Name:     Period: 
 
Student ID: 

Tech Apps Spring 2018 End of Course Exam

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The on-screen tools you use to interact with a computer are called the _____.
a.
controls
c.
interface
b.
applications
d.
operating system
 

 2. 

This is a set of programs that tells the computer how to start up.
a.
RAM
c.
BIOS
b.
PC
d.
ROM
 

 3. 

If you see this in your browser’s Address box, then you know the Web page you are using is secure.
a.
shttp
c.
https
b.
http
d.
htsp
 

 4. 

For a seller, a key advantage to starting an online business is its low _____.
a.
employment
c.
traffic
b.
cost
d.
security
 

 5. 

This process can be used to stack levels of a bitmapped image on top of one another.
a.
grouping
c.
leveling
b.
layering
d.
ungrouping
 

 6. 

This video file format offers quality that is only slightly lower than that of a VCR recording.
a.
JPG
c.
MPEG
b.
MPEG-2
d.
WAV
 

 7. 

In analog communications, a person’s voice is transmitted as _____.
a.
data
c.
1s
b.
waves
d.
0s
 

 8. 

A modem’s speed is measured in _____.
a.
bits per second
c.
bytes per minute
b.
bits per minute
d.
bytes per second
 

 9. 

If you want to hide an application window, do this to it.
a.
minimize it
c.
maximize it
b.
click it
d.
open it
 

 10. 

The Internet is a global _____.
a.
P2PN
c.
LAN
b.
telephone network
d.
WAN
 

 11. 

These determine how networked computers communicate, format data, and transmit data.
a.
clients
c.
ISPs
b.
servers
d.
protocols
 

 12. 

This is a series of dialog boxes that guides you through a procedure step by step.
a.
slide
c.
template
b.
wizard
d.
presentation
 

 13. 

Which of the following commands probably would not be found on the File menu?
a.
Exit
c.
New
b.
Help
d.
Open
 

 14. 

This type of software is used for creating slide shows.
a.
word processor
c.
database
b.
telecommunications
d.
presentation graphics
 

 15. 

An image on the computer’s screen is an example of this.
a.
input
c.
storage
b.
output
d.
processing
 

 16. 

This is a collection of related information or program code, which has been given a unique name.
a.
file
c.
device
b.
software
d.
folder
 

 17. 

If you want to send a copy of a message to someone other than the main recipient, you can list that person in this line of your message.
a.
To
c.
From
b.
Cc
d.
Subject
 

 18. 

Which of the following can be shared over a computer network?
a.
printers
c.
files
b.
programs
d.
any of the above
 

 19. 

This term refers to content that is broadcast in a continuous feed from a Web site.
a.
Flash™
c.
multimedia
b.
interactive
d.
streaming
 

 20. 

This type of Internet connection may require a special telephone line.
a.
DSL
c.
dialup
b.
ISDN
d.
cable modem
 

 21. 

Sending information over a telephone network is called _____.
a.
networking
c.
faxing
b.
calling
d.
telecommunications
 

 22. 

Which of the following is not a part of a database?
a.
records
c.
tables
b.
worksheets
d.
fields
 

 23. 

In a presentation, each page of information is called a _____.
a.
template
c.
picture
b.
page
d.
slide
 

 24. 

Which device lets you connect a digital computer to an analog telephone network and then transmit or receive data?
a.
pager
c.
cell phone
b.
modem
d.
fax machine
 

 25. 

In a client/server network, the main computer is called the _____.
a.
file server
c.
workstation
b.
hub
d.
LAN
 

 26. 

Which protocol is used on the World Wide Web?
a.
URL
c.
HTTP
b.
HTML
d.
WWW
 

 27. 

This type of software is used for storing phone numbers and addresses and for creating schedules.
a.
telecommunications
c.
database
b.
personal information manager
d.
spreadsheet
 

 28. 

When a computer saves information permanently, this is called _____.
a.
input
c.
storage
b.
processing
d.
output
 

 29. 

Databases are useful only if they are _____.
a.
detailed
c.
accurate
b.
big
d.
expensive
 

 30. 

New computer users sometimes confuse the term “memory” with this term.
a.
file
c.
document
b.
storage
d.
RAM
 

 31. 

When two programs try to occupy the same space in RAM, one or both may do this.
a.
load
c.
resolve
b.
crash
d.
run
 

 32. 

This audio file format takes a large audio file and makes it very small.
a.
MPEG
c.
MP3
b.
AU
d.
MIDI
 

 33. 

Messages from the program appear in this part of the worksheet.
a.
formula bar
c.
tab
b.
status bar
d.
active cell
 

 34. 

What do you call a presentation that combines text, graphics, sound, and animation?
a.
multimedia
c.
interactive
b.
big
d.
gallery
 

 35. 

The Internet began with a network named _____.
a.
DARPA
c.
DARPANET
b.
ARPANET
d.
none of the above
 

 36. 

If you change the appearance of data in a cell, this is called _____.
a.
editing
c.
formatting
b.
deleting
d.
moving
 

 37. 

Which of the following is not a method for displaying presentations?
a.
on-screen presentations
c.
transparencies
b.
telephone
d.
Internet viewing
 

 38. 

This is a virtual reality program that mimics a specific place, job, or function.
a.
CAVE
c.
game
b.
HMD
d.
simulation
 

 39. 

Large businesses usually use this kind of network.
a.
timesharing network
c.
peer-to-peer network
b.
client/server network
d.
client/workstation network
 

 40. 

This type of virus can be hidden inside ordinary document files, such as files created in a word processor or spreadsheet program.
a.
Trojan horse
c.
scam
b.
macro virus
d.
none of the above
 

 41. 

This type of law protects people and companies from the theft or misuse of their creative, literary, or artistic work.
a.
privacy
c.
fair use
b.
copyright
d.
none of the above
 

 42. 

This type of visual display lets you use a mouse to interact with the workspace on the computer screen.
a.
BIOS
c.
desktop
b.
operating system
d.
graphical user interface
 

 43. 

This program can display Web documents that contain images and text.
a.
browser
c.
graphics-and-text browser
b.
graphical browser
d.
Web browser
 

 44. 

Some companies may do this with personal information they collect about you.
a.
copy it
c.
sell it
b.
delete it
d.
none of the above
 

 45. 

What does the term URL stand for?
a.
unidentified resource locator
c.
uniform resource locator
b.
universal resource locator
d.
unified resource locator
 

 46. 

You should always _____ information you find on the Web.
a.
trust
c.
verify
b.
copy
d.
delete
 

 47. 

In a graphics program, this area contains the graphic you are working on.
a.
work area
c.
work spot
b.
workplace
d.
workspace
 

 48. 

Which of the following is not an advantage of a computerized database?
a.
the ability to organize information in different ways
b.
the ability to find information quickly
c.
the ability to create worksheets
d.
the ability to enter information quickly
 

 49. 

This technology allows participants to see and hear one another, even though they are in different places.
a.
videoconferencing
c.
e-mail
b.
telephone
d.
teleconferencing
 

 50. 

This type of multimedia event allows the user to make choices about what is displayed.
a.
animated
c.
online
b.
expensive
d.
interactive
 

 51. 

The illegal copying of computer programs is called _____.
a.
software plagiarism
c.
software piracy
b.
software programming
d.
software documentation
 

 52. 

A keyboard is an example of this type of device.
a.
input
c.
storage
b.
output
d.
processing
 

 53. 

A computer’s physical parts are called _____.
a.
hardware
c.
software
b.
pieces
d.
things
 

 54. 

Which of the following is an important way to share information through a network?
a.
using collaborative software
c.
sharing peripherals
b.
sharing files
d.
all of the above
 

 55. 

What does the term AUP stand for?
a.
alternative use policy
c.
approved use policy
b.
appropriate use policy
d.
acceptable use policy
 

 56. 

Which of the following is a way to sort data?
a.
alphabetically
c.
chronologically
b.
numerically
d.
any of the above
 

 57. 

This can be text alone or a combination of numbers and text.
a.
cell
c.
value
b.
label
d.
heading
 

 58. 

This technology lets people communicate via their computers, by either typing real-time messages or by talking.
a.
presentation
c.
telephone
b.
teleconferencing
d.
e-mail
 

 59. 

This type of pointing device can be used with a graphics tablet.
a.
mouse
c.
stylus
b.
joystick
d.
keyboard
 

 60. 

In Windows, file names have these, although they may be hidden from view.
a.
documents
c.
extensions
b.
programs
d.
disks
 

 61. 

What does an e-mail server do?
a.
accepts incoming messages
c.
sends outgoing messages
b.
delivers incoming messages
d.
all of the above
 

 62. 

Files can be grouped together into these.
a.
folders
c.
programs
b.
operating systems
d.
utilities
 

 63. 

This type of application software is used for writing letters and reports.
a.
database
c.
personal information manager
b.
spreadsheet
d.
word processor
 

 64. 

This type of field can be used to link multiple tables together in a relational database.
a.
root field
c.
special field
b.
top field
d.
key field
 

 65. 

Which of the following tasks is not performed by the operating system?
a.
managing the CPU
c.
managing input devices
b.
managing computer memory
d.
managing the formatting in a letter
 

 66. 

This is a type of crime that is carried out over the Internet.
a.
plagiarism
c.
theft
b.
computer crime
d.
cybercrime
 

 67. 

This is a user-created direction that tells the database to find specific records.
a.
report template
c.
sort order
b.
query
d.
field
 

 68. 

Which type of software do people use most often?
a.
graphics
c.
database
b.
word processor
d.
spreadsheet
 

 69. 

A spreadsheet is a program that processes information that is set up in these.
a.
tables
c.
rows
b.
forms
d.
columns
 

 70. 

A storage device that is installed inside your computer is called a(n) _____ device.
a.
peripheral
c.
internal
b.
optical
d.
external
 

 71. 

Microsoft Windows® is an example of this type of software.
a.
Macintosh® OS
c.
operating system
b.
application software
d.
system utility
 

 72. 

What does the term HTML stand for?
a.
hypertag markup language
c.
hypertext markup language
b.
hyperlink markup language
d.
hypertext makeup language
 

 73. 

This sets a standard format for data and rules for handling it.
a.
network interface card
c.
network medium
b.
protocol
d.
language
 

 74. 

When you connect to the Internet, your computer is considered one of these.
a.
client
c.
network
b.
server
d.
protocol
 

 75. 

In this process, a modem changes analog signals to digital signals.
a.
telecommunications
c.
demodulation
b.
modulation
d.
none of the above
 

 76. 

Resolution tells how many of these are in a certain piece of a bitmapped image.
a.
pixels
c.
paths
b.
vectors
d.
lines
 

 77. 

Most desktop and laptop computers today use this type of operating system.
a.
multi-user
c.
single-user/multitasking
b.
single-user/single-task
d.
real-time
 

 78. 

Printers are an example of this type of device.
a.
workstation
c.
medium
b.
peripheral
d.
terminal
 



 
         Start Over