1. ______ are attempts by individuals to obtain confidential information from you by falsifying their identity.

a. phishing trips
b. computer viruses
c. Spyware spams
d. viruses
e. phishing scams

2. Why is it unethical to share copyrighted files with your friends
a.it is not unethical, because it is legal
b. it is unethical because the files are being given for free
c. sharing copyrighted files without permission breaks copyrights laws.
d. it is not unethical because the files are being given for free
e. it is not unethical-anyone can access a computer

3. Which of the following can be used to select entire document?
a. CTRL+A
b.ALT+F5
c. SHIFT+A
d. CTRL-K
e. CTRL+H

4. To instruct word to fit the width of a column to the contents of a table automatically, dick the_____ button and then option to auto fit content
a. Fit to form
b. format
c. auto size
d. contents
e. auto fit

5. The simultaneous processing of 2 or more programs by processor is ___________
a. Multi programming
b. multi-tasking
c. time-sharing
d. multi-processing

6. A disk’s content that recorded at his time of manufacture and that cannot be erased by the user is______
a. memory -only
b. write- only
c. once- only
d. run-only
e. read-only

7. What is the permanent memory built in to your computer called?
a. RAM
b. Floppy
c. CPU
d. CD-ROM
e. ROM

8. The default view in Excel is_____________ View.
a. Work
b. Auto
c. normal
d. Roman
e. none of these

9. What displays the contents of the active cell in Excel
a. Name box
b. Row heading
c. Formula Bar
d. Task panel

10. In word you can force a page break___________
a. by positioning your cursor at the appropriate place and pressing the F1key
b. By positioning your cursor at the appropriate place and pressing Ctrl+Enter
c. By using the insert/section break
d. by changing the font size of your documents
e. None of these

Answers:

1.(e), 2.(c), 3.(a), 4.(e), 5.(b), 6.(e), 7.(e), 8(c), 9.(c), 10.(b)