CSCI Essay Questions for Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

The new product picture on slide 3 has no border. You add one by tapping or clicking the Picture Border arrow on the

(PICTURE TOOLS FORMAT tab, Picture Styles group)

After doing some research into the replacement of your desktop, you decide that a mobile computer might in fact be a better choice for you. You switch gears and reread the buyer's guide for mobile computer purchases from your Discovering Computers textbook. ​ You are very intrigued by the prospects of a sizeable screen for your new laptop. Which of the following is the most you could expect in terms of screen size if you were to purchase an ultrathin laptop?

18 inches is the most you could expect from an ultrathin laptop. 11 inches to 18 inches is usually the range of screens for an ultrathin laptop. Tablet screen sizes are usually 7 inches to 12 inches.

​ PrattLast Associates needs to find the account managers whose start date is earlier than 1/1/2015. What criteria should PrattLast enter in the Start Date column of the design grid?

<1/1/2015

Describe botnets and denial of service attacks.

A botnet, also known as a zombie army, is a group of compromised devices or computers connected to a network that work together to attack other networks. A single compromised device or computer in a botnet is called a zombie. A zombie's owner has no idea their device is being controlled by an outside intruder. Botnets are compromised of bots which are programs that perform a repetitive task. Cybercriminals use bots maliciously to attack computers or devices by spamming, sending viruses or other malware, or commit a distributed denial of service attack. A denial of service attack is exactly how it sounds. The purpose of the attack is to prevent access to services like email or the web. The attacker sends confusing messages to slow the device significantly. A more devastating type of denial of service attack is a distributed denial of service attack which can stop operations on major websites like Yahoo, Ebay, Amazon, and CNN. These attacks can be lasting and fatal to smaller companies.

Explain a search tool and include the term index in your response

A search tool is a program that will find items stored on your computer or device based on a specified criteria. A search tool is usually included in an operating system and finds items like files or contacts. Search tools are helpful as they bring search results from your device and/or the Internet all to on location for your benefit. Search tools use an index to find items. An index stores information about a file like the file's name and creation date. This allows the search tool to check the index for a name or date match instead of looking through every file which allows faster retrieval time.

Perry also decides that he should approve ___ of any proposed worksheet

A sketch

Many people use Excel™ for data storage rather than Access™. What are the possible valid reasons for using Access™ for larger databases which have information that needs to be communicated to a large number of people?

Access has more capabilities than Excel therefore allowing the user to handle larger databases with more ease than Excel. Access has relational database features that allow users to manipulate data in many ways they would not be able to or at least not easily in Excel. Access has a built in program to move data between programs including Excel. Access also allows the user to make queries, reports, and forms that make the data easier to find and understand.

How can George determine the best action to take using a Sales Data worksheet?

Add an IF function to his Sales data worksheet (explain more)

Outline the guidelines for evaluating a website.

Affiliation: A reputable institution should support the website without bias in the information. • Audience: The website should be written at an appropriate level. • Authority: The website should list the author and the appropriate credentials. • Content: The website should be well organized and the links should work. • Currency: The information on the webpage should be current. • Design: The pages at the website should download quickly, be visually pleasing, and easy to navigate. • Objectivity: The website should contain little advertising and be free of preconceptions.

Explain what an IM is, and what the technology shown in the accompanying figure is

An IM is an instant message which allows you to communicate with another person on the internet in real time. The accompanying figure is a chat room. A chat room allows multiple people to instant message each other through an internet service. In a chat room, every one in the chat can see what each other are instant messaging. (more 20/25)

The second image is a digital photograph and color cast has occurred. How can you improve the photograph's color?

Apply recolor effects

Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

As soon as you connect your new wireless access point point or router change the password. If the password stays as the original password, someone may be to connect and adjust your wireless settings. Also, change the the name or the service set identifier(SSID) to something unique for your network. This not only makes it easier to decipher which network is yours if you're in an area with many networks, but also helps prevent intrusion. Once you change the SSID, do not broadcast it. Set it so you have to manually type the SSID in order to connect to it. Doing these steps increases difficulty to intrude your network.

Which of the following features helps Anita be more productive by automatically reducing the number of misspelled or mistyped words?

AutoCorrect

Why is the import feature of being able to adjust the data type of incoming data so important to the efficient acquisition of data from other sources?

Being able to adjust the data type of incoming data allows the data to presented in Access correctly. Say a phone number from Excel is imported to an Access database, the data type would be number. Yes the data is numeric but the numbers are not being used for calculations so the data type should be short text. Being able to change the data type to short text prevents Access from performing calculations on the numbers and data is then presented as it should be in the database.

Discuss what a broadband connection is, how it differs from a dial-up connection, and review the types of broadband connections.

Broadband internet service is an always-on connection for internet users that can be wired or wireless. Broadband differs from dial-up connection because dial-up connects to the phone line to enable internet access. Dial up is also typically slower than broadband. Broadband can be connected in many different ways. Broadband can be wired through a cable internet service, digital subscriber line, or fiber to the premises. Cable connects internet through cable television, DSL connects internet through the telephone network, and fiber to the premises connects internet through a modem. Broadband can also be connected wireless. (more 15/25)

Which of the following do you recommend to your colleague for adding a hanging indent?

CTRL + T

You have a specific topic and design concept and could use some assistance in starting to develop the presentation so you

Can search for one of Microsoft's ready-made presentations or browse one of the predefined categories

Can you help her indicate which of the following is a correct and complete citation for a website?

Cashman, Thomas J. How a USB Flash Drive Works. Course Technology. 14 April 2011. <www.scsite.com/wd2010/pr2/wc.htm>

Which of the following changes you make to your text is an example of paragraph formatting?

Centering all of the lines of text on the title page

Assuming you have successfully constructed a NPV/IRR model for a new investment with a Discount Rate of 5%, how can you determine if the investment would still be positive if the prevailing interest rates went to 12%?

Change the cell in which you have the 5% set as the discount rate to 12%. Then adjust the NPV formula in the first cell of the calculations to the new value of the discount rate and copy the new value down for the rest of the values using the full handle. Then you can analyze the new numbers to determine if the investment is positive.

How can you improve the image's appearance by making its colors more intense?

Change the color saturation

List at least five different practices to adopt in order to avoid being a victim during an ATM visit.

Choose a well lit location that is public and can be seen to avoid any thiefs that could be lurking nearby and go unseen. Keep your ATM card in a safe location and memorize your PIN number. Do not write your PIN number down or in your phone where somebody could see it. Make your transactions fast. Have the card ready as you approach the ATM and always cover your PIN. Do not let anyone watch you make a transaction and be speedy throughout the process will help this. Leave your valuables at home. Don't attract more attention to yourself than you have to. Keep an eye on your bank statements. Make sure transactions are accurate and there is no unusual activity.

How can Angela display a gallery of available themes?

Click the More button in the Themes group

The caption for the Start Date field should be Started when the query results display. How can PrattLast change the caption?

Click the Start Date field in the design grid, and then click the Property Sheet button on the Design tab. You also can right-click the Start Date field and click Properties on the shortcut menu. When the property sheet appears, click the Caption box, and then change the caption to Started.

Which of the following allows you to select the entire table?

Click the table move handle

Leo wants the sales for rye bread, onion rolls, and bagels to look different each time the sales for each exceeds $500. What excel feature can Leo use to accomplish this?

Conditional formatting (explain more)

To specify a floating dollar sign, which of the following formats should Leo apply?

Currency style because that is the only formatting option from the options that would insert a dollar sign. Accounting format would also insert a dollar sign but it would be fixed not floating.

Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

Cybercrime and intrusions fall into seven categories. The first is a hacker, which attempts to access a computer or network illegally by claiming to improve security even though they are attempting to breach security. The next is called a cracker, who like the hacker, accesses illegally, but crackers attempt to destroy data, steal information, or other illegal activities. A script kiddie, has the same intent as a cracker, but isn't advanced enough in skill so they use prewritten programs to attempt to break into computers and networks. Another category of cybercrime is the corporate spy. The corporate spy is someone who is advanced in technology skills and is hired to break into a specific computer and steal it's information or data or to test security in an organization. Another intrusion is called an unethical employee who attempts to access an employer's computer to exploit the company or sell information in order to seek revenge. A cyberextortionist is someone who declares a ransome in order to stop their attack on an organization's technology infrastructure. They demand payment and hold the infrastructure hostage. They threaten to expose information that is confidential or other flaws in the company unless they are paid. The final category of cybercrime is cyberterrorism, which is someone who attacks computers or networks for political reasons. Cyberwarfare falls under the cyberterrorism tag and is when a group of high skilled people with lots of money and planning, attempt to attack a government with a goal ranging from damaging a computer to crippling a country.

What is the first thing he should put immediately below the letterhead, and how far below the letterhead should it appear?

Date line, two to six lines below

Discuss what it means to develop a project. Include explanations of editing and formatting in your answer.

Developing a project means to create something like a document, calender, or many other options by using productivity applications. You enter text or images or other inputs to create a project. After creating a project, you can edit the project. This means to alter the content initially entered into the project. You can add new content, remove old content, or both. To add content you can insert or copy or cut and paste. Cutting is removing the content and putting it on a clipboard temporarily. You then can copy that information and paste it back to the project. Another way to edit the project is to change it's format which is changing it's appearance. That means editing font, font size, font color. or even font style. Changing the look of the font will alter the appearance of the format of the project. (more on saving & distributing 20/25)

Which of the following Excel features helps Anita be more productive by helping her more easily organize and identify her workbook files?

Document properties

After three months, Anna wants to know the average distance she runs. What should she do to calculate the average distance?

Enter the text =av in a cell at the end of the distance data; then select the AVERAGE function from the Formula AutoComplete list and then enter the function's argument

What is the difference between a form and a report in Access™? Which object is the best to use communicating data?

Forms are intended to be displayed and not printed. However, forms may be printed. Reports are designed to be printed. However, they can also be displayed. Since reports are meant to be printed, they are supposed to maximize the data on each page in order to save paper. Where as, forms are not worried about paper use, so they display data in an easy to view format not worried about space. Due to the nature of displaying the data in the clearest format possible, forms are the best way to communicate the data.

He has the following information: courtesy title, full name, business affiliation, and full geographical address, what's he missing?

He is forgetting the job title

Why is it useful for a business manager to be able to easily calculate several loan scenarios quickly on a spreadsheet amortization table?

If the business manager can see several scenarios then the manager can see which loan would be ideal for the business. The ideal loan would fit in to the business' expense plan to not cost the business too much money while still getting the loan paid off so the profit from the subject for which the loan was taken out for is maximized as fast as possible. When the loans are laid out in an amortization table, the manager can view differences in rates, payments, and profits for the business.

Where should Angela look to review different document themes?

In the Themes group on the DESIGN tab

In George's Sales Date worksheet, the result for a formula in cell H14 is ######. What should George do?

Increase the width of the column H because the ###### is just an error message indicating the column is too narrow to display all of the characters. Once expanded, all of the characters will be visible.

What data type should Joe use for the Completion Date field?

Joe should use the Date & Time data type because dates will be stored on the field.

What data type should Joe use for the Social Security Number field and why?

Joe should use the Short Text data type. Even though the field will contain numbers, there will not be any calculations or arithmetic associated with them.

List the steps to locate, install, and then run a program or mobile app.

Locate the program or mobile app from the website, retail store, or app store. Download and/or install the program or app to your device. Once downloaded, run the program or app by clicking the program or app's icon.

Which aggregate function will find the customer with the largest amount paid?

MAX

What is the difference between the NPV and IRR functions? How do they work together? Can you check the accuracy of one function with the other? If so, how?

NPV is calculated in cash and IRR is calculated as a percentage. NPV analyzes the initial investment while IRR analyzes the rate of return after the investment. Both functions are used to calculate the risk of return and the return of a future investment. They work together to give managers and investors an idea of the value of a potential investment. You can check by putting the IRR result as the discount rate and that should make the NPV result 0.

Discuss note taking software and how it is used.

Note taking software allows users to enter text, drawings, photos, and other options to a page and save that page as part of a notebook. A users notes, in their notebook, can be synced to a cloud and accessed from anywhere on any device. Note taking software is ideal for calenders, meetings, lectures, and any place that you used to need to handwrite notes and keep track of the piece of paper. Now, users can type or even say notes to a device and never worry about losing them.

Steve, Becky's lab neighbor, overhears your tip and asks how make a color photo appear in black and white. You direct him to Color button, and advise him to follow which path to get there?

PICTURE TOOLS FORMAT tab, Adjust group

Which of the following techniques will allow Frank to select an entire sentence?

Press and hold down the CTRL key and then click the sentence

Which of the following allows you to remove character formatting?

Press the CTRL + SPACEBAR keys

Which field in the Project table should be the primary key and why?

Project Code should be the primary key because you can assign unique values to the field.

What is the difference between the Pv and Fv functions? Are their calculations related? Can you check the accuracy of one function with the other? If so, how?

Pv is present value. So how much the money is worth right now in the present. Fv is future value. So how much money is worth in years to come in the future. The calculations are related. Both used to keep track of accumulating savings as well as how much money you can take out of an account before it is dry. You can check the functions with one another because they are opposites. So you just reverse calculate from present time to future time or future time to present time.

Perry decides that before either of his employees creates a new workbook he must give them a

Requirements document

Which aggregate function will find the standard deviation?

STDEV

Riley brings to you the research paper on which she is currently working. Which of the following is a correct and complete citation for a book?

Santos, Matthew, and Joshua Lyman. HOW TO RUN (and Win) A PRESIDENTIAL CAMPAIGN. Houston: GOP Publishing, 2011.

Which field in the Employee table should be the primary key and why?

Social Security Number should be the primary key because the values in the field will be unique for each record.

Describe how spreadsheets like the one in the accompanying figure function and are organized. Define the following terms and concepts in your response: cell, value, formula, function, recalculation, and charting.

Spreadsheet software allows users to organize data and information in columns and rows and even do calculations of the data. Data is put vertically in columns and horizontally in rows. At the intersection of a column and a row is a cell. Cells are treated kind of like bingo as in they are located by a column letter and row number. Numbers in the cells are called values that can be used for calculations. Other cells contain formulas that generate values. Formulas calculate data on the worksheet and display the result in a cell. A function is a predefined formula used for basic calculations like adding. The spreadsheet software can the recalculate all the data once the value in a cell is changed. The spreadsheet software can also display the data in graphic form called charting which allows a visual representation ideal for meetings and conferences. (more on the function definition 20/25)

You round the edges by applying a picture

Style

Becky wants to know if it is possible to add effects similar to the effects artists use when they paint. You tell her it is, and direct her to what tool?

The Artistic Effects button

Why did Anna prefer to use the MAX function?

The MAX function recalculates the highest value each time a new value is entered into the worksheet

Explain what the World Wide Web is, including several tasks that can be accomplished online. Include definitions of the following terms in your response: webpage, downloading, website, and web server.

The World Wide Web is a service of the Internet which provides a collection of information to Internet users. Through the World Wide Web you can accomplish a variety of tasks including research, gaming, reading, sharing, communicating, and many others. The World Wide Web consists of webpages which are documents that contain information. When there are webpages that relate to one another, it is called a website. Webpages are brought to your computer through another computer called the web server. On webpages, there can be options to download information from the World Wide Web via a link or hyperlink. Downloading information is like copying it from the web server to your own computer. You access the World Wide Web for the information on webpages that are on websites through a web server in order to complete tasks.

In your novella, you can change the formatting of all the following EXCEPT

The asterisk symbol

What is the importance for a borrower to know each time a payment is made on a constant payment loan what portion of the payment is interest and what portion is the return of principle to the lender?

The borrower should know how much of the loan they still owe. If the borrower thinks the entire loan is principal, they will think the loan is repaid when they still have more payments. Knowing the interest also allows the borrower to calculate how much principal they still owe. And knowing the principal amount empowers the borrower to make sure the interest they are paying is the correct amount.

If you tap or click at the left edge of a cell, what are you selecting?

The cell

Why is the data import feature of Access™ so important to the practical use of the database to assemble large amounts of data into readable form?

The import feature allows users to import data from many other programs including Excel. This feature makes it easier to acquire data from other people or business'. Also, the feature allows Access users to adjust the data to best display the data in the database. So with the import feature, a user can get data from pretty much anywhere, in any form, in any amount, and create a readable and easy to understand database.

What should a manager who constructs a NPV and IRR analysis, and the result turns out to be a negative value and the IRR is also a negative number? Are these Excel conventions or do they indicate poor investment? How can you make sure the solution is correct?

The manager should not go forward with implementing the project and the project should be aborted because a negative NPV and IRR value are not Excel conventions, they are indications of poor investment. To check make sure the initial deposit is a negative number and the discount rate is a decimal not a whole number. Also make sure to multiply the NPV answer by 1+rate to repair the timing issue in the first period.

What is the significance of the primary key and the foreign key in a one-to-many relationship? How do they work in a relational database.

The primary key is a unique identifier for data. The primary key is from the parent table in a relational database. The foreign key is from the child table and represents the same data as the primary key in the parent table. These work together to create a relational database of the same field from two different tables. An example of this one-to-many relationship is an accountant and their clients. Each client has one accountant but the accountant can have many clients. This is represented when creating a relational database by joining two tables by connecting the two field with a line that has 1 on one end and an infinity sign on the other.

You are looking for a bar that displays commands on an edge of the tablet's screen. You have seen this before so you know it can be done. According to the tutorial, what gesture should you use?

The swipe gesture should be used to display a bar that displays commands on an edge of the tablet's screen. The stretch and pinch gestures should be used to zoom in and out. The double-tap gesture should be used to run an app, but can also be used to zoom.

What are the five major steps for web publishing?

There are five major steps for web publishing. The first step is to plan the website. Put some thought into the basics and the basis what you want the website to be. The second step is to design the website. Consider what the website will look like and what the website will have on it. The third step is to create the website. Bring the website to life and enable the website so the website can function. The fourth step is to host the website. Hosting the website will allow the website to be seen by the public on the web. The final step is to maintain the website. Keep the website running properly so that the website is ideal for visitors. (more 20/25)

How would a manager in a business evaluate the benefits of upgrading a piece of equipment? Compare to a consumer deciding to trade for a new car.

They both look at the benefits of upgrading. The manager looks to making money while the consumer looks to saving money. (Elaborate)

Describe in detail the steps to avoid malware infections on websites, social media, email, Flash memory storage, pop-up windows, and software.

To avoid malware on websites, you should always exit and research any pop up windows that may not seem real or legit. To avoid malware on social media, ignore any surveys you may be asked to take and never click links to free options. Also, don't download any antivirus programs you may be asked to download. To avoid malware on email, avoid spam messages. Anything that seems suspicious, don't open it. If the email doesn't contain a subject line or does contain links, be suspicious and careful. To avoid malware on Flash memory storage, always scan any USB flash drive you are given with security software before opening the files. To avoid malware, on pop-up windows, any time a pop-up window offering free security service because the pop-up claims your computer is infected, ignore it and exit it immediately. To avoid malware on software, be sure to get software from a legit source and always read though instructions and options to be sure only the correct software is installed and not any malware.

Frank would like to be able to select a full paragraph. Which of the following techniques will work?

Triple-click the paragraph

You also want to capture the audience's attention with the title slide. You decide to

Use text and an illustration

How could a car use an amortization schedule if, God forbid, that the automobile was damaged in an accident?

Use the schedule to make payments to fix the damage of the car. The amount of the bill to fix the car would be the principal and the interest accumulated as that bill is payed would be the interest. (Elaborate)

In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. ​ Which of the following is NOT a question of technology ethics?

Users being required to provide a software product's 25-character identification number before installing software is not a question of technology ethics. This is a preventative security measure that is trying to prevent someone doing an unethical use with the software. A student copying text from the web for a paper is unethical because it is plagiarism. A student installing a computer virus because he was expelled is unethical because that wrong and could be illegal. Copying The DaVinci Code is also unethical because once again that is plagiarism because it is not your true work.

List at least five different practices to adopt in order to protect your computer from viruses and other malware.

You should takes steps to protect your computer from viruses. You should run an antivirus program that will help you keep your computer clean of viruses. You should also use a firewall which prevents outside interference with your network. Another preventative measure to take would be to disconnect from the Internet when the Internet is not in use. Only download something like an app from websites you trust. Finally, keep your computer updated. Keeping your computer updated will help your computer stay on top of any new attacks. For example, Windows 10 has Windows Defender that keeps definitions of virus constructs which change from time to time.

List at least seven of the specifications that a surge protector should meet or exceed.

Your surge protector should have sufficient outlets to accommodate each device that needs a surge protector. The surge protector should also have a built-in fuse. The surge protector should have a UL rating of 1449 and a Joule rating of at least 600. The surge protector should have a warranty in case of damage to connected equipment. The surge protector should have a low clamping voltage and a high energy-absorption rating.


Conjuntos de estudio relacionados

Fundamentals Mobility/Safety EAQ

View Set

ECPI 2020 NUR164 CHAPTER 4 HEALTH OF THE INDIVIDUAL, FAMILY AND COMMUNITY

View Set

intro to psych chapters 6,7, & 10

View Set

Diving First Aid for Professional Divers (Chapter Review Questions)

View Set

ATI Dosage Calculations Critical Care Medications

View Set

Ch. 4, 5, 6 Exam -- Theatre Appreciation -- Murphy

View Set