Exam questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is an example of protecting your Internet privacy?

Following safe web browsing habits.

Social networking revolution started with?

Friendster

A key concept of the internet is that everything is governed by strict rules instead of it being open.

False

A vendor-neutral certification demonstrates expertise in one software product or program.

False

Ad trackers are used to display personalized cookies.

False

The general idea of the computer (a physical machine) was "born" because of mistakes in solar system tables.

False Born because inaccuracies in navigational tables

Hard disk drives contain no moving parts.

No

Bill Gates wrote the code for the software IBM used called Microsoft DOS.

False, he bought it

What replaced the vacuum tube?

Transistor

A biometric lock uses unique physical characteristics, such as your face or fingerprint, to control entry.

True

ENIAC was the first electrical, general-purpose digital computer.

True

Google was created in 1996 and originally called Back Rub

True

The embedded wires through which data travels are called a bus.

True

Tim Burness Lee created the world wide web which is just a subset of the internet.

True

YouTube was made in 2005 in order to share movies people made with their cameras and phones.

True

Apple created the first electronic spreadsheet.

true

Apple the company was saved from going out of business by the Ipod which is a digital music player

true

Steve Jobs was fired from Apple.

true

The Internet was created by modelling a mouse in a maze and was named ARPA for fear of war with the Russians.

true

The first personal computer was built by Xerox

true

in 2003 Android was born by 2 guys

true

Some workers are required to use a(n) _________ to connect to company servers.

virtual private network

The basic sound units of speech are called phonemes.

yes

The mircoprocessor was invented by Apple.

• False, it was Intel

What was the first browser?

•Mosaic/Netscape

What program encourages manufacturers to create energy-efficient devices?

Energy Star

Which of the following is NOT a cloud service provider?

macOS

If a printer isn't working, the first thing you should do is ______.

make sure it's plugged in and connected

To limit the potential damage from power spikes, use a(n) _______.

surge suppressor

The integrated circuit enabled ...

-Smaller computers -Lighter computers -The US to go to the moon

When considering the purchase of a peripheral, you should ______. Select all that apply.

-disregard customer reviews -know if your computer can connect to it

By recycling electronics, you can help _____.

-preserve limited resources -keep toxic materials out of the water we drink

Responsible tech disposal can include _____. Select all options that apply.

-throwing the item in the trash -donating the item to a refurbishing service

A smart thermostat can accomplish which of the following?

-unlock your front door -receive instructions from a smartphone app

To indicate whether a computer chip's electric circuit is on or off, you use a ___ to stand for "on" and a ___ to stand for "off".

1 (one), 0 (zero)

How does a computer work?

1. Data goes in. 2. Data is then "crunched" or understood. The central processing unit executes the instructions for translating the data into information. CPU is made up of the control unit and the arithmetic logic unit. Control Unit controls where the data goes and the ALU crunches data like a calculator. 3. As data goes around the machine cycle, it needs fast and accessible memory at different steps. For example, cache is fast, volatile, and temporary storage for memory. 4. Once data has been crunched and moved to memory, it goes to the output device. Other: Register is a specialized memory that's on CPUs and is faster than cache, memory, or storage. Computers turn data into information. Input devices put data into the computer and Output devices output the information through peripherals. Memory is a temporary storage device. All of the data in the information travels around the motherboard on a bus.

machine cycle

1. fetches instructions 2. decodes instructions 3. executes instructions 4. it stores the result equals a metronome in music (a practice tool that produces a steady pulse (or beat)

Binary is made up of

1s and 0s

How do speakers work?

A speaker is a paper cone with a magnet on the base of the cone and another magnet below that. An electric current runs through one of the magnets and changes the polarity from positive to negative. It bounces the cone back and forth in different wavelengths. This process is how we get different sounds that we hear.

Which of the following actions should you take when you see a message from a sender you don't recognize?

A:View it without interacting.

What type of electricity comes out of the walls?

AC- alternating current--an electric current that reverses its direction many times a second at regular intervals -Electrons change directions. Every single device that has a battery uses DC, direct current, which means that electrons only flow in one direction. When you plug a charger into the wall, the brick changes AC into DC, making the electrons flow in one direction because the battery accepts that power.

Examples of encoding schemes include ____

ASCII Unicode

Chloe works as a web content editor. She likes to work out of various cafes and uses free WiFi that they provide to access the Internet. Chloe's company, however, is concerned about the security of these networks. Which of the following steps can ensure that Chloe's activities on her computer remain encrypted?

C:Her firm should use virtual private network (VPN) to provide her secure access.

Creating a fake identity in order to target a victim on a dating app is called ________.

Catfishing

How does noise cancellation work?

Incoming ambient sound in the form of a sine wave is picked up by a microphone in the headphones. This sound is sent to the noise cancellation circuitry which measures that wave and produces the exact inverse of that wave. Then it sends it back to the headphone speaker. Now when both the ambient sound and the exact inverse hits your eardrum at the exact time, the eardrum doesn't move so you don't hear anything.

Which of the following components does a digital certificate include?

It verifies its own authenticity. -and web identity

Which cache levels are usually built onto the processor chip?

L1 and L2

Which of the following are examples of convergence? Select all that apply

Listening to a radio station over the Internet.Using a phone to unlock a smart lock on a door. Checking your emial on an e-reader.

Mirabel and Haley work for a software firm. One night at a party, Mirabel takes a picture of Haley surrounded by empty beer bottles. Mirabel found it funny and wanted to share it on her Facebook page. Should she do this? Select all that apply.

No

RAM stands for _______.

Random Access Memory

Sandra has been getting multiple blank calls every day from an unknown caller. She has also been getting rude emails from email addresses she does not recognize, and intimidating messages on Facebook Messenger from a fake profile. What can you conclude about Sandra?

She is a victim of cyberbullying.

What is a data broker?

Someone who sells personal information to third parties.

Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in an MS Word document. Why does this happen?

While storing sound, a computer stores a lot of information - like amplitude and frequency - that it does not while it saves text.

Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these ways can it help Deirdre? Select all that apply.

While text messaging, it will convert text into speech.

A router manages the flow of network traffic.

Yes

Both wired and wireless devices can connect to the same network.

Yes

Employers can use spyware to track program usage by employees.

Yes

Prolonged typing without sufficient breaks can cause nerve damage.

Yes

Recruiters can contact you about your resume on job search sites such as Monster and Indeed.

Yes

Full disk encryption protects _____.

a drive or device

Which of the following is NOT a common form of malware? Select all that apply a. adware b. bloatware c. spyware d. ransomware

b. bloatware

For storage, laptops use _____.

either a hard disk drive or a solid-state drive

The sticky keys feature enables users to _____.

execute keyboard combinations one key at a time

It is a good idea to use the same password for multiple accounts.

false

Was the internet made public in 1980's

false

RAM is measured in _______.

gigabytes

A ____ is a node. Select all that apply.

hubs, switches, routers, computers, tablets, mobile phones, printers, game consoles, and smart home devices

How does electricity work?

if electricity gets measured by an oscilloscope, an oscilloscope measures voltage over time. On screen, it looks like a sine wave. Good clean power over time has a smooth wave. (Not our wall, we create noise on the grid). Dirty power has an irregular wave because of the noise. When the voltage is high is called a spike. When the voltage is low it's called a brownout or under voltage. A surge protector protects against surges-occur when the flow of electricity is interrupted, then started again, or when something sends electricity flowing back into the system. A UPS (an uninterruptible power supply) protects against surges and provides power for brownouts and blackouts. The most common frequency of the alternating current is 60 cycles per second. Computers use that to set their clock speed. If cycle gets messed up the clock speed is messed up, and therefore the equipment gets messed up, which is why a surge protector is important.

A server that provides storage to network users is called _____.

network attached storage

A firewall protects your computer from data loss due to hardware failure.

no

When posting to a professional networking account, you should share stories and comments that _____.

offer valuable information to your target audience

Things to consider when buying a new computer include _______. Select all that apply.

operating system form factor

A peripheral device communicates with your computer through a(n) ____.

port

A Repetitive Strain Injury (RSI) may be related to which of the following? Select all that apply.

stressing the same muscles through repetition. maintaining the same posture for long periods of time. maintaining an abnormal posture for an extended period of time, such as holding your arms over your head. lifting heavy objects.


Conjuntos de estudio relacionados

Connections Between Texts in Fiction

View Set

Hello, Universe Vocabulary (Chapter 1 and 2 )

View Set