Test Appendix A
Test Appendix A
Test Appendix A
Multiple Choice:
A. Palm Pilot.
B. laptop.
C. mainframe.
D. PC.
A. hardware.
B. software.
C. firmware.
A. RAM.
B. microprocessor.
C. memory.
D. hard disk.
A. CPU
B. RAM
C. ROM
D. System unit
A. ROM.
B. a hard disk.
C. RAM.
D. a CD-ROM drive.
7. External devices that are connected to a PC through cables are known as:
A. storage devices.
C. peripherals.
A. CD-ROMs.
B. diskettes.
C. DVDs.
A. They are the same—just two different terms used by different manufacturers.
D. A CD-RW can be written to, but a CD-ROM can only be read from.
B. RAM.
C. the CD.
A. magnetic
B. temporary storage
C. optical
D. floppy
12. All of the following are considered common peripheral devices EXCEPT a:
A. mouse.
B. keyboard.
C. zip drive.
D. monitor.
A. Printer
B. Monitor
C. Scanner
D. PC tablet
A. mouse.
B. keyboard.
C. touchpad.
D. monitor.
15. Holding the mouse button down while moving an object or text is known as:
A. moving.
B. dragging.
C. dropping.
D. highlighting.
16. Pointing to an object and clicking the right button on the mouse will most likely generate a:
A. menu.
B. delete option.
C. toolbar.
D. table of options.
17. The software that handles the background tasks and details of a computer is known as the:
A. system software.
B. Mac OS.
C. application software.
D. executable files.
A. Microsoft’s
B. Apple’s
C. IBM’s
D. Intel’s
19. Programs, such as Microsoft Word, that allow a user to accomplish a task or goal are referred to as:
A. system software.
B. application software.
C. Web browsers.
D. operating systems.
A. RAM
B. ROM
C. Software
D. Peripheral devices
21. The ____________ primarily take(s) care of the behind-the-scenes details and manage(s) the hardware.
A. operating system
B. application software
C. peripheral devices
D. hard disk
A. executable file
B. software program
C. operating system
D. document
A. data files.
B. executable files.
C. system software.
24. When a file contains instructions that can be carried out by the computer, it is often called a(n)
___________ file.
A. data
B. executable
C. information
D. application
25. To what temporary area can you store text and other data, and later paste them to another location?
A. The clipboard
B. ROM
D. CD-ROM
26. When you change fonts, how text looks, or how a paragraph looks on a page, you are changing the:
A. formatting.
B. point size.
C. structure.
D. print setup.
A. A serif typeface
B. A letter
C. A print style
D. A font
28. Which type of font has the most plain clean lines?
A. Monospaced fonts
C. Sans-serif fonts
D. Serif fonts
29. What are the three characters that follow the period and file name referred to as?
A. An extension
B. A file folder
C. A file locator
D. An expansion
30. What is the electronic equivalent to using paper file folders to organize your paper documents?
A. File compression
B. Folders
C. Files
D. A file extension
A. stored as gifs.
B. saved in RAM.
C. compressed.
D. compacted.
A. Microsoft word.
B. PKZIP.
C. JPEG.
D. MP3.
33. The Windows ____________ is a screen that includes icons of software programs and possibly files and/or
folders.
A. toolbar
B. menu
C. desktop
D. XP window
Answer: C Reference: Using Microsoft Word with Microsoft Windows Difficulty: Moderate
34. A common feature of both a Macintosh desktop and a Windows desktop is the use of:
C. a Dock.
A. direct connection.
A. the Internet.
C. a Web browser.
D. a LAN.
37. You can view Web pages on your own PC through the use of:
A. a Web browser.
B. utility software.
A. hyperlink
C. subdirectory
D. file name
A. URL.
B. bookmark.
C. portal.
D. search engine.
41. An email address contains two parts—the user name and the:
A. ISP.
B. host name.
C. URL.
D. WWW address.
A. A folder
B. A mailbox
C. A directory
A. email service.
B. ISP.
44. ____________ are often delivered to a PC through an email attachment and are often designed to do harm.
A. Viruses
B. Spam
C. Portals
D. Email messages
A. ID thieves.
B. hackers.
C. Web browsers.
D. hosts.
47. The primary permanent storage and retrieval device for information is the ____________.
48. Disk drives that are included in the system unit are called ____________.
52. An easy way to keep documents organized is to create ____________, which store files.
53. The hardware device that connects a computer to the Internet through phone lines is known as a(n)
____________.
Answer: World Wide Web Reference: World Wide Web Basics Difficulty: Easy
Answer: Web or WWW Reference: World Wide Web Basics Difficulty: Easy
Answer: Web pages Reference: World Wide Web Basics Difficulty: Easy
Answer: URL or uniform resource locator Reference: World Wide Web Basics Difficulty: Easy
58. Instances of text on a Web page that are usually underlined and shown in a different color are
____________.
59. Netscape and Yahoo! are ___________ and are designed as a first stop for a Web user because they offer a
wide variety of options.
60. When you are looking for specific information on the Web, a(n) ____________ can assist you in looking
for the information that you need.
61. The pages that contain the keywords within a search are called ____________.
63. When you want to revisit a page more often, it is advisable to ____________ that page.
64. A document, picture, or multimedia file connected to an email message is known as a(n) ____________.
65. The ____________ is the portion of an email address after the at sign (@).
66. The ____________ goes before the at sign (@) in an email address.
67. Sometimes an underscore character (_) is used in email addresses in place of a(n) ____________, which
can’t be used in an address.
71. The most common way viruses are delivered to your PC is through a(n) ____________.
72. Viruses that delete files or folders on your PC or that duplicate themselves and possibly cause harm to your
computer are created by ____________.
73. The elaborate, extensive network of networks that has changed how people work and communicate is
known as the ____________.
Matching:
I. CPU A. storage