Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What files extension is used for Word?

.doc

what is the default format for text?

12 point arial

Connects computers computers through telephone or cable television lines

A modem Card

What is a green wavy underline mean?

A possible grammar error

Kilobyte

A_________is equal to exactly 1,024 bytes,but computer users often round it down to 1,000 bytes to simplify memory and storage definitions

Terabytes

A________equals approximately 1 billion bytes

Megabyte

A_______is equal to approximately 1 million bytes

Ram

An_________is the basic storage unit in memory

Multi-Core

An______processor is a chip with two or more seperate processors.

MAN

Collection of local area networks, usually the size of a city or town

Router

Connects two or more networks not computers.

What is the shortcut for copying ?

Ctrl C

what is the keyboard shortcut ofr cutting text?

Ctrl C

what is the shortcut for pasting text?

Ctrl V

Address

Each byte resides temporarily in a location in memory called an_______.

LAN

Networks or computers that are located near each other.

_____ is a scam in which a perpetrator sends an official looking email that attempts to obtain a users personal and financial information.

Phishing

Topology

Specifies how a network is laid out/set -up

chassis

The cases of the system unit sometimes called the____________, is made of metal or plastic and protects the internal electronic components from damage.

Binary

The______ System is a number system that has just two unique digits,0 and 1,called bits,

system

The_____board is the main circuit board of the system unit

Where is the name of the document displayed in WOrd?

Title bar

Machine

Together,four operations comprise an_________cycle

byte

When 8 bits are grouped together as a unit,they form an___________.

Hub

When one computer sends and receives data, all the other computers connected can send and receive data

Nonvolatile

________ memory does not lose its content when power is removed from the computer

parallel

_________ port us an interface that connects decives by transferring more than one bit at a time

Ram

_______is the most common type of volatile memory

serial

a ______ port is a type interface that connects a device to the system unit by trasnmitting data one bit at a time

hub

a device that provides a central pioint for cables in a network

logo

a distinctive symbol, shape or color that is recognizable as belonging to a specific organization

publication

a document created in publishes

backdoor

a program or set of instructions ina program that allow uses to bypass security controls when accessing a program, computer or network

worm

a program that copies itself repeatedly in memory or a network

What marker indiactes a misspelled word?

a red wavy underline

modem

a type of comunication device that connects a communication channel to a sending or recieving device

what kind of program is Word 2003

word processing

WAN

connects local area metropolitan networks together.

What task does Word not have the abbility to do?

create slides for presentations

receiving

device that accepts an sintruction to transmit data, instruction and informaiton

sending

device that initiates an sintruction to transmit data, instruction and informaiton

small caps and supercript are examples of what?

font effects

to change the font, which tool would you use?

font list arrow

which tool would you use to change the foramt of text to 20 pts?

font list arrow

bold and italics are examples of what?

font styles

Where would you find teh button for applying bold to a text in Word?

formatting toolbar

Executing

in the machine cycle steps is the process of carrying out commands

Each character asses to a password significantly __________ it might take for someone or a hacker to guess the password

increases the number of combinations and the length of time

Virus

is a potentially damaging computer program that effects,or infect,a computer negatively by altering the way the computer works without the users knowledge or permission

Fetching

is the process of obtaning a program instruction or data item from memory

When users purchase software a single users license agreement like the one does not permit users to do any of the following except

make one copy of the software as backup

trojan horse

malicios-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action

a network sever is a dedicated server that....

manages network traffic activity

a print server is a dedicated server that

manges printers and prints jobs

"cut and paste" describes what operation?

moving text

hacker

now has a derogatory meaning and refers to someone who access a computer or network illegally

Billion

one gigahertz equals one________ ticks of the system clock per seconds

computer crime

online or internet-based illegal acts

examples of biometric devies and systems include all of the following except

personal identification numbers and passwords.

acceptable use policy

prevents unauthorizes access and outlines the computer activites for which a computer pr network may or may not use

Decoding

refers to the process of translating instructions into signals the computer can execute

when uses purchase software, a singles user license agreement permits uses to do all of the following except....

rent or lease the software....

What element of Word contains buttons for performing operating commands?

standard toolbar

a file server is a dedicated server that ......

stores and manages files

Memory stores.......

the operating system and other system software application programs that carry out a specific task the data being processed and the resulting information

text box button

used to create a text box

SMS..

users type and send short text messages in a smart phone or PDA

Switch

when one computer recives data,it will only transfer the data to and form that computer

Terminators

absorb signals

MMS

allows users to send graphics, pictures, video clips, and sound files


संबंधित स्टडी सेट्स

ENGLISH-Narrative Elements (Setting)

View Set

Finance 322 Exam 1 reading questions

View Set

PVN141 Neurosensory Nursing Care

View Set

Lección 9: Estructura: 9.1, 9.2, 9.3, y 9.4

View Set

CH 9 HEALTH AND DISABILITY INCOME INSURANCE/ MULT CHOICE

View Set

Chapter 2: Critical Thinking in Health Assessment

View Set

Insertions/Origins of Head/Neck/Trunk/Shoulder

View Set

Chapter 5: French Canada and the Quebec Question

View Set

Climates and Ecosystems of Africa

View Set