Mock Computer Competency Test Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bharris
B
Bharris
Community Contributor
Quizzes Created: 2 | Total Attempts: 18,673
| Attempts: 18,212 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. Getting into someone else's computer without their permission is called:

Explanation

Hacking refers to the unauthorized access or intrusion into someone else's computer system or network without their permission. It involves bypassing security measures to gain control over the system, steal information, or cause damage. Hacking is a serious offense and is considered illegal in most jurisdictions.

Submit
Please wait...
About This Quiz
Mock Computer Competency Test Quiz - Quiz

Are you confident that you can pass this mock computer competency test quiz? This is a pre-assessment (diagnostic) for Computer Skills: Implementation and Integration. This test will help... see moreyou gauge your computer competency. There are many questions in this quiz that you have to answer, and in the end, your score will give you an idea of how well you understand the topic and how more you have to learn. Good luck! see less

2. Which of these is the best way to find websites containing information about the history of Georgia?

Explanation

Typing the words "georgia" and history in a search engine is the best way to find websites containing information about the history of Georgia because search engines are specifically designed to search for and retrieve relevant information from the internet. By typing these keywords, the search engine will generate a list of websites that are likely to contain information about the history of Georgia, making it easier for the user to find the desired information.

Submit
3. What does multitasking mean?

Explanation

Multitasking refers to the computer's ability to run multiple programs simultaneously. This means that the computer can execute multiple tasks or processes concurrently, allowing the user to switch between different applications without having to wait for one program to finish before starting another. Multitasking enhances efficiency and productivity by utilizing the computer's processing power effectively and maximizing its resources.

Submit
4. Adding your comments to a blog or forum is called

Explanation

Adding comments to a blog or forum is commonly referred to as "posting". This term is used to describe the action of sharing thoughts, opinions, or information on an online platform for others to see and engage with. It is a way for individuals to contribute to discussions and participate in online communities.

Submit
5. Which of the following is an example of an image file?

Explanation

.jpeg is an example of an image file because it is a file format commonly used for storing digital images. It is a compressed file format that allows for high-quality images with relatively small file sizes. .mp3, .exe, and .mp4 are file formats used for audio and video files, not images.

Submit
6. MP3 and WAV files are examples of:

Explanation

MP3 and WAV files are examples of audio sound files. Both MP3 and WAV formats are commonly used for storing and playing audio recordings. MP3 files are compressed audio files that provide high-quality sound with smaller file sizes, making them suitable for music and audio playback on various devices. WAV files, on the other hand, are uncompressed audio files that preserve the original sound quality but result in larger file sizes. These formats are widely supported and compatible with most media players and devices, making them popular choices for storing and sharing audio content.

Submit
7. AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and Yahoo are popular:

Explanation

The given answer is "Web search engines". This is because the list of websites mentioned (AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile, and Yahoo) are all well-known search engines. They are platforms that allow users to search for information on the internet by entering keywords or phrases. These search engines index web pages and provide relevant results to the users based on their search queries.

Submit
8. Clickable words on a Web page that direct you to another Web page or file are called:

Explanation

Hyperlinks are clickable words or phrases on a web page that redirect users to another web page or file when clicked. They are commonly used to navigate between different pages on a website or to access external resources. Buttons, icons, and marks are also elements commonly found on web pages, but they may not necessarily redirect users to other pages or files.

Submit
9. When you try to access the Internet, you get error messages stating a "failure to connect." The first thing you should do is:

Explanation

When you encounter a "failure to connect" error message while trying to access the Internet, the first thing you should do is check that cables are correctly connected to the computer. This is because a loose or improperly connected cable can cause connectivity issues and prevent you from accessing the Internet. By ensuring that the cables are securely connected, you can eliminate this potential cause of the problem and troubleshoot further if necessary.

Submit
10. The process of making readable data into unreadable (nonsense) characters is called:

Explanation

Encryption is the process of converting readable data into unreadable characters to ensure its confidentiality and security. It involves the use of algorithms and keys to transform the data into a format that can only be deciphered by authorized individuals or systems with the corresponding decryption key. This technique is commonly used to protect sensitive information, such as personal data, financial records, and communication channels, from unauthorized access or interception.

Submit
11. When you change the color and background of a chart in a spreadsheet, you are:

Explanation

When you change the color and background of a chart in a spreadsheet, you are formatting. Formatting refers to the process of changing the appearance of data or objects in a document to enhance its visual appeal or to convey specific information. In this case, changing the color and background of a chart helps to make it more visually appealing or to highlight certain data points or trends.

Submit
12. You have asked students to write a report on "How the Civil War Affected the Economy in the South." Which Boolean operators should they start with when conducting an Internet search?

Explanation

When conducting an Internet search for information on how the Civil War affected the economy in the South, students should start with the Boolean operator "AND". This is because they are looking for information that includes both the terms "Civil War" and "Economy". Using "AND" will narrow down the search results and provide more relevant information specifically related to the impact of the Civil War on the economy in the South.

Submit
13. Copying copyright protected software and giving it to others for free is:

Explanation

Copying copyright protected software and giving it to others for free is considered a criminal act because it violates the rights of the software owner. Copyright laws protect the exclusive rights of the creator or owner of a work, including software, and unauthorized copying and distribution infringes upon those rights. Such actions are illegal and can lead to legal consequences, including fines and penalties.

Submit
14. A student locates a story online, copies it, and submits it to the teacher as his or her own work. This is:

Explanation

Copying someone else's work and submitting it as one's own is considered plagiarism, which is unethical and against academic integrity. It is also illegal as it infringes on the original author's rights to their work. Therefore, the action described in the question is both plagiarism and illegal.

Submit
15. An uninstaller is a utility program that:

Explanation

An uninstaller is a utility program that removes a program from a computer. It is designed to cleanly remove all the files, folders, and registry entries associated with the program, ensuring that no traces are left behind. This helps in freeing up disk space and maintaining the overall performance of the computer.

Submit
16. In the Internet address "www.canton.edu," the ".edu" indicates:

Explanation

The ".edu" in the internet address "www.canton.edu" indicates the type of organization represented by the address. In this case, it suggests that the website belongs to an educational institution.

Submit
17. Symbols such as :) (smile), :( (frown), :\ (undecided), and :o (surprise)-used to express feeling in an e-mail message are called:

Explanation

Emoticons are symbols used to express feelings in an e-mail message. They include symbols like :) (smile), :( (frown), :\ (undecided), and :o (surprise). Emoticons are a popular way to add emotion and tone to written communication, allowing the sender to convey their feelings more effectively.

Submit
18. What is a web browser plug-in?

Explanation

A web browser plug-in is a program that enhances the functionality of a web browser by adding specific features that allow it to play or view certain files. These plug-ins are designed to extend the capabilities of the browser beyond its default capabilities, enabling users to access and interact with various types of multimedia content, such as videos, audio files, or interactive applications, directly within the browser window. This eliminates the need for separate software or applications to handle specific file types, providing a more seamless and convenient browsing experience.

Submit
19. Plagiarism is:

Explanation

Plagiarism refers to the act of copying someone else's ideas or written work without acknowledging the original author. This can involve directly copying text, paraphrasing without proper citation, or even presenting someone else's ideas as one's own. It is a form of intellectual theft and is considered unethical and dishonest in academic and professional settings. Properly crediting the original author is essential in order to avoid plagiarism and give credit where it is due.

Submit
20. When you save a document from a webpage to your computer it is called:

Explanation

When you save a document from a webpage to your computer, it is called downloading. Downloading refers to the process of transferring files or data from a remote computer or server to a local device, such as a computer or smartphone. In this case, the document is being retrieved from the webpage and saved onto the user's computer for offline access or future reference.

Submit
21. Which of the following is unacceptable use of the computer network?

Explanation

Sharing your password, leaving the computer logged in upon leaving the computer lab, and giving out personal information are all examples of unacceptable use of the computer network. Sharing passwords compromises the security of the network and allows unauthorized access. Leaving the computer logged in can lead to unauthorized use or access to personal information. Giving out personal information can result in privacy breaches and potential identity theft. Therefore, all of the above options are unacceptable uses of the computer network.

Submit
22. The connecting of computers so that information can be shared is called:

Explanation

Networking refers to the process of connecting computers together so that they can communicate and share information with each other. It involves the use of hardware devices such as routers, switches, and cables, as well as software protocols and configurations. Networking allows for the sharing of resources, such as files and printers, and enables communication between users, whether they are in the same location or in different parts of the world. It is an essential component of modern computer systems and is used in various settings, including homes, offices, and data centers.

Submit
23. When planning a database, what is the first step?

Explanation

The first step in planning a database is to select fields. This involves identifying the specific data that needs to be stored in the database and determining the appropriate fields or columns to accommodate that data. By selecting fields at the beginning of the planning process, it becomes easier to organize and structure the database effectively. Choosing the right fields sets the foundation for the entire database design and ensures that it can accurately capture and store the required information.

Submit
24. The part of a computer that controls the flow of information and manages tasks is the:

Explanation

The central processing unit (CPU) is responsible for controlling the flow of information and managing tasks in a computer. It is often referred to as the "brain" of the computer as it carries out instructions and performs calculations. The CPU interprets and executes instructions from the computer's memory, performs arithmetic and logical operations, and coordinates the activities of all the other hardware components. It is essential for the overall functioning of the computer system.

Submit
25. The blinking line, box, or arrow on the computer screen is called the:

Explanation

The blinking line, box, or arrow on the computer screen is called the cursor. The cursor indicates the current position where the user can input text or perform actions. It can be moved using a mouse or keyboard, allowing the user to interact with different elements on the screen. The cursor is an essential part of the user interface, providing visual feedback and guiding the user's actions on the computer.

Submit
26. Which of the following information is safe to share in a public chatroom or blog?

Explanation

Sharing only a screen name in a public chatroom or blog is safe because it does not reveal personal information such as age, name, school, or organization. By sharing only a screen name, individuals can maintain their privacy and protect themselves from potential risks such as identity theft or cyberbullying. It is important to avoid sharing too much personal information online to ensure online safety.

Submit
27. What is similar to a copy machine, except that it creates a digital file of the image?

Explanation

A scanner is similar to a copy machine in that it can create a digital file of an image. While a copy machine creates a physical copy of a document, a scanner captures the image and converts it into a digital file that can be stored, edited, or shared electronically. This allows for easy duplication and manipulation of the image without the need for physical copies. A fax machine, on the other hand, transmits a document electronically over a telephone line. A digitizer is a device that converts analog signals into digital data, but it is not specifically used for creating digital files of images.

Submit
28. Word-wrap allows you to type text that continuously flows to the next line without having to press the:

Explanation

Word-wrap allows you to type text that continuously flows to the next line without having to press the Enter/return key. This means that you can type without having to manually move the cursor to the next line, as the text will automatically wrap to the next line when it reaches the end of the current line.

Submit
29. Software programs or hardware devices setup to protect computers while online are called:

Explanation

Firewalls are software programs or hardware devices that are set up to protect computers while online. They act as a barrier between a computer or a network and potential threats from the internet, such as hackers or malware. Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules, allowing only authorized connections and blocking unauthorized access. They help to prevent unauthorized access to a computer or network and protect sensitive information from being compromised.

Submit
30. To run power hungry programs such as video editing software the computer needs a lot of:

Explanation

RAM stands for Random Access Memory, and it is a type of computer memory that is used to store data that is being actively used by the computer. Power hungry programs, such as video editing software, require a lot of RAM because they need to store and process large amounts of data in real-time. RAM allows the computer to quickly access and manipulate this data, which is essential for running these types of programs smoothly. Therefore, to run power hungry programs like video editing software, the computer needs a lot of RAM.

Submit
31. To change from Times New Roman to Arial, you must change the:

Explanation

To change the font from Times New Roman to Arial, you need to modify the font settings. The font determines the typeface or style of the text. Therefore, changing the font is the correct action to switch from Times New Roman to Arial.

Submit
32. Which of the following are examples of how to use the Internet safely?

Explanation

All of the options provided are examples of how to use the Internet safely. Having anti-virus and firewall software on your computer helps protect it from viruses and unauthorized access. Avoiding downloading attachments from unknown sources reduces the risk of downloading malware. Using strong and hard-to-guess passwords adds an extra layer of security to your online accounts. Therefore, all of the given options contribute to safe Internet usage.

Submit
33. Computer-based models of real-life situations are called:

Explanation

Computer-based models that replicate real-life situations are referred to as simulations. Simulations are designed to imitate the behavior and characteristics of the real-world scenario they represent. They are used in various fields such as training, research, and entertainment to provide a realistic and interactive experience. Simulations can be used to study complex systems, test hypotheses, train individuals in specific skills, or even simulate scenarios that are too dangerous or costly to recreate in real life. Virtual Mark Up and Computer-based training are not the correct terms for computer-based models of real-life situations, hence the answer is simulations.

Submit
34. This word processing feature allows information to be organized in rows and columns:

Explanation

Tables are a word processing feature that allows information to be organized in rows and columns. They are used to present data in a structured and easy-to-read format, making it easier for readers to understand and analyze the information. Tables are commonly used in documents such as reports, presentations, and spreadsheets to display data in a systematic manner. They provide a clear visual representation of data, making it convenient to compare and contrast different values or categories.

Submit
35. A file that records a user's website visits and preferences is called a(n):

Explanation

A file that records a user's website visits and preferences is called a cookie file. Cookies are small text files that are created by websites and stored on a user's computer. These files contain information such as login credentials, site preferences, and browsing history. When a user visits a website, the cookie file is accessed to provide personalized content and streamline the user experience. Therefore, the correct answer is cookie file.

Submit
36. What does .edu in an e-mail address or URL indicate?

Explanation

The presence of .edu in an e-mail address or URL typically indicates that the entity associated with it is a college or university. This is because .edu is a top-level domain specifically reserved for educational institutions in the United States. Therefore, if an e-mail address or URL contains .edu, it is likely that it belongs to a college or university rather than a commercial company, organization, or business website.

Submit
37. Which of the following activities would be best accomplished using a spreadsheet?

Explanation

A spreadsheet is a software application that is specifically designed for organizing, analyzing, and presenting data in a tabular form. It allows users to input data, perform calculations, and create visual representations such as graphs and charts. In this case, generating a graph of students' favorite sports would be best accomplished using a spreadsheet because it involves organizing and analyzing data to create a visual representation. The other activities mentioned, such as peer-editing reports and changing fonts and colors, can be done using word processing software or presentation software, but they do not require the data organization and analysis capabilities of a spreadsheet.

Submit
38. Which of the following types of files CANNOT be opened in a word processing software?

Explanation

.dat files cannot be opened in a word processing software because they are typically data files that contain raw data and are not meant to be viewed or edited as text. Word processing software is designed to open and edit text-based files such as .doc and .txt, but it does not have the capability to interpret or display the content of .dat files. Therefore, .dat files cannot be opened in a word processing software.

Submit
39. Which of the following is an output device:

Explanation

An output device is a device that is used to display or present information to the user. In this case, a printer is an output device because it is used to produce a physical copy of information, such as text or images, onto paper. The other options listed, such as keyboard, microphone, and mouse, are all input devices as they are used to input or provide information to the computer.

Submit
40. Ethical use of the Internet states users DO NOT send spam, which is a (n):

Explanation

An unsolicited message sent to many recipients refers to spam. Spam is considered unethical because it is an unwanted and often intrusive form of communication that can clog up email inboxes and waste people's time. It is important for users to respect others' privacy and only send messages that are requested or relevant to the recipient.

Submit
41. The part if a word processing document used to display repetitive information such as titles, dates, and page numbers is:

Explanation

The correct answer is "Header and footer". In a word processing document, the header and footer sections are used to display repetitive information such as titles, dates, and page numbers. The header appears at the top of each page, while the footer appears at the bottom. This feature is commonly used in documents like reports or essays to maintain consistency and provide important information throughout the document.

Submit
42. Your document has not come out of the printer. Which of these do NOT do?

Explanation

This option suggests that you should keep trying to print the document by going to the File menu and selecting the Print option repeatedly until the document comes out. However, this is not a recommended solution as it is unlikely to resolve the issue. It is important to check other potential problems such as whether you printed to the correct printer, if the paper tray is full, or if there is a paper jam.

Submit
43. What software would you most likely use to compare the average snowfall from several locations?

Explanation

A spreadsheet software is the most suitable tool for comparing the average snowfall from several locations. Spreadsheets allow you to organize and analyze data in a tabular format, making it easy to input and manipulate numerical data. You can easily calculate the average snowfall by using formulas and functions in a spreadsheet. Additionally, you can create charts and graphs to visually compare the snowfall data from different locations, helping you to identify patterns or trends.

Submit
44. Which of the following would you use to compute the average score of four tests using a spreadsheet?

Explanation

To compute the average score of four tests using a spreadsheet, you would use a formula. A formula allows you to perform calculations and manipulate data in a spreadsheet. By using a formula, you can easily add up the scores of the four tests and divide it by four to find the average. This automated process saves time and ensures accuracy in calculating the average score.

Submit
45. Which of the following is always legal when you buy a computer game on a CD-ROM?

Explanation

When you buy a computer game on a CD-ROM, it is always legal to load the game on one computer that you use. This means that you can install and play the game on a single computer that belongs to you. However, it is not legal to burn copies of the game on CDs and give them to your friends, as this would be a violation of copyright laws. Additionally, loading the game on all of the computers that you use is also not legal, as it would exceed the scope of the license agreement for the game. Therefore, the correct answer is to load the game on one computer that you use.

Submit
46. The default page setup that prints the document vertically is called:

Explanation

The default page setup that prints the document vertically is called "Portrait". This means that the page is oriented vertically, with the longer side of the paper running vertically. This is the most common and default orientation for printing documents.

Submit
47. To find the average daily amount of rainfall over a four-week period, which software program would be the BEST to use to record data and find the average?

Explanation

A spreadsheet would be the best software program to use to record data and find the average daily amount of rainfall over a four-week period. Spreadsheets allow for easy organization and manipulation of data, making it simple to input and calculate the average rainfall for each day. Additionally, spreadsheets have built-in functions that can quickly calculate averages, saving time and effort in the data analysis process.

Submit
48. The simulation of a real or imagined environment that appears as a three-dimensional (3-D) space is called:

Explanation

Virtual reality refers to the simulation of a real or imagined environment that appears as a three-dimensional space. It involves the use of computer technology to create a completely immersive experience for the user, allowing them to interact with and explore the virtual environment. This can be achieved through the use of specialized hardware, such as headsets or gloves, that track the user's movements and provide a sense of presence within the virtual world. Virtual reality is often used in various fields, including gaming, training, education, and entertainment.

Submit
49. Which feature of your word processing program would you use to send a form letter to a group of names and addresses:

Explanation

Mail Merge is the correct answer because it is a feature in word processing programs that allows users to create personalized documents, such as form letters, by merging a main document with a data source that contains names and addresses. This feature automates the process of sending the same letter to multiple recipients with personalized information, saving time and effort for the user.

Submit
50. When searching for a topic using a web search engine, which are the best Boolean operators to use with your keywords to get better results:

Explanation

Using the Boolean operators AND, OR, and NOT in a web search allows for more precise and targeted results. The operator AND narrows down the search by including all the specified keywords, while OR broadens the search by including any of the specified keywords. The operator NOT excludes certain keywords from the search results. By combining these operators effectively, users can refine their search and find the most relevant information.

Submit
51. The first thing to consider when developing a multimedia presentation is:

Explanation

When developing a multimedia presentation, the first thing to consider is the audience. The audience's needs, preferences, and level of understanding should be taken into account in order to create a presentation that effectively communicates the intended message. By considering the audience, the presenter can tailor the content, tone, and style of the presentation to ensure maximum engagement and comprehension.

Submit
52. Which of the following activities would be best accomplished using a database?

Explanation

Creating a catalog of all the books in a classroom library would be best accomplished using a database. A database allows for organizing and storing large amounts of data, such as book titles, authors, genres, and other relevant information. It provides a structured and efficient way to search, sort, and update the catalog, making it easier to manage and access the information. Additionally, a database can support features like generating reports, tracking book availability, and providing search functionality, which are essential for maintaining a comprehensive catalog of books in a library.

Submit
53. Which of the following would be the most reliable source of information for a school report?

Explanation

www.britannica.com would be the most reliable source of information for a school report because it is a well-known and reputable website that provides accurate and factual information. Unlike Wikipedia, which can be edited by anyone, www.britannica.com is a trusted source that is written and reviewed by experts in their respective fields. A political blog from a radio show may have biased or opinionated information, making it less reliable. Similarly, a classmate may not have the same level of expertise or access to credible sources as www.britannica.com.

Submit
54. To investigate the impact of the Ice Age on the formation of the Great Lakes, which of the following types of software would give you the ability to see what happened over time without actually being alive during the Ice Age?

Explanation

Simulation software would give you the ability to see what happened over time without actually being alive during the Ice Age. Simulation software allows users to create virtual models or scenarios that mimic real-world situations. In this case, the simulation software could be used to recreate the conditions of the Ice Age and simulate the formation of the Great Lakes over time. This would provide valuable insights into the impact of the Ice Age on the formation of the Great Lakes without the need to physically observe the events.

Submit
55. In the e-mail address "[email protected]", the domain is:

Explanation

In an email address, the domain is the part that comes after the "@" symbol. It typically consists of two parts: the domain name and the top-level domain (TLD).
  • In this case, the domain name is "sllboces," which represents the organization or entity associated with the email address.
  • The TLD is ".org," indicating that the organization is a non-profit or non-commercial entity, such as a charity, educational institution, or open-source project.
The other options are incorrect because "model" is the username or local part of the email address, and ".org" is the TLD but not the complete domain. The complete domain includes both the domain name and the TLD: "sllboces.org."
Submit
56. The instructions written in code that tell a web page how to display properly are called:

Explanation

The instructions written in code that tell a web page how to display properly are called Hypertext Markup Language (HTML). HTML is the standard markup language used for creating web pages and it provides a structure for the content on a web page, including headings, paragraphs, images, links, and other elements. It is responsible for defining the layout, formatting, and appearance of the web page content. HTTP is a protocol used for transferring data over the internet, FTP is a protocol used for transferring files, and BASIC is a programming language.

Submit
57. A computer virus is transmitted MOST often through:

Explanation

Email attachments are the most common method of transmitting computer viruses. This is because email attachments can contain malicious code or executable files that, when opened, can infect the recipient's computer. Cybercriminals often use email attachments as a way to trick users into downloading and executing the virus unknowingly. Therefore, it is important to be cautious when opening email attachments and to ensure they are from a trusted source before opening them.

Submit
58. Personal copyright protection usually lasts for

Explanation

Personal copyright protection typically lasts for the lifetime of the artist plus a certain number of years after their death. In this case, the correct answer is "The lifetime of the artist plus 70-95 years," which means that the artist's work is protected for their entire lifetime and an additional 70-95 years after their death. This allows the artist's estate and heirs to benefit from their creations and prevents unauthorized use or reproduction of their work during this period.

Submit
59. Guidelines written to protect the original work of others:

Explanation

Fair Use Rules are guidelines that are designed to protect the original work of others while allowing limited use of copyrighted material without permission from the copyright owner. These rules provide a framework for determining whether the use of copyrighted material is fair or infringing. They consider factors such as the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect of the use on the market for the original work. Fair Use Rules help to balance the rights of copyright holders with the need for creativity and expression.

Submit
60. Software that blocks access to certain websites is called __________ software.

Explanation

The given question asks for the name of the software that blocks access to certain websites. Among the options provided, "Filtering" is the correct answer. Filtering software is specifically designed to restrict or limit access to certain websites based on predefined criteria or settings. It allows users to control the content that can be accessed on their devices or networks, making it an effective tool for internet safety and security.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 20, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 20, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2009
    Quiz Created by
    Bharris
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Getting into someone else's computer without their permission is...
Which of these is the best way to find websites containing...
What does multitasking mean?
Adding your comments to a blog or forum is called
Which of the following is an example of an image file?
MP3 and WAV files are examples of:
AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and...
Clickable words on a Web page that direct you to another Web page...
When you try to access the Internet, you get error messages stating...
The process of making readable data into unreadable...
When you change the color and background of a chart in a...
You have asked students to write a report on "How the Civil...
Copying copyright protected software and giving it to others for free...
A student locates a story online, copies it, and submits it to the...
An uninstaller is a utility program that:
In the Internet address "www.canton.edu," the...
Symbols such as :) (smile), :( (frown), :\ (undecided), and...
What is a web browser plug-in?
Plagiarism is:
When you save a document from a webpage to your computer it...
Which of the following is unacceptable use of the computer network?
The connecting of computers so that information can be shared...
When planning a database, what is the first step?
The part of a computer that controls the flow of information...
The blinking line, box, or arrow on the computer screen is called the:
Which of the following information is safe to share in a...
What is similar to a copy machine, except that it creates a digital...
Word-wrap allows you to type text that continuously flows to the...
Software programs or hardware devices setup to protect...
To run power hungry programs such as video editing software...
To change from Times New Roman to Arial, you must change the:
Which of the following are examples of how to use the Internet safely?
Computer-based models of real-life situations are called:
This word processing feature allows information to be organized in...
A file that records a user's website visits and preferences is...
What does .edu in an e-mail address or URL indicate?
Which of the following activities would be best accomplished using...
Which of the following types of files CANNOT be opened in a...
Which of the following is an output device:
Ethical use of the Internet states users DO NOT send spam, which is...
The part if a word processing document used to display...
Your document has not come out of the printer. Which of these...
What software would you most likely use to compare the...
Which of the following would you use to compute the average score...
Which of the following is always legal when you buy a computer...
The default page setup that prints the document vertically is called:
To find the average daily amount of rainfall over a four-week...
The simulation of a real or imagined environment that appears as...
Which feature of your word processing program would you use to...
When searching for a topic using a web search engine, which are...
The first thing to consider when developing a multimedia...
Which of the following activities would be best accomplished using...
Which of the following would be the most reliable source of...
To investigate the impact of the Ice Age on the formation of the...
In the e-mail address "[email protected]", the domain is:
The instructions written in code that tell a web page how to...
A computer virus is transmitted MOST often through:
Personal copyright protection usually lasts for
Guidelines written to protect the original work of others:
Software that blocks access to certain websites is called...
Alert!

Advertisement