100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

NOCTI PRACTICE TEST EXAM 2025 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
19-07-2025
Written in
2024/2025

The unauthorized copying of software is referred to as: - ANS Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? - ANS Public Domain The best security for passwords is: - ANS Memorize it Eight bits equal how many bytes? - ANS 1 One megabyte equals how many bytes? - ANS 1,048,576 Storing data for the long term is called what? - ANS Archiving A logical series of instructions given to a computer is called a what? - ANS Program A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? - ANS Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? - ANS Wrist Rest NOCTI PRACTICE TEST EXAM 2025 QUESTIONS AND ANSWERS 2 Copyright ©2025 THESTAR ALL RIGHTS RESERVED Which of the following fire extinguishers should be used to put out an electrical fire? - ANS Class C Of the following printers, which one actually touches the paper to print? - ANS Impact What is the most popular port that can connect peripheral devices like printers? - ANS USB A single-sided, single density DVD recordable has a capacity of what? - ANS 4.7 GB In Excel, the intersection of a row and a column is called what? - ANS Cell A database file that contains all the information about a single entity is called what? - ANS Record Margin, spacing, and font size are all examples of what? - ANS Formatting Combining address file data with a form letter is called what? - ANS Mail Merge What type of a network would you set up for use in a single building? - ANS LAN A network set up where each computer could be a server or a workstation is called what? - ANS Peer to peer What is the most common networking protocol? - ANS TCP/IP The wireless encryption

Show more Read less
Institution
NOCTI
Course
NOCTI










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NOCTI
Course
NOCTI

Document information

Uploaded on
July 19, 2025
Number of pages
22
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NOCTI PRACTICE TEST EXAM 2025
QUESTIONS AND ANSWERS



The unauthorized copying of software is referred to as: - ANS Pirated Software


There are images online that you want to use. The website states that the images are not
copyrighted. You think you can use these without breaking the law. These images are referred
to being in the what? - ANS Public Domain



The best security for passwords is: - ANS Memorize it



Eight bits equal how many bytes? - ANS 1



One megabyte equals how many bytes? - ANS 1,048,576



Storing data for the long term is called what? - ANS Archiving



A logical series of instructions given to a computer is called a what? - ANS Program


A technician can run a program or file on your computer that performs commonly repeated
tasks. What is this program or file called? - ANS Script


What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? -
ANS Wrist Rest


1 Copyright ©2025 THESTAR ALL RIGHTS RESERVED

,Which of the following fire extinguishers should be used to put out an electrical fire? -
ANS Class C



Of the following printers, which one actually touches the paper to print? - ANS Impact



What is the most popular port that can connect peripheral devices like printers? - ANS USB



A single-sided, single density DVD recordable has a capacity of what? - ANS 4.7 GB



In Excel, the intersection of a row and a column is called what? - ANS Cell


A database file that contains all the information about a single entity is called what? -
ANS Record



Margin, spacing, and font size are all examples of what? - ANS Formatting



Combining address file data with a form letter is called what? - ANS Mail Merge



What type of a network would you set up for use in a single building? - ANS LAN


A network set up where each computer could be a server or a workstation is called what? -
ANS Peer to peer



What is the most common networking protocol? - ANS TCP/IP



The wireless encryption of _______ is the weakest encryption used. - ANS WEP


2 Copyright ©2025 THESTAR ALL RIGHTS RESERVED

, A computer that has malicious software on it that can be controlled by a master computer is
called what? - ANS Bot



A simple and inexpensive way to increase network security is to: - ANS Keep all network
equipment locked up and limit the number of people who have access - "access control"


Select the most secure password from the list below:

07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 - ANS 07SuhBw*36



The slowest connection to the internet is a ______ connection. - ANS Dial-up



Which of the following transmits data using light pulses? - ANS Fiber optic cables



Use Bluetooth technology for connecting: - ANS Wireless accessories


To make it easier for people to get to places on the World Wide Web, a ______ server
translates a public domain name into its IP address. - ANS DNS



The OSI networking model contains ______ layers. - ANS 7



A national or global network of computers is called a: - ANS LAN



A widely used method to display a network topology is a: - ANS Network Chart



A type of virus that copies itself repeatedly using up system resources is called? - ANS Worm




3 Copyright ©2025 THESTAR ALL RIGHTS RESERVED

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
590
Member since
1 year
Number of followers
178
Documents
23588
Last sold
6 days ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

119 reviews

5
56
4
21
3
21
2
4
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions