Name:     Period: 
 
Student ID: 

Tech Apps Spring 2018 End of Course Exam MOD

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

This type of application software is used for writing letters and reports.
a.
word processor
c.
personal information manager
b.
spreadsheet
 

 2. 

Which of the following is an important way to share information through a network?
a.
using collaborative software
c.
sharing files
b.
sharing peripherals
d.
all of the above
 

 3. 

This is a user-created direction that tells the database to find specific records.
a.
sort order
c.
field
b.
query
 

 4. 

In a graphics program, this area contains the graphic you are working on.
a.
workspace
c.
workplace
b.
work spot
 

 5. 

When a computer saves information permanently, this is called _____.
a.
input
c.
output
b.
storage
 

 6. 

A spreadsheet is a program that processes information that is set up in these.
a.
tables
c.
forms
b.
rows
 

 7. 

This program can display Web documents that contain images and text.
a.
graphics-and-text browser
c.
browser
b.
graphical browser
 

 8. 

This type of software is used for creating slide shows.
a.
telecommunications
c.
database
b.
presentation graphics
 

 9. 

Which of the following is not a part of a database?
a.
records
c.
tables
b.
worksheets
 

 10. 

In a presentation, each page of information is called a _____.
a.
picture
c.
page
b.
slide
 

 11. 

This type of visual display lets you use a mouse to interact with the workspace on the computer screen.
a.
desktop
c.
graphical user interface
b.
operating system
 

 12. 

This audio file format takes a large audio file and makes it very small.
a.
AU
c.
MP3
b.
MPEG
 

 13. 

Which device lets you connect a digital computer to an analog telephone network and then transmit or receive data?
a.
modem
c.
cell phone
b.
pager
 

 14. 

Some companies may do this with personal information they collect about you.
a.
delete it
c.
sell it
b.
copy it
d.
none of the above
 

 15. 

In a client/server network, the main computer is called the _____.
a.
LAN
c.
hub
b.
file server
 

 16. 

What does an e-mail server do?
a.
sends outgoing messages
c.
accepts incoming messages
b.
delivers incoming messages
d.
all of the above
 

 17. 

This sets a standard format for data and rules for handling it.
a.
protocol
c.
network medium
b.
network interface card
 

 18. 

The illegal copying of computer programs is called _____.
a.
software programming
c.
software plagiarism
b.
software piracy
 

 19. 

This is a series of dialog boxes that guides you through a procedure step by step.
a.
presentation
c.
slide
b.
wizard
 

 20. 

This term refers to content that is broadcast in a continuous feed from a Web site.
a.
multimedia
c.
Flash™
b.
streaming
 

 21. 

This type of virus can be hidden inside ordinary document files, such as files created in a word processor or spreadsheet program.
a.
Trojan horse
c.
scam
b.
macro virus
d.
none of the above
 

 22. 

This is a collection of related information or program code, which has been given a unique name.
a.
file
c.
folder
b.
device
 

 23. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
copyright
c.
privacy
b.
fair use
d.
none of the above
 

 24. 

Which of the following is not a method for displaying presentations?
a.
Internet viewing
c.
transparencies
b.
telephone
 

 25. 

What does the term URL stand for?
a.
unified resource locator
c.
unidentified resource locator
b.
uniform resource locator
 

 26. 

This can be text alone or a combination of numbers and text.
a.
cell
c.
value
b.
label
 

 27. 

What does the term HTML stand for?
a.
hypertext makeup language
c.
hypertag markup language
b.
hypertext markup language
 

 28. 

Sending information over a telephone network is called _____.
a.
calling
c.
telecommunications
b.
networking
 

 29. 

If you change the appearance of data in a cell, this is called _____.
a.
formatting
c.
editing
b.
moving
 

 30. 

This is a virtual reality program that mimics a specific place, job, or function.
a.
CAVE
c.
simulation
b.
game
 

 31. 

The Internet is a global _____.
a.
P2PN
c.
WAN
b.
LAN
 

 32. 

This is a set of programs that tells the computer how to start up.
a.
PC
c.
BIOS
b.
RAM
 

 33. 

This process can be used to stack levels of a bitmapped image on top of one another.
a.
leveling
c.
grouping
b.
layering
 

 34. 

When two programs try to occupy the same space in RAM, one or both may do this.
a.
run
c.
load
b.
crash
 

 35. 

This type of multimedia event allows the user to make choices about what is displayed.
a.
expensive
c.
animated
b.
interactive
 

 36. 

A storage device that is installed inside your computer is called a(n) _____ device.
a.
external
c.
peripheral
b.
internal
 

 37. 

Which of the following can be shared over a computer network?
a.
printers
c.
programs
b.
files
d.
any of the above
 

 38. 

Which protocol is used on the World Wide Web?
a.
URL
c.
HTTP
b.
HTML
 

 39. 

The on-screen tools you use to interact with a computer are called the _____.
a.
controls
c.
operating system
b.
interface
 

 40. 

This type of software is used for storing phone numbers and addresses and for creating schedules.
a.
database
c.
spreadsheet
b.
personal information manager
 

 41. 

Databases are useful only if they are _____.
a.
detailed
c.
accurate
b.
expensive
 

 42. 

Which of the following tasks is not performed by the operating system?
a.
managing input devices
c.
managing the formatting in a letter
b.
managing computer memory
 

 43. 

This type of field can be used to link multiple tables together in a relational database.
a.
key field
c.
special field
b.
top field
 

 44. 

These determine how networked computers communicate, format data, and transmit data.
a.
protocols
c.
clients
b.
ISPs
 

 45. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
telephone
c.
teleconferencing
b.
videoconferencing
 

 46. 

What does the term AUP stand for?
a.
approved use policy
c.
appropriate use policy
b.
acceptable use policy
 

 47. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
From
c.
Cc
b.
To
 

 48. 

In Windows, file names have these, although they may be hidden from view.
a.
extensions
c.
disks
b.
documents
 

 49. 

A keyboard is an example of this type of device.
a.
input
c.
output
b.
storage
 

 50. 

This technology lets people communicate via their computers, by either typing real-time messages or by talking.
a.
e-mail
c.
telephone
b.
teleconferencing
 

 51. 

This type of pointing device can be used with a graphics tablet.
a.
keyboard
c.
stylus
b.
joystick
 

 52. 

A computer’s physical parts are called _____.
a.
software
c.
hardware
b.
pieces
 

 53. 

In this process, a modem changes analog signals to digital signals.
a.
telecommunications
c.
modulation
b.
demodulation
d.
none of the above
 

 54. 

Most desktop and laptop computers today use this type of operating system.
a.
single-user/single-task
c.
single-user/multitasking
b.
real-time
 

 55. 

The Internet began with a network named _____.
a.
DARPA
c.
DARPANET
b.
ARPANET
d.
none of the above
 

 56. 

Large businesses usually use this kind of network.
a.
timesharing network
c.
client/server network
b.
peer-to-peer network
 

 57. 

A modem’s speed is measured in _____.
a.
bytes per minute
c.
bits per second
b.
bytes per second
 

 58. 

Resolution tells how many of these are in a certain piece of a bitmapped image.
a.
paths
c.
pixels
b.
lines
 

 59. 

If you want to hide an application window, do this to it.
a.
click it
c.
minimize it
b.
maximize it
 

 60. 

Which of the following is a way to sort data?
a.
alphabetically
c.
numerically
b.
chronologically
d.
any of the above
 



 
         Start Over