PoIT final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The internet began as-

ARPANET

Hexadecimal notation

Base-16 arithmetic

what is the proper way to write a relative cell address

C4

what is NOT a major computer threat

CAPTCHA

Using capital letters to show where the new words start in a filename is called

CamelCase

Extracting useful information in the form of relationships and patterns

Data mining

used by by the OS to communicate with the hardware

Device driver

Ever expanding progression of technical, economic, and cultural change

Digital revolutions

Changes of technology over time

Evolving technology

What defines the digital middle class

Extensive use of digital devices

how is the insert function dialog box displayed

Formulas-> function library-> insert function

Which event date major hades of the digital revolution

Giant conputers, personal conputer, cloud and computing

what defines a web page

HTML

common connection point for devices in a network

Hub

An emerging technology can be described or identified as-

Innovation of a new field

group of computers that are not in the same room or building, but in the same city

MAN

a logical function

MIN

what is the source to properly cite in formation

MLA

a style guide for formatting , word usage, and other aspects of creating documents

MLS

Which of the following does describe or identify an evolving technology

Medical technology, ebooks, smartphones

What is the current computer classification

Mini frames

technologies that allow text messages

SMS and iM

internet based telephone

VOIP

which key combinations move the insertion point

[ctrl][end]

what is the key combination to navigate to the beginning of a presentation in PowerPoint

[ctrl][home]

WeOf8F@60F is an example of what

a password

most important consideration for purchasing a new computer system

a user's needs

what is used to lock the cell reference in a formula

absolute cell address

currently selected cell

active cell

what do task managers do

analyze what is going on in the system

what values the function needs for the calculation

arguments

providing varying levels of access to information

authentication

what follows

autocorrect

what is displayed by clicking the FILE tab

backstage-view

what makes copies of files in case of loss

backup

what is not a category of typefaces

bold

another name for an unordered list

bulleted list

what is the technique for showing data in a picture-like format

chart

what function must be done for readability statistics to be displayed

check grammar with spelling

what is used to name each cell

column and row

what is the sign off for a letter

complimentary closing

what makes recommendations to the organization for the best system to use

computer system analysis

small text files placed on a computer's hard disk by a website

cookie

what puts a file in a new location while keeping the original file in its place

copy

which of the following is a common formatting for numbers in a spreadsheet

currency, dates, and fractions

what is viewed as the guardian of data

database adminstrator

what are some descriptions of values or information that can be accepted

datatype

what determines the meaning of data entered in a cell

datatype

what is included in a letterhead

date

what always begins a salutation

dear

arranging data largest to smallest

descending order

what are small files that facilitate the communication between an operating system with peripherals

device drivers

what does overusing moving objects tend to do

distract the audience

What maps the numbers & letters of an IP address

domain name

a transmision from the host to client

download

numbered annotations that appear at the end of a document

endnotes

allows individuals to use copyrighted works without permission in limited situations

fair-use doctrine

what is the way in which to limit the data limited

filtering

measure of readability

flesh-kincaid grade level

a preprogrammed formula

function 1

shuts off the system and restarts

hard reboot

What style would be automatically included in the table of content in a microsoft word document

heading 1

how can hacking be legitamate

hiring a hacker to find security flaws in your computer

what is the electronic link between a marked place in a document to another place in the document

hyperlink

what does computer forensics do

identify, discover, and preserve

safe practice to deter identity theft

immediately delete mesages from suspicious senders and NEVER click on unsolicited lines ads etc.

what gives information to a computer

input device

What are the four major hardware components

input devices, output devices, memory, processor

what is the name of the vertical line that shows where text will be inserted

insertion point

something that comes from a person's mind , such as an idea, invention, or process

intellectual property

what are two types of audiences

internal and external

what is primary research

interviewing several people who witness an event

amount of space between two letters

kerning

what test for true or false

logical function

what part of an email contains the necessary information to ensure proper delivery of the message

message header

which computer peripherals provide input

mouse, touch pad, keyboard

guidelines for appropiate behavioron the internet

nettiquette

what is downloading copyrighted material without permission of the copyright holder

online piracy

What are some basic capabilities of a computer

operate peripheral

what dialog box makes changes to the ribbon

options

the way a document is placed on a sheet

orientation

What records the results of computer prcessing

output device

virus or other malware infects the computer and takes control of your web browser

pharming

what type of chart shows relative size of each fractional part of a whole

pie chart

speech, address or demonstration given to a group

presentation

shows exactly how a document will look when printed

print preview

What loads programs and executes them

processing

What is the term for something that cannot be sold copied, or modified by the user

propietary software

what are open source software characterized by

publically programming development

a mode in which a file is open and changes may not be saved

read-only

what happens when you double click on a file

rename

what connects a computer to a network

router

responsible for protecting the computer networks of a company

security analyst

what makes a computer a server

server operating

what are online platforms that promote interaction and sharing

social media

designs computer software, databases

software developer

to arrange files based on their properties

sort

what network topology connects a client to host

star

what should a career plan include

steps on a timeline

What permanently saves information

storage device

What are some good file-management practices

store all data files at the top level of the drive

difficult for both humans and computers to crack

strong password

what is nested within the parent folder

subfolder

network transmission device that checks and forwards packets between parts of a network

switch

what lists major sections and subsections within the report with page numbers

table of contents

presents horizontal locations across the page in a document

tabs

what manages the activities on a computer

the operating sytem

what is a set of specified colors, fonts, and effects

theme

what is the name of the algorithm providing absolute security

there is none

what do project managers need to have

time management

Why are languages used for in computer programming

to gives instructions on a human level

what is the purpose of a CSV file

to share data with other software

type of button that turns a feauture on or off

toggle

what i the method of moving from one slide to the next

transition

Programs written into high-level language are always

translated into machine learning

program invites the user to run it while concealing malicious code that will be executed

trojan horse

what should be checked when editing a desktop publishing project

typefaces

transmission client to host

upload

what should not be used in electronic messages

uppercase letters

online identity of an account holder

username

What temporarily saves information

volatile memory

involves developing color scheme, layout, text, images, and user expierience

web developer

what is used to see what happens if cell data are changed

what-if scenario

What are used in the search box to represent unknown characters

wildcards

a new line within a the cell will be automatically started when the length of the text exceeds the width of the cell

wrap text


संबंधित स्टडी सेट्स

Ch. 3- Business Continuity Planning

View Set

CLCIV 101 Final Exam Study Guide

View Set

Advanced Vocabulary C1, Denis Vocabulary C1-C2

View Set

Chapter 30 The americas in the Age of independence

View Set

Week 2- Practice Knowledge Check

View Set