1.
You just opened a savings account at a bank. Every week you are going to put part of your allowance into this account. You want to use the computer to keep track of the balance of the account. Which type of software program would you use to track your money in Excel?
Correct Answer
B. Spreadsheet
Explanation
You would use a spreadsheet software program to track your money in Excel. Spreadsheets are designed to organize and manipulate numerical data, making them ideal for tracking and calculating balances in accounts. With Excel, you can create formulas, input income and expenses, and easily update and track your savings account balance over time.
2.
Your best friend just moved across the country. You've promised to write at least once a week. If you decided NOT to mail him/her a letter but to type one up on your computer and electronically mail it to them, what type of network application would you use?
Correct Answer
B. Email
Explanation
If you decided to type up a letter on your computer and electronically mail it to your friend, the type of network application you would use is email. Email allows you to send messages and files electronically over the internet, making it a convenient and efficient way to communicate with someone who is far away.
3.
An application can only open a document if that document is in a format that is compatible with the application.
Correct Answer
A. True
Explanation
This statement is true because an application is designed to work with specific file formats. If a document is not in a format that is compatible with the application, the application will not be able to open or read the document correctly. Therefore, for successful opening and functioning of a document, it must be in a format that is supported by the application being used.
4.
File types of jpg, jpeg, bmp, gif, tiff and pict are formats for what type of file?
Correct Answer
C. GrapHics/pictures
Explanation
The file types jpg, jpeg, bmp, gif, tiff, and pict are commonly used for storing and displaying graphics and pictures. These formats are specifically designed to efficiently store and represent visual content, making them ideal for images. They are not typically used for spreadsheets, texts, or compressed files. Therefore, the correct answer is graphics/pictures.
5.
Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes.
Correct Answer
A. True
Explanation
Fair Use is a legal doctrine that allows for the limited use of copyrighted material without permission from the copyright owner. It is intended to promote the sharing of knowledge and ideas, particularly in educational settings. Students are allowed to cite ideas and quotations from copyrighted works as long as it is for educational purposes and meets the criteria of Fair Use, such as being transformative, limited in scope, and not negatively impacting the market for the original work. Therefore, the statement that Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes is true.
6.
You must get written permission from the copyright owner before using someone else's work in your own product.
Correct Answer
A. True
Explanation
This statement is true because using someone else's work without their permission is a violation of copyright law. Copyright gives the owner exclusive rights to reproduce, distribute, and display their work. In order to use someone else's work legally, you must obtain written permission from the copyright owner, unless your use falls under fair use or another exception to copyright law.
7.
Plagiarizing is using someone else's work and is illegal and can result in penalties at school and at work.
Correct Answer
A. True
Explanation
Plagiarizing refers to the act of using someone else's work without giving them proper credit. It is considered illegal and unethical as it violates copyright laws and intellectual property rights. Plagiarism can have serious consequences, including penalties at school and work. Therefore, the statement that plagiarizing is illegal and can result in penalties at school and work is true.
8.
Online chats are private communications between you and the person you are talking with.
Correct Answer
B. False
Explanation
Online chats are not always private communications between you and the person you are talking with. Depending on the platform or service being used, online chats can be monitored or accessed by third parties, such as the platform administrators or law enforcement agencies. Additionally, there is always a risk of someone intercepting or hacking into the chat, compromising its privacy. Therefore, it is important to be cautious and mindful of the potential lack of privacy in online chats.
9.
What type of network application uses video cameras, microphones and other items to allow people in different locations to hold meetings in which they can see and hear one another?
Correct Answer
A. Videoconferencing
Explanation
Videoconferencing is the correct answer because it is a type of network application that utilizes video cameras, microphones, and other devices to enable individuals in different locations to hold meetings where they can see and hear each other. This technology allows for real-time communication and collaboration, making it possible for people to have virtual face-to-face interactions despite being physically separated.
10.
.COM is the most popular and desirable extension for domain names.
Correct Answer
A. True
Explanation
".COM" is indeed the most popular and desirable extension for domain names. This is because it is the original and most widely recognized top-level domain (TLD) on the internet. It is commonly associated with commercial websites and has become synonymous with businesses and organizations. Additionally, it is easier for users to remember and type ".COM" compared to other TLDs. As a result, many individuals and businesses prefer to have a ".COM" domain name for their website.
11.
.ORG is reserved for chartered nonprofit organizations, such as trade associations and charities.
Correct Answer
A. True
Explanation
The .ORG domain extension is specifically reserved for chartered nonprofit organizations, including trade associations and charities. This means that only these types of organizations are eligible to register a domain name with the .ORG extension. Therefore, the statement "True" is correct as it accurately reflects the purpose and eligibility criteria for the .ORG domain.
12.
Which domain extension is reserved for degree granting academic institutions?
Correct Answer
D. .edu
Explanation
The domain extension .edu is reserved for degree-granting academic institutions. This extension is specifically designated for educational institutions such as universities, colleges, and research institutions. It helps to identify and differentiate these institutions from other types of websites.
13.
Which domain extension is commonly used for small businesses?
Correct Answer
C. .biz
Explanation
The domain extension .biz is commonly used for small businesses. It is a top-level domain (TLD) specifically designed for businesses and is often chosen by small businesses to establish their online presence. The .biz extension is short, easy to remember, and signifies that the website belongs to a business. It is a popular choice for small businesses looking for a professional and recognizable domain name.
14.
Which domain extension is specifically designed for personal use and is commonly used for easy to remember e-mail addresses and personal web sites that display photos or personal information about an individual.
Correct Answer
A. .name
Explanation
The .name domain extension is specifically designed for personal use and is commonly used for easy to remember e-mail addresses and personal websites that display photos or personal information about an individual. It is a suitable choice for individuals who want to create a personal online presence and showcase their personal information or portfolio.
15.
Which area of the computer is the "brain" of the computer and controls the rest of the computer?
Correct Answer
A. Cpu
Explanation
The CPU (Central Processing Unit) is often referred to as the "brain" of the computer because it is responsible for executing instructions and performing calculations. It controls the operations of the entire computer system, including coordinating input and output devices, managing memory, and processing data. The CPU is where most of the computing tasks take place, making it the central component that controls and directs the operations of the rest of the computer.
16.
What part of the computer is contained on a large electronic chip that is plugged into the motherboard?
Correct Answer
D. Cpu
Explanation
The CPU, or Central Processing Unit, is the part of the computer that is contained on a large electronic chip and is plugged into the motherboard. It is often referred to as the "brain" of the computer, as it carries out most of the computer's processing tasks. The CPU is responsible for executing instructions, performing calculations, and managing the flow of data within the computer system.
17.
What type of hardware are the following devices: printers, monitors, speakers and sometimes scanners?
Correct Answer
A. Output
Explanation
Printers, monitors, speakers, and sometimes scanners are all examples of output devices. Output devices are hardware components that display or present information from a computer system to the user. They take data from the computer and convert it into a form that can be easily understood or interpreted by humans. In this case, printers produce hard copies of documents, monitors display visual information, and speakers produce audio output. Scanners can also be considered output devices when they are used to display or present scanned documents or images.
18.
What type of hardware are the following devices: keyboards, mouse devices, microphones, scanners, digital cameras, and video cameras?
Correct Answer
A. Input
Explanation
The devices mentioned in the question, such as keyboards, mouse devices, microphones, scanners, digital cameras, and video cameras, are all examples of input hardware. Input hardware refers to devices that allow users to input data or commands into a computer system. These devices enable users to interact with the computer and provide input in the form of text, audio, images, or video, which the computer then processes and responds to accordingly.
19.
What type of hardware are the following devices: hard disk drives, floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives?
Correct Answer
D. Storage
Explanation
The devices mentioned in the question, such as hard disk drives, floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives, are all types of storage hardware. They are used to store and retrieve data, whether it is permanently stored like in hard disk drives or removable like in floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives. These devices play a crucial role in storing and accessing data on computers and other electronic devices.
20.
Modems allow data to be sent and received over ordinary telephone lines.
Correct Answer
A. True
Explanation
Modems are devices that enable computers to transmit and receive data over ordinary telephone lines. They convert digital data from the computer into analog signals that can be transmitted through the telephone lines, and then convert the analog signals back into digital data at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure. Therefore, the statement that modems allow data to be sent and received over ordinary telephone lines is true.
21.
A wiki is a sort of blog that holds information from a group of people that can then be accessed by all members so that they can all have the same information instead of emailing back and forth.
Correct Answer
A. True
Explanation
A wiki is a collaborative website that allows multiple users to contribute and edit content. It serves as a platform for sharing information and knowledge among a group of people. Unlike traditional methods like emailing, a wiki provides a centralized and accessible source of information for all members. Therefore, the statement that a wiki holds information from a group of people that can be accessed by all members is true.
22.
Wikipedia is an online encyclopedia that gathers information from users worldwide but some information could be false, so you must read it and use it cautiously.
Correct Answer
A. True
Explanation
The statement is true because Wikipedia is an online encyclopedia that relies on user-generated content. While it is a valuable source of information, it is important to exercise caution because anyone can contribute to it, and there is a possibility of false or misleading information. Therefore, it is necessary to read and verify the information obtained from Wikipedia before using it as a reliable source.
23.
Social media and networking allows people to have more virtual friends from all over the world.
Correct Answer
A. True
Explanation
Social media and networking platforms provide individuals with the opportunity to connect and interact with people from different parts of the world. These platforms enable users to make virtual friends, expanding their social circles beyond geographical boundaries. Through social media, people can engage in conversations, share experiences, and build relationships with individuals they may not have had the chance to meet in person. Therefore, the statement that social media and networking allow people to have more virtual friends from all over the world is true.
24.
Facebook and MySpace are examples of social networking sites.
Correct Answer
A. True
Explanation
Facebook and MySpace are indeed examples of social networking sites. Both platforms allow users to create profiles, connect with friends, share content, and engage in online communities. They provide a space for individuals to interact, communicate, and share information with others, making them prime examples of social networking sites.
25.
After reviewing the screenshot above, which letter (A, B, C, or D) is pointing to the Zoom Slider on the Word Screen?
Correct Answer
D. D
Explanation
Based on the screenshot provided, the letter D is pointing to the Zoom Slider on the Word Screen. The Zoom Slider is a tool that allows users to adjust the zoom level of the document, making it larger or smaller for easier viewing.
26.
After reviewing the screenshot above, which letter (A,B,C,or D) is pointing to the Status Bar?
Correct Answer
C. C
Explanation
Based on the screenshot provided, letter C is pointing to the Status Bar. The Status Bar is typically located at the bottom of the screen and displays important information such as the time, battery level, network connection, and notifications.
27.
The header of a document will be seen at the top of a document and is constant on every page.
Correct Answer
A. True
Explanation
The statement is true because the header of a document is a section that appears at the top of every page consistently. It typically contains information such as the document title, author, date, and page numbers. This allows readers to easily identify the document and navigate through its pages. By remaining constant on every page, the header provides continuity and helps maintain a professional and organized appearance for the document.
28.
Watermarks show up in the back of the text of a document and are shown to tell the owner of a document about special instructions in handling of the document.
Correct Answer
A. True
Explanation
Watermarks are indeed used in documents to convey special instructions or information to the owner or recipient. They typically appear as a faint, translucent image or text in the background of the document. This can include instructions such as "Confidential," "Draft," or "Do Not Copy." Watermarks serve as a visual reminder or warning, ensuring that the document is handled appropriately and according to the specified instructions. Therefore, the statement "Watermarks show up in the back of the text of a document and are shown to tell the owner of a document about special instructions in handling of the document" is true.
29.
Bullets and numbers are used to show "lists" of things and can be changed to just about any symbol.
Correct Answer
A. True
Explanation
Bullets and numbers are commonly used to present lists of things, but they are not limited to just these symbols. They can be replaced with any other symbol or even customized according to personal preference. Therefore, the statement is true.
30.
The "dog" used in text wrapping allows you to resize and move the picture around the document so it can be used in any way you need to use it.
Correct Answer
A. True
Explanation
The "dog" used in text wrapping refers to a feature in document editing software that allows users to resize and reposition an image within the document. This feature is useful as it provides flexibility in using the picture according to the user's needs. Therefore, the statement is correct, stating that the "dog" used in text wrapping allows resizing and moving the picture around the document for versatile usage.
31.
The INSERT ribbon in Microsoft Word allows you to insert tables, pictures, headers and footers.
Correct Answer
A. True
Explanation
The INSERT ribbon in Microsoft Word provides users with the ability to add various elements to their documents, such as tables, pictures, headers, and footers. This allows for enhanced customization and organization of the document's content. Therefore, the statement "True" accurately describes the functionality of the INSERT ribbon in Microsoft Word.
32.
The two most common types of Operating Systems (OS) are windows and mac.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that Windows and Mac are indeed the two most common types of operating systems. Windows is a widely used operating system developed by Microsoft, while Mac is the operating system developed by Apple for their Macintosh computers. These two operating systems dominate the market and are used by a majority of computer users, making the statement true.
33.
Phishing is internal fraud in the form of emails or pop-up messages to lure users into providing usernames, passwords, and personal information
Correct Answer
A. True
Explanation
Phishing refers to a type of internal fraud where scammers use deceptive emails or pop-up messages to trick users into revealing sensitive information such as usernames, passwords, and personal details. This is done with the intention of using this information for malicious purposes, such as identity theft or financial fraud. Therefore, the statement that phishing is internal fraud in the form of emails or pop-up messages to lure users into providing personal information is true.
34.
A DVD can be used to record music and not movies.
Correct Answer
B. False
Explanation
A DVD can be used to record both music and movies. DVDs have the capability to store large amounts of data, including audio and video files. Therefore, it is incorrect to say that a DVD can only be used to record music and not movies.
35.
What is an error in a computer’s program (or software) called?
Correct Answer
A. Bug
Explanation
An error in a computer's program or software is commonly referred to as a bug. This term originated from the early days of computing when an actual insect caused a malfunction in a computer system. Nowadays, a bug refers to a flaw or mistake in the code that leads to unexpected behavior or crashes in the software. Debugging is the process of identifying and fixing these bugs to ensure the program runs smoothly.
36.
The Motherboard stores data temporarily during processing.
Correct Answer
B. False
Explanation
The motherboard does not store data temporarily during processing. The motherboard is responsible for connecting all the components of a computer system, including the CPU, memory, storage devices, and peripherals. It provides the communication pathways for these components to interact with each other. However, the actual storage of data during processing is done by the computer's memory, such as RAM (Random Access Memory), not the motherboard itself. Therefore, the statement is false.