CIS Test 2
Although labels and constant values will be copied exactly to the new location, the way formulas behave when they are copied depends on whether they use relative cell referencing or ____.
Absolute cell referencing
____ is a Linux-based operating system developed by the Open Handset Alliance. It is the most widely used mobile operating system in the US.
Android
Companies that deliver SaaS are sometimes referred to as ____.
Application service providers (ASPs)
____ includes all the programs that allow you to perform user-oriented tasks on your computer, such as writing a letter, creating a presentation, or playing a game.
Application software
Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use a/an ____ utility to do this.
Backup
Creating a/an ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
Backup
In a worksheet, the intersection of a row and a column is called a ____.
Cell
____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, temporary installation files, and so forth) in order to free up disk space.
Cleanup
. ____ are text-based systems. Users must key in commands to tell the computer what to do. The primary method of inputs is the keyboard. A mouse is not needed.
Command line interfaces
During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
DOS (DIsk Operating System)
____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.
DVD authoring
____ refers to using a PC to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.
Desktop publishing
___________ programs evaluate your system, looking for problems and making recommendations for fixing any errors that are discovered.
Diagnostic
Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
Disk Defragmentation
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
Disk defragmentation
C: /PlanningProjects WrightMemo rtf
Drive Folder File name Extension
Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards. If the program is deleted, becomes corrupted, or has a conflict with another piece of software, then the device will no longer work.
Drivers
____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.
Embedded operating systems
In a typical word processing program, a footer is text entered by the user that appears at the top of each page.
False
Microsoft Office is available for users of all operating systems.
False
The rules for naming files are the same in all operating systems.
False
To create presentation graphics, database software is used.
False
Today, most operating systems are designed for either 16-bit or 32-bit CPUs.
False
When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists.
False
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan is told by the supervisor that to create a database, he first needs to create the database ____ itself, and then he can create the necessary database objects.
File
The file management program incorporated into recent versions of Windows is ____. (It used to be called Windows Explorer.)
File explorer
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
File management
Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.
Firewall
____ programs can protect against someone accessing your computer via the Internet or a wireless connection by blocking certain types of network traffic or blocking traffic to or from certain sites.
Firewall
A/An ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or calculate a mortgage payment amount.
Function
. ____ allow the user to issue commands by selecting icons, buttons, menu items, and other objects-typically with a mouse, pen, or finger.
Graphical user interfaces
Most application programs have a built-in help feature, typically available through a/an ____ button.
Help
The mobile operating system designed for Apple mobile devices, such as the iPhone and the iPad, is ____________________.
IOS
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.
Insert
During the boot process, the essential portion, or core, of the operating system called the ____________________ is loaded into memory.
Kernel
____________________ is an operating system developed by Linus Torvalds in 1991 when he was a student at the University of Helsinki in Finland.
Linux
________ applications are designed to reside on a computer's hard disk. A ____ is generally priced at a flat rate and allows software to be used on all computers at a specific location. When the software code (instructions) are provided to the consumer who can than make modifications in how the program operates at the most basic level, it is called __________. _________ software is not protected by copyright because the copyright has expired, or the owner/creator has made the program available without restriction. It can be used, copied, modified, and distributed to others without restrictions __________ allows the user to legally try the software free before purchasing. Use and payment is often done based on the honor system. (Although your texts lists these separately, for our purposes, we include demoware, trialware, and expireware to fall into this category.) _________ is copyrighted software available at no cost. Software that is run on a different, remote server. The user's input to the program travels via a network to the remote computer. The remote computer sends back output to be displayed. Microsoft 365, Google Docs, even myService (the COA class registration system) are examples of this type of software. ________ software is developed and sold for a profit. This software has restrictions on its use that are delineated by copyright, patents, or license agreements. _________ is copyrighted software available at no cost.
Locally installed Site license Open source software Public domain Shareware Freeware Cloud ware Commerical software (payware)
The proprietary operating system for Mac computers made by Apple Corporation was ____.
Mac OS
____________________ was based on the UNIX operating system and originally set the standard for graphical user interfaces.
Mac OS
A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
Malware ( Ex. Computer virus)
____ are programs designed to play audio and video files.
Media players
____ refers to the ability of an operating system to have more than one program open at one time.
Multitasking
Janet recently purchased a new Apple computer. The operating system of that computer is ____.
OS X
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer. It provides the instructions needed to boot the computer, launch application software, and ensure that all actions requested by a user are valid and processed in an orderly fashion.
Operating system
All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.
Pages
Businesses and many individuals often use office suites, sometimes called ____, to produce various types of documents.
Productivity software suites
____ is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client.
Project Management software
A ____ is a question, or, in database terms, a request for specific information from the database.
Query
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan's supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
Query
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. The supervisor explains that each employee's information forms a separate ____.
Record
To restore a file or folder deleted from your computer's hard drive, open the ____ and restore the file.
Recycle Bin
Certain system configuration information is stored in the Windows ____________________ files.
Registry
The most common type of database used on PCs today is a/an ____.
Relational database
The ____ is a new feature in versions of Microsoft Office, starting with Office 2007; it consists of tabs, which contain groups of related commands for the program being used.
Ribbon
An operating system may include security features such as an option to download and install ____ automatically from the operating system's manufacturer on a regular basis.
Security patches
Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide.
Slide Layouts
When a software program is purchased, the buyer is acquiring a/an ____ that permits him or her to use the software.
Software License
Related software programs are sometimes sold bundled together as a ____, such as a group of graphics programs, utility programs, or office-related software.
Software suite
The process of placing items in a buffer so they can be retrieved by the appropriate device when needed is called ____________________.
Spooling
A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
Spreadsheet
____ consists of the computer-oriented software focused on running the computer. It includes the operating system and utility programs that control your computer and allow you to use it.
System Software
A clerk in a video store may need to determine if a movie is available for rental and, if not, when it is due to be returned. The type of software used for such tasks is a database management system.
True
Although Linux originally used a command line interface, later versions of Linux programs use a graphical user interface.
True
Disk management programs diagnose and repair problems related to your hard drive.
True
File compression programs reduce the size of files so they take up less storage space on a storage medium or can be transmitted faster over the Internet.
True
Filenames typically include a extension at the end of the filename. These should not be changed by the user because the operating system uses them to identify the program that should be used to open the file.
True
Folders can contain both files and other folders (called subfolders).
True
Font style refers to formatting that adds additional features to the text, such as bold, italic, or underline.
True
Graphics software-also called digital imaging software-is used to create or modify images.
True
In general, the operating system serves as an intermediary between the user and the computer.
True
Larger computers-such as high-end servers, mainframes, and supercomputers-sometimes use operating systems designed solely for that type of system.
True
Like any document created with software instead of paper and pencil, word processing documents can be retrieved, modified, and printed as many times as needed.
True
Linux is increasingly being used with both mainframes and supercomputers.
True
Most software programs display their licensing agreements at the beginning of the installation process.
True
Paragraph formatting changes an entire paragraph at one time, such as specifying the line spacing for a particular paragraph.
True
Spreadsheet templates are available to help users quickly create common types of business documents, such as balance sheets, income statements, invoices, and purchase orders.
True
The buyer of software is acquiring a software license that permits him or her to use the software. This license, also called an end user license agreement (EULA), specifies the conditions under which a buyer can use the software, such as the number of devices on which it may be installed.
True
The documents waiting to be printed are said to be in a print queue, which designates the order the documents will be printed.
True
To retrieve information from a database, queries and reports are used.
True
When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the equal sign (=).
True
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.
UNIX
____ is one of the most widely used versions of Linux.
Ubuntu
Andrea advises Dean to remove unnecessary programs from his computer by using a/an ____ utility.
Uninstall
The means by which an operating system or any other program interacts with the user is called the ____.
User interface
One memory management technique frequently used by operating systems is ____________________, which uses a portion of the computer's hard drive as additional RAM.
Virtual memory
____ memory allows you to use more memory than is physically available on your computer.
Virutal
If using Windows, what utility or program should Lena use to view, organize, and manipulate (copy, rename, delete) the files in storage. Max's hard disk seems to be running slow. She wants to check to see if the data is optimized (in contiguous sectors). Henry wants to view pages on the web. Michelle has to make a presentation to her public speaking class and would like to project the info onto a display screen in the front of the room. Thomas's new computer needs the basic software to control hardware including reading and writing from disks, managing i/o, and task management. Carol is treasurer for the campus Computer Club. She wants to store the club's financial records and create a chart indicating expense allocation. Andy wants to create an electronic client list and product list so he may create reports showing which clients tend to buy what products Kelly wants to create a resume to apply for a new job.
Windows explorer Disk defregmenter Web browser Presentation software Operating system Spreadhseet Databae Word processor
Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached. Because of this feature, you should only press enter (return) after a short line like a title, at the end of a paragraph, and to leave a blank line between paragraphs.
Word Wrap
A single spreadsheet document is often called a ____.
Worksheet