is a temporary storage space in your computer's memory, used when you copy or cut something. Notepad virtual memory cache Correct Clipboard
Clipboard
_____ is developed and sold for profit through retail stores and Web sites. Commercial software Public domain software Shareware Setup software
Commercial Software
While working on a presentation, pressing _____ on the keyboard will create a new slide with the same layout as the current slide. Control + M Control + S Control + N Control + L
Control + M
_____ include information to authenticate your identity when you log on to a Web site or an Internet service. Usernames Credentials VoIP Protocols
Credentials
A(n) ____ translates the Web address to an IP address and directs your Internet connection to the Web site. TCP/IP WiMax IP DNS
DNS
A(n) _____ file is one you create when working with an application. data application system executable
Data
_____ is a collection of raw, unprocessed facts, including text, numbers, images, and video. Data Software Peripherals Information
Data
A(n) _____ is an economic gap between those who are computer literate and enjoy access to computer technology and those who do not. exponential break tech trough digital divide information dead zone
Digital Divide
_____ is a security method that encodes data so that only authorized people can access it. Masking Partitioning Encryption Fragmentation Biometrics
Encryption
Based on the image, if the user presses _____, a new bullet item will be created. Shift + Tab Enter Tab Control + Enter
Enter
A defragmenter removes malware from your hard disk. True False
False
Flash memory is the most common type of volatile memory, which loses it contents when you turn off the power to the computer. True False
False
The best way to uninstall a Windows desktop application is to delete its program folder and then empty the recycle bin. True False
False
The purpose of application software is to operate and control computer hardware by running utility programs. True False
False
A computer user has 2.5 gigabytes of data they want to store. How many blank CD-R discs will they need? one disc two discs three discs four discs five discs
Four Discs
Tablets and smartphones rely on a _____, that shows icons to represent programs and utilities. UNIX HDMI GUI Windows RT
GUI
Which of the following is NOT a popular operating system? Google Chrome Mac OS X Android Windows 10
Google Chrome
_____ is the main language used to create web pages. HTML CSS JavaScript Python
HTML
Fragmentation over non-contiguous sectors is a condition that effects your computer's ______. hard drive CPU memory CD or DVD storage LCD display
Hard Drive
Which of the following power states will have the OS save data to the hard drive, minimizing risk of data loss? [choose all that apply] comatose sleep hybrid sleep hibernation
Hybrid Sleep Hibernation
156.33.195.33 is best described as a(n) _____. TCP address IP address MAC address Packet Address
IP address
Each device connected to the Internet has a(n) _____ and is how one machine can find another through the massive network. FTP address TCP address IP address HTTP address
IP address
My Internet access is provided by Bend Broadband. Bend Broadband can best be described as a(n) _____. IR ICANN WAN ARPA ISP
ISP
A user can add shapes and smart art to a PowerPoint slide from the _____ ribbon. Insert Design Objects Add-ins
Insert
_____ images use a lossy compression, meaning they can have small file sizes but they will degrade with repeated saving. PSD BMP GIF PNG JPG
JPG
What type of computer component is often described as qwerty? LCD or plasma monitor optical mouse keyboard solid state drive magnetic drive
Keyboard
A company would most likely use a(n) _____, which is a collection articles, to provide help to customers about using their computer equipment. discussion board online forum knowledge base thread count distribution list
Knowledge Base
A computer user relying on OS X is most likely using a(n) _____. iPhone Mac Linux computer PC-compatible tablet current e-book reader like the Nook or Kindle Fire
Mac
_____ refers to any software that is designed to cause damage to a computer, server, or network. Trojan horse Malware FTP client Keylogger
Malware
A computers RAM is also correctly referred to as its _____. speed storage bandwidth memory
Memory
iOS and Android are best classified as _____ operating systems. mobile personal multi-user network
Mobile
Which of the following is NOT a modern-day web browser? Edge Mosaic Chrome Safari
Mosaic
____ is a fraudulent attempt to steal personal information to commit identity theft. Socketing Skimming Phishing Spoofing
Phishing
The combination of the operating system and the hardware is a(n) _____. platform system unit CPU model peripheral device
Platform
_____ are optional software apps that add functionality to a web browser. NetBeans Packets Cookies Plug-ins
Plug-ins
Terms like multi-core, dual-core, and quad-core are often used to describe a computer's _____. monitor/display hard drive memory processor video card
Processor
The _____ is the main set of commands you click to execute tasks. It is organized into tabs and groups. quick access toolbar command bar ribbon menu bar
Ribbon
Web-based tools like Google Documents, Office 365, and Yahoo Mail are examples of _____. ISP FTP SaaS SMS
SaaS
Terms such as cell, formula, and function are most commonly associated with _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications
Spreadsheet Applications
_____ is(are) different than a normal computer virus and is designed to track your Internet habits and nag you with unwanted sales offers. Spyware Logware Decepticons Cookies
Spyware
Applications have specific _____, which are hardware characteristics such as the amount of memory. version numbers device drivers multitasking requirements system requirements
System Requirements
The _____ is displayed in the notification area of the taskbar and usually reflects the time zone of your current location. system time Windows time Administrator time notification time
System Time
Based on the image, if the user presses _____, the current bullet item will become a smaller, sub-bullet. Shift + Tab Shift + Enter Control + Enter Tab
Tab
The name of the L-shaped button the left side of a word document.
Tab Stop
Person A send a document to Person B for editing. Person B uses _____ so that Person A can review the edits and decided to accept or reject them. Track Changes Section Breaks Duplexing Document Encryption
Track Changes
_____ for a video is similar to crop for an image. Frame rate Annotate Buffer Trim
Trim
What quick trick will select a paragraph? Double-click anywhere in the paragraph. Triple-click anywhere in the paragraph. Ctrl + click anywhere in the paragraph. Alt + click anywhere in the paragraph.
Triple Click
If you are searching files on a hard drive, Windows searches the file contents as well as the filename. True False
True
A(n) _____ is a network service that enables remote users to access their work network securely. VPN ISP IPS IPv6
VPN
Which of the following use radio signals to transmit data? RFID WiFi Fiber Optic Ethernet
WiFi RFID
Linux is an alternative to _____. Chrome Windows Photoshop iPhone 6s
Windows
_____ is an example of system software. Spotify Firefox Microsoft Office Windows
Windows
Regarding columns, which of the following statements is NOT accurate? You must format the entire document in the same number of columns. You can control the space between columns. You can set different column widths for different columns. You can display a line between columns that is not a paragraph border.
You must format the entire document in the same number of columns.
A(n) _____ cell reference will not change when a formula that uses this type of reference is copied or filled into other cells. relative locked permanent absolute
absolute
The notes pane for a slide/presentation is used to _____. add speaker notes for the presentation provide footnote information (like in Word), allow the audience to click an see more information about a topic. provide a text transcript of the presentation for users with disabilities. record the animation sequence if animation is used on the slide
add speaker notes for the presentation
Nonprinting characters include _____. paragraph markers section breaks tab marks page breaks all of the above
all of the above
The status bar for a Word document is generally found _____. across the top of the application window down the right side of the application window down the left side of the application window along the bottom of the application window
along the bottom of the application window
The status bar for a Word document is generally found _____. across the top of the application window down the right side of the application window down the left side of the application window along the bottom of the application window
along the bottom of the application window
Values used by a function are called _____. conclusions arguments attributes logic order
arguments
The FV function returns a value that can be the _____. balance after a certain number of payments monthly payment interest earned on a savings account payback period
balance after a certain number of payments
Downloading movies and music over the Internet requires more transmission capacity--______--than e-mail or other text files. bandwidth frequency throughput streaming protocol
bandwidth
You can edit existing data ______. directly in the cell in the Formula bar both A and B are correct neither A or B are correct
both A and B are correct
Coaxial and twisted-pair describe two types of _____ used in computer networks. servers networks routers cables
cables
The _____ is the column letter followed by the row number. cell reference cell name cell position cell label cell coordinates
cell reference
Models of buildings, products, and other products are aften planned out with _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications
computer-aided design applications
A(n) _____ is a small text file that a web site's server puts on your computer to store information about you and your preferences. keylogger cookie spam spyware
cookie
Brochures, magazines, and newspapers are best created and formatted with programs like InDesign and QuarkXPress, which are _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications
desktop publishing applications
Which of the following is NOT the accurate symbol for the math function? addition + subtraction - multiplication * division \ percent %
division \
Portrait and Landscape refers to _____. document orientation background graphics WordArt layout Font styles
document orientation
The @ symbol is an essential part of a(n) _____. e-mail address URL IP address web address
e-mail address
Microsoft Outlook is best described as a(n) _____. document management system web development application e-mail application database application
e-mail application
docx, xlsx, and mp4 are common _____. encryption methods document formats file extensions media files
file extensions
Which of the following is a common biometric security method? SSL 10-character password fingerprint RFID
fingerprint
Computer networks are generally protected behind a _____. packet switcher secure socket layer router firewall
firewall
Superscript and subscript are formats generally used for _____. fonts paragraphs WordArt images
fonts
When there is information that needs to be explained but does not belong in the body of the paper, _____ should be used. Answers: headers or footers works cited or document notes footnotes or endnotes bibliogrophies or indexes
footnotes or endnotes
The lines between cells that display on screen but not in prinouts by default are called _____. gridlines borders bounderies row and column lines
gridlines
When the first line of a paragraph is to the left and other lines of the same paragraph are shifted more to the right, a _____ is being used. Answers: left indent hanging indent block indent first-line indent
hanging indent
View buttons to transition to slide show or slide sorter, are found _____. in the upper-left corner in the lower-left corner in the lower-right corner in the upper-right corner
in the lower-right corner
A large business can use a(n) _____ network system that behaves like the Internet, but it is isolated from the rest of the Internet. LOPSA intranet proxy server client-server matrix
intranet
Software that is open-source _____. doesn't require installation and is available completely web-based (cloud-based) can be easily scalable from small business to large companies is available to anyone to use for free and modify into alternative versions is free for students and instructors in an academic setting, but not for business is in beta release and is available to testers and early adopters to review and refine
is available to anyone to use for free and modify into alternative versions
In the address: http://money.cnn.com/2015/03/31/technology/surface-billion-dollar-writedown/index.html, which part best represents the domain? http://money.cnn.com/ http:// money.cnn.com 2015/03/31/technology/surface-billion-dollar-writedown/ index.html
money.cnn.com
Which of the following devices are best described as peripherals? [There are two responses which can be counted as correct. Pick either one as your response.] CPUs keyboards hard drives monitors
monitors or keyboards
Peer-to-peer and local area are two popular types of ______. web servers software applications networks e-mail systems
networks
Duplex printing allows a user to print _____. a document with central binding (like a book) on two different printers at once on both sides of the page two copies of the document at the same time
on both sides of the page
Keyboard shortcuts such as CTRL + E and CTRL + R are useful when you want to change the _____. paragraph alignment page numbering entitity references font size and font weight
paragraph alignment
If you want to demonstrate how the values in a column of numbers contribute to the column's total, use a ____. clustered column chart pie chart 3-D column chart line chart with markers
pie chart
PowerPoint creates ______ on the slides, prompting the user for information and allowing them to click and type up titles and content. placeholders Control Boxes Input Boxes WordArt
placeholders
A(n) ______ is a method of publishing files (primarily audio files) to the Internet that can be downloaded for playback on a computer or portable device. VoIP vimeo podcast FTP
podcast
In a slide show, to advance to the next slide do any of the following except _____. press the Esc key on the keyboard press the Spacebar on the keyboard Click the down arrow button on the keyboard. click the mouse button
press the Esc key on the keyboard
A set of rules that machines follow to complete tasks is best described as a(n) _____. node protocol tocolclient hardware
protocol
If a financial function like PMT or FV uses nper and rate as arguments, both nper and rate must use the _____. same cell address same currency format same unit of time absolute cell address
same unit of time
Webcrawlers and spiders are tools commonly used by _____. search engines internet service providers computer hackers chat messaging services
search engines
Ctrl + A is a quick way to _____. scroll through common fonts align selected to text to the left select an entire document adjust all margins to 1 inch
select an entire document
A(n) _____ provides a quick way to perform an action such as opening a folder or a file. pin title shortcut arrow icon
shortcut
An e-mail program can automatically add a block of text to the bottom of new messages. Often containing the sender's name and contact information, this is called a(n) _____. signature footer block quote footnote
signature
An image inserted into a PowerPoint slide will include ______ on all four sides of the image. crop handles rotation handles move handles sizing handles
sizing handles
The _____ would be ideal for changing the location of information in the header and footer of each slide. slide master modify styles pane footer format pane slide sorter
slide master
Transitions are seen by the audience when moving from _____. shape to shape text to slide slide to slide slide to shape
slide to slide
Word has built-in formats for headings and normal text called _____ that include font, font-size, alignment, weight, color. design sets templates format paintings styles
styles
A(n) _____ is a device that performs the same tasks as a hub, but it works much faster. firewall switch skimmer DSL
switch
Leaders are most often used with _____. footnotes tables containing both text and numbers bibliographies tabbed lists in two or more columns
tabbed lists in two or more columns
SMS is most closely related to _____. Skype text messaging web page security podcasting
text messaging
The outline view replaces the _____ on the left of the presentation with an outline format. speaker notes thumbnails nailstheme gallery font options
thumbnails
A(n) _____ is a computer program that claims to do one thing but instead (or also) does something else--something bad. trojan horse image mask canvas worm
trojan horse
When logging into my Google account from a new computer, I also need to enter a code that is sent to my phone via text message. This is an example of _____. two-step verification biometric security random access protocol hypertext transfer protocol
two-step verification
The pictured device is most accurately described as a(n)
uninterruptible power supply (UPS)
The second argument of an IF function is _____. the criterion the second input number what to display or do if the criterion is false what to display or do if the criterion is true
what to display or do if the criterion is true
To switch to a different worksheet in a workbook, click the _____ at the bottom of the worksheet window. new sheet button worksheet tab worksheet button next worksheet button worksheet slider
worksheet tab
if the user presses _____, the current bullet item will become a slide title. Tab Control + Enter Shift + Tab Shift + Enter
Shift + Tab
Right-clicking an icon on the desktop generally display a(n) _____. expansion card sub menu context tab shortcut menu
Shortcut Menu
Right-clicking an icon on the desktop generally display a(n) _____. expansion card shortcut menu sub menu context tab
Shortcut Menu
_____ is the only way to end a computer session by turning off the power to the computer. Locking Shutting Down Warm booting Signing out
Shutting Down
Which of the following is NOT generally classified as a social media site? Instagram Twitter Facebook Skype
Skype
If you need to regorganize several slides in a presentation with 30 or more slides, it is best to use the _____ view. Slide Sorter Outline Normal Slide Master
Slide Sorter
Adding _____ to a slide allows for easy inclusion of things like flow charts, heirarchy diagrams, and process diagrams. Charts/Graphs AutoShapes WordArt SmartArt
SmartArt
_____ is a good option in PowerPoint for adding process and hierarchy diagrams. Answers: WordArt SmartArt Shapes Charts
SmartArt
A(n) _____ uses flash memory technology to store data as an electrical charge rather than in a magnetic field. mechanical hard drive optical drive Blu-ray disc solid-state drive
Solid State Drive