Access
Viruses
Microsoft Office
Computer Hardware
Internet
100

In Microsoft Access, all your data is stored in one or more of these.

What is a table?

100

The classification of viruses that chan change its own code to avoid detection?

What is Polymorphic?

100

What the centralized space for tasks related to file management is called.

What is Backstage View?

100

Where all the startup instructions the computer needs to start are stored.

What is ROM?

100

This gentleman developed the protocol on which the World Wide Web is based.

Who is Tim Berners-Lee?

200

These are the most common database objects.

What are tables, queries, forms and reports?

200

This is a type of virus that is attached to documents such as Word or Excel files.

What is a macro virus?

200

This is the best type of chart to use for comparing the votes received by each candidate in an election.

What is a pie-chart?

200

Access time for hard drives is measured in these units.

What is milliseconds?

200

The portion labeled “http” in the URL http://www.fullcoll.edu/.

What is the protocol.

300

This is the Access view that displays table data in columns and rows.

What is Datasheet view?

300

A portion of virus code that is unique to a particular computer virus.

What is a virus signature?

300

This function could be used to determine how many students had a grade of “A” when recorded in a column of data in an Excel workbook.

What is COUNTIF?

300

This type of storage uses electronic memory and has no motors or moving parts.

What is a solid-state drive?

300

Most home networks use this type of cable, which is most susceptible to interference.

What is unshielded twisted-pair?

400

Locating records in which a field is left blank uses this as the criteria.

What is Is Null?

400

This attack floods a computer with requests until it shuts down and refuses to answer any requests for information.

What is a DDos attack?

400

These are the three elements contained in the Ribbon in each Microsoft program.

What are tabs, groups, and commands?

400

This rule of thumb predicts that the number of transistors on a CPU will double every two years?

What is Moore’s Law?

400

IPv4 no longer had enough unique addresses.

Why was IPv6 introduced?

500

When establishing relationships, common fields need to have this.

What are the same data type and field size?

500

Any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

What is social engineering?

500

A small box that displays useful information when you perform various mouse actions such as point to screen elements or dragging.

What is a ScreenTip?

500

Bluetooth was named after him.

Who is King Harald Blatand?

500

This type of network can contain servers as well as individual computers.

What is a client/server network?