CIS 1110

Sound Byte

and

Help Desk

Labs

Part 1:  Chapters 1-4

 

 

 

 

Please use one scantron for each chapter.

Please answer the Buzz Words and Organizing Key Terms on a separate paper.

Correctly label your work.

 

 

 

 


CHAPTER 1 Assignments

For each chapter, the answers to the Buzz Words and Organizing Key Terms should be submitted on a separate sheet.

 

Buzz Words, p. 29

Organizing Key Terms, p. 30

Sound Byte Lab – Chapter 1     Virtual Computer Tour  

 

Introduction: Once the cover is off, the jumble of circuit boards, cables, and components inside the computer may seem intimidating. Although they may look complicated at first, the basic components of a computer system are fairly simple to put together.  Find out what the basic parts inside the computer are, what they do, and how they connect.

 

As you step through the Sound Byte, use your scantron to circle the letter that indicates the correct answer. Point value total: 3 pts.

 

1.      What is the biggest board in the computer?

a.       IDE board                    c. CD-ROM drive

b.      Motherboard                d. RAM memory

 

2.      Which card sends digital information over a phoneline to connect to the Internet?

a.       RAM chip                    c. Motherboard

b.      Video card                   d. Modem

 

3.      Which part of the computer has a wire attached to the sound card to allow you to play music?

a.       CD-ROM drive            c. Video card

b.      Floppy drive                 d. Motherboard

 

4.      Which cannot be used as a permanent storage device?

a.       Floppy drive                 c. CD-ROM drive

b.      Hard drive                    d. RAM

 

5.      What cables connect storage devices to the motherboard?

a.       Power                          c. CPU

b.      IDE                              d. ISA

 

6.      The slots used to plug in expansion cards such as sound, video, and modem are:

a.       Power                          c. CPU

b.      IDE                              d. ISA

 

7.      What controls all of the internal and external devices and does the arithmetic?

a.       Power                          c. CPU

b.      IDE                              d. ISA

 

8.      Which kind of memory stores most of the information used while the computer is turned on?

a.       RAM                           c. Cache

b.      ROM                           d. CD-ROM

9.      Which kind of memory is the fastest in the computer where instructions and data used most often are stored for quickest access by the CPU?

a.       RAM                           c. Cache

b.      ROM                           d. CD-ROM

 

10.  Which kind of memory is an easy-to-install, affordable upgrade to improve your computer’s performance?

a.       RAM                           c. Cache

b.      ROM                           d. CD-ROM

Help Desk Call 1 – Chapter 1     Understanding Bits and Bytes

 

Directions: As you step through the Help Desk, use your scantron to circle the letter that indicates the correct answer. Point value total: 3 pts.

 

11. One byte is equal to:

a.       8 characters.                       c. 8 bits of data.

b.      1 word.                              d. 100 bits of data.

 

12. A byte can represent one:

a.       sentence.                            c. slide presentation

b.      small equation.                    d. symbol.

 

13. Another term for binary digit is:

a.       bit.                                     c. hexadecimal.

b.      byte.                                   d. base 2.

 

14. Binary language consists of:

a.       0s and 1s.

b.      the numbers 0 through 9.

c.       the numbers 0 through 9 and the letters A through F.

d.      words and numbers.

 

15. A ____________ contains approximately one billion bytes of data.

a.       terabyte                              c. megabtye

b.      gigabyte                              d. kilobyte

 

16. Select the choice which lists the terms in order from smallest to largest.

a.       byte č megabyte č kilobyte č gigabyte

b.      gigabyte č megabyte č kilobyte č byte

c.       byte č kilobyte č megabyte č gigabyte

d.      kilobyte č gigabyte č megabyte čterabyte

 


17. A floppy diskette can hold up to:

a.       1,000 bytes of data.                        c. 225 pages of typed text.

b.      1 billion bytes of data                      d. 1.4 megabytes of data.

 

18. Which of the following is NOT true about processing speed?

a.       Processing speed measures the number of tasks performed by the main chip in one second.

b.      The boot up process is measured by processing speed.

c.       Processing speed is only one factor to be considered when judging a computer’s speed and efficiency.

d.      Higher processing speeds are preferable.

 

19. The four major functions of a computer are ____________ data.

a.       gathering, processing, outputting, and storing

b.      gathering, inputting, outputting, and processing

c.       inputting, storing, writing, and outputting

d.      processing, writing, storing, and outputting

 

20. Which of the following is NOT an example of data?

a.       Sound                    c. Report

b.      Word                     d. Picture

 

21. Which of the following statements about computers is NOT true?

a.       Computers use binary language.

b.      Computers have four major functions.

c.       Each of the letters, numbers, and special characters used by computers consists of unique combinations of 8 bits.

d.      Computers are information processing devices.

 

Matching:

      Match the following terms to their meanings:

22.  _____bit               A. more than one trillion

            23.  ____  data             B. greater than a kilobyte

            24.  _____ megabyte    C. 0 or 1

            25. _____ terabyte       D. word or number

                                                 E. 8 binary digits

Sound Byte Lab – Chapter 1  Questions to Ask Before You Buy a Computer      Extra Credit Lab

Introduction: There are many choices to make when buying a computer system. Not only do you need to choose the power and features of the computer system you want, but there are also more basic decisions, such as deciding whether or not to purchase a brand name system, used or new, in a retail store or online. Learn what decisions you should make before you start to shop.

 

As you step through the Sound Byte, use your scantron to circle the letter that indicates the correct answer. Point value total: 2 extra credit pts.

 

 

26.  What is the biggest tradeoff between buying a desktop versus a notebook computer?

    1.  Amount of memory available                c.   Cost
    2.  Ability to connect to the Internet           d.   Ability to connect to a network

 

27.  What limits the portability of a notebook computer?

a.       Battery life                    c.   Length of power cord

b.      Amount of RAM          d.   Ability to upgrade the system

 

28.  Which consistently gives you more value for your money?

a.  Desktop  OR    b. Notebook (laptop)

 

29.  Refurbished computers are:

a.       Risky to buy because they never have a warranty

b.      Guaranteed to have problems, but not bad ones

c.       Usually offered with a warranty

d.      Brand-new systems from lesser known manufacturers

 

30.  What could be an advantage of a used computer over a refurbished computer?

a.       Used computers may already have a large variety of software installed.

b.      Used computers will have a better warranty than refurbished computers.

c.       Used computers are usually more reliable than refurbished computers.

d.      More technical support is available for used than refurbished computers.

 

31.  You probably don’t need an extended warranty for your computer if:

a.       You buy from a brand-name manufacturer

b.      You buy from a local retail store

c.       You’re comfortable replacing components that fail

d.      You paid less than a thousand dollars for your system

 

32.  Students often get special education discounts on computer hardware and software.

a.       True     OR       b. False

 

33.  Why is a desktop computer more likely a better investment over time than a laptop?

            a.   More people know how to use desktops

b.   Desktops have more options for expansion

c.   Laptops lose their value faster because of their smaller size

d.   There are more brand-name desktop computers available.

 

34.  One usual advantage to buying a computer that is not a well-known brand name is:

      a.   Better support services            

      b.   More pre-installed software

      c.   Lower cost

      d.   Quicker response when you need to have parts repaired or replaced.

 

35.  Web sites like www.Pricewatch.com and http://Shopper.cnet.com offer you:

      a.   Comparisons of online prices for many different computer retailers

      b.   Used computer auctions for the best prices

      c.   Extended warranties for your system

      d.   All of the above

 

CHAPTER 2 Assignments

 

Buzz Words, p. 63

Organizing Key Terms, p. 64

Help Desk Call 1 – Chapter 2     Using Input Devices

Multiple Choice:   Point value total: 5 pts.

 

1.   Which of the following statements about computer mice is TRUE?

a.   A small amount of RAM is embedded in the mouse.

b.   Wireless mice transmit data via electromagnetic current.

c.   Wireless mice are battery-powered.

d.   Wireless mice are not compatible with Linux systems.

 

2.   Mouse troubleshooting options may include:

a.         swabbing the interior of the mouse with alcohol.

b.         replacing the cord.

c.         purchasing a new rollerball.

d.         vacuuming the interior of the mouse.

 

3.   Which of the following is a feature of an optical mouse?

a.                   No cord is required

b.                  Mouse movement is controlled by an internal laser

c.                   The batteries can be recharged

d.                  The rollerball is replaceable

 

4.   Which of the following is NOT a type of mouse?

a. Trackball                        c. Trackpoint

b. Optical                           d. Trackglide

 

5.   Which of the following input devices is considered better for your wrists, since it requires very little motion?

a.   Optical mouse              c. Trackpoint

b.   Trackball mouse           d. Touchpad

 

6.   On laptops, the mouse is built into the __________.

a.  keyboard                       c. motherboard

b.  chassis                           d. system tray

 

7.  The ____________ is the most common type of keyboard.

a.  DVORAK                     c. QWERTY

b.  ASDF                           d. ERGO

 

8.  Which of the following statements about the QWERTY keyboard is NOT true?

a.       QWERTY represents the first six letter keys on the top-left row of the keyboard.

b.      The QWERTY layout is designed to increase typing efficiency.

c.       The keyboard layout was designed for use with typewriters.

d.      This keyboard is standard with most desktop computers.

 

9.   A keyboard’s “home keys” are:

a.       the keys in the middle row of the keyboard.

b.      the location for the most commonly used keys of the QWERTY keyboard.

c.       used for function commands on the DVORAK keyboard.

d.      used for navigation purposes.

 

10.  The DVORAK keyboard:

a.                   is the standard keyboard for Macintosh computers.

b.                  reduces the keystroke travel distance by rearranging the keyboard layout.

c.                   is more ergonomically correct than a standard keyboard.

d.                  decreases typing speed.

 

11.  ____________ keyboards help to reduce repetitive strain injuries by using built-in wrist rests and uniquely curved designs.

a.  DVORAK                     c. Wireless

b.  QWERTY                     d. Ergonomic

 

12.  The two main types of wireless keyboards are:

a.         infrared and optical.

b.         battery-powered and radio frequency.

c.         infrared and radio frequency.

d.         battery-powered and optical.

 

13.  Which of the following is NOT true about RF keyboards?

a.             The signal is received by a special computer port.

b.            RF keyboards contain a radio transmitter.

c.             RF keyboards don’t require line-of-sight to work.

d.            Depending upon signal quality, you may use them up to 30 feet away from a computer.

 

14.   Keyboards contain more than just keys for letters and numbers. Which of the following is    NOT a key you might expect to find on a standard keyboard?

a.  Function key                  c.  Control key

b.  Start key                       d.  Cursor control key

 

15.  Which of the following keys are used in conjunction with other keys for special tasks:

                  a. Alt                      d. Insert

                  b. Function             e. both a and c

                  c. Ctrl

Help Desk Call 2 – Chapter 2     Using Output Devices 

Multiple Choice:   Point value total: 5 pts.

 

16.  The CRT monitor uses a ____________ and resembles a TV set.

a.  crystal ray tube                          c. cathode radiant tube

b.  crystal radiant tube                     d. cathode ray tube

 

17.  Images are created on a CRT monitor using millions of tiny dots known as:

a.  pixels.                                        c. particles.

b.  Web beams.                              d. vectors.

18.  Which of the following is NOT a factor affecting the quality of a CRT monitor?

a.  Refresh rate                               c. Resolution

b.  Phosphor contrast                      d. Dot pitch

 

19.  ____________ measures the distance between pixels of the same color.

a.  Dot pitch                                   c. Vector length

b.  Refresh rate                               d. Phosphor scanning

 

20.  A monitor with a high ____________ produces a sharper, clearer image than a low one.

a.  Contrast                                    c. resolution

b.  dot pitch                                    d. flicker rate

 

21.  A(n) ____________ monitor uses a fluorescent panel to generate light waves.

a.  flat screen                                  c. LED

b.  CRT                                          d. LCD

 

22.  Which of the following is NOT an advantage of CRT monitors?

a.  Viewable from all angles c.  Better resolution adjustment

b.  Lighter weight                            d.  Less expensive than LCD monitors

 

23.  Which of the following is an advantage of ink-jet printers?

a.       They are faster than laser printers.

b.      When paper and ink costs are considered, they are cheaper than laser printers.

c.       They are faster than dot-matrix printers.

d.      It is possible to control the size of the ink drops sprayed on the paper.

 

24.  A(n) ____________ printer can print up to 30 pages per minute.

a.  laser                                          c. dot-matrix

b.  flatbed                                       d. ink-jet

 

25.  Print resolution is measured in:

a.  MB.                                          c. ppm.

b.  dpi.                                           d. pixels.

 

Matching:

Match the following terms to their meanings:

            26. _____CRT                         A. measures printer speed

            27. _____LCD                        B. offers superior graphics quality

            28. _____refresh rate               C. measures resolution

            29. _____ppm                         D. impacts monitor quality

            30. _____dots per inch             E. benefits include less eyestrain and environmentally friendly

Match the following terms to their features:

            31. _____ink-jet                            A. space saving

            32. _____liquid crystal display        B. produce images when illuminated

            33. _____dot-matrix                      C. charged to emit light

            34. _____pixels                              D. slow and noisy

            35. _____phosphors                      E. uses tiny drops

Sound Byte Lab – Chapter 2     Healthy Computing      Extra Credit Lab

 

Introduction:

Long hours in front of the computer can cause both short- and long-term health problems if you aren’t careful of your work habits. The positioning of your chair, desk, keyboard, mouse, and monitor can all make a difference.   Learn how to spot problems and position your computer equipment for maximum efficiency and minimal strain.

 

As you step through the Sound Byte, use your scantron to circle the letter that indicates the correct answer. Point value total: 2 extra credit pts.

 

36.  What is NOT a good feature to have in a chair?

a.  Allows you to keep your feet flat on the ground                   

b.  Lower back support

c.  Upper back and shoulder support

d.  Leg support without pressure to the back of knees

 

37.  Which is the best definition for ergonomics?

a.       A branch of economics

b.      A type of computer keyboard

c.       Preventative medical care for job-related symptoms

d.      The science of fitting the job to the worker

 

38.  What is a good rule for positioning your keyboard?

a.       Forearms should be parallel to the ground while typing

b.      Keyboard belongs on top of the desk

c.       Place keyboard on the same level as the monitor

d.      Elbows should be parallel to your knees

 

39.  Where should the mouse be positioned?

a.       On top of the desk                          c.   At the same level as the keyboard

b.      Next to the monitor                         d.   Below the level of the keyboard

 

40.  How high should the top of the monitor be?

a.       Level with your eyes

b.      About two inches below the level of your eyes

c.       About six inches below the level of your eyes

d.      About two inches above the level of your eyes

 

41.  How far away should the monitor be from your eyes?

a.       No more than six inches                  c. At least sixteen inches

b.      No more than ten inches                 d. At least thirty inches

 

42.  What symptoms might indicate that your keyboard is in the wrong position?

a.       Tendonitis                                       c. Sore wrists

b.      Carpal tunnel syndrome                  d. All of these

 

43.  Which of the following should NOT be lined up directly in front of you?

a.       keyboard      b.  monitor      c. mouse   d.  desk

 

44.  Eyestrain, or computer vision syndrome, is a permanent condition often caused by poor    monitor placement.

a.       True           OR       b.   False

 

45.  Which two objects should be the same distance away from you?

a.       The monitor and the keyboard                    c. The monitor and the mouse

b.      The keyboard and the printer                      d. The keyboard and the mouse

             

CHAPTER 3 Assignments

 

Buzz Words, p. 115

Organizing Key Terms, p. 116

Help Desk Call 1 – Chapter 3     Connecting to the Internet

Multiple Choice:   Point value total: 5 pts.

 

1.      When connecting to the Internet, one of the first things that is important to know is:

a.       how much memory the user’s computer has.

b.      what the user wants to do while online.

c.       whether the user has a Mac or a PC.

d.      the CPU’s processing speed.

 

2.      Which of the following is NOT true about dial-up Internet connections?

a.       Dial-up is the least expensive option.

b.      Some Web page images may need more time to load.

c.       The modem required for dial-up is usually already installed in the PC.

d.      A special Internet-ready phone cord is required.

 

3.      56K is the maximum ____________ for current dial-up modems.

a.       data transfer rate                                   c. modulation speed

b.      amount of internal memory                    d. number of demodulations per second

 

4.      It is possible to receive phone calls while using a dial-up Internet connection by:

a.       using a special “dual-wire” phone cord.

b.      connecting an answering machine to the modem.

c.       setting up the connection to disconnect itself for an incoming call.

d.      using the phone company’s call waiting feature and a special device.

e.        

5.      All of the following are examples of broadband Internet connections, EXCEPT:

a.       DSL.                            c. ISP.

b.      satellite.                        d. cable.

c.        

6.      Cable Internet access is:

a.       a two-way connection that requires an upgraded cable network.

b.      available to anyone with cable TV.

c.       made possible by a special cable interface protocol.

d.      connected via an internal modem.

 

 

7.      Which of the following is an advantage when connecting to the Internet via satellite?

a.       No special equipment is required.

b.      Satellite is available in areas that DSL and cable are not.

c.       Satellite is the quickest broadband option.

d.      Since satellite uses radio waves, there is no charge for this service.

 

8.      A DSL modem:

a.       is able to modulate/demodulate digital signals.

b.      is located inside the computer system.

c.       separates signals into voice and data.

d.      is optional equipment used to translate satellite signals.

 

9.      Which of the following statements about ISPs is NOT true?

a.       ISPs provide access to the Internet.

b.      The type of Internet connection chosen may determine the ISP.

c.       There are a number of ISPs available for users with dial-up access.

d.      ISPs are only required for dial-up connections.

 

10.  Which of the following is NOT a key factor to consider when choosing an ISP?

a.       Price                                                                c. Physical location of ISP

b.      Availability of local access number                    d. Number of e-mail accounts

 

Matching:

Match the following items to their descriptions:

11.       _____Dial-Up              A. requires an external modem connected to an expansion card

12.       _____Satellite              B. data and voice transfer can occur simultaneously

13.       _____Cable                 C. maximum 56K

14.       _____Broadband         D. high-speed connection

15.       _____DSL                   E. subject to weather interference

Help Desk Call 1 – Chapter 3     Staying Secure on the Internet

Multiple Choice:   Point value total: 5 pts.

16.     In the Netscape browser, an indication of a secure Web site is the appearance of a:

a.       padlock in the status bar.                      c.  small key in the status bar.

b.      flashing icon on the toolbar.                   d.  VeriSign seal on the taskbar.

 

17.     Which of the following statements about assessing Web site security is NOT true?

a.       A Web site’s return policy ensures that confidential information is kept secure.

b.      The URL of a secure Web site should begin with “https://”.

c.       A key or closed padlock icon will appear in the browser’s status bar.

d.      Unscrupulous Web sites may use security symbols, such as the VeriSign seal, without legal permission to display them.

 

18.     When shopping online, the best reason to use a credit card for purchases is:

a.       to make the transaction quicker.

b.      to protect purchases with the U.S. federal consumer credit card protection laws.

c.       so that only illegitimate Web sites accept alternate payment methods.

d.       so that only credit card purchases will generate a printable order confirmation.

 

19.     Which term below refers to businesses that have physical store locations as well as a Web site for online purchases?

a.       brick-and-mortar                      c.  click-and-brick

b.      B2B                                         d.  point-and-click

 

20.     _____ is an example of an individual making a purchase from an online store.

a.       B2B.     b. C2C.     c. C2B.     d. B2C.

 

21.     Which of the following statements about cookies is FALSE?

a.       Cookies may infect your computer with a virus.

b.      Cookies are small files left on your computer by some Web sites.

c.       Cookies do not search hard drives for personal information.

d.      Cookies assign a unique ID number to your computer for tracking purposes.

 

22.     Cookies track users’ browsing habits and may report this information back to the Web site that left the cookie. Which of the following types of information will NOT be reported?

a.       How often you’ve visited the Web site

b.      The ads you’ve opened or clicked on

c.       How much time you’ve spent on the Web site

d.      Your credit card number and PIN

 

23.     One disadvantage in deleting cookies is:

a.       the Web pages will take longer to load the next time the site is visited.

b.      the length of time it takes to perform this operation.

c.       the loss of customized preferences for a Web site.

d.      the need for a computer specialist to remove the cookies.

 

24.     The __________ leads to the Internet Properties dialog box and the Delete Cookies button.

a.       My Computer icon                   c. My Documents folder

b.      Control Panel                           d. My Network Places icon

 

25.     The option that allows your browser to block certain types of cookies is found on the ____________ tab of the Internet Properties dialog box.

a.       General                                    c. Privacy

b.      Security                                    d. Connections

 

26.     It is possible to monitor cookies on your computer by:

a.       using a software program like Cookie Pal.

b.      viewing the source code of suspicious Web sites.

c.       using antivirus software.

d.      using a pop up blocker.

 

Matching:

Match the following terms to their meanings:

            27. _____Cookie                     A. transaction between consumers

            28. _____E-commerce            B. small text file

            29. _____C2C                         C. certification for secure online transaction

            30. _____VeriSign                   D. displayed in Internet Explorer status bar

            31. _____Padlock icon           E. business conducted online     

Sound Byte Lab – Chapter 3     Creating a Web-Based E-mail Account     

Extra Credit Lab

Introduction: The Internet is used for researching, learning, shopping, and entertainment. However, much of the information that flows back and forth across the Internet is never seen on a web page.  It is contained inside of the millions of e-mail messages that travel the Internet daily. Everybody can have their own e-mail address. There are many excellent, free services that only require you to get to a computer that is connected to the Internet. Find out how easy it is and get started with a new, free e-mail account today!

 

As you step through the Sound Byte, circle the letter that indicates the correct answer.

Point value total: 2 extra credit pts.

 

32.       Which of the following is not a problem associated with e-mail?

a.       spam.                           c. viruses.

b.      filters.                           d. phishing

 

33.       Having more than one e-mail account is not a good idea due to security risks.

a.   True     b. False

 

34.       Yahoo and Hotmail offer:

a.   free and reliable e-mail accounts for anyone.

b.   reliable e-mail service only if you select one of their paying options.

c.   free e-mail for students, but others must pay.

d.   free e-mail for people who use them as their ISP.

 

35.       What is offered as a good reason to have more than one e-mail account?

a.       Getting less spam

b.      So you can send anonymous e-mails

c.       To keep business and personal mail separate

d.      All of the above

 

36.       With an e-mail provider like Yahoo or Hotmail, you can send and receive e-mail from anywhere in the world that has       an Internet connection.

a.   True     b. False

 

37.       Based on the information provided in this SoundByte, you can infer that if you change Internet Service Providers:

a.   you can usually transfer your mail from your old ISP account to your new ISP account.

b.   you can keep your old ISP e-mail account.

c.   you lose your old ISP e-mail account.

d.   you lose your Yahoo or Hotmail e-mail account.

 

38.       Which is NOT a standard feature of the most popular free e-mail accounts?

a.       SPAM protection                                 c. Virus protection

b.      Filter out unwanted mail                        d. Firewall protection

 

39.       The reason you are asked to provide an answer for a security question is:

a.       to verify your identity each time you use e-mail.

b.      to verify your identity if you forget your password.

c.       in case somebody tries to steal your e-mail.

d.      in case you want to access your mail from a remote location.

 

40.       Yahoo asks you to type in a word that appears in a special graphic display box to:

a.       test your visual perception skills.            c. prevent automated registrations.

b.      be sure that you can read English.          d. allow you to validate your password.

 

From the features listed on the right, fill-in the letters of the two features NOT available in a free Yahoo e-mail account.

41.____________

42.____________

  1. automatically have messages sorted into folders
  2. your own domain name
  3. address book
  4. 25MB storage capacity
  5. set up an automated response when you will be away on vacation
  6. send and receive voice mail

 

             

CHAPTER 4 Assignments

 

Buzz Words, p. 157

Organizing Key Terms, p. 158

Help Desk Call 1 – Chapter 4     Choosing Software

Multiple Choice:   Point value total: 5 pts.

 

1.      Computer game ratings may be found on the game’s box, but may also be found on the ____________ Web site.

a.       MPAA             c. RIAA

b.      Nielsen             d. ESRB

 

2.      Which of the following does NOT need checking in order to run a new game on your computer?

a.       CD/DVD drives                       c. Sound and video cards

b.      Available hard disk space         d. Amount of ROM

 

3.      ____________ software is used to convert CDs to MP3 format.

a.       Ripping                         c. File editing

b.      Burning                         d. Recording

 

4.      MP3 file editor software allows you to:

a.       copy and play audio files.          c. remove dead air from the end of songs.

b.      record streaming audio.             d. sort MP3 files and create play lists.

 

5.      To transform MP3 files to another type of audio file, such as WAV, use:

a.       audio-editing software.                          c. an MP3 file editor.

b.      decoding/format conversion software.   d. encoding software.

 

6.      Adobe Premiere is an example of ____________ software.

a.       desktop publishing                    c. digital video editing

b.      Web page authoring                  d. PDF file creation

 

7.      In order to make a document created in one of the Microsoft Office applications Web compatible, you would need to:

a.       use the Save As Web Page option.

b.      add HTML code to the document.

c.       use a special file conversion utility.

d.      recreate it using Web authoring software.

 

8.      ____________ and Adobe InDesign allow the user to manipulate text and graphics and are often used for advanced desktop publishing projects.

a.       Microsoft Word                       c. Adobe Photoshop

b.      QuarkXPress                           d. Macromedia Dreamweaver

 

9.      The basic image-editing program that is included with Microsoft Windows is:

a.       Photoshop.                               c. Paint.

b.      Picture It!                                 d. PhotoSuite.

 

10.  ____________ is a basic image-editing program that allows casual users to touch up images, improve color, and add creative effects.

a.       Adobe Photoshop Elements      c. Microsoft Publisher

b.      Adobe InDesign                       d. Adobe Premiere

 

11.  Which of the following is NOT an example of image-editing software?

a.       Photoshop                                c. PhotoEdit

b.      InDesign                                   d. Picture It!

 

12.  ____________ software allows the user to create images by using tools like brushes and pens, as well as mediums like pastels and oils.

a.       Painting                                    c. Digital manipulation

b.      Image-editing                            d. Photo management

 

13.  The drawing program Visio can be used to create all of the following, EXCEPT:

a.       technical drawings.                    c. 3-D models.

b.      engineering flowcharts.              d. project schedules.

 

14. _________ software is used to construct 3-D building models prior to their actual construction.

a.   Digital manipulation                   c. Technical drawing

b.   Video-editing                            d. Computer-aided design

 

15.  Which of the following is NOT an example of reference software?

a.       Atlases and maps                      c. Thesauruses

b.      Test preparation packages        d. Encyclopedias

 

Matching:

Match the following software titles to their categories:                                                    

            16. _____Macromedia Dreamweaver            A. image-editing

            17. _____Adobe InDesign                            B. Web page authoring

            18. _____Microsoft Picture It!                      C. course management

            19. _____Microsoft Visio                              D. desktop publishing

            20. _____Blackboard                                   E. drawing

Help Desk Call 2 – Chapter 4     Buying and Installing Software

Multiple Choice:   Point value total: 5 pts.

 

21.       The academic fair use provision allows:

a.       unlimited copying of computer software for academic use.

b.      individuals to copy printed material, regardless of the purpose.

c.       instructors to provide copies of software to students.

d.      students and teachers to copy and distribute printed material for educational purposes.

 

22.       Software developers may release ____________ versions of their software so that users can test it and report any problems before the final release.

a.   beta                              c. shareware

b.   freeware                       d. trial

 

23.       Software that is free to use for a limited period of time is known as:

a.       freeware.                      c. beta version software.

b.      shareware.                    d. limited release software.

 

24.       Which of the following is NOT an important safeguard when installing freeware or shareware?

a.   Make sure the defrag program has been run recently.

b.   Set a restore point.

c.   Be sure your antivirus software is current and scan the software for viruses.

d.   Only use software written by reliable developers.

 

25.       What is the difference between regularly priced software and academically discounted software?

a.   Discounted software expires after 18 months

b.   Discounted software must be renewed every semester

c.   Regularly priced software has more features

d.   The lower price for the discounted software

 

26.       Although not an ideal solution, if you choose to buy software through online  auction sites such as eBay, you can avoid software piracy by making sure that:

a.   the software is unopened.                      c.   the software is a legal, licensed copy.

b.   the seller has a good return policy.         d.   beta versions are bug-free.

 

27.       The Add/Remove Programs icon can be found:

a.   in the Control Panel.                 c. in My Computer.

b.   on the desktop.                         d. by selecting Start, then All Programs.

 

28.       When adding new software, choosing the ____________ option will copy all of the software files and programs to the hard drive.

a.   comprehensive installation                    c. custom installation    

b.   full installation                                       d. typical installation

 

29.       When downloading software programs from the Internet, which of the following statements is TRUE?

a.   The download process varies depending on the browser being used.

b.   Double-clicking the Wizard icon will begin the download.

c.   Most software programs will unzip themselves and automatically launch the setup program.

d.   The installation process is the same as that used for software on CD.

 

30.       If a downloaded software program does not install automatically, locating the files and double-clicking the ____________ file will begin the process.

a    run.doc                         c. readme.txt

b.   setup.exe                      d. program.exe

 

31.       The best way to remove a software application that is no longer needed is to:

a.                               delete the program icon on the desktop.

b.                              delete the main program file.

c.                               use the Add/Remove Programs icon found in My Computer.

d.                              use the Uninstall Program icon in the main program file.

 

32.       When looking for help with software, checking the FAQs, or ____________, section of the software manufacturer’s Web site can be helpful.

a.   for all questions                         c. frequently asked questions

b.   freely accessed questions          d. free application quotes

 

33.       Which of the following items is NOT usually found in the Help menu?

a.   Add/Remove                            c. Content Outline

b.   Index                                        d. What Is?

 

Matching:

Match the following terms to their meanings:

34.  _____Microsoft Knowledge Base                         A. animated help image

35.  _____Office Assistant                                           B. illegal copying of software

36.  _____Software piracy                                           C. copyrighted software distributed without cost

37.  _____Freeware                                                     D. collection of articles providing problem solutions

38.  _____Custom installation                                       E. method of saving hard drive space

Sound Byte Lab – Chapter 3     Best Utilities for Your Computer     

Extra Credit Lab

Introduction: The Internet is a two-way stream of communication, and everyone online is vulnerable to unwanted intrusions into their computer. Some intrusions are simply annoying, like pop-up advertising, but others can be invasive or destructive such as tracking your activities, reading information from your hard drive, or using your computer to run destructive programs.

 

Discover the dangers existing online and what measures can be taken to protect you against hackers, spyware, unwanted advertising, and other hazards of surfing the net.

 

As you step through the Sound Byte, circle the letter that indicates the correct answer.

Point value total: 2  extra credit pts.

39.       What might spyware or adware do?

a.       Read personal information on your hard drive.

b.      Record your surfing habits and report back to its originator.

c.       Send back the contents of all of your cookies.

d.      All of the above

 

40.       What is data mining?

a.   Digging into the data stored on your personal website

b.   Gathering personal information or habits of yours without your knowledge

c.   Collecting personal shopping habits from e-business sites

d.   Selling personal information gained on the Internet for profit

 

41        Once you install a pop-up stopper it can automatically determine which pop-up windows are advertising and which ones are useful information.

a.   True      b.  False

 

42.       Like antivirus software, the ad and spyware suppression software needs to be ________

a.   checked for viruses.                              c. uninstalled periodically.

b.   kept up-to-date.                                   d. set to work both online and offline.

 

43.       What is NOT scanned by adware and spyware detection software?

a.   Memory                       c. Files

b.   Registry                        d. Detached peripherals

 

44.       Keystroke loggers ______________.

a.   keep a log of all programs that have been run

b.   make it easier to enter long strings of data on the keyboard

c.   slow down the keyboard and make the computer perform poorly

d.   record everything you type on the keyboard and report back to their owner

 

45.       RATs are ______________.

a.   worse than bugs because they cause more programs to malfunction

b.   annoying and insulting pop-up messages

c.   programs executed by a hacker that allow them to control your pc remotely

d.   a type of virus that gnaws away at data on your disk

 

46.       Denial of Service agents allow hackers to ______________.

a.   launch attacks against other computers from your computer

b.   stop your computer from accessing the internet

c.   disrupt your connection causing you to disconnect constantly

d.   steal service contract information

 

47.       Antivirus programs usually pick up any keystroke loggers, RATs, or denial of service agents that enter your computer.

a.   True                 b. False

 

48.       Pest Patrol ______________.

a.   detects bugs in your software         c. detects other variants of hacking software

                  b.   repairs bugs in your software          d. reveals the identity of hackers in your system