Nocti Practice Test questions and answers well illustrated.
Nocti Practice Test questions and answers well illustrated. The unauthorized copying of software is referred to as: - correct answers.Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? - correct answers.Public Domain The best security for passwords is: - correct answers.Memorize it Eight bits equal how many bytes? - correct answers.1 One megabyte equals how many bytes? - correct answers.1,048,576 Storing data for the long term is called what? - correct answers.Archiving A logical series of instructions given to a computer is called a what? - correct answers.Program A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? - correct answers.Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? - correct answers.Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? - correct answers.Class C Of the following printers, which one actually touches the paper to print? - correct answers.Impact What is the most popular port that can connect peripheral devices like printers? - correct answers.USB A single-sided, single density DVD recordable has a capacity of what? - correct answers.4.7 GB In Excel, the intersection of a row and a column is called what? - correct answers.Cell A database file that contains all the information about a single entity is called what? - correct answers.Record Margin, spacing, and font size are all examples of what? - correct answers.Formatting Combining address file data with a form letter is called what? - correct answers.Mail Merge What type of a network would you set up for use in a single building? - correct answers.LAN A network set up where each computer could be a server or a workstation is called what? - correct answers.Peer to peer What is the most common networking protocol? - correct answers.TCP/IP The wireless encryption of _______ is the weakest encryption used. - correct answers.WEP A computer that has malicious software on it that can be controlled by a master computer is called what? - correct answers.Bot A simple and inexpensive way to increase network security is to: - correct answers.Keep all network equipment locked up and limit the number of people who have access - "access control" Select the most secure password from the list below: 07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 - correct answers.07SuhBw*36 The slowest connection to the internet is a ______ connection. - correct answers.Dial-up Which of the following transmits data using light pulses? - correct answers.Fiber optic cables Use Bluetooth technology for connecting: - correct answers.Wireless accessories To make it easier for people to get to places on the World Wide Web, a ______ server translates a public domain name into its IP address. - correct answers.DNS The OSI networking model contains ______ layers. - correct answers.7 A national or global network of computers is called a: - correct answers.LAN A widely used method to display a network topology is a: - correct answers.Network Chart A type of virus that copies itself repeatedly using up system resources is called? - correct answers.Worm Entering the statement ("cat and dog"), without the parenthesis will return what results? - correct answers.Precisely "cat and dog" only What software is required to access .pdf files? - correct answers.Acrobat Reader The general way to transfer files over the internet is to use? - correct answers.FTP A/An ______ is an address for a web page or other resource online. - correct answers.URL On the World Wide Web, the ______ is also known as the server. - correct answers.Web host On the World Wide Web, the ______ is also known as the client. - correct answers.Web browser An email address is a combination of a user name and what name? - correct answers.Domain When using email software to send an email message, regular recipients are unable to view recipients who have: - correct answers.Been blind carbon copied An example of a correct data hierarchy in a database is: - correct answers.File, record, field, character When using a spreadsheet to specify a simple arithmetic expression, perform ______ first. - correct answers.Exponentiation A feature that allows certain hardware to directly access the system memory and bypasses the CPU is: - correct answers.DMA An operating system is: - correct answers.Software that controls the execution of programs, input/output, resource scheduling, and data management A secure windows disk file system must use: - correct answers.NTFS Software that allows an operating system to communicate with hardware is called a/an? - correct answers.Device Driver A router is a device that makes decisions about? - correct answers.What network path packets should follow One difference between RAM and ROM is: - correct answers.That RAM is volatile and ROM is non-volatile A type of chart designed to analyze and represent tasks involved in completing a given project is known as a: - correct answers.PERT chart A ______ chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project. - correct answers.Gantt When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a: - correct answers.Flowchart A properly attached wrist strap decreases the chance of: - correct answers.ESD A technician runs a ______ program to determine the system's reachability across the network. - correct answers.Ping Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run? - correct answers.Tracert Organizing a solution that proceeds from the general to the specific is called? - correct answers.Top-down design A program of logical series of ______ that tell a computer what to do. - correct answers.Instructions Input/output devices are also known as? - correct answers.Peripherals The term computer ethics, refers to - correct answers.A person's conduct and behavior as a computer operator A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the: - correct answers.Ethernet Cable Select the most secure password from the list below: 078uhBU*38 ; hbacon68 ; 93niGhkL ; kruystall23 - correct answers.078uhBU*38 When keying a title in the first row of a six-column table, use the ______ option in the table menu to combine and center a title across all columns. - correct answers.Merge To resize the chart in a spreadsheet, the user can: - correct answers.Drag the corner of the chart A field that uniquely identifies a record within a database is called a/an _____ field. - correct answers.Key When using a spreadsheet to specify a simple arithmetic expression perform ______ first. - correct answers.Exponentiation What type of control function allows for the body of the loop to run a set number of iterations? - correct answers.For next What is the default sort order in a database? - correct answers.Ascending One component of a database file that contains all the information about a single entity is referred to as/an: - correct answers.Record The two methods to consolidate data from multiple spreadsheets are position and: - correct answers.Category The term, prioritizing, relates to: - correct answers.Managing time Use Bluetooth technology for connecting: - correct answers.Wireless accessories A router is a device that makes decisions about: - correct answers.What network path packets should follow To navigate to the next cell horizontally and the vertically in a word processing table, press the ______ key. - correct answers.Tab The best method to test whether RAM is faulty is to - correct answers.Replace faulty RAM with working RAM The two basic ways to retrieve records in most database programs are: - correct answers.Find command and queries Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the ______ of September. - correct h Employees in the ABC Company have limited access to company information. This security measure is called: - correct answers.Access Control A set of moral standards for judging whether something is right or wrong is known as: - correct answers.Ethics A/An _____ is an address for a web page or other resource on the internet. - correct answers.URL The crime of ______ occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts. - correct answers.Identity Theft In presentation applications, which of the following options is selected to add transitions to all slides? - correct answers.Apply to all A file sent with an email message is called: - correct answers.An attachment In a spreadsheet application, a reference that refers to the same cell or range on multiple sheets is called: - correct answers.3-D During the implementation phase, code is constructed by information gathered during the ______ phase. - correct answers.Design A software program that automatically routes unwanted email advertisement and other junk mail to the deleted items folder or email software is called: - correct answers.Spam filter A _____ would be used for detailed comments at the bottom of every page with a reference in a research document. - correct answers.Footnote A high-end cellular phone that combines the functionality of a personal digital assistant and a mobile phone is called a/an: - correct answers.Smart phone An input device that is used to identify fingerprints is: - correct answers.Biometric device Using adjustable workstations to prevent awkward body positioning, and to meet the unique physical needs of an individual is an example of: - correct answers.Ergonomics A function in a spreadsheet program that gives the user a set number of entries to choose from when entering data is: - correct answers.A drop-down list For the assistance in exporting a data list from a spreadsheet, the user can use a: - correct answers.Wizard The information processing cycle includes: - correct answers.Input, processing, output, storage Demonstrating a professional attitude at work involves which of the following characteristics? - correct answers.Working with others in your group for the good of the company The process of adding all the numbers in a range of cells can be performed by using a: - correct answers.Sum function A GUI program focuses on _____-centered design styles. - correct answers.Beginner The ____ programming style allows users to interact with the computer via graphics instead of commands. - correct answers.GUI Which of the following domains indicated an accredited United States educational organization. - correct answers..edu When developing an online help system, _____ allow users to follow along step-by-step. - correct nshots A customized animation effect created by the user for presentations is called - correct n path The _____ is exclusively designed for temporary data storage. - correct answers.RAM A devices that directs traffic on a network is called a - correct r To create a heading to span across two or more columns, the user should - correct cells To simultaneously edit the background of the slides in a presentation, use the - correct master The computer's clipboard is - correct answers.a place in the memory to aid in cutting, copying, and pasting A smartphone, such as an iPhone or Android, typically uses a ____ type of interface - correct answers.GUI A word or a very short line that appears by itself at the end of a paragraph is called a/an - correct n When a disk error message appears during the boot-up process, the user should FIRST - correct t the computer When referencing more than one worksheet in a formula, the user would use which of the following symbols? - correct answers.! What option should the user select to play a sound clip continuously through a presentation? - correct until stopped The purpose of a subscript is to - correct nate an element of an array Text design, such as drop capitals and graphics embedded with watermarks, are both forms of ____ when using desktop publishing - correct al effects Unit testing is defined as the process of testing - correct module individually to discover errors in the code When listening to a customer's complain, which of the following is the most important - correct t in concise terms the problem as understood What spreadsheet function returns the largest number in a range? - correct answers.MAX Preset margins, tabs, line spacing, and fonts are all called ____ settings - correct lt The most common networking protocol of the internet is - correct answers.TCP/IP The ____ provides an interface between the user or application program and the computer hardware - correct ting system An approach that combines visual, audio, and interactive technologies is called - correct media In a command prompt, which utility scans a hard drive for problems with the file system and also for bad sectors - correct sk Which of the following sentences illustrates correct capitalization? - correct answers.The White House is located in Washington, D.C. The wireless encryption of ____ is the weakest encryption used. - correct answers.WEP A database ____ is a piece of code that is sent to a database in order to get information back from the database - correct Which of the following codes is produced by a compiler from the source code and is executed by the machine - correct t
Written for
- Institution
- Nocti Practice
- Course
- Nocti Practice
Document information
- Uploaded on
- September 6, 2023
- Number of pages
- 16
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal