Nocti exam

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/243

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

244 Terms

1
New cards

The unauthorized copying of software is referred to as:

Pirated Software

2
New cards

There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what?

Public Domain

3
New cards

The best security for passwords is:

Memorize it

4
New cards

Eight bits equal how many bytes?

1

5
New cards

One megabyte equals how many bytes?

1,048,576

6
New cards

Storing data for the long term is called what?

Archiving

7
New cards

A logical series of instructions given to a computer is called a what?

Program

8
New cards

A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called?

Script

9
New cards

What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome?

Wrist Rest

10
New cards

Which of the following fire extinguishers should be used to put out an electrical fire?

Class C

11
New cards

Of the following printers, which one actually touches the paper to print?

Impact

12
New cards

What is the most popular port that can connect peripheral devices like printers?

USB

13
New cards

A single-sided, single density DVD recordable has a capacity of what?

4.7 GB

14
New cards

In Excel, the intersection of a row and a column is called what?

Cell

15
New cards

A database file that contains all the information about a single entity is called what?

Record

16
New cards

Margin, spacing, and font size are all examples of what?

Formatting

17
New cards

Combining address file data with a form letter is called what?

Mail Merge

18
New cards

What type of a network would you set up for use in a single building?

LAN

19
New cards

A network set up where each computer could be a server or a workstation is called what?

Peer to peer

20
New cards

What is the most common networking protocol?

TCP/IP

21
New cards

The wireless encryption of _ is the weakest encryption used.

WEP

22
New cards

A computer that has malicious software on it that can be controlled by a master computer is called what?

Bot

23
New cards

A simple and inexpensive way to increase network security is to:

Keep all network equipment locked up and limit the number of people who have access - "access control"

24
New cards

Select the most secure password from the list below:

25
New cards

07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98

07SuhBw*36

26
New cards

The slowest connection to the internet is a connection.

Dial-up

27
New cards

Which of the following transmits data using light pulses?

Fiber optic cables

28
New cards

Use Bluetooth technology for connecting:

Wireless accessories

29
New cards

To make it easier for people to get to places on the World Wide Web, a server translates a public domain name into its IP address.

DNS

30
New cards

The OSI networking model contains layers.

7

31
New cards

A national or global network of computers is called a:

LAN

32
New cards

A widely used method to display a network topology is a:

Network Chart

33
New cards

A type of virus that copies itself repeatedly using up system resources is called?

Worm

34
New cards

Entering the statement ("cat and dog"), without the parenthesis will return what results?

Precisely "cat and dog" only

35
New cards

What software is required to access .pdf files?

Acrobat Reader

36
New cards

The general way to transfer files over the internet is to use?

FTP

37
New cards

A/An is an address for a web page or other resource online.

URL

38
New cards

On the World Wide Web, the is also known as the server.

Web host

39
New cards

On the World Wide Web, the is also known as the client.

Web browser

40
New cards

An email address is a combination of a user name and what name?

Domain

41
New cards

When using email software to send an email message, regular recipients are unable to view recipients who have:

Been blind carbon copied

42
New cards

An example of a correct data hierarchy in a database is:

File, record, field, character

43
New cards

When using a spreadsheet to specify a simple arithmetic expression, perform first.

Exponentiation

44
New cards

A feature that allows certain hardware to directly access the system memory and bypasses the CPU is:

DMA

45
New cards

An operating system is:

Software that controls the execution of programs, input/output, resource scheduling, and data management

46
New cards

A secure windows disk file system must use:

NTFS

47
New cards

Software that allows an operating system to communicate with hardware is called a/an?

Device Driver

48
New cards

A router is a device that makes decisions about?

What network path packets should follow

49
New cards

One difference between RAM and ROM is:

That RAM is volatile and ROM is non-volatile

50
New cards

A type of chart designed to analyze and represent tasks involved in completing a given project is known as a:

PERT chart

51
New cards

A chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project.

Gantt

52
New cards

When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a:

Flowchart

53
New cards

A properly attached wrist strap decreases the chance of:

ESD

54
New cards

A technician runs a program to determine the system's reachability across the network.

Ping

55
New cards

Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run?

Tracert

56
New cards

Organizing a solution that proceeds from the general to the specific is called?

Top-down design

57
New cards

A program of logical series of that tell a computer what to do.

Instructions

58
New cards

Input/output devices are also known as?

Peripherals

59
New cards

The term computer ethics, refers to

A person's conduct and behavior as a computer operator

60
New cards

A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the:

Ethernet Cable

61
New cards

Select the most secure password from the list below:

62
New cards

078uhBU*38 ; hbacon68 ; 93niGhkL ; kruystall23

078uhBU*38

63
New cards

When keying a title in the first row of a six-column table, use the option in the table menu to combine and center a title across all columns.

Merge

64
New cards

To resize the chart in a spreadsheet, the user can:

Drag the corner of the chart

65
New cards

A field that uniquely identifies a record within a database is called a/an _ field.

Key

66
New cards

When using a spreadsheet to specify a simple arithmetic expression perform first.

Exponentiation

67
New cards

What type of control function allows for the body of the loop to run a set number of iterations?

For next

68
New cards

What is the default sort order in a database?

Ascending

69
New cards

One component of a database file that contains all the information about a single entity is referred to as/an:

Record

70
New cards

The two methods to consolidate data from multiple spreadsheets are position and:

Category

71
New cards

The term, prioritizing, relates to:

Managing time

72
New cards

Use Bluetooth technology for connecting:

Wireless accessories

73
New cards

A router is a device that makes decisions about:

What network path packets should follow

74
New cards

To navigate to the next cell horizontally and the vertically in a word processing table, press the key.

Tab

75
New cards

The best method to test whether RAM is faulty is to

Replace faulty RAM with working RAM

76
New cards

The two basic ways to retrieve records in most database programs are:

Find command and queries

77
New cards

Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the of September.

fourth

78
New cards

Employees in the ABC Company have limited access to company information. This security measure is called:

Access Control

79
New cards

A set of moral standards for judging whether something is right or wrong is known as:

Ethics

80
New cards

A/An _ is an address for a web page or other resource on the internet.

URL

81
New cards

The crime of occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts.

Identity Theft

82
New cards

In presentation applications, which of the following options is selected to add transitions to all slides?

Apply to all

83
New cards

A file sent with an email message is called:

An attachment

84
New cards

In a spreadsheet application, a reference that refers to the same cell or range on multiple sheets is called:

3-D

85
New cards

During the implementation phase, code is constructed by information gathered during the phase.

Design

86
New cards

A software program that automatically routes unwanted email advertisement and other junk mail to the deleted items folder or email software is called:

Spam filter

87
New cards

A _ would be used for detailed comments at the bottom of every page with a reference in a research document.

Footnote

88
New cards

A high-end cellular phone that combines the functionality of a personal digital assistant and a mobile phone is called a/an:

Smart phone

89
New cards

An input device that is used to identify fingerprints is:

Biometric device

90
New cards

Using adjustable workstations to prevent awkward body positioning, and to meet the unique physical needs of an individual is an example of:

Ergonomics

91
New cards

A function in a spreadsheet program that gives the user a set number of entries to choose from when entering data is:

A drop-down list

92
New cards

For the assistance in exporting a data list from a spreadsheet, the user can use a:

Wizard

93
New cards

The information processing cycle includes:

Input, processing, output, storage

94
New cards

Demonstrating a professional attitude at work involves which of the following characteristics?

Working with others in your group for the good of the company

95
New cards

The process of adding all the numbers in a range of cells can be performed by using a:

Sum function

96
New cards

A GUI program focuses on _-centered design styles.

Beginner

97
New cards

The ____ programming style allows users to interact with the computer via graphics instead of commands.

GUI

98
New cards

Which of the following domains indicated an accredited United States educational organization.

.edu

99
New cards

When developing an online help system, _ allow users to follow along step-by-step.

screenshots

100
New cards

A customized animation effect created by the user for presentations is called

motion path