Nocti Practice Test (RMCTC ITA) Questions With Complete Solutions
The unauthorized copying of software is referred to as: correct answer: Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? correct answer: Public Domain The best security for passwords is: correct answer: Memorize it Eight bits equal how many bytes? correct answer: 1 One megabyte equals how many bytes? correct answer: 1,048,576 Storing data for the long term is called what? correct answer: Archiving A logical series of instructions given to a computer is called a what? correct answer: Program A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? correct answer: Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? correct answer: Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? correct answer: Class C Of the following printers, which one actually touches the paper to print? correct answer: Impact What is the most popular port that can connect peripheral devices like printers? correct answer: USB A single-sided, single density DVD recordable has a capacity of what? correct answer: 4.7 GB In Excel, the intersection of a row and a column is called what? correct answer: Cell A database file that contains all the information about a single entity is called what? correct answer: Record Margin, spacing, and font size are all examples of what? correct answer: Formatting Combining address file data with a form letter is called what? correct answer: Mail Merge What type of a network would you set up for use in a single building? correct answer: LAN A network set up where each computer could be a server or a workstation is called what? correct answer: Peer to peer What is the most common networking protocol? correct answer: TCP/IP The wireless encryption of _______ is the weakest encryption used. correct answer: WEP A computer that has malicious software on it that can be controlled by a master computer is called what? correct answer: Bot A simple and inexpensive way to increase network security is to: correct answer: Keep all network equipment locked up and limit the number of people who have access - "access control" Select the most secure password from the list below: 07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 correct answer: 07SuhBw*36 The slowest connection to the internet is a ______ connection. correct answer: Dial-up
Written for
- Institution
- Nocti
- Course
- Nocti
Document information
- Uploaded on
- October 12, 2023
- Number of pages
- 26
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
nocti practice test rmctc ita questions with com