IT Application Tools in Business
uestion text
RAM stands for?
Feedback
Question 2
Question text
_______________ mechanism helps in establishing proof of identification.
Feedback
Question 3
Question text
It is the processed and organized data presented in a meaningful form
Feedback
Question 4
Question text
It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of your hand or in your pocket.
Feedback
Question 5
Question text
It is a battery or AC-powered personal computer that can be easily carried and used in a variety of locations.
Feedback
Question 6
Question text
This is the brain of the computer.
Feedback
Question 7
Question text
The program is meant to make computers more efficient, but later hackers modify it into computer viruses that destroy or alter data.
Feedback
Question 8
Question text
A storage module made of flash memory chips.
Feedback
Question 9
Question text
It is the general name for unanticipated or undesired effects in programs or program parts, caused by an agent intent on damage.
Feedback
Question 10
Question text
It is the tangible part of a computer system.
Feedback
Question 11
Question text
The hexadecimal representation of 14 is _______________
Feedback
Question 12
Question text
Is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details.
Feedback
Question 13
Question text
The principle of ________________ specifies that only the sender and the intended recipient should be able to access the content of the message.
Feedback
Question 14
Question text
Feedback
Question 15
Question text
DOS command to remove a directory or an entire directory tree.
Feedback
Question 16
Question text
This describes a situation where information, thought as secure, is released in an untrusted environment.
Feedback
Question 17
Question text
Feedback
Question 18
Question text
It is weakness which allows an attacker to reduce a system's information assurance.
Feedback
Question 19
Question text
They are known as crackers or dark-side hackers. Someone violating computer or Internet security maliciously or for illegal personal gain.
Feedback
Question 20
Question text
It is an electronic machine that follows a set of instructions in order that it may be able to accept and gather data and transform these into information.
Feedback
Question 21
Question text
It is a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single unit for information.
Feedback
Question 22
Question text
This is any peripheral (piece of computer hardware equipment to provide data and control signals to an information processing system such as a computer or other information appliance.
Feedback
Question 23
Question text
Convert the binary equivalent 10101 to its decimal equivalent.
Feedback
Question 24
Question text
A ___________ in a computer system, is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.
Feedback
Question 25
Question text
It is a piece of software, a chunk of data, or sequence of commands that takes advantage of a software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerized).
Feedback
Question 26
Question text
What year did the first Microsoft Word-based virus, spreads worldwide using macro commands.
Feedback
Question 27
Question text
The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.
Feedback
Question 28
Question text
An electronic device, operating under the control of instructions stored in its own memory that can accept data (input), process the data according to specified rules, produce information (output), and store the information for future use
Feedback
Question 29
Question text
Feedback
Question 30
Question text
The core of the OS. Interacts with the BIOS (at one end), and the UI (at the other end).
Feedback
Question 31
Question text
It is the course of doing things in a sequence of steps.
Feedback
Question 32
Question text
What year did admiral Grace Murray Hopper finds a moth among the relays of a Navy computer and calls it a “bug.”
Feedback
Question 33
Question text
Allows data and programs to be sent to the CPU.
Feedback
Question 34
Question text
___________, a University of Southern California doctoral student, comes up with term “computer virus.”
Feedback
Question 35
Question text
It directs and controls the entire computer system and performs all arithmetic and logical operations.
Feedback
Question 36
Question text
Executes all arithmetic and logical operations. Arithmetic calculations like as addition, subtraction, multiplication and division.
Feedback
Question 37
Question text
A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.
Feedback
Question 38
Question text
_________ of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
Feedback
Question 39
Question text
The value of base in a decimal number system is ____________
Feedback
Question 40
Question text
The only language which the computer understands is ______________
Feedback
Question 41
Question text
It is a unit of information equivalent to the result of a choice between only 2 possible alternatives in the binary number system.
Feedback
Question 42
Question text
1 TB is compose of?
Feedback
Question 43
Question text
Convert 10100011 from binary to decimal.
Feedback
Question 44
Question text
___________ is a permanent form of storage
Feedback
Question 45
Question text
It is used to accomplish specific tasks other than just running the computer system.
Feedback
Question 46
Question text
It is a generic term for organized collections of computer data and instructions
Feedback
Question 47
Question text
It primarily provides services for running applications on a computer system.
Feedback
Question 48
Question text
It is a collection of independent and unorganized facts.
Feedback
Question 49
Question text
A multi-user computer capable of supporting from 10 to hundreds of users simultaneously.
Feedback
Question 50
Question text
DOS command to make directory
Feedback
Question 1
Question text
Convert 110100101010 from binary to decimal.
Feedback
Question 2
Question text
Add the following unsigned binary numbers: 101010 and 001111.
Feedback
Question 3
Question text
The hexadecimal representation of 14 is _______________
Question 1
Question text
What is a slide transition ?
Question 2
Question text
Which keyboard shortcut bolds selected text?
Question 3
Question text
A slider on the status bar that is dragged to enlarge or decrease the display size of the document in the document window
Question 4
Question text
A fast way to add up this column of numbers is to click on the cell below the numbers and then:
Question 5
Question text
A section of the ribbon in Office programs that identifies groups of commands based on their groups
Question 6
Question text
Connects workstations and peripheral devices that are in close proximity.
Question 7
Question text
Which command is used to insert a sound clip into a slide?
Question 8
Question text
A horizontal strip near the top of the window that contains tabs of grouped command buttons that you click to interact with the app
Question 9
Question text
A computer network spanned inside a building and operated under single administrative system is generally termed as __________________.
Question 10
Question text
Rules that govern data communication.
Question 11
Question text
A ___________ is a unique name associated with a specific IP address by a program that runs on an Internet host computer.
Question 12
Question text
The primary view that you use to write, edit, and design your presentation and is divided into three areas: Slides and notes pane
Question 13
Question text
What tab allows us to insert pictures?
Question 14
Question text
Areas of the Ribbon that arrange commands based on their functions
Question 15
Question text
Why the document you created at home displays with a different font at school?
Question 16
Question text
Question 17
Question text
On an Excel sheet, the active cell is indicated by ____.
Question 18
Question text
It is smallest network which is very personal to a user.
Question 19
Question text
Being responsible online includes:
A) Keeping passwords a secret & being nice
B) Telling an adult when I fell unsafe
C) None of the above
D) All of the above
Question 20
Question text
What are movements from one slide to another during a presentation called?
Question 21
Question text
Which commonly used animation effect makes text on a slide appear in the presentation?
Question 22
Question text
HTML stands for?
Question 23
Question text
A box on a slide reserved for the title of a presentation or slide
Question 24
Question text
Components of a network can be connected to each other differently in some fashion.
Question 25
Question text
When you use your Internet connection to become part of the Web, your computer becomes a __________ in a worldwide client/server network.
Question 26
Question text
Special effects used to introduce slides in a presentation are called
Question 27
Question text
Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking to whom and what they are talking about.
Question 28
Question text
These are effects that are in place when you switch from one slide to the next.
Question 29
Question text
Underline, shadow, emboss, superscript, and subscript are all examples of text ____.
Question 30
Question text
Daniel wants each slide to appear with a checkerboard effect. Which of the following would you apply to cause this effect?
Question 31
Question text
Effects applied to placeholders or other content to move the content in unique ways on the slide is which of the following?
Question 32
Question text
From an administrator’s point of view, a network can be private network which belong to a single autonomous system and cannot be accessed outside its physical or logical domain.
Question 33
Question text
A box with a dotted border text that resides in your layout to enter text
Question 34
Question text
What is the World Web usually called for short?
Question 35
Question text
This determines how all the elements on a slide are arranged, including text and content placeholders
Question 36
Question text
Device that connects a user to the Internet.
Question 37
Question text
Bulleted text can be converted to SmartArt easily
Question 38
Question text
Designed to handle data communication for multiple organizations in a city and nearby cities as well.
Question 39
Question text
Which of the following should you use if you want all the slide in the presentation to have the same “look”?
Question 40
Question text
A customization toolbar on the left side of a Microsoft application program window's title bar, containing icons that you click to quickly perform common actions, such as saving a file and undo
Question 41
Question text
Web is a collection of files that reside on computers, called _____________, that are located all over the world and are connected to each other through the Internet.
Question 42
Question text
Question 43
Question text
In order to save an existing document with a different name you need to:
Question 44
Question text
It is the largest network in existence on this planet.
Question 45
Question text
The confidential information sent by A to B which is accessed by C without the permission or knowledge of A and B.
Question 46
Question text
How can you stop a slide show ?
Question 47
Question text
Spans several cities, states, or countries, and is owned by different parties.
Question 48
Question text
###### means in a Cell:
Question 49
Question text
It is the software that you run on your computer to make it work as a web client.
Question 50
Question text
To print a presentation using shortcut keys, press ____.
Question 1
Question text
Slide Themes that have design concepts, fonts, and color schemes.
Question 2
Question text
You can change the format appearance of text and slides in the Slide View as well. Formatting can be applied to all slides at the same time as in the Master View or only on an individual slide.
Question 3
Question text
The following are Master Slide of Microsoft PowerPoint except;
Question 4
Question text
During a slide show, pressing the Esc key:
Question 5
Question text
Slides that are unformatted and have no color scheme.
Question 6
Question text
Display a snapchat of each slide.
Question 7
Question text
To delete the slide currently displayed in the Slide Pane:
Question 8
Question text
Each slide has an area where text and graphics are entered for a presentation.
Question 9
Question text
To move a text placeholder, you:
Question 10
Question text
These are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.
Question 11
Question text
It display the name of the open file.
Question 12
Question text
A Theme gives your slides a consistent appearance throughout your presentation.
Question 13
Question text
This is a closed source commercial presentation program developed by Microsoft.
Question 14
Question text
Which key do you press to go into Slide Show view and always start on the first slide?
Question 15
Question text
_______________ are designated by dotted lines; they appear on a slide as guides, but they will not appear on the finished presentation.
Question 16
Question text
___________________ is a presentation application that enables an individual from any technical level to create a dynamic and professional-looking presentation
Question 17
Question text
____________ are visual special effects that you see when you move from one slide to the next.
Question 18
Question text
The Slide Master View is located on the __________ ribbon.
Question 19
Question text
PowerPoint has a set of Master Slides available for every Design Theme. The three Masters include a Slide Master, Handout Master, and ______.
Question 20
Question text
PowerPoint is best described as:
Question 1
Question text
Amount of data that can be transferred from one point to another in a certain time period
Question 2
Question text
Amount of data that can be transferred from one point to another in a certain time period
Question 3
Question text
You can access many ‘chat rooms’ on the web that can be used to meet new people, make new friends, as well as to stay in touch with old friends.
Question 4
Question text
It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/ IP) to serve billions of users worldwide.
Question 5
Question text
Information is probably the biggest advantage internet is offering.
Question 6
Question text
It is the largest network in the world that connects hundreds of thousands of individual networks all over the world.
Question 7
Question text
Type of Network Bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure
Question 8
Question text
It is now an essential communication tools in business.
Question 9
Question text
Internet provides facility to access wide range of Audio/Video songs, plays films.
Question 10
Question text
Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred.
Question 11
Question text
A collection of linked Web pages that has a common theme or focus is called a Web site.
Question 12
Question text
Multiple pieces of data, sent simultaneously to increase the transmission rate
Question 13
Question text
It consists of information organized into Web pages containing text and graphic images.
Question 14
Question text
_______________ refers to an Internet connection that is established using a modem.
Question 15
Question text
The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s ___________.
Question 16
Question text
It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often compared to mass junk mailings.
Question 17
Question text
_______________ is an Internet utility software used to uploaded and download files.
Question 18
Question text
Electronic transfer of data from one location to another.
Question 19
Question text
A commercial organization with permanent connection to the Internet that sells temporary connections to subscribers.
Question 20
Question text
Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking to whom and what they are talking about.
Question 1
Question text
Which of the following is NOT a new feature in Word 2013?
Question 2
Question text
Which of the following actions or commands cannot be undone in Microsoft Word?
Question 3
Question text
What function adds all of the numbers in a range of cells?
Question 4
Question text
To specify the size of the viewable area and allow users to reduce or enlarge the size of a document window, which command is used?
Question 5
Question text
To alert Excel that you are entering a formula and not text, type a ____________ preceding the formula.
Question 6
Question text
Moves data to a new line when the cell is not wide enough to display all the contents
Question 7
Question text
_____ appear horizontally and are identified by numbers.