You cannot access a file in a computer that belongs to your friend. Name the software that prevents you from accessing the file.
What is the firewall?
100
You are unable to log on to your e-mail account. You realize that someone has changed the password without your knowledge. Describe the name given to this type of activity.
What is theft?
100
While reading a novel, you realize that the author has copied material from another author. Name this violation.
What is plagirism?
100
Someone has tampered with your computer and erased data. Provide the name of this type of computer threat.
What is security?
100
Cornelia uses Microsoft® Office Excel® 2007 to create a worksheet that contains the estimated costs of her business project. She wants to update certain costs. Name the component of Excel 2007 that will display the changes in the worksheet.
What is the work area?
200
Your computer does not work when it heats up. Describe what is affecting your computer in this case.
What is the enviroment surrounding the computer?
200
Markus creates a document by using Microsoft® Office Word 2007 and saves it with the name Office.doc. What component of Word 2007 will display the document name?
What is the title bar?
200
Monica recently heard about copyright. She wants to know what actions violate copyright. Provide and example related to software and breaking copyright laws.
What is Copying software and distributing it to your friends?
200
You want a new stand-alone computer. Desribe what you will do to prevent others from accessing your confidential data in this computer.
What is use a name and password?
200
You create a business presentation by using Office PowerPoint 2007. Name the key you will use as a shortcut to display a slide show in PowerPoint 2007.
What is F5?
300
After a voltage fluctuation, your computer stops working.
What should you do to prevent this problem in the future.
What is use a surge protector?
300
You accidentally delete a registry file. Now you cannot start your computer. Name this type of computer threat.
What is human error?
300
Ken decides to download the latest song from his favorite band from a publicly available Web site and share it with his friends. Name the crime that Ken is committing?
What is Breaching copyright?
300
Your friend is confused with the terms privacy and security. She comes to you with a list of threats to computers. Tell her the question to how you will categorize a threat to computer privacy.
What is theft of confidential data?
300
You are at the tenth page of a 20-page document. You need to make changes on the last page of the document.
Which key will you use in combination with CTRL to move to the bottom of the last page?
What is END?
400
You spilled coffee on your computer. Name this type of threat.
What is human error?
400
Stephan creates a business presentation by using Microsoft Office PowerPoint 2007. He saves it with the name Presentation.pptx. Stephan opens the file to make some changes, and he wants to save it with a different name. Name the command on the Microsoft Office menu will Stephan use to save the file with a different name
What is SAVE AS?
400
For a project, Bill decides to use content from a Web site. However, he forgets to state the source. Name what crime Bill has committed.
What is Plagiarism?
400
You use Office Word 2007 to create a business document. You copy text from another document and want to add it to your business document. Name the group on the Home tab will you use for this.
What is the clipboard?
400
Peter wants to protect a confidential document by using a password. He wants to use an asterisk and an ampersand symbol in his password. Which of the following keys does he press in combination with the number keys to correctly type the symbols in his password?
What is shift?
500
You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Describe this activity.
What is online predating?
500
Nina uses Excel 2007 to create a work plan for her team. She wants to print the plan and discuss it with the team members in a meeting. Name the tab that Nina use to print the plan
.
What is page layout?
500
Glenn notices that his colleague is making false statements about him in an online public forum. Name the crime that Glenn's colleague is committing.
What is defamation?
500
Ewa creates a table by using Word 2007 to record some data. She wants to increase the size of the text in the table to make it more readable. What is the group on the Home tab will Ewa use to change the size of the text in the table?
What is font?
500
You create a document by using Office Word 2007. You need to enter the copyright symbol in this document. Which key combination will you use to add the copyright symbol?