Name:     Period: 
 
Student ID: 

Tech Apps Semester Exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following can be shared over a computer network?
a.
programs
c.
files
b.
printers
d.
any of the above
 

 2. 

This is a virtual reality program that mimics a specific place, job, or function.
a.
game
c.
HMD
b.
simulation
 

 3. 

This type of software combines the basic features of several applications into one package.
a.
office suite
c.
integrated software
b.
stand-alone software
 

 4. 

This is another name for a program that tells a computer what to do and how to do it.
a.
device
c.
software
b.
peripheral
 

 5. 

Which type of software do people use most often?
a.
spreadsheet
c.
word processor
b.
graphics
 

 6. 

This type of software combines several complete programs—such as a word processor, a spreadsheet, a database, and others—into one package.
a.
operating system
c.
office suite
b.
stand-alone program
 

 7. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
videoconferencing
c.
e-mail
b.
telephone
 

 8. 

This type of technology can help people get a college degree from their home.
a.
distance learning
c.
teleconferencing
b.
e-mail
 

 9. 

The type of file people most often use is called a _____.
a.
document
c.
memory
b.
program
 

 10. 

This is a user-created direction that tells the database to find specific records.
a.
query
c.
report template
b.
field
 

 11. 

This is a series of dialog boxes that guides you through a procedure step by step.
a.
presentation
c.
slide
b.
wizard
 

 12. 

A computer’s physical parts are called _____.
a.
hardware
c.
pieces
b.
things
 

 13. 

Which of the following is a way to sort data?
a.
chronologically
c.
numerically
b.
alphabetically
d.
any of the above
 

 14. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
From
c.
Subject
b.
Cc
 

 15. 

In a presentation, each page of information is called a _____.
a.
slide
c.
picture
b.
template
 

 16. 

One of the most common e-mail mistakes is _____.
a.
using the wrong e-mail program
c.
leaving the To: field blank
b.
entering the wrong e-mail address
 

 17. 

This type of application software specializes in one task.
a.
integrated software
c.
stand-alone program
b.
office suite
 

 18. 

When two programs try to occupy the same space in RAM, one or both may do this.
a.
load
c.
crash
b.
run
 

 19. 

Some companies may do this with personal information they collect about you.
a.
sell it
c.
copy it
b.
delete it
d.
none of the above
 

 20. 

In a spreadsheet program, “C3” would be an example of this.
a.
worksheet
c.
cell address
b.
row
 

 21. 

This type of application software is used for writing letters and reports.
a.
database
c.
word processor
b.
personal information manager
 

 22. 

A spreadsheet is a program that processes information that is set up in these.
a.
tables
c.
rows
b.
forms
 

 23. 

This term refers to content that is broadcast in a continuous feed from a Web site.
a.
multimedia
c.
streaming
b.
interactive
 

 24. 

What do you call a presentation that combines text, graphics, sound, and animation?
a.
multimedia
c.
interactive
b.
big
 

 25. 

E-mail and the World Wide Web are examples of Internet _____.
a.
servers
c.
systems
b.
services
 

 26. 

Printers are an example of this type of device.
a.
workstation
c.
peripheral
b.
medium
 

 27. 

What does the term URL stand for?
a.
uniform resource locator
c.
unidentified resource locator
b.
unified resource locator
 

 28. 

A document’s appearance is called its _____.
a.
printing
c.
formatting
b.
writing
 

 29. 

This is a type of crime that is carried out over the Internet.
a.
plagiarism
c.
computer crime
b.
cybercrime
 

 30. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
fair use
c.
copyright
b.
privacy
d.
none of the above
 

 31. 

Microsoft Windows® is an example of this type of software.
a.
operating system
c.
application software
b.
Macintosh® OS
 

 32. 

What does the term AUP stand for?
a.
acceptable use policy
c.
alternative use policy
b.
approved use policy
 

 33. 

In a client/server network, the main computer is called the _____.
a.
hub
c.
file server
b.
LAN
 

 34. 

When a computer saves information permanently, this is called _____.
a.
input
c.
storage
b.
processing
 

 35. 

What does the term HTML stand for?
a.
hypertag markup language
c.
hypertext makeup language
b.
hypertext markup language
 

 36. 

Which of the following issues would not be important when choosing application software?
a.
cost
c.
what you want it to do
b.
what your friends use
 

 37. 

Sending information over a telephone network is called _____.
a.
telecommunications
c.
faxing
b.
networking
 

 38. 

The on-screen tools you use to interact with a computer are called the _____.
a.
applications
c.
controls
b.
interface
 

 39. 

Before you can use commercial software, you usually must agree to the terms contained in this document.
a.
letter
c.
license
b.
receipt
 

 40. 

Resolution tells how many of these are in a certain piece of a bitmapped image.
a.
paths
c.
vectors
b.
pixels
 

 41. 

A keyboard is an example of this type of device.
a.
input
c.
processing
b.
output
 

 42. 

This type of pointing device can be used with a graphics tablet.
a.
stylus
c.
joystick
b.
keyboard
 

 43. 

This type of software is used for creating slide shows.
a.
word processor
c.
telecommunications
b.
presentation graphics
 

 44. 

If you see this in your browser’s Address box, then you know the Web page you are using is secure.
a.
htsp
c.
https
b.
http
 

 45. 

When you connect to the Internet, your computer is considered one of these.
a.
client
c.
network
b.
protocol
 



 
         Start Over