Nocti Practice Test Questions with 100% Verified
Answers 2026
The unauthorized copying of software is referred to as: -
ANSWER Pirated Software
There are images online that you want to use. The website
states that the images are not copyrighted. You think you can
use these without breaking the law. These images are referred
to being in the what? - ANSWER Public Domain
The best security for passwords is: - ANSWER Memorize it
Eight bits equal how many bytes? - ANSWER 1
One megabyte equals how many bytes? - ANSWER 1,048,576
Storing data for the long term is called what? - ANSWER
Archiving
,2|Page
A logical series of instructions given to a computer is called a
what? - ANSWER Program
A technician can run a program or file on your computer that
performs commonly repeated tasks. What is this program or file
called? - ANSWER Script
What is one piece of hardware that can be used to prevent
Carpal Tunnel Syndrome? - ANSWER Wrist Rest
Which of the following fire extinguishers should be used to put
out an electrical fire? - ANSWER Class C
Of the following printers, which one actually touches the paper
to print? - ANSWER Impact
What is the most popular port that can connect peripheral
devices like printers? - ANSWER USB
,3|Page
A single-sided, single density DVD recordable has a capacity of
what? - ANSWER 4.7 GB
In Excel, the intersection of a row and a column is called what? -
ANSWER Cell
A database file that contains all the information about a single
entity is called what? - ANSWER Record
Margin, spacing, and font size are all examples of what? -
ANSWER Formatting
Combining address file data with a form letter is called what? -
ANSWER Mail Merge
What type of a network would you set up for use in a single
building? - ANSWER LAN
A network set up where each computer could be a server or a
workstation is called what? - ANSWER Peer to peer
, 4|Page
What is the most common networking protocol? - ANSWER
TCP/IP
The wireless encryption of _______ is the weakest encryption
used. - ANSWER WEP
A computer that has malicious software on it that can be
controlled by a master computer is called what? - ANSWER Bot
A simple and inexpensive way to increase network security is to:
- ANSWER Keep all network equipment locked up and limit the
number of people who have access - "access control"
Select the most secure password from the list below:
07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 - ANSWER
07SuhBw*36
The slowest connection to the internet is a ______ connection.
- ANSWER Dial-up