You should regularly do this to ensure you do not loose important digital information forever.
What are some examples of common "categories" of software
System,
Application,
Productivity,
Development,
Entertainment,
Games
What is the file name "extension" for a Microsoft Word 2016 (or later) document file?
In Excel, this is the keyboard shortcut for a Windows/PC computer to select the first cell (cell A1) in a spreadsheet.
CTRL+HOME
What is the World Wide Web.
This component in a computer is like a file cabinet. It is meant to store information even when the computer is turned off.
A hard disk or "disk".
This is the name of the operating system that runs an Apple iPhone
iOS
You can use the "Styles" feature of Microsoft Word to quickly format text that is meant to be a document title, chapter, or sub chapter heading in a predefined way. In addition, to formatting the text, setting text to a Heading "Style" also does this automatically.
Add that title or heading into the document's table of contents.
This is also an important step to ensure documents you create are readable by those with visual impairments.
Select the cell
An HTML tag that references or links to another web page.
What is <a href>
"Megahertz" is often abbreviated as ""Mhz". "Gigahertz" is often abbreviated as "Ghz". What does this mean and what computer component usually has it's performance measured in Mhz?
A) Megahertz means millions of cycles per second
B) Gigahertz means billions of cycles per second
C) The CPU
One of the primary tasks all computer operating systems perform is
Managing hardware resources such a the CPU, storage, RAM
If you wanted Microsoft Word to automatically keep track of and format the sources of information you used in your research for a document, you would use this feature of Microsoft Word
"Insert Citation" or the "Citations & Bibliography" feature.
"SUM()", "MAX()", "MIN()", "AVERAGE()" are examples of Excel ________
Functions
This is a "stateless" protocol that is designed to transfer HTML files and associated data over the Internet.
What is HTTP.
The electronic components inside a computer, such as the CPU, are mounted on this
What is a "system board" or "motherboard" or "main board".
This type of software allows you to view and possibly modify it's underlying program code. Such software often does not cost money but can cost money.
Open Source.
In Microsoft Excel, how would you copy a formula to adjacent cells so that Excel will automatically update the references in the formula so that references to other cells in the formula are automatically updated based on the new cell the formula has been copied or moved to?
A) Use the "Fill Handle"
B) Click and drag the lower right hand corner of the cell
C) Copy-n-paste the cell with the original formula into the additional cells.
(Note, you might need to select "copy formula" and not "copy values".)
Every formula in Excel must start with this character
The equals sign (=)
A virus
If someone wanted a computer only to access web pages and their online email account and they did not want to spend a lot of money, what type of computer would you recommend?
A tablet computer or a Google Chromebook or similar device.
Software companies often consider an "upgrade" as something different than an "update". What is the difference?
An "upgrade" often provides new capabilities.
An "update" generally fixes software -- such as to remove a security issue.
Upgrades often cost money whereas updates generally do not have any additional cost.
In Excel, write a formula that is equivalent to the following statement:
10% more than the value in cell A1
A) =A1+A1*10%
or
B) =A1*1.10
In Excel, there are two basic types of references you can make to refer to another cell: ______ and ______
Absolute reference ("=$A$1") or
Relative reference ("=A1")
This type of attack floods a target web site with so many requests, the web site is unable to operate normally.
A "denial of service" attack or a "distributed denial of service" attack.
These attacks often rely a a collection of computers, called a "botnet", that can be controlled by the attacker.