COMPUTER TECHNOLOGY PRACTICE QUESTIONS DAVIS COUNTY SCHOOL DISTRICT

typoweheeElectronics - Devices

Nov 8, 2013 (3 years and 11 months ago)

225 views

COMPUTER TECHNOLOGY PRACTICE QUESTIONS

DAVIS COUNTY SCHOOL DISTRICT

(submitted by Computer Technology Teachers)


This word document was downloaded from
http://www.worddocx.com/

please remain this
link
information w
hen

you

reproduce , cop
y
, or use

it.

<a href='http://www.wordwendang.com/en'>word documents</a>



March 2004



The following questions cover all seven modules of the

Computer Technology Class.



Module 1: Electronic Mail


An ISP is:

a)

A program to elimin
ate spam on your email

b)

A service provider for an internet connection

c)

An interest savings program

d)

An internet service personnel organization


List the meanings of the five domain names listed below:

Com:



Edu:



Int:



Mil:



Org:




SPAM is:

a)

An electronic

message system used in Mongolia

b)

The first electronic message from outer space

c)

Unsolicited mail

d)

The most fragile element on the CPU


Sending and receiving electronic messages on the Internet is called:

a)

Web pages

b)

E
-
Mail

c)

Links

d)

Search Engines


The accepted ru
les of conduct on the Web when using E
-
Mail or a chatroom are called:

a)

Manners


2

b)

Etiquette

c)

Netiquette

d)

None of the above


T
/F___
:)
and

:(
are symbols that represent emotions in an Email message


G2G

is an example of a/an:

e)

Emoticon

f)

Acronym

g)

SPAM

h)

GUI


An example
of an ISP in an Email address is:

a)

@hotmail

b)

net

c)

msmith

d)

none of the above

T



F


You can only attach one document to an email.



Module 2: Computer Basics


The first generation of computers were powered by ________________.


UNIVAC played an important role
in predicting the outcome of who’s presidential
election.


A CPU is an acronym for:


a)

computer programming universe


b)

central processing unit


c)

community proprietary uniform


d)

central programs unvarying


Which of the following applications is best
suited for organizing files on your computer
in Windows?

a)

Accessories

b)

Windows Explorer

c)

System Tools

d)

Scandisk


Which command prepares a disk for use on your computer?

a)

Copy

b)

Label

c)

Select Drive

d)

Format


3


Which feature allows you to switch between several open app
lications?

a)

Menu bar

b)

Taskbar

c)

Program Manager

d)

Help


This symbol indicates that Windows is processing.

a)

Pointer

b)

Hourglass

c)

Ellipsis

d)

Asterisk


Which is not true of Main Frame computers?

a)

Expensive

b)

Very Large

c)

Use by businesses

d)

Also known as Personal Computers


A p
ortable computer small enough to use on one’s lap, is a…


A. Handheld C. Desktop microcomputer


B. Mainframe D.
Laptop or Notebook


Compact enough to be used or operated while being held in

the hand or hands, is a...


A. Server C. Data


B. Mainframe D.
Handheld


A desktop computer that is conventionally considered to be more powerful than a
microcomputer is a...


A. Laptop

C. Mainframe


B.
Workstation

D. Data


The process of starting up a computer from a halted or powered
-
down condition is a…


A. Information C. Data


B.
Boot Process

D. Base 2 binary code


Base 2 binary
code is…..


A.
A

numbering system with only two digits


B. Useful information that leaves the system (i.e., processed information)


C. Information that is created or collected and fed into the system


D. Facts used
by a computer


Where does a device input data?

a)

The motherboard

b)

Into a folder

c)

The computer


4

d)

Onto a disk

What is the Acronym for Central Processing Unit?


Operating systems like Windows 98, Windows XP, DOS, and Linix are the
_______________ that tell the com
puter how to work, how to run the programs or
applications, and how to process the information provided by input devices.


You could
say that this type of software is the master controller for all the activities within the
computer.



Applications or prog
rams are specialized instructions for the computer that tell the
computer how to do specific tasks.



Name three of the applications that we have used in
this class.



Input devices include all of the following except a _______________ which is an output
device.



a.

Keyboard

b.

Vice Activated Devices

c.

Mouse

d.

Joystick

e.

Scanner

f.

Printer


The hardware of the computer includes all of the following except _________which is
software.


a.

CPU

b.

Processor

c.

Mother board

d.

Power supply

e.

Video Card

f.

Memory Chip

g.

W
ord


The

monitor is considered an output device. The screen of a monitor is made up of tiny
little bits of light.


What are the tiny basic units used on a screen
called?_________________________



The language that the computer uses is comprised of 0’s and 1’s.


This basic computer
code is called _________________language.


5




Storage Capacity is expressed in units of the decimal system.


Some of the common terms
used are:

1.

Bit
-

A fundamental unit of information having just two possible values, as
either of the b
inary digits 0 or 1.


2.

Byte
-

A sequence of adjacent bits, usually eight, operated on as a unit by a
computer.


3.

Kilobyte
-

A unit of computer memory or data storage capacity equal to
1,024 (2
10
) bytes. One thousand bytes.

4.

Megabyte
-

A unit of computer memory
or data storage capacity equal to
1,048,576 (2
20
) bytes.


5.

Gigabyte
-

A unit of computer memory or data storage capacity equal to
1,024 megabytes (2
30

bytes).

6.

Terabyte
-

A unit of computer memory or data storage capacity equal to
1,024 gigabytes (2
40

bytes).































































What is the smallest unit of storage ________What is the largest unit of
storage________________?


T

F


The hard drive (C: drive) of a computer is a
rigid magnetic disk mounted
permanently in a

computer.



T

F


WorkStation is a desktop computer that is conventionally considered to be more
powerful than a microcomputer




T

F

A desktop microcomputer is a small computer based on a microprocessor.



T

F


Laptop or Notebook
-
A portable computer that
is not small enough to use on one's
lap.






T

F


Su
percomputer
-
A mainframe computer that is among the largest, fastest, or most
powerful of those available at a given time.





T

F


Mainframe
-

A large powerful computer, often serving many connected termi
nals
but not usually used by large complex organizations




T

F


Server is a computer that processes requests for HTML and other documents that
are components of web pages.




6


________________is a term meaning that a computer can do more that one thing at
a
time, or have more than one program open at a time.


___________________is a name given to images that represents an executable file or a
command.


A plural word for disks, tapes, CD’s, DVD’s, or other devices that hold data:

a)

CD

b)

Medium

c)

Media

d)

DVD


All dev
ices that are located outside of the computer, but are connected to the system unit
(usually by cable) are called:

a)

Input devices

b)

Output devices

c)

Peripheral devices

d)

Storage devices


The ability to run more than one application at a time is called:

a)

Minimize

b)

M
aximize

c)

Restore

d)

Multi
-
tasking


A Megabyte refers to:

a)

Computer Speed

b)

Monitor Resolution

c)

Computer Memory

d)

Boot Process


The two basic types of computer software are ________and ___________.

a. program, applications

b. productivity, applications

c.

APPLICAT
IONS, SYSTEMS

d. systems, networking systems


All of the following are types of ports except __________.




a. MSO



c. SCSI




b. USB




d. MIDI




7

Module 3: Word Processing


Word is a ________________ program used to create documents such as letters and
reports.


The ________________ displays the name of the current document.

The bar at the bottom of the page that shows all the software applications you currently
have open is called the ___________________ bar.


A function where words can be moved from on
e point to another is called:


a)

move and replace


b)

send and retrieve


c)

scissors and clipboards


d)

cut and paste


Wordwrap means that you must:

a)

Press enter at the end of the line.

b)

Press the wordwrap command to continue typing.

c)

Stop typing where you w
ant the text to end and place the insertion point on the
next line.

d)

Keep on typing and Word automatically moves to the next line.


In Print Preview, how can you get a close
-
up view of a page?

a)

Click the close button.

b)

Click the one page button.

c)

Click the pri
nt preview button.

d)

Click the page with the magnifier button.


To justify text means that:

a)

text is centered.

b)

text is lined up evenly on both the right and left margin.

c)

text is lined up on the left margin.

d)

text is lined up on the right margin.


The keystroke

to get the insertion point to the beginning of the line is:

a)

End

b)

Home

c)

Insert

d)

Alt+Home


When you quadruple space in a word processing document,

a)

there are 4 blank lines.

b)

begin typing on the 5
th

line.

c)

enter 3 times.

d)

there are 3 blank lines.



8

T

F

You can paste

the contents of the clipboard as many times as you wish.

T

F

If you want to add shapes, use the drawing toolbar.





What is this called in a letter?


a)

Graphic

b)

Footer

c)

Letter head

d)

Font

The storage
that is a temporary storage area that can hold selections
of cut or copied text
is called the ___________________


When you have files that are similar in nature it is more efficient to store them in a
__________like you were instructed to do to your Bus Docs and Excel.




The way that you can select more than

one adjacent file to open at a time is to click the
first file wanted with the mouse, and then hold down the _____________key and select
the last file wanted.



What feature would you use to save a file under another name?___________________



When creat
ing your reference page, what type of indenting would you use for your
references?


_______________________



To open a document, what menu item would you use?


_________



When you want to remove a selection out of your document and place it in another

area
of the document, what features in Word would you use?


______________________





When you want to copy a selection of your document and place it in another area of the
document, what features in Word would you use?


___________




When you copy tex
t or cut text out of a document, where does the text go until it is
pasted?



__________________________________



An easy way to set tabs and margin stops is by using the _______________at the top of
the document window.




T

F


“Spell Check” can find mi
sspelled words, double words, unusual names and
missing words.






Pictures inserted into a Word document are called ______________.


9








In Block Style letters, what is the alignment of the whole letter?



a.

Right


b.

Left


c.

Centered


d.

Justified (Full)



What

is the feature in Word that will move text to the next line as the typist continues to
type but does not depress the enter key?__________________




T

F

Bold
and
Italics
are used in documents to call special attention to certain words or
information that

the creator deems important for the reader to pay special attention to.






A boundary around the document of blank space at the top, bottom, left, and right is
called the ___________________.


This space area can be changed by going to File, page
setup,

and then to the labeled tab.




What is the default for the left and right margins in Word?_________




What is the default for line spacing in the Word documents?__________



When one wants to create aligned lists of text, what is the best feature to u
se?


a.

Space bar


b.

Shift key


c.

Tabs

d.

Sort


An internal citation is:

a)

A long quote within a report.

b)

A traffic ticket.

c)

Book information listed on a Works Cited page

d)

A reference within a report giving an author credit for quotes used.


Which of the following are e
xamples of correct internal citations:

a)

(Jones 32)

b)

(Soto and Gonzales 503)

c)

(78)

d)

All of the above.



10

(*** Note

the above may be confusing because of answer c. Remember that if the
author’s name is included in the paragraph, you do not include their name in t
he internal
citation

only the page number).




An example of a salutation is:

a)

Dear Mr. Allen

b)

Sincerely

c)

Modified block style

d)

None of the above


Open punctuation means:

a)

A comma after the salutation and complimentary closing.

b)

No punctuation after the salutati
on or complimentary closing.

c)

A colon after the salutation and a comma after the complimentary closing.

d)

No punctuation in the inside address.


The Menu Bar:

a)

Displays the Document name & name of program

b)

Includes what line page, and space you are on

c)

Contains
buttons that quickly apply things like bold, italics and underline

d)

Contains a list of pull down options to choose from


MLA is a style of





a.


memo.





b.


business letter.





c.


report


Report bodies should be





a.


single spaced.





b.


triple s
paced.





c.


double spaced





d.


quadruple spaced.



Cover pages have





a.


their own page





b.


a page shared with the bibliography.





c.


no place within an MLA report.





d.


are too weird to use.


The upper triangle at the left edge of the r
uler indicates the

a.

left indent marker


11

b.

decrease indent marker

c.

first
-
line indent marker

d.


hanging indent marker


Module 4: Spreadsheets


List three things a spreadsheet can do for you.

1.

2.

3.


What is Excel?



On a worksheet, the cell that has the dark
border around it is known as:

a)

the dark border cell

b)

the active cell

c)

the format painter cell

d)

the past special cell


A1 is the location of the intersecting column and row on the top left of the worksheet.
These coordinates are called:

a)

cell addresses

b)

cell loc
ators

c)

status lines

d)

formula locators


The dark border that highlights the cell you are working in is called the:

a)

cell address

b)

cell

c)

status line

d)

cell pointer


Which is an example of a properly formatted function?

a)

=(SUM)B12:B15

b)

=SUMB12:B15

c)

=B5+B6+B7+B8

d)

=SUM(B1
2:B15)


What is one way to rename the sheet tab?

a)

Double
-
click the status bar

b)

Click the Name box list arrow with the right mouse button

c)

Double
-
click the sheet tab

d)

Click the Name Sheet Tab button



12

Which of the following represents the multiplication operator
?

a)

*

b)

/

c)

+

d)

@

What is the name for the vertical information that is labeled A, B, C, etc.?

a)

Columns

b)

Rows

c)

Data

d)

Worksheets


T

F

The x in the formula bar is called the cancel button.

T

F

Values are numbers used in calculations.

T

F

A range is defined as one or mor
e cells.

T
F

Moving and copying data are the same thing.


In spreadsheets what does this symbol (*) stand for?

a)

Star

b)

Divide

c)

Multiplication

d)

Subtraction

What commands would one use to control the appearance of the spreadsheet?___

a.

Formatting Commands

b.

Graphic
Commands

c.

Chart Command

d.

Dimension Commands


When using charts, what does the legend indicate?_______________



What mathematical operation does the following symbols perform:


a.

*

_________________


b.

+

_________________


c.

-

_________________


d.

/

________________
_


T

F


Excel, Quattro Pro, and Lotus are all spreadsheet programs.


These software
programs use landscape as the default display. (11 inches wide, 8.5 inches tall).




What type of charts are best suited to show comparisons.__________

T

F


Charts can be
inserted into a spreadsheet using data from the cells of the
spreadsheet to create the chart.




13

Values are:

a)

Column Headings

b)

Numbers

c)

Calculations

d)

Text entries

What are the three types of information that can be typed in a cell

a)

Database, Forms, Charts

b)

Sum
, Average, Count

c)

Values (numbers), Labels (text), formulas

d)

Operators, Functions, Arguments


T



F



A series of number signs (######) appearing in a cell indicates that the data is
wider than the column.


Module 5: On
-
Line Information Resources


What is a

URL?


Name the four parts of a URL address scheme.

1.



2.



3.



4.




URL stands for:

a)

uninformed reality listings

b)

unusual reasoning lines

c)

uniform resource locater

d)

unidentified roaming liaisons


Text or graphics used in a web document to jump to another
site or page are called
_____________.

a)

Hyperlinks

b)

ISP

c)

Browser

d)

URL


http://www.davis.k12.ut.us/dhs

is an example of a(n):

a)

Doc

b)

URL

c)

E
-
Mail address

d)

FTP


Which of the following security issues could cause you prob
lems on the Internet?


14

a)

Unauthorized Access and Use

b)

System Failure

c)

Theft

d)

Right of Privacy

e)

All of the Above

The top bar in the Internet Explorer window displays the name of the web page. This bar
is called ___________________.

a)

Status bar

b)

Title bar

c)

Menu bar

d)

A
ddress bar


T
F

The World Wide Web only uses telephone lines to connect to millions of
computers.


T

F

Google, Lycos, and Infoseek are examples of search engines.


_____________________is a name given to destructive programming that can destroy
files, and
even destroy computers completely leaving them useless.


Some of these
destructive programs have been named such as the Trojan Horse.


Some of the
programming will destroy quietly a bit at a time and therefore have been named “worm.”


The idea of connectin
g computers to “communicate” with others has been around for a
long time. ARPANET was originally created for scientists and government for use in
communication.


Now businesses and all kinds of organizations have systems linking two
or more computers.


Whe
ther it is a LAN, WAN, or Internet, we refer to the linking as
________________________.



Computers that are connected within a confined space such as a school or office building
are an example of:

a)

WAN

b)

LAN

c)

SPAM

d)

ISP


What is hypertext?

a)

WWW stores informati
on in this form

b)

Clicking on a word allows you to be connected to related information

c)

HTML

d)

All of the above


T



F



Boolean operators are only used when writing web pages.




15

Module 6: Presentations


T

F

Each slide should cover at least two topics to be ef
fective
.



Describe the recommended 7X7 rules in formatting slides in a presentation.



Adding sounds and movements to a slide is known as:

a)

transitions

b)

transformations

c)

transporting

d)

transposing


Click this button on the View toolbar to run a presentation:

a)

Normal

b)

Slide

c)

Slide Sorter

d)

Slide Show


Boxes that automatically display when you create a slide are called:

a)

placeholders

b)

text box

c)

graphic area

d)

placebox


When would you use clipart?

a)

to fill space

b)

to enhance the slide

c)

it is an awesome picture

d)

don’t have anyt
hing else to say


An individual screen in a slide show is called a:

a)

slide

b)

placeholder

c)

overhead

d)

picture


In an electronic presentation which view displays miniature versions of slides?

a)

Slide sorter

b) Slide show

c) Slide help

d) Slide Outline


Symbols su
ch as a heavy dot or other character that precede lists in a presentation are
called:


16

a)

Emoticon

b)

Acronym

c)

Placeholder

d)

Bullet


Transitions are:

a)

Bullets & Numbers

b)

Special effect used between slides

c)

Characteristics of an object

d)

Design Templates


Which comman
d do you use to rotate a graphic to any angle?

a.

rotate left

b.

FREE ROTATE

c.

rotate right

d.

circle rotate



Module 7: Ethics


What does AUP stand for?


A virus is shared when a host program is ______________.



A virus can copy itself onto _________________ t
hereby spreading its damaging effects.


Which is
NOT

an example of keeping a computer safe from a virus?

a)

Use a safe Web browser and e
-
mail client.

b)

Install anti
-
virus software, and keep it update.

c)

Scan all newly
-
obtained disks, programs, and files.

d)

Obtain a
nd install all the software your can get, not matter where it comes from.


Rights possessed by the author of a work are called ______________________.

a)

Copyright

b)

Plagiarism

c)

Security

d)

Ethics


Getting into computer systems without proper access rights is calle
d _______________.

a)

Hacking

b)

Viruses

c)

Ethics

d)

Web Surfing



17

TRUE OR FALSE Information about you that can be published without your permission
includes your full name, home address, phone number, debts you owe, court judgments
against you, and courses you have
taken.


TRUE OR FALSE Messages that continue after the recipient asks that they stop are
defined as a nuisance, but they are not illegal.


TRUE OR FALSE Acceptable Use Policies are legal documents that should be
understood and followed.


TRUE OR FALSE C
hase just purchased a new computer game. He loaded the game on
his computer and his friend’s computer. This is legal, but not ethical.


TRUE OR FALSE Information ethics are the rules of right and wrong behavior in the
computing professions.


TRUE OR FAL
SE It is acceptable to copy software if it does not have a copyright notice
or © symbol on it or the package.


TRUE OR FALSE When you buy software, you are not buying the software itself. You
are buying a license to use the software.


TRUE OR FALSE Cop
yright laws have “fair use” provisions that let you paraphrase or
quote small portions of someone else’s work without any restrictions.


MULTIPLE CHOICE: Select the best answer from the choices.


Malia Smith, owner of ABC Company, hires Shayli Jones to de
velop a software program
for ABC Company. Who owns the copyright?

a)

Malia Smith

b)

Shayli Jones

c)

A software program does not have a copyright.

d)

Whoever applies for the copyright first with the copyright office.


What document is used by many educational institut
ions that governs the use of
computers and networks?

a)

Educational Computer Plans

b)

Permission to Use Form

c)

Acceptable Use Policy

d)

Ethical Computer Use Agreement


Sam found some great information on the Internet for a report he was writing. He used
the copy and

paste feature on his computer to put it in his document, but did not give
credit. Sam is:

a)

using the computer effectively by applying cut and paste principles.

b)

using the Internet efficiently.


18

c)

committing plagiarism.

d)

referencing incorrectly.



What is NOT a

way to help avoid a virus?

a)

Install a firewall program.

b)

Copy the host program.

c)

Use a safe web browser and e
-
mail client.

d)

Scan all newly obtained disks, programs, and files.


What is a type of electronic infection?

a)

Viruses

b)

Worms

c)

Trojan Horses

All of the abo
ve are types of electronic infections


T

F

Ethics are the rules of right and wrong behavior which govern the conduct of an
individual or a group.


In an Acceptable Use Policy which would not be on it?

a) Policies concerning games.

b) Policies concerning P
ersonal web browsing

c) Policies concerning chatting and chat lines

d) Length of time a computer can be used


T

F


Ethics could be described as principles that guide behavior.


When using the
Internet, there are certain rules one should adhere to.


These r
ules or guides for behavior
are not usually laws that have attached penalties.





One of the ethical issues under discussion right now is the illegal use of software, videos,
and music downloaded from the Internet.


Legally, there are some copyright prote
ctions
that companies and creators have to protect their work.


For example, when downloading
software from the Internet, it is legal to install it to your personal computer according to
the license agreement.


Any other uses according to copyright law wou
ld be
___________.






There is software available on the Internet that is free for any one to use.


It is called
___________________




There is software available on the Internet that can be downloaded for a trial period, but
when the uses or time is up
, a person must pay for it to continue using it.


This software is
called ______________.




19




T

F

When using information from a book, the Internet, magazines, or a quote from
someone it would be plagiarism not to give the source proper credit.





Inten
tionally saying information is your idea when it belongs to someone else is called:

a)

shareware

b)

plagiarism

c)

flaming

d)

piracy




Which statement is
incorrect
.

a)

Software developers own their programs.

b)

Software buyers own the right to copy and distribute software t
hey have
purchased.

c)

Freeware is copyrighted software that is licensed to be copied and distributed
without charge.

d)

Shareware software is licensed for copying and sharing for a trial period, but
payment must be made to the owner for permanent use.


T



F



Internet piracy is a question of privacy not property.























This word document was downloaded from
http://www.worddocx.com/

please remain this
link
information when

you

reproduce , cop
y
, or use

it
.

<a href='http://www.wordwendang.com/en'>word documents</a>