Vocabulary Test 3 - Practice Intro It

10 Questions | Total Attempts: 95

SettingsSettingsSettings
Practice Test Quizzes & Trivia

Multiple choice practice test


Questions and Answers
  • 1. 
    Backup
    • A. 

      A software construct that stores information temporarily with automatic allocation of space, usually in last-in first-out order.

    • B. 

      To save information, programs etc. to an external source.

    • C. 

      A disk file used to hold programs or processes temporarily removed from main memory by a swap operation.

    • D. 

      Used to create space between characters.

  • 2. 
    Data Theft
    • A. 

      To have important files or information stolen from your computer.

    • B. 

      A cable having a flat, thin cross-section.

    • C. 

      Not changing or requiring regular refreshing; NON-VOLATILE.

    • D. 

      A company that sells hardware or software products.

  • 3. 
    Driver
    • A. 

      Moves the curser down to create a new line when typing.

    • B. 

      Someone who drives from place to place looking for unsecured wireless hot spots with the intent of using the hot spots illegitimately.

    • C. 

      Instructs the operating system on how to operate specific hardware.

    • D. 

      Connects your computer to your ISP or online service over a regular telephone line.

  • 4. 
    Encryption
    • A. 

      Allows your computer to be permanently connected to the Internet using telephone lines with faster service.

    • B. 

      A company or organization that provides access to the Internet through its servers, usually for a fee.

    • C. 

      A secure process for keeping confidential information private.

    • D. 

      Allows people to interact with a computer and computer-controlled devices.

  • 5. 
    Humidity
    • A. 

      High level of moisture causing damage to the computer

    • B. 

      Coding used for internet language.

    • C. 

      A window you can open to adjust various aspects of your computer, such as the volume, fonts, desktop background, mouse speed, and clock.

    • D. 

      A key used to access commands through the keyboard rather than the menus.

  • 6. 
    Ping
    • A. 

      To save a file onto your computer from another source, like the Internet.

    • B. 

      A test to see if a system on the Internet is working

    • C. 

      The page on the Internet, which most often gives users access to the rest of the Web site.

    • D. 

      The name given to any computer directly connected to the Internet.

  • 7. 
    Power spikes
    • A. 

      A system that allows people to send e-mail to one address, which is then copied and sent to all of the other subscribers to the mail list.

    • B. 

      Uploading, downloading, and transferring of information

    • C. 

      Short, fast transfers of electrical voltage, current, or energy.

    • D. 

      A horizontal strip at the top of a window that shows the menus available in a program.

  • 8. 
    Power spikes
    • A. 

      Short, fast transfers of electrical voltage, current, or energy.

    • B. 

      The software application that allows you to view Internet pages.

    • C. 

      The unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work.

    • D. 

      Monitor output that closely resembles the printed output.

  • 9. 
    Surge suppressor
    • A. 

      With regard to memory, virtual refers to temporarily storing information on the hard drive.

    • B. 

      Address locator at the top of any web page

    • C. 

      Electrical outlets that protect against power spikes. Power spikes can damage computer and hardware.

    • D. 

      The software used to produce documents, such as letters, posters, reports, and syllabi.

  • 10. 
    Uninterruptible power supply (UPS)
    • A. 

      One option for preventing data loss due to power outages is to install this device.

    • B. 

      A computer or software package that provides a specific service to client software running on other computers.

    • C. 

      Key strokes that enact the same commands available in the menus of a program.

    • D. 

      Readable and writeable memory that acts as a storage area while the computer is on, and is erased every time the computer is turned off.