

Computer Applications
Question Bank
Course Introduction
Computer Applications is an introductory course that explores the fundamental concepts and practical skills required to effectively use common computer software and digital tools. Students will gain hands-on experience with word processing, spreadsheets, presentations, database management, and internet applications. The course also covers basic computer literacy, file management, and the ethical use of technology, preparing students to efficiently navigate and utilize digital resources for academic, professional, and personal purposes.
Recommended Textbook
New Perspectives Computer Concepts Enhanced Comprehensive 2016 19th Edition by June Jamrich
Available Study Resources on Quizplus
12 Chapters
1290 Verified Questions
1290 Flashcards
Source URL: https://quizplus.com/study-set/1231 Page 2


Chapter 1: Digital Content
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24289
Sample Questions
Q1) All of the data stored and transmitted by digital devices is encoded as bits.
A)True
B)False
Answer: True
Q2) Image editors provide an image __________ that can be used to adjust the brightness values for various ranges of dark, mid-range, or light pixels
Answer: histogram
Q3) Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.
Answer: phonemes, phoneme
Q4) Data becomes _______ when it is presented in a format that people can understand and use.
Answer: information
Q5) Text-to-speech software analyzes the words in a section of text, finds corresponding phonemes, and combines them into sentences for output.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Digital Devices
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/24290
Sample Questions
Q1) Processors based on ____ technology dominate tablet computers and smartphones.
Answer: ARM
Q2) A USB _____ is an inexpensive device that turns one USB port into multiple ports. Answer: hub
Q3) System software is a set of computer programs that helps a person carry out a task.
A)True
B)False
Answer: False
Q4) Keyboards and printers are two examples of _________ devices.
Answer: peripheral
Q5) Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called ____________ that combine sensors with processing circuitry.
A) microcontrollers
B) microcomputers
C) servers
D) microdevices
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networks
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24291
Sample Questions
Q1) The most widespread wireless channels for communication networks are microwaves and RF signals.
A)True
B)False
Answer: True
Q2) Wireless connections use licensed frequencies that are available for public use.
A)True
B)False
Answer: False
Q3) Data cannot flow over multiple networks that have different topologies.
A)True
B)False
Answer: False
Q4) In a wireless network, RF signals are sent and received by a ______________.
Answer: transceiver
Q5) A ________ networks allow visitors to access the Internet through a LAN, but doesn't allow them to access other resources and data on the network.
Answer: guest
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Web
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/24292
Sample Questions
Q1) _____ is the current HTML specifications.
Q2) Which of the following is data that would NOT be found in a cookie?
A) information it reads from your hard drive
B) access date
C) customer number
D) shopping cart number
Q3) Ted Nelson developed the specifications for URLs, HTML, and HTTP.
A)True
B)False
Q4) A set of commands called HTTP ________ help your browser communicate with Web servers.
Q5) A __________ cookie is set by a site other than the one you connected to.
A) session
B) third-party
C) persistent
D) first-party
Q6) Web crawlers gather material from the invisible Web.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6
Q7) A search __________ is a word or symbol used to narrow or broaden your search.

Chapter 5: Social Media
Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/24293
Sample Questions
Q1) On a communication matrix, where would blogs be found?
A) Public synchronous
B) Public asynchronous
C) Private synchronous
D) Private asynchronous
Q2) By some estimates, nearly 40% of all online identities are fake.
A)True
B)False
Q3) The number of teens using Facebook increased 30% in 2014.
A)True
B)False
Q4) A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
Q5) Which of the following is the least important characteristic of content communities?
A) Reputation
B) Identity
C) Conversations
D) Sharing
Q6) Twitter messages, called _________, carry a limit of 140 characters.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Software
Available Study Resources on Quizplus for this Chatper
114 Verified Questions
114 Flashcards
Source URL: https://quizplus.com/quiz/24294
Sample Questions
Q1) In a database, a(n) _________ holds data for a single entity.
Q2) Paragraph style includes the alignment of text within the margins and the space between each line of text.
A)True
B)False
Q3) As with other popular mobile operating systems, Android is designed for _______ processors.
Q4) Which of the following is not a file-naming convention?
A) Avoid using symbols.
B) Maximum length is 256 characters.
C) Do not use reserved words.
D) Spaces are not allowed
Q5) A local application is installed on a computer's hard disk.
A)True
B)False
Q6) Which of the following is a file management utility?
A) Finder
B) File Explorer
C) Neither of the above
D) Both A and B
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Digital Security
Available Study Resources on Quizplus for this Chatper
106 Verified Questions
106 Flashcards
Source URL: https://quizplus.com/quiz/24295
Sample Questions
Q1) A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
Q2) Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
A)True
B)False
Q3) A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
A) zero-day
B) rootkit
C) brute force
D) dictionary
Q4) The objective of a MITM attack is for a third party to block communications between two entities.
A)True
B)False
Q5) Most mass-mailing databases are legitimately compiled from customer lists.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The Ict Industry
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/24296
Sample Questions
Q1) Apple released the first Apple Macintosh computer in what year? ___________
Q2) A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
A) non-compete clause
B) confidentiality statement
C) proprietary information
D) code of ethics
Q3) _________ is the monetary value of all the goods and services produced by a nation's workforce on an annual?basis.
A) Productivity
B) GDP
C) ITC growth
D) PLC
Q4) Second-generation computers used ________ instead of vacuum tubes.
Q5) Whistleblowing is risky under any circumstances.
A)True
B)False
Q6) The years between 1920 and 1960 are considered the Golden Age of ________.
Q7) _________ workers are not official employees of a company.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Information Systems
Available Study Resources on Quizplus for this Chatper
121 Verified Questions
121 Flashcards
Source URL: https://quizplus.com/quiz/24297
Sample Questions
Q1) During the ____________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.
Q2) A transaction processing system is characterized by its ability to:
A) Collect, display, and modify transactions.
B) Store transactions.
C) List transactions.
D) all of the above
Q3) The ____________ phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems.
Q4) The acronym ERP stands for enterprise relationship payment.
A)True
B)False
Q5) In business circles, the galaxy of services that revolve around customers is called ___________.
Q6) An ecommerce ____________ is the software that handles ecommerce transactions.
Q7) A major source of data for CRM is produced by loyalty programs.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11
Q8) _________ determine organizational goals and plan how to achieve those goals.

Chapter 10: Databases
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/24298
Sample Questions
Q1) 1024 Zettabytes = 1 _______.
Q2) Access to databases is usually open to anyone within an organization or business.
A)True
B)False
Q3) A lookup routine validates an entry by checking data in an in-house or third-party database.
A)True
B)False
Q4) Which of the following is not a SQL keyword?
A) DELETE
B) REMOVE
C) CREATE
D) SELECT
Q5) A table's physical sort order is the order in which records are arranged on storage devices.
A)True
B)False
Q6) In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Programming
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/24299
Sample Questions
Q1) A subclass is any class that inherits attributes from a superclass
A)True
B)False
Q2) Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.
A)True
B)False
Q3) The procedural approach is best used for problems that can be solved by following a step-by-step algorithm.
A)True
B)False
Q4) Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.
A) COBOL
B) SIMULA
C) Python
D) Java
Q5) A(n) ___________ is a segment of code that defines an action.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Step-By-Step Programming With Python
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/24300
Sample Questions
Q1) A class from which attributes and methods can be inherited is called a _______.
Q2) In mathematics, the order of _______ is a collection of rules that dictate which procedures to perform first when calculating an arithmetic expression.
Q3) To advance the number of times a statement is executed, use a(n) ________-loop.
A) if
B) else
C) for D) none of the above
Q4) When you do not know in advance the number of times you want to execute a statement, use a ______-loop.
A) for B) while C) if D) none of the above
Q5) Which of the following is a concatenation operator?
A) + B) #
C) = D) <
To view all questions and flashcards with answers, click on the resource link above. Page 14