stole it straight from wilkes county. questions from 1.01

23
VOCAT REVIEW Stole it Straight from Wilkes County

Upload: alban-foster

Post on 18-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

VOCAT REVIEW

Stole it Straight from Wilkes County

Questions from 1.01

Question 1

Software packages used to create financial statements using mathematical calculations are:  Word processing.   Electronic Spreadsheet.   Database  Computer graphics.

Question 2

Information that leaves the computer is called:  Programs.   Input.   Graphics.   Output.

Question 3

What equipment is used like a copy machine to allow information to be input into the computer?  Light pen   Keyboard   Scanner   Mouse

Question 4

Data that appears on the monitor is called:  Language.   Softcopy.   Hardcopy.   Programs.

Question 5

The components that make up a computer system are:  Programs.   Language.   Hardware.   Software.

Question 6

Which device is used to enter data into a computer?  Input device   Output device   Microprocessor   Storage

Question 7

The physical parts of a computer system are called:  Hardware.   Languages.   Applications.   Programs.

Objective 1.02

Question 8

What system software controls the computer operations?FormattingLanguageProgramSystem

Question 9

The operating system capability that permits more than one program to run simultaneously is called:  Multi-cycle.  Multi-purpose.  Multi-string.  Multitasking.

Question 10

The operating system functions do NOT include:  Managing input and output.  Providing user with a password.  Supervising other components.  Providing software and hardware

management.

Question 11

Which utility is used to locate and disinfect a virus?  Antiviral  Data compression  Data recover  Translator

Question 12

The acronym MS-DOS stands for:  Macintosh Disk Operating System.  Microsoft Disk Operating System.  Microsoft Operating System.  Microsoft Output System.

Questions for 1.03

Question 13

Which is NOT a characteristic of copyrighted software?  An individual or a business copyrights it.  It is given freely and it can be copied by

anyone.  Permission is needed in order to copy

software.  Programs are accompanied by supporting

documents.

Question 14

The technology used to scramble information so that only the sender and receiver can read the data is called:  Encryption.  Password.  Public domain.  Virus.

Question 15

To protect the computer from detecting a virus the user should install a/an:  Database program.  Spreadsheet program.  User password.  Anti-virus program.

Question 16

Which is a destructive computer code or virus that is designed to activate at a specific time?  Bomb  Hoax  Trojan horse  Worm

Question 17

Which is NOT a virus known to destroy or cause damage to computer files?  Bomb  Hacker  Trojan Horse  Worm

Question 18

Which software allows the user to pay a small fee after the trial period?  Copyrighted  Freeware  Public domain  Shareware

Question 19

Which is NOT considered a security measure? Backing up data regularly Giving your password to your friends Protecting data with an anti-viral program Protecting files with a password