1.
What is similar to a copy machine, except that it creates a digital file of the image?
Correct Answer
C. A scanner
Explanation
A scanner is similar to a copy machine in that it can create a digital file of an image. While a copy machine creates a physical copy of a document, a scanner captures the image and converts it into a digital file that can be stored, edited, or shared electronically. This allows for easy duplication and manipulation of the image without the need for physical copies. A fax machine, on the other hand, transmits a document electronically over a telephone line. A digitizer is a device that converts analog signals into digital data, but it is not specifically used for creating digital files of images.
2.
What software would you most likely use to compare the average snowfall from several locations?
Correct Answer
A. Spreadsheet
Explanation
A spreadsheet software is the most suitable tool for comparing the average snowfall from several locations. Spreadsheets allow you to organize and analyze data in a tabular format, making it easy to input and manipulate numerical data. You can easily calculate the average snowfall by using formulas and functions in a spreadsheet. Additionally, you can create charts and graphs to visually compare the snowfall data from different locations, helping you to identify patterns or trends.
3.
What is a web browser plug-in?
Correct Answer
A. A program that adds a specific feature to the browser allowing it to play or view certain files
Explanation
A web browser plug-in is a program that enhances the functionality of a web browser by adding specific features that allow it to play or view certain files. These plug-ins are designed to extend the capabilities of the browser beyond its default capabilities, enabling users to access and interact with various types of multimedia content, such as videos, audio files, or interactive applications, directly within the browser window. This eliminates the need for separate software or applications to handle specific file types, providing a more seamless and convenient browsing experience.
4.
The process of making readable data into unreadable (nonsense) characters is called:
Correct Answer
B. Encryption
Explanation
Encryption is the process of converting readable data into unreadable characters to ensure its confidentiality and security. It involves the use of algorithms and keys to transform the data into a format that can only be deciphered by authorized individuals or systems with the corresponding decryption key. This technique is commonly used to protect sensitive information, such as personal data, financial records, and communication channels, from unauthorized access or interception.
5.
In the e-mail address "[email protected]", the domain is:
Correct Answer
B. Sllboces.org
Explanation
In an email address, the domain is the part that comes after the "@" symbol. It typically consists of two parts: the domain name and the top-level domain (TLD).In this case, the domain name is "sllboces," which represents the organization or entity associated with the email address.The TLD is ".org," indicating that the organization is a non-profit or non-commercial entity, such as a charity, educational institution, or open-source project.The other options are incorrect because "model" is the username or local part of the email address, and ".org" is the TLD but not the complete domain. The complete domain includes both the domain name and the TLD: "sllboces.org."
6.
Guidelines written to protect the original work of others:
Correct Answer
D. Fair Use Rules
Explanation
Fair Use Rules are guidelines that are designed to protect the original work of others while allowing limited use of copyrighted material without permission from the copyright owner. These rules provide a framework for determining whether the use of copyrighted material is fair or infringing. They consider factors such as the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect of the use on the market for the original work. Fair Use Rules help to balance the rights of copyright holders with the need for creativity and expression.
7.
An uninstaller is a utility program that:
Correct Answer
A. Removes a program from a computer
Explanation
An uninstaller is a utility program that removes a program from a computer. It is designed to cleanly remove all the files, folders, and registry entries associated with the program, ensuring that no traces are left behind. This helps in freeing up disk space and maintaining the overall performance of the computer.
8.
When you change the color and background of a chart in a spreadsheet, you are:
Correct Answer
D. Formatting
Explanation
When you change the color and background of a chart in a spreadsheet, you are formatting. Formatting refers to the process of changing the appearance of data or objects in a document to enhance its visual appeal or to convey specific information. In this case, changing the color and background of a chart helps to make it more visually appealing or to highlight certain data points or trends.
9.
To find the average daily amount of rainfall over a four-week period, which software program would be the BEST to use to record data and find the average?
Correct Answer
B. Spreadsheet
Explanation
A spreadsheet would be the best software program to use to record data and find the average daily amount of rainfall over a four-week period. Spreadsheets allow for easy organization and manipulation of data, making it simple to input and calculate the average rainfall for each day. Additionally, spreadsheets have built-in functions that can quickly calculate averages, saving time and effort in the data analysis process.
10.
Getting into someone else's computer without their permission is called:
Correct Answer
C. Hacking
Explanation
Hacking refers to the unauthorized access or intrusion into someone else's computer system or network without their permission. It involves bypassing security measures to gain control over the system, steal information, or cause damage. Hacking is a serious offense and is considered illegal in most jurisdictions.
11.
Adding your comments to a blog or forum is called
Correct Answer
A. Posting
Explanation
Adding comments to a blog or forum is commonly referred to as "posting". This term is used to describe the action of sharing thoughts, opinions, or information on an online platform for others to see and engage with. It is a way for individuals to contribute to discussions and participate in online communities.
12.
Clickable words on a Web page that direct you to another Web page or file are called:
Correct Answer
B. Hyperlinks
Explanation
Hyperlinks are clickable words or phrases on a web page that redirect users to another web page or file when clicked. They are commonly used to navigate between different pages on a website or to access external resources. Buttons, icons, and marks are also elements commonly found on web pages, but they may not necessarily redirect users to other pages or files.
13.
The simulation of a real or imagined environment that appears as a three-dimensional (3-D) space is called:
Correct Answer
B. Virtual Reality
Explanation
Virtual reality refers to the simulation of a real or imagined environment that appears as a three-dimensional space. It involves the use of computer technology to create a completely immersive experience for the user, allowing them to interact with and explore the virtual environment. This can be achieved through the use of specialized hardware, such as headsets or gloves, that track the user's movements and provide a sense of presence within the virtual world. Virtual reality is often used in various fields, including gaming, training, education, and entertainment.
14.
Which of the following is an example of an image file?
Correct Answer
D. .jpeg
Explanation
.jpeg is an example of an image file because it is a file format commonly used for storing digital images. It is a compressed file format that allows for high-quality images with relatively small file sizes. .mp3, .exe, and .mp4 are file formats used for audio and video files, not images.
15.
You have asked students to write a report on "How the Civil War Affected
the Economy in the South." Which Boolean operators should they start
with when conducting an Internet search?
Correct Answer
C. Civil War AND Economy
Explanation
When conducting an Internet search for information on how the Civil War affected the economy in the South, students should start with the Boolean operator "AND". This is because they are looking for information that includes both the terms "Civil War" and "Economy". Using "AND" will narrow down the search results and provide more relevant information specifically related to the impact of the Civil War on the economy in the South.
16.
The first thing to consider when developing a multimedia presentation is:
Correct Answer
A. The audience
Explanation
When developing a multimedia presentation, the first thing to consider is the audience. The audience's needs, preferences, and level of understanding should be taken into account in order to create a presentation that effectively communicates the intended message. By considering the audience, the presenter can tailor the content, tone, and style of the presentation to ensure maximum engagement and comprehension.
17.
Which feature of your word processing program would you use to send a form letter to a group of names and addresses:
Correct Answer
C. Mail Merge
Explanation
Mail Merge is the correct answer because it is a feature in word processing programs that allows users to create personalized documents, such as form letters, by merging a main document with a data source that contains names and addresses. This feature automates the process of sending the same letter to multiple recipients with personalized information, saving time and effort for the user.
18.
Software that blocks access to certain websites is called __________ software.
Correct Answer
A. Filtering
Explanation
The given question asks for the name of the software that blocks access to certain websites. Among the options provided, "Filtering" is the correct answer. Filtering software is specifically designed to restrict or limit access to certain websites based on predefined criteria or settings. It allows users to control the content that can be accessed on their devices or networks, making it an effective tool for internet safety and security.
19.
This word processing feature allows information to be organized in rows and columns:
Correct Answer
B. Tables
Explanation
Tables are a word processing feature that allows information to be organized in rows and columns. They are used to present data in a structured and easy-to-read format, making it easier for readers to understand and analyze the information. Tables are commonly used in documents such as reports, presentations, and spreadsheets to display data in a systematic manner. They provide a clear visual representation of data, making it convenient to compare and contrast different values or categories.
20.
A computer virus is transmitted MOST often through:
Correct Answer
D. Email attachments
Explanation
Email attachments are the most common method of transmitting computer viruses. This is because email attachments can contain malicious code or executable files that, when opened, can infect the recipient's computer. Cybercriminals often use email attachments as a way to trick users into downloading and executing the virus unknowingly. Therefore, it is important to be cautious when opening email attachments and to ensure they are from a trusted source before opening them.
21.
Which of these is the best way to find websites containing information about the history of Georgia?
Correct Answer
C. Type the words "georgia" and history in a search engine
Explanation
Typing the words "georgia" and history in a search engine is the best way to find websites containing information about the history of Georgia because search engines are specifically designed to search for and retrieve relevant information from the internet. By typing these keywords, the search engine will generate a list of websites that are likely to contain information about the history of Georgia, making it easier for the user to find the desired information.
22.
In the Internet address "www.canton.edu," the ".edu" indicates:
Correct Answer
A. The type of organization represented by the address
Explanation
The ".edu" in the internet address "www.canton.edu" indicates the type of organization represented by the address. In this case, it suggests that the website belongs to an educational institution.
23.
When searching for a topic using a web search engine, which are the best Boolean operators to use with your keywords to get better results:
Correct Answer
A. AND, OR & NOT in the search
Explanation
Using the Boolean operators AND, OR, and NOT in a web search allows for more precise and targeted results. The operator AND narrows down the search by including all the specified keywords, while OR broadens the search by including any of the specified keywords. The operator NOT excludes certain keywords from the search results. By combining these operators effectively, users can refine their search and find the most relevant information.
24.
Copying copyright protected software and giving it to others for free is:
Correct Answer
B. A criminal act
Explanation
Copying copyright protected software and giving it to others for free is considered a criminal act because it violates the rights of the software owner. Copyright laws protect the exclusive rights of the creator or owner of a work, including software, and unauthorized copying and distribution infringes upon those rights. Such actions are illegal and can lead to legal consequences, including fines and penalties.
25.
What does multitasking mean?
Correct Answer
D. The computer's ability to run several programs at the same time
Explanation
Multitasking refers to the computer's ability to run multiple programs simultaneously. This means that the computer can execute multiple tasks or processes concurrently, allowing the user to switch between different applications without having to wait for one program to finish before starting another. Multitasking enhances efficiency and productivity by utilizing the computer's processing power effectively and maximizing its resources.
26.
MP3 and WAV files are examples of:
Correct Answer
A. Audio sound files
Explanation
MP3 and WAV files are examples of audio sound files. Both MP3 and WAV formats are commonly used for storing and playing audio recordings. MP3 files are compressed audio files that provide high-quality sound with smaller file sizes, making them suitable for music and audio playback on various devices. WAV files, on the other hand, are uncompressed audio files that preserve the original sound quality but result in larger file sizes. These formats are widely supported and compatible with most media players and devices, making them popular choices for storing and sharing audio content.
27.
To run power hungry programs such as video editing software the computer needs a lot of:
Correct Answer
D. RAM
Explanation
RAM stands for Random Access Memory, and it is a type of computer memory that is used to store data that is being actively used by the computer. Power hungry programs, such as video editing software, require a lot of RAM because they need to store and process large amounts of data in real-time. RAM allows the computer to quickly access and manipulate this data, which is essential for running these types of programs smoothly. Therefore, to run power hungry programs like video editing software, the computer needs a lot of RAM.
28.
Computer-based models of real-life situations are called:
Correct Answer
A. Simulations
Explanation
Computer-based models that replicate real-life situations are referred to as simulations. Simulations are designed to imitate the behavior and characteristics of the real-world scenario they represent. They are used in various fields such as training, research, and entertainment to provide a realistic and interactive experience. Simulations can be used to study complex systems, test hypotheses, train individuals in specific skills, or even simulate scenarios that are too dangerous or costly to recreate in real life. Virtual Mark Up and Computer-based training are not the correct terms for computer-based models of real-life situations, hence the answer is simulations.
29.
Which of the following is always legal when you buy a computer game on a CD-ROM?
Correct Answer
B. Load the game on one computer that you use.
Explanation
When you buy a computer game on a CD-ROM, it is always legal to load the game on one computer that you use. This means that you can install and play the game on a single computer that belongs to you. However, it is not legal to burn copies of the game on CDs and give them to your friends, as this would be a violation of copyright laws. Additionally, loading the game on all of the computers that you use is also not legal, as it would exceed the scope of the license agreement for the game. Therefore, the correct answer is to load the game on one computer that you use.
30.
Which of the following activities would be best accomplished using a spreadsheet?
Correct Answer
C. Generate a grapH of students' favorite sports
Explanation
A spreadsheet is a software application that is specifically designed for organizing, analyzing, and presenting data in a tabular form. It allows users to input data, perform calculations, and create visual representations such as graphs and charts. In this case, generating a graph of students' favorite sports would be best accomplished using a spreadsheet because it involves organizing and analyzing data to create a visual representation. The other activities mentioned, such as peer-editing reports and changing fonts and colors, can be done using word processing software or presentation software, but they do not require the data organization and analysis capabilities of a spreadsheet.
31.
What does .edu in an e-mail address or URL indicate?
Correct Answer
D. A college or university
Explanation
The presence of .edu in an e-mail address or URL typically indicates that the entity associated with it is a college or university. This is because .edu is a top-level domain specifically reserved for educational institutions in the United States. Therefore, if an e-mail address or URL contains .edu, it is likely that it belongs to a college or university rather than a commercial company, organization, or business website.
32.
AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and Yahoo are popular:
Correct Answer
B. Web search engines
Explanation
The given answer is "Web search engines". This is because the list of websites mentioned (AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile, and Yahoo) are all well-known search engines. They are platforms that allow users to search for information on the internet by entering keywords or phrases. These search engines index web pages and provide relevant results to the users based on their search queries.
33.
The connecting of computers so that information can be shared is called:
Correct Answer
C. Networking
Explanation
Networking refers to the process of connecting computers together so that they can communicate and share information with each other. It involves the use of hardware devices such as routers, switches, and cables, as well as software protocols and configurations. Networking allows for the sharing of resources, such as files and printers, and enables communication between users, whether they are in the same location or in different parts of the world. It is an essential component of modern computer systems and is used in various settings, including homes, offices, and data centers.
34.
When planning a database, what is the first step?
Correct Answer
C. Select fields
Explanation
The first step in planning a database is to select fields. This involves identifying the specific data that needs to be stored in the database and determining the appropriate fields or columns to accommodate that data. By selecting fields at the beginning of the planning process, it becomes easier to organize and structure the database effectively. Choosing the right fields sets the foundation for the entire database design and ensures that it can accurately capture and store the required information.
35.
Which of the following types of files CANNOT be opened in a word processing software?
Correct Answer
D. .dat
Explanation
.dat files cannot be opened in a word processing software because they are typically data files that contain raw data and are not meant to be viewed or edited as text. Word processing software is designed to open and edit text-based files such as .doc and .txt, but it does not have the capability to interpret or display the content of .dat files. Therefore, .dat files cannot be opened in a word processing software.
36.
A file that records a user's website visits and preferences is called a(n):
Correct Answer
C. Cookie file
Explanation
A file that records a user's website visits and preferences is called a cookie file. Cookies are small text files that are created by websites and stored on a user's computer. These files contain information such as login credentials, site preferences, and browsing history. When a user visits a website, the cookie file is accessed to provide personalized content and streamline the user experience. Therefore, the correct answer is cookie file.
37.
Word-wrap allows you to type text that continuously flows to the next line without having to press the:
Correct Answer
C. Enter/return key
Explanation
Word-wrap allows you to type text that continuously flows to the next line without having to press the Enter/return key. This means that you can type without having to manually move the cursor to the next line, as the text will automatically wrap to the next line when it reaches the end of the current line.
38.
Which of the following information is safe to share in a public chatroom or blog?
Correct Answer
C. Screen name only
Explanation
Sharing only a screen name in a public chatroom or blog is safe because it does not reveal personal information such as age, name, school, or organization. By sharing only a screen name, individuals can maintain their privacy and protect themselves from potential risks such as identity theft or cyberbullying. It is important to avoid sharing too much personal information online to ensure online safety.
39.
Ethical use of the Internet states users DO NOT send spam, which is a (n):
Correct Answer
A. Unsolicited message sent to many recipients
Explanation
An unsolicited message sent to many recipients refers to spam. Spam is considered unethical because it is an unwanted and often intrusive form of communication that can clog up email inboxes and waste people's time. It is important for users to respect others' privacy and only send messages that are requested or relevant to the recipient.
40.
Plagiarism is:
Correct Answer
C. Copying other people's ideas or writing without giving credit to the author
Explanation
Plagiarism refers to the act of copying someone else's ideas or written work without acknowledging the original author. This can involve directly copying text, paraphrasing without proper citation, or even presenting someone else's ideas as one's own. It is a form of intellectual theft and is considered unethical and dishonest in academic and professional settings. Properly crediting the original author is essential in order to avoid plagiarism and give credit where it is due.
41.
Symbols such as :) (smile), :( (frown), :\ (undecided), and :o (surprise)-used to express feeling in an e-mail message are called:
Correct Answer
C. Emoticons
Explanation
Emoticons are symbols used to express feelings in an e-mail message. They include symbols like :) (smile), :( (frown), :\ (undecided), and :o (surprise). Emoticons are a popular way to add emotion and tone to written communication, allowing the sender to convey their feelings more effectively.
42.
A student locates a story online, copies it, and submits it to the teacher as his or her own work. This is:
Correct Answer
B. Plagiarism and illegal
Explanation
Copying someone else's work and submitting it as one's own is considered plagiarism, which is unethical and against academic integrity. It is also illegal as it infringes on the original author's rights to their work. Therefore, the action described in the question is both plagiarism and illegal.
43.
Which of the following activities would be best accomplished using a database?
Correct Answer
C. Create a catalog of all the books in your classroom library
Explanation
Creating a catalog of all the books in a classroom library would be best accomplished using a database. A database allows for organizing and storing large amounts of data, such as book titles, authors, genres, and other relevant information. It provides a structured and efficient way to search, sort, and update the catalog, making it easier to manage and access the information. Additionally, a database can support features like generating reports, tracking book availability, and providing search functionality, which are essential for maintaining a comprehensive catalog of books in a library.
44.
Software programs or hardware devices setup to protect computers while online are called:
Correct Answer
A. Firewalls
Explanation
Firewalls are software programs or hardware devices that are set up to protect computers while online. They act as a barrier between a computer or a network and potential threats from the internet, such as hackers or malware. Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules, allowing only authorized connections and blocking unauthorized access. They help to prevent unauthorized access to a computer or network and protect sensitive information from being compromised.
45.
Which of the following is an output device:
Correct Answer
B. Printer
Explanation
An output device is a device that is used to display or present information to the user. In this case, a printer is an output device because it is used to produce a physical copy of information, such as text or images, onto paper. The other options listed, such as keyboard, microphone, and mouse, are all input devices as they are used to input or provide information to the computer.
46.
The instructions written in code that tell a web page how to display properly are called:
Correct Answer
D. Hypertext Markup Language (HTML)
Explanation
The instructions written in code that tell a web page how to display properly are called Hypertext Markup Language (HTML). HTML is the standard markup language used for creating web pages and it provides a structure for the content on a web page, including headings, paragraphs, images, links, and other elements. It is responsible for defining the layout, formatting, and appearance of the web page content. HTTP is a protocol used for transferring data over the internet, FTP is a protocol used for transferring files, and BASIC is a programming language.
47.
Which of the following would you use to compute the average score of four tests using a spreadsheet?
Correct Answer
A. A formula
Explanation
To compute the average score of four tests using a spreadsheet, you would use a formula. A formula allows you to perform calculations and manipulate data in a spreadsheet. By using a formula, you can easily add up the scores of the four tests and divide it by four to find the average. This automated process saves time and ensures accuracy in calculating the average score.
48.
The part of a computer that controls the flow of information and manages tasks is the:
Correct Answer
B. Central Processing Unit (CPU)
Explanation
The central processing unit (CPU) is responsible for controlling the flow of information and managing tasks in a computer. It is often referred to as the "brain" of the computer as it carries out instructions and performs calculations. The CPU interprets and executes instructions from the computer's memory, performs arithmetic and logical operations, and coordinates the activities of all the other hardware components. It is essential for the overall functioning of the computer system.
49.
To investigate the impact of the Ice Age on the formation of the Great Lakes, which of the following types of software would give you the ability to see what happened over time without actually being alive during the Ice Age?
Correct Answer
D. Simulation
Explanation
Simulation software would give you the ability to see what happened over time without actually being alive during the Ice Age. Simulation software allows users to create virtual models or scenarios that mimic real-world situations. In this case, the simulation software could be used to recreate the conditions of the Ice Age and simulate the formation of the Great Lakes over time. This would provide valuable insights into the impact of the Ice Age on the formation of the Great Lakes without the need to physically observe the events.
50.
When you try to access the Internet, you get error messages stating a "failure to connect." The first thing you should do is:
Correct Answer
C. Check that cables are correctly connected to the computer
Explanation
When you encounter a "failure to connect" error message while trying to access the Internet, the first thing you should do is check that cables are correctly connected to the computer. This is because a loose or improperly connected cable can cause connectivity issues and prevent you from accessing the Internet. By ensuring that the cables are securely connected, you can eliminate this potential cause of the problem and troubleshoot further if necessary.