PoIT final exam
The internet began as-
ARPANET
Hexadecimal notation
Base-16 arithmetic
what is the proper way to write a relative cell address
C4
what is NOT a major computer threat
CAPTCHA
Using capital letters to show where the new words start in a filename is called
CamelCase
Extracting useful information in the form of relationships and patterns
Data mining
used by by the OS to communicate with the hardware
Device driver
Ever expanding progression of technical, economic, and cultural change
Digital revolutions
Changes of technology over time
Evolving technology
What defines the digital middle class
Extensive use of digital devices
how is the insert function dialog box displayed
Formulas-> function library-> insert function
Which event date major hades of the digital revolution
Giant conputers, personal conputer, cloud and computing
what defines a web page
HTML
common connection point for devices in a network
Hub
An emerging technology can be described or identified as-
Innovation of a new field
group of computers that are not in the same room or building, but in the same city
MAN
a logical function
MIN
what is the source to properly cite in formation
MLA
a style guide for formatting , word usage, and other aspects of creating documents
MLS
Which of the following does describe or identify an evolving technology
Medical technology, ebooks, smartphones
What is the current computer classification
Mini frames
technologies that allow text messages
SMS and iM
internet based telephone
VOIP
which key combinations move the insertion point
[ctrl][end]
what is the key combination to navigate to the beginning of a presentation in PowerPoint
[ctrl][home]
WeOf8F@60F is an example of what
a password
most important consideration for purchasing a new computer system
a user's needs
what is used to lock the cell reference in a formula
absolute cell address
currently selected cell
active cell
what do task managers do
analyze what is going on in the system
what values the function needs for the calculation
arguments
providing varying levels of access to information
authentication
what follows
autocorrect
what is displayed by clicking the FILE tab
backstage-view
what makes copies of files in case of loss
backup
what is not a category of typefaces
bold
another name for an unordered list
bulleted list
what is the technique for showing data in a picture-like format
chart
what function must be done for readability statistics to be displayed
check grammar with spelling
what is used to name each cell
column and row
what is the sign off for a letter
complimentary closing
what makes recommendations to the organization for the best system to use
computer system analysis
small text files placed on a computer's hard disk by a website
cookie
what puts a file in a new location while keeping the original file in its place
copy
which of the following is a common formatting for numbers in a spreadsheet
currency, dates, and fractions
what is viewed as the guardian of data
database adminstrator
what are some descriptions of values or information that can be accepted
datatype
what determines the meaning of data entered in a cell
datatype
what is included in a letterhead
date
what always begins a salutation
dear
arranging data largest to smallest
descending order
what are small files that facilitate the communication between an operating system with peripherals
device drivers
what does overusing moving objects tend to do
distract the audience
What maps the numbers & letters of an IP address
domain name
a transmision from the host to client
download
numbered annotations that appear at the end of a document
endnotes
allows individuals to use copyrighted works without permission in limited situations
fair-use doctrine
what is the way in which to limit the data limited
filtering
measure of readability
flesh-kincaid grade level
a preprogrammed formula
function 1
shuts off the system and restarts
hard reboot
What style would be automatically included in the table of content in a microsoft word document
heading 1
how can hacking be legitamate
hiring a hacker to find security flaws in your computer
what is the electronic link between a marked place in a document to another place in the document
hyperlink
what does computer forensics do
identify, discover, and preserve
safe practice to deter identity theft
immediately delete mesages from suspicious senders and NEVER click on unsolicited lines ads etc.
what gives information to a computer
input device
What are the four major hardware components
input devices, output devices, memory, processor
what is the name of the vertical line that shows where text will be inserted
insertion point
something that comes from a person's mind , such as an idea, invention, or process
intellectual property
what are two types of audiences
internal and external
what is primary research
interviewing several people who witness an event
amount of space between two letters
kerning
what test for true or false
logical function
what part of an email contains the necessary information to ensure proper delivery of the message
message header
which computer peripherals provide input
mouse, touch pad, keyboard
guidelines for appropiate behavioron the internet
nettiquette
what is downloading copyrighted material without permission of the copyright holder
online piracy
What are some basic capabilities of a computer
operate peripheral
what dialog box makes changes to the ribbon
options
the way a document is placed on a sheet
orientation
What records the results of computer prcessing
output device
virus or other malware infects the computer and takes control of your web browser
pharming
what type of chart shows relative size of each fractional part of a whole
pie chart
speech, address or demonstration given to a group
presentation
shows exactly how a document will look when printed
print preview
What loads programs and executes them
processing
What is the term for something that cannot be sold copied, or modified by the user
propietary software
what are open source software characterized by
publically programming development
a mode in which a file is open and changes may not be saved
read-only
what happens when you double click on a file
rename
what connects a computer to a network
router
responsible for protecting the computer networks of a company
security analyst
what makes a computer a server
server operating
what are online platforms that promote interaction and sharing
social media
designs computer software, databases
software developer
to arrange files based on their properties
sort
what network topology connects a client to host
star
what should a career plan include
steps on a timeline
What permanently saves information
storage device
What are some good file-management practices
store all data files at the top level of the drive
difficult for both humans and computers to crack
strong password
what is nested within the parent folder
subfolder
network transmission device that checks and forwards packets between parts of a network
switch
what lists major sections and subsections within the report with page numbers
table of contents
presents horizontal locations across the page in a document
tabs
what manages the activities on a computer
the operating sytem
what is a set of specified colors, fonts, and effects
theme
what is the name of the algorithm providing absolute security
there is none
what do project managers need to have
time management
Why are languages used for in computer programming
to gives instructions on a human level
what is the purpose of a CSV file
to share data with other software
type of button that turns a feauture on or off
toggle
what i the method of moving from one slide to the next
transition
Programs written into high-level language are always
translated into machine learning
program invites the user to run it while concealing malicious code that will be executed
trojan horse
what should be checked when editing a desktop publishing project
typefaces
transmission client to host
upload
what should not be used in electronic messages
uppercase letters
online identity of an account holder
username
What temporarily saves information
volatile memory
involves developing color scheme, layout, text, images, and user expierience
web developer
what is used to see what happens if cell data are changed
what-if scenario
What are used in the search box to represent unknown characters
wildcards
a new line within a the cell will be automatically started when the length of the text exceeds the width of the cell
wrap text
