Course Pre-assessment

62 Questions | Total Attempts: 18

SettingsSettingsSettings
Skill Assessment Quizzes & Trivia

This is the course pre-assessment.


Questions and Answers
  • 1. 
    Which of the following is not a type of encryption?
    • A. 

      Hash

    • B. 

      Symmetric-Key

    • C. 

      Asymmetric-Key

    • D. 

      Normal-Key

  • 2. 
    Disabling image loading allows the user to ___________________.
    • A. 

      View all images

    • B. 

      View very few images

    • C. 

      Decrease the transfer time of information between browser and computer

  • 3. 
    What type of file format is PDF?
    • A. 

      Portable Document Format

    • B. 

      Perfect Document Format

    • C. 

      Presentable Document Format

    • D. 

      Preliminary Document Format

  • 4. 
    What is the function of a plug-in?
    • A. 

      To extend a license agreement

    • B. 

      To extend a browser capabilities

    • C. 

      To extend the life of a computer

    • D. 

      To fix a hardware problem

  • 5. 
    In what year was the Internet formed?
    • A. 

      1989

    • B. 

      1985

    • C. 

      1969

    • D. 

      1970

  • 6. 
    What is a collection of rows and columns in a database called?
    • A. 

      Document

    • B. 

      Window

    • C. 

      Table

    • D. 

      Record

  • 7. 
    When discussing computer networks what is a WAN?
    • A. 

      Wide Area Network

    • B. 

      Wide Access Network

    • C. 

      Whole Area Network

    • D. 

      Wide Application Network

  • 8. 
    To connect to the Internet the user will need all of following except?
    • A. 

      Computer

    • B. 

      Printer

    • C. 

      TCP/IP

    • D. 

      Internet Connection

  • 9. 
    What is a row called in a database table?
    • A. 

      Cell

    • B. 

      Field

    • C. 

      Heading

    • D. 

      Record

  • 10. 
    A ____________ is a mix of characters to show emotion in an e-mail.
    • A. 

      Emoticon

    • B. 

      Header

    • C. 

      Footer

    • D. 

      Page Layout

  • 11. 
    Is there a difference between reply and reply all?
    • A. 

      Yes

    • B. 

      No

  • 12. 
    When composing an email is it important to proofread and spell check?
    • A. 

      Yes

    • B. 

      No

  • 13. 
    If you compose an email using your employer’s computer, does your employee have the right to view your email?
    • A. 

      Yes

    • B. 

      No

  • 14. 
    Does a worm replicate itself to consume a computer system’s resources?
    • A. 

      Yes

    • B. 

      No

  • 15. 
    Can the terms virus and worm be used interchangeable?
    • A. 

      Yes

    • B. 

      No

  • 16. 
    What is the purpose of updating an antivirus program?
    • A. 

      To receive a log of the latest computer viruses

    • B. 

      To receive the updated signature files

    • C. 

      To see the viruses on the user computer

  • 17. 
    Which two phases of an IT project overlap?
    • A. 

      Planning/Initiating

    • B. 

      Controlling/Closing

    • C. 

      Executing/Controlling

    • D. 

      Initiating/Closing

  • 18. 
    What are the factors in the Project Triangle?
    • A. 

      Time, Money, and Scope

    • B. 

      Time and Money

    • C. 

      People, Time, and Money

    • D. 

      Customers, Employees, and Money

  • 19. 
    What is Return on Investment?
    • A. 

      Money spent on a project

    • B. 

      Estimated money to spend on a project

    • C. 

      Profits earned on project compared to the money spent on the project

    • D. 

      Money set aside to improve the project

  • 20. 
    What is a difference between a LAN and a WAN?
    • A. 

      A LAN covers a wide geographic area a WAN does not

    • B. 

      A WAN covers a wide geographic area a LAN does not

    • C. 

      A WAN is usually confined to one building or a group of buildings in one city

    • D. 

      All of the above

  • 21. 
    What is ARPA?
    • A. 

      Advanced Research Projects Agency

    • B. 

      Applications Research Projects Agency

    • C. 

      America Research Participations Agency

    • D. 

      None of the above

  • 22. 
    What is the fastest speed available when using an analog modem?
    • A. 

      128 Kbps

    • B. 

      64 Kbps

    • C. 

      56 Kbps

    • D. 

      28.8 Kbps

  • 23. 
    What is another name for bandwidth?
    • A. 

      Internet

    • B. 

      Traffic

    • C. 

      Interface

    • D. 

      Wireless

  • 24. 
    Which of the following is not an electronic mail protocol?
    • A. 

      SMTP

    • B. 

      POP

    • C. 

      IMAP

    • D. 

      FTP

  • 25. 
    This is a security technique to that converts information to an unreadable state.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Authentication

    • D. 

      Digital Certificate

  • 26. 
    Emptying cache will do which of the following?
    • A. 

      Ensure the user get the most current web page

    • B. 

      Speed the process of a virus scan

    • C. 

      Free up disk space

    • D. 

      All of the above

  • 27. 
    When the user sets the internet options privacy level to “block all cookies” this will…
    • A. 

      Block all cookies from all web sites

    • B. 

      Block all cookies from third-parties

    • C. 

      Save all cookies on the user’s computer

    • D. 

      Allow cookies to read by Web sites

  • 28. 
    Which type of compression will loss some file information when compressed?
    • A. 

      Lossless Compression

    • B. 

      Lossy Compression

    • C. 

      Codec

    • D. 

      None of the above

  • 29. 
    Which is the windows standard for audio files?
    • A. 

      AU

    • B. 

      AIFF

    • C. 

      MPEG

    • D. 

      WAV

  • 30. 
    Which of the following is not a standard graphics file format?
    • A. 

      JPG

    • B. 

      GIF

    • C. 

      TIF

    • D. 

      TXT

  • 31. 
    Which of the following is not a search engine indexing method?
    • A. 

      Full-Text Index

    • B. 

      Keyword Index

    • C. 

      Static Index

    • D. 

      Stand Alone Index

  • 32. 
    When a user is using a search engine and wants the results to include both words, which Boolean operator must the user use?
    • A. 

      OR

    • B. 

      NOT

    • C. 

      NEAR

    • D. 

      AND

  • 33. 
    When a user uses “ “ Boolean operator the results must…..
    • A. 

      Include one keyword that is enclosed within the quotes

    • B. 

      Include keywords that appear in the order specified within the quotes

    • C. 

      Include all the keywords that are enclosed within the quotes

    • D. 

      Exclude all the keywords that are enclosed within the quotes

  • 34. 
    What is the slang term for the standard postal service?
    • A. 

      E-Mail

    • B. 

      Snail Mail

    • C. 

      Stand Mail

    • D. 

      None of the above

  • 35. 
    A secure copy provides a secure method of copying files between systems.
    • A. 

      True

    • B. 

      False

  • 36. 
    A(n) _____________________ includes the full path from the system root to a specific page or resource.
    • A. 

      Deep URL

    • B. 

      Absolute URL

    • C. 

      Relative URL

    • D. 

      URL

  • 37. 
    Project management software usually does not contain charts that graphically display project tasks and task durations.
    • A. 

      True

    • B. 

      False

  • 38. 
    What is a programming code that is put in place to fix a computer problem?
    • A. 

      Antivirus Program

    • B. 

      Screen Saver

    • C. 

      Spyware

    • D. 

      Patch

  • 39. 
    In what year was the World Wide Web created?
    • A. 

      1989

    • B. 

      1985

    • C. 

      1969

    • D. 

      1970

  • 40. 
    A drawback of networked computing is that the user information is no longer private.
    • A. 

      True

    • B. 

      False

  • 41. 
    An illicit server enables an attacker to monitor and control the operation of the computer infected with the server code.
    • A. 

      True

    • B. 

      False

  • 42. 
    What is a contract to initiate a project? The contract will list the goals and how the goals will be met.
    • A. 

      Needs Analysis

    • B. 

      Statement of Work

    • C. 

      Project Schedule

    • D. 

      None of the above

  • 43. 
    When discussing computer networks what is a LAN?
    • A. 

      Level Area Network

    • B. 

      Local Area Network

    • C. 

      Less Area Network

    • D. 

      Lower Area Network

  • 44. 
    What is a column called in a database table?
    • A. 

      Cell

    • B. 

      Field

    • C. 

      Heading

    • D. 

      Record

  • 45. 
    Can a database be connected to the Internet to provide information to the users of the Internet?
    • A. 

      Yes

    • B. 

      No

  • 46. 
    Which of following does not happen during the formal project review?
    • A. 

      Testing the Product

    • B. 

      Documenting Lessons Learned

    • C. 

      Evaluating Performances

    • D. 

      Adding Additional Enhances to the Product

  • 47. 
    A ______________________ is a way to refer to information or resources, whether they are on the World Wide Web, on a personal computer system or elsewhere.
    • A. 

      Uniform Resource Identifier

    • B. 

      Uniform Resource Locator

    • C. 

      Wizard

    • D. 

      Home Page

  • 48. 
    Can a database table have more than one primary key?
    • A. 

      Yes

    • B. 

      No

  • 49. 
    To access an FTP server, the user must use what command?
    • A. 

      Open

    • B. 

      Access

    • C. 

      Put

    • D. 

      Get

  • 50. 
    An extranet is designed to allow selected users to gain access to the network.
    • A. 

      True

    • B. 

      False

  • 51. 
    What is the first phase of an IT project?
    • A. 

      Planning

    • B. 

      Controlling

    • C. 

      Closing

    • D. 

      Initiating

  • 52. 
    What is the purpose of the History folder?
    • A. 

      To provide access to Web pages that the user has never visited on the computer

    • B. 

      To help the user send emails

    • C. 

      To view the applications that the user used

    • D. 

      To provide access to Web pages that was viewed on the computer

  • 53. 
    Does browser cache have any effect on the speed of a browser?
    • A. 

      Yes

    • B. 

      No

  • 54. 
    When a user is using a viewer which of the following cannot be performed?
    • A. 

      Viewing a document

    • B. 

      Printing a document

    • C. 

      Editing a document

  • 55. 
    Which of the following is not a file format for video files?
    • A. 

      MOV

    • B. 

      AVI

    • C. 

      QT

    • D. 

      DOC

  • 56. 
    Which type of email response command will allow the user to respond only to the person that sent the message?
    • A. 

      Forward

    • B. 

      Reply

    • C. 

      Reply All

    • D. 

      Next

  • 57. 
    The part the e-mail address that appears to the left of the @ identifies……..
    • A. 

      Domain Name

    • B. 

      IP Address

    • C. 

      User Within a Domain

    • D. 

      E-mail Program

  • 58. 
    An intranet is a network that allows anyone that is using the Internet to access the network.
    • A. 

      True

    • B. 

      False

  • 59. 
    What will allow a user to use a computer at a remote location?
    • A. 

      Virtual Network Computing

    • B. 

      File Transfer Protocol

    • C. 

      Hypertext Transfer Protocol

    • D. 

      Compression Software

  • 60. 
    Can a user that is using instant messaging view the responses immediately?
    • A. 

      Yes

    • B. 

      No

  • 61. 
    Is an instant messaging session secure?
    • A. 

      Yes

    • B. 

      No

  • 62. 
    To manage a project, a person needs to have which of following skill(s)?
    • A. 

      Communication Skills

    • B. 

      Planning Skills

    • C. 

      Organizational Skills

    • D. 

      All of the above