CSCI-2203 test 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following elements of File Explorer is collapsed by default? Navigation pane Folder pane Ribbon Quick Access toolbar

Ribbon

A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next. True False

True

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. True False

True

Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical. True False

True

Which of the following Office features has both a button you click to apply a feature and an arrow you click to display a drop-down list of options? button drop-down list split buttons gallery

Split Buttons

Which of the following is the file extension given to an Access database? .docx .xlsx .accdb .pptx

.accdb

Which of the following is the file extension given to an Excel 2016 workbook? .docx .xlsx .accdb .pptx

.xlsx

If you have been using an application already and want to create a new file, you create it from the Backstage view. True False

True

The keyboard shortcut for closing a file is Ctrl+W. True False

True

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure). True False

True

Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image. True False

True

Which of the following is true about Tell Me? It is an Office help feature. If is available in Office 2016 applications. If is available in Office 365 applications. all of the above

all of the above

People that collect and sell personal data are called _______. direct marketers fund-raisers information resellers government agencies

information resellers

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. Spyware Freeware Employee-monitoring software Cookies

Employee-monitoring software

The process of coding information to make it unreadable except to those who have a special piece of information known as a key. Restriction Security Protection Encryption

Encryption

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account. True False

False

Identity theft and mistaken identity are the same. True False

False

If copyright-protected music is uploaded to a website, it is legal to download it. True False

False

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for. True False

False

The Minimize button in the upper right of the file window closes the window. True False

False

The Quick Access toolbar is located at the bottom of each Office application window. True False

False

The essential element that controls how computers are used is a law. True False

False

The keyboard shortcut for renaming a file is F4. True False

False

The mini toolbar displays below the Ribbon in each application window. True False

False

Which of the following is not malware? Trojan horses Viruses Worms Ad-Aware

Ad-Aware

Which of the following is true about the Windows 10 Action Center? It displays notifications such as emails. It displays notifications such as Windows update notifications. Click the Action Center button on the right side of the Taskbar to open the Action Center pane. All of the above

All of the Above

Which of the following features can you add to the Quick Access toolbar? Quick Print New Spelling & Grammar All of the above

All of the above

Computer criminals that create and spread viruses are punished under this law. Gramm-Leach-Bliley Act Freedom of Information Act Family Educational Rights and Privacy Act Computer Fraud and Abuse Act

Computer Fraud and Abuse Act

Small data files that are deposited on a user's hard disk when they visit a website are called _______. cookies codes cache proxies

Cookies

Which of the following lets you search for content on your computer, on the Internet, and in the Microsoft Store? File Explorer Cortana Microsoft account Taskbar

Cortana

Which of the following keyboard shortcuts invokes the Select All command? Ctrl+R Ctrl+A Ctrl+Home Ctrl+End

Ctrl+A

Which of the following keyboard shortcuts opens the Open dialog box? Ctrl+F6 Ctrl+F8 Ctrl+F10 Ctrl+F12

Ctrl+F12

Which of the following keyboard shortcuts opens a new blank file from within an Office application? Ctrl+O Ctrl+N Ctrl+P Ctrl+D

Ctrl+N

Which of the following keyboard shortcuts opens the Print area on the Backstage view? Ctrl+O Ctrl+N Ctrl+P Ctrl+D

Ctrl+P

Which of the following keyboard shortcuts lets you create a new folder in a Windows folder? Ctrl+N Shift+N Alt+N Ctrl+Shift+N

Ctrl+Shift+N

Which of the following keyboard shortcuts lets you paste a paragraph in another location? Ctrl+C Ctrl+M Ctrl+V Ctrl+X

Ctrl+V

Which of the following keyboard shortcuts lets you cut a range of worksheet cells from their current location? Ctrl+C Ctrl+M Ctrl+V Ctrl+X

Ctrl+X

Which among the following is a way to shut down an ISP or website? Denial of service attack Viruses Trojan horses Worms

Denial of service attack

Which of the following categories in the Settings window control Bluetooth, printers, and your mouse? System Devices Personalization Ease of Access

Devices

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away" Digital Millennium Copyright Act Computer Abuse Amendments Act The Gramm-Leach-Bliley Act Computer Fraud and Abuse Act

Digital Millennium Copyright Act

A(n) _______ acts as a security buffer between a corporation's private network and all external networks. firewall password disaster recovery plan virus checker

Firewall

Which of the following is not a measure to protect computer security? Restricting access Encrypting data Copying data and storing it at a remote location Keeping the same password on all systems consistently

Keeping the same password on all systems consistently

Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Cookie Global positioning system Keystroke logger Web bug

Keystroke logger

Which of the following Microsoft Office applications would you use to create a presentation on a new product or sales trends? Microsoft Word Microsoft Excel Microsoft Access Microsoft PowerPoint

Microsoft PowerPoint

Which of the following Microsoft Office applications would you use to create a professional-looking catalog or brochure? Microsoft Outlook Microsoft OneNote Microsoft Publisher Office Web Apps

Microsoft Publisher

Which of the following applications is not part of applications typically included in Office 365? Microsoft Word Microsoft Windows Microsoft Outlook Microsoft OneNote

Microsoft Windows

In Windows 10 and Office 2016, which of the following do you need so that your files and account settings are portable? Microsoft account File Explorer Cortana All of the above

Microsoft account

Which of the following places an open window on the Windows Taskbar? Minimize button Restore Down button Maximize button Close button

Minimize button

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Illusion of anonymity Browser cache History files Privacy mode

Privacy mode

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. Worm Fake Virus Rogue

Rogue

When using Office 2016 on a tablet, which of the following gestures moves an object or selected text? pinch stretch slide swipe

Slide

These are used by advertisers to keep track of your web activity as you move from one site to the next. Web bugs History files First-party cookies Third-party cookies

Third-party cookies

How does the Start page display different apps?

Titles

Which of the following optimizes the Office working environment when using a computer with a touch screen? Touch mode Screen mode Laptop mode Action Center

Touch mode

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites. True False

True

Spy removal programs are designed to detect and remove various types of privacy threats. True False

True

The Action Center displays notifications such as emails and Windows update notifications. True False

True

The archiving and search features of the web make your online identity available indefinitely. True False

True

A program that replicates itself and clogs computers and networks. Virus Worm Denial-of-service attack Trojan horse

Worm

Which of the following is not a true statement?

You can open pdf files in word but not edit them

Which of the following statements is not true? Compressing files and folders decreases their size. You can't attach a zipped folder to an email message. You can¿t attach an entire folder to an email message. If you receive a zipped folder from someone via email, save the zipped folder and then you can extract its contents.

You can't attach a zipped folder to an email message.

Which of the following displays when you right-click text, a cell, or an object such as a picture, drawing object, chart or SmartArt? context menu keyboard shortcut mini toolbar Quick Access toolbar

context menu


Ensembles d'études connexes

Intro to American National politics Midterm 3/1/18

View Set

Ch. 1 - Computer Systems Management

View Set