TKT 1273 Computer Applications Chapter 4 Practice Test
Terms in this set (50)
A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them.
The operating system and other tools are collectively known as ____ software because they consist of the programs that control or maintain the operations of the computer and its devices.
To use applications, such as a browser or email program on a personal computer, your computer must be running a(n) ____.
Each time you start a computer or mobile device, the operating system is ____ (copied) from the computer's hard disk or mobile device's storage media into memory.
____ software performs functions specific to a business or industry.
____ is copyrighted software that is distributed at no cost for a trial period.
____ gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials.
____ typically is optional and usually involves submitting your name and other personal information to the software manufacturer or developer.
A(n) ____ is the right to use a program or app.
____ applications can assist you in becoming more effective and efficient while performing daily activities at work, school, and home.
When you ________ a project, you enter text or numbers, insert images, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.
When users ____ a project, they change its appearance.
A single ____, used to measure font size, is about 1/72 of an inch in height.
Bold, italic, underline, and color are examples of ____.
Many programs have a(n)____ feature that saves open projects at specified time intervals.
________ software is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics.
A feature called ____ allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line.
Presentations can be viewed as slides, sometimes called a _______, that are displayed on a large monitor or on a projection screen from a computer or mobile device.
____ software is an application that allows users to organize data in rows and columns and perform calculations on the data.
In a spreadsheet, a ____ is the intersection of a column and row.
A _______ is a request for specific data from the database.
____ software is an application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook.
A software ____ is a collection of individual applications available together as a unit.
Project ____ software is an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
____ software provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.
A popular electronic image file format that document management software uses to save converted documents is ____, developed by Adobe Systems.
____ software is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
Computer aided design
____ software is an application that enables designers to create sophisticated publications that contain text, graphics, and many colors.
Paint software is another name for ____ software.
When you purchase a digital camera, it usually includes ____ software.
____ software allows users to combine text, graphics, audio, video, and animation in an interactive application.
What are CBT applications used for?
____ software writes text, graphics, audio, and video files on a recordable or rewritable disc.
Which of the following is NOT an example of a communications applications?
A personal ____ is a security tool that detects and protects a personal computer and its data from unauthorized intrusions.
A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the user's knowledge or permission.
A ____ resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.
A ____ is a destructive program disguised as a real program, such as a screen saver.
A(n) ____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.
____ is an unsolicited email message or posting sent to many recipients or forums at once.
____ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.
A(n) ____ is a program, usually included with an operating system, that attempts to locate a file on your computer or mobile device based on criteria you specify.
A(n) ____ is a tool that removes a program, as well as any associated entries in the system files.
A(n) ____ tool searches for and removes unnecessary files.
A(n) ____ is a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.
Compressed files sometimes are called ____ files.
A PC ____ tool is a program that identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.
A ____ allows users to copy selected files or the contents of an entire storage medium to another storage location, such as another hard disk, optical disc, USB flash drive, or cloud storage.
You should ____ files and disks regularly in the event your originals are lost, damaged, or destroyed.