QUESTION Which of the following is NOT considered specialty software? A) message center software B) groupware C) personal information manager D) desktop publishing software E) project management software ANSWER Answer: C Explanation: C) Personal information managers, such as Lotus organizer and Microsoft Task Scheduler, are considered common business software. The other options all focus […]
QUESTION Which of the following is NOT part of a software suite? A) word processing software B) spreadsheet software C) system software D) e-mail software E) presentation software ANSWER Answer: C Explanation: C) Software suites are packages of integrated application software. System software helps application software interact with the computer.
QUESTION Tina sends an e-mail on the company intranet to her supervisor Jonah across the hall. What does the e-mail pass through before Jonah reads it? A) mainframe B) microcontroller C) server D) flash drive E) client ANSWER Answer: C Explanation: C) A server is a central computer that holds data and programs for […]
QUESTION Networks reflect five basic technologies. Which of the following is NOT an accurate depiction of these technologies? A) size > WAN and LAN B) arrangement > client/server and P2P C) private uses > extranet and VPN D) bandwidth > secure and insecure E) connections > wired and wireless ANSWER Answer: D Explanation: D) […]
QUESTION Petra works at a leading biotech company, where she runs DNA samples and chemical formulas to discover molecule pairs that might cure genetic diseases. What type of computer does Petra use in her job? A) supercomputer B) microcontroller C) laptop D) tablet E) workstation ANSWER Answer: E Explanation: E) Petra deals with highly […]
QUESTION On Neil’s first day interning at the school’s tech lab, the director asked him to gather all the input devices and place them on the counter for inventory. Neil had never seen so much stuff, but he thinks he got everything. Maybe he grabbed too much. What should NOT be in the group on […]
QUESTION Malware makes repeated requests of a computer network, overloading it and denying access to legitimate users. Indicate whether the statement is true or false. ANSWER Answer: FALSE Explanation: Making repeated requests of a computer system or network to deny access by legitimate users is a denial-of-service (DoS) attack.
QUESTION Vonetta works at a big company with several buildings in a campus-like setting. She regularly communicates with coworkers across the company via computer. Which of the following statements can NOT be true? A) Vonetta is on a WAN. B) Vonetta is on a extranet. C) Vonetta is on a P2P network. D) Vonetta is […]
QUESTION Carmela is browsing a website for high-end clothing. When paying premium prices, she looks for fabric and workmanship. She can’t touch the products, but she can click an image to get a detailed look at textures or seams. What technology allows Carmela to make an informed purchasing decision? A) artificial intelligence B) zoom technologies […]
QUESTION Which of the following is NOT related to the Internet? A) server B) peer-to-peer network C) the Web D) virtual private network E) browser ANSWER Answer: B Explanation: B) In a P2P network, all microcomputers communicate directly with one another without relying on a central server. Users on P2P networks can communicate and […]