The unauthorized copying of software is referred to as:
Pirated Software
There are images online that you want to use. The website states that the
... [Show More] images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what?
Public Domain
The best security for passwords is:
Memorize it
Eight bits equal how many bytes?
1
One megabyte equals how many bytes?
1,048,576
Storing data for the long term is called what?
Archiving
A logical series of instructions given to a computer is called a what?
Program
A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called?
Script
What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome?
Wrist Rest
Which of the following fire extinguishers should be used to put out an electrical fire?
Class C
Of the following printers, which one actually touches the paper to print?
Impact
What is the most popular port that can connect peripheral devices like printers?
USB
A single-sided, single density DVD recordable has a capacity of what?
4.7 GB
In Excel, the intersection of a row and a column is called what?
Cell
A database file that contains all the information about a single entity is called what?
Record
Margin, spacing, and font size are all examples of what?
Formatting
Combining address file data with a form letter is called what?
Mail Merge
What type of a network would you set up for use in a single building?
LAN
A network set up where each computer could be a server or a workstation is called what?
Peer to peer
What is the most common networking protocol?
TCP/IP
The wireless encryption of _______ is the weakest encryption used.
WEP
A computer that has malicious software on it that can be controlled by a master computer is called what?
Bot
A simple and inexpensive way to increase network security is to:
Keep all network equipment locked up and limit the number of people who have access - "access control"
Select the most secure password from the list below:
07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98
07SuhBw*36
The slowest connection to the internet is a ______ connection.
Dial-up
Which of the following transmits data using light pulses?
Fiber optic cables
Use Bluetooth technology for connecting:
Wireless accessories
To make it easier for people to get to places on the World Wide Web, a ______ server translates a public domain name into its IP address.
DNS
The OSI networking model contains ______ layers.
7
A national or global network of computers is called a:
LAN
A widely used method to display a network topology is a:
Network Chart
A type of virus that copies itself repeatedly using up system resources is called?
Worm
Entering the statement ("cat and dog"), without the parenthesis will return what results?
Precisely "cat and dog" only
What software is required to access .pdf files?
Acrobat Reader
The general way to transfer files over the internet is to use?
FTP
A/An ______ is an address for a web page or other resource online.
URL
On the World Wide Web, the ______ is also known as the server.
Web host
On the World Wide Web, the ______ is also known as the client.
Web browser
An email address is a combination of a user name and what name?
Domain
When using email software to send an email message, regular recipients are unable to view recipients who have:
Been blind carbon copied
An example of a correct data hierarchy in a database is:
File, record, field, character
When using a spreadsheet to specify a simple arithmetic expression, perform ______ first.
Exponentiation
A feature that allows certain hardware to directly access the system memory and bypasses the CPU is:
DMA
An operating system is:
Software that controls the execution of programs, input/output, resource scheduling, and data management
A secure windows disk file system must use:
NTFS
Software that allows an operating system to communicate with hardware is called a/an?
Device Driver
A router is a device that makes decisions about?
What network path packets should follow
One difference between RAM and ROM is:
That RAM is volatile and ROM is non-volatile
A type of chart designed to analyze and represent tasks involved in completing a given project is known as a:
PERT chart
A ______ chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project.
Gantt
When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a:
Flowchart
A properly attached wrist strap decreases the chance of:
ESD
A technician runs a ______ program to determine the system's reachability across the network.
Ping
Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run?
Tracert
Organizing a solution that proceeds from the general to the specific is called?
Top-down design
A program of logical series of ______ that tell a computer what to do.
Instructions
Input/output devices are also known as?
Peripherals
The term computer ethics, refers to
A person's conduct and behavior as a computer operator
A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the:
Ethernet Cable
Select the most secure password from the list below:
078uhBU*38 ; hbacon68 ; 93niGhkL ; kruystall23
078uhBU*38
When keying a title in the first row of a six-column table, use the ______ option in the table menu to combine and center a title across all columns.
Merge
To resize the chart in a spreadsheet, the user can:
Drag the corner of the chart
A field that uniquely identifies a record within a database is called a/an _____ field.
Key
When using a spreadsheet to specify a simple arithmetic expression perform ______ first.
Exponentiation
What type of control function allows for the body of the loop to run a set number of iterations?
For next
What is the default sort order in a database?
Ascending
One component of a database file that contains all the information about a single entity is referred to as/an:
Record
The two methods to consolidate data from multiple spreadsheets are position and:
Category
The term, prioritizing, relates to:
Managing time
Use Bluetooth technology for connecting:
Wireless accessories
A router is a device that makes decisions about:
What network path packets should follow
To navigate to the next cell horizontally and the vertically in a word processing table, press the ______ key.
Tab
The best method to test whether RAM is faulty is to
Replace faulty RAM with working RAM
The two basic ways to retrieve records in most database programs are:
Find command and queries
Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the ______ of September.
fourth
Employees in the ABC Company have limited access to company information. This security measure is called:
Access Control
A set of moral standards for judging whether something is right or wrong is known as:
Ethics
A/An _____ is an address for a web page or other resource on the internet.
URL
The crime of ______ occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts.
Identity Theft
In presentation applications, which of the following options is selected to add transitions to all slides?
Apply to all
A file sent with an email message is called:
An attachment
In a spreadsheet application, a reference that refers to the same cell or range on multiple sheets is called:
3-D
During the implementation phase, code is constructed by information gathered during the ______ phase.
Design
A software program that automatically routes unwanted email advertisement and other junk mail to the deleted items folder or email software is called:
Spam filter
A _____ would be used for detailed comments at the bottom of every page with a reference in a research document.
Footnote
A high-end cellular phone that combines the functionality of a personal digital assistant and a mobile phone is called a/an:
Smart phone
An input device that is used to identify fingerprints is:
Biometric device
Using adjustable workstations to prevent awkward body positioning, and to meet the unique physical needs of an individual is an example of:
Ergonomics [Show Less]