Professional Documents
Culture Documents
IT Application Tools in Business
IT Application Tools in Business
-E
- 0000
-6
- 00011000
- 111001
- 3370
- 0001
- 45
- 0010
- True
- 01011
- 66
- 11E
- 145.12
- (000)2
-E
- 163
- 21
- 1010
-6
- True
Attack launched by a third-party computer by using someone else's computer to launch an attack, it
becomes far more difficult to track down the actual attacker.
- Indirect attacks
- Reliability
The act of surreptitiously listening to a private conversation, typically between hosts on a network.
- Eavesdropping
It is the protection of personnel, hardware, programs, networks, and data from physical circumstances
and events that could cause serious losses or damage to data.
- Physical Security
- Hidden
- Authentication
A class of malicious code that "detonates" or goes off when a specified condition occurs.
- Logic bomb
An unauthorized user gaining physical access to a computer (or part thereof) can perform many
functions, install different types of devices to compromise security, including operating system
modifications, software worms, key loggers, and covert listening devices.
- Direct-access attacks
Two or more users work with the computer at the same time
- Multiuser
- Availability
File may be viewed, copied, executed (if appropriate), but not changed. It can be deleted.
- Read Only
- Archive
Someone who seeks and exploits weaknesses in a computer system or computer network, “a clever
programmer“.
- Hacker
- Vulnerability
- Worm
The confidential information sent by A to B which is accessed by C without the permission or knowledge
of A and B.
- Integrity
Two or more parts of the same process running at the same time.
- Multithreading
Assurance that the systems responsible for delivering, storing and processing information are accessible
when needed, by those who need them
- Availability
A situation in which one person or program successfully masquerades as another by falsifying data and
thereby gaining an illegitimate advantage.
- Spoofing
- Open
- The Ribbon
- highlight
Press ______ to move the insertion point to the beginning of the document.
- <Ctrl> + <Home>
How can you display hidden text, such as tabs and paragraph marks?
- Click the Show/Hide button in the Paragraph group of the Home tab on the Ribbon.
- A customizable toolbar of common commands that appears above or below the Ribbon.
- Clipboard
- .docx
- Show/Hide
- <Backspace>
- Insertion Point
- Ribbon
Where can you find basic file management commands and program options?
- File tab
- <F1>
- Backspace key
This view displays your document as it will appear when printed and is best for working in documents
with images.
- Status Bar
- Orientation
The _______________ provides the space for your worksheets and workbook elements such as charts.
- Application Window
Changes the space between the cell border and its content
- Indent
______________ is a software program produced by Microsoft that allows users to organize, format and
calculate data with formulas using a spreadsheet system.
- Microsoft Excel
- Auto-hide Ribbon
It contains multiple tabs, each with several groups of commands. You will use these tabs to perform
the most common tasks in Excel.
- Ribbon
- Alignment
In an _________ range, all cells touch each other and form a rectangle.
- Adjacent
- Merge
A ________ is a grid of rows and columns in which you enter text, numbers, and the results of
calculations.
- Spreadsheet
- Range
_______ determines the best width for a column or the best height for a row.
- Auto Fit
In the __________________, you can enter or edit data, a formula, or a function that will appear in a specific
cell.
- Formula bar
- Cells
- Column
- Name box
- Workbook
- Name box
- Blank
Each slide has an area where text and graphics are entered for a presentation.
- Work Area
Slide Themes that have design concepts, fonts, and color schemes.
- Design
You can change the format appearance of text and slides in the Slide View as well. Formatting can be
applied to all slides at the same time as in the Master View or only on an individual slide.
- Format Slide
- Title bar
- PowerPoint
Which key do you press to go into Slide Show view and always start on the first slide?
- F5
- View
- Presentation Master
_______________ are designated by dotted lines; they appear on a slide as guides, but they will not appear
on the finished presentation.
- Placeholders
___________________ is a presentation application that enables an individual from any technical level to
create a dynamic and professional-looking presentation
- Microsoft PowerPoint
____________ are visual special effects that you see when you move from one slide to the next.
- Transitions
PowerPoint has a set of Master Slides available for every Design Theme. The three Masters include a
Slide Master, Handout Master, and ______.
- Notes Master
- Design Theme
- Thumbnail slide
These are designated by dotted lines; they appear on a slide as guides, but they will not appear on the
finished presentation.
- Placeholder
Amount of data that can be transferred from one point to another in a certain time period
- Bandwidth
Type of Network Bridge and modem that provides bi-directional data communication via radio
frequency channels on a HFC and RFoG infrastructure
- Dial-up connection
- Broadband
Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited
amount of information can be transferred.
- Narrowband
Electronic messages sent over the Internet can be easily snooped and tracked, revealing who is talking
to whom and what they are talking about.
It is a global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/ IP) to serve billions of users worldwide.
- Internet
The main page that all of the pages on a particular Web site are organized around and link back to is
called the site’s ___________.
- Home Page
It is the largest network in the world that connects hundreds of thousands of individual networks all over
the world.
- Internet
A collection of linked Web pages that has a common theme or focus is called a Web site.
- Website
- True
It is now an essential communication tools in business.
You can access many ‘chat rooms’ on the web that can be used to meet new people, make new friends,
as well as to stay in touch with old friends.
- Online Chat
It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often
compared to mass junk mailings.
- Spamming
Amount of data that can be transferred from one point to another in a certain time period
- Attenuation
A commercial organization with permanent connection to the Internet that sells temporary connections
to subscribers.
- Entertainment
It consists of information organized into Web pages containing text and graphic images.
It is an electronic machine that follows a set of instructions in order that it may be able to accept and
gather data and transform these into information.
- Computer
What year did admiral Grace Murray Hopper finds a moth among the relays of a Navy computer and
calls it a “bug.”
- 1945
- Malicious code
1 TB is compose of?
- 1024 gigabytes
- Information disclosure
- Input Device
- MD
It is a unit of information equivalent to the result of a choice between only 2 possible alternatives in the
binary number system.
- Bit
They are known as crackers or dark-side hackers. Someone violating computer or Internet security
maliciously or for illegal personal gain.
- CPU
What year did the first Microsoft Word-based virus, spreads worldwide using macro commands.
- 1995
It directs and controls the entire computer system and performs all arithmetic and logical operations.
- Central Processing Unit
Executes all arithmetic and logical operations. Arithmetic calculations like as addition, subtraction,
multiplication and division.
An electronic device, operating under the control of instructions stored in its own memory that can
accept data (input), process the data according to specified rules, produce information (output), and
store the information for future use
- Computer
- 10
- Flash Disk
The core of the OS. Interacts with the BIOS (at one end), and the UI (at the other end).
- Kernel
It refers to the physical parts or components of a computer such as the monitor, mouse, keyboard,
computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory,
motherboard and chips), etc. all of which are physical objects that can be touched
- Hardware
It is a piece of software, a chunk of data, or sequence of commands that takes advantage of a
software "bug" or "glitch" in order to cause unintended or unanticipated behaviour to occur on
computer software, hardware, or something electronic (usually computerized).
- Exploits
- Minicomputer
DOS command to remove a directory or an entire directory tree.
- RD
It is a sequence of 8 bits (enough to represent one character of alphanumeric data) processed as a single
unit for information.
- Byte
It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of
your hand or in your pocket.
- Mobile Device
- Information
- Authentication
- Operating System
- Data
Is responsible for controlling, integrating, and managing the individual hardware components of a
computer system so that other software and the users of the system see it as a functional unit without
having to be concerned with the low-level details.
- System Software
_________ of user identity describes a situation in which one person or program successfully masquerades
as another by falsifying data and thereby gaining an illegitimate advantage.
- Spoofing
The ROM stands for?
- ROM
The program is meant to make computers more efficient, but later hackers modify it into computer
viruses that destroy or alter data.
- Worm
The principle of ________________ specifies that only the sender and the intended recipient should be able
to access the content of the message.
- Confidentiality
___________, a University of Southern California doctoral student, comes up with term “computer virus.”
- Fred Cohen
- Software
It is a battery or AC-powered personal computer that can be easily carried and used in a variety of
locations.
- Laptop
- Mainframe
This is any peripheral (piece of computer hardware equipment to provide data and control signals to an
information processing system such as a computer or other information appliance.
- Input Devices
A ___________ in a computer system, is a method of bypassing normal authentication, securing remote
access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.
- Backdoors
It is used to accomplish specific tasks other than just running the computer system.
- Application Software
- Binary Language
- Hardware
- Vulnerability
- Data Processing
It is basically any handheld computer. It is designed to be extremely portable, often fitting in the palm of
your hand or in your pocket.
- Mobile Device
- Information disclosure
- Data Insert
- Cell
What is the control center located below the title bar at the top of the Microsoft Word window called?
- Ribbon
To save an existing document with a new file name or to save an existing document in a new location,
which command is used?
- Save As
In Excel, the name of the bar where information appears as you input data is called?
- Formula Bar
An operator is a symbol that indicates the type of calculation to perform on the operands, such as a plus
sign (+) for addition.
- Operator
Moves data to a new line when the cell is not wide enough to display all the contents
- Wrap Text
- Operator
To alert Excel that you are entering a formula and not text, type a ____________ preceding the formula.
-=
The __________, or cell reference area, displays the cell reference of the active cell.
- Name Box
On the View Ribbon, which command allows the document to be viewed as it would appear in a
multilevel outline?
- Print Layout
What is the cell in the worksheet in which you can type data?
- Active cell
- Columns
Work in ___________ when you need to organize and develop the content of your document.
- Outline view
- Cell
- WordArt
If I want to find an average of cells A1 through A25, which formula would I use?
- =average(A1:A25)
- Selection cross
A number of letter that appears little above the normal text is called :
- Superscript
When creating a chart in Excel, what is the first thing you need to do?
When you reach the right margin, the text continues on the next line. This feature is called _______.
- Word Wrap
This is activated by default. This allows you to scroll down both windows at the same time.
- Synchronous Scrolling
Which action would Drake take to insert the contents from the Office Clipboard into a document?
- Paste
- Ctrl + E
- Orientation
- Print Layout
- xls
- Left
The cell in the worksheet in which you can type data is called the __________.
- Active Cell
To store a new or existing file with the same name, which button is used?
- Save
- Workbooks
It is the intersection of a row and a column
- Cell
- Row
- Ctrl + A
- Sum
- File name
To save a new file or an existing file in its same storage location, which commonly used shortcut key or
keyboard key combination is used?
- CTRL+S
- Saving a document
_____________ adjusts the size of the windows so that they share the screen equally.
- Side by Side
- cell
This view is good for most simple word-processing tasks, such as typing, editing, and formatting.
- Draft view
Microsoft Excel is what kind of software?
- Spreadsheet Software
A ______ is a preset collection of design elements, including fonts, colors, and effects.
- Theme
- Backstage view
To specify the size of the viewable area and allow users to reduce or enlarge the size of a document
window, which command is used?
- Zoom
This view is optimized for reading on a portable device, such as a tablet or smart phone.
- Read Mode
- Delete Key
Display headings and text in outline form so you can see the structure of your document and reorganize
easily.
- Outline
- Formula