A. Fingers of the left hand on a-s-d-f and fingers on the right hand on j-k-l



Download 184,52 Kb.
Date conversion07.01.2017
Size184,52 Kb.
Name_______________________________________ Sec______________

1. For correct keyboarding, what is the recommended placement of fingers on the home row keys?

A. Fingers of the left hand on A-S-D-F and fingers on the right hand on J-K-L-;

B. Fingers of the right hand on A-S-D-F and fingers on the left hand on J-K-L-j

C. Fingers of the left hand on A-S-E-F and the fingers on the right hand on J-K-O-P

D. Fingers of the left hand on Q-W-E-R and fingers on the right hand on U-I-O-P

 

2. You have finished your travel brochure for social studies. How can you see what your document will look like before printing?



A. View the brochure.

B. Print preview.

C. Open the brochure.

D. You can't – you must print it first.

 

3. Label each of the following devices as input or output.



A. printer _____________

B. scanner ____________

C. keyboard ____________

D. touchscreens _____________

 

 

4. Laura needs to design a brochure for her French Club. What type of computer program would she most likely use?



A. Word processing

B. Virtual reality

C. Simulation

D. Desktop publishing

 

5. A word processing program could be used to do all of the following tasks except which one?



A. Develop a table of historical events.

B. Calculate the expenditures for a candy sale.

C. Create a letter to a friend.

D. Create an essay for history class.

 

6. Which key moves the cursor to the beginning of the next line of text?



A. Shift

B. Tab


C. Enter

D. Backspace/delete

 

7. To create a capital letter, you must use which special key simultaneously with the letter key?



A. Enter

B. Esc


C. Tab

D. Shift


 

8. For correct keyboarding, which finger should be used to depress the Enter key?

A. Thumb

B. Pinkie

C. Pointing finger

D. Ring finger

 

9. What type of software would you need to create an invitation to your birthday party?



A. Spreadsheet

B. Database

C. Word processing

D. Desktop publishing

 

10. In a word processing program, word wrap refers to:



A. Typing that extends beyond the right margin then automatically continues onto the next line.

B. Finishing a document.

C. Words that are unacceptable.

D. Words with too little space between them.

 

11. In a word processing program, what key should you press to begin a new paragraph?



A. Tab

B. Shift


C. Alt

D.  Enter

 

12. Yesterday, Randy wrote a poem using his word processing program. Today, he wants to print it. What must he do before he can print the poem?



A. Choose a File, then Print.

B. Proofread his handwritten copy.

C. Save the poem.

D. Retrieve the poem.

 

13. Renee wants to create a newsletter for her English project. What type of software should she use?



A. Database

B. Spreadsheet

C. Desktop publishing

D. Communication

 

14. Which key must be depressed in order to use the 10-key pad on the right-hand side of the keyboard?



A. The Num Lock key

B. The Control key

C. The Caps Lock key

D. The Shift key

 

15. Which key do you press to create an indention?



A. The Enter key

B. The Insert key

C. The Tab key

D. The Esc key

 

16. Which of the following would be picked up as an error by the spell check feature in a piece of software?



A. I am to years old.

B. Mr. Smith is my teacher.

C. We is going to the movies.

D. My favorit color is blue.

 

17. The backspace key is used to:



A. indent

B. double space

C. back up and erase/delete

D.move to the next line

 

18. Efficient keyboarding techniques require you to:



A. key while watching your hands.

B. key at least 75 words per minute.

C. key without watching your hands.

D. use all function keys.

 

19. Spell checkers work by looking up words in a _____________ stored in the word processing program.



A. Thesaurus

B. word list

C. file

D. Dictionary



 

20. What are Times New Roman and Arial?

A. Points

B. Fonts


C. Templates

D. Graphics

1. Which occupation would most likely use a database on the job?

A. An athlete

B. The janitor at Hudson Belk

C. Telephone information operators

D. Heavy equipment operator

 

2. Which of the following is not a good use for a database program?



A. Keeping school records

B. Completing a paper for English class

C. Maintaining hospital admission records

D. Organizing recipes at home

 

3. An advantage of a database program is:



A. Office correspondence can be handled

B. All fields can be printed in a one page report

C. Data can be added or deleted easily

D. All records can be displayed at one time

 

4. A database program replaces what piece of office equipment?



A. typewriter

B. photocopier

C. FAX machine

D. filing cabinet

 

5. In a database program, a set of related information is called a:



A. field

B. entry


C. record

D. file


 

6. Which of the following is not true of database programs?

A. They can be viewed in different formats.

B. They can be used to retrieve information quickly.

C. They are limited to the amount of information they can hold.

D. They can be used by just about anybody.

 

7. Searching a database of Georgia counties by using the statement, “all counties with a population of greater than two million” will include:



A. Counties with exactly two million people

B. Counties with two million or more

C. Counties with more than two million

D. Counties with less than two million

8. If a student sorted the following in descending order, which international capital would be first?

A. Moscow

B. Beirut

C. Paris


D. Bogota

 

9. All of the following are examples of electronic databases except which one?



A. collection of country music CDs

B. a CD-Rom encyclopedia

C. computerized student information

D. Electronic Card Catalog

 

10. Which search of an electronic phone directory would find only the Doe families living on Main Street in area code 919?



A. Name = Doe and Address = Main Street or Area Code = 919

B. Name = Doe and Address = Main Street and Area Code = 919

C. Name = Doe or Address = Main Street and Area Code

D. Name = Doe or address = Main Street or Area Code = 919

 

11.  What would you do to generate a hard copy of a database of Georgia ?



A. Edit the file

B.  Print the file

C.  Retrieve the file

D.  Save the file to a floppy disk

 

Craft

Country

Year

Hours

APOLLO 7

USA

1968

260.2

APOLLO 9

USA

1969

241.0

APOLLO 11

USA

1969

195.3

APOLLO 10

USA

1969

192.1

APOLLO 8

USA

1968

97.8

GEMINI IV

USA

1965

94.8

SOYUZ 3

USSR

1968

94.8

Use the database above to answer Questions 12-16

12. In what order has the field “Hours” been sorted?

A random

B. alphabetical

C. ascending

D.  descending

 

13. If a search was completed to determine “Year” = 1968, how many records would match?



A. 5

B. 3


C. 2

D. 6


Craft

Country

Year

Hours

APOLLO 7

USA

1968

260.2

APOLLO 9

USA

1969

241.0

APOLLO 11

USA

1969

195.3

APOLLO 10

USA

1969

192.1

APOLLO 8

USA

1968

97.8

GEMINI IV

USA

1965

94.8

SOYUZ 3

USSR

1968

94.8

14. Finding USA flights in the Year 1968 would require a:

A. compound search with AND

B. compound search with OR

C. compound sort with AND

D. compound sort with OR

 

15. The following search was performed:



“Country” = USSR or “Country” = USA

How many records matched?

A. 9

B. 6


C. 7

D. 8


 

Craft

Country

Year

Hours

APOLLO 7

USA

1968

260.2

APOLLO 9

USA

1969

241.0

APOLLO 11

USA

1969

195.3

APOLLO 10

USA

1969

192.1

APOLLO 8

USA

1968

97.8

GEMINI IV

USA

1965

94.8

SOYUZ 3

USSR

1968

94.8

 

16. If you wanted to rank the flights in order of most recent to oldest, you would:

A. Search “Year” ascending

B. Search “Craft” ascending

C. Search “Year” descending

D. Search “Craft” descending

 

17. In a database containing information about Georgia and its counties, how would you find the county with the most people?



A.  Filter the population field using greater than 10,000.

B. Rank the counties by name and scroll through the list.

C. Search each county record

D.  Sort the records by population in descending order

 

18. How would you find the phone number of one student from 500 names and addresses of students enrolled at your school?



A.  Perform a search of all boys in the database

B.  Perform a search using the student's name as the criteria

C.  Sort the database and scroll all records

D.  Sort the database in descending order

 

19. What does searching a database mean?



A. Editing data entries

B. Looking for records that meet certain conditions

C. Opening the file for viewing

D. Ranking the records in the order you need

 

20. What would be the most efficient way to locate the records for all students born before 08/29/90?



A. Replace

B. Scroll

C. search

D. sort


1. The most useful functions of a spreadsheet are:                           
        A. lines and pictures

B. fonts and borders

C. formulas and graphs

D. labels and envelopes


2. Mathematical calculations in a spreadsheet are called

A. words

B. labels

C. formulas

D. values

 

3. Your math teacher has asked you to create a chart comparing candy sales for the last 3 years. Which chart will best display your data?



A. pie chart

B. bar chart

C. scattergram

D. line graph

 

4. Which of the following is an example of an addition formula?



A. =B4+D7

B. 2+3+6=11

C. F3*G7

D. B9/B6


 

5. Which of the following is an example of a subtraction formula?

A. A-B

B. =C10-B9



C. $14.00-$5.00=$9.00

D. B9/B6


 

6. Which of the following is an example of a multiplication formula?

A. =L3*C7

B. B2+B3/C4

C. B4 X B6

D. 46 X 39

 

7. Which type of chart best illustrates values as part of a whole picture?



A. line graph

B. scattergram

C. bar chart

D. pie chart

 

8. All of the following tasks can be completed using a spreadsheet, except:



A. create a graph comparing class attendance rate

B. create a brochure for the band camp

C. track batting averages for the softball team

D. keep track of field trip payments for the class trip

 

9. What is the relationship between spreadsheets and graphs?



A. There isn't one

B. Graphs generate spreadsheets

C. Graphs generate formulas

D. Graphs depict the spreadsheet data

 

10. The numbers in a spreadsheet from cell A1:A49 show candy bar sales last year. How can you find the total number of candy bars sold?



A. Add the numbers in cell A1 and A49 together

B. Subtract the number in cell A49 from cell A1

C. Multiply cell A1 by cell A49

D. Add the range of numbers from A1 through A49

 

11. A space near the top of the spreadsheet where the formulas or other information in the active cell can be viewed is called the:



A address label

B. title bar

C. formula bar

D. active cell

 

12. Which of the following is an example of questions that can be answer by a spreadsheet?



A. Where?

B. Why?


C. What if?

D. When?


 

13. A spreadsheet is a tool that allows you to:

A. manipulate data with numbers and text

B. view and manipulate text

C. manipulate graphics

D. make nice banners and posters

 

14. The most useful functions of a spreadsheet are:



A. lines and pictures

B. fonts and borders

C. formulas and graphs

D. .bmp and .jpg files



 

Use the spreadsheet below to answer Questions 15-20.


15. How could the total cost of food sold in the cafeteria for one day be calculated?

A. Add cells C2 through C6

B. Add cells A2 through A6

C. Add cells D2 through D6

D. Add cells A6 through D6

 

16. If 189 more hamburgers were sold, which cell would change?



A. A3 and A5

B. A4 and B4

C. A3 and D3

D. B3 and C3

 

17. What does COST/UNIT mean?



A. Quantity multiplied by Total Cost

B. Total cost of today's menu

C. Cost of one single item

D. Quantity multiplied by Item




18. Which of the following best describes the places where the costs in Column C are entered?

A. Fields

B. Values

C. Formulas

D. Cells

 

19. Which column contains data generated by formulas?



A. Column A

B. Column B

C. Column D

D. Column 6

 

20. If you wanted to predict how many fries would have to be sold for the TOTAL COST of fries to be equal to $200.00, which cell would you change the value until the desired was reached?



A. A6

B. B6


C. C6

D. D6


 

1.  A computer virus that attaches itself to, and becomes part of, another executable program is called a:

A. time bomb

B. stink bomb                                                                    

C. pipe bomb

D. worm


 

2. A ________ is a person who gains unauthorized access to a computer network for the purpose of corrupting or stealing data.

A. Programmer

B. Hacker

C. Sysop

D. Network administrator


3. You accidentally see your teacher's password for the grading program used at your school. Ethically, you should do which of the following:

A. Report your findings to the principal, since this is a breach of security.

B. Explain to your teacher and suggest she change her password.

C. Use the password to change grades for friends at your school.

D. Pretend you didn't see the password and do nothing.

 

4. A computer virus is usually spread through ___________.



A. RAM

B. peripherals

C. E-mail attachments

D. CD-Rom drives

 

5. What is “software piracy”?



A. illegally copying computer programs

B. reformatting hard drives and reselling them as new

C. infecting the hard drive with a virus

D. reselling used CPU's for a profit

 

6. Which of the following is not an advantage of buying your own software?



A. having instruction manuals and documentation

B. making copies and reselling them for a profit

C. receiving technical support from the software developer

D. having the personal satisfaction of doing the right thing

 

7. __________ is software that you can use on a limited trial basis before you buy it.



A. Trialware

B. Cheapware

C. Shareware

D. Freeware


8. A ______ is a virus that is often disguised as a useful computer program.

A. Trojan Horse

B. hacker

C. worm

D. pirate



 

9. _________ domain software can be copied, modified and redistributed free of charge and restriction.

A. Private

B. Share


C. Public

D. Free


 

10. A collection of rights relating to the reproduction, sale and distribution of software is known as __________.

A. domain

B. copyright

C. piracy

D. password

 

11. A good way to safeguard access to your computer is to _______ protect it.



A deadbolt

B. copyright

C. safemode

D. password


12. Which of the following should be done if you discover a virus on your computer?

A. E-mail all your friends to warn them of the virus

B. remove and destroy all files with the .exe extension

C. disinfect your computer using antivirus software

D. purchase another computer

 

13. A broad range of issues and standards of conduct related to the use of computer technology is:



A. security

B. copyright

C. piracy

D. ethics

 

14. How can software developers keep users from making illegal copies of their software?



A. copyright the software

B. buy a patent for the software

C. lock the software

D. decode the software

 

15. _________ software is made available by the author to others at no cost, but cannot be resold or distributed for profit.



A. Executable

B. Computer

C. Antivirus

D. Freeware

 
16. When safely using the Internet it is recommended that you do which of the following?

A. use your real name and address

B. lie about your age

C. never agree to meet someone you do not know

D.  create a profile with only accurate information about yourself

 

17. Which of the following is a true statement concerning plagiarism and the Internet?



A. You may use up to one paragraph or two sentences, whichever is less.

B. Plagiarism does not apply to the Internet because of all the inaccurate information you find.

C.  Always site Internet sources in a bibliography.

D.  Electronic information is never copyrighted.

 

18. The ________ divide can refer to the differences between individuals within a particular country, as well as between one country and another.



A. ability

B. digital

C. technology

D. on-line

 

19. A message that appears to come from a person or company other than the real sender is a ________.



A. spam

B. popup


C. ghost

D. spoof


 

20. The electronic equivalent of junk mail is known as:

A. adware

B. spam


C. cyberfraud

D. packets





The database is protected by copyright ©sckool.org 2016
send message

    Main page