Mock Computer Competency Test

60 Questions | Total Attempts: 8441

SettingsSettingsSettings
Competency Test Quizzes & Trivia

This is a pre-assessment (diagnostic) for Computer Skills: Implementation and Integration. This test will help me gauge your computer competency.


Questions and Answers
  • 1. 
    What is similar to a copy machine, except that it creates a digital file of the image?
    • A. 

      A fax machine

    • B. 

      A digitizer

    • C. 

      A scanner

  • 2. 
    What software would you most likely use to compare the average snowfall from several locations?
    • A. 

      Spreadsheet

    • B. 

      Database

    • C. 

      Word Processor

  • 3. 
    • A. 

      A program that adds a specific feature to the browser allowing it to play or view certain files

    • B. 

      A port in a computer that connects printers and PCs

    • C. 

      A CD that you must use while on the InternetQ

  • 4. 
    The process of making readable data into unreadable (nonsense) characters is called:
    • A. 

      Call back

    • B. 

      Encryption

    • C. 

      Phishing

  • 5. 
    In the e-mail address "[email protected]", the domain is:
    • A. 

      Model

    • B. 

      Sllboces

    • C. 

      .org

  • 6. 
    Guidelines written to protect the original work of others:
    • A. 

      Acceptable Use Policy

    • B. 

      Fair Use Rules

    • C. 

      Netiquette

  • 7. 
    An uninstaller is a utility program that:
    • A. 

      Removes a program from a computer

    • B. 

      Removes viruses from a computer's memory bank

    • C. 

      Reduces the size of the memory on a computer

  • 8. 
    When you change the color and background of a chart in a spreadsheet you are:
    • A. 

      Formatting

    • B. 

      Merging

    • C. 

      Calculating

  • 9. 
    To find the average daily amount of rainfall over a four-week period, which software program would be the BEST to use to record data and find the average?
    • A. 

      Database

    • B. 

      Spreadsheet

    • C. 

      Word Processor

  • 10. 
    Getting into someone else's computer without their permission is called:
    • A. 

      Spamming

    • B. 

      Attacking

    • C. 

      Hacking

  • 11. 
    Adding your comments to a blog or forum is called
    • A. 

      Posting

    • B. 

      Phishing

    • C. 

      Streaming

  • 12. 
    Clickable words on a Web page that direct you to another Web page or file are called:
    • A. 

      Buttons

    • B. 

      Hyperlinks

    • C. 

      Icons

  • 13. 
    • A. 

      Animation

    • B. 

      Virtual Reality

    • C. 

      Graphics

  • 14. 
    Which of the following is an example of an image file?
    • A. 

      .jpeg

    • B. 

      .mp3

    • C. 

      .exe

  • 15. 
    • A. 

      Civil War NOT Economy

    • B. 

      Civil War OR Economy

    • C. 

      Civil War AND Economy

  • 16. 
    The first thing to consider when developing a multimedia presentation is:
    • A. 

      The audience

    • B. 

      The font size

    • C. 

      The design template

  • 17. 
    Which feature of your word processing program would you use to send a form letter to a group of names and addresses:
    • A. 

      Spell Check

    • B. 

      Sort and Send

    • C. 

      Mail Merge

  • 18. 
    Software that blocks access to certain websites is called __________ software.
    • A. 

      Filtering

    • B. 

      Firewall

    • C. 

      Spam

  • 19. 
    This word processing feature allows information to be organized in rows and columns:
    • A. 

      Format

    • B. 

      Tables

    • C. 

      Tools

  • 20. 
    A computer virus is transmitted MOST often through:
    • A. 

      Websites

    • B. 

      Software

    • C. 

      Email attachments

  • 21. 
    Which of these is the best way to find websites containing information about the history of Georgia?
    • A. 

      Instant message your friend

    • B. 

      E-mail the webmaster of your school webpage

    • C. 

      Type the words "georgia" and history in a search engine

  • 22. 
    In the Internet address "www.canton.edu," the ".edu" indicates:
    • A. 

      The type of organization represented by the address

    • B. 

      The accuracy of the information in the address

    • C. 

      The date of the information in the addresse address

  • 23. 
    • A. 

      AND, OR & NOT in the search

    • B. 

      IF, THEN & WHAT in the search

    • C. 

      HOW, WHEN & WHY in the search

  • 24. 
    Copying copyright protected software and giving it to others for free is:
    • A. 

      Always allowed

    • B. 

      A criminal act

    • C. 

      Fair Use

  • 25. 
    What does multitasking mean?
    • A. 

      The computer's ability to run several programs at the same time

    • B. 

      The computer's ability to have more than one type of storage device

    • C. 

      The computer's ability to store more than one type of document

  • 26. 
    MP3 and WAV files are examples of:
    • A. 

      Audio sound files

    • B. 

      Video files

    • C. 

      Graphics files

  • 27. 
    To run power hungry programs such as video editing software the computer needs a lot of:
    • A. 

      RAM

    • B. 

      ROM

    • C. 

      REM

  • 28. 
    Computer-based models of real-life situations are called:
    • A. 

      Simulations

    • B. 

      Virtual Mark Up

    • C. 

      Computer-based training

  • 29. 
    • A. 

      Burn copies on CDs and give them to your friends.

    • B. 

      Load the game on one computer that you use.

    • C. 

      Load the game on all of the computers that you use.

  • 30. 
    Which of the following activities would be best accomplished using a spreadsheet?
    • A. 

      Peer-edit each others reports

    • B. 

      Change fonts and colors to emphasize important text

    • C. 

      Generate a graph of students' favorite sports

  • 31. 
    What does .edu in an e-mail address or URL indicate?
    • A. 

      A commercial company

    • B. 

      A college or university

    • C. 

      An organization

  • 32. 
    AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and Yahoo are popular:
    • A. 

      Informational listservs

    • B. 

      Web search engines

    • C. 

      Discussion threads

  • 33. 
    The connecting of computers so that information can be shared is called:
    • A. 

      Surfing

    • B. 

      Phishing

    • C. 

      Networking

  • 34. 
    When planning a database, what is the first step?
    • A. 

      Select a font

    • B. 

      Select a background color

    • C. 

      Select fields

  • 35. 
    Which of the following types of files CANNOT be opened in a word processing software?
    • A. 

      .doc

    • B. 

      .txt

    • C. 

      .dat

  • 36. 
    A file that records a user's website visits and preferences is called a(n):
    • A. 

      Screensaver file

    • B. 

      Internet file

    • C. 

      Cookie file

  • 37. 
    Word-wrap allows you to type text that continuously flows to the next line without having to press the:
    • A. 

      End key

    • B. 

      Alt key

    • C. 

      Enter/return key

  • 38. 
    Which of the following information is it safe to share in a public chatroom or blog?
    • A. 

      Age and screen name

    • B. 

      Name a school

    • C. 

      Screen name only

  • 39. 
    Ethical use of the Internet states users DO NOT send spam, which is a (n):
    • A. 

      Unsolicited message sent to many recipients

    • B. 

      Frequently asked question

    • C. 

      Program that infects someone's computer

  • 40. 
    Plagiarism is:
    • A. 

      Sending unwated instant messages or e-mails to many people at the same time

    • B. 

      Linking to other people's work as part of a blog

    • C. 

      Copying other people's ideas or writing without giving credit to the author

  • 41. 
    Symbols such as :) (smile), :( (frown), :\ (undecided), and :o (surprise)-used to express feeling in an e-mail message are called:
    • A. 

      Embodiments

    • B. 

      Embellishments

    • C. 

      Emoticons

  • 42. 
    A student locates a story online, copies it, and submits it to the teacher as his or her own work. This is:
    • A. 

      Fair Use and legal

    • B. 

      Plagiarism and illegal

    • C. 

      On the Internet and legal

  • 43. 
    Which of the following activities would be best accomplished using a database?
    • A. 

      Create a graph about your favorite books

    • B. 

      Create your own class-specific worksheets and study guides

    • C. 

      Create a catalog of all the books in your classroom library

    • D. 

      Create a presentation to show highlights of a recent field trip

  • 44. 
    Software programs or hardware devices setup to protect computers while online are called:
    • A. 

      Firewalls

    • B. 

      Filter

    • C. 

      Cookies

    • D. 

      Browsers

  • 45. 
    Which of the following is an output device:
    • A. 

      Keyboard

    • B. 

      Printer

    • C. 

      Microphone

    • D. 

      Mouse

  • 46. 
    The instructions written in code that tell a web page how to display properly are called:
    • A. 

      Hypertext Transfer Protocol (HTTP)

    • B. 

      File Transfer Protocol (FTP)

    • C. 

      Hypertext Markup Language (HTML)

    • D. 

      Beginner's All Purpose Symbolic Instruction Code (BASIC)

  • 47. 
    Which of the following would you use to compute the average score of four tests using a spreadsheet?
    • A. 

      A formula

    • B. 

      A calculator

    • C. 

      A compilation

    • D. 

      A nerdy friend

  • 48. 
    The part of a computer that controls the flow of information and manages tasks is the:
    • A. 

      Storage Device (SD)

    • B. 

      Central Processing Unit (CPU)

    • C. 

      Output Device (OD)

    • D. 

      Helper Troll (HT)

  • 49. 
    • A. 

      Integrated Learning System

    • B. 

      Reference

    • C. 

      Simulation

    • D. 

      Blog and Wiki

  • 50. 
    When you try to access the Internet, you get error messages stating a "failure to connect." The first thing you should do is:
    • A. 

      Download the latest drivers

    • B. 

      Find a different computer to work on

    • C. 

      Check that cables are correctly connected to the computer

    • D. 

      Shout expletives

  • 51. 
    When you save a document from a webpage to your computer it is called:
    • A. 

      Downloading

    • B. 

      Uploading

    • C. 

      Sidewinding

    • D. 

      Hyperlinking

  • 52. 
    The part if a word processing document used to display repetitive information such as titles, dates, and page numbers is:
    • A. 

      Search and replace

    • B. 

      Header and footer

    • C. 

      Cut and paste

    • D. 

      Page Display

  • 53. 
    To change from Times New Roman to Arial, you must change the:
    • A. 

      Template

    • B. 

      Style

    • C. 

      Font

    • D. 

      Page Layout

  • 54. 
    Your document has not come out of the printer. Which of these do NOT do?
    • A. 

      Check that you printed to the correct printer.

    • B. 

      Check that the paper tray is full.

    • C. 

      Continue to go to File, Print until the document comes out.

    • D. 

      Check for a paper jam

  • 55. 
    The blinking line, box, or arrow on the computer screen is called the:
    • A. 

      Cursor

    • B. 

      Graphic

    • C. 

      Mouse

    • D. 

      World wide web

  • 56. 
    The default page setup that prints the document vertically is called:
    • A. 

      Landscape

    • B. 

      Portrait

    • C. 

      Attachment

    • D. 

      Margins

  • 57. 
    Which of the following are examples of how to use the Internet safely?
    • A. 

      My computer has anti-virus and firewall software

    • B. 

      I don't download attachments from people I don't know

    • C. 

      My passwords are hard to guess

    • D. 

      All of the above

  • 58. 
    Which of the following is unacceptable use of the computer network?
    • A. 

      Sharing your password

    • B. 

      Leaving the computer logged in upon leaving the computer lab

    • C. 

      Giving out personal information

    • D. 

      All of the above

  • 59. 
    Personal copyright protection usually lasts for
    • A. 

      The lifetime of the artist plus 70-95 years

    • B. 

      7 years

    • C. 

      20 years

    • D. 

      The lifetime of the artist plus 20-40 years

  • 60. 
    Which of the following would be the most reliable source of information for a school report?
    • A. 

      Wikipedia

    • B. 

      A political blog from a radio show

    • C. 

      Www.britannica.com

    • D. 

      A classmate