Eastern High School IC3 Entrance Exam Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jlanham2
J
Jlanham2
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,980
| Attempts: 1,980 | Questions: 99
Please wait...
Question 1 / 99
0 %
0/100
Score 0/100
1. You would choose Power Point if you wanted to do what--_____?

Explanation

Power Point is a presentation software that allows users to create and present information in a slide show format. It provides various tools and features such as slide layouts, animations, and transitions to enhance the visual appeal of the presentation. Therefore, if someone wants to present information in a slide show, they would choose Power Point.

Submit
Please wait...
About This Quiz
Eastern High School IC3 Entrance Exam Quiz! - Quiz


Are you ready for the Eastern High School IC3 Entrance Exam? This quiz is here for your rescue. With this quiz, you will be accountable for knowing when... see morethe first computers were made, who created the Apple Macintosh platform, what constitutes the computer's brain, and what kind of mouse uses a laser to detect the mouse's movement? Good luck with this quiz. see less

2. Which of the following should be considered when selecting a keyboard?

Explanation

When selecting a keyboard, it is important to consider all of the given options: design, performance, and comfort. Design refers to the physical appearance and layout of the keyboard, which can vary depending on personal preferences and needs. Performance relates to the keyboard's functionality and responsiveness, including factors such as key switches and anti-ghosting capabilities. Comfort is crucial for prolonged use, considering factors like key spacing, wrist rest, and ergonomic design. Considering all these aspects ensures that the selected keyboard meets one's aesthetic preferences, functional requirements, and provides a comfortable typing experience.

Submit
3. ________ is a popoular photo image editing program

Explanation

Adobe Photoshop is a popular photo image editing program widely used by professionals and enthusiasts alike. It offers a wide range of tools and features that allow users to enhance, manipulate, and retouch images with precision and creativity. With its intuitive interface and extensive capabilities, Adobe Photoshop has become the industry standard for photo editing and is widely recognized as the go-to software for professionals in fields such as graphic design, photography, and digital art.

Submit
4. Which is the strongest password?

Explanation

The password "Max23Well57*El" is the strongest because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password. The other options either lack complexity or are too predictable, making them weaker choices for a password.

Submit
5. People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called

Explanation

Hackers are individuals who use remote software on stolen systems to connect to an organization's network and bypass the company's security measures. They exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal data, or cause damage. Firewalls, on the other hand, are security systems that monitor and control network traffic to protect against unauthorized access. Spikers and bugs are not relevant to the given scenario.

Submit
6. ________software includes authoring, animation, music, and virtual reality.

Explanation

Multimedia software refers to a type of software that incorporates various forms of media such as authoring, animation, music, and virtual reality. It is used in education, home, and personal settings to create interactive and engaging content. This software allows users to combine different media elements to create a rich and immersive experience for the audience. Therefore, the correct answer is Multimedia.

Submit
7. Generally you access the Recycle Bin through an icon located __.

Explanation

The Recycle Bin is generally accessed through an icon located on the desktop. This icon serves as a shortcut to the Recycle Bin, allowing users to easily access and manage their deleted files. Placing the Recycle Bin on the desktop provides a convenient and visible location for users to restore or permanently delete their deleted files.

Submit
8. To help your grandmother select which computer to purchase, your fist task should be to ____?

Explanation

To help your grandmother select which computer to purchase, it is important to ask her what she will be using the computer for. This will provide valuable information about her specific needs and requirements. By understanding her intended usage, you can recommend a computer with the appropriate specifications, features, and software that will best suit her needs. This approach ensures that the computer she chooses will be capable of performing the tasks she wants to accomplish, leading to a more satisfactory purchase decision.

Submit
9. Another word for software is___?

Explanation

The term "software" refers to a collection of programs, data, and instructions that tell a computer how to perform specific tasks. Therefore, "program" is an appropriate synonym for software as it represents a set of instructions or code that enables a computer system to carry out various functions and operations.

Submit
10. Which of the following is considered unethical behavior?

Explanation

Sharing someone else's passwords without permission is considered unethical behavior because it violates the principles of privacy and trust. Sharing passwords without consent can lead to unauthorized access to personal information, accounts, and sensitive data, potentially causing harm or misuse. Respecting the property of others, viewing files in the public domain, and encrypting personal data are generally considered ethical behaviors that prioritize privacy and security.

Submit
11. To find information about a topic in Help, you can enter _____ into the Search Box.

Explanation

To find information about a topic in Help, you can enter "keywords" into the Search Box. This is because entering relevant keywords related to the topic you are looking for will help narrow down the search results and provide you with more accurate and specific information. By using keywords, you can quickly find the relevant help articles or resources that address your specific query or concern.

Submit
12. Two or more computers linked together for the purpose of sharing data, software, and resources is called a __________.

Explanation

A network is a collection of two or more computers that are connected together to share data, software, and resources. It allows for the efficient sharing of information and resources among the connected computers. Networks can be wired or wireless, and they can be set up in various topologies such as star, bus, or ring. The use of a switch can enhance the performance and security of a network by facilitating the flow of data between connected devices. However, a network itself is the broader term that encompasses all these components and functionalities.

Submit
13. Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data?

Explanation

Excel is the correct answer because it is a powerful spreadsheet program that allows users to evaluate, calculate, manipulate, analyze, and present numeric data. It provides various functions and tools for performing complex calculations, creating charts and graphs, and organizing data efficiently. Excel is widely used in various industries and professions for financial analysis, data management, budgeting, and reporting purposes. It is specifically designed to handle numerical data and perform calculations, making it the ideal choice for working with numeric data in the Microsoft Office suite.

Submit
14. Data on a hard drive is stored in small __ dots on the disk

Explanation

The data on a hard drive is stored in small magnetic dots on the disk. These dots are magnetized to represent the binary code that makes up the data. The magnetic nature of the dots allows the hard drive to read and write data using a magnetic head, which can detect and manipulate the magnetic fields on the disk. This magnetic storage method is what allows for the long-term retention of data on a hard drive.

Submit
15. The recycle bin stores discarded files until_______?

Explanation

The recycle bin stores discarded files until the bin is purposely emptied. This means that the files remain in the recycle bin until the user intentionally chooses to delete them permanently. The other options mentioned, such as another user logging on, the computer being shut down, or the end of the day, do not affect the files stored in the recycle bin.

Submit
16. The MS Office Outlook _____________ stores names, email addresses, phone numbers and other contact Information.

Explanation

The MS Office Outlook stores names, email addresses, phone numbers, and other contact information. The Address Book is a feature in Outlook that allows users to store and manage their contacts. It provides a centralized location to store all contact details, making it easier to find and communicate with contacts. Users can add, edit, and delete contacts in the Address Book, as well as organize them into different categories or groups. Overall, the Address Book in MS Office Outlook is a convenient tool for managing and accessing contact information.

Submit
17. If the printed image is faded, this could indicate__.

Explanation

If the printed image is faded, it could indicate that the toner is low, the print density is set too low, or economy mode printing is turned on. Any of these factors can result in a faded image.

Submit
18. Which purchase would provide you the best value for increasing overall computer performance?

Explanation

Additional computer memory would provide the best value for increasing overall computer performance. This is because increasing the amount of memory in a computer allows it to handle more data and run multiple programs simultaneously without slowing down. It improves the overall speed and efficiency of the computer, making it perform tasks faster and smoother. Cable management kits, touchpads, and corona wires do not directly impact computer performance in the same way as additional memory does.

Submit
19. The Table button in Word is located on the ________tab.

Explanation

The correct answer is "Insert" because the Table button, which is used to insert tables into a Word document, is located on the Insert tab. This tab contains various options for inserting different elements into the document, such as tables, pictures, shapes, and charts.

Submit
20. You would most likely find a touchpad on __.

Explanation

A touchpad is a common input device found on notebook computers, allowing users to control the cursor and navigate through the screen by using their finger or a stylus. It is not typically found on other devices such as a laser printer, motherboard, or an ergonomic keyboard. Therefore, a notebook computer is the most likely place to find a touchpad.

Submit
21. To giver her company the right to install a program on a server than can be accessed by a specific number of computers, You would need to acquire a ____________?

Explanation

A network license would be required in order to give her company the right to install a program on a server that can be accessed by a specific number of computers. This type of license allows multiple users to access and use the program simultaneously over a network, ensuring compliance with licensing agreements and providing centralized control and management of the software.

Submit
22. If you want to make all the changes the reviewers suggest, click the ______ button.

Explanation

The given correct answer is "Accept All Changes in Document". This option is the most appropriate because it clearly states the action that will be taken if the user wants to make all the changes that the reviewers have suggested. The other options, such as "Reject and Move to Next" and "Accept and Move to Next", do not convey the same meaning and may cause confusion. "Next" is also not a suitable option as it does not specify what action will be taken. Therefore, "Accept All Changes in Document" is the correct choice.

Submit
23. If you are sending an email to more than one person, you should separate each address with this punctuation mark____.

Explanation

When sending an email to multiple recipients, it is recommended to separate each address with a semi-colon. This punctuation mark is commonly used in email clients and programs to indicate the end of one recipient's address and the start of the next one. By using a semi-colon, the email program can correctly interpret and separate each address, ensuring that the email is sent to all intended recipients.

Submit
24. To save a file in text format or Rich Text Format, you use the ______command in your text editor?

Explanation

To save a file in text format or Rich Text Format, you use the "Save as" command in your text editor. This command allows you to specify the file format and location where you want to save the file. By selecting the "Save as" option, you can choose the desired format, such as plain text or Rich Text Format, and save the file accordingly.

Submit
25. Without administrative rights to your computer, you cannot_______________?

Explanation

Without administrative rights to your computer, you cannot install software. Administrative rights are necessary to make changes to the system settings and install new software on a computer. Without these rights, you will not have the necessary permissions to modify the system files and install any new programs.

Submit
26. The __ process make data unreadable unless or until it is decrypted

Explanation

Encryption is the process of converting data into a code or cipher so that it cannot be understood by unauthorized users. It ensures that data remains confidential and secure by making it unreadable unless decrypted with the correct encryption key. Therefore, encryption is the correct answer as it is the process that makes data unreadable until it is decrypted.

Submit
27. Your Mother is leaning toward a Macintosh computer, you point out what potential disadvantage of this choice.

Explanation

The potential disadvantage of choosing a Macintosh computer is that you might have difficulty exchanging data with a PC type computer. This is because Macintosh computers use a different operating system and file system compared to PCs, which can sometimes create compatibility issues when transferring files or sharing data between the two platforms.

Submit
28. __________ programs allow you to save a document in Rich Text Format?

Explanation

Word processing programs, such as Microsoft Word or Google Docs, allow users to save their documents in Rich Text Format (RTF). RTF is a file format that allows for the formatting of text, including fonts, colors, and styles, to be preserved across different platforms and applications. This format is commonly used when sharing documents between different word processing programs or when formatting needs to be maintained for printing or publishing purposes. Spreadsheet, presentation, and database programs do not typically support saving documents in RTF format.

Submit
29. In Excel, when a cell is selected it is called_________________?

Explanation

When a cell is selected in Excel, it is referred to as "Active." This means that it is the currently active or focused cell, and any changes or operations performed will affect this cell. The term "Active" is commonly used in Excel to indicate the selected cell and is an important concept in navigating and manipulating data within a spreadsheet.

Submit
30. Which of the following is used to produce a hard copy of the processing results?

Explanation

A printer is used to produce a hard copy of the processing results. Unlike a monitor or speaker, which display or output information electronically, a printer physically prints the processed data onto paper or other tangible materials. The CPU, or central processing unit, is responsible for executing instructions and performing calculations, but it does not directly produce a hard copy. Therefore, the correct answer is printer.

Submit
31. In PowerPoint, the _________________ is the slide that controls how the other slides look and behave.

Explanation

The master slide in PowerPoint is the slide that controls the overall appearance and behavior of all other slides in the presentation. It allows users to set the background, font styles, placeholders, and other design elements that will be applied consistently throughout the presentation. By making changes to the master slide, users can easily update the entire presentation at once, saving time and ensuring consistency in design.

Submit
32. __ refers to the machine language which is all 1s and 0s.

Explanation

Binary refers to the machine language which is all 1s and 0s. In computing, binary is the base-2 numeral system used to represent numbers and perform arithmetic operations. It is the fundamental language that computers understand and use to execute instructions. Each binary digit, or bit, represents a value of either 0 or 1. By combining multiple bits, larger units of information such as bytes can be represented. Therefore, binary is the correct answer as it specifically denotes the language consisting of only 1s and 0s.

Submit
33. You have created a list of columns and rows containing contact information.  You decide that you would rather have this in table format.  Which command in Word should you use to accomplish this?

Explanation

To convert the contact information from a list format to a table format in Word, you should use the "Convert Text to Table" command. This command allows you to select the text that you want to convert and specify the number of columns and rows you want in the table. It automatically converts the selected text into a table format, making it easier to organize and manage the contact information.

Submit
34. One of the best ways to cut down on computer repair is __.

Explanation

Preventative maintenance refers to regular checks and actions taken to prevent potential issues or breakdowns. By performing routine maintenance tasks such as cleaning the computer, updating software, and checking for malware, the chances of encountering major problems are reduced. This proactive approach helps identify and address minor issues before they escalate into costly repairs. Therefore, through preventative maintenance, computer repair can be significantly minimized.

Submit
35. What type of programs reduce the amount of disk space a file requires?

Explanation

File compression programs reduce the amount of disk space a file requires by compressing the data in the file. This compression process reduces the file size by removing redundant or unnecessary data, resulting in a smaller file size. This can be useful for storing and transferring files more efficiently, as well as saving disk space on a computer or storage device.

Submit
36. Keyboards, scanners, and microphones are examples of ____?

Explanation

Keyboards, scanners, and microphones are examples of input devices. Input devices are hardware devices that allow users to input data or commands into a computer. These devices send information to the computer for processing. Keyboards are used to input text and commands, scanners are used to input physical documents or images, and microphones are used to input audio. Therefore, the correct answer is input devices.

Submit
37. If a file cannot be read by an applicaiton, you can check it by right clicking the filename and then clicking ________________?

Explanation

To check a file that cannot be read by an application, you can right click on the filename and then click on "Properties". This will open a window displaying various information about the file, such as its size, location, creation date, and permissions. By accessing the properties of the file, you can gather more details about it and potentially troubleshoot any issues that may be preventing it from being read by the application.

Submit
38. If you do not want to make a change suggested by a reviewer, click the _________  button.

Explanation

The correct answer is "Reject and move to Next". This option is chosen when the user does not want to make a change suggested by a reviewer and wants to proceed to the next suggestion. It allows the user to skip the suggested change and move on to the next one without accepting or implementing the reviewer's suggestion.

Submit
39. If the primary addressee does not see that others are being sent the same message at the same time, this is an example of?

Explanation

Blind Copy is the correct answer because it refers to sending a message to multiple recipients without revealing their identities to each other. In this scenario, the primary addressee is unaware that others are also receiving the same message simultaneously.

Submit
40. What type of computer could be found in a digital watch?

Explanation

An embedded computer is the most suitable type of computer that could be found in a digital watch. Embedded computers are designed to perform specific functions and are often integrated into other devices or systems. In the case of a digital watch, an embedded computer is responsible for controlling and displaying the time, as well as other features such as alarms, timers, and possibly fitness tracking. This type of computer is small, low-power, and optimized for efficiency, making it ideal for devices like digital watches where space and battery life are important considerations.

Submit
41. Loading a file into an application is called ______?

Explanation

Loading a file into an application is referred to as "opening". This term is commonly used in computing to describe the action of accessing and displaying the contents of a file within a specific program or software. When a file is opened, it becomes accessible for viewing, editing, or performing various operations within the application. Therefore, "opening" accurately describes the process of loading a file into an application.

Submit
42. You can use the Delete Browsing History dialog box to delete_______?

Explanation

The Delete Browsing History dialog box can be used to delete cookies. Cookies are small text files that websites store on a user's computer to remember information about them, such as login credentials or preferences. Deleting cookies can help protect privacy and remove stored data from websites.

Submit
43. Which Word feature automatically moves the insertion point to the next line when one line is filled with text?

Explanation

Word wrap is a feature in Word that automatically moves the insertion point to the next line when one line is filled with text. This feature ensures that the text is displayed properly within the document, without requiring the user to manually press Enter to start a new line. It helps in maintaining the readability and formatting of the text by adjusting it within the available space.

Submit
44. Keeping track of files and directories is a job performed by ____?

Explanation

The operating system is responsible for managing files and directories on a computer system. It keeps track of the location, organization, and access permissions of files and directories. The operating system provides functions and utilities to create, delete, move, and modify files and directories. It also ensures that multiple users and applications can access and share files in a secure and efficient manner. Therefore, the operating system is the correct answer for the given question.

Submit
45. Installing new or updated software for an optical disk is a simple process that starts by ___________?

Explanation

To install new or updated software for an optical disk, the first step is to insert the disk into the CD or DVD drive. This allows the computer to read the disk and initiate the installation process. Once the disk is inserted, the installation wizard or prompt will guide the user through the necessary steps to complete the installation.

Submit
46. Password best practices suggest ____

Explanation

Password best practices suggest using a combination of text, numbers, and symbols. This makes the password more complex and harder to guess or crack. Including a mix of different characters increases the security of the password and reduces the risk of it being easily compromised.

Submit
47. Cache is_________?

Explanation

Cache is a type of memory that is designed to store frequently accessed data for quick retrieval. It is high speed because it is located closer to the processor than main memory. It is non-volatile, meaning that it retains data even when power is lost. It is onboard, meaning that it is integrated into the processor or located very close to it. And it is temporary because it is constantly being overwritten with new data as needed.

Submit
48. Which does not Belong?

Explanation

The floppy disk does not belong because it is an outdated storage medium that was commonly used in the past but has been largely replaced by more advanced technologies such as DVDs, CDs, and Blu-ray disks. The other options are all modern storage mediums that are still widely used today.

Submit
49. ______________ provides a graphical user interface (GUI) you use to control the computer

Explanation

An operating system provides a graphical user interface (GUI) that allows users to interact with and control the computer. It acts as an intermediary between the hardware and the user, managing resources, running applications, and providing a user-friendly interface for performing tasks. The operating system handles tasks such as file management, memory management, and device drivers, making it responsible for controlling and coordinating the overall operation of the computer.

Submit
50. This feature of the control panel is responsible for all the different components of your computer working properly individually and together.

Explanation

The Device Manager is responsible for managing all the different components of a computer, ensuring that they work properly both individually and together. It allows users to view and control the hardware devices installed on their computer, such as printers, monitors, and sound cards. Users can update drivers, enable or disable devices, and troubleshoot any issues that may arise. By managing and organizing the devices, the Device Manager ensures that the computer functions optimally and all components are compatible and working as they should.

Submit
51. Which of the following system components are the brains of the computer?

Explanation

The CPU, or Central Processing Unit, is considered the brains of the computer. It is responsible for executing instructions, performing calculations, and controlling the overall operation of the computer system. The CPU acts as the primary component that processes data and carries out tasks, making it the most critical component in terms of computing power and functionality.

Submit
52. The _________feature converts a single cell into multiple cells.

Explanation

The Split Cells feature allows a user to divide a single cell into multiple cells. This can be useful when working with large amounts of data or when needing to organize information into separate sections. By splitting cells, the user can create a more organized and visually appealing layout for their data.

Submit
53. This software program consists of fields, records, queries, reports, forms, tables, and more. This program represents the backbone of the internet and many of the online conveniences we enjoy today.

Explanation

Databases are software programs that consist of various components such as fields, records, queries, reports, forms, and tables. They are considered the backbone of the internet and many online conveniences we use today. Databases are used to store and organize large amounts of data, allowing for efficient data management and retrieval. They are essential for various applications, including e-commerce websites, social media platforms, and online banking systems.

Submit
54. When you plug in a device and the computer system configures it automatically, this is referred to as __

Explanation

Plug-and-play refers to the ability of a computer system to automatically detect and configure a newly connected device without requiring manual intervention. When a device is plugged into the computer, the operating system recognizes it and installs the necessary drivers and software to make it functional. This eliminates the need for users to manually configure the device, making the setup process quick and convenient. Therefore, plug-and-play is the correct answer as it accurately describes the automatic configuration process.

Submit
55. When you scan the barcode of an item into the computer, which steps in the information cycle is being performed?

Explanation

When you scan the barcode of an item into the computer, you are inputting data into the system. This is the first step in the information cycle, where raw data is collected and entered into the computer for further processing and analysis. The scanned barcode contains information about the item, such as its name, price, and other details, which is then stored in the computer's database for future reference and use.

Submit
56. The ____ is a blinking vertical line that indicates the location in the document where the new text and data will be entered.

Explanation

The insertion point is a blinking vertical line that shows where new text and data will be entered in a document. It is used to indicate the current location for typing or inserting content. The I-beam refers to the shape of the cursor when it is positioned over editable text, and the scroll bar and ribbon are different user interface elements in a document editing software.

Submit
57. Which does not belong?

Explanation

The given options consist of various malicious software or programs, except for "Ballon Maker." Trojan Horse, Time Bomb, and Worm or Hydra are all types of malware that can harm computer systems or steal information. However, "Ballon Maker" does not fit in this category as it is unrelated to malicious software and instead refers to a harmless activity or profession of creating balloons.

Submit
58. Most of the keyboards provided with desktop computers are__.

Explanation

not-available-via-ai

Submit
59. After putting a selected solution into place, the next step is to ______?

Explanation

After putting a selected solution into place, the next step is to evaluate its performance. This involves assessing whether the solution is effectively addressing the problem it was implemented for. By evaluating the performance, one can determine if any adjustments or improvements are needed to optimize the solution's effectiveness. This step is crucial in ensuring that the solution is successful and meets the desired objectives.

Submit
60. Which of the following is a peripheral device?

Explanation

A peripheral device is a device that is connected to a computer system but is not an essential part of it. It provides additional functionality or input/output capabilities. The motherboard, microprocessor, and random access memory are all essential components of a computer system. However, a printer is a peripheral device as it is connected to the computer system to provide output in the form of printed documents.

Submit
61. The operating system on most small devices and smart phones resides on a _____________?

Explanation

The operating system on most small devices and smartphones resides on a ROM chip. ROM stands for Read-Only Memory, which is a type of non-volatile memory that stores permanent data and instructions. The operating system needs to be stored on a ROM chip because it needs to be accessible even when the device is powered off or restarted. This ensures that the operating system remains intact and can be loaded into the device's memory when it is turned on.

Submit
62. In Excel, a _________ is identified by the cell in the upper left corner and the cell in the lower right corner, separated by a colon ( : ).

Explanation

A range in Excel is a group of cells that are identified by the cell in the upper left corner and the cell in the lower right corner, separated by a colon ( : ). It allows you to work with multiple cells at once, perform calculations, apply formatting, and manipulate data efficiently. By specifying a range, you can easily select and manipulate a specific set of cells in a worksheet.

Submit
63. When you send, receive, open, close or delete an email, you can be sure that it is really gone after you delete it.  When you delete an email, where does it go?

Explanation

When you delete an email, it is not really deleted but just hidden from future access. This means that the email is still present on the system, but it is no longer visible or easily accessible to the user. The email may still be stored in a hidden folder or in the system's memory, but it is not permanently removed from the device.

Submit
64. Which type of monitor produces an image by manipulating light within a layer of liquid crystal cells?

Explanation

LCD stands for Liquid Crystal Display, which is a type of monitor that produces an image by manipulating light within a layer of liquid crystal cells. Unlike CRT monitors, which use cathode ray tubes, and gas plasma monitors, which use ionized gas cells, LCD monitors use liquid crystals to control the passage of light through the cells, creating the image on the screen. Therefore, the correct answer is LCD.

Submit
65. Which software modification generally involves radical changes to the product______?

Explanation

An upgrade generally involves radical changes to the product. It refers to the process of installing a new version or release of a software that includes significant improvements, new features, or major changes to the existing functionality. Upgrades often require users to migrate their data and settings to the new version and may involve learning new workflows or interfaces. Unlike patches, updates, or service packs which typically address bugs, security vulnerabilities, or minor enhancements, upgrades bring substantial modifications to the software.

Submit
66. In Excel, the ________________ shows the entire cell contents.

Explanation

The formula bar in Excel displays the entire contents of a selected cell. It allows users to view and edit the contents of a cell, including formulas, functions, and text. The formula bar is located above the worksheet grid and provides a convenient way to input and modify cell data.

Submit
67. If you identify more than one possible solution , critique and test each one to determine____?

Explanation

The question is asking about what to do if there are multiple possible solutions. The answer suggests that in order to determine the best solution, one should critique and test each option. This process will help in determining the likely outcome of each solution and ultimately choose the most suitable one. Additionally, the answer advises referring to the notes that have already been taken, which implies that previous observations and data should be considered in the decision-making process.

Submit
68. Which is not a View option in Word   ____?

Explanation

The question asks for a view option that is not available in Microsoft Word. The options "Print Layout," "Full Screen," and "Draft" are all valid view options in Word. However, "Slide Show" is not a view option in Word. Slide shows are typically associated with presentation software like Microsoft PowerPoint, not with word processing software like Word.

Submit
69. Unlawfully copying and using a computer programs is an example of _________________?

Explanation

Unlawfully copying and using a computer program refers to the unauthorized duplication and distribution of software, which is commonly known as software piracy. This involves the illegal reproduction, distribution, or use of copyrighted software without obtaining proper licenses or permissions from the software's owner. Software piracy is a significant issue that negatively impacts the software industry, causing financial losses to developers and hindering innovation.

Submit
70. If media is damaged by water, first __

Explanation

If media is damaged by water, the first step should be to dry it. This is because water can cause damage to electronic components and circuits, leading to malfunction or complete failure. By drying the media, the moisture is removed, reducing the risk of further damage and increasing the chances of it functioning properly again. Restarting the computer or placing it in an airtight plastic bag may not effectively address the water damage issue, whereas drying it directly targets the problem. Therefore, drying the media is the most appropriate course of action in this situation.

Submit
71. Word processors and database systems are types of ______?

Explanation

Word processors and database systems are examples of application software. Application software refers to programs that are designed to perform specific tasks for users, such as word processing, data management, or creating spreadsheets. These software applications are built on top of the operating system and utilize system resources to provide functionality to the user. System software, on the other hand, includes operating systems and utilities that manage and control the computer hardware and provide a platform for other software applications to run.

Submit
72. Which command on the Office Button menu contains the Document Inspector?

Explanation

The command on the Office Button menu that contains the Document Inspector is "Prepare". This option is typically used to review and modify the document properties, such as adding a digital signature, checking for compatibility issues, or inspecting the document for hidden metadata or personal information. By selecting the "Prepare" option, users can access the Document Inspector tool to ensure that sensitive or confidential information is not inadvertently shared when sharing or publishing the document.

Submit
73. In PowerPoint, it is recommended that you use a color scheme of no more than _________ colors.

Explanation

In PowerPoint, it is recommended that you use a color scheme of no more than 3 colors. Using too many colors can make the presentation visually overwhelming and confusing for the audience. Limiting the color scheme to 3 colors helps maintain consistency and cohesiveness throughout the slides, making it easier for the audience to understand and follow the content.

Submit
74. Hard drives, magnetic tapes and zip disks are examples of __.

Explanation

Hard drives, magnetic tapes, and zip disks are examples of magnetic storage devices because they use magnetic fields to store and retrieve data. These devices have a magnetizable coating on their surfaces that can be magnetized to represent binary data. The magnetized areas can then be read by a read/write head to access the stored information. Magnetic storage devices are known for their high capacity and durability, making them suitable for long-term data storage.

Submit
75. The taskbar is by default located where_____________?

Explanation

The taskbar is by default located at the bottom of the desktop. This is where it is typically found in most operating systems, including Windows. Placing the taskbar at the bottom of the screen allows for easy access to frequently used applications, the Start Menu, and system notifications. It also helps to keep the desktop organized and provides a visual indicator of running programs.

Submit
76. Which is the most secure option for controlling sensitive information?

Explanation

Encryption is the most secure option for controlling sensitive information because it involves converting the data into a code that can only be accessed with a specific key or password. This ensures that even if the information is intercepted or accessed by unauthorized individuals, it remains unreadable and protected. Encryption provides a strong layer of security and is widely used to safeguard sensitive data in various industries and applications.

Submit
77. To protect agains power spikes, you would use a(n)

Explanation

A surge suppressor is used to protect against power spikes. Power spikes are sudden increases in voltage that can damage electronic devices. Surge suppressors work by diverting excess voltage away from the devices, preventing them from being damaged. They are typically installed between the power source and the devices, and can handle a certain amount of voltage before they need to be replaced. Using a surge suppressor is an effective way to safeguard electronic equipment from power surges and ensure their longevity.

Submit
78. To change the default printer, you would select the printer in the Printers window and then _______?

Explanation

To change the default printer, you would select the printer in the Printers window and then click the Set as default button on the toolbar. This action will set the selected printer as the default printer for all future print jobs.

Submit
79. Which Item does not belong___________________

Explanation

The given list consists of mathematical symbols and logical operators, except for the "@" symbol, which does not belong to either category.

Submit
80. Which type of mouse uses a laser to detect the mouse's movement?

Explanation

An optical mouse uses a laser to detect the mouse's movement. The laser illuminates the surface beneath the mouse, and the sensor detects the reflected light to track the mouse's movement. This technology allows for more precise and accurate tracking compared to mechanical or optomechanical mice. Wireless mice may also use optical technology, but the use of a laser is not exclusive to wireless mice.

Submit
81. To create a desktop folder, righ click a blank space on the desktop, point to __________, and then click Folder to display a new folder

Explanation

To create a desktop folder, you need to right-click on a blank space on the desktop, then point to "New", and finally click on "Folder" to display a new folder. This option allows you to create a new folder directly on the desktop.

Submit
82. The Track Changes button in Word is located on the _________ tab or Ribbon?

Explanation

The Track Changes button in Word is located on the Review tab or Ribbon. This tab contains all the tools and options related to reviewing and editing a document. It allows users to track changes made to the document, add comments, and accept or reject revisions. The Track Changes button is easily accessible on the Review tab, making it convenient for users to enable or disable this feature as needed.

Submit
83. The first computers were developed in __.

Explanation

The correct answer is the late 1940's and early 1950's. This is because the first electronic computers were developed during this time period. These early computers were large and expensive machines that were mainly used by governments and large corporations. They were not as advanced as modern computers, but they laid the foundation for the technology we have today.

Submit
84. You would use the DOS ping command to test for which issue?

Explanation

The DOS ping command is used to test for connectivity issues. It sends a small packet of data to a specific IP address or domain name and measures the time it takes for the packet to travel to the destination and back. If the ping is successful, it indicates that there is a connection between the source and destination. If the ping fails, it suggests that there may be a connectivity issue, such as a network problem or a firewall blocking the connection. Therefore, the DOS ping command is specifically used to test for connectivity problems.

Submit
85. __________________ determines the amount of data that can be sent over a network in any given period of time.

Explanation

Bandwidth determines the amount of data that can be sent over a network in any given period of time. It refers to the capacity or speed of the network connection. A higher bandwidth allows for more data to be transmitted, while a lower bandwidth restricts the amount of data that can be sent. Therefore, bandwidth plays a crucial role in determining the efficiency and performance of a network.

Submit
86. Trying to trick someone into giving away sensitive data like credit care #'s or SS #'s or addresses are examples of ________ type activity

Explanation

Phishing is a type of activity where individuals attempt to deceive others into revealing sensitive information such as credit card numbers, social security numbers, or addresses. This is typically done through fraudulent emails or websites that mimic legitimate ones, tricking the recipient into providing their personal information.

Submit
87. Who developed the Apple Macintosh platform?

Explanation

Steve Jobs and Steve Wozniak developed the Apple Macintosh platform. They co-founded Apple Inc. and played integral roles in the development of the company's products, including the Macintosh computer. Steve Jobs was known for his visionary leadership and marketing skills, while Steve Wozniak was the technical genius behind the design and engineering of the Macintosh. Together, they revolutionized the personal computer industry and laid the foundation for Apple's success.

Submit
88. Printing speed is measured in __.

Explanation

Printing speed is commonly measured in pages per minute. This metric indicates the number of pages that a printer can produce in one minute. It is a practical and convenient way to compare the speed of different printers. RAM refers to the computer's memory capacity and is not directly related to printing speed. Characters per second is a measure of typing speed, not printing speed. Dots per inch (DPI) refers to the resolution or quality of printed output, not the speed at which it is produced.

Submit
89. You are entering data into a cell in Excel and see is shown as ########.  What does this mean?

Explanation

The correct answer is that the data is too large for the cell. When the "#######" symbol appears in a cell in Excel, it means that the data is too wide to fit within the cell's width. This can happen when the data contains a long string of characters or a large number. To fix this, you can either widen the column to accommodate the data or reduce the font size to make it fit within the cell.

Submit
90. A ________ typically identifies the type of file.

Explanation

A file extension typically identifies the type of file. It is a suffix that is added to the end of a filename and is separated by a period. The file extension helps the operating system and applications understand the file format and how to handle it. For example, a file with a .jpg extension is recognized as a JPEG image file, while a file with a .docx extension is recognized as a Microsoft Word document.

Submit
91. This was developed by a group of programmers at AT&T research labratories_________?

Explanation

UNIX was developed by a group of programmers at AT&T research laboratories.

Submit
92. Which two Office programs would be required to create a customized letter and mail it to addresses stored in a database?

Explanation

To create a customized letter and mail it to addresses stored in a database, two Office programs are required. Word is needed to create the letter by customizing its content and formatting. Access is required to access the database that stores the addresses and retrieve the necessary information for mailing. Therefore, the correct answer is Word and Access.

Submit
93. Before the internet became the internet, it was called___________________?

Explanation

ARPANET is the correct answer because before the internet became what it is today, it was initially developed as a research project by the Advanced Research Projects Agency (ARPA) in the late 1960s. ARPANET was the precursor to the modern internet and was used for communication and data sharing between various universities and research institutions. It laid the foundation for the development of the World Wide Web and other internet technologies that we use today. The terms "The World Wide Web," "The Newsgroup," and "UseNet" are not accurate names for the early stages of the internet.

Submit
94. To delete temporary file and other files that are not needed, you would use_____?

Explanation

Disk Cleanup is the correct answer because it is a utility tool in Windows that allows users to delete temporary files, system files, and other unnecessary files from their computer. It helps to free up disk space and improve the overall performance of the system. The Recycle Bin is used to store deleted files temporarily before they are permanently deleted. The defragmentation utility is used to optimize the arrangement of files on a hard drive for faster access. The self-cleaning mode is not a recognized term or feature in relation to deleting unnecessary files.

Submit
95. The rows in an Access table are called__________?

Explanation

In an Access table, the rows are called "records". Each record represents a complete set of information or data. Fields, on the other hand, refer to the columns in the table, which hold specific types of data. Cells and objects are not the correct terms to describe the rows in an Access table.

Submit
96. You follow rules for how words are used together, this is called___________?

Explanation

Syntax refers to the rules and structure governing how words are combined to form grammatically correct sentences or phrases in a language. It involves the arrangement of words, phrases, and punctuation marks to convey meaning and ensure clarity in communication. Understanding and following the syntax of a language is crucial for effective communication and comprehension.

Submit
97. Whcih of the following is a hardware solution that you could add to the motherboard of a computer to run a programs that was designed for a different operating system____________?

Explanation

An emulation card is a hardware solution that can be added to a computer motherboard to run a program that was designed for a different operating system. It allows the computer to simulate the behavior of the desired operating system, enabling compatibility and allowing the program to run smoothly. This card essentially acts as a bridge between the computer hardware and the program, providing the necessary resources and environment for the program to function properly.

Submit
98. Windows allows for filenames up to _____ characters?

Explanation

Windows allows for filenames up to 255 characters. This means that when naming a file in Windows, the filename can contain a maximum of 255 characters, including letters, numbers, spaces, and special characters. This limit is set by the Windows operating system to ensure compatibility and prevent any issues with file management and system performance.

Submit
99. By using a USB hub, you could connect up to __ different peripherals with a single connector

Explanation

A USB hub is a device that allows multiple USB devices to be connected to a single USB port on a computer. The maximum number of devices that can be connected to a USB hub is determined by the USB specification, which currently supports up to 127 devices. Therefore, by using a USB hub, you could connect up to 127 different peripherals with a single connector.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 15, 2011
    Quiz Created by
    Jlanham2
Cancel
  • All
    All (99)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You would choose Power Point if you wanted to do what--_____?
Which of the following should be considered when selecting a keyboard?
________ is a popoular photo image editing program
Which is the strongest password?
People who use remote software on stolen systems to connect to the...
________software includes authoring, animation, music, and virtual...
Generally you access the Recycle Bin through an icon located __.
To help your grandmother select which computer to purchase, your fist...
Another word for software is___?
Which of the following is considered unethical behavior?
To find information about a topic in Help, you can enter _____ into...
Two or more computers linked together for the purpose of sharing data,...
Which Office program is used to evaluate, calculate, manipulate,...
Data on a hard drive is stored in small __ dots on the disk
The recycle bin stores discarded files until_______?
The MS Office Outlook _____________ stores names, email addresses,...
If the printed image is faded, this could indicate__.
Which purchase would provide you the best value for increasing overall...
The Table button in Word is located on the ________tab.
You would most likely find a touchpad on __.
To giver her company the right to install a program on a server than...
If you want to make all the changes the reviewers suggest, click the...
If you are sending an email to more than one person, you should...
To save a file in text format or Rich Text Format, you use the...
Without administrative rights to your computer, you...
The __ process make data unreadable unless or until it is decrypted
Your Mother is leaning toward a Macintosh computer, you point out what...
__________ programs allow you to save a document in Rich Text Format?
In Excel, when a cell is selected it is called_________________?
Which of the following is used to produce a hard copy of the...
In PowerPoint, the _________________ is the slide that controls how...
__ refers to the machine language which is all 1s and 0s.
You have created a list of columns and rows containing contact...
One of the best ways to cut down on computer repair is __.
What type of programs reduce the amount of disk space a file requires?
Keyboards, scanners, and microphones are examples of ____?
If a file cannot be read by an applicaiton, you can check it by right...
If you do not want to make a change suggested by a reviewer, click the...
If the primary addressee does not see that others are being sent the...
What type of computer could be found in a digital watch?
Loading a file into an application is called ______?
You can use the Delete Browsing History dialog box to delete_______?
Which Word feature automatically moves the insertion point to the next...
Keeping track of files and directories is a job performed by ____?
Installing new or updated software for an optical disk is a simple...
Password best practices suggest ____
Cache is_________?
Which does not Belong?
______________ provides a graphical user interface (GUI) you use to...
This feature of the control panel is responsible for all the different...
Which of the following system components are the brains of the...
The _________feature converts a single cell into multiple cells.
This software program consists of fields, records, queries, reports,...
When you plug in a device and the computer system configures it...
When you scan the barcode of an item into the computer, which steps in...
The ____ is a blinking vertical line that indicates the location in...
Which does not belong?
Most of the keyboards provided with desktop computers are__.
After putting a selected solution into place, the next step is to...
Which of the following is a peripheral device?
The operating system on most small devices and smart phones resides on...
In Excel, a _________ is identified by the cell in the upper left...
When you send, receive, open, close or delete an email, you can be...
Which type of monitor produces an image by manipulating light within a...
Which software modification generally involves radical changes to the...
In Excel, the ________________ shows the entire cell contents.
If you identify more than one possible solution , critique and test...
Which is not a View option in Word   ____?
Unlawfully copying and using a computer programs is an example of...
If media is damaged by water, first __
Word processors and database systems are types of ______?
Which command on the Office Button menu contains the Document...
In PowerPoint, it is recommended that you use a color scheme of no...
Hard drives, magnetic tapes and zip disks are examples of __.
The taskbar is by default located where_____________?
Which is the most secure option for controlling sensitive information?
To protect agains power spikes, you would use a(n)
To change the default printer, you would select the printer in the...
Which Item does not belong___________________
Which type of mouse uses a laser to detect the mouse's movement?
To create a desktop folder, righ click a blank space on the desktop,...
The Track Changes button in Word is located on the _________ tab or...
The first computers were developed in __.
You would use the DOS ping command to test for which issue?
__________________ determines the amount of data that can be sent over...
Trying to trick someone into giving away sensitive data like credit...
Who developed the Apple Macintosh platform?
Printing speed is measured in __.
You are entering data into a cell in Excel and see is shown as...
A ________ typically identifies the type of file.
This was developed by a group of programmers at AT&T research...
Which two Office programs would be required to create...
Before the internet became the internet, it was...
To delete temporary file and other files that are not needed, you...
The rows in an Access table are called__________?
You follow rules for how words are used together, this is...
Whcih of the following is a hardware solution that you could add to...
Windows allows for filenames up to _____ characters?
By using a USB hub, you could connect up to __ different peripherals...
Alert!

Advertisement