Essays.club - Get Free Essays and Term Papers
Search

Compute - Multiple Choice

Autor:   •  December 12, 2017  •  1,883 Words (8 Pages)  •  623 Views

Page 1 of 8

...

to as reading data, loading data, or __________ a file.

a. processing

b. saving

c. powering up

d. opening

11. One of the most powerful sources of power surges is ___________.

a. faulty wiring

b. downed power lines

c. power grid switching by the electric company

d. lightning

12. Most personal computer systems are equipped with a(n) _________ as the primary input device.

a. mouse

b. joystick

c. keyboard

d. printer

chapter3

1. In a document, __________ refers to the horizontal position of text - whether it is aligned at the left margin, aligned at the right margin, or fully justified so that the text is aligned evenly on both the right and left margins.

a. page layout

b. paragraph layout

c. leading

d. paragraph alignment

2. If you want to look for misspellings in your document, you can use a feature of document production software called a spelling __________.

a. checker

b. tester

c. corrector

d. analyzer

3. The three most popular types of document production software are word processing, desktop publishing, and Web __________.

a. presentation

b. management

c. authoring

d. processing

4. The two main categories of software are system software and _________ software.

a. utility

b. productivity

c. application

d. none of the above

5. When composing a document, you can use the _________ feature to find each occurrence of frequently used words such as "probably." You can then decide whether you should substitute a different word, such as "possibly" or "conceivably."

a. Find and change

b. Search and Replace

c. Search and Edit

d. Search and Rescue

6. If you are dealing with public domain software, you can do all of the following EXCEPT _________.

a. apply for a copyright for it

b. copy it

c. resell it

d. distribute it

7. On PCs, executable programs are stored in files with a(n) _________ extension.

a. .exe

b. .doc

c. .dll

d. .bmp

8. Depending on what you’re looking for, you can purchase various types of software from ___________.

a. mail-order catalogs

b. software download sites

c. your local art supply store

d. all of the above

9. Security experts use the term __________ to describe malicious software that combines more than one type of malicious program.

a. black hat

b. botnet

c. blended threat

d. Trojan

10. A(n) __________ spreads by sending itself to every address in the address book of an infected computer.

a. Trojan horse

b. mass-mailing worm

c. bot

d. RAT

11. Examples of horizontal market software are the following EXCEPT __________.

a. accounting software

b. payroll software

c. job estimating software for construction businesses

d. project management software

12. __________ software is an example of utility software.

a. Graphics

b. Security

c. Desktop publishing

d. Publishing

13. All the files needed for new software are _________ to consolidate them into one large file.

a. reconstituted

b. unzipped

c. uncompressed

d. zipped

14. Both open source and __________ can be copied an unlimited number of times, distributed for free, sold, and modified.

a. public domain software

b. freeware

c. shareware

d. demoware

15. Most database software provides one or more of the following methods for making queries: __________.

a. query by example

b. a query language

c. natural language query

d. all of the above

16. If, during the scanning process, your virus protection software identifies a virus, worm, Trojan horse, or bot in a file or attachment, it can try to remove the infection, put the file into __________, or simply delete the file.

a. the Recycle Bin

b. a quarantine list

c. a Spam folder

...

Download:   txt (13.4 Kb)   pdf (64 Kb)   docx (21.7 Kb)  
Continue for 7 more pages »
Only available on Essays.club