Digital Literacy Unit Test
Terms in this set (25)
How is the Ribbon organized?
The ribbon is organized into tabs, groups, and commands.
What keys are shortcuts for opening dialogue boxes?
What keys perform quick commands?
The CTRL key
Which types of the following data can cells contain?
Cells can contain numbers, text, and equations.
The Save As function is found in the Review Tab of the Office Ribbon.
It is in the file tab.
What program creates budgets, manages accounts, performs mathematical calculations, and converts numerical data into charts and graphs?
What program is useful for reports, essays, letters and documentation
Microsoft PowerPoint is a program to create?
What tool do you use to locate specific text in your WORD document?
What type of program includes word processors, spreadsheets, presentation software, and databases?
Do you have to have an Internet Service Provider (ISP) to connect to the Internet?
Every Website on the Internet has a unique IP address.
True. Websites are located and opened by browsers using a unique IP address.
What is a worldwide collection of public networks that are linked to each other for information exchange.
World Wide Web (WWW)
Publishing a web site requires a service provider to host the site on an Internet server.
True, if you want to publish a website you need to work with a service to host the files.bli
An electronic form of the traditional postal mail that allows you to exchange messages and files over a network is called what?
What kind of device is a keyboard?
Function keys perform different actions depending on what program is running.
What is the CPU for your computer?
What determines the speed at which your computer performs tasks?
The operating system controls how programs work with each other.
What is computer privacy?
Keeping your personal files and data secure and a secret from unauthorized viewing or tampering
Phishing is a common activity used to extract personal information from computers users and use the information for malicious purposes.
How can Trojan Viruses be stopped?
What are the biggest security risks to your computer?
Hackers, Friends, Viruses, Physical Damage
What is copyright violations?
Using others' intellectual property without permission
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Marketing Essentials Chapter 9
OTHER SETS BY THIS CREATOR
Computer Security and Privacy