Computers Final Exam
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal. True False
False
It is illegal for employers to use software programs that monitor employees. True False
False
One effective strategy for creating strong passwords includes changing common words to symbols. True False
False
Research indicates that the more text messages students send, the more easily they find formal writing. True False
False
The distinction among categories of computers is always very clear. True False
False
The terms web and Internet can be used interchangeably. True False
False
USB flash drives and memory cards usually hold more than hard disks like the kind shown in the accompanying figure. True False
False
Using document properties is unlikely to save users time locating a particular file because they cannot view a document's properties without opening the document. True False
False
If a company does not have a formal email policy, it can read email messages without employee notification. True False
True
In a networked environment, each computer on the network can access the hardware on the network. True False
True
Which of the following copies all of the files in a computer? a. full backup b. incremental backup c. differential backup d. selective backup
a. full backup
A ____ is a prewritten formula that is built into Excel. a. function b. feature c. task d. calculation
a. function
A ____ is text and graphics that print at the top of each page. a. header b. topper c. margin d. crown
a. header
As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research. True False
True
CAM is used by a variety of industries, including oil drilling, power generating, food production, and automobile manufacturing. True False
True
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network. True False
True
Most dialog boxes in Windows apps requiring navigation follow a similar procedure. True False
True
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion. True False
True
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits. True False
True
The most common error when entering a formula is to reference the wrong cell in the formula. True False
True
Websites often collect data about you so that they can customize advertisements and send you personalized email messages. True False
True
Your browsing history is a list of all websites you have visited over a period of time. True False
True
What term is used to illustrate the gap between those with and those without access to technology? a. digital divide b. mobile stratification c. technology caste system d. none of the above
a. digital divide
In Internet terminology, what is the term, google.com, called? a. domain name b. Internet service provider c. webpage protocol d. TLD
a. domain name
When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low? a. embedded computer b. server c. online linked computer d. analog computer
a. embedded computer
A ____ is a series of two or more adjacent cells in a column or row or a rectangular group of cells, as shown in the accompanying figure. a. range b. bunch c. nearby cell d. neighbor
a. range
A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer? a. supercomputer b. game console c. personal computer d. mobile computer
a. supercomputer
A word with a meaning similar to that of another word is called a ____. a. synonym b. thesaurus c. replacer d. duplicate
a. synonym
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use? a. input device b. Computer c. output device d. both a and c
b. Computer
To find all customers whose names begin with S, enter ____ in the Criteria row of the Customer Name field. a. S? b. S* c. S# d. S&
b. S*
You can enter the correct range in a function by typing the beginning and ending cell references separated by a ____. a. semi-colon (;) b. colon (:) c. period (.) d. none of the above
b. colon (:)
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? a. rebuking b. spoofing c. transmitting d. victimizing
b. spoofing
Press the ENTER key in all of the following circumstances EXCEPT ____. a. to insert a blank line into a document b. when the insertion point reaches the right margin c. to begin a new paragraph d. in response to prompts in Word dialog boxes
b. when the insertion point reaches the right margin
A ____ in Excel is like a notebook. a. onenote b. workbook c. placeholder d. cell reference
b. workbook
The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in the range. a. DIVSUM b. RANGEAVG c. AVERAGE d. MAX
c. AVERAGE
To select nonadjacent items, select the first item as usual, press and hold down the ____ key, and then while holding down the key, select the additional items. a. HOME b. F1 c. CTRL d. ALT
c. CTRL
To paste copied cell contents, you can press the ____ keys. a. CTRL+C b. CTRL+P c. CTRL+V d. CTRL+X
c. CTRL+V
Which of the following happens when you enter the formula =G15 into a cell? a. Excel recalculates all formulas in the worksheet b. Excel assigns the sum of the values in the previous 15 cells to the active cell c. Excel assigns the value in cell G15 to the active cell d. Nothing; =G15 is an invalid formula
c. Excel assigns the value in cell G15 to the active cell
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? a. spam b. spit c. Phishing d. spyware
c. Phishing
Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space? a. IrDA b. POP c. VR d. TCP
c. VR
Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal? a. disperse b. digital c. cloud d. liberated
c. cloud
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure? a. hacker b. script kiddie c. cyberextortionist d. cyber terrorist
c. cyberextortionist
The ____ is the small black square located in the lower-right corner of the heavy border around the active cell. a. selection handle b. sizing handle c. fill handle d. copy handle
c. fill handle
You ____ a worksheet to emphasize certain entries and make the worksheet easier to read and understand. a. save b. print c. format d. clear
c. format
Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution? a. shareware b. custom software c. open source software d. system software
c. open source software
Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount? a. network b. distributed c. site d. multipurpose
c. site
According to netiquette, Internet users should assume which of the following? a. all material is accurate b. all material is up-to-date c. the use of all capital letters is the equivalent of shouting d. all of the above
c. the use of all capital letters is the equivalent of shouting
What happens during a DDoS attack? a. An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic. b. Antivirus software disables a virus and protects the computer or network from unauthorized access. c. The police use a virus and other measures to take down a network of computer criminals. d. A zombie army is used to attack computers or computer networks.
d. A zombie army is used to attack computers or computer networks.
To move to the end of the document, press the ____ key(s). a. DOWN ARROW b. END c. CTRL+DOWN ARROW d. CTRL+END
d. CTRL+END
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them? a. data rights b. acceptable use c. social restrictions d. Information privacy
d. Information privacy
What is the purpose of an Internet Protocol address (IP address)? a. It specifies whether a computer is using a broadband network or a direct-dial network. b. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. c. It contains the protocol schema used to identify whether the computer is on a wired or wireless network. d. It uniquely identifies the location of each computer or device connected to the Internet.
d. It uniquely identifies the location of each computer or device connected to the Internet.
____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen. a. Screen view b. Ribbon resolution c. Pixel resolution d. Screen resolution
d. Screen resolution
____ properties are associated with all Microsoft Office files and include author, title, and subject. a. Automatic b. Hidden c. Replacement d. Standard
d. Standard
Essential business letter elements include the ____. a. date line and inside address b. message c. signature block d. all of the above
d. all of the above
In Excel, a number can contain the characters ____. a. 0 1 2 3 4 5 6 7 8 9 b. + - ( ) , / c. . $ % E e d. all of the above
d. all of the above
The ____ preceding a formula alerts Excel that you are entering a formula or function and not text. a. quotation mark (") b. colon (:) c. plus (+) d. equal sign (=)
d. equal sign (=)
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? a. practical b. permissible c. acceptable d. ethical
d. ethical
What is the term for the smallest element in an electronic image? a. icon b. optic c. state d. pixel
d. pixel
A letterhead should contain all of the following EXCEPT ____. a. the complete legal name of the individual or company b. the telephone number c. the mailing address d. the company's objective
d. the company's objective
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this? a. function b. index c. formula d. value
d. value