Computer Concepts Mid Term

¡Supera tus tareas y exámenes ahora con Quizwiz!

Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Because they do not allow Internet access Because the connection is often too slow Because it can weaken your own Wi-Fi wireless route

Because these networks are rarely protected

In Windows, you use _____ to reorder, move, and navigate between folders. File Explorer Finder File Finder Folder Explorer

File Explorer

Which of the following is the strongest password? Test1test2test3 colorbluesky Welcome123 H@veAGr3atDaY!

H@veAGr3atDaY!

What does the operating system do if you try to save a file with the same name into the same folder? It moves the new file to a different folder. It overwrites the original file unless you add a number, date, or initials to differentiate the files. It rejects the new file and places a temporary version in the Recycle Bin. It saves the new file on the Clipboard until you paste it in a new location.

It overwrites the original file unless you add a number, date, or initials to differentiate the files.

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? M-commerce app Banking and finance app Photo editing app Social media app

M-commerce app

Which of these is not an input device? Stylus Scanner Printer Webcam

Printer

How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products? They have automated vehicles They use a GPS to avoid traffic delays. They have self-driving trucks. They use handheld computers/scanners.

They use a GPS to avoid traffic delays.

How do delivery companies track packages? They use a learning management system. They use code-scanning technology. They use GPS. They use robotic arms to load packages.

They use code-scanning technology.

How can you check data on devices connected through an IoT network? Use a desktop Use a server Use a tablet Use a network tracker

Use a tablet

What technology can collect information to make decisions, reach conclusions, and combine information in new ways? robotics artificial intelligence (AI) virtual reality (VR) embedded computers

artificial intelligence (AI)

Which of the following is not an input device? microphone scanner headphone keyboard

headphone

Folder names should _____. be as short as possible identify the content and purpose of the folder include an extension that indicates its contents contain more than 255 characters

identify the content and purpose of the folder

Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it? in ROM in RAM in the ALU in the core

in RAM

Which of the following features is a way to make a computer do what you want it to do? executable file menu file extension data file

menu

What is the most common type of volatile memory? read-only memory (ROM) flash memory random access memory (RAM) hard disk

random access memory (RAM)

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard? closed captioning speech recognition software Braille printer audio book

speech recognition software

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him? all-in-one computer desktop computer tablet high-end laptop

tablet

Where can you pin frequently used apps for easy access? to the ribbon to the File menu to the Settings dialog box to the taskbar

to the taskbar

When does the boot process start? when you shut down your computer when you start an app when the computer is about to run out of RAM when you turn on your computer

when you turn on your computer

What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer? A faulty port A dusty computer vent Insufficient space on the hard disk drive An issue with internet connectivity

A faulty port

The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider? An e-book with digital content A learning management system An online tutoring system A social networking platform

A learning management system

How can an attacker execute malware through a script? A script can retrieve and store your personal information, such as your online buying habits. A script searches the Internet for personal information about you. A script can send you a fraudulent email message requesting confidential information. A script can run a series of instructions to download and run malware.

A script can run a series of instructions to download and run malware.

How is a worm different from a Trojan? A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm spreads through a network, whereas a Trojan hides inside another program. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

A worm spreads through a network, whereas a Trojan hides inside another program.

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following? Move his mouse to the other side of the computer. Adjust the settings for the mouse through the Settings dialog box. Adjust the sensitivity of the mouse for smoother movements. Purchase a new computer with a touch screen so he does not have to use a mouse.

Adjust the settings for the mouse through the Settings dialog box.

What is the recommended solution if a computer performs slowly? Decrease the brightness of the display. Install anti-virus software. Install additional RAM. Verify if the AC adapter is connected properly.

Install additional RAM.

Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described? Information classroom Technology classroom Mobile classroom Intelligent classroom

Intelligent classroom

Where on a computer is the operating system generally stored? RAM Internal hard drive Flash drive Virtual memory

Internal hard drive

Which of the following statements is true about the Clipboard? A. It is permanent storage until you choose to delete it. B. It is temporary storage until you choose to remove it, even if you have already pasted it somewhere. C. It is temporary storage that holds a selection until you paste it into a document or folder. D. It is permanent storage similar to a flash drive or the cloud.

It is temporary storage that holds a selection until you paste it into a document or folder

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document? It places the document in a buffer. It transfers the document to the Recycle Bin. It rejects the document, so it needs to be sent again. It does not print either document.

It places the document in a buffer.

How would you describe an intelligent workplace? Its workers all telecommute and use the cloud. It uses technology to enable workers to connect and communicate. It has a bring your own device (BYOD) policy allowing online collaboration. It holds meetings only via web conferencing and markets itself over social media.

It uses technology to enable workers to connect and communicate

How does discarding computers in a landfill affect the environment? Data miners are digging up landfills looking for gold and platinum. Lead and mercury in computer parts are seeping into the ground and water supply. Copper on circuit boards is creating fire hazards. The computer parts quickly decay and become organic material

Lead and mercury in computer parts are seeping into the ground and water supply.

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop? Mobile app Native app Web-based app Cloud-based app

Native app

Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider? Form factor - some games do not run on laptops Processor core - some applications, especially games, have greater processor requirements Size - larger desktops provide more physical space for memory storage, increasing efficiency External hard disk capacity - provides additional temporary storage needed to run heavy applications

Processor core - some applications, especially games, have greater processor requirements

Which of the following is the science that combines technology and engineering? Robotics Natural language processing Augmented reality Digital citizenship

Robotics

What technology is being used when you are sent an email saying you can track your package? Scan code LMS CAM M2M

Scan code

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? First slide Title slide Slide master Last slide

Slide master

What performance specification does 2 GHz refer to? Speed at which the processor executes instructions Speed at which data travels Time taken to fetch and decode instructions Time taken to store the instructions on RAM

Speed at which the processor executes instructions

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Being cautious about what information you post on social networking sites. Storing financial information in an unsent email message. Querying unfamiliar purchases found on your bank statements. Shredding financial documents before you discard them

Storing financial information in an unsent email message.

In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac toe, and other strategy games. How would you describe the developers' goal in teaching the computer these games? The developers were creating virtual reality. The developers were exploring the use of embedded computers. The developers were on the verge of discovering augmented reality. The developers were using artificial intelligence

The developers were using artificial intelligence

Which of the following is an advantage to saving a file to a flash drive? You can access the file from any device connected to the Internet. You can be assured that it saved your changes as you made them. You can take it with you and then work on it on another computer. You know that it is backed up on a hard drive in case you forget the file name.

You can take it with you and then work on it on another computer

What is the binary system? a number system with two digits, 0 and 1 an 8-bit coding scheme a number system with 10 digits, 0-9 a 16-bit coding scheme

a number system with two digits, 0 and 1

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production? commercial virtual reality telecommuting computer-aided manufacturing automated vehicles

computer-aided manufacturing

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. reading wireless transmissions viewing or stealing computer data downloading harmful content creating malware

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberstalking cyberbullying social engineering data mining

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. uninterruptible data supply private copy alarm data backup

data backup

A(n) _____ contains the instructions your computer or device needs to run programs and apps. spreadsheet data file file extension executable file

executable file

If you have a file that has billions of bytes of data, then it would be measured in _____. megabytes gigabytes terabytes kilobytes

gigabytes

What does an operating system provide so you can interact with a device? graphical user interface file storage flash drive platform

graphical user interface

Which of the following helps you more easily locate the files and folders you need? storing each file in a separate folder saving all your files on the desktop grouping similar subfolders together in a folder grouping all your files in one folder

grouping similar subfolders together in a folder

A(n) _____ is a small picture that represents a program, file, or hardware device. pic icon pointer shortcut

icon

Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate? operating system error out-of-date device driver internal hardware problem low battery

internal hardware problem

Which of the following is a characteristic of a strong password? A short phrase numbers in a series letters, numbers, and symbols personal information

letters, numbers, and symbols

Which of the following is a technology designed for use in manufacturing? electronic monitoring bracelets machine-to-machine (M2M) communications bring your own device (BYOD) web analytics

machine-to-machine (M2M) communications

What should you do the first time you save a file? Name the file. Compress the file. Set the file size. Change the creation date of the file.

name the file

Swapping items between memory and storage is called _____. flashing thrashing paging caching

paging

When considering a computer to purchase, which of the following factors involves the operating system of the computer? form factor platform hardware specifications add-on devices

platform

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? folder window program window start window main window

program window

When you want to add information to a document, what role does your operating system play? starts the word processing program provides tools for you to open the document saves your unsaved work to temporary storage finds the hard drive

saves your unsaved work to temporary storage

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate? scanner plotter digital pen projector

scanner

Why do companies use online collaborative productivity software? to promote company events and products to allow employees to share, edit, and comment on documents to take classes or earn a degree online to perform work that is too dangerous, detailed, or monotonous for a single person

to allow employees to share, edit, and comment on documents

A file manager is used for all of the following except ____. to move files to reorder files within a folder to change the contents of files to navigate between folders

to change the contents of files

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation? animations transitions videos sounds

transitions

What type of security requires something you know and something you have that no one else has? biometric security two factor authentication two part passwords data mining

two factor authentication

Which option lists the computer components in order from oldest to newest? integrated circuits, microprocessors, vacuum tubes, transistors, personal computers transistors, vacuum tubes, integrated circuits, personal computers, microprocessors vacuum tubes, transistors, integrated circuits, microprocessors, personal computers microprocessors, vacuum tubes, transistors, personal computers, integrated circuit

vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem? hard drive video card external storage devices built-in camera

video card

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there? robotics embedded sensors virtual reality (VR) GPS

virtual reality (VR)

Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse? A laptop An all-in-one computer A desktop computer A tablet

A desktop computer

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? Microsoft Office G suite Apple iWork Apache OpenOffice

Apache OpenOffice

Which of the following devices is the easiest to upgrade, such as by adding RAM? Desktop computers Tablets Smartphones Laptops

Desktop computers

Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for? Research and software development Technical support Training and support Information security

Information security

______ is data and instructions entered into the memory of a device. Input Output Cache Booting

Input

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files? Because he is using the same name, the computer knows that the files are different so it adds a number to the name. Because he is using the same name, each time he saves he is overwriting his previous work. Because he is using the same name, the second document is put on the Clipboard until he selects a new name. Because he is using the same name, the computer creates a new folder and saves it there.

Because he is using the same name, each time he saves he is overwriting his previous work.

Which of these is an optical medium of storage? Blu-ray disc Solid state drive Cloud storage Hard disk drive

Blu-ray disc

Which of the following refers to a condition in which the CPU performs well but the bus speed is slow? Bottlenecking Clock speed Reboot Instructions per cycle (IPC)

Bottlenecking

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world? A braille printer can be used to print documents. Screen reader software can be used to read what is on the screen. Captioning software can be used to transcribe what is being said. Voice output software can be used to translate what she is saying to text.

Captioning software can be used to transcribe what is being said

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? Change font size, style, and color of the keywords. Define a heading style. Change page margins, size and orientation. Add hyperlinks for each keyword.

Change font size, style, and color of the keywords.

Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently? Point to the title bar of the open window, and then drag the window to a new location. Point to a border or corner of the window, and then drag the resizing pointer to make the window smaller or larger. Click the Minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window. Close all windows except one, and then click the Maximize button on the remaining window.

Click the Minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window.

Which of the following factors can affect processor performance of a CPU? Clock speed Benchmark Hard drive space Number of peripheral devices connected

Clock speed

Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them? RAM ROM Cloud storage Compact disk

Cloud storage

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? Sorting and filtering Run macros Conditional formatting What-if analysis

Conditional formatting

How can you protect personal information gathered by legitimate organizations? Link your credit or debit card to your online accounts. Use the same password and username for all your online accounts. Sign up for many online mailing lists. Create a separate email account for receiving information from websites.

Create a separate email account for receiving information from websites.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Cyberbullying Ergonomics Technology addiction Repetitive strain

Ergonomics

Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems? Faulty power or video cable Improperly connected keyboard Dysfunctional UPS Power fluctuation

Faulty power or video cable

Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology? He is using technology to promote a school event and send emails. He is using technology to teach concepts and reduce the need for paper. He is using technology to create an intelligent classroom with high tech printers. He is using technology to have students work cooperatively in groups and create a presentation.

He is using technology to have students work cooperatively in groups and create a presentation.

Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use? He should choose a product that uses natural language processing, so he can type in where he wants to go. He should choose a digital assistant that guesses where he wants to go based on the date. He should choose a navigation app with artificial intelligence that can provide information about preferred routes. He should choose an app with augmented reality that displays points of interest as he drives.

He should choose a navigation app with artificial intelligence that can provide information about preferred routes.

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware? He should have additional RAM installed on all the computers. He should have the hard disks on all the computers defragmented periodically. He should have periodic anti-virus scanning and software upgraded on all computers. He should have the hardware components like the monitor, keyboard, and CPU vents periodically cleaned.

He should have periodic anti-virus scanning and software upgraded on all computers.

Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control? His health records will now be stored in the cloud. He will not have to visit the doctor as frequently. His doctor will be able to monitor him through the use of a smartphone. He will receive text reminders to take his medications and check his insulin.

He will receive text reminders to take his medications and check his insulin.

Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer? Her coffeemaker that she has set to turn on and make coffee every morning at the same time. Her hot water heater that has to be manually reset every time the power goes out. The sprinkler she has to turn on and off when she wants to water her plants. The carpet steamer she uses to clean her rugs when they get dirty.

Her coffeemaker that she has set to turn on and make coffee every morning at the same time.

How will you decide which browser security settings to allow and which ones to block? If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. I will need to review each browser security setting and use my best judgement. If the browser security setting is on a website sent from a friend, I always accept the setting. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.

I will need to review each browser security setting and use my best judgement.

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her? The kernel triggers a series of steps and checks as the computer loads the operating system. The kernel executes a series of test to check the components and identifies connected devices and checks their settings. The kernel is a temporary storage area designed to help speed up processing time. The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step? Disconnect all output devices. Transfer contents to an external storage device. Disconnect the UPS. Remove the internal hard drive on which the operating system is stored.

Transfer contents to an external storage device.

What is the first step to performing hardware maintenance? Turn off the computer and remove its power source. Install anti-virus software. Disconnect all the input and output devices. Disconnect the UPS and surge suppressor.

Turn off the computer and remove its power source.

How is an executable file different from a data file? Unlike a data file, you can manipulate an executable file. Unlike a data file, executable files contain numbers, words and pictures. Unlike a data file, you cannot open and read executable files. Unlike a data file, executable files can be used for a presentation.

Unlike a data file, you cannot open and read executable files.

How can you protect a computer from electrical spikes and surges? Use a surge protector. Unplug the computer when it is not in use. Use an uninterruptible power supply. Use a cable lock.

Use a surge protector.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. Use a word processor for steps 1 and 2 and a graphics software for step 3. Use mail merge for steps 1 and 2 and a word processor for step 3.

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? Use animations Insert hyperlinks Apply a new theme Add SmartArt

Use animations

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? Develop different versions of the same app for different programs. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Feed the existing code into cross-platform tools to develop different versions of the same app. Use the same set of codes for different platforms.

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Logan is considering web app development as a career option. Which of the following languages does he not need to master? CSS JavaScript HTML5 Visual Basic

Visual Basic

What device do e-learning applications usually use to help users with visual impairment read digital content? Projector Plotter Motion-sensing controller Voice synthesizer

Voice synthesizer

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? Local apps Web apps Portable apps Device management apps

Web apps


Conjuntos de estudio relacionados

Microeconomics Chapter 1 Practice Exam; Mississippi State- Randall Campbell

View Set

Chapter 6 & 7: bone & axial (12)

View Set

Intro to Film: Chapter 6: Cinematography

View Set

Cybersecurity Level 2 Study Guide

View Set

OEA Study guide - Social Studies

View Set

SUA Honors Chemistry 2014 Final exam

View Set

Physiology: Immune System Part 2

View Set

MKTG 300 - Exam 1 Review (Ch 1-3)

View Set

CHAPTER 1 TEST QUESTIONS AND ANSWERS!!!!

View Set