Question types

Start with

Question limit

of 225 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. https
  2. CPU
  3. Windows 8
  4. system clock
  5. the message has an attachment
  1. a When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____.
    Select one:
    a. http
    b. https
    c. SEC-http
    d. a deadbolt symbol
  2. b The latest version of the Windows operating system is ____.
    Select one:
    a. Windows XP
    b. Windows 10
    c. Windows Vista
    d. Windows 8
  3. c If you see a paperclip icon next to a message in the message list, that means _______.
    Select one:
    a. the message is time-sensitive
    b. the message is high-priority
    c. the message has been read
    d. the message has an attachment
  4. d The _____ is a small quartz crystal located on the motherboard.
    Select one:
    a. ALU
    b. system clock
    c. bus interface
    d. heat sink
  5. e The _____ is the main processing device for a computer.
    Select one:
    a. CPU
    b. cache
    c. USB
    d. FPU

5 Multiple choice questions

  1. A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network.
    Select one:
    a. LAN
    b. intranet
    c. VPN
    d. Internet P2P network
  2. The term memory when referring to computers usually means _____.
    Select one:
    a. ROM
    b. BIOS
    c. RAM
    d. RAID
  3. ____ is one of the primary operations of a computer.
    Select one:
    a. Administration
    b. Sorting
    c. Processing
    d. Throughput
  4. ____ cable is the least expensive type of networking cable and has been in use the longest.
    Select one:
    a. Coaxial
    b. Fiber-optic
    c. Twisted-pair
    d. Packet-switched
  5. When you click "Empty Recycle Bin," files stored in the Recycle Bin _____.
    Select one:
    a. return to their original position
    b. can be retrieved using the Restore tab on the ribbon
    c. are permanently deleted
    d. are compressed

5 True/False questions

  1. in no way; the rules are the sameFile naming rules differ from folder naming rules _____.
    Select one:
    a. in specifying a different maximum length for file names
    b. in no way; the rules are the same
    c. in the characters that are not allowed
    d. in that two files in different folders may not have the same name


  2. PANCase-Based Critical Thinking Questions

    Case 4-1
    Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home.

    Clarice has a client looking to create a network for her mobile phone, headset, digital camera, and PDA. Clarice tells her about ____ options.
    Select one:
    a. PAN
    b. WAN
    c. intranet
    d. VPN


  3. "Reply" with Cc to TerryCase-Based Critical Thinking Questions

    Case 8-3
    You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action.

    Howard sent you an email with a good idea for a widget. You want to respond. You also want to bring Terry, who has experience with widgets, into the conversation.
    Select one:
    a. "New" to Terry, cut and paste Howard's original email
    b. "Reply" with Bcc to Terry
    c. "Reply" with Cc to Terry
    d. "Forward" to Terry with Bcc to Howard


  4. over the Internet or another networkHacking most often occurs ____.
    Select one:
    a. in upscale suburban areas
    b. when an attacker has physical access to a vulnerable computer
    c. over the Internet or another network
    d. on college campuses


  5. flash memory cardsTo change which area of the workspace is visible in the program window, you can use the _______.
    Select one:
    a. zoom bars
    b. scroll bars
    c. resolution setting
    d. ScreenFilter