ITSC 1301 Introduction to Computers
Which of the following is an idea, invention, or process that derives from the work of the mind or intellect.
Intellectual Property
_________________ is an open source operating system.
Linux
This operating system is most popular with graphic designers and those who work in multimedia.
Mac OS
__________________requires two or more processors.
Multiprocessing
Which of the following software would allow you to edit the text of a scanned document?
OCR
SmartArt permits you to create all of the following types of diagram EXCEPT ____.
Observational
Controlling the Word spelling and grammar check settings is done in the backstage _____________ .
Options
Information about a person that can be used to uniquely establish that person's identify is called _____________?
PII
Which of the following is not part of the Information Security Triad?
Passwords
The term memory when referring to computers usually means _____.
RAM
_______ view displays all the slides in a presentation as thumbnails to provide you with a visual overview of the presentation.
Slide Sorter
Which of the following operating system was designed for phones?
Symbian
Special high-speed lines used by large corporations to support digital communications are known as
T1 and T3 lines
If you enter an integer that is longer than the current cell size, you see only some of the numbers in the cell.
false
In Excel, relative references have a $ before each column and row designation.
false
Moving an item to a higher level in an outline is called demoting the item.
false
PowerPoint's main use is used to present documents.
false
W84me! would be a strong password.
false
You can animate individual bullets, but not bulleted lists.
false
You can enter records in both Datasheet view and Design view.
false
A property describes one characteristic of a _______.
field
Copying, moving, and renaming files and folders are all functions of _____________.
file management
"GUI" stands for
graphical user interface
In a multiple-page document, which of the following is the extra blank margin space given to pages to allow for binding.
gutter
Which of the following protocols lets the user know the web page is encrypted (secure)?
https://
What does an Intrusion Detection System (IDS) do for a business?
identifies network attacks
A scanner is an example of a(n)
input device
When a text box is active, its border ____.
is a dotted line
In Slide Master view, you can tell which thumbnail is the slide master that is associated with the current theme by its ____.
larger size
You can apply a different theme to a form in _______ view.
layout
The chart ____ identifies each of the data series in a chart.
legend
What is an advantage of using ERP software?
less mistakes with a single database
What is a limitation of a thin client?
little or no local storage
The first portion of the IF function is _______.
logical_test
The information system component that controls and manipulates data in order to produce information is called the
microprocessor
The main circuit board of the computer where the CPU is installed.
motherboard
The transmission medium that carries the message is referred to as the
networking media
What is an advantage of a SSD over a traditional hard drive?
no moving parts
1,000,000,000 bytes equals _________________?
one gigbyte
In a one-to-many relationship, the primary table is the _______ table, and the related table is the _________ table.
one, many
How do the packets travel when packet switching protocols are used?
packets may follow different routes
To change the order of operations, you can enclose parts of a formula within _______.
parentheses
Which of the following terms describes accessing someone else's WiFi without authorization?
piggybacking
A _______ is a region of a slide reserved for inserting text or graphics.
placeholder
Companies collecting personal information and buying habits of individuals is called _____________.
profiling
The rules for exchanging data between computers are called
protocols
Access is a(n) _______ database.
relational
A ____ is a part of a document that can have its own page-level formatting and properties.
section
The small squares on the corners and sides of a selection box are called ____.
sizing handles
The most powerful type of computer,
super computing clusters
Software that allows your computer to interact with the user, applications, and hardware is called
system software
Bandwidth can also be thought of as _____________.
throughput
To make an animation go faster, decrease the ____.
time in the Duration box
Which of the following is classified as MRP?
tracking inventory
"What-if" analysis lets you examine how changing values entered directly in a worksheet affect the calculated values.
true
A column in an Access table is referred to as a field of information.
true
A query is a question about the data stored in a database.
true
All formulas in Excel should start with an = sign in the cell.
true
An authorized Virtual Private Network (VPN) user can actually bypass some of the firewall restrictions.
true
In the US, a patent lasts twenty years.
true
The ISO 9000 certifications focus on quality management.
true
Which of the following would allow your computer to stay on in case of a power outage?
ups
The Internet is one portion of the World Wide Web.
False
Web 2.0 applications only allow experienced programmers to update web content.
False
Which of the following laws singles out data records related to health care?
HIPPA
Information processing converts ___________________.
data into information
The bottom portion of the Query window contains the _______.
design grid
You can edit cell contents directly in a cell by ____
double-clicking the cell
Which of the following allows a proxy server to work?
external communication ports closed
IPv6 has a limitation that will not allow as many web addresses as IPv4.
false
A floating graphic is located in a specific position in a line of text in a document; when the text is edited the graphic moves (or "floats") along with it.
False
Clicking a link in a phishing e-mail message can install a __________ program.
(Spyware, virus, stealthware) all of the above
Non-obvious relationship awareness can collect data from which of the following?
(social networks, cell phone data, credit reports) all of the above
The _______ wildcard character matches any number of characters.
*
What is the top top level domain in this web address? http://www.sydney.com.au/
.au/
How much does a 16 GB SD card hold?
16,000,000,000 bytes
Bluetooth Wireless USB is a type of radio wave information transmission system that has a range of up to ________
300 feet
A field name can have up to _______ characters.
64
On which of the monitor resolutions below would a 320X240 picture appear largest?
640 x 480
Digital data representation uses bytes of information. A byte is represented by ____ bits.
8
The latest WiFi technology being used is___________.
802.11ac
_____ is the science of identifying individuals based on measurable biological characteristics.
Biometrics
Kerning refers to the space that appears directly above and below a paragraph.
False
The key or key combination for moving to the right one word at a time is _______.
Ctrl+Right Arrow
Which of the following can be considered a disadvantage to having a code of ethics for IT?
Every member may not agree to the code.
The ¶ character is an example of a nonprinting character.
True
Word will allow you to export a Word document as a .PDF file.
True
This operating system was originally designed to run on minicomputers used in a network environment.
UNIX
A (n) ____________ allows for a secure path over the Internet that provides authorized users access to a private network
VPN
When you present online in PowerPoint 2013, you send the presentation to ____.
a Microsoft server
information System ethics describes ___________________ for IT professionals.
acceptable behavior
Which of the following is NOT a Word tab stop type?
aligned
Which of the following is an expansion bus?
all of the above (VGA , USB,FireWire )
______________ software needs to be updated regularly since new malware is introduced at all times.
antivirus
_______ can extend a series of numbers, patterned text, and dates into an adjacent cell or range.
autofill
Which of the following is a computer controlled by a hacker or computer criminal?
bot
The key to success with an ERP for business is ______________.
centralized database
What does the author try to convey with the term "cloud computing?"
computer resources accessed through the Internet
To copy rather than move a sheet, press and hold the ____ key as you drag and drop the sheet
ctrl