100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

NOCTI PRACTICE TEST|UPDATED&VERIFIED|WITH SOLUTIONS|GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
05-07-2023
Written in
2022/2023

The unauthorized copying of software is referred to as: Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? Public Domain The best security for passwords is: Memorize it Eight bits equal how many bytes? 1 One megabyte equals how many bytes? 1,048,576 Storing data for the long term is called what? Archiving A logical series of instructions given to a computer is called a what? Program A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? Class C Of the following printers, which one actually touches the paper to print? Impact What is the most popular port that can connect peripheral devices like printers? USB A single-sided, single density DVD recordable has a capacity of what? 4.7 GB In Excel, the intersection of a row and a column is called what? Cell A database file that contains all the information about a single entity is called what? Record Margin, spacing, and font size are all examples of what? Formatting Combining address file data with a form letter is called what? Mail Merge What type of a network would you set up for use in a single building? LAN A network set up where each computer could be a server or a workstation is called what? Peer to peer What is the most common networking protocol? TCP/IP The wireless encryption of _______ is the weakest encryption used. WEP A computer that has malicious software on it that can be controlled by a master computer is called what? Bot A simple and inexpensive way to increase network security is to: Keep all network equipment locked up and limit the number of people who have access - "access control" Select the most secure password from the list below: 07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 07SuhBw*36 The slowest connection to the internet is a ______ connection. Dial-up Which of the following transmits data using light pulses? Fiber optic cables Use Bluetooth technology for connecting: Wireless accessories To make it easier for people to get to places on the World Wide Web, a ______ server translates a public domain name into its IP address. DNS The OSI networking model contains ______ layers. 7 A national or global network of computers is called a: LAN A widely used method to display a network topology is a: Network Chart A type of virus that copies itself repeatedly using up system resources is called? Worm Entering the statement ("cat and dog"), without the parenthesis will return what results? Precisely "cat and dog" only What software is required to access .pdf files? Acrobat Reader The general way to transfer files over the internet is to use? FTP A/An ______ is an address for a web page or other resource online. URL On the World Wide Web, the ______ is also known as the server. Web host On the World Wide Web, the ______ is also known as the client. Web browser An email address is a combination of a user name and what name? Domain When using email software to send an email message, regular recipients are unable to view recipients who have: Been blind carbon copied An example of a correct data hierarchy in a database is: File, record, field, character When using a spreadsheet to specify a simple arithmetic expression, perform ______ first. Exponentiation A feature that allows certain hardware to directly access the system memory and bypasses the CPU is: DMA An operating system is: Software that controls the execution of programs, input/output, resource scheduling, and data management A secure windows disk file system must use: NTFS Software that allows an operating system to communicate with hardware is called a/an? Device Driver A router is a device that makes decisions about? What network path packets should follow One difference between RAM and ROM is: That RAM is volatile and ROM is non-volatile A type of chart designed to analyze and represent tasks involved in completing a given project is known as a: PERT chart A ______ chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project. Gantt When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a: Flowchart A properly attached wrist strap decreases the chance of: ESD A technician runs a ______ program to determine the system's reachability across the network. Ping Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run? Tracert Organizing a solution that proceeds from the general to the specific is called? Top-down design A program of logical series of ______ that tell a computer what to do. Instructions Input/output devices are also known as? Peripherals The term computer ethics, refers to A person's conduct and behavior as a computer operator A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the: Ethernet Cable Select the most secure password from the list below: 078uhBU*38 ; hbacon68 ; 93niGhkL ; kruystall23 078uhBU*38 When keying a title in the first row of a six-column table, use the ______ option in the table menu to combine and center a title across all columns. Merge To resize the chart in a spreadsheet, the user can: Drag the corner of the chart A field that uniquely identifies a record within a database is called a/an _____ field. Key When using a spreadsheet to specify a simple arithmetic expression perform ______ first. Exponentiation What type of control function allows for the body of the loop to run a set number of iterations? For next What is the default sort order in a database? Ascending One component of a database file that contains all the information about a single entity is referred to as/an: Record The two methods to consolidate data from multiple spreadsheets are position and: Category The term, prioritizing, relates to: Managing time Use Bluetooth technology for connecting: Wireless accessories A router is a device that makes decisions about: What network path packets should follow To navigate to the next cell horizontally and the vertically in a word processing table, press the ______ key. Tab The best method to test whether RAM is faulty is to Replace faulty RAM with working RAM The two basic ways to retrieve records in most database programs are: Find command and queries Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the ______ of September. fourth Employees in the ABC Company have limited access to company information. This security measure is called: Access Control A set of moral standards for judging whether something is right or wrong is known as: Ethics A/An _____ is an address for a web page or other resource on the internet. URL The crime of ______ occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts. Identity Theft In presentation applications, which of the following options is selected to add transitions to all slides? Apply to all A file sent with an email message is called: An attachment In a spreadsheet application, a reference that refers to the same cell or range on multiple sheets is called: 3-D During the implementation phase, code is constructed by information gathered during the ______ phase. Design A software program that automatically routes unwanted email advertisement and other junk mail to the deleted items folder or email software is called: Spam filter A _____ would be used for detailed comments at the bottom of every page with a reference in a research document. Footnote A high-end cellular phone that combines the functionality of a personal digital assistant and a mobile phone is called a/an: Smart phone An input device that is used to identify fingerprints is: Biometric device Using adjustable workstations to prevent awkward body positioning, and to meet the unique physical needs of an individual is an example of: Ergonomics

Show more Read less
Institution
NOCTI PRACTICE
Course
NOCTI PRACTICE










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NOCTI PRACTICE
Course
NOCTI PRACTICE

Document information

Uploaded on
July 5, 2023
Number of pages
23
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
664
Member since
3 year
Number of followers
314
Documents
24889
Last sold
1 day ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4,3

250 reviews

5
162
4
37
3
33
2
12
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions