QUESTIONS AND ANSWERS
The unauthorized copying of software is referred to as: - ANS Pirated Software
There are images online that you want to use. The website states that the images are not
copyrighted. You think you can use these without breaking the law. These images are referred
to being in the what? - ANS Public Domain
The best security for passwords is: - ANS Memorize it
Eight bits equal how many bytes? - ANS 1
One megabyte equals how many bytes? - ANS 1,048,576
Storing data for the long term is called what? - ANS Archiving
A logical series of instructions given to a computer is called a what? - ANS Program
A technician can run a program or file on your computer that performs commonly repeated
tasks. What is this program or file called? - ANS Script
What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? -
ANS Wrist Rest
1 Copyright ©2025 THESTAR ALL RIGHTS RESERVED
,Which of the following fire extinguishers should be used to put out an electrical fire? -
ANS Class C
Of the following printers, which one actually touches the paper to print? - ANS Impact
What is the most popular port that can connect peripheral devices like printers? - ANS USB
A single-sided, single density DVD recordable has a capacity of what? - ANS 4.7 GB
In Excel, the intersection of a row and a column is called what? - ANS Cell
A database file that contains all the information about a single entity is called what? -
ANS Record
Margin, spacing, and font size are all examples of what? - ANS Formatting
Combining address file data with a form letter is called what? - ANS Mail Merge
What type of a network would you set up for use in a single building? - ANS LAN
A network set up where each computer could be a server or a workstation is called what? -
ANS Peer to peer
What is the most common networking protocol? - ANS TCP/IP
The wireless encryption of _______ is the weakest encryption used. - ANS WEP
2 Copyright ©2025 THESTAR ALL RIGHTS RESERVED
, A computer that has malicious software on it that can be controlled by a master computer is
called what? - ANS Bot
A simple and inexpensive way to increase network security is to: - ANS Keep all network
equipment locked up and limit the number of people who have access - "access control"
Select the most secure password from the list below:
07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 - ANS 07SuhBw*36
The slowest connection to the internet is a ______ connection. - ANS Dial-up
Which of the following transmits data using light pulses? - ANS Fiber optic cables
Use Bluetooth technology for connecting: - ANS Wireless accessories
To make it easier for people to get to places on the World Wide Web, a ______ server
translates a public domain name into its IP address. - ANS DNS
The OSI networking model contains ______ layers. - ANS 7
A national or global network of computers is called a: - ANS LAN
A widely used method to display a network topology is a: - ANS Network Chart
A type of virus that copies itself repeatedly using up system resources is called? - ANS Worm
3 Copyright ©2025 THESTAR ALL RIGHTS RESERVED