concepts3_AnnaBirkstedt - Your Answer: spreadsheet Page...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Practice Test Study Guide Results Your Final Score: 8 out of 10 = 80% You can use Windows Explorer to browse the Web. Incorrect Answer Correct Answer(s): False Your Answer: True Page reference: 143 The _________ for a document refers to the way that all the elements of a document - the text, pictures, titles, and page numbers - are arranged on the page. Correct Answer!! Your Answer: format Page reference: 127 __________ software is an example of utility software. Correct Answer!! Your Answer: B. Security Page reference: 122 In addition to a spelling dictionary, your word processing software is likely to include a(n) ____________, which can help you find a synonym for a word so that you can make your writing more varied and interesting. Correct Answer!! Your Answer: thesaurus Page reference: 127 Rootkits are usually distributed by _________. Correct Answer!! Your Answer: D. Trojans Page reference: 165
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A(n) ___________ uses rows and columns of numbers to create a model or representation of a real situation. Correct Answer!!
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Your Answer: spreadsheet Page reference: 130 When purchasing software, first check out the ________ requirements, which specify the operating system and minimum hardware capacities necessary for the software product to work correctly. Correct Answer!! Your Answer: system Page reference: 145 A(n) ___________ checker reads through your document and points out incomplete sentences, run-on sentences, and verbs that don't agree with nouns. Correct Answer!! Your Answer: grammar Page reference: 127 A computer under the control of a bad _________ is sometimes referred to as a zombie because it carries out instructions from a malicious leader. Correct Answer!! Your Answer: bot Page reference: 164 Virus signatures and other information that antivirus software uses to identify and eradicate malware is stored in one or more files usually referred to as virus __________. Incorrect Answer Correct Answer(s): definitions Your Answer: protection Page reference: 168...
View Full Document

This note was uploaded on 02/03/2011 for the course CIS 4 taught by Professor Matt during the Spring '09 term at Santa Monica.

Page1 / 2

concepts3_AnnaBirkstedt - Your Answer: spreadsheet Page...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online