Download VoCat Review

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
Transcript
Stole it Straight from Wilkes County
Questions from 1.01
Question 1

Software packages used to create
financial statements using mathematical
calculations are:
 Word processing.
 Electronic Spreadsheet.
 Database
 Computer graphics.
Question 2

Information that leaves the computer is
called:
 Programs.
 Input.
 Graphics.
 Output.
Question 3

What equipment is used like a copy
machine to allow information to be input
into the computer?
 Light pen
 Keyboard
 Scanner
 Mouse
Question 4

Data that appears on the monitor is
called:
 Language.
 Softcopy.
 Hardcopy.
 Programs.
Question 5

The components that make up a
computer system are:
 Programs.
 Language.
 Hardware.
 Software.
Question 6

Which device is used to enter data into a
computer?
 Input device
 Output device
 Microprocessor
 Storage
Question 7

The physical parts of a computer system
are called:
 Hardware.
 Languages.
 Applications.
 Programs.
Objective 1.02
Question 8

What system software controls the
computer operations?
 Formatting
 Language
 Program
 System
Question 9

The operating system capability that
permits more than one program to run
simultaneously is called:
 Multi-cycle.
 Multi-purpose.
 Multi-string.
 Multitasking.
Question 10

The operating system functions do NOT
include:
 Managing input and output.
 Providing user with a password.
 Supervising other components.
 Providing software and hardware
management.
Question 11

Which utility is used to locate and
disinfect a virus?
 Antiviral
 Data compression
 Data recover
 Translator
Question 12

The acronym MS-DOS stands for:
 Macintosh Disk Operating System.
 Microsoft Disk Operating System.
 Microsoft Operating System.
 Microsoft Output System.
Questions for 1.03
Question 13

Which is NOT a characteristic of
copyrighted software?
 An individual or a business copyrights it.
 It is given freely and it can be copied by
anyone.
 Permission is needed in order to copy
software.
 Programs are accompanied by supporting
documents.
Question 14

The technology used to scramble
information so that only the sender and
receiver can read the data is called:
 Encryption.
 Password.
 Public domain.
 Virus.
Question 15

To protect the computer from detecting a
virus the user should install a/an:
 Database program.
 Spreadsheet program.
 User password.
 Anti-virus program.
Question 16

Which is a destructive computer code or
virus that is designed to activate at a
specific time?
 Bomb
 Hoax
 Trojan horse
 Worm
Question 17

Which is NOT a virus known to destroy
or cause damage to computer files?
 Bomb
 Hacker
 Trojan Horse
 Worm
Question 18

Which software allows the user to pay a
small fee after the trial period?
 Copyrighted
 Freeware
 Public domain
 Shareware
Question 19

Which is NOT considered a security
measure?
 Backing up data regularly
 Giving your password to your friends
 Protecting data with an anti-viral program
 Protecting files with a password