Deck 20: Computers

ملء الشاشة (f)
exit full mode
سؤال
Firefox, Safari and Windows Explorer are examples of:

A)Network servers
B)Internet search engines
C)Web browsing applications
D)Anti-virus software packages
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A surge protector is a device that protects:

A)A pocket from pen ink
B)Electronics from voltage anomalies
C)An Internet access point from service disruptions
D)Telephone landlines from service disruption
سؤال
The digital device used referred to as a "jump drive" or "thumb drive" is used for what purpose?

A)Wireless Internet connection
B)Data storage and transport
C)Booting a frozen or non-responsive hard drive
D)roviding power to laptops or notebook computers when they are not connected to a power source
سؤال
What type of digital file ends with a . jpg extension?

A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
سؤال
What is the difference between the email addressee settings "Cc" and "Bcc"?

A)A recipient on the "Cc" list will have forwarding permissions but a recipient on the "Bcc" list will not.
B)A recipient on the "Cc" list will not be listed as a recipient on the message.
C)A recipient on the "Bcc" list will not see any of the sender's information.
D)A recipient on the "Bcc" list will not be listed as a recipient on the message.
سؤال
External storage devices allow computer users to share, transport or backup digital copies of data. Which of the following data storage devices is no longer widely used?

A)CD ROM
B)Floppy disk
C)External hard disk drive
D)USB flash drive
سؤال
Web addresses that end in a two-letter domain name like '.ca', '.se', and '.fr' are generally used by:

A)Countries
B)U)S. government offices and organizations
C)Offices and organizations of international bodies or alliances (like NATO)
D)Non-profit agencies
سؤال
Why is it critical to download authorized updates for computer anti-virus software on a routine basis?

A)Occasionally, anti-virus software infects a computer with a virus even when it's trying to establish preventative care.
B)Computer viruses can spontaneously "pop up" in a system if the computer experiences multiple glitches in a short period of time.
C)User licenses for anti-virus software only last for short periods of time so that users must re-read the user agreements frequently to ensure they remain well informed.
D)Virus authors are constantly writing new viruses, and the anti-virus software definitions that identify a virus must similarly be written and updated constantly to remain effective.
سؤال
What type of digital file ends with a .xls extension?

A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
سؤال
What qualities make .pdf files unique from other files?

A).pdf files are the only type of documents that can be successfully transferred with audio embedded in the body of the document.
B)All U.S. government information and paperwork is released in .pdf attachments.
C).pdf files save all of the settings and aesthetic values of a document and make them readable by users who may not have the same programs or formatting elements the author used in the file.
D).pdf files are the only type of documents that can be successfully transferred with videos embedded in the body of the document.
سؤال
Which is the bigger unit of space in a computer drive's memory, a gigabyte or megabyte?

A)Gigabytes and megabytes are actually equal in size, but they store different types of files. Megabytes are the units in which text is stored; gigabytes are the units in which images are stored. Images are more complex files and therefore bigger, but gigabytes themselves are no larger than megabytes.
B)A gigabyte is larger because it contains the space of one billion bytes whereas a megabyte contains the space of one million bytes.
C)A megabyte is larger because it contains the space of one billion bytes whereas a gigabyte contains the space of one million bytes.
D)Gigabytes and megabytes do not measure the same type of file capacity and are therefore incomparable.
سؤال
What does the most common USB port (like the one into which a user would connect a digital media player or flash drive) look like?

A)Flat, horizontal rectangle about 3/4-inch long
B)A circle
C)A triangle
D)A long rounded rectangle with a bar of many small holes in its center
سؤال
To rearrange spreadsheet entries in a particular order, which program function can be used?

A)Enumerating
B)Alphabetizing
C)Ordering
D)Sorting
سؤال
A piece of data sent back and forth between a user's computer and a website documenting user habits and preferences is a:

A)Cookie
B)Plug-in
C)Worm
D)Virus
سؤال
When a computer is in the process of powering on and initializing the operating system it is:

A)Actualizing
B)Booting
C)Prompting
D)Originating
سؤال
If the 'beta' version of a program is available for download, what does that communicate about the software that has been made available?

A)It is a trial version of the program that developers are testing and allowing users to download for free so they may provide feedback about the program.
B)It is the most advanced and cutting edge version of that program on the market.
C)It has been verified as completely virus-proof and will absolutely not be infected by a virus.
D)It is "tester" software that may end up available for wide circulation in the future, but will likely never be published for mass use.
سؤال
Software that adds new abilities or increases the abilities of software already installed on a computer is called:

A)A bonus
B)A cookie
C)A beta
D)A plug-in
سؤال
What is safe mode?

A)The state of the computer when all of the critical programs and files are encrypted and password protected
B)The state of the computer when all of the files are backed-up properly
C)The diagnostic mode of an operating system
D)A computer's default setting once a virus has been detected
سؤال
What purpose does a firewire serve?

A)It blocks users on a network from accessing Internet content that the network administrator deems inappropriate.
B)It is a cord that connects two or more computers and allows for peer-to-peer communication between devices.
C)It connects a USB device to the computer.
D)It is the most critical wire in a computer and channels all of the incoming energy to the necessary internal structures.
سؤال
Email users have the option of adding a saved text entry to the end of each email. What is the term for that entry?

A)The closing
B)The signature
C)The ending
D)The stamp
سؤال
Which two characters compose binary code, the two-character language in which computer instructions are written?

A)1s and 0s (ones and zeroes)
B)Xs and Os
C)Dots and dashes
D)Xs and Ys
سؤال
Which of the following email entries might cause a recipient's email account to interpret the message as spam and filter it out of their Inbox before the recipient knows it's there?

A)Discussing products that are often advertised through email campaigns
B)Using vulgar language in the body of the message
C)Leaving a signature or closing off the end of the message
D)A subject line in all-caps with a lot of exclamation marks
سؤال
The symbols inserted into a text document to separate pieces of information in list format, such as information in an outline, are called:

A)Hyperlinks
B)Manual breaks
C)Bullets
D)Margins
سؤال
What is the common term for trying to solve a computer malfunction?

A)Strategizing
B)Brainstorming
C)Rationalizing
D)Troubleshooting
سؤال
QuickTime, Winamp and Rhythmbox are examples of:

A)DVD-writing programs
B)Music-writing software
C)Peer-to-peer file-sharing programs
D)Computer desktop multimedia players
سؤال
A piece of software that facilitates communication between a computer and an external device like a printer is a:

A)Plug-in
B)Firewall
C)Driver
D)Beta
سؤال
When a cursor changes from an arrow or formatting mark into an hourglass, it indicates that:

A)The user is working too slowly.
B)The computer is about to crash.
C)The computer is in the middle of a task and cannot act on any new commands.
D)The power source is about to run out.
سؤال
Which of the following is a widely used open-source software package that users can download to avoid the financial expense of purchasing an office suite at retail value?

A)Microsoft Office
B)OpenOffice
C)iWork
D)Adobe Creative Studio
سؤال
'Ctrl' + 'S', 'Shift' + 'C' + '4', and 'Ctrl' + 'Alt' + 'Delete' are examples of:

A)Drivers
B)Cursors
C)Applications
D)Keystroke shortcuts
سؤال
Where on a computer can a user gain access to basic system functions such as "Add/Remove Programs"?

A)Login
B)Favorites
C)Control Panel
D)Start Menu
سؤال
In terms of digital data stored on a computer, what is an extension?

A)A set of numbers that occur at the beginning of a file name which specify when the file was created
B)The three-to-six character ending to a file name which specifies what type of file it is
C)Any software upgrade that extends the lifetime of a program on the computer
D)Extra storage space for files
سؤال
What purpose does a firewall serve?

A)It blocks users in a network from accessing websites or other content that a network administrator has categorized as "off limits."
B)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from outside the network.
C)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from inside the network.
D)It keeps network users from causing damage to any of the network components due to excessive, prolonged or intense use.
سؤال
What happens when a user places a file in the Recycle Bin?

A)The file is organized according to the operating system defaults, losing its custom settings.
B)The file is reverted to its earliest setting, when it was first created.
C)The file is stripped of unwanted material to make more space available for use.
D)The file remains in the Recycle Bin until the user manually empties it, deleting the file permanently, or until the bin is purged on its next routine emptying, as set by the user.
سؤال
Folders in a computer system serve what basic purpose?

A)Organization
B)Virus protection
C)Maintaining a log of user data
D)Secondary backup for selected data
سؤال
An element in or on a webpage that takes the viewer to another position in the document or to another document or site altogether when the viewer clicks it is called:

A)A hyperlink
B)A megalink
C)An autolink
D)An extension
سؤال
A file that is included in an e-mail message but is not part of the body of the email is called:

A)An e-file
B)A macro
C)A transport
D)An attachment
سؤال
Which type of file is specifically intended to store other files?

A)Trojan horse
B)Network
C)Labyrinth
D)Directory
سؤال
What file setting in a desktop publishing program should a user select if they want to share a file with another person but don't want to receiver to change the document?

A)Default formatting
B)Paste special
C)Read-only
D)Export
سؤال
What is the difference between freeware and shareware?

A)Shareware allows users to amend the software as they discover bugs, defects or potential improvements which other users can download as an update; freeware cannot be changed and redistributed.
B)Freeware is software for users to download and use in full for free; shareware is software that users can try for free but must pay to have long-term, full access to the whole software package.
C)Shareware is software that must be shared among members of the same network; freeware is software that a single person can use.
D)Shareware is software for users to download and use in full for free; freeware is software that users can try for free but must pay in order to have long-term full access to the whole software package.
سؤال
To use the same formatting for numerous documents, user can create what type of file to use as the framework of each document?

A)Template
B)Skeleton
C)Text foundation
D)Blueprint
سؤال
Which of the following programs allows users to create charts and graphs within a document or as a standalone document?

A)Microsoft Outlook Express and Apple's iWork
B)Adobe Flash and Microsoft Word
C)Open Office and Adobe Reader
D)Microsoft Word and Microsoft Excel
سؤال
Which of the following is an Internet-based telephone service that allows PC and Mac users to place telephone calls between any two geographic locations worldwide for free?

A)Face Time
B)Windows Messenger
C)Skype
D)AOL Instant Messenger
سؤال
What prefix to a website name indicates that the site is open for user modification or public entry?

A)Public domain
B)Wiki
C)Free
D)Open
سؤال
Which of the following websites is not run by the U.S. government?

A)dotgov.gov
B)whitehouse.gov
C)whitehouse.com
D)All of the websites belong to the U.S. government.
سؤال
What is the difference between a CD-R and a CD-RW?

A)CD-R is for personal computers; a CD-RW is for Macs.
B)A CD-RW is a writable compact disc onto which a user can permanently burn digital data one time; a CD-R is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
C)A CD-RW simply has more space than a CD-R.
D)A CD-R is a writable compact disc onto which a user can permanently burn digital data one time; a CD-RW is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
سؤال
What is the difference between a virus and a worm?

A)A worm is a computer program designed to harm a computer once the user has opened it; a virus is a single file that works through a computer or network.
B)A virus can potentially cause a lot of damage to a computer system; a worm only monitors a user's online activity without their knowledge but does not damage any files.
C)A virus is a computer program designed to harm a computer once the user has opened it; a worm is a single file that works through a computer or network.
D)Damage caused by a virus can be repaired; damage caused by a worm is always irreparable.
سؤال
If a user wants to replicate or move text from one location (like a document or webpage) to another location on the same computer, the most efficient method for achieving this is to:

A)Export as .pdf
B)Highlight, copy and paste
C)Selection mode, block, drag and drop
D)Transcribe the text by typing it in a word processing document then merging it into the new location
سؤال
The flashing vertical line in a word processing program and the arrow that moves in relation to a user's mouse movements are examples of:

A)Cursors
B)Special characters
C)Graphics
D)Desktop icons
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/48
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 20: Computers
1
Firefox, Safari and Windows Explorer are examples of:

A)Network servers
B)Internet search engines
C)Web browsing applications
D)Anti-virus software packages
Web browsing applications
2
A surge protector is a device that protects:

A)A pocket from pen ink
B)Electronics from voltage anomalies
C)An Internet access point from service disruptions
D)Telephone landlines from service disruption
Electronics from voltage anomalies
3
The digital device used referred to as a "jump drive" or "thumb drive" is used for what purpose?

A)Wireless Internet connection
B)Data storage and transport
C)Booting a frozen or non-responsive hard drive
D)roviding power to laptops or notebook computers when they are not connected to a power source
Data storage and transport
4
What type of digital file ends with a . jpg extension?

A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the difference between the email addressee settings "Cc" and "Bcc"?

A)A recipient on the "Cc" list will have forwarding permissions but a recipient on the "Bcc" list will not.
B)A recipient on the "Cc" list will not be listed as a recipient on the message.
C)A recipient on the "Bcc" list will not see any of the sender's information.
D)A recipient on the "Bcc" list will not be listed as a recipient on the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
6
External storage devices allow computer users to share, transport or backup digital copies of data. Which of the following data storage devices is no longer widely used?

A)CD ROM
B)Floppy disk
C)External hard disk drive
D)USB flash drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
7
Web addresses that end in a two-letter domain name like '.ca', '.se', and '.fr' are generally used by:

A)Countries
B)U)S. government offices and organizations
C)Offices and organizations of international bodies or alliances (like NATO)
D)Non-profit agencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
8
Why is it critical to download authorized updates for computer anti-virus software on a routine basis?

A)Occasionally, anti-virus software infects a computer with a virus even when it's trying to establish preventative care.
B)Computer viruses can spontaneously "pop up" in a system if the computer experiences multiple glitches in a short period of time.
C)User licenses for anti-virus software only last for short periods of time so that users must re-read the user agreements frequently to ensure they remain well informed.
D)Virus authors are constantly writing new viruses, and the anti-virus software definitions that identify a virus must similarly be written and updated constantly to remain effective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of digital file ends with a .xls extension?

A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
10
What qualities make .pdf files unique from other files?

A).pdf files are the only type of documents that can be successfully transferred with audio embedded in the body of the document.
B)All U.S. government information and paperwork is released in .pdf attachments.
C).pdf files save all of the settings and aesthetic values of a document and make them readable by users who may not have the same programs or formatting elements the author used in the file.
D).pdf files are the only type of documents that can be successfully transferred with videos embedded in the body of the document.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which is the bigger unit of space in a computer drive's memory, a gigabyte or megabyte?

A)Gigabytes and megabytes are actually equal in size, but they store different types of files. Megabytes are the units in which text is stored; gigabytes are the units in which images are stored. Images are more complex files and therefore bigger, but gigabytes themselves are no larger than megabytes.
B)A gigabyte is larger because it contains the space of one billion bytes whereas a megabyte contains the space of one million bytes.
C)A megabyte is larger because it contains the space of one billion bytes whereas a gigabyte contains the space of one million bytes.
D)Gigabytes and megabytes do not measure the same type of file capacity and are therefore incomparable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
12
What does the most common USB port (like the one into which a user would connect a digital media player or flash drive) look like?

A)Flat, horizontal rectangle about 3/4-inch long
B)A circle
C)A triangle
D)A long rounded rectangle with a bar of many small holes in its center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
13
To rearrange spreadsheet entries in a particular order, which program function can be used?

A)Enumerating
B)Alphabetizing
C)Ordering
D)Sorting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
14
A piece of data sent back and forth between a user's computer and a website documenting user habits and preferences is a:

A)Cookie
B)Plug-in
C)Worm
D)Virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
15
When a computer is in the process of powering on and initializing the operating system it is:

A)Actualizing
B)Booting
C)Prompting
D)Originating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
16
If the 'beta' version of a program is available for download, what does that communicate about the software that has been made available?

A)It is a trial version of the program that developers are testing and allowing users to download for free so they may provide feedback about the program.
B)It is the most advanced and cutting edge version of that program on the market.
C)It has been verified as completely virus-proof and will absolutely not be infected by a virus.
D)It is "tester" software that may end up available for wide circulation in the future, but will likely never be published for mass use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
17
Software that adds new abilities or increases the abilities of software already installed on a computer is called:

A)A bonus
B)A cookie
C)A beta
D)A plug-in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is safe mode?

A)The state of the computer when all of the critical programs and files are encrypted and password protected
B)The state of the computer when all of the files are backed-up properly
C)The diagnostic mode of an operating system
D)A computer's default setting once a virus has been detected
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
19
What purpose does a firewire serve?

A)It blocks users on a network from accessing Internet content that the network administrator deems inappropriate.
B)It is a cord that connects two or more computers and allows for peer-to-peer communication between devices.
C)It connects a USB device to the computer.
D)It is the most critical wire in a computer and channels all of the incoming energy to the necessary internal structures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
20
Email users have the option of adding a saved text entry to the end of each email. What is the term for that entry?

A)The closing
B)The signature
C)The ending
D)The stamp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which two characters compose binary code, the two-character language in which computer instructions are written?

A)1s and 0s (ones and zeroes)
B)Xs and Os
C)Dots and dashes
D)Xs and Ys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following email entries might cause a recipient's email account to interpret the message as spam and filter it out of their Inbox before the recipient knows it's there?

A)Discussing products that are often advertised through email campaigns
B)Using vulgar language in the body of the message
C)Leaving a signature or closing off the end of the message
D)A subject line in all-caps with a lot of exclamation marks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
23
The symbols inserted into a text document to separate pieces of information in list format, such as information in an outline, are called:

A)Hyperlinks
B)Manual breaks
C)Bullets
D)Margins
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the common term for trying to solve a computer malfunction?

A)Strategizing
B)Brainstorming
C)Rationalizing
D)Troubleshooting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
25
QuickTime, Winamp and Rhythmbox are examples of:

A)DVD-writing programs
B)Music-writing software
C)Peer-to-peer file-sharing programs
D)Computer desktop multimedia players
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
26
A piece of software that facilitates communication between a computer and an external device like a printer is a:

A)Plug-in
B)Firewall
C)Driver
D)Beta
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
27
When a cursor changes from an arrow or formatting mark into an hourglass, it indicates that:

A)The user is working too slowly.
B)The computer is about to crash.
C)The computer is in the middle of a task and cannot act on any new commands.
D)The power source is about to run out.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is a widely used open-source software package that users can download to avoid the financial expense of purchasing an office suite at retail value?

A)Microsoft Office
B)OpenOffice
C)iWork
D)Adobe Creative Studio
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
29
'Ctrl' + 'S', 'Shift' + 'C' + '4', and 'Ctrl' + 'Alt' + 'Delete' are examples of:

A)Drivers
B)Cursors
C)Applications
D)Keystroke shortcuts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
30
Where on a computer can a user gain access to basic system functions such as "Add/Remove Programs"?

A)Login
B)Favorites
C)Control Panel
D)Start Menu
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
31
In terms of digital data stored on a computer, what is an extension?

A)A set of numbers that occur at the beginning of a file name which specify when the file was created
B)The three-to-six character ending to a file name which specifies what type of file it is
C)Any software upgrade that extends the lifetime of a program on the computer
D)Extra storage space for files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
32
What purpose does a firewall serve?

A)It blocks users in a network from accessing websites or other content that a network administrator has categorized as "off limits."
B)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from outside the network.
C)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from inside the network.
D)It keeps network users from causing damage to any of the network components due to excessive, prolonged or intense use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
33
What happens when a user places a file in the Recycle Bin?

A)The file is organized according to the operating system defaults, losing its custom settings.
B)The file is reverted to its earliest setting, when it was first created.
C)The file is stripped of unwanted material to make more space available for use.
D)The file remains in the Recycle Bin until the user manually empties it, deleting the file permanently, or until the bin is purged on its next routine emptying, as set by the user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
34
Folders in a computer system serve what basic purpose?

A)Organization
B)Virus protection
C)Maintaining a log of user data
D)Secondary backup for selected data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
35
An element in or on a webpage that takes the viewer to another position in the document or to another document or site altogether when the viewer clicks it is called:

A)A hyperlink
B)A megalink
C)An autolink
D)An extension
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
36
A file that is included in an e-mail message but is not part of the body of the email is called:

A)An e-file
B)A macro
C)A transport
D)An attachment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which type of file is specifically intended to store other files?

A)Trojan horse
B)Network
C)Labyrinth
D)Directory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
38
What file setting in a desktop publishing program should a user select if they want to share a file with another person but don't want to receiver to change the document?

A)Default formatting
B)Paste special
C)Read-only
D)Export
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the difference between freeware and shareware?

A)Shareware allows users to amend the software as they discover bugs, defects or potential improvements which other users can download as an update; freeware cannot be changed and redistributed.
B)Freeware is software for users to download and use in full for free; shareware is software that users can try for free but must pay to have long-term, full access to the whole software package.
C)Shareware is software that must be shared among members of the same network; freeware is software that a single person can use.
D)Shareware is software for users to download and use in full for free; freeware is software that users can try for free but must pay in order to have long-term full access to the whole software package.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
40
To use the same formatting for numerous documents, user can create what type of file to use as the framework of each document?

A)Template
B)Skeleton
C)Text foundation
D)Blueprint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following programs allows users to create charts and graphs within a document or as a standalone document?

A)Microsoft Outlook Express and Apple's iWork
B)Adobe Flash and Microsoft Word
C)Open Office and Adobe Reader
D)Microsoft Word and Microsoft Excel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is an Internet-based telephone service that allows PC and Mac users to place telephone calls between any two geographic locations worldwide for free?

A)Face Time
B)Windows Messenger
C)Skype
D)AOL Instant Messenger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
43
What prefix to a website name indicates that the site is open for user modification or public entry?

A)Public domain
B)Wiki
C)Free
D)Open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following websites is not run by the U.S. government?

A)dotgov.gov
B)whitehouse.gov
C)whitehouse.com
D)All of the websites belong to the U.S. government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is the difference between a CD-R and a CD-RW?

A)CD-R is for personal computers; a CD-RW is for Macs.
B)A CD-RW is a writable compact disc onto which a user can permanently burn digital data one time; a CD-R is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
C)A CD-RW simply has more space than a CD-R.
D)A CD-R is a writable compact disc onto which a user can permanently burn digital data one time; a CD-RW is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is the difference between a virus and a worm?

A)A worm is a computer program designed to harm a computer once the user has opened it; a virus is a single file that works through a computer or network.
B)A virus can potentially cause a lot of damage to a computer system; a worm only monitors a user's online activity without their knowledge but does not damage any files.
C)A virus is a computer program designed to harm a computer once the user has opened it; a worm is a single file that works through a computer or network.
D)Damage caused by a virus can be repaired; damage caused by a worm is always irreparable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
47
If a user wants to replicate or move text from one location (like a document or webpage) to another location on the same computer, the most efficient method for achieving this is to:

A)Export as .pdf
B)Highlight, copy and paste
C)Selection mode, block, drag and drop
D)Transcribe the text by typing it in a word processing document then merging it into the new location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
48
The flashing vertical line in a word processing program and the arrow that moves in relation to a user's mouse movements are examples of:

A)Cursors
B)Special characters
C)Graphics
D)Desktop icons
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 48 في هذه المجموعة.