NOCTI - Information Technology questions and answers well illustrated.
NOCTI - Information Technology questions and answers well illustrated. The buying and selling of goods on the internet is called? a. Cash on Delivery b. E-commerce c. On-line banking d. E-Learner - correct answers.b. E-Commerce (Electronic Commerce) An example of a portable device that allows the user to access applications by touching the screen is a? a. Scanner b. Desktop Computer c. Tablet d. Printer - correct answers.c. Tablet Physical components of a computer system are called? a. Hardware b. Software c. Shareware d. Applications - correct answers.a. Hardware The unit of measurement for CPU speed is? a. Bytes b. Hertz c. Inches d. Yards - correct answers.b. Hertz A _____ is used to link regional or remote offices to headquarters internal network? a. LPN b. RPN c. VPN d. TPN - correct answers.c. VPN - Virtual Private Network LPN, RPN, and TPN are made up. CPU refers to this? a. Central Processing Unit b. Central Programming Unit c. Central Power Unit d. Central Phone Unit - correct answers.a. Central Processing Unit ___ is exclusively designed for temporary data storage? a. RAN b. REM c. ROM d. RAM - correct answers.d. RAM ROM - Read Only Memory RAM - Random Access Memory RAM stands for? a. Random Access Memory b. Random Array Memory c. Random Access Manager d. Random Access Manipulation - correct answers.a. Random Access Memory An antivirus program is an example of a ? a. Application program b. Utility Program c. Desktop Publishing d. Accounting Problem - correct answers.b. Utility Program A device that redirects traffic on a network is called a? a. Modem b. USB c. Scanner d. Router - correct answers.d. Router _______ is the most commonly used port used to connect peripheral devices (printers, storage devices, mice, and scanners). a. USB b. Ethernet c. PS/2 d. Serial - correct answers.a. USB - Universal Serial Bus PS/2 - keyboard and mice (green and purple circle plugs...long time ago) Input device that is used to identify a person's fingerprints, voice, eye, or handwritten signature. a. Microphone b. Scanner c. Digital Camera d. Biometrics - correct answers.d. Biometrics The ____ provides an interface between the user or application program and the computer hardware? a. Central Processing Unit - CPU b. Operating System c. Modem d. Keyboard - correct answers.b. Operating System A light-sensing input device that reads printed texts and graphics, and then translates the results into a form the computer can use is a? a. Digital Camera b. Tablet c. Scanenr d. Keyboard - correct answers.c. Scanner An input device that uses a monitor or LCD panel as the backdrop for input options is a? a. Scanner b. Touchscreen c. Digital Camera d. Microphone - correct answers.b. Touchscreen A program that searches the web for keywords and then returns a list is called a? a. Biometrics b. Application c. Utility d. Search Engine - correct answers.d. Search Engine An internet protocol that allows a user to safely transfer information is? a. DSL b. SSL c. TCP/IP d. CSV - correct answers.b. SSL The most common networking protocol of the internet is? a. SSL b. TCP/IP c. CSV d. DNS - correct answers.b. TCP/IP - Transmission Control Protocol/ Internet Protocol To make it easier for users to get to places on the World Wide Web, a ____ server translates a public domain into its IP address? a. WEP b. SSL c. DNS d. DSN - correct answers.c. DNS - Domain Name System What shape is represented by a decision in a flow chart? a. circle b. square c. diamond d. rectangle - correct answers.c. diamond What file type is best used to import a data source for a mail merge function? a. FTP b. CSV c. CVS d. SSL - correct answers.b. CSV A secure window disk file system must use? a. NTFS b. NFTS c. NSTF d. NTSF - correct answers.a. NTFS - New Technology File System The wireless encryption of ___ is the weakest encryption used? a. WIP b. WEP c. WED d. WVN - correct answers.b. WEP - Wired Equivalent Privacy A company that wants to tie various remote locations together would implement at? a. LAN b. BOT c. WAN d. CSV - correct answers.c. WAN A program that is designed to copy itself onto other software and to spread through multiple computers when the software is used is called a? a. bug b. virus c. mouse d. utility - correct answers.b. virus A ____ restricts the information traveling into and out of a computer? a. copyright b. domain c. modem d. firewall - correct answers.d. firewall A computer that has malicious software installed on it that can be controlled by a master computer is called a ____? a. BOT b. BIT c. BAT d. BUS - correct answers.a. BOT - known as web robots Some employees have limited access to company information. This security is called? a. WEP b. access control c. SSL d. DNS - correct answers.b. access control Preset margins, tabs, line spacing, and fonts are called _____ settings? a. common b. usual c. normal d. default - correct answers.d. default To create a heading to span across two or more columns, the user should? a. Hit enter b. merge cells c. right align d. left align - correct answers.b. merge cells An efficient way to complete 500 customers' personal invitations would be to create a? a. newsletter b. brochure c. mail merge d. advertisement - correct answers.c. mail merge Text design, such as drop capitals and graphics embedded with watermarks, are both forms of ____ when using desktop publishing? a. special effects b. filtering c. cropping d. cloning - correct answers.a. special effects To balance the text in columns, insert a _____ section break? a. next page b. continuous c. even page d. odd page - correct answers.b. continuous The y-axis scaled on a 3-D chart is derived from ____ in the worksheet? a. images b. columns c. rows d. values - correct answers.d. values A ____ is a device that makes decisions about what network path packets should follow? a. modem b. router c. scanner d. printer - correct answers.b. router In addition to detecting viruses and inoculating against them, ___ programs can repair infected programs and files? a. application b. accounting c. antivirus d. graphic - correct answers.c. antivirus Which chart or graph best shows the relationship of a part to a whole? a. Pie b. Line c. Bar d. Column - correct answers.a. pie To resize a chart in a spreadsheet, the user can drag the ___ of the chart? a. middle b. top c. bottom d. corner - correct answers.d. corner To reverse an action or its effect in a spreadshee, the user should select the ____ command? a. redo b. undo c. delete d. backspace - correct answers.b. undo A wrist wrest common device used to prevent this? a. CTS b. Chronic fatigue c. Arthritis d. Boredom - correct answers.a. CTS - Carpel Tunnel Syndrome ____ meets physiological needs of an individual at a workplace? a. ethics b. ergonomics c. peripherals d. prioritizing - correct answers.b. ergonomics - placement of seats, wrist wrest, straight back, both feet flat on floor
Written for
- Institution
- NOCTI - Information Technology
- Course
- NOCTI - Information Technology
Document information
- Uploaded on
- September 6, 2023
- Number of pages
- 15
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
nocti information technology
Also available in package deal