Presentation is loading. Please wait.

Presentation is loading. Please wait.

Stole it Straight from Wilkes County. Questions from 1.01.

Similar presentations


Presentation on theme: "Stole it Straight from Wilkes County. Questions from 1.01."— Presentation transcript:

1 Stole it Straight from Wilkes County

2 Questions from 1.01

3 Question 1  Software packages used to create financial statements using mathematical calculations are: Word processing. Electronic Spreadsheet. Database Computer graphics.

4 Question 2  Information that leaves the computer is called: Programs. Input. Graphics. Output.

5 Question 3  What equipment is used like a copy machine to allow information to be input into the computer? Light pen Keyboard Scanner Mouse

6 Question 4  Data that appears on the monitor is called: Language. Softcopy. Hardcopy. Programs.

7 Question 5  The components that make up a computer system are: Programs. Language. Hardware. Software.

8 Question 6  Which device is used to enter data into a computer? Input device Output device Microprocessor Storage

9 Question 7  The physical parts of a computer system are called: Hardware. Languages. Applications. Programs.

10 Objective 1.02

11 Question 8  What system software controls the computer operations? Formatting Language Program System

12 Question 9  The operating system capability that permits more than one program to run simultaneously is called: Multi-cycle. Multi-purpose. Multi-string. Multitasking.

13 Question 10  The operating system functions do NOT include: Managing input and output. Providing user with a password. Supervising other components. Providing software and hardware management.

14 Question 11  Which utility is used to locate and disinfect a virus? Antiviral Data compression Data recover Translator

15 Question 12  The acronym MS-DOS stands for: Macintosh Disk Operating System. Microsoft Disk Operating System. Microsoft Operating System. Microsoft Output System.

16 Questions for 1.03

17 Question 13  Which is NOT a characteristic of copyrighted software? An individual or a business copyrights it. It is given freely and it can be copied by anyone. Permission is needed in order to copy software. Programs are accompanied by supporting documents.

18 Question 14  The technology used to scramble information so that only the sender and receiver can read the data is called: Encryption. Password. Public domain. Virus.

19 Question 15  To protect the computer from detecting a virus the user should install a/an: Database program. Spreadsheet program. User password. Anti-virus program.

20 Question 16  Which is a destructive computer code or virus that is designed to activate at a specific time? Bomb Hoax Trojan horse Worm

21 Question 17  Which is NOT a virus known to destroy or cause damage to computer files? Bomb Hacker Trojan Horse Worm

22 Question 18  Which software allows the user to pay a small fee after the trial period? Copyrighted Freeware Public domain Shareware

23 Question 19  Which is NOT considered a security measure? Backing up data regularly Giving your password to your friends Protecting data with an anti-viral program Protecting files with a password


Download ppt "Stole it Straight from Wilkes County. Questions from 1.01."

Similar presentations


Ads by Google