Term
A _______ is a virus that is attached to documents such as Word or Excel files. |
|
Definition
|
|
Term
What type of virus was the famous Michelangelo virus? |
|
Definition
|
|
Term
___________ encourages internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. |
|
Definition
|
|
Term
A ________ works independently of host file execution and is much more active in spreading itself than a virus is. |
|
Definition
|
|
Term
A cyberspace _______ is an attempt to make someone believe something that is untrue. |
|
Definition
|
|
Term
What are ways to protect your computer? |
|
Definition
-
Place your computer so the fan's input vents are unblocked.
-
It is best to unplug computers during an electrical storm.
-
Old surge protectors can deliver power to your computer without protecting it.
|
|
|
Term
What ways can you protect against power surges? |
|
Definition
-
A whole-house surge protector protects all electrical devices in the house.
-
A power surge could ruin your computer.
-
Surge protectors wear out over time.
|
|
|
Term
The most likely method a hacker would use to access a computer is ________. |
|
Definition
Entering through its Internet connection |
|
|
Term
__________ makes broadband users more vulnerable to attacks. |
|
Definition
|
|
Term
Spyware programs that monitor keystrokes with the Internet of stealing passwords, login IDs, or credit card information are referred to as ______________. |
|
Definition
|
|
Term
What virus can change its own code to avoid detection? |
|
Definition
|
|
Term
What can be used to back up data files? |
|
Definition
- DVDs.
- flash drives.
- external hard drives.
|
|
|
Term
A __________ works independently of host file execution and is much more active in spreading itself than a virus is. |
|
Definition
|
|
Term
A _________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory. |
|
Definition
|
|
Term
_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. |
|
Definition
|
|
Term
________ is doing non-work-related activities with a computer while you are being paid to do your job. |
|
Definition
|
|
Term
The purpose of network address translation (NAT) is to __________. |
|
Definition
hide user IP addresses from the Internet. |
|
|
Term
A ______ is a secure Internet pathway that large corporations use to protect sensitive date. |
|
Definition
|
|
Term
|
Definition
- Some companies sell the personal information found in cookies to other companies.
- cookies are text files.
- cookies help companies determine the traffic flow through their Web site.
|
|
|
Term
What are the rules for creating passwords? |
|
Definition
- change your password frequently.
- create a hard-to-guess password, with a combination of letters, numbers, and symbols.
- Keep your password a secret.
|
|
|
Term
For complete protection when backing up your files, you should use a program that creates an _____________ of your entire system. |
|
Definition
|
|
Term
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ___________. |
|
Definition
|
|
Term
__________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
|
Definition
|
|
Term
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ___________. |
|
Definition
|
|
Term
What can help protect your notebook computer from theft? |
|
Definition
- attaching a motion alarm.
- locking your notebook to a work surface.
- installing software that can signal your notebook's location.
|
|
|
Term
What is a program that appears to be something useful or desirable but does something malicious in the background? |
|
Definition
|
|
Term
Social __________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
|
Definition
|
|
Term
A computer virus normally attaches itself to another computer program known as a ______________. |
|
Definition
|
|
Term
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer. |
|
Definition
|
|
Term
Drive-by downloads occur when ________. |
|
Definition
a Web site downloads harmful software onto your computer. |
|
|
Term
_________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and recieve text messages, and more. |
|
Definition
|
|
Term
A _________ is the portion of virus code that is unique to a particular computer virus. |
|
Definition
|
|
Term
A packet sniffer is a program that can enable a hacker to do what? |
|
Definition
launch a denial of service (DoS) attack on your computer. |
|
|
Term
Many _______ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT). |
|
Definition
|
|
Term
A ________ is a virus that is attached to documents such as Word or Excel files. |
|
Definition
|
|
Term
What is a feature or function available by using Backstage in Office 2010? |
|
Definition
- Save a file
- Close a file
- View file properties
|
|
|
Term
When do contextual tabs display in Office 2010? |
|
Definition
When you select an object in a document. |
|
|
Term
Printing a document is available from the _________ tab. |
|
Definition
|
|
Term
All Office 2010 applications allow you to insert clip art from the Illustrations group; ___________ however, also allows you to insert an object directly from a slide. |
|
Definition
|
|
Term
In Windows Explorer, what important information does the Address bar offer when saving a file? |
|
Definition
The current drive or folder |
|
|
Term
What is a quick and easy way to delete a folder in Windows Explorer? |
|
Definition
Right-click and choose Delete |
|
|
Term
When you use the Ctrl+F shortcut, the Navigation Pane opens only in ___________. |
|
Definition
|
|
Term
What can Windows Explorer not do? |
|
Definition
|
|
Term
When do contextual tabs display in Office 2010? |
|
Definition
When you select an object in a document |
|
|
Term
When you first open Word 2010, what are you presented with? |
|
Definition
|
|
Term
What does clicking the pushpin next to each file name on the Recent Documents list do? |
|
Definition
The file will remain on the Recent Documents list indefinitely. |
|
|
Term
__________ can most accurately be described as the command center of Office 2010. |
|
Definition
|
|
Term
It is most typical and often most appropriate that Word documents are printed in _________ orientation and Excel documents are printed in __________ orientation. |
|
Definition
|
|
Term
What is true about Clip Art in regard to Office 2010? |
|
Definition
The Clip Art task pane allows you to search for only certain types of images. |
|
|
Term
When you close a document in Office 2010, what happens to the application? |
|
Definition
The application remains open. |
|
|
Term
Of the four Microsoft Office 2010 programs, the ______ Home tab is unique and quite different than the other programs. |
|
Definition
|
|
Term
When does a Mini toolbar not show? |
|
Definition
|
|
Term
What is true about the Recent Documents list in Office 2010? |
|
Definition
|
|
Term
How do you easily and quickly select one paragraph in Word or Powerpoint? |
|
Definition
Triple-click in the paragraph |
|
|
Term
What information does the title bar of Office 2010 contain? |
|
Definition
The file name and the application |
|
|
Term
In Windows Explorer, what important information does the Address bar offer when saving a file? |
|
Definition
The current drive or folder |
|
|
Term
What is true about the status bar in Office 2010? |
|
Definition
- The status bar is located at the bottom of the Office 2010 window.
- Slide number and total slide information is displayed in Powerpoint.
- Summary information is displayed in Excel.
|
|
|
Term
Click the _____ key on the keyboard to display Key Tips in Office 2010. |
|
Definition
|
|
Term
Microsoft ________ is most appropriate to use to create memo for use in a business. |
|
Definition
|
|
Term
Is it possible to change the spelling and grammer checker default settings in Office 2010? |
|
Definition
Yes, by clicking the File tab and clicking the Options button. |
|
|
Term
What is true about folders? |
|
Definition
- Folders can be managed in Windows Explorer.
- Folders can be created within other folders.
- The sole purpose of a folder is to provide a location for related files.
|
|
|
Term
What is true about Clipboard task pane? |
|
Definition
- All items can be removed from the Clipboard.
- The Clipboard can be displayed in different locations.
- The most recently added Clipboard item is pasted when you begin a paste operation.
|
|
|
Term
The small dots that surround an object appearing at each corner and in the middle of each side are known as _________. |
|
Definition
|
|
Term
______ is the e-commerce term for transactions that take place between business and other businesses. |
|
Definition
|
|
Term
What is the correct beginning of a website |
|
Definition
|
|
Term
A Web site's URL can identify what? |
|
Definition
- Web site's domain name.
- Protocol used to retrieve a Web document.
- File path for additional pages within the Web site.
|
|
|
Term
A _____ at the end of the http in a URL indicates that the Web site is secure. |
|
Definition
|
|
Term
Today, most search engines have an ________ that you can fill out to refine a search. |
|
Definition
|
|
Term
You can purchase an _______, which enables you to have wireless Internet access with mobile devices. |
|
Definition
|
|
Term
________ Internet connections are high-speed connections that include DSL, cable, and fiber optic. |
|
Definition
|
|
Term
______ is the default browser for Mac computers. |
|
Definition
|
|
Term
_________ services use special strands of optically pure glass or plastic that are as thin as a human hair to transmit data. |
|
Definition
|
|
Term
To access Web sites viewed in a previous browser session (within a given time frame), use the _________. |
|
Definition
|
|
Term
The individual words you search for when using a search engine are referred to as ______. |
|
Definition
|
|
Term
Words used to help refine a search, such as AND or NOT, are called ________. |
|
Definition
|
|
Term
A ___________ actually searches other search engines rather than individual Web sites. |
|
Definition
|
|
Term
A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ____________. |
|
Definition
|
|
Term
A program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge, is called a ____________. |
|
Definition
|
|
Term
Virtual, not physical, communications gateways that allow a computer to organize requests for information from other networks or computers are called __________. |
|
Definition
|
|
Term
What type of virus infects your computer by running a program that searches for common types of data files (such as Microsoft Word and Excel files) and compresses them using a complex encryption key that renders your files unusable? |
|
Definition
|
|
Term
A computer program that attaches itself to another computer and attempts to spread itself to other computers when files are exchanged is called a _______________. |
|
Definition
|
|
Term
The procedure used to assign IP addresses is called ____________. |
|
Definition
|
|
Term
Hacker who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) are called _________. |
|
Definition
|
|
Term
Windows 7's Help and Support feature is available: |
|
Definition
|
|
Term
If you were creating your own dialog box, what would be most appropriate beside Number of copies within a Print dialog box? |
|
Definition
|
|
Term
The Sticky Notes feature of Windows 7 can be accessed from the Start button and then from _________ |
|
Definition
All Programs, Accessories, and Sticky Notes. |
|
|
Term
What are functions of the Start button? |
|
Definition
- Get help.
- A way to open programs.
- Shut down the computer.
|
|
|
Term
When expanding a search, scroll to the last item in the search results list and select _________ to search the entire computer system. |
|
Definition
|
|
Term
What is the primary purpose of the Snipping Tool in Windows 7? |
|
Definition
To capture screen displays |
|
|
Term
What are the functions of an operating system? |
|
Definition
- It recognizes keyboard input.
- It sends output to a display or output device.
- It keeps track of files and folders.
|
|
|
Term
Which Windows 7 feature aligns a window on the right or left side of the desktop when dragging the title bar on the window to the side? |
|
Definition
|
|
Term
The Windows Help button, a question mark, is located in the ___________ of most windows. |
|
Definition
|
|
Term
When using Remote Assistance, if the person you are connected with are using Windows 7, you can use a method called: |
|
Definition
|
|
Term
What year was Windows7 available on most new microcomputer systems? |
|
Definition
|
|
Term
If you were creating your own dialog box, what feature would be most appropriate to show five different print options? |
|
Definition
|
|
Term
How do you drag a window out of the way that may be obstructing another window? |
|
Definition
Click the title bar to movie it |
|
|
Term
|
Definition
- To save a search, click Save search on the toolbar.
- To conduct a saved search, open the Computer window.
- You only need to click the link of a saved search to get new results.
|
|
|
Term
If you have only one account on your computer, it would be known as an ________________ account. |
|
Definition
|
|
Term
In order to receive online help files in your searches, open Help an Support, click Options, and then click what? |
|
Definition
|
|
Term
Important or serious alerts in the Action Center are noted by a ____________. |
|
Definition
|
|
Term
The Start button is located where? |
|
Definition
|
|
Term
Items such as a pencil tool, brushes, colors, and shapes are a part of the ___________ program. |
|
Definition
|
|
Term
In many open program windows a Search box is available at the ________ of the window. |
|
Definition
|
|
Term
How do icons appear on the desktop if Auto Arrange icons is selected? |
|
Definition
Icons are maintained in straight columns and cannot be moved out of line. |
|
|
Term
Where are the control buttons found on the title bar? |
|
Definition
|
|
Term
How do you change the indexing options and locations in Windows 7? |
|
Definition
Start button, type Indexing Options in the Search box, and click Indexing Options. |
|
|
Term
What Windows Update settings are available for Windows 7? |
|
Definition
- Have windows both download and install updates automatically.
- Only download but let you install the downloads.
- Never check for updates.
|
|
|
Term
What happens to the mouse pointer when you place it on a border of a window? |
|
Definition
it changes to a double-headed arrow |
|
|
Term
Help topics in windows 7 are available when you look through help by clicking the __________ button. |
|
Definition
|
|
Term
The Help and Support home button in the Windows Help and Search function in Windows 7 resembles a what? |
|
Definition
|
|
Term
If you use Remote Assistance with someone who does not have Windows7, an invitation file is sent. the invitation file includes a ________ that is used to connect the two computers. |
|
Definition
|
|
Term
The ________ keys on the keyboard allow a user to cycle through all open windows. |
|
Definition
|
|
Term
What is displayed in the left pane of the Start menu? |
|
Definition
A short list of commonly accessed programs from your hard drive. |
|
|
Term
Notepad files end with a ______ extension. |
|
Definition
|
|
Term
What is included of the Windows defender? |
|
Definition
- it is included with Windows 7.
- it is antispyware software.
- it identifies and removes spyware.
|
|
|
Term
What program provides alerts in regard to monitoring your system for maintenance and security settings? |
|
Definition
|
|