CIS 110 INTRODUCTION TO
COMPUTERS FINAL EXAM
a subfolder under "Book" - Correct Answers -In the path C:\Book\Chapter8\images\
fly.jpg, "Chapter8" is _____.
Select one:
a. a top-level folder
b. a subfolder under "images"
c. a subfolder under "Book"
d. the drive name
File Explorer windows - Correct Answers -You use _____ to navigate, view, and work
with the contents and resources on your computer.
Select one:
a. application windows
b. dialog boxes
c. Start windows
d. File Explorer windows
window - Correct Answers -A(n) _____ is a rectangular work area on the desktop that
contains a program, text, files, or other data and tools.
Select one:
a. window
b. portal
c. app
d. smartcard
The file is within a compressed folder. - Correct Answers -Case-Based Critical Thinking
Questions
Case 7-2
You are working in a File Explorer window. Choose the best answer for each of these
scenarios.
You have opened a file, but cannot make modifications to it. What is the most likely
reason?
Select one:
,a. The file is within a compressed folder.
b. You have opened the file with the wrong program
c. You are working in desktop mode.
d. The desktop application is made for Windows 7.
over the Internet or another network - Correct Answers -Hacking most often occurs
____.
Select one:
a. in upscale suburban areas
b. when an attacker has physical access to a vulnerable computer
c. over the Internet or another network
d. on college campuses
surge suppressor - Correct Answers -A(n) ____ prevents power spikes from harming
your computer system.
Select one:
a. surge suppressor
b. UPS
c. rugged frame
d. antivirus suite
Trojan horse - Correct Answers -A ____ is a type of malware that masquerades as
something else.
Select one:
a. switchbot
b. zombie
c. Trojan horse
d. worm
a thumbnail of the application window appears - Correct Answers -If you point to an
application button on the desktop taskbar, _____.
Select one:
a. a thumbnail of the application window appears
b. the application becomes active
c. the application is maximized
d. a shortcut menu appears
E - Correct Answers -In the accompanying figure, the Address bar is denoted by box
_____.
Select one:
a. D
b. F
c. A
d. E
,in no way; the rules are the same - Correct Answers -File naming rules differ from folder
naming rules _____.
Select one:
a. in specifying a different maximum length for file names
b. in no way; the rules are the same
c. in the characters that are not allowed
d. in that two files in different folders may not have the same name
> - Correct Answers -You may not use the _____ character when creating a folder
name.
Select one:
a. >
b. !
c. @
d. .
are permanently deleted - Correct Answers -When you click "Empty Recycle Bin," files
stored in the Recycle Bin _____.
Select one:
a. return to their original position
b. can be retrieved using the Restore tab on the ribbon
c. are permanently deleted
d. are compressed
255 - Correct Answers -A folder name can have up to _____ characters.
Select one:
a. 8
b. 11
c. 255
d. 256
Ctrl - Correct Answers -To select nonadjacent files, press and hold the _____ key while
selecting individual files.
Select one:
a. Shift
b. Tab
c. Ctrl
d. Windows
zipper - Correct Answers -In a File Explorer window, you can tell that a folder is
compressed by the _____ icon displayed.
Select one:
a. exclamation point
b. open folder
c. zipper
d. empty folder
, You dragged the file, and the two folders are on the same drive. - Correct Answers -
Case-Based Critical Thinking Questions
Case 7-2
You are working in a File Explorer window. Choose the best answer for each of these
scenarios.
A file that was once in one folder is now in another folder, and missing from the original
folder. Why?
Select one:
a. You dragged the file, and the two folders are on different drives.
b. You dragged the file, and the two folders are on the same drive.
c. You used the Copy command instead of the Cut command.
d. The Clipboard was full and unable to accept the file.
the buttons in box B are grayed out - Correct Answers -In the accompanying figure, you
know that there is no previously displayed window because _____.
Select one:
a. box E is at the root directory
b. the buttons in box B are grayed out
c. none of the subdirectories in box A are opened
d. box D does not have a History tab visible
C - Correct Answers -The first hard drive in a computer is usually drive _____.
Select one:
a. C
b. A
c. E
d. Z
taskbar - Correct Answers -The desktop _____ is a horizontal bar containing buttons
that provide quick access to common tools and running programs.
Select one:
a. taskbar
b. Charms bar
c. Start screen
d. notification area
Extracting - Correct Answers -_____ means to create an uncompressed copy of a
compressed file or folder.
Select one:
a. Zipping
b. Extracting
c. Extruding
COMPUTERS FINAL EXAM
a subfolder under "Book" - Correct Answers -In the path C:\Book\Chapter8\images\
fly.jpg, "Chapter8" is _____.
Select one:
a. a top-level folder
b. a subfolder under "images"
c. a subfolder under "Book"
d. the drive name
File Explorer windows - Correct Answers -You use _____ to navigate, view, and work
with the contents and resources on your computer.
Select one:
a. application windows
b. dialog boxes
c. Start windows
d. File Explorer windows
window - Correct Answers -A(n) _____ is a rectangular work area on the desktop that
contains a program, text, files, or other data and tools.
Select one:
a. window
b. portal
c. app
d. smartcard
The file is within a compressed folder. - Correct Answers -Case-Based Critical Thinking
Questions
Case 7-2
You are working in a File Explorer window. Choose the best answer for each of these
scenarios.
You have opened a file, but cannot make modifications to it. What is the most likely
reason?
Select one:
,a. The file is within a compressed folder.
b. You have opened the file with the wrong program
c. You are working in desktop mode.
d. The desktop application is made for Windows 7.
over the Internet or another network - Correct Answers -Hacking most often occurs
____.
Select one:
a. in upscale suburban areas
b. when an attacker has physical access to a vulnerable computer
c. over the Internet or another network
d. on college campuses
surge suppressor - Correct Answers -A(n) ____ prevents power spikes from harming
your computer system.
Select one:
a. surge suppressor
b. UPS
c. rugged frame
d. antivirus suite
Trojan horse - Correct Answers -A ____ is a type of malware that masquerades as
something else.
Select one:
a. switchbot
b. zombie
c. Trojan horse
d. worm
a thumbnail of the application window appears - Correct Answers -If you point to an
application button on the desktop taskbar, _____.
Select one:
a. a thumbnail of the application window appears
b. the application becomes active
c. the application is maximized
d. a shortcut menu appears
E - Correct Answers -In the accompanying figure, the Address bar is denoted by box
_____.
Select one:
a. D
b. F
c. A
d. E
,in no way; the rules are the same - Correct Answers -File naming rules differ from folder
naming rules _____.
Select one:
a. in specifying a different maximum length for file names
b. in no way; the rules are the same
c. in the characters that are not allowed
d. in that two files in different folders may not have the same name
> - Correct Answers -You may not use the _____ character when creating a folder
name.
Select one:
a. >
b. !
c. @
d. .
are permanently deleted - Correct Answers -When you click "Empty Recycle Bin," files
stored in the Recycle Bin _____.
Select one:
a. return to their original position
b. can be retrieved using the Restore tab on the ribbon
c. are permanently deleted
d. are compressed
255 - Correct Answers -A folder name can have up to _____ characters.
Select one:
a. 8
b. 11
c. 255
d. 256
Ctrl - Correct Answers -To select nonadjacent files, press and hold the _____ key while
selecting individual files.
Select one:
a. Shift
b. Tab
c. Ctrl
d. Windows
zipper - Correct Answers -In a File Explorer window, you can tell that a folder is
compressed by the _____ icon displayed.
Select one:
a. exclamation point
b. open folder
c. zipper
d. empty folder
, You dragged the file, and the two folders are on the same drive. - Correct Answers -
Case-Based Critical Thinking Questions
Case 7-2
You are working in a File Explorer window. Choose the best answer for each of these
scenarios.
A file that was once in one folder is now in another folder, and missing from the original
folder. Why?
Select one:
a. You dragged the file, and the two folders are on different drives.
b. You dragged the file, and the two folders are on the same drive.
c. You used the Copy command instead of the Cut command.
d. The Clipboard was full and unable to accept the file.
the buttons in box B are grayed out - Correct Answers -In the accompanying figure, you
know that there is no previously displayed window because _____.
Select one:
a. box E is at the root directory
b. the buttons in box B are grayed out
c. none of the subdirectories in box A are opened
d. box D does not have a History tab visible
C - Correct Answers -The first hard drive in a computer is usually drive _____.
Select one:
a. C
b. A
c. E
d. Z
taskbar - Correct Answers -The desktop _____ is a horizontal bar containing buttons
that provide quick access to common tools and running programs.
Select one:
a. taskbar
b. Charms bar
c. Start screen
d. notification area
Extracting - Correct Answers -_____ means to create an uncompressed copy of a
compressed file or folder.
Select one:
a. Zipping
b. Extracting
c. Extruding