Top Banner
VOCAT REVIEW Stole it Straight from Wilkes County
23
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Stole it Straight from Wilkes County. Questions from 1.01.

VOCAT REVIEW

Stole it Straight from Wilkes County

Page 2: Stole it Straight from Wilkes County. Questions from 1.01.

Questions from 1.01

Page 3: Stole it Straight from Wilkes County. Questions from 1.01.

Question 1

Software packages used to create financial statements using mathematical calculations are:  Word processing.   Electronic Spreadsheet.   Database  Computer graphics.

Page 4: Stole it Straight from Wilkes County. Questions from 1.01.

Question 2

Information that leaves the computer is called:  Programs.   Input.   Graphics.   Output.

Page 5: Stole it Straight from Wilkes County. Questions from 1.01.

Question 3

What equipment is used like a copy machine to allow information to be input into the computer?  Light pen   Keyboard   Scanner   Mouse

Page 6: Stole it Straight from Wilkes County. Questions from 1.01.

Question 4

Data that appears on the monitor is called:  Language.   Softcopy.   Hardcopy.   Programs.

Page 7: Stole it Straight from Wilkes County. Questions from 1.01.

Question 5

The components that make up a computer system are:  Programs.   Language.   Hardware.   Software.

Page 8: Stole it Straight from Wilkes County. Questions from 1.01.

Question 6

Which device is used to enter data into a computer?  Input device   Output device   Microprocessor   Storage

Page 9: Stole it Straight from Wilkes County. Questions from 1.01.

Question 7

The physical parts of a computer system are called:  Hardware.   Languages.   Applications.   Programs.

Page 10: Stole it Straight from Wilkes County. Questions from 1.01.

Objective 1.02

Page 11: Stole it Straight from Wilkes County. Questions from 1.01.

Question 8

What system software controls the computer operations?FormattingLanguageProgramSystem

Page 12: Stole it Straight from Wilkes County. Questions from 1.01.

Question 9

The operating system capability that permits more than one program to run simultaneously is called:  Multi-cycle.  Multi-purpose.  Multi-string.  Multitasking.

Page 13: Stole it Straight from Wilkes County. Questions from 1.01.

Question 10

The operating system functions do NOT include:  Managing input and output.  Providing user with a password.  Supervising other components.  Providing software and hardware

management.

Page 14: Stole it Straight from Wilkes County. Questions from 1.01.

Question 11

Which utility is used to locate and disinfect a virus?  Antiviral  Data compression  Data recover  Translator

Page 15: Stole it Straight from Wilkes County. Questions from 1.01.

Question 12

The acronym MS-DOS stands for:  Macintosh Disk Operating System.  Microsoft Disk Operating System.  Microsoft Operating System.  Microsoft Output System.

Page 16: Stole it Straight from Wilkes County. Questions from 1.01.

Questions for 1.03

Page 17: Stole it Straight from Wilkes County. Questions from 1.01.

Question 13

Which is NOT a characteristic of copyrighted software?  An individual or a business copyrights it.  It is given freely and it can be copied by

anyone.  Permission is needed in order to copy

software.  Programs are accompanied by supporting

documents.

Page 18: Stole it Straight from Wilkes County. Questions from 1.01.

Question 14

The technology used to scramble information so that only the sender and receiver can read the data is called:  Encryption.  Password.  Public domain.  Virus.

Page 19: Stole it Straight from Wilkes County. Questions from 1.01.

Question 15

To protect the computer from detecting a virus the user should install a/an:  Database program.  Spreadsheet program.  User password.  Anti-virus program.

Page 20: Stole it Straight from Wilkes County. Questions from 1.01.

Question 16

Which is a destructive computer code or virus that is designed to activate at a specific time?  Bomb  Hoax  Trojan horse  Worm

Page 21: Stole it Straight from Wilkes County. Questions from 1.01.

Question 17

Which is NOT a virus known to destroy or cause damage to computer files?  Bomb  Hacker  Trojan Horse  Worm

Page 22: Stole it Straight from Wilkes County. Questions from 1.01.

Question 18

Which software allows the user to pay a small fee after the trial period?  Copyrighted  Freeware  Public domain  Shareware

Page 23: Stole it Straight from Wilkes County. Questions from 1.01.

Question 19

Which is NOT considered a security measure? Backing up data regularly Giving your password to your friends Protecting data with an anti-viral program Protecting files with a password