Intro to Computers Ch 4-6 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

:It should have responsive design so that it is easy to use on mobile devices.

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?

Adjust the settings for the mouse through the control panel.

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

Android

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

Create a database of company projects, customers and vendors.

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

Which of the following is the strongest password?

H@veAGr3atDaY!

How does encryption work?

It scrambles the information until the key is used to unscramble it.

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

Popular operating systems include _______. Select all that apply.

Microsoft Windows Safari

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

Native app

Which of the following types of websites typically provides the least security?

Social media sites

What is a digital certificate?

Technology used to verify a user's identity

Ryan is developing a camera app for iOS with the following objectives: make it easier for users to choose and sort pictures; and offer interesting effects that images could be layered with. How can he use artificial intelligence while developing the app?

To select the best photo out of multiple shots taken at the same location at the same time

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?

Web apps

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?

Word Processor

A user account includes permissions that control which files and folders the user can access.

Yes

Which of the following is not an advantage of saving documents in the cloud?

You can access the documents when you are not connected to the Internet.

Which of the following is an advantage to saving a file to a flash drive?

You can take it with you and then work on it on another computer.

Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover?

graphics app

Which of the following is not an input device?

headphone

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

Folder names should _____.

identify the content and purpose of the folder

The ______ in flat panel fluorescent backlights is difficult to recycle.

mercury

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

What type of app do you use to share comments, articles, and images with others who might share your interests?

social networking

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A Trogan

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?

Because he is using the same name, each time he saves he is overwriting his previous work.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

_____ are standard settings that control how the screen is set up and how a document looks when you first start typing.

Default settings

If you delete a shortcut from your desktop, have you also deleted the original file?

No, because a shortcut does not place the actual file, folder, or app on the desktop.

Sandra has been getting multiple blank calls every day from an unknown caller. She has also been getting rude emails from email addresses she does not recognize, and intimidating messages on Facebook Messenger from a fake profile. What can you conclude about Sandra?

She is a victim of cyberbullying.

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

They had to unzip or extract it.

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?

Use the search tool to locate the file by file name, content, or date.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

To participate in a video conference from a home office, an attendee will need _____.

a laptop with a camera and microphone

Features common to mobile apps include ____. Select all that apply.

a. connectivity b. compatibility with the desktop version c. low or free price point

Biometric input devices include _____. Select all that apply.

computer monitors

A news aggregator is a service that _____.

disseminates syndicated content from many online sources

The goals of email spoofing include luring the user into _______. Select all that apply.

downloading malware everything besides logging into a legitimate banking site

A(n) _____ contains the instructions your computer or device needs to run programs and apps.

executable file

For greater network security, leave encryption on your router turned off.

no

Compressed files have the ____ file extension.

zip

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

How do you know if a device is an input device or an output device?

Input: card readers, game controllers, and headsets with microphones, webcams, scanners, touch pads or a mouse; any data and instructions entered into the memory of a device. You can input data and instructions in many ways, including interacting with your touchscreen, or using a keyboard. Output: screen displays, printers, speakers,text, graphics, audio, video, speakers, headphones, whiteboards;the computer or device interprets it, and the system software executes instructions to process the data into information. Instructions used for processing data can be in the form of a program or app, commands, and user responses.

Why is the date a file was modified useful?

It identifies the most recent version.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

It places the document in a buffer.

Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again? Select all that apply.

a. She should try and carry her own WiFi or create a hotspot using her phone and avoid unprotected public WiFi networks. b. She should configure all her gadgets to download and install security updates automatically. c. She should absolutely not share passwords or account info with anyone.

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

In macOS and Windows, the Documents folder is a(n) _____.

location on the hard drive that may open by default

The Operating System provides utility software designed to perform specific tasks. What task(s) does it perform? Select all that apply.

monitoring security, configuring peripheral devices, coordinating tasks between programs

To create a new folder, you should first _____.

navigate to the location where you want to store the folder

All app stores are cross-platform, meaning they offer apps for more than one operating system.

no

A MOOC is a(n) _____.

online class that's open to thousands of students from anywhere

To limit the potential damage from power spikes, use a(n) _______.

surge suppressor

Using a lock screen limits unauthorized access to a device.

yes


Conjuntos de estudio relacionados

M2, Ch. 3 - Professional Ethics (Auditing)

View Set

Modern French History - Final Exam - Visual Sources

View Set

Solving Equations in One Variable

View Set

Secure Software Development Lectures 1 - 7

View Set

Religion: Chapter Thirteen- Conquest and Exile

View Set

Chapter 56: Assessment and Management of Patients with Female Physiologic Processes

View Set