Name:     Period: 
 
Student ID: 

Tech Apps Spring 2018 End of Course Exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

This type of application software is used for writing letters and reports.
a.
database
c.
spreadsheet
b.
word processor
d.
personal information manager
 

 2. 

This technology lets people communicate via their computers, by either typing real-time messages or by talking.
a.
presentation
c.
teleconferencing
b.
telephone
d.
e-mail
 

 3. 

If you change the appearance of data in a cell, this is called _____.
a.
editing
c.
moving
b.
formatting
d.
deleting
 

 4. 

In Windows, file names have these, although they may be hidden from view.
a.
disks
c.
programs
b.
extensions
d.
documents
 

 5. 

In this process, a modem changes analog signals to digital signals.
a.
modulation
c.
telecommunications
b.
demodulation
d.
none of the above
 

 6. 

The Internet began with a network named _____.
a.
ARPANET
c.
DARPANET
b.
DARPA
d.
none of the above
 

 7. 

This is a set of programs that tells the computer how to start up.
a.
ROM
c.
PC
b.
BIOS
d.
RAM
 

 8. 

This is a user-created direction that tells the database to find specific records.
a.
sort order
c.
query
b.
report template
d.
field
 

 9. 

This can be text alone or a combination of numbers and text.
a.
value
c.
label
b.
heading
d.
cell
 

 10. 

Which of the following is not a method for displaying presentations?
a.
on-screen presentations
c.
telephone
b.
transparencies
d.
Internet viewing
 

 11. 

Some companies may do this with personal information they collect about you.
a.
sell it
c.
delete it
b.
copy it
d.
none of the above
 

 12. 

Files can be grouped together into these.
a.
utilities
c.
operating systems
b.
folders
d.
programs
 

 13. 

Large businesses usually use this kind of network.
a.
peer-to-peer network
c.
client/server network
b.
timesharing network
d.
client/workstation network
 

 14. 

This video file format offers quality that is only slightly lower than that of a VCR recording.
a.
MPEG-2
c.
WAV
b.
JPG
d.
MPEG
 

 15. 

Which device lets you connect a digital computer to an analog telephone network and then transmit or receive data?
a.
cell phone
c.
fax machine
b.
pager
d.
modem
 

 16. 

Which of the following is a way to sort data?
a.
chronologically
c.
numerically
b.
alphabetically
d.
any of the above
 

 17. 

Databases are useful only if they are _____.
a.
detailed
c.
accurate
b.
expensive
d.
big
 

 18. 

A storage device that is installed inside your computer is called a(n) _____ device.
a.
peripheral
c.
optical
b.
internal
d.
external
 

 19. 

This term refers to content that is broadcast in a continuous feed from a Web site.
a.
streaming
c.
Flash™
b.
multimedia
d.
interactive
 

 20. 

This type of visual display lets you use a mouse to interact with the workspace on the computer screen.
a.
operating system
c.
graphical user interface
b.
desktop
d.
BIOS
 

 21. 

New computer users sometimes confuse the term “memory” with this term.
a.
file
c.
RAM
b.
storage
d.
document
 

 22. 

This type of virus can be hidden inside ordinary document files, such as files created in a word processor or spreadsheet program.
a.
macro virus
c.
Trojan horse
b.
scam
d.
none of the above
 

 23. 

Which type of software do people use most often?
a.
graphics
c.
spreadsheet
b.
database
d.
word processor
 

 24. 

Which of the following is not a part of a database?
a.
fields
c.
tables
b.
records
d.
worksheets
 

 25. 

A spreadsheet is a program that processes information that is set up in these.
a.
forms
c.
rows
b.
tables
d.
columns
 

 26. 

This type of Internet connection may require a special telephone line.
a.
dialup
c.
DSL
b.
cable modem
d.
ISDN
 

 27. 

This type of multimedia event allows the user to make choices about what is displayed.
a.
animated
c.
interactive
b.
online
d.
expensive
 

 28. 

The on-screen tools you use to interact with a computer are called the _____.
a.
controls
c.
operating system
b.
applications
d.
interface
 

 29. 

This sets a standard format for data and rules for handling it.
a.
language
c.
network medium
b.
protocol
d.
network interface card
 

 30. 

Microsoft Windows® is an example of this type of software.
a.
operating system
c.
system utility
b.
application software
d.
Macintosh® OS
 

 31. 

This is a series of dialog boxes that guides you through a procedure step by step.
a.
template
c.
presentation
b.
wizard
d.
slide
 

 32. 

This type of software is used for storing phone numbers and addresses and for creating schedules.
a.
spreadsheet
c.
telecommunications
b.
database
d.
personal information manager
 

 33. 

Resolution tells how many of these are in a certain piece of a bitmapped image.
a.
paths
c.
pixels
b.
vectors
d.
lines
 

 34. 

Which of the following is an important way to share information through a network?
a.
using collaborative software
c.
sharing peripherals
b.
sharing files
d.
all of the above
 

 35. 

A keyboard is an example of this type of device.
a.
storage
c.
output
b.
input
d.
processing
 

 36. 

Which of the following is not an advantage of a computerized database?
a.
the ability to enter information quickly
b.
the ability to create worksheets
c.
the ability to find information quickly
d.
the ability to organize information in different ways
 

 37. 

This type of field can be used to link multiple tables together in a relational database.
a.
key field
c.
root field
b.
top field
d.
special field
 

 38. 

The illegal copying of computer programs is called _____.
a.
software plagiarism
c.
software programming
b.
software documentation
d.
software piracy
 

 39. 

What does the term URL stand for?
a.
uniform resource locator
c.
unidentified resource locator
b.
unified resource locator
d.
universal resource locator
 

 40. 

A computer’s physical parts are called _____.
a.
software
c.
things
b.
pieces
d.
hardware
 

 41. 

In analog communications, a person’s voice is transmitted as _____.
a.
0s
c.
waves
b.
data
d.
1s
 

 42. 

When a computer saves information permanently, this is called _____.
a.
output
c.
storage
b.
input
d.
processing
 

 43. 

Which protocol is used on the World Wide Web?
a.
URL
c.
WWW
b.
HTML
d.
HTTP
 

 44. 

When two programs try to occupy the same space in RAM, one or both may do this.
a.
resolve
c.
crash
b.
run
d.
load
 

 45. 

Which of the following commands probably would not be found on the File menu?
a.
Open
c.
Help
b.
New
d.
Exit
 

 46. 

Which of the following tasks is not performed by the operating system?
a.
managing the formatting in a letter
c.
managing computer memory
b.
managing input devices
d.
managing the CPU
 

 47. 

If you want to hide an application window, do this to it.
a.
maximize it
c.
minimize it
b.
open it
d.
click it
 

 48. 

This is a virtual reality program that mimics a specific place, job, or function.
a.
simulation
c.
CAVE
b.
game
d.
HMD
 

 49. 

This audio file format takes a large audio file and makes it very small.
a.
MIDI
c.
MP3
b.
AU
d.
MPEG
 

 50. 

This is a type of crime that is carried out over the Internet.
a.
cybercrime
c.
computer crime
b.
plagiarism
d.
theft
 

 51. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
fair use
c.
privacy
b.
copyright
d.
none of the above
 

 52. 

In a presentation, each page of information is called a _____.
a.
page
c.
slide
b.
template
d.
picture
 

 53. 

What does the term HTML stand for?
a.
hypertext markup language
c.
hypertag markup language
b.
hypertext makeup language
d.
hyperlink markup language
 

 54. 

What does the term AUP stand for?
a.
approved use policy
c.
alternative use policy
b.
appropriate use policy
d.
acceptable use policy
 

 55. 

If you see this in your browser’s Address box, then you know the Web page you are using is secure.
a.
http
c.
https
b.
shttp
d.
htsp
 

 56. 

This process can be used to stack levels of a bitmapped image on top of one another.
a.
leveling
c.
grouping
b.
ungrouping
d.
layering
 

 57. 

What do you call a presentation that combines text, graphics, sound, and animation?
a.
big
c.
multimedia
b.
interactive
d.
gallery
 

 58. 

You should always _____ information you find on the Web.
a.
copy
c.
trust
b.
delete
d.
verify
 

 59. 

What does an e-mail server do?
a.
delivers incoming messages
c.
accepts incoming messages
b.
sends outgoing messages
d.
all of the above
 

 60. 

This type of software is used for creating slide shows.
a.
presentation graphics
c.
word processor
b.
telecommunications
d.
database
 

 61. 

When you connect to the Internet, your computer is considered one of these.
a.
protocol
c.
server
b.
network
d.
client
 

 62. 

The Internet is a global _____.
a.
LAN
c.
P2PN
b.
telephone network
d.
WAN
 

 63. 

In a client/server network, the main computer is called the _____.
a.
file server
c.
hub
b.
workstation
d.
LAN
 

 64. 

This type of pointing device can be used with a graphics tablet.
a.
mouse
c.
joystick
b.
stylus
d.
keyboard
 

 65. 

In a graphics program, this area contains the graphic you are working on.
a.
workplace
c.
workspace
b.
work area
d.
work spot
 

 66. 

Which of the following can be shared over a computer network?
a.
programs
c.
printers
b.
files
d.
any of the above
 

 67. 

A modem’s speed is measured in _____.
a.
bits per minute
c.
bytes per second
b.
bytes per minute
d.
bits per second
 

 68. 

Most desktop and laptop computers today use this type of operating system.
a.
real-time
c.
multi-user
b.
single-user/multitasking
d.
single-user/single-task
 

 69. 

For a seller, a key advantage to starting an online business is its low _____.
a.
employment
c.
traffic
b.
cost
d.
security
 

 70. 

This is a collection of related information or program code, which has been given a unique name.
a.
device
c.
file
b.
software
d.
folder
 

 71. 

This program can display Web documents that contain images and text.
a.
Web browser
c.
browser
b.
graphics-and-text browser
d.
graphical browser
 

 72. 

These determine how networked computers communicate, format data, and transmit data.
a.
servers
c.
ISPs
b.
clients
d.
protocols
 

 73. 

An image on the computer’s screen is an example of this.
a.
storage
c.
processing
b.
output
d.
input
 

 74. 

Printers are an example of this type of device.
a.
peripheral
c.
medium
b.
workstation
d.
terminal
 

 75. 

Messages from the program appear in this part of the worksheet.
a.
active cell
c.
tab
b.
formula bar
d.
status bar
 

 76. 

Sending information over a telephone network is called _____.
a.
telecommunications
c.
calling
b.
faxing
d.
networking
 

 77. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
e-mail
c.
videoconferencing
b.
telephone
d.
teleconferencing
 

 78. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
To
c.
Subject
b.
From
d.
Cc
 



 
         Start Over