REVISED NOCTI STUDY GUIDE| 2026 UPDATE | QUESTIONS AND ANSWERS |
WITH COMPLETE SOLUTION
The unauthorized copying of software is referred to as: - (Correct Answer)-Pirated Software
There are images online that you want to use. The website states that the images are not
copyrighted. You think you can use these without breaking the law. These images are referred to
being in the what? - (Correct Answer)-Public Domain
The best security for passwords is: - (Correct Answer)-Memorize it
Eight bits equal how many bytes? - (Correct Answer)-1
One megabyte equals how many bytes? - (Correct Answer)-1,048,576 bytes
Storing data for the long term is called what? - (Correct Answer)-Archiving
A logical series of instructions given to a computer is called a what? - (Correct Answer)-Program
A technician can run a program or file on your computer that performs commonly repeated tasks.
What is this program or file called? - (Correct Answer)-Script
What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? - (Correct
Answer)-Wrist Rest
Which of the following fire extinguishers should be used to put out an electrical fire? - (Correct
Answer)-Class C
, 2
Of the following printers, which one actually touches the paper to print? - (Correct Answer)-
Impact
What is the most popular port that can connect peripheral devices like printers? - (Correct
Answer)-USB
A single-sided, single density DVD recordable has a capacity of what? - (Correct Answer)-4.7
GB
In Excel, the intersection of a row and a column is called what? - (Correct Answer)-Cell
A database file that contains all the information about a single entity is called what? - (Correct
Answer)-Record
Margin, spacing, and font size are all examples of what? - (Correct Answer)-Formatting
Combining address file data with a form letter is called what? - (Correct Answer)-Mail Merge
What type of a network would you set up for use in a single building? - (Correct Answer)-LAN
A network set up where each computer could be a server or a workstation is called what? -
(Correct Answer)-Peer to peer
, 3
What is the most common networking protocol? - (Correct Answer)-TCP/IP
The wireless encryption of _______ is the weakest encryption used. - (Correct Answer)-WEP
A computer that has malicious software on it that can be controlled by a master computer is
called what? - (Correct Answer)-Bot
A simple and inexpensive way to increase network security is to: - (Correct Answer)-Keep all
network equipment locked up and limit the number of people who have access - "access control"
Select the most secure password from the list: below:07SuhBW*36 ; Hbabies78 ; Password ;
67Eww98 - (Correct Answer)-07SuhBw*36
The slowest connection to the internet is a ______ connection. - (Correct Answer)-Dial-up
Which of the following transmits data using light pulses? - (Correct Answer)-Fiber optic cables
Use Bluetooth technology for connecting: - (Correct Answer)-Wireless accessories
To make it easier for people to get to places on the World Wide Web, a ______ server translates a
public domain name into its IP address. - (Correct Answer)-DNS
WITH COMPLETE SOLUTION
The unauthorized copying of software is referred to as: - (Correct Answer)-Pirated Software
There are images online that you want to use. The website states that the images are not
copyrighted. You think you can use these without breaking the law. These images are referred to
being in the what? - (Correct Answer)-Public Domain
The best security for passwords is: - (Correct Answer)-Memorize it
Eight bits equal how many bytes? - (Correct Answer)-1
One megabyte equals how many bytes? - (Correct Answer)-1,048,576 bytes
Storing data for the long term is called what? - (Correct Answer)-Archiving
A logical series of instructions given to a computer is called a what? - (Correct Answer)-Program
A technician can run a program or file on your computer that performs commonly repeated tasks.
What is this program or file called? - (Correct Answer)-Script
What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? - (Correct
Answer)-Wrist Rest
Which of the following fire extinguishers should be used to put out an electrical fire? - (Correct
Answer)-Class C
, 2
Of the following printers, which one actually touches the paper to print? - (Correct Answer)-
Impact
What is the most popular port that can connect peripheral devices like printers? - (Correct
Answer)-USB
A single-sided, single density DVD recordable has a capacity of what? - (Correct Answer)-4.7
GB
In Excel, the intersection of a row and a column is called what? - (Correct Answer)-Cell
A database file that contains all the information about a single entity is called what? - (Correct
Answer)-Record
Margin, spacing, and font size are all examples of what? - (Correct Answer)-Formatting
Combining address file data with a form letter is called what? - (Correct Answer)-Mail Merge
What type of a network would you set up for use in a single building? - (Correct Answer)-LAN
A network set up where each computer could be a server or a workstation is called what? -
(Correct Answer)-Peer to peer
, 3
What is the most common networking protocol? - (Correct Answer)-TCP/IP
The wireless encryption of _______ is the weakest encryption used. - (Correct Answer)-WEP
A computer that has malicious software on it that can be controlled by a master computer is
called what? - (Correct Answer)-Bot
A simple and inexpensive way to increase network security is to: - (Correct Answer)-Keep all
network equipment locked up and limit the number of people who have access - "access control"
Select the most secure password from the list: below:07SuhBW*36 ; Hbabies78 ; Password ;
67Eww98 - (Correct Answer)-07SuhBw*36
The slowest connection to the internet is a ______ connection. - (Correct Answer)-Dial-up
Which of the following transmits data using light pulses? - (Correct Answer)-Fiber optic cables
Use Bluetooth technology for connecting: - (Correct Answer)-Wireless accessories
To make it easier for people to get to places on the World Wide Web, a ______ server translates a
public domain name into its IP address. - (Correct Answer)-DNS