CICS 88337

subject Type Homework Help
subject Pages 14
subject Words 1664
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What is an AUP intended to do?
a. license software for individual use
b. outline computer activities for which the computer and network may or may not be
used
c. contract with an outside organization to provide security and recovery services for a
network
d. establish a network of computers, such as a homegroup
A perpetrator is using a botnet. Which of the following is the least likely use of his
botnet?
a. sending spam via email
b. spreading viruses
c. committing a distributed denial of service attack
d. authoring ActiveX scripts
If you are looking for an online social network that allows you to share messages and
interests with family and friends, which of the following is the best match for you?
a. Facebook
page-pf2
b. Twitter
c. LinkedIn
d. Digg
If the TAB key is used to move from field to field in a record, press F2 to produce an
insertion point in a field.
a. True
b. False
In the evaluation of a website, the evaluation criterion of authority states that a
reputable institution should support the website without bias in the information.
a. True
b. False
page-pf3
You usually need to install web apps before you can run them.
a. True
b. False
Which of the following includes music, speech, or any other sound?
a. audio
b. vodcasting
c. video
d. digeo
To move from Layout view to Form view, tap or click the ____ button on the Access
status bar.
a. Open Form
b. Edit View
page-pf4
c. Data View
d. Form View
As you edit some photos from your summer vacation, you choose to make a beach
photo much smaller in terms of its file size in order to be able to email it to your
friends. Which tool will you use for this?
a. crop
b. resize
c. compress
d. contrast
Many businesses use which of the following to limit employees' web access?
a. content filtering
b. web bugs
c. honeypots
d. spyware
page-pf5
Word has a variety of predefined shapes, which are a type of drawing object, that you
can insert in documents.
a. True
b. False
Although you can use a dialog box to indent paragraphs, Word provides a quicker way
through the ____.
a. Quick Access Toolbar
b. Office Button menu
c. vertical ruler
d. horizontal ruler
page-pf6
Which of the following terms is used to describe a small text file that a web server
stores on your computer?
a. a breadcrumb
b. a nugget
c. a cracker
d. a cookie
Never start a computer with removable media inserted in the computer unless you are
certain the media are uninfected.
a. True
b. False
While a computer is running, the operating system remains in memory.
a. True
b. False
page-pf7
A raised dot () shows where the ENTER key was pressed.
a. True
b. False
The question mark (?) wildcard represents any collection of characters.
a. True
b. False
Which of the following is NOT a type of kiosk?
a. financial
b. ticket
c. media
page-pf8
d. visitor
Word provides a variety of picture effects, including ____.
a. shape
b. color
c. size
d. content
A field in which the user actually must enter data.
How do you determine which type of computer tablet, laptop, or desktop is best?
page-pf9
a. It depends on your network.
b. It depends on your application status.
c. It depends on your needs.
d. It depends on your client.
What involves reducing the electricity consumed and environmental waste generated
when using a computer?
a. green computing
b. universal computing
c. streamlined computing
d. comprehensive computing
Which kind of program attempts to locate a file on your computer or mobile device
based on criteria you specify?
a. search tool
b. image viewer
page-pfa
c. file manager
d. file finder
What is the term for the technology that allows users to view message details such as
the length of calls, for example?
a. integrated vmail
b. voice e-mail
c. video mail
d. visual voice mail
Researchers have known for decades that documents with visual elements are more
effective than those that consist of only text.
a. True
b. False
page-pfb
Which of the following tools searches for and removes unnecessary files?
a. disk defragmenter
b. uninstaller
c. disk cleanup
d. file manager
To convert a hyperlink to regular text, right-click the hyperlink and then click ____ on
the shortcut menu.
a. Edit Hyperlink
b. Select Hyperlink
c. Convert Hyperlink
d. Remove Hyperlink
page-pfc
Adding a ____ to text adds depth and helps the letters display prominently.
a. sizing handle
b. shadow
c. font
d. shape
A(n) ____ is a computer program that coordinates all the activities of computer
hardware.
a. app
b. tile
c. operating system
d. vision
Which of the following can transmit germs?
a. iris recognition systems
b. digital forensics systems
page-pfd
c. face recognition systems
d. hand geometry systems
Copy all formatting changes from one object to another
A(n) ____________________ contains a specific piece of information within a record.
Removable flash memory, usually no bigger than 1.5 inches in height or width.
page-pfe
Enables you to sign in to your user account.
The easiest way to select a cell is to move the block _______________________
pointer to the cell and then click.
Makes it illegal to circumvent antipiracy schemes in commercial software.
The first line of text on a flyer.
page-pff
Society encourages users to contribute to ____________________ computing, which
involves reducing the electricity consumed and environmental waste generated when
using computers, mobile devices, and related technologies.
Represents any collection of characters.
Real-time exchange of messages, files, audio, and/or video with another online user
page-pf10
Should not be used to clear a cell.
Any computer that provides services and connections to other computers on a network
To combine criteria with ____________________, each criterion must go on separate
rows in the Criteria area of the grid.
Word similar in meaning
page-pf11
In addition to basic phone capabilities, list at least six features of today's smartphones.
page-pf12
Pressing the _________________________ keyboard shortcut keys displays the Print
tab in Backstage view.
A(n) ____________________ attack is an assault whose purpose is to disrupt computer
access to an Internet service such as the web or email.
The _________________________ consists of tabs, groups, and commands.
page-pf13
Inside a workbook in Excel are sheets, each of which is called a(n)
_________________________.
Outline the guidelines for evaluating a website.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.