Computer Concepts Quiz Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

_____ refers to features that make a computer easier to use for people who might have trouble viewing the screen or using a mouse. Accessibility Cloud computing Local-only user account Power plan

Accessibility

_____ control how text and other objects appear onto and exit from the slide. Animations Answers: AutoDisplay Transitions WordArt Animations

Animations

If the number 4311.50 is rounded to the nearest 100 dollars, it would display as _____. $4,400.00 $4,000.00 $4,310.00 $4,300.00

$4,300.00

Which character should NOT BE USED in an Office filename? - _ = *

*

Which of the following is a good example of a system file? .dll .exe .mp4 .docx .rtf .zip

.dll

Word document templates have a(n) _____ file extension. .rtf .docxt .dotx .wtemp

.dotx

Which of the following is a good example of a media file? .dll .exe .mp4 .docx .rtf .zip

.mp4

Which of the following is a good example of a compression utility file? .dll .exe .mp4 .docx .rtf Correct .zip

.zip

A computer user has 4.5 gigabytes of data they want to store. Which of the following will be the best option--accomodating the files with the fewest pieces of media? 3 CD-R discs 2 CD-R discs 1 CD-R disc 2 DVD-R discs 1 DVD-R disc

1 DVD-R

Which quantity best matches a kilobit? 1,000,000 bits 1,000,000 bytes 1,000 bits 1,000,000 bytes

1,000 bits

If the six cells in the range B3:B8 have the content 5, 6, 3, empty, 8, and 10, the MIN function would display ______. 3 5 an error message 0

3

A computer user has 10 gigabytes of photos and audio they want to backup. Which of the following will be the best option--accomodating the files with the fewest pieces of media? 3 CD-R discs 2 DVD-R discs 1 CD-R disc 3 DVD-R discs 1 DVD-R disc

3 DVD-R

If the six cells in the range B3:B8 have the content 5, 6, 3, empty, 8, and 10, the COUNT function would display _____. 0 an error message 5 6

5

Which HTML tag is used to create a hyperlink in a web page? <link> <src> <web> <a>

<a>

Which of the following is used to create a headline in a web page? <h1> <title> <headline> <head>

<h1>

A formula with an absolute reference to cell B3 would be _____. =$B$3 =B3 =$B3$ =!B3

=$B$3

Which Excel function is used to the middle value within a specified range of cells? =ROUND =CENTRAL =AVERAGE =MID =MEDIAN

=MEDIAN

A family member asks you how a Blu-ray disc can hold so much more data than a standard DVD. Which of the following is the best non-technical response? A Blu-ray burner uses a smaller laser beam than a standard DVD; so more data can be stored on the surface of the disc. A Blu-ray burner uses a larger laser beam than a standard DVD; so more of the surface of the disc can be used for data storage. A Blu-ray disc allows the use of multiple layers and multiple sides; so the storage capacity is almost quadrupled. A Blu-ray disc work in conjunction with a separate magnetic hard disk; so the storage capacity is almost quadrupled. A Blu-ray disc really doesn't hold any more than a standard DVD, but the data stored is limited to video, which doesn't take up as much space as programs and computer files.

A Blu-ray burner uses a smaller laser beam than a standard DVD; so more data can be stored on the surface of the disc.

A(n) _____ is a list of sources used in a paper, which are listed at the end of a document. table of contents index parenthetical citation Bibliography

Bibliography

Fingerprint scanners and retina scanners are best described as _____ devices. pixelazation biometric LCD Digital Light Processing

Biometric

_____ are paragraph formats. Only indents Both tabs and indents Only columns Both indents and columns

Both tabs and indents

Which type of storage device relies on pits and lands for storing bits of data? SCSI drive USB external drive magnetic hard drive CD-R DVD-RW

CD-R

The _____ is a single computer chip that contains all the electronic circuitry for performing a personal computer's processing tasks. CPU RAM OSU PCU

CPU

Gigahertz is a common unit of measurement describing a computer's _____. hard drive speed CPU clock speed Internet access speed ability to multitask

CPU Clock Speed

What language is used to control the colors and fonts of a web page? CSS XML Python C++ HTTPS

CSS

The keyboard shortcut to insert a page break is _____. SHIFT + ENTER INSERT + ENTER CTRL + ENTER CTRL + PAUSE/BREAK

CTRL + ENTER

_____ will move the insertion point to the very end of the document. CTRL + PAGE DOWN CTRL + E CTRL + DOWN ARROW CTRL + END

CTRL+END

Windows passwords, like most password systems are ______, meaning ALincoln12 is different than alincoln12. capitalization insensitive case sensitive hybrid sensitive alt insensitive

Case Sensitive

The _____ is a temporary storage space in your computer's memory, used when you copy or cut something. Notepad virtual memory cache Correct Clipboard

Clipboard

_____ is developed and sold for profit through retail stores and Web sites. Commercial software Public domain software Shareware Setup software

Commercial Software

While working on a presentation, pressing _____ on the keyboard will create a new slide with the same layout as the current slide. Control + M Control + S Control + N Control + L

Control + M

_____ include information to authenticate your identity when you log on to a Web site or an Internet service. Usernames Credentials VoIP Protocols

Credentials

A(n) ____ translates the Web address to an IP address and directs your Internet connection to the Web site. TCP/IP WiMax IP DNS

DNS

A(n) _____ file is one you create when working with an application. data application system executable

Data

_____ is a collection of raw, unprocessed facts, including text, numbers, images, and video. Data Software Peripherals Information

Data

A(n) _____ is an economic gap between those who are computer literate and enjoy access to computer technology and those who do not. exponential break tech trough digital divide information dead zone

Digital Divide

_____ is a security method that encodes data so that only authorized people can access it. Masking Partitioning Encryption Fragmentation Biometrics

Encryption

Based on the image, if the user presses _____, a new bullet item will be created. Shift + Tab Enter Tab Control + Enter

Enter

A defragmenter removes malware from your hard disk. True False

False

Flash memory is the most common type of volatile memory, which loses it contents when you turn off the power to the computer. True False

False

The best way to uninstall a Windows desktop application is to delete its program folder and then empty the recycle bin. True False

False

The purpose of application software is to operate and control computer hardware by running utility programs. True False

False

A computer user has 2.5 gigabytes of data they want to store. How many blank CD-R discs will they need? one disc two discs three discs four discs five discs

Four Discs

Tablets and smartphones rely on a _____, that shows icons to represent programs and utilities. UNIX HDMI GUI Windows RT

GUI

Which of the following is NOT a popular operating system? Google Chrome Mac OS X Android Windows 10

Google Chrome

_____ is the main language used to create web pages. HTML CSS JavaScript Python

HTML

Fragmentation over non-contiguous sectors is a condition that effects your computer's ______. hard drive CPU memory CD or DVD storage LCD display

Hard Drive

Which of the following power states will have the OS save data to the hard drive, minimizing risk of data loss? [choose all that apply] comatose sleep hybrid sleep hibernation

Hybrid Sleep Hibernation

156.33.195.33 is best described as a(n) _____. TCP address IP address MAC address Packet Address

IP address

Each device connected to the Internet has a(n) _____ and is how one machine can find another through the massive network. FTP address TCP address IP address HTTP address

IP address

My Internet access is provided by Bend Broadband. Bend Broadband can best be described as a(n) _____. IR ICANN WAN ARPA ISP

ISP

A user can add shapes and smart art to a PowerPoint slide from the _____ ribbon. Insert Design Objects Add-ins

Insert

_____ images use a lossy compression, meaning they can have small file sizes but they will degrade with repeated saving. PSD BMP GIF PNG JPG

JPG

What type of computer component is often described as qwerty? LCD or plasma monitor optical mouse keyboard solid state drive magnetic drive

Keyboard

A company would most likely use a(n) _____, which is a collection articles, to provide help to customers about using their computer equipment. discussion board online forum knowledge base thread count distribution list

Knowledge Base

A computer user relying on OS X is most likely using a(n) _____. iPhone Mac Linux computer PC-compatible tablet current e-book reader like the Nook or Kindle Fire

Mac

_____ refers to any software that is designed to cause damage to a computer, server, or network. Trojan horse Malware FTP client Keylogger

Malware

A computers RAM is also correctly referred to as its _____. speed storage bandwidth memory

Memory

iOS and Android are best classified as _____ operating systems. mobile personal multi-user network

Mobile

Which of the following is NOT a modern-day web browser? Edge Mosaic Chrome Safari

Mosaic

____ is a fraudulent attempt to steal personal information to commit identity theft. Socketing Skimming Phishing Spoofing

Phishing

The combination of the operating system and the hardware is a(n) _____. platform system unit CPU model peripheral device

Platform

_____ are optional software apps that add functionality to a web browser. NetBeans Packets Cookies Plug-ins

Plug-ins

Terms like multi-core, dual-core, and quad-core are often used to describe a computer's _____. monitor/display hard drive memory processor video card

Processor

The _____ is the main set of commands you click to execute tasks. It is organized into tabs and groups. quick access toolbar command bar ribbon menu bar

Ribbon

Web-based tools like Google Documents, Office 365, and Yahoo Mail are examples of _____. ISP FTP SaaS SMS

SaaS

Terms such as cell, formula, and function are most commonly associated with _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications

Spreadsheet Applications

_____ is(are) different than a normal computer virus and is designed to track your Internet habits and nag you with unwanted sales offers. Spyware Logware Decepticons Cookies

Spyware

Applications have specific _____, which are hardware characteristics such as the amount of memory. version numbers device drivers multitasking requirements system requirements

System Requirements

The _____ is displayed in the notification area of the taskbar and usually reflects the time zone of your current location. system time Windows time Administrator time notification time

System Time

Based on the image, if the user presses _____, the current bullet item will become a smaller, sub-bullet. Shift + Tab Shift + Enter Control + Enter Tab

Tab

The name of the L-shaped button the left side of a word document.

Tab Stop

Person A send a document to Person B for editing. Person B uses _____ so that Person A can review the edits and decided to accept or reject them. Track Changes Section Breaks Duplexing Document Encryption

Track Changes

_____ for a video is similar to crop for an image. Frame rate Annotate Buffer Trim

Trim

What quick trick will select a paragraph? Double-click anywhere in the paragraph. Triple-click anywhere in the paragraph. Ctrl + click anywhere in the paragraph. Alt + click anywhere in the paragraph.

Triple Click

If you are searching files on a hard drive, Windows searches the file contents as well as the filename. True False

True

A(n) _____ is a network service that enables remote users to access their work network securely. VPN ISP IPS IPv6

VPN

Which of the following use radio signals to transmit data? RFID WiFi Fiber Optic Ethernet

WiFi RFID

Linux is an alternative to _____. Chrome Windows Photoshop iPhone 6s

Windows

_____ is an example of system software. Spotify Firefox Microsoft Office Windows

Windows

Regarding columns, which of the following statements is NOT accurate? You must format the entire document in the same number of columns. You can control the space between columns. You can set different column widths for different columns. You can display a line between columns that is not a paragraph border.

You must format the entire document in the same number of columns.

A(n) _____ cell reference will not change when a formula that uses this type of reference is copied or filled into other cells. relative locked permanent absolute

absolute

The notes pane for a slide/presentation is used to _____. add speaker notes for the presentation provide footnote information (like in Word), allow the audience to click an see more information about a topic. provide a text transcript of the presentation for users with disabilities. record the animation sequence if animation is used on the slide

add speaker notes for the presentation

Nonprinting characters include _____. paragraph markers section breaks tab marks page breaks all of the above

all of the above

The status bar for a Word document is generally found _____. across the top of the application window down the right side of the application window down the left side of the application window along the bottom of the application window

along the bottom of the application window

The status bar for a Word document is generally found _____. across the top of the application window down the right side of the application window down the left side of the application window along the bottom of the application window

along the bottom of the application window

Values used by a function are called _____. conclusions arguments attributes logic order

arguments

The FV function returns a value that can be the _____. balance after a certain number of payments monthly payment interest earned on a savings account payback period

balance after a certain number of payments

Downloading movies and music over the Internet requires more transmission capacity--______--than e-mail or other text files. bandwidth frequency throughput streaming protocol

bandwidth

You can edit existing data ______. directly in the cell in the Formula bar both A and B are correct neither A or B are correct

both A and B are correct

Coaxial and twisted-pair describe two types of _____ used in computer networks. servers networks routers cables

cables

The _____ is the column letter followed by the row number. cell reference cell name cell position cell label cell coordinates

cell reference

Models of buildings, products, and other products are aften planned out with _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications

computer-aided design applications

A(n) _____ is a small text file that a web site's server puts on your computer to store information about you and your preferences. keylogger cookie spam spyware

cookie

Brochures, magazines, and newspapers are best created and formatted with programs like InDesign and QuarkXPress, which are _____. desktop publishing applications spreadsheet applications photo editing applications computer-aided design applications document processing applications

desktop publishing applications

Which of the following is NOT the accurate symbol for the math function? addition + subtraction - multiplication * division \ percent %

division \

Portrait and Landscape refers to _____. document orientation background graphics WordArt layout Font styles

document orientation

The @ symbol is an essential part of a(n) _____. e-mail address URL IP address web address

e-mail address

Microsoft Outlook is best described as a(n) _____. document management system web development application e-mail application database application

e-mail application

docx, xlsx, and mp4 are common _____. encryption methods document formats file extensions media files

file extensions

Which of the following is a common biometric security method? SSL 10-character password fingerprint RFID

fingerprint

Computer networks are generally protected behind a _____. packet switcher secure socket layer router firewall

firewall

Superscript and subscript are formats generally used for _____. fonts paragraphs WordArt images

fonts

When there is information that needs to be explained but does not belong in the body of the paper, _____ should be used. Answers: headers or footers works cited or document notes footnotes or endnotes bibliogrophies or indexes

footnotes or endnotes

The lines between cells that display on screen but not in prinouts by default are called _____. gridlines borders bounderies row and column lines

gridlines

When the first line of a paragraph is to the left and other lines of the same paragraph are shifted more to the right, a _____ is being used. Answers: left indent hanging indent block indent first-line indent

hanging indent

View buttons to transition to slide show or slide sorter, are found _____. in the upper-left corner in the lower-left corner in the lower-right corner in the upper-right corner

in the lower-right corner

A large business can use a(n) _____ network system that behaves like the Internet, but it is isolated from the rest of the Internet. LOPSA intranet proxy server client-server matrix

intranet

Software that is open-source _____. doesn't require installation and is available completely web-based (cloud-based) can be easily scalable from small business to large companies is available to anyone to use for free and modify into alternative versions is free for students and instructors in an academic setting, but not for business is in beta release and is available to testers and early adopters to review and refine

is available to anyone to use for free and modify into alternative versions

In the address: http://money.cnn.com/2015/03/31/technology/surface-billion-dollar-writedown/index.html, which part best represents the domain? http://money.cnn.com/ http:// money.cnn.com 2015/03/31/technology/surface-billion-dollar-writedown/ index.html

money.cnn.com

Which of the following devices are best described as peripherals? [There are two responses which can be counted as correct. Pick either one as your response.] CPUs keyboards hard drives monitors

monitors or keyboards

Peer-to-peer and local area are two popular types of ______. web servers software applications networks e-mail systems

networks

Duplex printing allows a user to print _____. a document with central binding (like a book) on two different printers at once on both sides of the page two copies of the document at the same time

on both sides of the page

Keyboard shortcuts such as CTRL + E and CTRL + R are useful when you want to change the _____. paragraph alignment page numbering entitity references font size and font weight

paragraph alignment

If you want to demonstrate how the values in a column of numbers contribute to the column's total, use a ____. clustered column chart pie chart 3-D column chart line chart with markers

pie chart

PowerPoint creates ______ on the slides, prompting the user for information and allowing them to click and type up titles and content. placeholders Control Boxes Input Boxes WordArt

placeholders

A(n) ______ is a method of publishing files (primarily audio files) to the Internet that can be downloaded for playback on a computer or portable device. VoIP vimeo podcast FTP

podcast

In a slide show, to advance to the next slide do any of the following except _____. press the Esc key on the keyboard press the Spacebar on the keyboard Click the down arrow button on the keyboard. click the mouse button

press the Esc key on the keyboard

A set of rules that machines follow to complete tasks is best described as a(n) _____. node protocol tocolclient hardware

protocol

If a financial function like PMT or FV uses nper and rate as arguments, both nper and rate must use the _____. same cell address same currency format same unit of time absolute cell address

same unit of time

Webcrawlers and spiders are tools commonly used by _____. search engines internet service providers computer hackers chat messaging services

search engines

Ctrl + A is a quick way to _____. scroll through common fonts align selected to text to the left select an entire document adjust all margins to 1 inch

select an entire document

A(n) _____ provides a quick way to perform an action such as opening a folder or a file. pin title shortcut arrow icon

shortcut

An e-mail program can automatically add a block of text to the bottom of new messages. Often containing the sender's name and contact information, this is called a(n) _____. signature footer block quote footnote

signature

An image inserted into a PowerPoint slide will include ______ on all four sides of the image. crop handles rotation handles move handles sizing handles

sizing handles

The _____ would be ideal for changing the location of information in the header and footer of each slide. slide master modify styles pane footer format pane slide sorter

slide master

Transitions are seen by the audience when moving from _____. shape to shape text to slide slide to slide slide to shape

slide to slide

Word has built-in formats for headings and normal text called _____ that include font, font-size, alignment, weight, color. design sets templates format paintings styles

styles

A(n) _____ is a device that performs the same tasks as a hub, but it works much faster. firewall switch skimmer DSL

switch

Leaders are most often used with _____. footnotes tables containing both text and numbers bibliographies tabbed lists in two or more columns

tabbed lists in two or more columns

SMS is most closely related to _____. Skype text messaging web page security podcasting

text messaging

The outline view replaces the _____ on the left of the presentation with an outline format. speaker notes thumbnails nailstheme gallery font options

thumbnails

A(n) _____ is a computer program that claims to do one thing but instead (or also) does something else--something bad. trojan horse image mask canvas worm

trojan horse

When logging into my Google account from a new computer, I also need to enter a code that is sent to my phone via text message. This is an example of _____. two-step verification biometric security random access protocol hypertext transfer protocol

two-step verification

The pictured device is most accurately described as a(n)

uninterruptible power supply (UPS)

The second argument of an IF function is _____. the criterion the second input number what to display or do if the criterion is false what to display or do if the criterion is true

what to display or do if the criterion is true

To switch to a different worksheet in a workbook, click the _____ at the bottom of the worksheet window. new sheet button worksheet tab worksheet button next worksheet button worksheet slider

worksheet tab

if the user presses _____, the current bullet item will become a slide title. Tab Control + Enter Shift + Tab Shift + Enter

Shift + Tab

Right-clicking an icon on the desktop generally display a(n) _____. expansion card sub menu context tab shortcut menu

Shortcut Menu

Right-clicking an icon on the desktop generally display a(n) _____. expansion card shortcut menu sub menu context tab

Shortcut Menu

_____ is the only way to end a computer session by turning off the power to the computer. Locking Shutting Down Warm booting Signing out

Shutting Down

Which of the following is NOT generally classified as a social media site? Instagram Twitter Facebook Skype

Skype

If you need to regorganize several slides in a presentation with 30 or more slides, it is best to use the _____ view. Slide Sorter Outline Normal Slide Master

Slide Sorter

Adding _____ to a slide allows for easy inclusion of things like flow charts, heirarchy diagrams, and process diagrams. Charts/Graphs AutoShapes WordArt SmartArt

SmartArt

_____ is a good option in PowerPoint for adding process and hierarchy diagrams. Answers: WordArt SmartArt Shapes Charts

SmartArt

A(n) _____ uses flash memory technology to store data as an electrical charge rather than in a magnetic field. mechanical hard drive optical drive Blu-ray disc solid-state drive

Solid State Drive


Set pelajaran terkait

Auditing Chapter 19 Multiple Choice

View Set

Unité 4. Lire, c'est s'envoler ailleurs.

View Set

Human Anatomy: Chapter 5 Integumentary System

View Set

Advanced Computer Science Chapter 1

View Set

Human Nutrition and Wellness Exam Ch 1-4

View Set

Ag. Econ Chapter 1 Review Questions

View Set