Final Part 2
25 test answers
Unlock all answers in this set
Unlock answers 25question
What is the extention of a Microsoft Excel file?
answer
.xlsx
Unlock the answer
question
Unwanted or unneeded software included by manufacturers on new computers is called ________
answer
bloat ware
Unlock the answer
question
The Internet is ________
answer
a large network of networks
Unlock the answer
question
A network that spans a large physical distance is called a _______
answer
WAN
Unlock the answer
question
The two major types of system software programs are utility programs and the ________.
answer
Operating system
Unlock the answer
question
List three tips for professional e-mail etiquette
answer
be concise, meaningful subject line, use spell-checker and proofread
Unlock the answer
question
Wireless network devices use ________ to communicate with each other
answer
Radio waves
Unlock the answer
question
Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________.
answer
Plug-ins
Unlock the answer
question
Errors in computer software are called ________.
answer
bugs
Unlock the answer
question
On a network, a(n) ________ helps prevent data packets from colliding with each other
answer
switch
Unlock the answer
question
What type of software allows you to create dynamic slide shows?
answer
Presentation
Unlock the answer
question
To transfer data packets between two or more networks, a ________ is used
answer
router
Unlock the answer
question
A monitor is an example of what type of device
answer
Output device
Unlock the answer
question
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
answer
Digital convergence
Unlock the answer
question
The ________ of the operating system enables users to communicate with the computer system
answer
user interface
Unlock the answer
question
_________ is formally defined as any criminal action perpetrated primarily through the use of a computer
answer
cybercrime
Unlock the answer
question
Creating and distributing ________ is one of the most widespread types of cybercrimes
answer
Computer viruses
Unlock the answer
question
IT is the abbreviation for
answer
Information Technology
Unlock the answer
question
Using hard disk space to temporarily store data or instructions from RAM is referred to as ________.
answer
Virtual memory
Unlock the answer
question
This type of computer is intended for use at a single location, so it is stationary
answer
Desktop computer
Unlock the answer
question
Each device attached to your computer comes with a special program called a(n) ________ that enables the device and operating system to communicate with each other
answer
Device driver
Unlock the answer