CMCS 36871

subject Type Homework Help
subject Pages 15
subject Words 2212
subject Authors Misty E. Vermaat

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
If you have multiple Excel workbooks open, to close all open workbooks and exit
Excel, ____.
a. press ALT+F4
b. press and hold the Excel app button on the taskbar and then tap 'Close all windows'
on the shortcut menu
If you delete a file from removable media, it is stored in the Recycle Bin where you can
recover it until you empty the Recycle Bin.
a. True
b. False
To create a top-values query, use the Top Values box on the DESIGN tab to change the
number of records to be included from All to the desired number.
a. True
b. False
page-pf2
You keep hearing a colleague of yours use a term and you are unfamiliar with it.
Ultimately, however, you realize that it is a synonym for the term port. What is it?
a. unit
b. jack
c. scope
d. probe
One method of changing the size of a window is to drag the window borders.
a. True
b. False
The Privacy Act forbids federal agencies from allowing information to be used for a
reason other than that for which it was collected.
a. True
page-pf3
b. False
Field can contain only monetary data.
Technology, while useful, cannot help you more efficiently and effectively access and
search for information.
a. True
b. False
In the ____ letter style, all components of the letter begin flush with the left margin.
a. modified block
page-pf4
b. block
c. modified semi-block
d. all of the above
To view the results of a query, open it by pressing and holding or right-clicking the
query in the Navigation Pane and tapping or clicking ____ on the shortcut menu.
a. Datasheet View
b. Design View
c. Open
d. Run
You can advance slides during a slide show by pressing the PAGE DOWN key.
a. True
b. False
page-pf5
To save the changes to the layout of a table, tap or click the Save button on the ____.
a. status bar
b. TABLE TOOLS tab
c. Navigation Pane
d. Quick Access Toolbar
The ____ feature automatically locates specific text and then replaces it with desired
text.
a. Locator
b. Find and Replace
c. Replacer
d. Locate and Replace
page-pf6
Which of the following is the code of acceptable behaviors users should follow while
on the Internet; that is, it is the conduct expected of individuals while online?
a. netiquette
b. web politesse
c. Internet behavior
d. web civility
A note reference mark signals that an explanatory note exists at the bottom of the page
as a(n) ____, as shown in the accompanying figure.
a. keynote
b. citation
c. endnote
d. footnote
Some home users connect computers to the Internet via slower-speed dial-up access
because of its lower cost or because broadband access is not available where they live.
a. True
page-pf7
b. False
You typically attach a file to an email message to provide additional information to a
recipient.
a. True
b. False
If a POS terminal is able to update inventory at geographically separate locations, what
is the term for this ability?
a. Internet capable
b. POS mobility
c. digital encapsulation
d. ATM facility
page-pf8
There are ____ standard colors for text in a theme.
a. two
b. three
c. four
d. five
The term back door, as it refers to computer crime, is _____________.
a. the area of memory where information about a virus or attempted attack is sent by the
antivirus software in order to prevent similar attacks in the future
b. a program or set of instructions that allows users to bypass security controls when
accessing a program, computer, or network
c. the vulnerabilities of a computer criminal or criminal network that enable them to be
tracked and caught
d. a weakness in a computer or network's security system that enables criminals to gain
unauthorized access
Which of the following is NOT an example of malware?
page-pf9
a. adware
b. vaporware
c. rootkits
d. zombies
Who is Microsoft's founder?
a. Bill Gates
b. Steve Jobs
c. Steve Wozniak
d. Larry Ellison
Which kind of user requires the capabilities of a powerful computer?
a. SOHO
b. power
c. mobile
page-pfa
d. key
To read encrypted data, the recipient must decipher it into a readable form. What is the
term for this process?
a. re-securing
b. decryption
c. assessment
d. digitization
Digital cameras often can connect to or communicate wirelessly with a computer, a
printer, or the Internet.
a. True
b. False
page-pfb
In George's Sales Data worksheet, the result for a formula in cell H14 is ######. What
should George do?
a. increase the width of column H
b. provide a correct argument or operand
c. run the calculation again to find the available value
d. replace the incorrect formula in cell H14 with one that does not divide by zero
Which of the following is someone who uses the Internet or network to destroy or
damage computers for political reasons?
a. hacker
b. script kiddie
c. cyberextortionist
d. cyberterrorist
The MLA style requires that the works cited be listed in alphabetical order by the
author's last name or, if the work has no author, by the work's title.
page-pfc
a. True
b. False
The lock screen consists of ____.
a. the sign-in screen
b. a user name
c. a password prompt
d. the time and date
Which of the following adjusts the difference in appearance between light and dark
areas of a photo?
a. sharpness
b. crispness
c. brightness
d. contrast
page-pfd
Which of the following entails having the knowledge and understanding of computers,
mobile devices, the Internet, and related technologies?
a. digital literacy
b. digital intimacy
c. digital legitimacy
d. digital intelligence
Row that displays in the design grid when aggregate functions are used.
The MLA style uses in-text ____________________ instead of noting each source at
the bottom of the page or at the end of the paper.
page-pfe
Creating a high-level paragraph in a multilevel bulleted list is called
_________________________ text.
Identify the letter of the choice that best matches the phrase or definition.
a. message text
b. attachment
c. message pane
d. backup
e. personal storage table
f. message header
g. spam
h. POP3
i. Drafts folder
j. SMTP
A data file that stores a user's Outlook items.
page-pff
Discuss letterhead, including its design, required contents, and the placement and
appearance of those elements.
page-pf10
Application software often includes an image ____________________, which is a
collection of clip art and photos.
A picture associated with a user name.
What are the five major steps for web publishing?
page-pf12
The owner of this kind of computer is unaware that it is being controlled remotely by an
outsider.
Selects the adjacent cell in the direction of the arrow on the key.
A(n) ____________________ phrase is a phrase that closely resembles how people
speak during normal conversation.
page-pf13
A(n) ____________________ signature is an encryption code that a person, website, or
organization attaches to an electronic message to verify the identity of the message
sender.
Tap or click the 'Default Sensitivity level' arrow to display a list of
____________________.
Functions as a component in a larger product
page-pf14
A(n) ____________________ is a collaborative website that allows users to add to,
modify, or delete the website content via their browser.
Delivers support for full high-definition videoconferencing
A(n) ____________________ is an organization that provides servers for routing and
storing email messages.
The default style in Word.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.