Upgrade to remove ads
Career Prep A Exam
Terms in this set (75)
Test 60%, Soft Skills 20%, and Lab Assignments 20%
In accordance to our classroom syllabus/policy manual, what is the percentage of your grade pertaining to soft skills, lab assignments, and test?
on the racks
In accordance to our classroom syllabus and safety policy, where should all backpacks be placed after entering the classroom?
Two Hall Passes per Nine Weeks; Two Passes
Each employee will be provided with ___ Hall Passes per ___ week period. These passes are to provide employees with the opportunity to use the restroom when they have not had time. If the employee is tardy to class due to restroom use, they may turn in a hall pass to prevent them from receiving a tardy. If an employee us tardy 3 times more times in addition to the ___ passes, then an employee will be sent to penalty hall.
all of the above
In accordance to our classroom syllabus, students cannot access the Internet (unless instructed by teh teacher) or play games on the computer during class time. Students should not attempt to access restricted websites or place a personalized screen saver on computer nor change/modify the display properties of a computer in ANY MATTER. If a student is found breaking company policy it will result in:
Sitting up straight and bottom at the back of the seat.
Which of the following is the proper way to sit in your computer chair?
Parallel to the desk.
When typing your wrist should be:
Top edge of the monitor.
When looking at the computer, your eyes should meet which part of the computer screen?
CPU (central processing unit)
A hardware device that sorts data and programs, executes program instructions, and performs arithmetic/logic operations is known as the:
The small desk-size computer designed for education and business is called a:
The input device that reads printed characters, symbols, or graphical images into the computer is the:
The study of creating an efficient, comfortable, and healthy workplace while working on a computer is called:
The physical computer equipment that can be touched is known as:
Jim creates a science project on his school computer. The project includes some documents and two graphics. He wants to work on these files on his home computer. Jim wants to use a storage device to save the project files and take them home. Which of the following devices will he use to save the files?
Central processing unit (CPU)
Bob uses his computer to create his monthly household budget. Which part of his computer will perform the calculations for his budget?
You want to use your computer to create a document. When you turn on the computer, which of the following software will start first?
You buy your favorite music CD and want to listen to it on your computer. When you reach home, you see your sister is sleeping in the computer room. Which of the following hardware components will you use to listen to the CD without disturbing your sister?
You are paying for your visit to a doctor in a hospital. You ask for a payment receipt. Which hardware component can produce your payment receipt on paper?
Julia creates a project that includes several illustrations. She draws the illustrations in a notebook. She needs to capture the illustrations from the notebook and save them on her computer. Which of the following hardware components will she use to capture the illustrations?
A program that controls and manages the computer.
Betty prepares for her computer exam. She does not understand the concept of an operating system. She calls you for help. How will you define 'operating syster' for Betty?
Instructions that make hardware work.
Ken wants to know about the term software. Which of the following explanations will you use to explain the term 'software?'
You open Microsoft Windows Media Player on your computer to play some music. Windows Media Player prompts you to provide a music file as input. How will you categorize this music file?
All of the computers in your office are connected to a network. Several devices are connected to your computer, and you want to share the device with the other computers on the network. Which of the following devices can you share with other computer on the network?
Your school has 20 computers in your computer lab. All of the computers in this lab are connected by using cables. What type of a network does your computer lab have?
You are using your computer at home to chat with a friend. Your friend lives in another country. Which network enables the transfer of messages to your friends computer?
You modify a document that is saved to your computer. Where are the changes stored until you save the document?
Use Lock Computer Button
You need to go to an urgent meeting. You do not want your colleagues to use your computer in your absence. Which of the following methods will you use to ensure that no one uses your computer while you are away?
avoid opening e-mail attachments from unknown users
Viktor likes to exchange e-mail messages with his friends. Every day, he receives many messages with attachments. Viktor wants to protect his computer from virus attacks my e-mail. Which of the following guidelines will Viktor apply to protect his computer?
Delete the message
You receive an e-mail message from an unknown user. This message includes an .exe file as an attachment. What would you do with this message?
update and run virus scans daily
Gloria uses the Internet frequently for online purchasing. To protect her system from virus attacks, she installs an antivirus program. However, within a few days, she gets a virus alert on her system. Which of the following measures will she implement to prevent this virus in the future?
Jack is annoyed with the pop-up messages that appear whenever he visits a web site. He wants to block all of the pop-up message. Which of the following security settings will help him to block all of the pop-up messages?
dialog box launcher
In the lower-right corner of the ribbon groups, what is the name of the small arrow that displays a dialog box or a task pane with additional options for the group?
When you hover your cursor over a command button in a ribbon, what is the name of the descriptive box that appears?
Ron is saving his document for the first time ever, which command should he use?
To save an existing document with a new file name or to save an existing document in a new location, which command is used?
To save an existing document with the same file name or to save an existing document where work has been added or modified, which command is used?
Your friend sends you a computer game. After installing the game on your computer, you realize that is plays very slowly. You know that the CPU speed and hard disk for your computer are the same as they are in your friend's computer. What could be the reason?
Frequent power outages happen in your area. How can you protect your computer from this when a power outage happens?
monitor is not connected, monitor is not turned ON, monitor is not plugged in
If you turn on a PC and they system unit is clearly ON, but the monitor is dark, the problem could be that:
copy and paste
which technique is used to choose and move text or files from one location to a new location?
cut and paste
What is the process of removing an item or file from a document or location with the intention of placing it in an alternative location?
What is known as the coordinator between the CPU, software and hardware of a computer?
can not do anything
Doug's operating system no longer works on his computer. Doug has no intention of replacing his operating system therefore Doug can only do what on his computer?
Which is not a common operating system for personal computer?
What is the term for the interface that allows users to use their mouse to click on icons, buttons, and menus, and everything is clearly displayed on the screen using a combination of graphics and text?
Which is not a part of the Microsoft Window operating system?
Which is not a part of the Apple Mac OS X operating system?
Which operating system is a family of open source operating systems, which means that is can modified and distributed by anyone around the world?
Which of the following is NOT an operating system on a mobile device?
What is the operating system we use in our classroom computer lab?
What is the Microsoft Office version we use in our classroom computer lab?
Which of the following is NOT one of the Nine Themes of Digital Citizenship
is designed to steal information, inflict damage upon your computer, commit fraud, and spread spam.
Which of the following is NOT an example of personally identifiable information?
An individual or company that has access to your information after the site you are registered with is called
Repeatedly sending offensive, rude and insulting messages
is defined as the rules of etiquette that apply when communicating over computer networks, especially the Internet.
Courtney works for a design company and she needs to email everyone in the Engineering department a notice. She knows that there are 24 employees but doesn't know all of their email accounts. What tool could Courtney access to help her send an email to all 24 employees in the Engineering department at once?
scrambles the information you send over the internet into a code so that it's not accessible to others
stop block and tell
What should you do if someone is cyberbullying you?
learning management system
Edmodo, BlackBoard and Moodle are all examples of an
If you sending or receiving sexually-suggestive or explicit text or pictures via one's electronic device it is considered
______means someone who can't be identified based on the information you have
Which of the following is NOT considered to be part of Digital Rights and Responsibilities
Intentionally posting provocative messages about sensitive subjects to create conflict, upset people, and bait them into "flaming" or fighting is considered
Websites are required to post privacy policies, True or False
Ben works 8 hours a day where he is on his desktop computer. Once Ben goes home he downloads music on his IPod, stays on social networking cites and text friends on his phone for another 8 hours. This is an example of Digital ___________.
letter in the mail
Which of the following is NOT a form of digital communication
Online fights using electronic messages with angry and vulgar language is considered
Fraudulent or deceptive schemes is known as
A small computer text files placed in your computer by sites you visit
Copyright violations isn't a crime
They e-mailed me a copy, but I can't post it because it is still copyrighted
Changing key words and phrases but retaining the essential content of the source is considered what type of plagiarism?
Borrows generously from the writer's previous work without citation?
The absence of copyright protection; belonging to the public so that anyone may copy or borrow from it, is referred to as
YOU MIGHT ALSO LIKE...
BTA Computer Basics Review
Case Scenarios (Chapter 7-8)
OTHER SETS BY THIS CREATOR
Vocabulario Pag 129 Español 1 Unidad 2 leccion 2
Vocabulario Pag. 105 Español 1 Unidad 2 Lesson 1
Vocabulario Pag 51 Español 1 Unidad 1 Lección 1
Vocabulario Pag 25 Español 1 Lección Preliminar