Name:     Period: 
 
Student ID: 

Tech Apps Spring 2018 End of Course Exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

This is a type of crime that is carried out over the Internet.
a.
theft
c.
cybercrime
b.
plagiarism
d.
computer crime
 

 2. 

This type of field can be used to link multiple tables together in a relational database.
a.
root field
c.
key field
b.
special field
d.
top field
 

 3. 

Most desktop and laptop computers today use this type of operating system.
a.
single-user/multitasking
c.
single-user/single-task
b.
real-time
d.
multi-user
 

 4. 

Which of the following can be shared over a computer network?
a.
files
c.
programs
b.
printers
d.
any of the above
 

 5. 

Messages from the program appear in this part of the worksheet.
a.
formula bar
c.
active cell
b.
status bar
d.
tab
 

 6. 

If you change the appearance of data in a cell, this is called _____.
a.
formatting
c.
editing
b.
deleting
d.
moving
 

 7. 

In a graphics program, this area contains the graphic you are working on.
a.
workplace
c.
workspace
b.
work spot
d.
work area
 

 8. 

This process can be used to stack levels of a bitmapped image on top of one another.
a.
grouping
c.
ungrouping
b.
leveling
d.
layering
 

 9. 

The Internet began with a network named _____.
a.
ARPANET
c.
DARPANET
b.
DARPA
d.
none of the above
 

 10. 

If you want to hide an application window, do this to it.
a.
open it
c.
minimize it
b.
maximize it
d.
click it
 

 11. 

In this process, a modem changes analog signals to digital signals.
a.
demodulation
c.
modulation
b.
telecommunications
d.
none of the above
 

 12. 

Large businesses usually use this kind of network.
a.
client/server network
c.
timesharing network
b.
peer-to-peer network
d.
client/workstation network
 

 13. 

This is a set of programs that tells the computer how to start up.
a.
RAM
c.
PC
b.
ROM
d.
BIOS
 

 14. 

This type of pointing device can be used with a graphics tablet.
a.
joystick
c.
stylus
b.
mouse
d.
keyboard
 

 15. 

In a client/server network, the main computer is called the _____.
a.
LAN
c.
workstation
b.
hub
d.
file server
 

 16. 

This type of Internet connection may require a special telephone line.
a.
dialup
c.
DSL
b.
ISDN
d.
cable modem
 

 17. 

This is a collection of related information or program code, which has been given a unique name.
a.
device
c.
folder
b.
software
d.
file
 

 18. 

When a computer saves information permanently, this is called _____.
a.
storage
c.
input
b.
processing
d.
output
 

 19. 

This type of multimedia event allows the user to make choices about what is displayed.
a.
online
c.
interactive
b.
expensive
d.
animated
 

 20. 

Which of the following is an important way to share information through a network?
a.
sharing peripherals
c.
using collaborative software
b.
sharing files
d.
all of the above
 

 21. 

What does the term AUP stand for?
a.
acceptable use policy
c.
approved use policy
b.
appropriate use policy
d.
alternative use policy
 

 22. 

Which of the following is not a part of a database?
a.
worksheets
c.
fields
b.
tables
d.
records
 

 23. 

A keyboard is an example of this type of device.
a.
processing
c.
storage
b.
input
d.
output
 

 24. 

Files can be grouped together into these.
a.
programs
c.
utilities
b.
folders
d.
operating systems
 

 25. 

This type of visual display lets you use a mouse to interact with the workspace on the computer screen.
a.
graphical user interface
c.
BIOS
b.
operating system
d.
desktop
 

 26. 

When you connect to the Internet, your computer is considered one of these.
a.
protocol
c.
server
b.
network
d.
client
 

 27. 

When two programs try to occupy the same space in RAM, one or both may do this.
a.
run
c.
load
b.
crash
d.
resolve
 

 28. 

You should always _____ information you find on the Web.
a.
copy
c.
trust
b.
delete
d.
verify
 

 29. 

Sending information over a telephone network is called _____.
a.
faxing
c.
calling
b.
telecommunications
d.
networking
 

 30. 

This is a virtual reality program that mimics a specific place, job, or function.
a.
HMD
c.
CAVE
b.
game
d.
simulation
 

 31. 

These determine how networked computers communicate, format data, and transmit data.
a.
clients
c.
protocols
b.
servers
d.
ISPs
 

 32. 

This term refers to content that is broadcast in a continuous feed from a Web site.
a.
streaming
c.
multimedia
b.
Flash™
d.
interactive
 

 33. 

This video file format offers quality that is only slightly lower than that of a VCR recording.
a.
MPEG
c.
MPEG-2
b.
JPG
d.
WAV
 

 34. 

This type of software is used for storing phone numbers and addresses and for creating schedules.
a.
telecommunications
c.
spreadsheet
b.
database
d.
personal information manager
 

 35. 

The Internet is a global _____.
a.
telephone network
c.
P2PN
b.
LAN
d.
WAN
 

 36. 

This program can display Web documents that contain images and text.
a.
Web browser
c.
browser
b.
graphics-and-text browser
d.
graphical browser
 

 37. 

An image on the computer’s screen is an example of this.
a.
input
c.
storage
b.
processing
d.
output
 

 38. 

For a seller, a key advantage to starting an online business is its low _____.
a.
traffic
c.
security
b.
employment
d.
cost
 

 39. 

The on-screen tools you use to interact with a computer are called the _____.
a.
controls
c.
applications
b.
operating system
d.
interface
 

 40. 

This type of virus can be hidden inside ordinary document files, such as files created in a word processor or spreadsheet program.
a.
Trojan horse
c.
scam
b.
macro virus
d.
none of the above
 

 41. 

If you see this in your browser’s Address box, then you know the Web page you are using is secure.
a.
htsp
c.
http
b.
https
d.
shttp
 

 42. 

This technology lets people communicate via their computers, by either typing real-time messages or by talking.
a.
teleconferencing
c.
telephone
b.
e-mail
d.
presentation
 

 43. 

New computer users sometimes confuse the term “memory” with this term.
a.
storage
c.
file
b.
document
d.
RAM
 

 44. 

Which device lets you connect a digital computer to an analog telephone network and then transmit or receive data?
a.
modem
c.
cell phone
b.
fax machine
d.
pager
 

 45. 

Which protocol is used on the World Wide Web?
a.
HTTP
c.
HTML
b.
URL
d.
WWW
 

 46. 

In Windows, file names have these, although they may be hidden from view.
a.
documents
c.
programs
b.
extensions
d.
disks
 

 47. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
telephone
c.
teleconferencing
b.
videoconferencing
d.
e-mail
 

 48. 

What does an e-mail server do?
a.
delivers incoming messages
c.
sends outgoing messages
b.
accepts incoming messages
d.
all of the above
 

 49. 

Some companies may do this with personal information they collect about you.
a.
copy it
c.
sell it
b.
delete it
d.
none of the above
 

 50. 

Resolution tells how many of these are in a certain piece of a bitmapped image.
a.
vectors
c.
paths
b.
pixels
d.
lines
 

 51. 

Databases are useful only if they are _____.
a.
big
c.
expensive
b.
detailed
d.
accurate
 

 52. 

This audio file format takes a large audio file and makes it very small.
a.
MP3
c.
AU
b.
MPEG
d.
MIDI
 

 53. 

What does the term URL stand for?
a.
unidentified resource locator
c.
unified resource locator
b.
universal resource locator
d.
uniform resource locator
 

 54. 

Which of the following is not a method for displaying presentations?
a.
on-screen presentations
c.
telephone
b.
transparencies
d.
Internet viewing
 

 55. 

A computer’s physical parts are called _____.
a.
software
c.
hardware
b.
pieces
d.
things
 

 56. 

Printers are an example of this type of device.
a.
medium
c.
peripheral
b.
terminal
d.
workstation
 

 57. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
Subject
c.
Cc
b.
From
d.
To
 

 58. 

This is a series of dialog boxes that guides you through a procedure step by step.
a.
presentation
c.
wizard
b.
slide
d.
template
 

 59. 

Which of the following commands probably would not be found on the File menu?
a.
New
c.
Help
b.
Open
d.
Exit
 

 60. 

Which of the following is a way to sort data?
a.
chronologically
c.
alphabetically
b.
numerically
d.
any of the above
 

 61. 

In analog communications, a person’s voice is transmitted as _____.
a.
waves
c.
data
b.
1s
d.
0s
 

 62. 

A storage device that is installed inside your computer is called a(n) _____ device.
a.
internal
c.
external
b.
optical
d.
peripheral
 

 63. 

A spreadsheet is a program that processes information that is set up in these.
a.
forms
c.
tables
b.
columns
d.
rows
 

 64. 

This sets a standard format for data and rules for handling it.
a.
protocol
c.
language
b.
network interface card
d.
network medium
 

 65. 

This type of software is used for creating slide shows.
a.
telecommunications
c.
word processor
b.
presentation graphics
d.
database
 

 66. 

This can be text alone or a combination of numbers and text.
a.
cell
c.
label
b.
heading
d.
value
 

 67. 

The illegal copying of computer programs is called _____.
a.
software programming
c.
software plagiarism
b.
software documentation
d.
software piracy
 

 68. 

This is a user-created direction that tells the database to find specific records.
a.
query
c.
sort order
b.
field
d.
report template
 

 69. 

Which of the following is not an advantage of a computerized database?
a.
the ability to find information quickly
b.
the ability to create worksheets
c.
the ability to enter information quickly
d.
the ability to organize information in different ways
 

 70. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
fair use
c.
privacy
b.
copyright
d.
none of the above
 

 71. 

Microsoft Windows® is an example of this type of software.
a.
operating system
c.
Macintosh® OS
b.
application software
d.
system utility
 

 72. 

Which type of software do people use most often?
a.
spreadsheet
c.
word processor
b.
database
d.
graphics
 

 73. 

What does the term HTML stand for?
a.
hyperlink markup language
c.
hypertext makeup language
b.
hypertext markup language
d.
hypertag markup language
 

 74. 

In a presentation, each page of information is called a _____.
a.
slide
c.
page
b.
template
d.
picture
 

 75. 

A modem’s speed is measured in _____.
a.
bytes per minute
c.
bytes per second
b.
bits per minute
d.
bits per second
 

 76. 

Which of the following tasks is not performed by the operating system?
a.
managing input devices
c.
managing computer memory
b.
managing the formatting in a letter
d.
managing the CPU
 

 77. 

This type of application software is used for writing letters and reports.
a.
database
c.
word processor
b.
personal information manager
d.
spreadsheet
 

 78. 

What do you call a presentation that combines text, graphics, sound, and animation?
a.
multimedia
c.
big
b.
gallery
d.
interactive
 



 
         Start Over