1. A person who used his or expertise to gain access to other peoples computers to get information illegally or do damage is
a. hacker
b. analyst
c. instant messenger
d. programmer
2. A device that connects to a network without the use of cables is said to be__________
a. distributed
b. free
c. centralized
d. none of these
3.To chance selected text to all capital letters, click the change case button, and then click______
a. UPPERCASE
b .UPPER ALL
c. CAPS LOCK
d. Lock upper
a. CD
b. DVD
c. ROM
d. RW
5. the most common type of storage devices are___________
a. persistence
b. optical
c. magnetic
d. flash
6. Codes consisting of lines of varying widths or lengths that are computer –readable are known as_______
a. an ASCII Code
b. a magnetic type
c. an OCR scanner
d. a bar code
7.A website’s main page is called it’s__________
a. home pageb. browser page
c. search page
d. a bar code
8.Part number, part description ,and number of parts ordered are examples of_______
a. control
b. processing
c. bookmark
d. output
9.To access properties of an object, the mouse technique to use is __________
a. dragging
b. dropping
c. right-clicking
d. shift-clicking
10. Computers used the__________ number systems to store data and perform calculations
a. binary
b. octal
c. decimal
d. hexadecimal
No comments:
Post a Comment