CC-MidTerm Exam Study Guide
What type of security requires something you know and something you have that no one else has?
2 factor authentication
The teachers in Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider ?
A learning management system
How is a worm different from a Trojan ?
A worm spreads through a network, whereas a Trojan hides inside another program
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?
Apache OpenOffice
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files ?
Because he using the same name, each time he saves he is overwriting his previous work.
Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently ?
Click the minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window
Which of the following factors can affect processor performance of a CPU?
Clock speed
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them ?
Cloud storage
Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing disp;ay problems ?
Faulty power or video cable
Which of the following is the strongest password?
H@veAGr3atDaY!
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgment
_____ is data and instructions entered into the memory of a device.
Input
Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described?
Intelligent classroom
Where on a computer is the operating system generally stored?
Internal hard drive
What does the operating system do if you try to save a file with the same name into the same folder?
It overwrites the original file unless you add a number, date, or initials to differentiate the files.
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer.
How does discarding computers in a landfill affect the environment ?
Lead and mercury in computer parts are seeping into the ground and water supply.
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
What should you do the first time you save a file?
Name the file.
Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?
Processor core - some applications, especially games, have greater processor requirements
What technology is being used when you are sent an email saying you can track your package?
Scan code
You can monitor and protect your financial data in all of the following ways EXCEPT ______.
Storing financial information in an unsent email message.
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him ?
Tablets, though not as powerful as other mentioned devices, are convenient to use browse the internet, read emails and store basic data.
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources
How do delivery companies track packages?
They use code-scanning technology.
Computer professionals often suggest restoring the operating system to resolve major computer issues. Which of the following should happen before this step ?
Transfer contents to an external storage device.
Logan is considering web app development as a career option. Which of the following languages does he not need to master ?
Visual Basic
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online ?
Web apps
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
a desktop computer
What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer ?
a faulty port
What is the binary system?
a number system with two digits, 0 and 1
How can an attacker execute malware through a script?
a script can run a series of instructions to download and run malware
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?
adjust the settings for the mouse through the settings dialog box
What technology can collect information to make decisions, reach conclusions, and combine information in new ways ?
artificial intelligence (AI)
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
Which of the following statements is true about the Clipboard ?
because he is using the same name, each time he saves he is overwriting his previous work
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
Which of the following refers to a condition in which the CPU performs well but the bus speed is slow?
bottlenecking
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?
captioning software can be used to transcribe what is being said
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
change font size, style, and color of the keywords
You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?
computer-aided manufacturing
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting is used to highlight cells that meet the specified criteria
How can you protect personal information gathered by legitimate organizations?
create a separate email account for receiving information from websites
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Which of the following devices is the easiest to upgrade, such as by adding RAM?
desktop computers
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
In Windows, you use _____ to reorder, move, and navigate between folders.
file explorer
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
What does an operating system provide so you can interact with a device?
graphical user interface
Which of the following helps you more easily locate the files and folders you need?
grouping similar subfolders together in a folder
Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use?
he should choose a navigation app with artificial intelligence that can provide information about preferred routes
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware ?
he should have periodic anti-virus scanning and software upgraded on all computers
Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control?
he will receive text messages to take his medications & check his insulin
Which of the following is not an input device ?
headphone
Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer?
her coffeemaker that she has set to turn on and make coffee every morning at the same time
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
Folder names should ____.
identify the content and purpose of the folder
Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?
in RAM
Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?
information security
What is the recommended solution if a computer performs slowly?
install additional RAM
Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?
internal hardware problem
Which of the following is a characteristic of a strong password ?
letters, numbers, and symbols
Which of the following is a technology designed for use in manufacturing?
machine to machine (M2M) communications
Which of the following features is a way to make a computer do what you want it to do?
menu
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
Swapping items between memory and storage is called _____.
paging
When considering a computer to purchase, which of the following factors involves the operating system of the computer?
platform
Which of these is not an input device?
printer
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
program window
What is the most common type of volatile memory?
random access memory (RAM)
Which of the following is the science that combines technology and engineering?
robotics
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate?
scanner
Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?
schools use social networking tools to promote school events, work cooperatively on group projects, and teach concepts
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first ?
slide master
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
What performance specification does 2 GHz refer to?
speed at which the processor executes instructions
In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac toe, and other strategy games. How would you describe the developers' goal in teaching the computer these games?
the developers were using artificial intelligence
How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products?
they use a GPS to avoid traffic delays
Why do companies use online collaborative productivity software ?
to allow employees to share, edit, and comment on documents
A file manager is used for all of the following except ____.
to change the contents of files
Where can you pin frequently used apps for easy access?
to the taskbar
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
What is the first step to performing hardware maintenance?
turn off the computer & remove its power source
How is an executable file different from a data file?
unlike a data file, you cannot open and read executable files
How can you protect a computer from electrical spikes and surges?
use a surge protector
How can you check data on devices connected through an IoT network?
use a tablet
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
use a word processor for step1, graphics software for step 2, & a mail merge for step 3
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
use cross platform tools to write code that will translate the existing android app code into different native formats
Which option lists the computer components in order from oldest to newest?
vacuum tubes, transistors, integrated circuits, microprocessors, personal computers
When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem ?
video card
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality (VR)
What device do e-learning applications usually use to help users with visual impairment read digital content?
voice synthesizer
When does the boot process start?
when you turn on your computer
Which of the following is an advantage to saving a file to a flash drive ?
you can take it with you and then work on it on another computer