View
226
Download
4
Tags:
Embed Size (px)
Computer TechnologyPowerPointJeopardy
1002003004003002002002001001001005004004004003003006006005005005006006008007001000900WordExcelEthics700800800700Vocab900100090010007008009001000
100When a line gets too long and the extra words are moved automatically to the next line as you key, this is known as:A. WordinessB. Page formatC. Page layoutD. Word wrapAnswer
100
D. Word wrapHome
200Identify the spacing used in the paragraph belowSometimes the online world can feel pretend because you cannot see the person with whom you are communicating.Answer
200
DoubleHome
300Which tool helps you create a neatly aligned list (not bullets) as below?Subjects in schoolEnglishMathScience P.E.
Answer
300
TabsHome
400Which tool might be used to suggest words that have the same meaning to replace other words?A. DictionaryB. Search and ReplaceC. Spell CheckD. Thesaurus, SynonymsAnswer
400
D. Thesaurus, SynonymsHome
500Which of the following does Spell Check find?A. TwoB. FormC. WeveD. ToE. FromF. WeveAnswer
500
C. WeveHome
600When a green line appears under the text, it indicates which type of error?A. SpellingB. GrammarC. Alignment D. CapitalizationAnswer
600
B. Grammar Home
700What would you use to save a file in another location from where it was originally saved?A. SaveB. Drag and drop folder in new locationC. Copy and pasteD. Save AsAnswer
700
D. Save AsHome
Which of the following is not computer hardware?
A B C D800Answer
800
B. Windows softwareHome
900The reference initials at the bottom of a memo or a business letter are the initials of theA. Person the letter is fromB. Person that is receiving the letterC. Person who typed the letterD. Person who is receiving a copy of the letter.Answer
900
C. Person who typed the letterHome
1000What is the boundary of blank space at the top, bottom, left and right of the page?A. MarginsB. Header/FooterC. Room to create a borderD. There is no name for itAnswer
1000
A. MarginsHome
100What is a mathematical equation that adds, subtracts, multiplies, or divides data in a spreadsheet?A. Linear EquationB. Propositional FormulasC. Constant EquationD. FormulasAnswer
100
D. FormulasHome
200Which type of chart would be best for showing one piece of data in comparison to the whole?A. Pie ChartB. Bar GraphC. Scattered PlotD. Line GraphAnswer
200
A. Pie ChartHome
300What is the term for a spreadsheet that is selected and ready to receive information?A. Living CellB. Active CellC. Acting CellD. Open CellAnswer
300
B. Active CellHome
400If I am sorting lowest to highest, I am sorting in ___________________ order.Answer
400
AscendingHome
500The best chart to show how data changes over time is a:A. BarB. PieC. LineD. ScattergramAnswer
500
C. LineHome
600The most subscriptions were sold for which magazine?A. TV GuideB. TimeC. NewsweekD. Sports IllustratedAnswer
600
D. Sports IllustratedHome
700
The total amount of money received for each magazine is calculated in which column?A. Column AB. Column BC. Column CD. Column DAnswer
700
D. Column DHome
800What is the result of the formula (B2-B3)/2A. 8B. 4C. 2D. 6Answer
800
B. 4Home
900Which chart element explains what the colors, patterns, or symbols represent?A. DescriptorB. LegendC. CipherD. CaptionAnswer
900
B. LegendHome
1000What mathematical operation is represented by this symbol * ?A. SubtractionB. AdditionC. MultiplicationD. DivisionAnswer
1000
C. MultiplicationHome
100Which type of software can be examined free of charge during a trial period, but requires payments to the owner for permanent use?A. Public DomainB. CommercialC. SharewareD. FreewareAnswer
100
C. SharewareHome
200Most commercial software prevents users from making multiple copies because it isA. CopyrightedB. PatentedC. BitmappedD. LockedAnswer
200
A. CopyrightedHome
300A person who sneaks into your computer files with bad intentions is known as:A. OperatorB. HackerC. NerdD. EnthusiastAnswer
300
B. HackerHome
400Which is NOT a computer crime?A. Making a copy of the file that contains your social studies report.B. Making a copy of your teachers electronic gradebook without permissionC. Threatening to put a virus on someones elses computerD. Changing your grade on the teachers computer without permission.Answer
400
A. Making a copy of the file that contains your social studies report.Home
500Which of the following statements about software programs is considered illegal:A. Throwing away used software diskettesB. Using commercial software without paying for it.C. Using shareware on a trial basisD. Distributing freeware to everyone you know.Answer
500
B. Using commercial software without paying for it.Home
600When software has an all rights reserved copyright what can a user do with the software? A. Use it exactly as the owner has set upB. Find other uses for itC. Personally take credit for itD. Share it with othersAnswer
600
A. Use it exactly as the owner has set up.Home
700Which of the following is NOT considered unethical behavior on the Internet?A. Downloading softwareB. Using profanity in a chat roomC. Breaking into chat room conversations uninvitedD. Uploading a virus to othersAnswer
700
A. Downloading softwareHome
800The standards of good moral conduct or principles is known as:A. SecurityB. SolutionsC. EthicsD. PrivacyAnswer
800
C. EthicsHome
900You are writing a paper for a class and you use a quote from an Internet resource. If you abide by accepted ethics you:A. Give them creditB. Use quotations and italicsC. Use quotations and underlineJust put the persons name in parenthesis after the quoteAnswer
900
A. Give them creditHome
1000
True/False: There are federal rules the congress has passed to regulate and penalize those who violate the ethic rules (plagiarism, copyright law.ect.) A. TrueB. FalseAnswer
1000
A. TrueHome
100
True/False: Only the sender and receiver of an email can see it.A. TrueB FalseAnswer
100
B. FalseHome
200Which one of the following does not narrow a keywords search?A. IFB. ORC. NOTD. KeyboardAnswer
200
A. IFHome
300What is a web browser?A. Sites like Google and Yahoo.B. The search box at the top.C. Allows you to see the internet like Internet Explorer or Safari.D. The hypertext links.Answer
300
C. Allows you to see the internet like Internet Explorer or Safari.Home
400What is ROM?A. Storage area that loses all data when the computer is turned off.B. The memory that comes with the computer, it cannot be added to; permanent. C. Fundamental unit of info in a computerD. A rigid, magnetic disk mounted permanently in a drive unit.Answer
400B. The memory that comes with the computer, it cannot be added to; permanent. Home
500What is Hertz?A. A unit to measure the speed in computers.B. A configuration of electrically and electro-magnetically connected computers.C. The physical components of a computerD. A sequence of adjacent bitsAnswer
500
A. A unit to measure the speed in computers.Home
600What is Binary Code?A. A code put into a computer so hackers cannot get in.B. The process of starting up your computer.C. A Base 2 number system.Answer
600
C. A Base 2 number system.Home
700What does the acronym CPU stand for?A. Computer Processing UnitB. Central Programming UnitC. Computer Programming UnitD. Central Processing UnitAnswer
700
D. Central Processing UnitHome
800What are spreadsheets, presentations and word processing programs?A. Application SoftwareB. Editing SoftwareC. Operation SoftwareD. Programming SoftwareAnswer
800
A. Application SoftwareHome
900Which view in an electronic presentation displays only miniature versions of slides on the screen so that you can move and arrange slides easily by dragging?A. Slide SorterB. View ArrangerC. Slide EditorD. View SorterAnswer
900
A. Slide SorterHome
1000Which of the following is not a domain?A. MilB. IncC. NetD. IntAnswer
1000
B. IncHome
******************************************************************