NAME

Question types


Start with


Question limit

of 225 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Outstanding Shares <protected>.docx
  2. UNIX
  3. Optical discs
  4. RF
  5. in no way; the rules are the same
  1. a Most wireless networking applications use frequencies in the ____ band.
    Select one:
    a. RF
    b. audible
    c. IR
    d. UV
  2. b Case-Based Critical Thinking Questions

    Case 7-3
    You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter.

    Which of the following file names would not be accepted by Windows?
    Select one:
    a. Tully Experience.docx
    b. Outstanding Shares <protected>.docx
    c. 1-visual@worksite.jpg
    d. t.docx
  3. c Case-Based Critical Thinking Questions

    Case 3-1
    You are studying the history of various operating systems.

    The earliest operating system mentioned in this chapter is ____.
    Select one:
    a. UNIX
    b. Linux
    c. DOS
    d. Mac OS
  4. d _____ are thin circular discs made out of polycarbonate, topped with layers of materials and coatings used to store data and protect the disc.
    Select one:
    a. Platters
    b. Optical discs
    c. SSDs
    d. Hybrid hard drives
  5. e File naming rules differ from folder naming rules _____.
    Select one:
    a. in specifying a different maximum length for file names
    b. in no way; the rules are the same
    c. in the characters that are not allowed
    d. in that two files in different folders may not have the same name

5 Multiple choice questions

  1. Without a(n) ____, a computer cannot function.
    Select one:
    a. pointing device
    b. application suite
    c. operating system
    d. optical drive
  2. Wireless networks usually use ____ signals to send data.
    Select one:
    a. analog
    b. radio
    c. fiber-optic
    d. contiguous modulation
  3. Case-Based Critical Thinking Questions

    Case 1-3
    Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding.

    In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____.
    Select one:
    a. plagiarism
    b. not plagiarism
    c. too little information to say
    d. both illegal and unethical
  4. Maliciously altering the content of a competitor's commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource.
    Select one:
    a. computer sabotage
    b. Cyberterrorism
    c. cracking
    d. a dot con
  5. When only one file is open in an application, clicking the application's Close button _______.
    Select one:
    a. closes only the file
    b. closes the file and the application
    c. is dimmed and unclickable
    d. has different effects depending on the application open

5 True/False questions

  1. too little information to sayYou use _____ to navigate, view, and work with the contents and resources on your computer.
    Select one:
    a. application windows
    b. dialog boxes
    c. Start windows
    d. File Explorer windows

          

  2. MANsMicrosoft and Google have created large networks known as ____ to provide free or low-cost Internet access to area residents.
    Select one:
    a. PANs
    b. LANs
    c. MANs
    d. WANs

          

  3. hotspotA Wi-Fi ____ is a location with a direct Internet connection and a wireless access point that allows users to connect wirelessly to the Internet.
    Select one:
    a. hotspot
    b. honeypot
    c. broadband
    d. linkup

          

  4. serialWith ____ transmission, data is sent one bit at a time.
    Select one:
    a. serial
    b. parallel
    c. pulse
    d. fiber-optic

          

  5. Twisted-pairA wireless ____ is commonly used to connect both wireless and wired devices to a network and to connect that network to an Internet connection via the appropriate broadband modem.
    Select one:
    a. coupling
    b. jumper
    c. router
    d. NAC

          

Create Set