Академический Документы
Профессиональный Документы
Культура Документы
A. A. Offline
B. B. Online
C. C. Stand by
D. D. Logged off
Every day, you receive e-mail messages from unknown senders. What is the term
for this type of security threat?
A. Slander
B. Spoofing
C. Phishing
D. Spam
You use Microsoft Office Excel 2003 to create an expense sheet. Which tool can you use to view the
data in a graph?
A. AutoContentWizard
B. Chart Wizard
C. Budget Template Wizard
D. Clip Art gallery
Which device can you use to play games and listen to music?
Camcorder
Smartphone
Transistor radio
Web cam
CD player
Camcorder
Scanner
MP3 player
Which process can you use to save an audio recording on a recordable CD?
Converting
Streaming
Compressing
Copying
Which technology enables you to enter text into documents on a computer by using your voice?
Speech recognition
Speech synthesis
Audio streaming
Audio compression
You have a modem connected to your computer. You have installed an e-mail program on your computer. What do
you need in order to send an e-mail message?
Internet connection
Web cam
Printer
Personal digital assistant (PDA)
You want to view all the shared computers on the network.. Which of the following options in the
Start menu will you use?
Network
Default Programs
Computer
Connect To
You need to print a document that you created by using Microsoft Office Word 2007. Which tab will you use?
Insert
View
Page Layout
Home
What is the term for the block of on-screen buttons displayed in the following exhibit?
Ribbon
Groups
Your friend travels to various parts of the world.What will you use to have a real-time conversation with him?
Spreadsheet program
E-mail
Presentation program
Instant messenger
You create a presentation by using Microsoft Office PowerPoint 2007. In this presentation, you need to show a
comparison between your expenses in the current year and your expenses in the previous year. Which type of object
will you use to show the comparison?
Clip Art
AutoShape
Chart
Audio clip
Which type of online community can you use to create an online journal?
Blog
Bulletin board
Newsgroup
Chat group
You use a word processor to create and save a text-based document on your computer. What type of information is
the text in your document?
Operating system
Hardware
Data
Application
What is hardware?
An item of information
Instructions that make programs work
The physical parts of a computer
Rules designed to enable computers to connect with one another
Which two computer parts are used to connect a computer to a printer? Select two.
Modem
Sound card
Parallel port
Universal serial bus (USB) port
Graphics card
Which two pieces of information do you need in order to log on to your computer? Select two.
Office address
Office name
User name
Password
Home address
You store sensitive data on your computer. Therefore, you need to restrict access to this data by others who use your
computer. What will you do to restrict access?
You copy a magazine article and include it in your online article without obtaining permission from the magazine
publisher.
Plagiarism
Gambling
Slander
Libel
Flash memory
Film
Tape
Graphics card
You create a document by using Microsoft Office Word 2007. You want to place a title in the center of the page.
Which feature in can you use to do this?
Alignment
Font size
Font style
Spacing
Improves contrast
Improves brightness
Saves space
Enhances sound quality
You want to watch your friend’s soccer game but you are in another city. You log on to the Internet and visit the
Web site of a local news agency to watch the game live. Which Web video technology does the local news agency
use?
What process does the operating system perform in order to confirm your logon information?
Authorization
Computation
Initialization
Authentication
You accidentally delete data from your computer. What is the term for this type of computer threat?
Human error
Phishing
Software piracy
Spoofing
Which three types of objects can you create by using Microsoft Office Access 2007? Select three.
Tables
Forms
Animations
Reports
Pictures
Video clips
A librarian wants the identification numbers of borrowers to be unique within the book status table. He adds a field
named Identification Number in the book status table.How should the librarian change the Identification Number
field so that each borrower receives a unique identification number?
You want to classify some Web sites as trusted or restricted on your computer. Which of the following security
settings in the Microsoft Windows Security Center window will help you do this?
Automatic Updates
System Properties
Windows Firewall
Internet Options
You need to send your credit card details to your brother by e-mail. Which of the following guidelines will you
apply to ensure the privacy of the e-mail message?