1.
When using ______ software such as Word, you can easily create and edit documents, such as letters and reports.
Correct Answer
D. Word processing
Explanation
Word processing software, such as Word, allows users to create and edit documents like letters and reports. This software provides various features and tools specifically designed for creating and formatting text-based documents. It offers functionalities like spell check, grammar check, formatting options, and the ability to insert images and tables. With word processing software, users can easily type, edit, format, and save their documents, making it a suitable choice for creating and managing written content.
2.
Pressing the Delete key erases the character to the left of the insertion point.
Correct Answer
B. False
Explanation
Pressing the Delete key does not erase the character to the left of the insertion point. In fact, it erases the character to the right of the insertion point. This is a common feature in most text editing software and word processors.
3.
The _____ command lets you save a file with a new name or a new location.
Correct Answer
B. Save As
Explanation
The "Save As" command allows the user to save a file with a new name or at a different location. This command is useful when the user wants to create a copy of the file or save it in a different format without overwriting the original file. It provides flexibility and options for organizing and managing files effectively.
4.
The "title bar" is located at the top of the window and identifies the window as a MS Word document.
Correct Answer
A. True
Explanation
The statement is true because the title bar is indeed located at the top of the window in MS Word. It typically displays the name of the document or application, allowing users to easily identify and switch between different windows or documents that are open.
5.
The data you give your computer to work with is called:
Correct Answer
B. Input
Explanation
The data that is given to a computer for it to work with is called "input". Input refers to the information or commands that are entered into a computer system through devices such as keyboards, mice, or touchscreens. This data is then processed by the computer's CPU (Central Processing Unit) and the result is displayed or produced as output.
6.
The brain of the computer is called the:
Correct Answer
D. CPU
Explanation
The brain of the computer is called the CPU, which stands for Central Processing Unit. The CPU is responsible for executing instructions and performing calculations in a computer. It acts as the control center of the computer, processing and coordinating all the activities of the computer's hardware and software components. Without the CPU, a computer would not be able to perform any tasks or operations.
7.
Graphics are designs and pictures created and used by a computer.
Correct Answer
A. True
Explanation
Graphics are indeed designs and pictures that are created and utilized by a computer. They can include various forms of visual elements such as illustrations, photographs, charts, graphs, and animations. These graphics are generated and manipulated using software programs and can be displayed on computer screens, printed on paper, or projected onto other surfaces. Therefore, the statement "Graphics are designs and pictures created and used by a computer" is accurate and true.
8.
Which command do you use to save a file for the first time?
Correct Answer
D. Save As
Explanation
When saving a file for the first time, the "Save As" command is used. This command allows the user to specify the file name and location where the file will be saved. It is different from the regular "Save" command because it prompts the user to choose a name and location, whereas the "Save" command typically just updates the existing file without any prompts. Therefore, "Save As" is the correct command to use when saving a file for the first time.
9.
A red, wavy underline in a document means a possible spelling error.
Correct Answer
A. True
Explanation
A red, wavy underline in a document indicates a possible spelling error. This feature is commonly used in word processing software to help users identify and correct spelling mistakes.
10.
Which of the following is considered a good keyboarding technique?
Correct Answer
D. All of the above
Explanation
A good keyboarding technique involves using curved fingers to reach the keys, as it allows for better accuracy and speed. Keeping the wrists straight while typing helps prevent strain and injuries such as carpal tunnel syndrome. Additionally, having the feet flat on the floor promotes good posture and reduces the risk of back or leg discomfort. Therefore, all of the given options are considered good keyboarding techniques.
11.
A hand-held input device that controls the insertion point location is ______.
Correct Answer
B. A mouse
Explanation
A hand-held input device that controls the insertion point location is a mouse. A mouse is a common peripheral device used to move the cursor on a computer screen and select or interact with objects on the screen. It allows users to navigate through graphical user interfaces and provides a more precise and intuitive way of controlling the insertion point or cursor position compared to other input devices like the keyboard or a modem. The CRT (Cathode Ray Tube) is a display technology and not an input device.
12.
The delete key erases text to the right of the insertion point?
Correct Answer
A. True
Explanation
The delete key is used to remove or erase text to the right of the insertion point. When the delete key is pressed, it deletes the character or text immediately to the right of the cursor or insertion point. Therefore, the given answer "True" is correct.
13.
Word processing is the use of computer software to enter and edit text.
Correct Answer
A. True
Explanation
Word processing refers to the use of computer software to enter and edit text. This involves tasks such as typing, formatting, spell checking, and manipulating text in various ways. Therefore, the statement "Word processing is the use of computer software to enter and edit text" is true.
14.
The keys for the "Home Row" are
Correct Answer
B. Asdfjkl;
Explanation
The given answer "asdfjkl;" is correct because these keys are located in the middle row of a standard QWERTY keyboard and are commonly referred to as the "Home Row." Placing the fingers on these keys allows for a balanced and ergonomic hand position while typing.
15.
"Desktop" is a computer term that refers to:
Correct Answer
A. The first screen showing icons for folders, files, and applications.
Explanation
The term "Desktop" in the context of computers refers to the first screen that appears after logging in, which displays icons for folders, files, and applications. It is the main interface where users can access and organize their files and applications.
16.
The Maximize button is used to:
Correct Answer
B. Expand a window to fill the entire screen.
Explanation
The Maximize button is used to expand a window to fill the entire screen. This allows the user to view the content of the window in a larger size and utilize the full screen space. It is useful when working with applications or documents that require more screen real estate and can improve productivity by providing a larger workspace.
17.
In software applications such as Microsoft Word, what is a document called?
Correct Answer
C. File
Explanation
In software applications such as Microsoft Word, a document is typically referred to as a "file". This is because a document in such applications is saved as a separate entity with a specific file extension (e.g., .docx for Word documents). The term "file" is commonly used to describe any digital document or collection of data that is stored on a computer or other electronic device.
18.
Any computer parts that you can actually touch are considered to be:
Correct Answer
C. Hardware
Explanation
Hardware refers to the physical components of a computer that can be touched and seen. This includes devices such as the motherboard, CPU, memory, storage devices, input/output devices, and peripherals. Unlike software, which refers to the programs and instructions that run on the hardware, hardware is tangible and can be physically manipulated or replaced. Therefore, any computer parts that can be touched are considered hardware.
19.
The term ____________ refers to the set of instructions that tells the hardware in a computer what to do.
Correct Answer
B. Software
Explanation
Software refers to the set of instructions that tells the hardware in a computer what to do. It includes programs, applications, and operating systems that enable the computer to perform specific tasks and functions. Without software, the hardware would be useless as it wouldn't know how to execute commands or process data. Therefore, software plays a crucial role in instructing and controlling the hardware components of a computer system.
20.
What type of device is a flash drive?
Correct Answer
C. Storage
Explanation
A flash drive is a type of storage device. It is used to store and transfer digital data such as files, documents, photos, and videos. It is a portable and compact device that uses flash memory to store data. Flash drives are commonly used to backup and transfer data between different devices, such as computers, laptops, and even smartphones. They are popular due to their small size, high storage capacity, and ease of use.
21.
An unwanted program running on a computer is called a
Correct Answer
C. Virus
Explanation
An unwanted program running on a computer is called a virus. Viruses are malicious software programs that can replicate themselves and spread to other computers. They can cause various harmful effects, such as corrupting files, stealing personal information, and disrupting the normal functioning of a computer system. Therefore, it is important to have antivirus software installed and regularly updated to protect against these threats.
22.
How can you be safe when online?
Correct Answer
C. Only open e-mails from people you know
Explanation
Opening emails only from people you know is a safe practice when online because it helps to prevent falling victim to phishing scams or malicious attachments. Cybercriminals often send emails posing as familiar contacts to trick users into clicking on links or downloading harmful files. By only opening emails from trusted individuals, you reduce the risk of exposing your computer or personal information to potential threats. It is important to exercise caution and avoid opening emails from unknown sources to maintain online safety.
23.
When is it OK to use emoticons?
Correct Answer
B. In e-mails to friends
Explanation
It is okay to use emoticons in e-mails to friends because e-mails are generally more informal and personal compared to other forms of communication. Emoticons can help convey emotions and add a friendly tone to the message, making it more engaging and relatable for the recipient. However, using emoticons in formal contexts like book reports for school, letters to the principal, or essays for homework is generally not appropriate as these require a more professional and serious tone.
24.
Which is a piece of personal information?
Correct Answer
B. Your home address
Explanation
A piece of personal information is specific information that identifies an individual. In this case, "your home address" is a piece of personal information because it is unique to each person and can be used to locate and identify them. The other options, such as "the temperature outside," "the number of students at a dance," and "the bank on the corner," are not personal information as they do not directly relate to an individual's identity or location.
25.
Which would make the best password?
Correct Answer
D. C4lifoRn12
Explanation
The password "c4lifoRn12" would make the best password because it is a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more secure and harder to guess or crack compared to the other options. The use of a combination of different characters adds complexity to the password, making it more difficult for hackers to gain unauthorized access.