1.
Which of the following computer components is considered an output device?
Correct Answer
A. Printer
Explanation
An output device is a peripheral device that receives information from a computer and displays or prints it. The printer is considered an output device because it receives data from the computer and produces a physical copy of that information on paper. The keyboard, mouse, and joystick are all input devices as they allow the user to input data into the computer.
2.
Which of the following is NOT part of the computer's hardware?
Correct Answer
D. Microsoft Excel
3.
Which computer application would you use to type a research paper?
Correct Answer
C. Microsoft Word
Explanation
Microsoft Word is the correct answer because it is a word processing application specifically designed for creating, editing, and formatting documents, including research papers. Microsoft Excel is a spreadsheet application used for data analysis and calculations, not for typing documents. Microsoft PowerPoint is a presentation software used for creating slideshows, not for typing research papers. Microsoft Outlook is an email and calendar application, not for typing research papers.
4.
How do you shut down the Apple computer in class?
Correct Answer
A. Select the shut down choice in the apple menu
Explanation
To shut down an Apple computer, the correct method is to select the shut down choice in the Apple menu. This option can be found in the top left corner of the screen, represented by the Apple logo. By selecting this option, the computer will go through the proper shutdown process, closing all applications and saving any necessary data before powering off. Pulling out the plug or pressing the power button directly can lead to improper shutdown and potential data loss. Selecting "close all windows in Safari" is unrelated to shutting down the computer.
5.
The name for when you send a file along with an email message:
Correct Answer
B. Attachment
Explanation
When you send a file along with an email message, it is referred to as an attachment. An attachment allows you to include additional files such as documents, images, or videos within the email. These attachments can be downloaded and opened by the recipient, providing them with the necessary files or information.
6.
If you wanted to make a word in your document look heavier and darker, you would highlight it and select which of the following options:
Correct Answer
C. Bold
Explanation
To make a word in a document look heavier and darker, you would select the "bold" option. This option increases the thickness and darkness of the selected text, making it stand out more prominently in the document. It is commonly used to emphasize important words or headings.
7.
A link to a web page, web resource, or offline resource stored in a web browser so that the user can return to the resource easily:
Correct Answer
A. Bookmark
Explanation
A bookmark is a link to a web page or resource that is stored in a web browser for easy access. It allows the user to quickly return to the resource without having to search for it again. By clicking on the bookmark, the user is directed back to the specific web page or resource they have saved.
8.
This part of the computer is responsible for interpreting data and controlling the operation of the computer. It is called the "brain" of the computer.
Correct Answer
D. Central Processing Unit (CPU)
Explanation
The central processing unit (CPU) is responsible for interpreting data and controlling the operation of the computer. It is often referred to as the "brain" of the computer because it performs all the necessary calculations and instructions to execute tasks. RAM and ROM are types of memory that store data, but they do not interpret or control the operation of the computer. An internet service provider (ISP) is a company that provides internet access, which is not related to interpreting data or controlling the computer's operation. Therefore, the correct answer is the Central Processing Unit (CPU).
9.
The system software that controls the computer is called:
Correct Answer
A. Operating System
Explanation
The correct answer is Operating System. The operating system is a type of system software that manages and controls the computer's hardware and software resources. It provides a user-friendly interface, manages memory and storage, coordinates the execution of programs, and allows communication between hardware devices and software applications. It is an essential component of a computer system that enables users to interact with the computer and run various applications.
10.
Specific instructions for a computer, either typed in on a keyboard or accessed through menus and toolbars:
Correct Answer
B. Commands
Explanation
The term "commands" refers to specific instructions given to a computer, either through typing on a keyboard or accessing menus and toolbars. This term accurately describes the action of directing the computer to perform a specific task or function. It implies a level of control and authority over the computer's actions, making it the most suitable answer among the given options.
11.
Which computer command would you use to copy a selected item to paste it elsewhere without removing that item from its original location?
Correct Answer
C. Copy
Explanation
The correct answer is "Copy." This command allows you to duplicate a selected item and place it elsewhere without removing it from its original location. It creates a copy of the item that can be pasted multiple times in different locations.
12.
The legal right that protects people who create works from having their creations used and distributed without their permission:
Correct Answer
A. Copyright
Explanation
Copyright is the legal right that protects people who create works from having their creations used and distributed without their permission. This means that the original creators have the exclusive right to reproduce, distribute, display, and perform their work, as well as create derivative works based on it. It gives creators the ability to control how their work is used and to financially benefit from it.
13.
A computer command that removes a selected item from a document for placement elsewhere (pasting)
Correct Answer
C. Cut
Explanation
Cut is the correct answer because it refers to a computer command that removes a selected item from a document. When you cut something, it is temporarily stored in the clipboard, allowing you to paste it elsewhere. This command is commonly used to move text or images from one location to another within a document or between different documents.
14.
This program menu includes commands that allow you to change information within a document, like Cut, Copy, and Paste.
Correct Answer
D. Edit
Explanation
The correct answer is "Edit" because the given program menu includes commands that allow you to change information within a document, such as Cut, Copy, and Paste. The "Edit" option is the most appropriate choice as it encompasses these actions and is commonly used in software applications to refer to the manipulation of content within a file.
15.
This program menu holds commands and options for files, like New, Open, Close, Save and Print.
Correct Answer
A. File
Explanation
The given correct answer is "File" because the program menu mentioned in the question holds commands and options for files such as New, Open, Close, Save, and Print. The "File" option is typically found in program menus and is used to access file-related functions and operations.
16.
What is the name of the writing style used in school for all ELA papers?
Correct Answer
D. MLA
Explanation
The correct answer is MLA. MLA stands for Modern Language Association, which is a commonly used writing style for academic papers in the field of English Language Arts (ELA). It provides guidelines for formatting, citing sources, and organizing the content of the paper. Using MLA style helps ensure consistency and credibility in academic writing.
17.
A scanner allows you to:
Correct Answer
A. Copy an image into your computer
Explanation
A scanner allows you to copy an image into your computer by scanning a physical document or picture and converting it into a digital file format. This digital file can then be saved, edited, and shared electronically. Scanners are commonly used for tasks such as scanning photographs, documents, and artwork to create digital copies or for archiving purposes.
18.
If you wanted to add a picture to your document, which menu would you choose?
Correct Answer
C. Insert
Explanation
To add a picture to a document, you would choose the "Insert" menu. This menu typically contains options for adding various types of content, such as images, tables, charts, and shapes. By selecting the "Insert" menu, you can easily navigate to the option for inserting a picture and then choose the desired image file to add it to your document.
19.
Text at the top of a printed document that includes your last name and page number:
Correct Answer
A. Header
Explanation
The correct answer is "header" because the text at the top of a printed document that includes your last name and page number is commonly referred to as the header. The header is typically used to provide important information such as the document title, author name, date, and page numbers to help readers navigate through the document easily.
20.
Small images on the screen that represent programs or tools available on the computer:
Correct Answer
B. Icons
Explanation
Icons are small images on the screen that represent programs or tools available on the computer. They are graphical representations that users can click on to open or access specific applications or functions. Icons are commonly used in graphical user interfaces (GUI) to provide a visual representation of different software or features, making it easier for users to navigate and interact with the computer system.
21.
The world-wide collection of networks that communicate with each other; contains resources that make up the World Wide Web:
Correct Answer
C. Internet
Explanation
The correct answer is internet. The internet is a global network of interconnected computers and networks that communicate with each other. It contains resources that make up the World Wide Web, which includes websites, web pages, and other online content. The internet allows for the exchange of information, communication, and access to various services and resources from anywhere in the world.
22.
A window control that hides a window without closing it:
Correct Answer
B. Minimize button
Explanation
The minimize button is a window control that hides a window without closing it. When clicked, it reduces the window to a smaller size and removes it from the desktop, but the window remains open in the taskbar or dock. This allows the user to quickly access and restore the window whenever needed without having to close and reopen it.
23.
Taking someone's words or ideas and using them as if they were your own. This is a violation of copyright.
Correct Answer
C. Plagiarism
Explanation
Plagiarism refers to the act of taking someone's words or ideas and presenting them as your own. This is a violation of copyright, as it involves copying and using someone else's work without giving them proper credit. It is considered unethical and can have serious consequences in academic and professional settings.
24.
Which of the following is a page orientation option?
Correct Answer
C. Both a & b
Explanation
Both "Landscape" and "Portrait" are page orientation options. "Landscape" refers to a horizontal orientation where the width of the page is greater than its height, while "Portrait" refers to a vertical orientation where the height is greater than the width. Both options are commonly used in various documents and allow for different layout and formatting possibilities.
25.
Memory that can be read and written to and is considered short-term memory:
Correct Answer
A. RAM - Random Access Memory
Explanation
RAM, or Random Access Memory, is a type of memory that allows data to be both read from and written to. It is considered short-term memory because it is volatile, meaning that its contents are lost when the power is turned off. RAM is used by computers to store data that is actively being processed by the CPU, allowing for fast access and retrieval of information. Unlike ROM, which is read-only and cannot be written to, RAM provides a temporary storage solution for data that needs to be quickly accessed and modified by the computer.
26.
The application used to create a presentation:
Correct Answer
C. Power Point
Explanation
Power Point is the correct answer because it is a widely used application specifically designed for creating presentations. Excel is primarily used for creating spreadsheets and performing calculations, Word is used for creating documents, and Outlook is an email client. Therefore, Power Point is the most suitable application for creating presentations among the given options.
27.
The application used that allows the user to create and edit tables and graphs:
Correct Answer
A. Excel
Explanation
Excel is the correct answer because it is a widely used application that allows users to create and edit tables and graphs. It is a spreadsheet program that offers various features for data analysis and visualization. With Excel, users can input data into cells, perform calculations, create charts and graphs, and format the data to present it in a visually appealing manner. It is commonly used in business, finance, and other fields where data manipulation and analysis are required.
28.
When using MLA format, what type of spacing do you use?
Correct Answer
C. Double
Explanation
When using MLA format, double spacing is used. This means that there should be a full blank line between each line of text. This spacing is applied to the entire document, including the text, headings, and references. Double spacing helps to improve readability and makes it easier for readers to distinguish between different lines of text. It also allows for ample space for comments, annotations, and corrections to be made on the document.
29.
What does a file's extension (.txt) tell you?
Correct Answer
A. What type of file it is
Explanation
A file's extension (.txt) tells you the type of file it is. The extension indicates the file format or the program it is associated with. In this case, the .txt extension indicates that the file is a text file.
30.
How does computer piracy affect all of us?
Correct Answer
B. It increases the cost of technology
Explanation
Computer piracy refers to the unauthorized copying, distribution, or use of copyrighted software or digital content. When piracy occurs, software developers and content creators lose revenue, which ultimately leads to an increase in the cost of technology. To compensate for the financial losses caused by piracy, companies may raise the prices of their products or invest less in research and development. This, in turn, affects all of us as consumers, as we end up paying higher prices for technology products and may have limited access to new and innovative technologies.
31.
Which is an example of improper use of an online chat room?
Correct Answer
C. Posting gossip about a classmate
Explanation
Posting gossip about a classmate is an example of improper use of an online chat room because it involves spreading rumors and negative information about someone without their consent. Gossip can be harmful and hurtful, leading to bullying or damaging someone's reputation. Online chat rooms should be used for positive and constructive purposes, such as forming study groups or asking about missed classes. Planning a surprise party is also unrelated to the purpose of an online chat room but is not necessarily improper or harmful.
32.
What size font do you use for MLA format?
Correct Answer
B. 12
Explanation
In MLA format, the recommended font size is 12. This is because 12-point font is considered to be the standard size for academic writing and is widely accepted by most professors and institutions. Using a larger font size, such as 14 or 18, may result in excessive spacing and make the document appear unprofessional. On the other hand, using a smaller font size, such as 10, may make the text difficult to read and strain the reader's eyes. Therefore, 12-point font is the most appropriate choice for MLA format.
33.
The style of writing (font choice) in the MLA format is:
Correct Answer
C. Cambria
Explanation
The style of writing (font choice) in the MLA format is Cambria. MLA (Modern Language Association) format is commonly used for writing papers and citing sources in the humanities. Cambria is a serif font that is recommended for use in MLA format because it is clear, readable, and professional-looking. It is important to use a consistent and appropriate font in academic writing to ensure readability and adherence to formatting guidelines.
34.
The proper width of a margin in the MLA format is:
Correct Answer
B. 1 inch
Explanation
The proper width of a margin in the MLA format is 1 inch. This is the standard requirement for MLA formatting, as specified by the Modern Language Association. The 1-inch margin ensures that there is enough white space around the text, allowing for easy readability and a professional appearance. It also leaves room for annotations or comments to be added on the sides of the page if needed.
35.
How do you save a Word document?
Correct Answer
A. Select File then SAVE AS
Explanation
To save a Word document, you need to select the "File" option from the toolbar and then choose "Save As." This allows you to specify the file name, location, and format for the document. Simply selecting "Save" will save the document with its existing name and format, while selecting the file icon on the toolbar may not necessarily save the document but rather open a file explorer window. Lastly, selecting "File" then "Share" is a different action that involves sharing the document with others, not saving it.
36.
Spreading gossip through e-mail, text messaging, or social networking sites is an example of cyberbullying.
Correct Answer
A. True
Explanation
Spreading gossip through electronic means such as e-mail, text messaging, or social networking sites can be considered as cyberbullying because it involves using technology to harm, harass, or intimidate others. This behavior can cause emotional distress and damage to the reputation of the person being targeted. Cyberbullying has become increasingly prevalent with the rise of digital communication platforms, making it important to address and prevent this form of harassment.
37.
It is o.k. to give out private information on-line.
Correct Answer
B. False
Explanation
Giving out private information online is not okay because it can lead to various risks such as identity theft, fraud, and invasion of privacy. It is important to protect personal information and only share it with trusted sources or when necessary.
38.
It is a good idea to use your first and last name as a username.
Correct Answer
B. False
Explanation
Using your first and last name as a username may not be a good idea for several reasons. Firstly, it can make it easier for others to identify and track you online, potentially compromising your privacy and security. Secondly, using personal information as a username can make it easier for hackers to guess your login credentials. It is generally recommended to create unique and complex usernames that do not reveal personal information.
39.
A cell is an individual box that is found at the intersection of a row and column in a spreadsheet.
Correct Answer
A. True
Explanation
The given statement is true because in a spreadsheet, a cell is indeed an individual box that is located at the intersection of a row and column. Each cell can contain data, formulas, or functions, and they are used to organize and manipulate information in a structured manner.
40.
Sorting is a function that arranges records by one or more fields in a particular order, such as alphabetically or numerically, ascending or descending.
Correct Answer
A. True
Explanation
Sorting is indeed a function that arranges records by one or more fields in a specific order. It can organize data in ascending or descending order based on various criteria, such as alphabetically or numerically. Therefore, the given answer, "True," is correct.