1.
A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station.
2.
A map of a database is called a__________.
A. 
B. 
C. 
D. 
3.
A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.
A. 
B. 
C. 
D. 
4.
A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.
A. 
B. 
C. 
D. 
5.
An example of query criteria is:
A. 
Changing an integer field to a 0 decimal.
B. 
All records in which the valure in the score field is above 75.
C. 
Linking the Employee and Department tables.
D. 
All of the above are examples of query criteria.
6.
All tags in XHTML are lower case.
7.
Encryption is a technique for scrambling documents so that they are unreadable if intercepted during transit.
8.
Computers small enough that several hundred of them could fit inside the space of a human cell are known as _____________.
A. 
B. 
C. 
D. 
9.
E-commerce enables many travelers to get travel information and purchase tickets without the services of travel agents. This is an example of a trend described as:
A. 
B. 
C. 
D. 
10.
Good user habits can help prevent physical injuries and discomfort due to the use of computers.
11.
HTML has a stricter syntax than XHTML.
12.
If a company needs to store data about its customers, employees, products, and orders in a way that will enable it to quickly process orders, answer questions about orders, and prepare reports, it should use a(n):
A. 
B. 
Database management system.
C. 
D. 
13.
If you make a copy of a proprietary program and give it to a friend you are committing:
A. 
B. 
C. 
D. 
14.
In XHTML, the <img> element is an empty element that must include a space and a slash before its closing bracket in order to be well formed.
15.
15. Many e-commerce sites use _____ to determine customer preferences.
A. 
B. 
C. 
D. 
16.
Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program.
A. 
B. 
C. 
D. 
17.
The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
A. 
Electronic Communications Privacy Act (ECPA)
B. 
Fair Credit Reporting Act
C. 
Computer Fraud and Abuse Act
D. 
Computer Matching and Priavcy Proctection Act
18.
The diamond shape in a program flow chart is used to represent a(n):
A. 
B. 
C. 
Beginging or end of a module
D. 
E. 
Meeting point for several paths
19.
The nature of relationships can be examined further and quantified. This quantification is called _____________.
A. 
B. 
C. 
D. 
20.
The purpose of ergonomic keyboards is to:
A. 
Increase the speed with which workers can enter data.
B. 
Encrypt data as as it is sent from the keyboard to the CPU.
C. 
Reduce the occurrence of carpal tunnel syndrome.
D. 
Enter data in the languages that do not use the Roman alphabet.
21.
The study and practice of using computing resources efficiently and with a worldly perspective is _________.
A. 
B. 
C. 
D. 
22.
This English-like language was designed to make possible the easy manipulation of data.
A. 
B. 
C. 
D. 
23.
Three types of XHTML DTDs are: transitional, frameset, and strict.
24.
To be able to resume operation after its computer system is damaged or destroyed, a company should:
A. 
Prepare a system requirements document.
B. 
Create a disaster-recovery plan.
C. 
Encrypt all transmitted data.
D. 
Require passwords for all employees.
25.
To ensure that an e-mail message or file came from the designated individual and was not tampered during transmission; you should use which of the following?
A. 
B. 
C. 
D.