100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

NOCTI PRACTICE TEST|UPDATED&VERIFIED|WITH SOLUTIONS|GUARANTEED SUCCESS

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
05-07-2023
Geschreven in
2022/2023

The unauthorized copying of software is referred to as: Pirated Software There are images online that you want to use. The website states that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in the what? Public Domain The best security for passwords is: Memorize it Eight bits equal how many bytes? 1 One megabyte equals how many bytes? 1,048,576 Storing data for the long term is called what? Archiving A logical series of instructions given to a computer is called a what? Program A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? Script What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? Wrist Rest Which of the following fire extinguishers should be used to put out an electrical fire? Class C Of the following printers, which one actually touches the paper to print? Impact What is the most popular port that can connect peripheral devices like printers? USB A single-sided, single density DVD recordable has a capacity of what? 4.7 GB In Excel, the intersection of a row and a column is called what? Cell A database file that contains all the information about a single entity is called what? Record Margin, spacing, and font size are all examples of what? Formatting Combining address file data with a form letter is called what? Mail Merge What type of a network would you set up for use in a single building? LAN A network set up where each computer could be a server or a workstation is called what? Peer to peer What is the most common networking protocol? TCP/IP The wireless encryption of _______ is the weakest encryption used. WEP A computer that has malicious software on it that can be controlled by a master computer is called what? Bot A simple and inexpensive way to increase network security is to: Keep all network equipment locked up and limit the number of people who have access - "access control" Select the most secure password from the list below: 07SuhBW*36 ; Hbabies78 ; Password ; 67Eww98 07SuhBw*36 The slowest connection to the internet is a ______ connection. Dial-up Which of the following transmits data using light pulses? Fiber optic cables Use Bluetooth technology for connecting: Wireless accessories To make it easier for people to get to places on the World Wide Web, a ______ server translates a public domain name into its IP address. DNS The OSI networking model contains ______ layers. 7 A national or global network of computers is called a: LAN A widely used method to display a network topology is a: Network Chart A type of virus that copies itself repeatedly using up system resources is called? Worm Entering the statement ("cat and dog"), without the parenthesis will return what results? Precisely "cat and dog" only What software is required to access .pdf files? Acrobat Reader The general way to transfer files over the internet is to use? FTP A/An ______ is an address for a web page or other resource online. URL On the World Wide Web, the ______ is also known as the server. Web host On the World Wide Web, the ______ is also known as the client. Web browser An email address is a combination of a user name and what name? Domain When using email software to send an email message, regular recipients are unable to view recipients who have: Been blind carbon copied An example of a correct data hierarchy in a database is: File, record, field, character When using a spreadsheet to specify a simple arithmetic expression, perform ______ first. Exponentiation A feature that allows certain hardware to directly access the system memory and bypasses the CPU is: DMA An operating system is: Software that controls the execution of programs, input/output, resource scheduling, and data management A secure windows disk file system must use: NTFS Software that allows an operating system to communicate with hardware is called a/an? Device Driver A router is a device that makes decisions about? What network path packets should follow One difference between RAM and ROM is: That RAM is volatile and ROM is non-volatile A type of chart designed to analyze and represent tasks involved in completing a given project is known as a: PERT chart A ______ chart graphically illustrates a schedule that helps to plan, coordinate, and track specific tasks in a project. Gantt When reviewing step by step procedures, an easy way to review the logical steps in a process is by creating a: Flowchart A properly attached wrist strap decreases the chance of: ESD A technician runs a ______ program to determine the system's reachability across the network. Ping Users are expecting long delays in reaching a particular site. To investigate the problem, the computer technician decides to check for delays caused by an intermediary routers. What program should the technician run? Tracert Organizing a solution that proceeds from the general to the specific is called? Top-down design A program of logical series of ______ that tell a computer what to do. Instructions Input/output devices are also known as? Peripherals The term computer ethics, refers to A person's conduct and behavior as a computer operator A user connected to the company LAN complains that he or she cannot access the Internet. No one else on the network is having this problem. The computer technician should first check the: Ethernet Cable Select the most secure password from the list below: 078uhBU*38 ; hbacon68 ; 93niGhkL ; kruystall23 078uhBU*38 When keying a title in the first row of a six-column table, use the ______ option in the table menu to combine and center a title across all columns. Merge To resize the chart in a spreadsheet, the user can: Drag the corner of the chart A field that uniquely identifies a record within a database is called a/an _____ field. Key When using a spreadsheet to specify a simple arithmetic expression perform ______ first. Exponentiation What type of control function allows for the body of the loop to run a set number of iterations? For next What is the default sort order in a database? Ascending One component of a database file that contains all the information about a single entity is referred to as/an: Record The two methods to consolidate data from multiple spreadsheets are position and: Category The term, prioritizing, relates to: Managing time Use Bluetooth technology for connecting: Wireless accessories A router is a device that makes decisions about: What network path packets should follow To navigate to the next cell horizontally and the vertically in a word processing table, press the ______ key. Tab The best method to test whether RAM is faulty is to Replace faulty RAM with working RAM The two basic ways to retrieve records in most database programs are: Find command and queries Choose the correct word to complete this sentence. An audit of our organization's financial records will be conducted on the ______ of September. fourth Employees in the ABC Company have limited access to company information. This security measure is called: Access Control A set of moral standards for judging whether something is right or wrong is known as: Ethics A/An _____ is an address for a web page or other resource on the internet. URL The crime of ______ occurs when someone obtains enough personal information about another person to masquerade as that person for access to credit and bank accounts. Identity Theft In presentation applications, which of the following options is selected to add transitions to all slides? Apply to all A file sent with an email message is called: An attachment In a spreadsheet application, a reference that refers to the same cell or range on multiple sheets is called: 3-D During the implementation phase, code is constructed by information gathered during the ______ phase. Design A software program that automatically routes unwanted email advertisement and other junk mail to the deleted items folder or email software is called: Spam filter A _____ would be used for detailed comments at the bottom of every page with a reference in a research document. Footnote A high-end cellular phone that combines the functionality of a personal digital assistant and a mobile phone is called a/an: Smart phone An input device that is used to identify fingerprints is: Biometric device Using adjustable workstations to prevent awkward body positioning, and to meet the unique physical needs of an individual is an example of: Ergonomics

Meer zien Lees minder
Instelling
NOCTI PRACTICE
Vak
NOCTI PRACTICE










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
NOCTI PRACTICE
Vak
NOCTI PRACTICE

Documentinformatie

Geüpload op
5 juli 2023
Aantal pagina's
23
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GUARANTEEDSUCCESS Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
662
Lid sinds
3 jaar
Aantal volgers
314
Documenten
24889
Laatst verkocht
4 dagen geleden
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Lees meer Lees minder
4,3

250 beoordelingen

5
162
4
37
3
33
2
12
1
6

Populaire documenten

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen