Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Stole it Straight from Wilkes County Questions from 1.01 Question 1 Software packages used to create financial statements using mathematical calculations are: Word processing. Electronic Spreadsheet. Database Computer graphics. Question 2 Information that leaves the computer is called: Programs. Input. Graphics. Output. Question 3 What equipment is used like a copy machine to allow information to be input into the computer? Light pen Keyboard Scanner Mouse Question 4 Data that appears on the monitor is called: Language. Softcopy. Hardcopy. Programs. Question 5 The components that make up a computer system are: Programs. Language. Hardware. Software. Question 6 Which device is used to enter data into a computer? Input device Output device Microprocessor Storage Question 7 The physical parts of a computer system are called: Hardware. Languages. Applications. Programs. Objective 1.02 Question 8 What system software controls the computer operations? Formatting Language Program System Question 9 The operating system capability that permits more than one program to run simultaneously is called: Multi-cycle. Multi-purpose. Multi-string. Multitasking. Question 10 The operating system functions do NOT include: Managing input and output. Providing user with a password. Supervising other components. Providing software and hardware management. Question 11 Which utility is used to locate and disinfect a virus? Antiviral Data compression Data recover Translator Question 12 The acronym MS-DOS stands for: Macintosh Disk Operating System. Microsoft Disk Operating System. Microsoft Operating System. Microsoft Output System. Questions for 1.03 Question 13 Which is NOT a characteristic of copyrighted software? An individual or a business copyrights it. It is given freely and it can be copied by anyone. Permission is needed in order to copy software. Programs are accompanied by supporting documents. Question 14 The technology used to scramble information so that only the sender and receiver can read the data is called: Encryption. Password. Public domain. Virus. Question 15 To protect the computer from detecting a virus the user should install a/an: Database program. Spreadsheet program. User password. Anti-virus program. Question 16 Which is a destructive computer code or virus that is designed to activate at a specific time? Bomb Hoax Trojan horse Worm Question 17 Which is NOT a virus known to destroy or cause damage to computer files? Bomb Hacker Trojan Horse Worm Question 18 Which software allows the user to pay a small fee after the trial period? Copyrighted Freeware Public domain Shareware Question 19 Which is NOT considered a security measure? Backing up data regularly Giving your password to your friends Protecting data with an anti-viral program Protecting files with a password