IT

¡Supera tus tareas y exámenes ahora con Quizwiz!

1) What is an identifier that an online transaction is safe? 1.Look for third-party verification from TRUSTe or the Better Business Bureau symbol. 2.One way to be sure that a website is secure is to see if the site URL changes from https:// to http://. 3.One way to be sure that a website is secure is to look to see whether it shows an open padlock on the toolbar. 4.One way to be sure that a website is secure is to click the closed padlock icon and supply your Social Security number as asked.

1

5) Can I add more USB ports to my computer in order to connect multiple peripheral devices? 1.A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as expansion cards or expansion hubs. 2.A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as flash cards. 3.A port in an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as routers and switches. 4.A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through adding serial ports.

1

5) What is a protocol then? 1.A protocol indicates the set of rules used to retrieve a specified document. 2.A protocol is a set of four numbers separated by dots, such as 123.45.245.91. 3.A protocol is a three- or four-letter prefix that indicates the kind of organization the host is. 4.A protocol is what immediately follows the http://.

1

In Windows 10, what feature is used to locate and launch software or applications installed on your device? 1. The Start Menu 2. The Tiles screen 3. The File Explorer screen 4. The Smart Apps screen

1

Question 4: The digit to the far right in any base system always has a place value of __________. 0 1 10 ​​16

1

Should I turn off my computer when a program becomes unresponsive? 1.When a program becomes unresponsive, use the Task Manager to help resolve the issue. 2.When a program becomes unresponsive, press the power button and turn off the computer. 3.When a program becomes unresponsive, uninstall the program and then reinstall it. 4.You should use the Windows Backup and Restore Utility to manage nonresponsive programs.

1

What do the different letters like A: and C: seen when File Explorer is opened refer to? 1. These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The C drive is the hard drive. 2. These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The A: drive is the hard drive and the C: drive is the flash drive. 3. These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The C drive is the DVD drive. 4. These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The F drive is the hard drive.

1

What if I face problems after installing a program? 1.The System Restore utility will be helpful in this situation. 2.The Disk Cleanup utility will take care of these sorts of problems. 3.You can use the Task Manager to exit from the program. 4.The Task Scheduler will take care of these sorts of problems.

1

What strategies can I use with key words to help narrow down the search results? 1.To improve a search use quotation marks around a search phrase, use wild card characters, or search within a specific website. 2.To improve a search use both Google and Bing. 3.To improve a search use quotation marks to take the place of a letter or letters in keyword. 4.To improve a search, use more than one search engine.

1

Which of the following is NOT a suggested way to protect yourself when shopping online? You should use a debit card. You should look for third-party verification. You should make sure the company has a phone number and street address. You should save a copy of the order.

You should use a debit card.

What is drawing software (or illustration software)?

You use drawing software (or illustration software) to create technical diagrams or creative illustrations using tools such as pens, pencils, and paintbrushes. You can also drag geometric objects from a toolbar onto a canvas area to create images and use paint bucket, eye-dropper, and spray can tools to add color and special effects to the drawings. Creative programs such as Adobe Illustrator include tools that let you create professional-quality creative and technical illustrations.

Match each of the following terms to its meaning: data mining aggressive advertising keystroke logger pop-up blocker adware and spyware

data mining => gathers personal information about you aggressive advertising => displaying enticing information to tempt you to buy keystroke logger => records everything you type, like credit card numbers pop-up blocker => utility to stop extra Internet browser windows from opening adware and spyware => can perform some types of tracking, such as recording your surfing habits

Which of the following numbering systems is ordinarily used by people?

decimal

________ numbers are used in place of binary numbers because binary numbers are difficult to read.

decimal?

Which of the following would NOT be of any help before installing beta software? backing up your system ensuring your virus protection software is updated creating a restore point defragging the hard drive

defragging the hard drive

Rotational latency is the ________. delay in locating the correct sector on a platter maximum speed of the hard drive time taken to send data from the hard drive to the CPU time taken for the hard drive to reach full speed

delay in locating the correct sector on a platter

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack. stealth scareware backdoor denial-of-service

denial-of-service

You would use Windows Action Center to check all of the following EXCEPT ________. display settings security information trouble shooting maintenance information

display settings

Attacks that are launched from multiple zombie computers at the same time are called ________. Trojan horses script kiddies distributed denial-of-service attacks (DDoS) worms

distributed denial-of-service attacks (DDoS)

A metasearch engine like Dogpile eliminates ________ in its results. virus and hoax sites unsubstantiated claims duplicates paid advertisements

duplicates

Which of the following is a popular example of a C2C site? Google Amazon.com Yahoo! eBay

eBay

A single forward slash and additional text following the domain name in a URL, specifies a particular ________. web page outside of the existing website file or path domain host

file or path

All of the following types of files can be removed by the Disk Cleanup utility EXCEPT ________. files that have not been backed up temporary Internet files temporary Windows files Recycle Bin files

files that have not been backed up

When installing new downloaded software, if the setup program doesn't automatically launch, you would ________. open a command window and type run insert the CD/DVD in your DVD drive find the setup files where you downloaded them and run setup.exe open the Run Program dialog box

find the setup files where you downloaded them and run setup.exe

Match each of the following terms to its meaning: firewall hacker packet botnet virus

firewall => prevents intrusion into your computer hacker => a person who poses a threat to your computer packet => small piece of data that travels through the Internet botnet => group of software programs that usually run independently on a large number of zombie computers virus => a small program that can compromise a computer system

The individual words you use as search terms when using a search engine are referred to as ________. queries wildcards keywords hits

keywords

The power-on self-test does all of the following EXCEPT ________. identify the BIOS load the operating system test memory chips test the video card and video memory

load the operating system

A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ________. worm time bomb logic bomb macro virus

logic bomb

Firewalls work by closing ____ in your computer. logical ports logical doors backdoors software gaps

logical ports

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________. logical ports a botnet open ports e-mails

logical ports

Which is NOT an example of a mobile operating system? macOS iOS Windows 10 Android

macOS

Match each of the following terms to its meaning: macro Developer VBA Edit Run

macro => automates tasks Developer => Word tab used to create macros VBA => programming language for macros Edit => button to display macro code Run => button to execute a macro

The term ____ refers to malicious software, such as viruses, adware and spyware.

malware

Which of the following is NOT a major type of cybercrime reported to the IC3? malware fraud advance fee fraud government impersonation scams identity theft

malware fraud

The software that allows you to edit digital images, videos, as well as digital audio is called distributed software. productivity software. encryption algorithms. multimedia software.

multimedia software.

Emptying the Recycle Bin should be done ________. only after you have determined that you no longer need any of the files that you have deleted when you need to restore the system back to a previous state when your computer has run out of RAM or ROM space prior to installing new hardware or software

only after you have determined that you no longer need any of the files that you have deleted

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source. token DDoS packet sniffer packet filter

packet filter

Match each of the following terms to its definition: packet filtering zombie firewall network address translation packet sniffer

packet filtering => method for selectively allowing certain requests to access a port zombie => a computer controlled by a hacker firewall => hardware or software for protecting computers from hackers network address translation => technique of assigning hidden internal IP addresses to protect a network against hackers packet sniffer => program used by hackers to look at individual packets as they travel on the Internet

Updates that you can download to fix possible security issues are called software __________. patches repairs bandages reboots

patches (Software patches are files that repair security flaws or other problems in software.)

In the URL https://www.senate.gov/general, general is the ________. domain protocol top-level domain path or subdirectory

path or subdirectory

Which of the following would NOT be a good precaution to take when making online purchases? use a prepaid credit card pay by credit card, not debit card use a third-party processor such as PayPal pay by debit card, not credit card

pay by debit card, not credit card

The easiest way to automate a task in Word is to __________. perform the task while recording a macro use the Automate Macro Wizard use the Macro Programming window to type in the commands needed to perform ​use the Macro Developer dialog box to enter the necessary instructions

perform the task while recording a macro

Windows Task Manager can be launched using any of the following methods EXCEPT ________. pressing Shift + Esc right-clicking the Start button and selecting Task Manager right-clicking the taskbar and selecting Task Manager pressing Ctrl + Alt + Delete

pressing Shift + Esc

Setting a system restore point should be done ________. only after you have determined that you no longer need any of the files that you have deleted when your computer has run out of RAM or ROM when you need to free up hard drive space prior to installing new software

prior to installing new software

Blog posts are not publicly available until they are ________. hyperlinked approved verified published

published

The _______ heads float on a cushion of air above the platter.

read/write

When you delete a file in Windows, it is actually stored in the _____ where you have a second chance to decide if you still need the file.

recycle bin

If you inadvertently delete a needed file from your computer's Documents folder, in Windows, you can recover it by ________. restoring it from the Recycle Bin restoring it from the Trash emptying the Recycle Bin emptying the Trash

restoring it from the Recycle Bin

The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the main path. root directory. main directory. library directory.

root directory.

A surge protector may look like just another power strip but it also can detect viruses. prevent theft. help manage heat. save your device if a voltage spike is sent through the electrical system.

save your device if a voltage spike is sent through the electrical system.

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as spyware. scareware. trackingware. adware.

scareware.

A ________ is a small program that executes without your knowledge when you enter a website. keystroke logger plug-in script worm

script

A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus. time bomb boot-sector encryption script

script

2) Formatting divides a disk into ________. sectors and tracks sectors and channels tracks and channels platters and tracks

sectors and tracks

When using the Internet for research, you ________. can assume if there is no author listed, the site is not appropriate for research. should evaluate sites for bias and relevance. should look for sites with only a few links. can assume everything is accurate and appropriate.

should evaluate sites for bias and relevance.

The minimum set of recommended standards for a program is known as the ______. operating system. system requirements. setup guide. installation specs.

system requirements.

Software that helps run the computer's hardware devices and coordinates instructions between applications is called___. beta software. a web server. application software. system software.

system software.

The Windows diagnostic tool ______ is used to monitor the efficiency of your computer.

task manager

Which of the following describes copyleft? terms enabling the redistribution of proprietary software terms enabling the redistribution of open source software terms restricting the use of leftover copies of software political philosophy of the corporation

terms enabling the redistribution of open source software

Beta software is never ______. application software. system software. the final finished version of the software. open source software.

the final finished version of the software.

What is BIOS ( basic input/output system)?

the first step in the boot process (like when you turn your computer on). its a program that manages the exchange of data between the OS and the input and output devices attached to the system. BIOS is stored on ROM so that its data does not get erased when the power is turned off. The first thing the BIOS does is to make sure that all peripheral devices are attached and working. This process is called the power-on self test, or POST.

In the URL https://www.senate.gov/committees/committees_home.htm, .gov is the ________. folder on domain top-level domain domain protocol

top-level domain

Match each of the following terms to its meaning: track sector platter fragmentation bits

track => a "ring" around a disk sector => a "wedge" on a disk platter => has a magnetically sensitive coating fragmentation => pieces of a file are spread out on a disk bits =>how data are stored on a disk

Windows Defender protects your computer from all of the following EXCEPT ________. unexpected software updates malware hacking agents pop-ups

unexpected software updates

The following are basic functions that adware and spyware generally perform EXCEPT ________. data mining tracking surfing aggressive advertising virus protection

virus protection

Google Assistant and Apple's Siri use_______ to assist smartphone users.

voice recognition

Question 5: Google Assistant and Apple's Siri use _______ to assist smartphone users. voice recognition only a keyboard NFC ​flash memory cards

voice recognition

Match each of the following terms to its definition: worm Trojan horse logic bomb encryption virus polymorphic virus

worm => attempts to travel between systems through network connections to spread an infection Trojan horse => appears to be useful but does something malicious in the background logic bomb => executes when a certain condition is met encryption virus => a program that renders your computer files unusable by compressing them polymorphic virus => a virus that changes its own code to avoid detection

All of the following are TRUE of virus protection software packages EXCEPT ________. virus definitions can be updated with a single click you can only scan the entire computer each time you perform a scan specific removable drives can be scanned they have sophisticated user interfaces

you can only scan the entire computer each time you perform a scan

ShieldsUP and LeakTest are software programs you can use to test whether ________. your computer is a zombie packets arrive at their intended destinations your firewall is working correctly you have a memory leak

your firewall is working correctly

A computer controlled by a hacker is called a __________. spybot pharm ​zombie​ ​​Trojan horse

zombie

What is a macro?

​A small program that groups a series of commands so they run as single command​. Macros are best used to automate routine task or complex series of commands that must be run frequently.​

After deletion (in Windows), your files are stored in the __________. Restore Point Backup Zone ​Recycle Bin​ ​​Deleted Folder

​Recycle Bin​ (Deleted files are placed in the Recycle Bin.)

How do I uninstall a software program? 1.Always choose Uninstall for the software application you would like to delete from Program and Features in Control Panel or by right-clicking the program name on the Start menu in Windows 10.​ 2.Select the program icon and press Delete to automatically uninstall the software. 3.You remove a software program by clicking the Remove All icon in the Control Panel on the Start menu. 4.You remove a software program by dragging the program icon to the Recycle Bin.

1 (To uninstall any program from Windows, you should go to Programs and Features in the Control Panel, select the program you want to delete, and then select Uninstall. Or, if you're running Windows 10, you can right-click the program name on the Start menu, and then select Uninstall.)

Are there programs that can make my computer more responsive? 1. Absolutely. Utility programs are programs built into application software that perform special functions to make your computer more effective. 2.Absolutely. Utility programs are small applications included in system software or sold as off-the-shelf software that performs special functions such as managing system resources and improving efficiency. 3. Absolutely. Utility programs are small applications you can buy that work together with your application software to make your computer run better. 4.Absolutely. Utility programs are small applications only available for Linux systems.

2

Do I need a special program for zipping or compressing files sent as attachments? 1.Today's computer files are so small you never need to compress them. 2.You do not need a separate program for this purpose if you are using Windows. 3.You can use the disk defragmenter for this purpose. 4.You can use Disk Cleanup for this purpose.

2

How can you view the contents of your folder in Icons view, which shows the contents of folders as small images? 1. You can easily get an overview of your files and folders by using Windows Viewer. 2. In File Explorer, you can access various ways to view the contents of your folder by clicking the View tab. 3. You can easily get an overview of your files and folders by using My Desktop. 4. You can easily get an overview of your files and folders by using Windows Flip 3D.

2

If I have many files related to one topic, can they all have the same name? 1. As long as you group all of the files into one folder, that can be done. Just remember to use a different file extension for each file so that you are not confused. 2. No. Every file in the same folder or storage device must be uniquely identified. 3. No. Every file in the same folder has to have the same file extension. 4. No. Every file in the same folder can have the same name and append a different numeral to the end of the file extension.

2

Is there some way a person with difficulty typing can use the computer? 1.You need to purchase voice recognition software in that case. 2.If you are using Windows, you can make use of the Ease of Access tools. 3.You need to purchase a touch-screen LCD monitor for this purpose. 4.If you are using Windows, there is no help - you will need to buy Mac OS X.

2

4) What are the different parts that make up the URL? 1.URLs consist of the protocol that allows files to be transferred and the host. 2.URLs consist of the letters www and the host names. 3.URLs consist solely of the protocol. 4.URLs consist of the protocol, some additional characters, and the domain name.

4

5) What is social commerce? 1.Social commerce is commerce that refers to all transactions taking place between two people, not two computers. 2.Social commerce is a subset of e-commerce that consists of people selling items to each other online. 3.Social commerce is a subset of e-commerce that uses sites such as eBay as payment intermediaries. 4.Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

4

Can I get back an important file if I accidentally delete it? 1. Unfortunately, it's not possible to recover a file once you've deleted it without special Restore software. 2. This will depend on where the file was. If the deleted file was from a flash drive it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored. 3. This will depend on where the file was. If the deleted file was from one of your disks it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored. 4. This will depend on where the file was. If the deleted file was from your hard drive, it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored.

4

Do Disk Defragmenter or Disk Cleanup also diagnose problems on my hard drive? 1.To diagnose problems on your hard drive, you need to obtain a separate off-the-shelf utility like Seagate Seatools. 2.In addition to regrouping related pieces of files together on the hard drive, Disk Defragmenter utilities also automatically diagnose and fix problems on your hard drive. 3.As long as you have Windows on your PC, you can use Disk Utility to diagnose problems. 4.As long as you have Windows on your PC, error checking is running automatically in the background. You will be notified of any potential errors in the Action Center.

4

How many binary digits are represented by one hexadecimal digit? 4 1 16 2

4

Is there a way to refine the list of results when using a search engine? 1.You should try using a metasearch engine when you conduct your search. 2.There is no way to refine your search and lessen the list size. 3.You should always make sure you put your search term in brackets. 4.You should trying using specialty search tools or a specialty search engine to refine your searches.

4

The process of adding a Windows 10 app to the Start menu is known as 1. visualizing. 2. screening. 3. clipping. 4. pinning.

4

Are there different kinds of firewalls? 1.The most effective firewalls are hardware devices designed to restrict access to your computer. 2.The most effective firewalls are software programs designed to restrict access to your computer. 3.The most effective firewall is the Norton Internet Security suite. 4.You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

4 (Firewalls can be either software programs or hardware devices, and both are equally effective. Personal firewalls are software programs or hardware devices, specifically designed to keep home computers safe from hackers. When you use a firewall, unauthorized users trying to access your computer are not allowed access. Although installing either a software or a hardware firewall is probably sufficient, you should consider installing both for maximum protection.)

What is the first step in the boot process? 1.The BIOS loads the operating system into RAM. 2.The BIOS makes sure that all your computer's peripheral devices are attached and working. 3.The BIOS verifies your login name and password. 4.The CPU accesses the BIOS.

4 (In the first step of the boot process, the CPU activates the basic input/output system, or BIOS, a program that manages the exchange of data between the OS and the input and output devices attached to the system. The BIOS is stored on a ROM (read-only memory) chip so that its data does not get erased when the power is turned off.)

What are macro viruses and e-mail viruses? 1.Macro viruses are the opposite of micro viruses and attack only large data files, whereas e-mail viruses are attached to your e-mail and affect the e-mail contents. 2.Macro viruses run a program that searches for common types of data files and compresses them. E-mail viruses are enabled when the e-mail is opened. 3.Macro viruses are enabled when macros in the documents that they are attached to are run, whereas e-mail viruses are enabled when the e-mail is opened. 4.Macro viruses are attached to documents that contain macros, whereas e-mail viruses come as e-mail attachments.

4 (Macro viruses are attached to documents (usually Word or Excel) that contain macros. The virus is triggered when you enable macros in that infected document. E-mail viruses come as e-mail attachments. Just opening an e-mail message won't infect your computer, but downloading or running the file attached will. When executed, some viruses even send themselves to a certain number of people in your address book as e-mail attachments.)

Is there some place where a student can get software at discounted prices? 1.Although student versions of software are available at a reduced price to students, these versions usually are not as full-featured as standard versions. 2.The best place to get student software is through the software supplier itself. Campus computer stores or college bookstores may not be able to offer discounted prices on standard software, only on less powerful academic versions. 3.No. Beta testers can get discounted prices for full-fledged programs but usually not students. 4.You may be able to buy software that is no different from regularly priced software at prices that sometimes are substantially less than general consumer prices. You should try your college bookstore or campus computer store, which generally require a valid ID.

4 (Students can buy software that is no different from regularly priced software at prices that are sometimes substantially less than general consumer prices. Campus computer stores and college bookstores often offer discounted prices to students with a valid ID. Online software suppliers also often offer the same popular software to students at reduced prices.)

In Windows 10, what do you find on the Start menu? 1. On the Windows 10 Start menu, you will find icons, widgets, and documents. 2. On the Windows 10 Start menu, you will find widgets, scrollbars, and ribbons. 3. On the Windows 10 Start menu, you will find Documents, Computer, and All Programs folders. 4. On the Windows 10 Start menu, you will find tiles representing your most used applications.

4 (The Windows 10 Start menu provides you with access to your most used applications represented by colorful tiles, as well as all your installed applications and software.)

Which of the following is a program that appears to be useful or desirable but does something malicious in the background? A worm A zombie A virus A Trojan horse

A Trojan horse

What is is a URL, or Uniform Resource Locator?

A URL is a website's address. It is made up of parts that help identify the web document for which it stands: The first part of the URL indicates the set of rules (or the protocol) used to retrieve the specified document.

Where does Windows 10 report problems it may find with corrupt files or a problem with your hard drive? Task Manager Disk Cleanup Action Center Disk Manager

Action Center

The Windows _____________ helps keep you aware of potential security issues and other major events on your device. Defender Center ​Malware Center​ Action Center ​​Security Center

Action Center (Action Center keeps reports on major events happening with your computer system.)

Match each of the following programs to its purpose: Adobe Dreamweaver QuarkXPress Adobe Photoshop Elements Moodle Adobe Premiere

Adobe Dreamweaver => web page-authoring software QuarkXPress => desktop publishing software Adobe Photoshop Elements => image-editing software Moodle => course management software Adobe Premiere => digital video-editing software

Search options and tools can be used to find which of the following? Images Videos News items All of these

All of these

Which of the following strategies could be used to lead to more effective search results? Including multiple search terms Using a minus sign to eliminate terms from the search Using a plus sign to add specific terms to the search ​​All of these

All of these

Which of the following statements about pop-ups is FALSE? All pop-ups are annoying and useless. Pop-ups can contain advertising information. Some pop-ups are needed for useful features on a website. ​​Pop-up blocking cannot be turned off in the Edge browser.

All pop-ups are annoying and useless.

How do I know whether the software I buy will actually work on my computer?

All programs have a set of system requirements that specify the minimum standards for the OS (operating system), CPU (computer processing unit) , RAM (primary memory), hard drive, video card, and peripherals. The requirements are on the software box or website. Before installing software, users must make sure these requirements are met.

How often do I need to run my antivirus software?

Although antivirus software is designed to detect suspicious activity on your computer at all times, you should use its auto-scheduling feature to perform active scans of your computer at least once a week.

Can viruses spread across a regular computer network, like at my school?

Although hackers can spread viruses on networks, it's not the only way viruses can spread on networks. Virus-like programs called worms are able to spread across networks with no user interaction.

What is desktop publishing?

Although many word processing applications allow you to use some of the features that are hallmarks of desktop publishing, specialized desktop publishing (DTP) software, such as QuarkXPress and Adobe InDesign, allows users to design and lay out complex publications. Desktop publishing programs offer a tools you can use to format and arrange text and graphics. You can also import files into your documents from other sources, manipulate graphics, and publish your files to the web.

Can I install and configure the firewall myself? And how will I know if my network is safe after the firewall is installed?

Although some people prefer to have a professional install and test their firewall, even home users can install and test a firewall by following the instructions provided in the user manual.

what are some popular anti-virus softwares?

Although you can buy stand-alone antivirus software, antivirus protection is included in comprehensive Internet security packages such as: Norton Internet Security (norton.com) Kaspersky Internet Security (kaspersky.com) McAfee Total Protection (mcafee.com) Bitdefender

Which is NOT an event associated with the beginning of the Internet? The first e-mail program was written by Ray Tomlinson. Amazon.com was one of the first websites on the Internet. The U.S. Department of Defense creates ARPA. TCP/IP protocol was developed that allowed different computers to communicate with each other.

Amazon.com was one of the first websites on the Internet.

Which of the following best describes a blog? An online shopping site An online newsletter A social network ​An online journal

An online journal

What should you consider when using an internet resource?

Authority: Who is the author or the sponsor? If the author is well known or the site is published by a reputable news source (such as the New York Times), then you can feel more confident using it as a source than if you are unable to locate information about the author or the site's sponsor. Bias: Is the site biased? The purpose of many websites is to sell products or services or to persuade rather than inform. Look for sites that offer several sets of facts, or consider opinions from several sources. Relevance: Is the information in the site current? Material can last a long time on the web. Some research projects (such as historical accounts) depend on older records. However, if you're writing about cutting-edge technologies, you need to look for the most recent sources. Therefore, look for a date on information to make sure it is current. Audience: For what audience is the site intended? Ensure that the content, tone, and style of the site match your needs. You probably wouldn't want to use information from a site geared toward teens if you're writing for adults, nor would you use a site that has a casual style and tone for serious research. Links: Are the links available and appropriate? Check out the links provided on the site to determine whether they are still working and appropriate for your needs. Don't assume that the links provided are the only additional sources of information. Investigate other sites on your topic as well. You should also be able to find the same information on at least three websites to help verify the information is accurate.

________ is the e-commerce term for transactions that take place between a business and other businesses. Brick-and-mortar Point-and-click C2C B2B

B2B

_______refers to businesses that buy and sell goods and services to other businesses—such as a paper company that distributes paper to other companies.

B2B

Match each of the following terms to its definition: B2C e-commerce C2C https social commerce

B2C => transaction performed between a customer and an online store e-commerce => business conducted online C2C => transaction between two people at an online auction site https => secure sockets layer protocol prefix. social commerce => uses social networks to assist in marketing and purchasing products

Match each of the following terms to its definition: BIOS POST kernel boot process authentication

BIOS => program that manages the data exchange between the OS and input and output devices POST => confirms the status of peripheral devices kernel => manages the processor and system components boot process => occurs when the computer is started authentication => verification of login name and password

In which format is information stored on a hard drive? Text Binary Hexadecimal Decimal

Binary

How many and what digits are used in Binary?

Binary​ uses 2 digits: 0 1​​​

____ involve using a physical attribute such as a fingerprint for authentication. Trojan horses Biometrics Backdoors Rootkits

Biometrics

______ lines are used to transfer the requested data from the hard drive to the computer.

Bus

What is a custom installation?

By selecting custom installation, you can decide which features you want installed on the hard drive. By doing so, you can save space on your hard drive, installing only those features you know you want A good practice to establish before installing any software on your system is to create a restore point. That way, if anything goes wrong during installation, you can restore your system back to how it was before you started.

____refers to consumers selling to each other through online auction and exchange sites, such as eBay or Craigslist.

C2C

The main internal hard drive on a Windows computer is usually identified as the ________ drive C: A: D: B:

C:

The ______ column of the Task Manager's Processes tab shows the percentage of the CPU that is being dedicated to each process.

CPU

Assuming that all steps are successfully completed, which of the following sequences shows the correct order for the boot process? POST runs → BIOS loads OS → CPU activates BIOS → Registry configuration is checked → Desktop appears. POST runs → CPU activates BIOS → Registry configuration is checked → BIOS loads OS → Desktop appears CPU activates BIOS → POST runs → BIOS loads OS → Registry configuration is checked → Desktop appears CPU activates BIOS → BIOS loads OS → POST runs → Registry configuration is checked → Desktop appears

CPU activates BIOS → POST runs → BIOS loads OS → Registry configuration is checked → Desktop appears

How does file compression work?

Compression programs look for repeated patterns of letters and replace these patterns with a shorter placeholder. The repeated patterns and the associated placeholder are cataloged and stored temporarily in a separate file, called the dictionary. For example, in the following sentence, you can easily see the repeated patterns of letters: The rain in spain falls mainly on the plain. Although in this example there are obvious repeated patterns (ain and the), in a large document, the repeated patterns may be more complex. The compression program's algorithm therefore runs through the file several times to determine the optimal repeated patterns to use to obtain the greatest compression. Current compression programs can reduce text files by as much as 50 percent.

What are Computer-aided design (CAD) programs?

Computer-aided design (CAD) programs are a form of 3D modeling engineers use to create automated designs, technical drawings, and model visualizations. With CAD software, architects "build" virtual models of their plans and visualize all aspects of design prior to actual construction. The 3D nature of these programs allows engineers to rotate the model and make adjustments to their designs where necessary. For example, the medical engineering community uses CAD to create anatomically accurate solid models of the human anatomy to develop medical implants. The list of CAD applications keeps growing as more and more industries realize the benefits CAD can bring to development and manufacturing.

What are logical ports?

Computers have logical ports, which are like windows and doors in a house. They allow a computer to organize requests for information from other networks or computers. These ports are numbered and assigned to specific services. For example, e-mail messages are sent through logical port number 25. Open logical ports, like open windows in a home, invite intruders. Unless you take precautions to restrict access to your logical ports, other people on the Internet may be able to access your computer through them. A firewall is the best means of protection.

When you are sorting files and folders in File Explorer, use ________ view to get the most interactive view available. List Folder Details Tiles

Details

Before you can work with macros in Word or Excel, the __________ tab must be available. Insert Programming Developer ​Add-ins

Developer

A touch pad is a pointing device usually found in tablets.

False

Android devices do NOT support voice recognition.

False

App creation software includes tools like Adobe Photoshop. True False

False

Digital activism is an exercise platform. True False

False

Each digit in a hexadecimal number represents a bit pattern of 8 bits. True False

False

Encrypting data is not an appropriate measure for mobile devices such as smartphones. True False

False

Files deleted from a flash drive are sent to the Recycle Bin and could be recovered, if necessary. True False

False

Modern desktop operating systems are considered single-user multitasking operating systems. True False

False

Password strength is solely determined by the length of the password. True False

False

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility. Windows Defender Windows Update Recovery File History

File History

Which of the following statements about the Recycle Bin is TRUE? Files deleted from the hard drive are sent to the Recycle Bin. You need a special utility program to undelete files that are in the Recycle Bin. Files deleted from a flash drive are sent to the Recycle Bin. Files sent to the Recycle Bin are permanently deleted.

Files deleted from the hard drive are sent to the Recycle Bin.

My friend says you can't get a file back once you've deleted it on a PC unless you have a special utility program. Is that true?

Files deleted from the hard drive go to the Recycle Bin, where they stay until you permanently delete them. To restore files from the Recycle Bin, click Restore all items from the Task pane in the Recycle Bin dialog box.

Which of the following ports do you need to use with a home theater system?

HDMI

Which of the following statements about purchasing and installing software is FALSE? To ensure that new software will work with your computer, you should check the system requirements, which specify the minimum standards needed for the program to run properly. If a program is written for your operating system, it will always work on your computer. Downloaded software programs often arrive in one compressed file containing everything needed to install and run the program. Many software programs only require you to insert the program CD for installation to start.

If a program is written for your operating system, it will always work on your computer.

What is windows defender?

Included in Windows, it defends against pop-ups, malware, and hacking agents. Using the products covered in this tutorial will help keep your computer safe.

Which of the following statements about disk fragmentation is FALSE? It can usually be corrected by running a disk defragmentation program. It is a problem caused by the disk hardware. It decreases the speed of data transfer. Data files are stored in pieces instead of together.

It is a problem caused by the disk hardware.

Which of the following statements about assessing website security is TRUE? Just because a website has a return policy, it does not mean online transactions are secure. A website's information policy ensures that confidential information is kept secure. The URL of a secure website begins with shttps://. Websites that conduct online sales are required to take special precautions to ensure all transactions are secure.

Just because a website has a return policy, it does not mean online transactions are secure.

what are large and small icons

Large Icons view shows the contents of folders as small images. There is also Extra Large Icons view, which shows folder contents and other icons as even larger images. Large and Extra Large Icons views are the best to use if your folder contains picture files, or for PowerPoint presentations. ​

Which of the following is NOT one of the basic functions of malware? Gathering personal information about you Launching a denial of service attack Aggressive advertising ​Tracking your surfing habits

Launching a denial of service attack (Malware is not used to launch denial of service attacks. These are launched by other hacking tools.)

What is open source software

Open source software is free software that is available with few licensing and copyright restrictions. One advantage of open source software is that a community of users continues to make changes to the software, keeping it current without needing to wait for periodic updates. However, unlike Microsoft Office and other proprietary applications, open source applications offer little or no formal support. Instead, they're supported from their community of users across websites and newsgroups.

Examples of database software programs include PowerPoint, Word, and Access. Photoshop, inDesign, and Illustrator. Oracle, MySQL, and Microsoft Access. Moodle, Blackboard, and Canvas.

Oracle, MySQL, and Microsoft Access.

How does the utility work?

Over time, as files are saved, deleted, and modified, the fragments of data for files fall out of sequential order on the hard drive, and the drive becomes fragmented. Locating all the pieces of the file takes time, making the OS less efficient. Disk defragmenter utilities regroup related pieces of files together on the hard drive.

What is Safari?

Safari is the default browser for Apple computers and mobile devices and is included with OS X and iOS Apple operating systems. A Windows-based version is also available.

What Viruses Can You Get from the Internet?

Some viruses are hidden on Web sites in the form of scripts. Scripts are small programs that are executed without your knowledge when you enter a site. Scripts are often used to perform useful, legitimate functions on Web sites such as collecting name and address information from customers. However, some scripts are malicious and can infect your computer with a virus.

What is a file extension?

The first part of a file, or the file name, is the name you give the file when you save it. For example, "bioreport" may be the name of a report for your biology class. In Windows, following the file name and after the dot (.) comes a three- or four-letter extension, or file type. Here you see some common file extensions and the types of documents they indicate. The extension identifies what kind of file it is and what application should be used to open the file. For example, if the "bioreport" file is a Word document, it will have a .docx extension and be named "bioreport.docx".

What is the URL domain name?

The first part of the domain name indicates who the site's host is. The domain name's three-letter suffix (such as .com or .edu) is called the top-level domain (TLD). The TLD indicates the kind of organization the host is. There are also TLDs for each country in the world. These are two-letter designations such as .uk for the United Kingdom and .us for the United States.

Why is it that the ends of all the files I work in end in .docx or .pptx or something?

The letters that follow the period at the end of a file name are the file's extension, which tells the computer what application it should use to read the file.

How do metasearch engines work? They use wild cards, extensively. They operate in a Boolean string. They suggest alternative search terms. They search other search engines' results.

They search other search engines' results.

I'm thinking of buying a new computer, and I'm trying to figure out my best storage options. What kind of hard drive should I get?

Today's internal hard drives have capacities as high as 8 TB or more, which is enough space to hold more data than would most likely fit in the books in your school's library. When making a choice, consider your storage needs as well as any external forms of storage you may use.

A blog is usually written by a single author and often represents a personal log or journal. True False

True

Adware displays promotional items on user computers. True False

True

Apple's iPhone series does NOT allow you to add any memory.

True

Backdoor programs and zombies are used to launch denial-of-service attacks. True False

True

Computer threats can come from your behavior as well as from outsiders or hackers. True False

True

Google Docs is an example of Software as a Service. True False

True

Images can be uploaded to a blog. True False

True

Malware can be prevented by using antimalware software. True False

True

Modern virus protection software packages are easy to use. True False

True

Sending e-mails to lure people into revealing personal information is a technique known as phishing. True False

True

Smartphones are small fully functional computers.

True

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. True False

True

The Windows diagnostic utility Task Manager is used to monitor how efficiently a computer is running. True False

True

The hexadecimal number B represents the decimal number 11. True False

True

The power-on self-test (POST) ensures all peripheral devices are attached and operational. True False

True

When setting up your profile, you should NOT provide your personal information such as your address. True False

True

When using Microsoft Office to create macros, you do not need to know a lot about a programming language to get started. True False

True

When you set up your blog, you can turn off comments. True False

True

You can blog from a smartphone. True False

True

You can help keep your system safe by keeping your apps and operating system updated. True False

True

You can set Windows to update automatically at certain intervals such as daily or weekly. True False

True

Your social security number should never be shared on a website, in an email, or through messaging. True False

True

What is HTTP?

URLs often begin with http, short for Hyper Text Transfer Protocol. HTTP enables files to be transferred from a web server so that you can see them on your browser.

Match each of the following ports to its most common use: USB Ethernet DVI VGA HDMI

USB => commonly used for connecting input and output devices Ethernet => used to connect a computer to a network DVI => commonly used to connect projectors to a computer system VGA => commonly used to connect CRT monitors in older systems HDMI => used for home theater systems

Which search strategy should you use to search for a specific phrase? Include Boolean operators in the phrase. Use a wild card around the phrase. Use asterisks around the phrase. Use quotation marks around the phrase.

Use quotation marks around the phrase.

A computer virus is like a biological virus because it attaches to a host and then spreads to other victims. they can both be difficult to exterminate. they are easy to catch. all of the above

all of the above

Computer viruses can be spread by downloading a song from a peer-to-peer sharing site. downloading and running a file attached to an email. sharing flash drives. all of the above

all of the above

Malicious software (malware) includes the following: spyware. adware. viruses. all of the above

all of the above

A single hexadecimal number is represented by ________ digits in the binary numbering system.

4

Each digit in a hexadecimal number represents ____ bits.

4

What are specialty search engines?

Specialty search engines search only sites that are relevant to a particular topic or industry.

Which of the following is typically NOT found in web page-authoring software? Wizards Speech recognition Reference materials Templates

Speech recognition

If you wanted to conduct a search about the band Black Eyed Peas, which of the following would be best to enter into the search box? "Black Eyed Peas" Peas + Black + Eyed Black Eyed Peas - Legumes ​Black Eyed Peas

"Black Eyed Peas"

You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? Captain America Civil War "Captain America: Civil War" * Civil War Captain America *

"Captain America: Civil War"

Which search engine strategy would best limit the results to the vehicle, Ford Explorer, rather than someone exploring in a vehicle made by Ford Motor Company or an explorer named Ford? *Ford Explorer ~Ford Explorer "Ford Explorer" Ford Explorer*

"Ford Explorer"

What kind of products are these?

-Subscription-based products -Protection suites offer other features E-mail scans Parental controls File shredding

Match each of the following top-level domains to entities that can use it: .com .edu .mil .gov .org

.com => Chevrolet .edu => Harvard University .mil => U.S. Army .gov => IRS .org => Alzheimer's Association

Which of the following is NOT an approved top-level domain? .org .net .htm .uk

.htm

When storing information in a computer, the binary numbering system uses a(n) ____ to represent an off switch.

0

A bit consists of a ________.

0 or a 1

1) Once I have an Internet connection, do I need anything else to surf the web? 1.You'll also need a web browser to locate, view, and navigate the web. 2.Actually, you'll also need to register your IP address with the domain name server in order to browse the web. 3.Actually, you'll also need an online server provider (OSP). 4.Actually, you'll need a plug-in.

1

For each numbering base system, the far right always has a place value of

1

A megabyte holds approximately ________ bytes of data.

1,000,000 (1 million)

The resolution of a monitor has to be at least ________ to play a Blu-ray movie.

1024 x 768

A four-digit hexadecimal number represents _____ binary digits.

16

E38B is an example of a number expressed in base ___.

16

In the hexadecimal numbering system, each place value digit is ______ times greater than the digit to its right.

16

​​Question 3: Hexadecimal numbers are based on which number? 2 8 10 ​16

16

To accommodate HD format video, new monitors have an aspect ratio of ________.

16:9

Expressed in decimal, the range for RGB colors is 0 to ________. 100 255 500 127

255

In the RGB system, each color can have a value from 0 to _____

255

How many digits does a 16 digit binary pattern convert to?

A 16-digit binary pattern converts to a 4-digit hexadecimal value

________ floods a computer with requests until it shuts down denying access to legitimate users. A polymorphic virus A DoS attack Port blocking An encryption virus

A DoS attack

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? A bot A zombie A worm A Trojan horse

A Trojan horse

What is Beta version?

A beta version is an application that is still under development. By distributing free beta versions, developers hope users will report errors, or bugs, they find in their programs.

What is a computer virus?

A computer virus is a computer program that attaches itself to another computer program (called the host program) and attempts to spread itself to other computers when files are exchanged.

What is a file compression utility?

A file compression utility is a program that takes out redundancies in a file to reduce the file size. File compression is helpful because it makes a large file more compact, making it easier and faster to send over the Internet, upload to a Web page, or save onto a disk. Windows has built-in compression (or zip) file support, which you can access by right-clicking on a file or folder and selecting Send to, or in File Explorer, clicking the Share tab, and selecting Zip. There are also several stand-alone freeware programs, such as WinZip (for Windows) and StuffIt (for Windows or Mac) that you can obtain to compress your files.

So how do firewalls help protect against this then? How exactly do they keep hackers out?

A firewall protects a computer by screening data coming into its logical ports. Logical ports serve as communications gateways for the computer.

What is a full installation?

A full installation copies all the files and programs from the distribution disc to the computer's hard drive. .

What about laser printers then? Are they ever better than inkjet printers?

A laser printer works by using static electricity to signal to the printer where to print ink. The printer does this by telling laser to uncharge selected spots on a charged cylinder, which corresponds with a document to be printed. Toner is then transferred to the paper as it feeds through the printer and is melted on. The advantage of laser printers is their faster printout times and high-quality printouts.

What is a Web Browser?

A web browser (or browser) is software installed on your computer that allows you to locate, view, and navigate the Web. Web browsers include various tools, including a Favorites function, a History list, and various navigational buttons. Microsoft Edge is Microsoft's newest browser and only available with Windows 10. Alternate browsers include Google Chrome, Safari, and Firefox.

Special programs that facilitate interaction between application software and the OS are called utility programs. device drivers. APIs. hardware players.

APIs

Which of the following is not an Internet protocol? HTTP ARPANET BitTorrent FTP

ARPANET

________ measure the amount of movement in any direction to detect shaking and rotation.

Accelerometers

_____ time is the time it takes the computer to request and retrieve data.

Access

________ software helps small business owners manage their finances more efficiently. Accounting Course management Simulation Personal information management

Accounting

Which of the following is NOT a major antivirus software company (as mentioned in this Sound Byte)? McAfee Symantec Kaspersky ​Adobe

Adobe (Adobe is not a major supplier of antivirus software.)

What happens after the POST?

After the POST, BIOS loads the operating system from its permanent storage location on the hard drive to RAM. Once the OS files are loaded into RAM, the kernel (or supervisor program) is loaded.

Which of the following is something you can do with a mobile blogging app? Edit existing posts Include an image Include location information ​All of the above

All of the above

Which site might you use to search for blogs on a subject? Best of the Web Blogs Blog Search Engine BlogCatalog ​​All of the above

All of the above

My Microsoft Word program doesn't seem to be working properly. When I try to open my Art History file, it's all garbled. I think I might have a virus, but I'm not sure. Can you help me?

Although it would be nice to be able to say with 100 percent certainty whether Zainab's computer has a virus, the symptoms she described might actually be caused by another problem, such as a corrupted file.

What is the task scheduler?

Although most important maintenance utilities are run periodically, you might want to alter the time the utilities are scheduled to be performed, or add or delete automatic tasks. The Windows Task Scheduler utility allows you to schedule and manage tasks to run automatically at predetermined times, with no additional action necessary.

What is an email virus?

An e-mail virus is another source of virus infection. When executed, these viruses send themselves to a certain number of people in your address book as attachments. Your friends' computers are infected when they open the attachment they think you've sent. The virus then sends itself to people in their address book, and the cycle continues.

Which of the following software packages can be used to create mobile applications? Microsoft Windows LibreOffice App Inventor App Engine

App Inventor

What is the task bar?

At the bottom of the desktop is the taskbar, which displays open and favorite applications for easy access.

Ensuring that the content, tone, and style of a website match your needs is checking for: Bias Audience Authority Relevance

Audience

Which of the following is an example of a click-and-brick business? Yahoo! eBay Amazon Barnes and Noble

Barnes and Noble

What is the action center?

Beginning with Windows 8, the operating system routinely and automatically checks the file system for potential errors. Unlike previous versions with which you would manually have to run the Error-checking utility, the scan is carried out in the background, while you continue to use the computer. If a potential problem is detected, it is reported via a notification in the Action Center. You can access the Action center by clicking on the Notifications icon in the System Tray area of the Taskbar. When there is a new notification, the icon will become opaque.

Computers use ________ language to process data at the most basic level

Binary

________ is an app that allows you to post to your blog from a smartphone. BlogMaster BlogPoster MasterBlogger Blogger

Blogger

What are boot infected viruses?

Boot-sector viruses, commonly found on infected media, replicate themselves into the hard drive's master boot record (a program that executes whenever a computer boots up). This ensures that the virus is loaded into the computer immediately. You get boot-sector viruses by booting up your computer with an infected flash drive left in a USB port. Boot-sector viruses can erase your entire hard drive.

Which of the following statements is FALSE regarding safety and e-commerce? Browsers will alert you if you are processing a transaction on an unsafe site. Illegitimate sites can use security symbols illegally. A closed padlock on your screen indicates a secure connection. Privacy policies indicate how your data will be used by a company.

Browsers will alert you if you are processing a transaction on an unsafe site.

The decimal number 12 is represented in hexadecimal as ________. C D A B

C

________ is a type of memory that uses almost no power and is never erased. EPROM CMOS RAM VRAM

CMOS

____ a disk drive increases the speed with which the disk accesses and retrieves data.

Defragmenting

What are colors for web pages represented as?

Colors for web pages are represented as hex codes defining the amount of red, green, and blue (RGB) needed to produce a specific color.

The first personal computers that used MS-DOS as the operating system had which kind of user interface? GUI command-driven menu-driven graphical

Command - Driven

What are zombies?

Computers that hackers control via trojan horses or other methods are referred to as zombies.

Which of these is an example of optical storage media?

DVD

The representation of a fact, figure, or idea is called ________.

Data

How many and what digits are used in decimal?

Decimal​ uses 10 digits: 0 1 2 3 4 5 6 7 8 9

area in Windows 10. Start Menu Cortana File Explorer Desktop

Desktop

________ software allows users to design and layout complex documents such as brochures and newsletters. Desktop publishing Reference Spreadsheet Image editing

Desktop publishing

In which view are files and folders displayed in list form, with the additional file information displayed in columns alongside the file names? Large Icons Extra Large Icons Details List

Details

To remove unnecessary files from your hard drive, you would use the ________ Windows utility. Disk Cleanup Add or Remove Programs Disk Defragmenter System Restore

Disk Cleanup

What is disk cleanup?

Disk Cleanup is a Windows utility that cleans, or removes, unnecessary files off your hard drive, such as Recycle Bin files, temporary Internet files, and temporary files created by Windows to store data while a program is running. Windows usually deletes these temporary files when you exit a program, but sometimes it isn't able to if your system freezes or has a problem exiting a program. Disk Cleanup scans your hard drive to determine which files can be deleted and calculates the amount of hard drive space that would be freed up by doing so. You then check off which type of files you would like to delete.

The Windows utility program you can use to make your computer run more efficiently is ________. Disk Defragmenter Cleanup Manager Task Manager Efficiency Manager

Disk Defragmenter

________ regroups related pieces of files together on the hard drive, thereby improving operating system efficiency. Task Manager System Tools System Restore Disk Defragmenter

Disk Defragmenter

Match each of the following terms to its definition: Disk Defragmenter utility programs Disk cleanup Error-checking System Restore

Disk Defragmenter => puts parts of files back into sequential order utility programs => included in system software to perform special functions Disk cleanup => removes unnecessary files from the hard drive Error-checking => checks for lost files and fragments and physical errors on hard drive System Restore => used to roll system settings back to a specific date when everything was working properly

Which of the following can be both an input device and an output device?

Display Screen

When downloading software programs from the Internet, which of the following statements is FALSE? Downloaded software doesn't require a software license. Most downloaded installation files have been compressed to make the download process quicker. Most software programs will unzip themselves and automatically launch the setup program. The installation process is similar to installing software from a CD.

Downloaded software doesn't require a software license.

________ software can be used to create or edit two-dimensional, line-based illustrations. Video editing Desktop publishing Computer-aided design Drawing

Drawing

____is the process of conducting business online such as through advertising and selling products.

E-Commerce

Which of the following virus types uses the address book in the victim's e-mail system for distribution? Multipartite virus Macro Polymorphic E-mail virus

E-mail virus

Match each the following browsers to its developer: Edge Chrome Firefox Safari

Edge => Microsoft Chrome => Google Firefox => Mozilla Safari => Apple

What is Educational software?

Educational software includes test preparation software, trip-planning software, home-design software, and programs that offer tutorial-like training, as well as programs that teach you new skills such as typing, languages, cooking, and playing the guitar.

Which of the following virus types infects your computer by running a program that searches for common types of data files (such as a Microsoft Word file) and compresses them using a complex encryption key that renders your files unusable? Encryption Macro Polymorphic Stealth

Encryption

What is an encryption virus?

Encryption viruses infect your computer by running a program that searches for common data files (such as Word and Excel files) and compresses them using a complex encryption key, which renders your files unusable. You then receive a message asking you to send money to receive the program to decrypt your files. The flaw with this type of virus is that law-enforcement officials can trace the payments to an account and potentially catch the perpetrators.

Clicking the ______ button of the Windows Task Manager closes a nonresponsive program without rebooting the computer.

End Task

Which of the following ports are used to connect a computer to a cable modem or to a network?

Ethernet

Which of the following would be an example of a C2C business? Google BestBuy Target Etsy

Etsy

I've just set up a home network for my kids and me to share. I don't have anything valuable on my computer at home. I mean, I don't store any of my work files on it so there's nothing for anyone to steal. I don't need a firewall, do I?

Even though Dwayne may not store proprietary work files on his computer, a hacker can break into Dwayne's home computer to launch attacks on other computer systems or to release viruses. Hackers can also steal other personal information from Dwayne's computer to commit identity theft.

How do you determine legitimacy?

Examining the website to see if the author or editor are identifiable, and their qualifications are listed, is a good way to determine legitimacy. Another method is to look for specific "About us," "Background," or "Biography" content.

B2C

Exchanges that take place between businesses and consumers—such as the purchases that consumers make at online stores. Businesses that have both a traditional store and an online presence, such as Barnes and Nobles, are called click-and-brick businesses.

What is FTP?

FTP is a common protocol. it stands for File Transfer Protocol and it is used to upload and download files from one computer to another.

A backdoor program is an app that appears to be useful to you, but does something malicious. True False

False

Expressed in hexadecimal, the range for RGB colors is 0 to ___.

FF (Expressed in decimal, the range for RGB colors is 0 to 255. Expressed in Binary, the range for RGB colors is 00000000 to 11111111)

A keystroke logger allows hackers to take control of your computer. True False

False

All pop-ups are malicious. True False

False

System restore points can only be created by Windows automatically on a regular schedule. True False

False

The look and feel of a blog CANNOT be customized. True False

False

Webcasts are delivered only as prerecorded audio and video content. True False

False

When you delete files from your hard drive in Windows, they are permanently removed from your computer. True False

False

Windows Action Center can only be used to troubleshoot computer problems. True False

False

Windows Defender is an add-on antivirus software package available as a subscription. True False

False

You can start the Task Manager by pressing Ctrl + Esc. True False

False

You will see a list of all programs that are currently in use by the system and whether they are running or hung up by checking the Description column of the Processes tab. True False

False

Which of these is NOT a specialty search on Google? Fashion Finance Scholar Patent Search

Fashion

Which Windows utility program removes redundancies from files in order to reduce file size? Disk Defragmenter File Compression Program Manager Disk Cleanup

File Compression

When using Windows 10, ________ enables you to manage your files and folders by showing the location and contents of every drive, folder, and file on your computer. Finder File Explorer Microsoft Edge System

File Explorer

What is Firefox?

Firefox is a popular open source browser from Mozilla. You can customize your Firefox so that you keep only the features you use, such as private browsing, and remove those features that you don't use. Add-ons are available to increase its functionality.

So are there different types of firewalls, and which do you recommend?

Firewalls can be either software programs or hardware devices, both of which are equally effective.

Which of the following is NOT an optical storage device?

Flash drive

what is a productivity software suite?

For proprietary software such as that from Microsoft, it's cheaper to buy a software suite than to buy each program individually. Productivity software suites include software versions you install on your computer, as well as versions that are web-based, meaning you can access them from any computer.

What is freeware?

Freeware is copyrighted software that certain program developers distribute for free. Plenty of freeware exists on the web. To find it, type "freeware" in your search engine. Good sources are filehippo.com and majorgeeks.com.

Which of the following CANNOT be posted to a blog? Videos URLs Full applications Photos

Full Applications

The Android smartphone operating system was developed by ________.

Google

What is Google Chrome?

Google Chrome (google.com/chrome) enables you to synchronize your browser experience across devices so open tabs, bookmarks, and recent search results can be shared between your computer and mobile device.

How Do Hackers Launch Denial-of-Service Attacks?

Hackers can also launch a denial-of-service (DoS) attack from unprotected computers. In a DoS attack, a hacker repeatedly makes requests of a system through a computer he or she has taken over as a zombie. Computers can handle only a certain number of requests for information at one time. When they are flooded with requests in a DoS attack, they shut down, denying access to legitimate users.

What can hackers do?

Hackers can break into an unsecured computer and commit a number of illegal activities, including: Committing identity theft, Launching Trojan horses, Launching denial-of-service (DoS) attacks, and Launching distributed denial-of-service (DDoS) attacks.

How do trackers launch trojan horses?

Hackers often hack into unprotected computers to launch Trojan horses. A Trojan horse is a program that appears to be something useful or desirable (like a game), but at the same time does something malicious in the background without your knowledge. Often, Trojan horses install backdoor programs, which allow hackers to access and delete files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer, all without your knowledge.

________ usually have the largest storage capacity of any storage device inside the computer

Hard Drives

Which of the following is NOT part of the hard disk anatomy? Actuator Platter Read/write head Hard disk impeller

Hard disk impeller

Which of the following is NOT found on a motherboard?

Hard drive

How many and what digits are used in hexadecimal?

Hexadecimal​ uses 16 digits: 0 1 2 3 4 5 6 7 8 9 A B C D E F

What does the forward slash in the domain name do?

If a forward slash and additional text follow the domain name, the information after the slash indicates a particular file or path (or subdirectory) within the website.

What is Adobe Photoshop Elements?

If not, Adobe Photoshop Elements is image-editing software geared to the casual user. With this program, you can correct red eye, improve the color balance of an image, touch up an image, and add creative effects, among other tasks. However, often times, when you buy a computer, it may contain a program that you can use to edit photos, or you might have the tools in your photo management software. Adobe Photoshop and Corel PaintShop Pro Photo are full-featured image-editing applications. They each offer sophisticated tools such as those for layering images (placing pictures on top of each other) and masking images (hiding parts of layers to create effects such as collages). Designers use these more sophisticated tools to create the enhanced digital images used commercially in logos, in advertisements, and on book and CD covers.

How do you know if material is up to date?

If the website contains references to current information or sources, references to current events, and/or links to current and relevant information, then the material can be considered up-to-date. Another option is to use the search engine's filtering tool, if it has one, to display websites from a specific time period.

Whats important to consider when buying a new monitor?

If you are buying a new monitor, consider its size, aspect ratio, resolution, contrast ratio, viewing angle, brightness, and response time.

How do hackers commit identity theft?

If you shop online using a credit card, your credit card information resides on your hard drive, making it easy for a hacker to detect it if he hacks into your computer. Even if this information isn't stored on your computer, without a firewall, a hacker can capture it when you're online by using a packet sniffer. A packet sniffer captures the packets traveling the Internet that contain valuable content such as credit card numbers. Once a hacker has your credit card number, he or she can use it to buy things illegally or sell the number to someone who will.

What's the best way for me to get an overview of what files and folders I have on my PC?

If you use a Windows PC, File Explorer is the program that helps you manage your files and folders by showing the location and contents of every drive, folder, and file on your computer. Windows Explorer is divided into two sections. The left-hand side is the navigation pane and shows the contents of your computer. It displays commonly accessed files in Quick Access, files stored in the cloud in OneDrive, and locally stored files in This PC (Documents, Music, Pictures, and Videos). When you select a folder or storage drive, the files and folders of that particular area are displayed in the file list on the right.

What are virus symptoms?

If your computer is displaying any of the following symptoms, it may be infected with a virus. - Existing program icons or files suddenly disappear. Viruses often delete specific file types or programs. - Changes appear in your browser. If your browser takes you to an unusual home page (one you didn't set) or it has sprouted new toolbars, you may have a virus. -Odd messages, pop-ups, or images (like an ambulance!) are displayed on the screen, or strange music or sounds play. -Data files become corrupted. Although there are many reasons why files become corrupt, a virus is one cause. -Programs don't work properly. This could be due to either a corrupted file or a virus. -Your system slows down or takes a long time to boot up.

How Do I Use the System Restore Utility?

If, after installing a program, your computer freezes, then, after rebooting, the system freezes again. You uninstall the program, but your computer still freezes. What now? The Windows System Restore utility lets you restore your system settings back to a date when everything was working properly.

In VBA, what are macros also known as?

In VBA macros are also known as procedures​.

What is the last step of the boot process?

In the last step of the boot process, the OS checks the configuration of other system components. The registry contains all the configurations used by the OS, including the customized settings you put into place, such as display settings for your monitor.

Data that has been organized is called ________

Information

The Wi-Fi and Ethernet options on the Performance tab shows ________. tables that compare processing speed to network speed if intruders are accessing your computer information on all computers available on your network information on your network usage

Information on your network usage

Which of the following statements about your computer's primary hard drives is FALSE?

Internal hard drives use a laser to read and write data.

When a printer receives a command, it generates a unique signal to the OS, which is called a(n) interrupt. slice. event. none of the above.

Interrupt

Which of the following is NOT true about the Details view? Its contents can be sorted by the date last modified. It displays files and folders as large icons with file names beneath. It provides the most information regarding its contents. It is the most interactive view.

It displays files and folders as large icons with file names beneath.

Which of the following statements about Windows Defender is FALSE? It defends against pop-ups. It is included with Windows. It prevents denial of service (DOS) attacks. ​​It defends against malware.

It prevents denial of service (DOS) attacks.

Are there different ways I can view and sort my files and folders? Right now I have them showing the file names and when I saved them, but a friend of mine had hers set up so all her photos came up as mini-photos. Can I do that on my computer?

Jill will want to use Large Icons view to show the contents of a folder as small images. In Windows, when you are in a folder, such as Documents, you can use any of the viewing options on the View tab in File Explorer to arrange and view your files and folders. Details view is the most interactive view. The files and folders are displayed in list form, but the additional file information is displayed in columns alongside the file name. You can sort and display the contents of the folder by any of the column headings, so you can sort the contents alphabetically by file name or type, or hierarchically by date last modified or by file size.

Which is NOT a feature of security software? Parental control File shredding System and e-mail scans Keystroke logging

Keystroke logging

Which of the following is NOT a type of alternative search engine? Blog search engine Job search engine Keyword search engine Human search engine

Keyword search engine

Which of these File Explorer views would be best if you are looking for a specific picture? Small Icons Large Icons Tiles Medium Icons

Large Icons

All of the following are web browsers EXCEPT ________. Safari Chrome Firefox Linux

Linux

An example of an open source OS is macOS. DOS. Windows. Linux.

Linux

What are logic bombs?

Logic bombs execute when a certain set of conditions is met, such as opening a file or starting a program a certain number of times. Logic bombs can cause annoying messages to be displayed on your screen, or can even reformat your hard drive, causing complete data loss.

How do you look for bias?

Look for clues of bias such as whether the author/host of the site have a specific political, social, or commercial agenda. Does the information promote the author's own published works or product at the expense of other information? Is the website published by a special interest group?

What is a macro virus?

Macro viruses are attached to documents (usually Word or Excel) that contain macros. A macro is a short series of commands that usually automates repetitive tasks. However, macro languages are so sophisticated that viruses can be written with them. If you choose to enable macros in an infected document, the virus will be triggered and it will infect other documents on your computer.

What are advantages of macros?

Macros simplify complex tasks​, are reusable​, and can be edited and changed​​

What are course management software programs?

Many online courses are run through course management software programs such as Blackboard. These programs provide traditional classroom tools such as calendars and grade books over the Internet.

Match each of the following terms to its definition: alternative search engine specialty search engine search strategies keyword quotation marks

Match each of the following terms to its definition: alternative search engine => search engines other than google specialty search engine => searches only sites that are relevant to the particular subject search strategies => skills used to optimize search engine results keyword => used by search engines to determine what to look for quotation marks => enclose words or phrases to get exact hits

Which of the following is a type of search engine that would combine results from searches in Google, Bing, and Info.com? Keyword search engine Multi search directory Metasearch engine ​Subject directory

Metasearch engine

What are meta search engines?

Metasearch engines search other search engines rather than individual websites.An example of a metasearch engine is Dogpile.

What are Visual Basic for Applications (VBA)?

Microsoft Office includes Visual Basic for Applications (VBA) to provide functionality for recording macros.

Which of the following is usually NOT listed in the software's system requirements? Operating system (OS) Hard drive capacity Monitor Processor

Monitor

If you were looking for a job, which of the following search engines would be most effective to use? Technorati Monster Blinkx ​None of these

Monster

How do hackers launch Distributed Denial-of-Service (DDoS) Attacks?

Most savvy hackers use a distributed denial-of-service attack. Distributed denial-of-service (DDoS) attacks are attacks that are launched from more than one zombie computer at the same time. Such attacks are harder to stop.

A hard disk drive provides ________ storage so data is retained after the power is turned off.

Not CMOS or ROM

The desktop version of ______ has an option to turn its popup blocker off and on.

Not Windows Defender or antimalware software

On a new disk, files are stored in _____ blocks.

Not permanent

Smartphones come with _________ screens in a variety of resolutions.

OLED

Match each of the following terms to its description: OLED 4G GPS stylus Siri

OLED => screen type used by smartphones 4G => cellular network GPS => powerful navigational system stylus => pointing device Siri => Apple's artificial intelligent assistant

What is file management?

One function of your computer's operating system is to enable file management, which means providing an organizational structure to the computer's contents. The OS allows you to organize the contents of your computer in a hierarchical directory structure that includes files, folders, libraries, and drives.

Calendars, tasks, and e-mail can be found in which application? Outlook Access Excel OneNote

Outlook

Tips for using open source, freeware, and beta versions of software safely:

Only use programs that are designed to work with your operating system. You can crash your system and may need to reinstall your OS if you load a program that wasn't written for your OS. Wait until the last version is released when using beta versions. By that time, most of the serious bugs have been worked out. Stick with reliable developers whose software you are familiar with. You should be comfortable with the reliability of the source of software before downloading a freeware or beta version. That way, you can be more certain that a serious bug or virus is not hiding in the software. Make sure that your virus protection software is up to date. Downloading software from an unknown source can put your system at risk for a virus. Before installing software, create a restore point. That way, if anything goes wrong during installation, you can always restore your system back to how it was before you started.

What are personal firewalls?

Personal firewalls are software programs or hardware devices designed to keep home computers safe from hackers. When you use a firewall, unauthorized users trying to access a computer protected by a firewall are not allowed access. This way, only authorized information can reach your computer. Although installing either a software or a hardware firewall on your computer is probably sufficient, you should consider installing both for maximum protection.

How do you avoid viruses?

Protection against your own mishaps: Backups Undelete Security updates System Restore

________ are the places that peripheral devices attach to the computer.

Ports

All of the following are Task Manager tabs EXCEPT ________. Printers Performance Users App History

Printers

The ________ tab includes information on the individual pieces of each program running on your system and the program to which they belong. App History Networking Performance Processes

Processes

Match each of the following terms to its description: Processes tab Startup Performance tab processes services

Processes tab => shows the programs in use Startup => shows what programs launch at login Performance tab => displays history of CPU usage processes => parts of a program that run individually services => includes operating system programs

What is productivity software?

Productivity software includes word processing, spreadsheet, presentation, database, and personal information manager programs.

What must you do before others can view your blog? Publish Verify Validate ​Broadcast

Publish

When the POST is complete, the operating system is loaded into ________. ROM the hard drive the optical drive RAM

RAM

The ______ system uses combinations of red, green and blue light to display a full spectrum of colors.

RGB

Smartphones store their operating system software in ________.

ROM

Files deleted from your Windows computer's hard drive are stored in the ________ until they are permanently deleted. Trash Can Computer icon Recycle Bin System tray

Recycle Bin

If your Windows 10 computer has trouble when booting, ________ attempts to diagnose and fix the system files. Set restore point Boot in safe mode Reset your PC Repair your PC

Reset your PC

Which power control option performs a warm boot?

Restart

Which of the following devices would use a real-time operating system? iPhone Roomba Vacuum Microsoft Surface tablet all of the above

Roomba Vacuum

Many full-featured smartphones support additional memory through micro _______ flash cards.

SD

________ is the default browser for Mac computers. Apple Safari Mozilla Firefox

Safari

The number of pixels that can be displayed on the screen at one time is known as what?

Screen Resolution

What is a specialty search engine? A collection of bookmarks on a topic A metasearch engine Searches only sites deemed appropriate to an interest or industry Fee-based search engines with human assistants

Searches only sites deemed appropriate to an interest or industry

The Performance tab displays summary usage information for all of the following EXCEPT ________. CPU Services Disk Memory

Services

Is it safe to use these types of free software? I mean, can they wreck my system or give me a virus or anything?

Setting a restore point before downloading any kind of software is smart.

What is the window's action center

Shows major events happening on your computer Provides quick access to security settings

what are Simulation programs?

Simulation programs are a form of educational software that allow you to experience or control the software as if it were an actual event, such as flying a plane.

Which of the following statements is TRUE? Smartphones are considered a type of computer. Smartphones do not contain a CPU. All cell phones are now smartphones. Smartphones have more computing power than desktop computers.

Smartphones are considered a type of computer.

_____ is a subset of e-commerce that uses social networks to assist in marketing and purchasing products. Eg. eBay or business ads on Facebook.

Social Commerce

When a vendor hosts software on a website and you don't need to install the software on your device, this is known as: beta software. freeware. Software as a Service. open source software.

Software as a Service.

What is setup.exe?

Some programs you download do not automatically install and run on your computer. In this case, you need to locate the files on your hard drive and find the program that is controlling the installation (usually named setup.exe). Once the setup program begins, you will be prompted to take the actions necessary to complete the installation.

Is it true that I can catch a virus from the Internet?

Some viruses, called scripts, can be hidden in websites. Sometimes, hackers also hide viruses (or Trojan horses) in programs or files you download off the web.

If you encounter a problem, the Windows ________ feature can take your system back in time to a point where it was working properly. System Restore Chkdsk Defrag Disk Scan

System Restore

Since I'm a student, can I buy discounted software? Would it be different from regularly priced software?

Students may be able to buy regular software at discount prices from a campus computer store or college bookstore, most online suppliers, and through mail-order companies. Some software developers also offer discounts to students.

What are some ease of access tools?

The Ease of Access screen provides a centralized location for assistive technology and tools to adjust accessibility settings. The accessibility features include the following: Magnifier: Creates a separate window that displays a magnified portion of the screen Narrator: Reads what is on the screen Can read the contents of a window, menu options, or text you have typed High Contrast: Color schemes invert screen color for vision-impaired individuals Speech Recogination: Allows you to dictate text and control your computer by voice On-Screen Keyboard: Allows you to type with a pointing device

What is the windows desktop?

The Windows Desktop is the primary working area.

What is antivirus software?

The best defense against viruses is to install antivirus software, which detects viruses and protects your computer and files. Antivirus software scans files when they're opened or executed. If it detects either a virus signature (portions of virus code) or a suspicious activity (like a macro or script being launched), it stops the execution of the file and notifies you it has detected a virus. You can then delete or repair the infected file. Unfortunately, antivirus programs can't always fix infected files, so you should keep backup copies of critical files just in case.

So, how do I test the firewall myself?

The best solution is for Dwayne to test the firewall with a testing agent such as ShieldsUp and LeakTest. ShieldsUP is a software program you can use to test whether your firewall is working properly. It is available at grc.com. This test was run on a computer connected to the Internet with no firewall installed. Any ports that are reported as open (such as port 1025) by this test represent vulnerabilities that could be exploited by hackers. Installation of a hardware or software firewall should close any open ports. Ports reported as closed or in stealth mode are safe from attack. Ports reported as open are subject to exploitation by hacker​

What if I download software from the Internet? Do I have to do anything special?

The installation process for programs downloaded from the Internet is usually done automatically, without any special interaction from the user. (Before you use most software, you must permanently place it, or install it, on your system. The installation process may differ slightly depending on whether you're installing the software from a DVD or downloading it from the web. In both cases, installation wizards guide you through the software installation process.)

What is the Kernel?

The kernel is the essential component of the OS. It manages the processor and all other components of the system. Because it stays in RAM the entire time your computer is on, the kernel is called memory resident. Other parts of the OS that are less critical stay on the hard drive and are copied over to RAM on an as-needed basis. These programs are called nonresident. Once the kernel is loaded, the OS takes over control of the computer's functions.

Which of the following is NOT true about the anatomy of a hard drive? Platters spin at a precise, constant speed of thousands of rpms. The read/write heads touch the platter only when it is spinning. A typical hard drive has two or more platters. The actuator moves the read/write heads.

The read/write heads touch the platter only when it is spinning.

In the RGB system, when all three component colors are set to zero, what is the result?

The resulting color is pitch black. (when all are set at max, its white)

Which of the following is NOT a benefit of allowing viewers to post comments on your blog? They can customize your blog's look and feel. They can direct you to other interesting blogs. They can direct you to other interesting websites. You can find out what your readers think.

They can customize your blog's look and feel.

Which of the following statements about macros is FALSE? They can be edited after initial creation. They can perform a maximum of five steps. They are reusable. ​​They automate a series of tasks.

They can perform a maximum of five steps. (Macros can have hundreds of steps if necessary. Has no limit)

Different versions of Linux are known as distros. True False

True

What are time bombs?

Time bombs are triggered by the passage of time or on a certain date.

How can I see more than one open window on my screen at a time?

To position an active window to any corner of the screen, press together the Windows key and a directional key on your keyboard.

How do you search for an exact phrase?

To search for an exact phrase, place quotation marks around your keywords. The search engine will look for only those websites that contain the words in that exact order

How do you search a specific website?

To search just a specific website, you can use the search keyword, then site: followed by the website's URL. For example, searching with weight loss site: NIMH returns results about weight loss from the National Institute of Mental Health website.

Which of the following parts of a URL indicates the type of organization a host is? Domain name Protocol Path Top-level domain

Top-level domain

Geolocation requires a GPS chip in a mobile device. True False

True

SSD drives are superior to conventional disk drives because they have no moving parts.

True

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network. True False

True

When you buy software, you can use it only as specified in the EULA. True False

True

Who built and operates the Global Positioning System?

U.S. Department of Defense

Which of the following ports has the fastest data transfer rate?

USB 3.0

If you want to narrow your search to more specific results, what can you do? Use multiple word search terms Use wildcards in your keywords Use Wikipedia Use square brackets around your search terms

Use multiple word search terms

Which of the following is NOT a benefit of creating a user profile? User profiles enable others with similar interests to find your blog. User profiles enable others to contact you via telephone. User profiles can provide access to other websites you might have. ​User profiles with images and audio links enable others to better connect with your blog.

User profiles enable others to contact you via telephone.

Which is NOT an example of a keyword search strategy to get more specific results? Using quotation marks around key words or phrases Using a metasearch engine Searching within a specific website Using wild cards

Using a metasearch engine.

n which programming language are Microsoft Office macros recorded? Assembly HTML C++ VBA

VBA

A feature in Windows 10 that is used to organize open windows into task-specific groups is called Snap Assist. Program Manager. Virtual View. Virtual Desktops.

Virtual Desktops

I need help. I just bought a computer that has Windows 10 installed and the Start Menu is cluttered with things I don't want. How can I make it more useful to me?

Virtually everything displaying on the Start Menu can be customized to make your experience most efficient and beneficial to you.

​VBA stands for __________. Virtual Background Assembler Visual Basic for Applications Vector Based Authoring ​Variable Buffer Analyzer

Visual Basic for Applications

Finally, What do I need to keep in mind when I buy a printer?

When choosing a printer, keep in mind its printing speed, its resolution, its color output capabilities, and the cost of consumables (ie. ink, printer cartridges, and paper).

what does Zipped mean?

When you download software, everything you need to install and run the program is on one file that has been compressed (or zipped) to make the downloading process quicker. For the most part, these downloaded files unzip or decompress themselves and automatically start or launch the setup program. During the installation and setup process, these programs select or create the folder on your computer's hard drive in which most of the program files will be saved.

What are some basics of the Windows 10 computer?

Windows 10 operating system is designed to run on multiple devices: desktops, laptops, tablets, and phones. There are often three different ways to accomplish tasks in Windows 10: Using a mouse Touching the screen (on touch-enabled devices) Using keystrokes Which method you use depends on the type of device you're using and, to a large extent, on your personal preferences.

If your system becomes unstable, you can reset it to a configuration from a past date by using __________. Windows Scan Disk Windows System Restore Windows System Archive Wizard ​​Windows File History

Windows System Restore (Windows System Restore allows you to reset your computer to a point in time when is was stable.)

What is the system restore point?

With System Restore, every time you start your computer or install an application or driver, Windows creates a snapshot of your entire system's settings. This snapshot is called a system restore point. If something goes wrong with your computer, you can use the Restore Point Wizard to set it back to the restore point at which it was working. System Restore does not affect your personal data files (such as Word documents or e-mail) so you won't lose changes made to these files when you use System Restore.

Which of the following are considered slightly different from viruses as they can run without user interaction? Keystroke logger E-mail viruses Spam Worms

Worms

So how can I protect my system?

You can buy antivirus software either online or in computer stores, and using its auto-scheduling feature to perform active scans of your computer at least once a week is recommended.

Can you tell me though how my computer can catch a virus? I mean, are there certain things I can avoid doing?

You can get a virus by launching an infected file you received as an email attachment. I You can get a virus by booting up your computer with an infected flash drive left in a USB port, and by enabling macros in infected Word or Excel documents.

-How often should I run a virus check?

You should run a virus check on your entire system at least once a week. Because these checks take time, you can set your software to run these checks automatically when you aren't using your system. This computer is set up so that a virus scan will be performed daily at 4:00 am.

Smartphones include all of the following EXCEPT ________.

a mouse

Videos can be embedded in a blog from all of these sources EXCEPT ________. a webcam a smartphone a TV YouTube

a TV

A macro is __________. complex, lengthy programming code a combination of several programming languages a small computer program ​​written in HTML

a small computer program

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called ________. a bug a worm spam a virus

a virus

​​Question 4: Smartphones integrate several kinds of sensors including ________. a system of satellites accelerometers a network of cellular towers ​​continuous television transmission signals

accelerometers Cellular towers are not part of your phone but are part of the cellular phone network. The correct response is that smartphones integrate several kinds of sensors including accelerometers, which enable the phone to detect whether it is being shaken or is moving in a specific direction.

The time it takes to select the correct platter and move the read/write head to the right track and sector is called the ________ time. access delay retrieval positioning

access

When booting a Windows 10 computer, the first step is ________. loading the OS into ROM performing the POST activating the BIOS loading the OS into RAM

activating the BIOS

Read/write heads are moved by the ________. platter arms spindle actuators

actuators

Match each of the following terms to its meaning: antivirus program backup security patch restore point system restore

antivirus program => prevents unwanted, malicious programs from being installed on your computer backup => duplicates files and programs on your hard drive security patch => update code provided by software vendor restore point => an exact copy of your hard drive system restore => returns your computer settings to a previous point in time

The blocks of code that are needed to for programs to work with the CPU are called application programing interface. application project interface. application device managers. none of the above.

application programing interface.

Two of the most important factors to consider when choosing an LCD monitor are its resolution and ________.

aspect ratio

BIOS stands for ________. binary input/output system basic image operating system basic input/output system binary image operating system

basic input/output system

Using _____________ , a smartphone can connect to an automobile audio/control system.

bluetooth

Viruses that load from USB drives left connected to computers when computers are turned on are known as encryption viruses. polymorphic viruses. script viruses. boot-sector viruses.

boot-sector viruses.

In an Internet exchange of data, which type of computer asks for data? servicer client server requester

client

Backing your work up to a(n) ________ is more secure than using an external harddrive. tape backup system cloud storage location Blu-ray disc internal hard drive

cloud storage location

Which of the following is used to reduce the file size of a file or folder? shrinker extraction compression defragmenter

compression

The hard disk _______ sends a signal to the drive when information stored on the hard drive has been requested.

controller

The practice of advertisers using software that gathers personal information about you is called ________. data mining data warehousing aggressive advertising handshaking

data mining

In everyday life, the most commonly used number system by people is ________. binary octal decimal hexadecimal

decimal

In the _________ numbering system, each place value digit is ten times greater than the digit to its right.

decimal

All of the following pose a threat to your computer EXCEPT ________. defensive computing yourself a software update a virus

defensive computing

Which view in File Explorer can you use to sort files by column heading? small icons tiles details large icons

details

If your computer hangs, you would go to the Processes tab to ________. determine whether a program is running or not check network throughput determine what services are running check the print queue

determine whether a program is running or not

Which component of a computing device drains the battery the fastest?

display screen

The most common output device for soft output is a

display screen.

A printer's resolution is measured in ________.

dpi

Altering an existing macro involves ________ it. editing running recording executing

editing

You can increase the number of USB ports on your computer by adding a(n) ________.

expansion hub

In c:\cis\400\proj3.docx, the docx is a(n) ________. extension folder file path

extension

Copyrighted software that certain program developers distribute for free is known as ________. trialware bloatware freeware firmware

firmware

Response time refers to the amount of time it takes ________.

for a pixel to change color

A hard disk must be ____ before it can be used to store data.

formatted

Match each of the following terms to its definition: freeware open source beta version bloatware system requirements

freeware => copyrighted software that is distributed without cost open source => software that is publicly available with very few restrictions beta version => software that is under development bloatware => Pre-installed software that is best to delete if not used system requirements => operating system, RAM, hard drive capacity, and processor speed

Operating systems that have windows and icons have which type of user interface? menu-driven command-driven graphical user magnetic tape-based

graphical user

A common use for ______ numbers is to represent colors on web pages.

hexadecimal

The list of results returned to you when you search for information on the web is called a list of ________. hits strikes keywords queries

hits

In the URL https://www.whitehouse.gov/blog, which part is considered the protocol? www.whitehouse.gov .gov http /blo

http

On secure websites, http changes to ________. httpsecure shttp https sws

https

Which of the following is the correct way to indicate a URL? http:\www.microsoft.com http:\\www.microsoft.com http:/www.microsoft.com https://www.microsoft.com

https://www.microsoft.com

Chacha has _________ search the web and provide results.

humans

All of the following are sensors found in certain smartphones EXCEPT

hygrometer

Question 3: Smartphones often use one of two major operating systems, either ________. Bluetooth or NFC iOS or Android Ubuntu or Linux ​ROM or RAM

iOS or Android

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as scareware theft. impersonation theft. identity theft. malware theft.

identity theft.

A(n) ______ backup creates an exact copy of an entire internal hard drive on an external hard drive.

image

A backup of the files required to restore your operating system is known as a(n) global backup. total backup. image backup. incremental backup.

image backup.

Match each of the following software categories to its purpose: image-editing software productivity software educational software desktop publishing drawing software

image-editing software => allows you to edit photos productivity software => includes programs such as word processing and spreadsheets. educational software => offers instruction or training desktop publishing => arrange graphics and text to produce creative documents drawing software => create or edit two-dimensional, line-based illustrations

You're most likely to find an RTOS in a robotic camera. on a supercomputer. on an iPad. on a mainframe.

in a robotic camera.

________ printers work by spraying tiny drops of ink onto paper

inkjet

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called quarantine. signature. updating. inoculation.

inoculation

Which of the following would be best for synchronous text-based communication? blogging e-mail texting instant messaging

instant messaging

Monster.com is an example of a(n) ________ search engine.

job

Bing is an example of a(n) ________ search engine.

keyword

Google is an example of a ________ search engine. subject-based chronological keyword metasearch

keyword

What type of printer heats toner to adhere it to the paper?

laser

Match the following terms to their meaning: links keywords metasearch job search engine Technorati

links => used to access the websites that match your criteria keywords => search terms metasearch => search using more than one search engine job search engine => sorts resumes and job postings Technorati => searches blogs

what does malware do?

malware, which is usually placed on your computer without you knowledge, does Data mining: Gathers personal information about you, Aggressive advertising: Displays ads on your computer, and Tracking: Records your surfing habits​​​​​. Hackers can also use Keystroke logger: Records everything you type, such as credit card numbers, Trojan horse: An app that appears to be one thing while it does another, and Backdoor programs and zombies: Used to launch denial-of-service attacks on other computers​​

Order ___bytes from smallest to biggest.

megabyte gigabyte terabyte petabyte

A(n) _______ engine searches other search engines.

metasearch

Search engines that search other search engines are called_____. gigasearch engines. metasearch engines. megasearch engines. betasearch engines.

metasearch engines

Some smartphones support additional memory through ________.

micro SD flash cards

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? mobile commerce B2B C2C social commerce

mobile commerce

Blinx is a ________ that searches YouTube, GoogleVideo, MySpace and other media files. keyword search engine human assisted search engine multimedia metasearch engine blog search engine

multimedia metasearch engine

When using File Explorer, the left-hand pane that shows the contents of the computer is called the ________ pane. navigation folder files details

navigation

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are. packet filtering port blocking network address translation (NAT) VPN

network address translation (NAT)

A macro enables you to automate repetitive tasks by ______ the steps that you take to accomplish them.

not performing. maybe executing

When you record a macro, all of the actions are converted by the program to ________ code.

not programming.

The BIOS is stored ________. on a ROM chip on a RAM chip in cache memory in the CPU

on a ROM chip

A firewall designed specifically for home networks is called a ________ firewall. personal static logical home

personal

Which feature of a browser enables you to secure a tab permanently? tear-off tabs tabbed browsing pinned tabs tab isolation

pinned tabs

An LCD screen is composed of a fixed grid of ________.

pixels

Speed for printers is measured in ________.

ppm

When an OS processes tasks in a priority order, it is known as multitasking handling. interruptive multitasking. preemptive multitasking. preemptive interrupting.

preemptive multitasking.

Which of the following is an example of a subdirectory in a URL? .com prenhall.com/tia HTTP:// aol.com

prenhall.com/tia

What web browser feature would be particularly useful when using public computers? pinned tabs privacy browsing session restore all of the above

privacy browsing

Which of the following functions of a computer is mostly responsible for turning data into information?

processing

When you record a macro, all of the actions are converted by the program to _________ code.

programming

Software built by companies and sold to users is called___. beta software. freeware. open source software. proprietary software.

proprietary software.

The first part of a URL, such as http:, indicates the set of rules, or ________, used to retrieve the specified document. path protocol browser domain

protocol

Match the following sites or terms to their content/description: publish YouTube profile Blogger.com blog

publish => making a post available for the world to see YouTube => a source for blog videos profile => let others know your personal interests Blogger.com => site for free blogs blog => popular way for sharing content on the web

A ______ is a program that takes complete control of your computer without your knowledge. sniffer VPN rootkit botnet

rootkit

To protect your computer, you should ________. have at least 16GB of RAM purchase the latest CPU schedule weekly virus scans stop using Internet sites

schedule weekly virus scans

You may do great harm to your computer by doing any of the following, EXCEPT ________. deleting necessary files not applying patches not creating restore points scheduling regular virus scans

scheduling regular virus scans

Match each of the following parts of this URL to its definition: https:// https://www.si.edu/Exhibitions si.edu Exhibitions https:// .edu

si.edu => domain Exhibitions => folder or subdirectory https:// =>protocol .edu => top-level domain

Hackers can use packet ________ to capture valuable information, then sell or use the information illegally. intruders filters sniffers interceptors

sniffers

Match each of the following terms to its definition: software license full installation software piracy Programs and Features custom installation

software license => legal agreement between the user and the software developer full installation => does not allow you to select specific features software piracy => the illegal copying of software Programs and Features => used to delete programs in Windows custom installation => an installation method that might save hard drive space

The Status column of the Task Manager's Services tab lists each service as either Running or ___. .

stopped

If you would like to return to a website that you visited last week but can't remember the URL, you should look at: a breadcrumb list the Recycle Bin the History list any of the above

the History list.

The Windows 10 Start Menu contains ________, which provide access to applications. directories tiles widgets icons

tiles

The Better Business Bureau seal on a website indicates ________. a business to business (B2B) site a business to consumer (B2C) site third-party verification purchases can only be done using credit cards

third-party verification

A kilobyte contains approximately one ________ bytes of data.

thousand (1,024 to be exact)

Match each of the following terms to its description: tiles directory group Start Menu File Explorer

tiles => square icons that appear on the Windows 10 Start Menu directory => hierarchical structure that includes files, folders, and drives group => a collection of Tiles on the Start Menu Start Menu => provides access to all applications File Explorer => program used to manage files and folders

A virus that is triggered by the passage of time is called a ________. logic bomb time bomb macro virus worm

time bomb

Formatting organizes the disk into _____ (rings) and sectors (wedges).

tracks

You can separate words in a macro name by using the _________ character.

underscore

Touch-screen devices usually feature _____________ keyboards.

virtual

The OS can optimize RAM storage by using (1 point) virtual memory. thrashing. a spooler. an interrupt handler.

virtual memory.

Antivirus software looks for ____ to detect viruses in files. virus bots virus artifacts virus signatures virus VPNs

virus signatures

Which technology is being used in creating a document with Google Docs? e-mail blog microblog wiki

wiki

What software do I need to create 3D graphics? 1.You need mapping programs to help you with this. 2.You need DTP software for this purpose. 3.You need CAD programs to create flowcharts. 4.You need simulation software for this purpose.

3 (Computer-aided design (CAD) programs are a form of 3D modeling engineers use to create automated designs, technical drawings, and model visualizations.)

How do I ensure that the software I buy will work on my computer? 1. Ensure that you have the set of system requirements of sufficient storage, memory capacity, and processing capabilities for the software you are installing. 2. You need to call up the manufacturer's help desk to know how to tweak the software settings as per your system setup. 3. You need to ensure that your system setup has the latest OS and the amount of RAM as specified on the software package that you wish to install. 4. You need to install an additional 250 GB hard drive to accommodate all new software.

1 (Every software program has a set of system requirements that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity. These requirements are generally printed on the software packaging or on the manufacturer's website. Before installing software on your computer, ensure that your system setup meets the minimum requirements.)

Besides committing identity theft, what else can hackers do? 1.Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge. 2.Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is an unwanted piggyback program run in the background of your system that gathers information about you, usually your Internet surfing habits, without your knowledge. 3.Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the logical ports in your computer without your permission. 4.Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse blocks all the physical ports in your computer without your permission.

1 (Hackers can insert Trojan horses into unprotected computers. A Trojan horse is a program that appears to be something useful or desirable (like a game or a screen saver), but at the same time does something malicious in the background without your knowledge. Often, the activity perpetrated by a Trojan horse is the installation of backdoor programs, which allow hackers to take almost complete control of your computer. Computers that hackers control in this manner are referred to as zombies.)

Which of the following is a good suggestion for solving a boot problem? 1.If you've recently installed new software or hardware, try uninstalling it. If the problem no longer occurs when rebooting, you can reinstall the device or software. 2.Try uninstalling Windows and reinstalling a prior stable version. 3.Try exiting out of Stable Boot Mode. 4.Power your computer on and off several times quickly.

1 (If you've recently installed new software or hardware, try uninstalling it. (Make sure you use the Uninstall a program feature in the Control Panel to remove the software.) If the problem no longer occurs when rebooting, you can reinstall the device or software.)

What kind of software will be needed for taking courses over the Internet? 1.Online classes are run through course management software programs. 2.Online classes are run through test preparation software. 3.Online classes are run through project management software. 4.Online classes are run through simulation programs.

1 (Many online courses are run through course management software such as Blackboard. These programs provide traditional classroom tools such as calendars and grade books over the Internet and are becoming popular because they offer greater schedule flexibility for busy students.)

Once the kernel is loaded, is my computer up and running? 1.Not yet. The OS checks the registry for further configurations and customizations. 2.That is right. Once the kernel is loaded, your computer is ready to accept your commands. 3.Not yet. The OS asks for your login name and password. 4.Not yet. The operating system checks your Device Manager in Safe mode.

1 (Once the kernel is loaded, the OS needs to check the registry for further configurations and customizations. The registry contains all of the configurations used by the OS, including the customized settings you put into place, such as display settings for your monitor. If the entire system is checked out and loaded properly, the desktop appears on your screen. The computer system is now ready to accept your first command.)

What can I do to protect my computer? 1.The most important preventive measure you can take is to install antivirus software. 2.The most important preventive measure you can take is to install a firewall. 3.Just avoid visiting unknown websites that may launch malicious scripts on your computer. 4.The most important preventative measure you can take is to install packet filtering.

1 (The best defense against viruses is to install antivirus software, which scans files when they're opened or executed and detects virus signatures or suspicious activities and stops them.)

What software is used to edit digital photos and digital video? 1.To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Adobe Photoshop. For your videos, try a digital video-editing software application, such as Microsoft Movie Maker, or the more full-featured Adobe Premiere Pro. 2.To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Adobe InDesign. For your videos, try a digital video-editing software application, such as Microsoft Movie Maker. 3.To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Corel PaintShop Pro. For your videos, try a digital video-editing software application, such as Adobe Premiere. 4.To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Microsoft Movie Maker. For your videos, try a digital video-editing software application, such as Adobe Photoshop.

1 (The image-editing software included with digital cameras allows you to perform common tasks, such as removing red-eye. Adobe Photoshop Elements is image-editing software geared to the casual user. Adobe Photoshop and Corel PaintShop Pro Photo are fully featured image-editing applications offering tools designers use to create images used in logos and ads. Many digital video-editing software programs are on the market. The most expensive (such as Adobe Premiere Pro) offer a wide range of tools, though cheaper programs such as Microsoft Movie Maker have enough features to keep casual users happy.)

What about installing software that I download from the Internet? 1.Downloaded software comes in one compressed file having everything needed for installing and running the program. Mostly, these downloaded files unzip themselves and automatically start the setup program. 2.When you download software, you have to run a separate installation program that then prompts the download process to begin. 3.To install a program that is downloaded, you need to locate the file command from your hard drive and complete the setup process. 4.To install a program that is downloaded, you need to contact the manufacturer's help desk for a special code.

1 (When you download software, everything you need to install and run the program is in one file that has been compressed (or zipped) to make the process quicker. For the most part, these downloaded files unzip themselves and automatically start or launch the setup program. Only some programs you download do not automatically install. In such cases, you need to locate the files on your computer and find the setup.exe program to complete the installation.)

2) What other precautions can be used to ensure secure online transactions? 1.Always using PayPal helps ensure your online transactions are secure. 2.You should also keep in mind that you should shop at reputable sites, investigate unfamiliar sites, and save the details of your transactions. 3.You should also ensure that the company has a phone number and street address in addition to a website. Additionally, avoid paying by credit card as much as possible. 4.You should pay by debit card only.

2

6) What are domain names? 1.Domain names consist of two parts: the first part indicates a site's home page and the other part indicates a particular file within the website. 2.Domain names consist of two parts: the first part indicates the site's host and the other part indicates the kind of organization the host is. 3.Domain names consist of two parts: the first part is a web indexer and the other part indicates the site's host. 4.Domain names consist of two parts: the first part is the web protocol and the other indicates the kind of organization the host is.

2

8) What's the best way to mark a page for return the next time on the web? 1. To return to a specific web page, use the Refresh button. 2. You can return to a specific web page using your browser's Favorites feature. 3. You can return to a specific web page using the browser's History List feature.​ 4. You cannot return to a specific web page unless you re-enter the URL.​

2

But how will a firewall help if I'm not exchanging any valuable information over the Internet and don't have any important files on my computer? 1.A firewall protects your computer by blocking all the logical ports that allow data to come in. As long as you send and receive attachments over e-mail, you need a firewall. 2.A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft. 3.A firewall protects your computer by blocking off access to all physical ports or communications gateways to the computer. It is in essence a packet filtering device that prevents hacker intrusion. 4.A firewall protects your computer by blocking access to all logical and physical ports.

2 (A firewall protects a computer by screening data coming into its logical ports to confirm whether it's from a trusted source. You need a firewall as hackers can commit identity thefts. Using packet sniffers, hackers "sniff" the packets travelling the Internet, capture valuable content, and sell or use the content illegally.)

Once the BIOS program is activated, what happens next? 1.The BIOS loads the operating system into RAM. 2.The BIOS makes sure that all your computer's peripheral devices are attached and working. 3.The BIOS verifies your login name and password. 4.The BIOS checks the kernel is loaded.

2 (After BIOS is activated, it checks that all attached devices are in place and working. It also checks to see whether the video card and video memory are responding correctly. This test is called a power-on self test, or POST. The BIOS then compares the results of the POST with the hardware configurations stored in CMOS, a special kind of memory that uses almost no power and is never erased. If the results of the POST match the configurations stored in CMOS, the boot process continues.)

If my Microsoft Excel file is all garbled, could it have a virus? 1.It sounds like you definitely have a virus. You need to run antivirus software. 2.It sounds like it could be a virus, but it could also be another problem, such as a corrupt file. You should try to open other files in Excel first. 3.It sounds like your Excel application itself is corrupt. You should try to reinstall Excel. 4.Try to open your Excel file in a previous version of Excel. If it won't open, it is a virus.

2 (Although the symptoms you describe sound like a virus infection, they might actually be caused by another problem, such as a corrupted file. Try to open another file in Excel. If that opens up fine, it means that your file is corrupt. If not, your Excel application itself may be corrupt and should be reinstalled. It's a good idea to run antivirus software too and rule out virus infection.)

5) What happens after the POST? 1.After POST, BIOS copies the operating system from ROM to the hard drive. 2.After POST, BIOS copies the operating system from the hard drive to RAM. 3.After POST, BIOS copies the operating system from the hard drive to the ROM. 4.After POST, BIOS performs the authentication process.

2 (BIOS loads the OS from its permanent storage location on the hard drive to RAM. Once the OS files are loaded into RAM, the kernel is loaded.)

Is web page-authoring software the same type of software I would use if I wanted to design a brochure or newsletter? 1.Yes, you can easily use web page-authoring programs to design newsletters and brochures. 2.Actually, to design newsletters and brochures, you would need special software, such as Adobe InDesign. 3.Actually, you need special graphics software, like Adobe Premiere, to design newsletters and brochures. 4.Actually, Peachtree is the best software for designing newsletters and brochures.

2 (Desktop publishing programs such as Adobe InDesign offer a variety of tools with which you can format text and graphics and design and lay out complex publications. Also note that some word-processing programs allow you to lay out simple brochures and newsletters.)

Once I download or buy the firewall software, how do I get it installed and tested? 1.You need a software programmer to create a special drive to install the firewall and use the Error-Check utility. It will check for any errors in the firewall tests and you can proceed accordingly.​ 2.Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe. 3.Just call the local technician. Do not try to install it on your own. It will cause system problems. You can test it on your own though, because all firewalls come with testing software.​ 4.You can install the firewall on your own but testing requires a certified professional or you will have a hard drive crash.​

2 (Firewalls can be easily installed. Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test the firewall on your own with the help of a testing agent such as ShieldsUP! It is available at www.grc.com.​)

What is the boot process? 1.The boot process ensures that the operating system is loaded into ROM. 2.The boot process ensures that the operating system is loaded into RAM. 3.The boot process ensures that the operating system is loaded onto the hard drive. 4.The boot process ensures that the operating system is loaded into the kernel.

2 (The boot process is the process that occurs when you start your computer. It involves four main steps, the outcome of which is that the operating system is loaded into RAM from its permanent storage location on the hard drive.)

What is the kernel? 1.The kernel is the essential component of the OS. It manages the ROM. 2.The kernel is the essential component of the OS. It manages the processor and all other components of the system. 3.The kernel is the essential component of the OS. It manages the configuration of peripherals. 4.The kernel verifies your login name and password.

2 (The kernel is the essential component of the OS that manages the processor and all other components of the system. Because it stays in RAM the entire time your computer is powered on, the kernel is called memory resident. Other parts of the OS that are less critical stay on the hard drive and are copied over to RAM on an as-needed basis. These programs are called nonresident.)

Which web-authoring software enables users to create sophisticated web pages without knowing any HTML code? 1.A program like QuarkXPress allows you to create sophisticated web pages without knowing HTML code. 2.A program like Adobe Dreamweaver allows you to create sophisticated web pages without knowing HTML code. 3.A computer-aided design (CAD) program helps users create sophisticated web pages without knowing HTML code. 4.A desktop publishing program like Adobe InDesign helps users create sophisticated web pages without knowing HTML code.

2 (Web page-authoring software such as Adobe Dreamweaver allow even novice users to design interesting and interactive web pages, without knowing any HTML code. Note, too that if you need to produce only the occasional simple web page, many software applications such as Microsoft Office include features that enable you to convert your document easily into a web page.)

Do I face any risks when I install or download beta versions and freeware from the Internet? 1.Freeware contains up-to-date virus protection, and beta products are generally developed by reliable developers. As such, there aren't really any risks. 2.You must exercise caution when downloading freeware and beta versions as they may contain bug or viruses. 3.Freeware is associated with the risk of bugs or viruses, whereas beta products have built-in virus protection and are generally developed by reliable developers. Hence, it's important that you exercise caution with freeware. 4.The whole concept of freeware and beta versions assumes ethics and therefore they are thoroughly safe.

2 (You must exercise caution when downloading freeware and beta versions as they may contain bugs or viruses. This is because beta products may not be from a reliable developer so are not always bug free. As a result, you run the risk of something going awry with your system when using them. Loading freeware programs that are not written for your computer's operating system can also crash your system and may force you to reinstall your operating system.)

7) Sometimes an address looks like www.nytimes.com and at other times like www.nytimes.com/pages/cartoons. What do the parts after .com indicate? 1.Actually, both these addresses mean that you are requesting a site's home page. These will connect you to the home page or main page of the website. 2.When you connect using only the domain name, such as in the first example, you can visit only the home page of the website and cannot move around the site. When there is additional information after the slash, you can visit the home page but can also move all around the site. 3.The difference is that when the URL is only the domain name, you are requesting a site's home page. When there is additional information after the slash, it indicates a particular file or path within the site. ​ 4.Actually, both of these addresses mean that you are requesting a site's subdirectory.

3

The Windows app used for locating files and folders is 1. Finder. 2. Library Explorer. 3. File Explorer. 4. Disk Manager.

3

Using Windows, which utility program should I use to make my computer run faster? 1.You can use the Error-checking utility to speed up your computer. 2.You can use the ScanDisk utility to speed up your computer. 3.You can use the Disk Defragmenter to make the PC run faster. 4.You can use the System Restore to speed up your computer.

3

Why are the letters at the end of file names (like .docx) needed? 1. The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what drive it should store the file in when it is saved. 2. The letters that follow the period at the end of a file name are the file's extension. This enables the windows drive organization to function. 3. The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file. 4. The letters that follow the period at the end of a file name are the file's extension. This provides the information on how long ago the file was saved.

3

What exactly is a virus? 1.A computer virus is a computer program that appears to be something useful or desirable (like a game or a screensaver), but at the same time does something malicious in the background without your knowledge, such as destroying your files. 2.A computer virus is a computer program that looks at packets as they travel on the Internet and infects them with debilitating code. 3.A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged. 4.A computer virus is a computer program deployed by hackers that looks at each packet as it travels on the Internet.

3 (A computer virus is a program that attaches itself to another program and attempts to spread to other computers when files are exchanged. Virus symptoms include icons or files disappearing, browser changes, and odd images appearing and sounds playing. A virus may also be one cause of data files becoming corrupt or programs not working.)

So, am I all set after I have the antivirus software up and running? 1.Yes. You are all set and can use your computer without fear of infection from viruses or worms. 2.Not really. You need to make sure you update your application software regularly. 3.Not really. You need to keep both your antivirus software and your system software up-to-date. 4.Not really. You need to update your application and system software.

3 (Antivirus software catches only known viruses. Unfortunately, new viruses are written all the time. To minimize the risk of your computer being attacked by a new virus your software can't detect, you need to keep your antivirus software up-to-date. In addition, many viruses are created to exploit weaknesses in operating systems. To combat these threats, make sure your OS is up-to-date and contains the latest security patches (or fixes) that software manufacturers provide.)

What else can hackers do? 1.Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is an attack on your Disk Operating System. It enables the hacker to gain control of your OS by which he can create problems in the files stored in your unprotected computer. 2.Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is actually a virus that attacks the hard drive, corrupting the files stored in your computer. 3.Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer. 4.Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is when the hacker uses your personal information for the purpose of defrauding you.

3 (In a denial-of-service (DoS) attack, a hacker makes repeated requests of a system through a zombie, a computer that the hacker has taken over. A computer can handle only limited requests for information at a time. On being flooded with requests in a DoS attack, the system shuts down, denying access to legitimate users. Some hackers launch distributed denial-of-service (DDoS) attacks, which are attacks launched from more than one zombie at the same time and are harder to stop.)

How do logic bombs and worms work? 1.Logic bombs execute when a certain set of conditions is met and spread when infected files are passed from user to user, whereas worms infect a host file and wait for you to execute that file before they spread. 2.Logic bombs run independently of host file execution and are much more active in spreading themselves, whereas worms infect a host file and wait for you to execute that file before they spread. 3.Logic bombs execute when a certain set of conditions is met and are spread when infected files are passed from user to user, whereas worms run independently of host file execution and are much more active in spreading themselves. 4.Logic bombs replicate themselves to a hard drive's master boot record, whereas worms run independently of host file execution and are much more active in spreading themselves.

3 (Logic bombs execute when a certain set of conditions is met, such as starting a program a certain number of times, and can even reformat your hard drive. Logic bombs are spread when infected files are passed from user to user. Unlike viruses, worms run independently of host file execution and are much more active in spreading themselves. This causes problems as the volume of e-mail traffic and network activity generated by worms attempting to spread can bring networks to a halt.)

What are logical ports? 1.A logical port is an external port that allows you to transfer data and make requests from other computers. 2.A logical port is like a filter fitted to your computer. The logical port checks to be sure that any information that you send or receive is logically acceptable. If it's not, it is rejected by the logical port. 3.A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers. 4.A logical port is a large group of software programs that runs autonomously on zombie computers.

3 (Logical ports are virtual, not physical, communications gateways that allow a computer to organize requests for information from other networks or computers. Logical ports are numbered and assigned to specific services. For example, e-mails are sent through logical port 25. Open logical ports invite intruders. If you don't restrict access to your logical ports, hackers can access your computer through them.)

Is it important to have a firewall on a home network? 1.If you're using a dial-up Internet connection, you don't need a firewall. 2.You need it only if you're going to buy things online with a credit card. If not, you can do without a firewall. 3.To be safe, you should always have a firewall if you plan to connect to the Internet. 4.Hackers don't bother home computers.

3 (Regardless of whether you have a broadband or dial-up Internet connection, to protect your home network from hackers, you need a firewall.)

And what are scripts? 1.Scripts are programs or files you download off the web. Once executed, they perform their malicious duties in the background, often invisible to the user. 2.Scripts are programs that seem to be screensavers but actually perform other activities that can harm your computer in the background. 3.Scripts are mini programs that are executed without your knowledge when you enter a site. 4.Scripts are changes in its own code that avoid detection.

3 (Scripts are small programs, hidden in websites, which are executed without your knowledge when you enter a site. They are often used to perform legitimate functions on websites, such as collecting name and address information. However, some scripts are malicious and can infect your computer with a virus.)

How can my computer catch a virus? 1.One way your computer can get a virus is when too many people use the same computer. 2.One way your computer can get a virus is by booting it with an unformatted DVD in the DVD drive. 3.One way your computer can get a virus is by booting it with an infected flash drive left in a USB port. 4.One way your computer can get a virus is by running antivirus programs.

3 (Your computer can get a virus by booting up your computer with an infected flash drive left in a USB port. Such boot-sector viruses are commonly found on infected disks and replicate themselves into the hard drive's master boot record (a program that executes whenever a PC boots up). This ensures that the virus is loaded into the PC immediately. Other viruses include macro, time bombs, e-mail viruses, logic bombs, scripts, encryption viruses, and worms.)

I've heard some friends talking about software that they got for free. Can you tell me more about free software? 1. Software you can use for free is called freeware or beta ware, but it prevents you from using the product once the initial trial period is over. 2. You can use freeware, which is software that can be used free for a limited time. Alpha versions, software still under development, are also available for free. 3. You can use freeware, software that is available for free, and beta versions, free software that is still under development. 4. Copyleft is the only free software.

3. (Freeware is copyrighted software that you can use for free. Some software developers offer beta versions of their software—that is, versions that are still under development—free of charge to users so that errors or bugs can be reported before the software is commercially released.)

2) Do I have a choice in browsers? 1.Microsoft Edge is the default browser for home computers and is the most reliable browser in use today. 2.Although there are other choices, they are very expensive. 3.Microsoft Edge is the most used browser on the market and there are no others. 4.There are other choices to using Microsoft Edge, including Firefox and Safari, and Google Chrome.

4

How do you resolve errors in the boot process?

Sometimes problems occur during the boot process. Here are some suggestions for solving a boot problem: If you've recently installed new software or hardware, try uninstalling it. (Make sure you use the Uninstall a program feature in the Control Panel to remove the software.) If the problem no longer occurs when rebooting, you can try reinstalling the device or software. Try accessing the Windows Advanced Options Menu. If Windows detects a problem in the boot process, it will add Last Known Good Configuration to the Windows Advanced Options Menu. Every time your computer boots successfully, a configuration of the boot process is saved. When you choose to boot with the Last Known Good Configuration, the OS starts your computer by using the registry information that was saved during the last shut down. If you are running Windows 10, you can also try resetting your computer. Reset your PC attempts to diagnose and fix errors in your Windows system files that are causing your computer to behave improperly.

What are all the steps to the boot process?

Step 1: The CPU activates the basic input/output system (BIOS). The BIOS is located on a ROM chip. Data stored in ROM does not get erased when the computer is turned off.​ Step 2: BIOS checks that all attached devices are in place and working and that the video card and memory are responding correctly. This test is called a power-on self-test (POST). If the results of the POST are OK, the boot process continues. Step 3: BIOS goes through a preconfigured list of devices in its search for the drive that contains the system files. When located, the operating system loads into RAM from its permanent storage location on the hard drive. Step 4: The registry is checked for further configurations and customizations. If the entire system is checked out and loaded properly, the desktop appears on your screen. The computer system is now ready to accept your first command.

The __________ utility allows you to create a copy of your entire hard drive on an external hard drive. Backup and Restore Scan Disk Disk Copy ​System Image

System Image (The System Image utility allows you to make a copy of your operating systems, apps, and data files.)

Which of the following is not considered an accessibility utility? System Restore Magnifier Narrator Speech Recognition

System Restore

The Windows diagnostic tool used to monitor how efficiently a computer is running is the ________. Task Manager Diagnostics tab Services bar Taskbar

Task Manager

Which Windows utility program is used to exit out of a program that has stopped responding? Task Manager Disk Cleanup Program Manager Disk Defragmenter

Task Manager

Which utility is used to exit from a nonresponsive program? System Refresh Disk Cleanup File Explorer Task Manager

Task Manager

Which of the following would you NOT see on a Windows 10 Start menu? apps list tiles Task View Power

Task view

Which search engine is specifically designed to search blogs? Yippy Technorati ChaCha Google

Technorati

I have File Explorer open, and I see my drives and folders. What does the one labeled C: drive mean?

The C: drive is the hard drive, where most files are permanently stored. Jill may have additional drives depending on whether she has storage devices like a flash, CD, or DVD drive installed in her computer. Windows organizes the contents of the computer in a hierarchical structure with drives, folders, subfolders, and files. The hard drive is represented as the C: drive. There may be other drives (D, E, F, and so on) depending on whether additional storage devices are installed in (or connected to) the computer. The C: drive is the top of the filing structure of the computer system and is referred to as the root directory. All folders and files are organized within the root directory or within folders on the root directory.

Which of the following does NOT indicate that a website is secure? The URL begins with https://. A closed padlock appears in the toolbar. The Microsoft seal displayed on the toolbar. The address bar is colored in green.

The Microsoft seal displayed on the toolbar.

What does the POST do?

The POST tests the video card and video memory, identifies the BIOS, and tests that the memory chips are working ​The BIOS then compares the results of the POST with the hardware configurations stored in CMOS, a special kind of memory that uses almost no power and is never erased. If the results of the POST compare favorably to the configurations stored in CMOS, the boot process continues.

What is the Processes tab of Task Manager?

The Processes tab of Task Manager lists all programs that you are using and indicates whether they are working properly or have stopped improperly (not responding). You can terminate programs that are not responding by pressing the End Task button in the dialog box.

What is the Start Menu?

The Start Menu provides access to all your applications. It's divided into two sections. The right side has block tiles that, when clicked, launch applications, installed software, as well as files and folders. Tiles can be grouped together and resized to accommodate personal preferences. The left side of the Start Menu provides access to all installed programs, as well as to File Explorer, Settings, and Power buttons.

What is the task manager?

The Task Scheduler utility should not be confused with the Task Manager utility. You use the Windows Task Manager utility to check on a program that has stopped working or to exit out of a nonresponsive program. Although you can access Task Manager from the Start button shortcut menu, it is more easily accessible by pressing Ctrl + Alt + Del at the same time, or by right-clicking on an empty space on the taskbar at the bottom of your desktop.

What is digital video-editing software?

Users who take lots of videos may want to learn about digital video-editing software, which allows users to edit and manipulate digital video. There are quite a few video-editing programs on the market. Although the most expensive products (such as Adobe Premiere Pro and Final Cut Pro) offer the widest range of special effects and tools, some moderately priced video-editing programs have enough features to keep the casual user happy. For a free program that is simple to use, try Microsoft Movie Maker, which is available as a free download from the Microsoft website for those running Windows.

Which of the following is NOT a good method to evaluate a website as appropriate for research? Paying attention to the URL to make sure it's from a respected source Using specialized search tools such as Google Scholar Using an ecommerce website Looking for clues of bias such as a specific agenda

Using an ecommerce website

What do I do if I need to get rid of the application?

Using the Programs and Features icon in the Control Panel is a good option. By clicking on the program you want to delete, you can then choose Uninstall, Change or Repair. Choosing Uninstall will run the proper cleanup routine to clear out all of the files associated with the application, and also restores any settings that have been changed. You can also tell Susan that if she's using Windows 8 or 10, she can right click the program tile on the Start Screen, and then select Uninstall.

What Is the Disk Defragmenter Utility?

Utility programs are small applications included in system software that perform special functions such as managing system resources and improving efficiency. Some utility programs come built into the Windows or Mac operating systems; others you can install separately. One utility that helps the operating system (or OS) work more efficiently is the Disk Defragmenter utility.

Which of the following is an uncompressed audio file format? WMA AAC WAV MP3

WAV

What is web page-authoring software?

Web page-authoring software allows even the novice to design interesting and interactive web pages, without knowing any HTML code. These applications often include wizards, templates, and reference materials to help you easily complete most web page-authoring tasks. More experienced users can take advantage of the more advanced features that enable you to make your web content current, interactive, and interesting. Squarespace and Adobe Dreamweaver are two popular programs that both professionals and casual web page designers use. If you only need to produce the occasional web page, many software applications include features that enable you to easily convert a document into a web page. For example, in some Microsoft Office applications, you can choose to save the file as a web page and the application will automatically convert the file to a web-compatible format.

When evaluating the validity of information found on websites, which of the following is FALSE? You should determine whether the information is biased. You should see if the site has the date when it was published. You should verify information with other online and non-web sources. You should assess that all web pages contain at least some valid information.

You should assess that all web pages contain at least some valid information.

Do you have any other tips about what I should or shouldn't do when I name files?

When you name your files, keep in mind the following tips and conventions: Each operating system has its own naming conventions, or rules. Pay attention to them to avoid getting error messages when you name files. Name your files so that you can easily identify them. A file name like "research.docx" may be descriptive to you if you're only working on one research paper, but not if you're working on many. No two files stored on the same device or folder can share both the same file name and the same extension.

Do I have to add the extension?

When you save a file created in a Windows operating system, you do not need to add the extension to the filename; it is automatically added for you. With Mac and Linux operating systems, you are not required to use file extensions when saving files. This is because the information as to the type of application the computer should use to open the file is stored inside the file itself. However, if you're using these operating systems and will be sending to Windows users, you should add an extension to your filename so that they can easily open your files.

Match each of the following programs or tools to its description: WinZip and StuffIt Task Manager Magnifier Ease of Access Task Scheduler

WinZip and StuffIt => file compression programs Task Manager => allows you to exit out of nonresponsive programs Magnifier => an accessibility feature Ease of Access => centralized location for assistive technology Task Scheduler => allows you to run utilities automatically at predetermined times

what are worms?

Worms are slightly different from viruses in that they attempt to travel between systems through network connections to spread their infections. Whereas viruses infect a host file and wait for you to execute that file before they spread, worms can run independently of host file execution and are much more active in spreading themselves.

Do I only need anti-virus software to protect my computer?

Zainab will need to make sure she updates her antivirus software regularly. However, she should also update her OS regularly. -Antivirus software catches known viruses effectively. Unfortunately, new viruses are written all the time. To minimize the risk of your computer being attacked by a new virus your software can't detect, you need to keep your antivirus software up to date. Most antivirus programs (like Windows Defender) have a feature that downloads a list of updates for virus signature files every time you go online. -Many viruses exploit weaknesses in operating systems. To combat these threats, make sure your OS is up to date and contains the latest security patches (or fixes). Windows makes this easy by providing automatic updates. When you enable automatic updates using the Windows Update utility, your computer searches for Windows updates on Microsoft's website every time it connects to the Internet.

An unusual advertisement on your computer screen that pops up is usually caused by ________. adware or spyware antivirus software a Trojan horse keystroke loggers

adware or spyware

When you are surfing the web anonymously, temporary files created are immediately deleted. you are using a browser that has privacy tools. the sites you visit are not stored in the browser history. all of the above

all of the above

Which of the following describes an IP address? It is referred to as a dotted quad. It identifies any computer connecting to the Internet. It identifies a website. all of the above

all of the above

Which of the following is considered a benefit of using simulation programs? They allow users to experience potentially dangerous situations without risk. They help to prevent costly errors. They allow users to experience or control the software as if it were an actual event. all of the above

all of the above

If you regularly use a program which uses useful pop-ups, you can ______ them for that site in Internet properties Pop-up blocker settings

allow

Software that includes programs to help you at work, home, and school is called application software. Software as a Service (SaaS). productivity software. open source software.

application software.

The System Restore utility can ________. be used to return the system to a date when everything worked properly overwrite a faulty operating system remove personal data created or modified after setting the restore point quarantine and remove viruses and spyware

be used to return the system to a date when everything worked properly

Match each of the following terms to its meaning: binary hexadecimal decimal bit pattern RGB

binary => base 2 hexadecimal => base 16 decimal => base 10 bit pattern => 16 binary digits equals 4 hexidecimal digits RGB => allows for 256 combinations for each color

Match the following terms to their meaning: binary hexadecimal decimal RGB base

binary => numbering system that uses 0s and 1s hexadecimal => numbering system that uses base 16 decimal => people normally use this numbering system RGB => coding system for displaying colors on a computer screen base => number that represents the value of each digit

Authentication techniques that rely on personal biological traits are called botnets biometrics Trojan horses scanners

biometrics

When naming a macro, the name CANNOT contain any ________. underscores blank spaces numbers hyphens

blank spaces

A program that executes whenever a computer starts up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load is called a ________. boot-sector virus logic bomb time bomb multipartite virus

boot-sector virus

The Internet was created to provide_______. A. a secure form of communications. B. a common communication means for all computers. C. both a and b D. neither a nor b

both a and b

What is the navigation aid that shows users the path they have taken to get to a web page located within a website? Bookmarks social bookmarks breadcrumb trail Favorites

breadcrumb trail

A website's URL can identify all of the following things EXCEPT the ________. browser required to view the website website's domain name protocol used to retrieve a web document file path for additional pages within the website

browser required to view the website

3) How many bytes are there in a megabyte? 1.A megabyte is approximately 1,000 bytes. 2.A megabyte is about a million bytes. 3.A megabyte is about a billion bytes. 4.A megabyte is more than one quadrillion bytes.

2

Data and information are interchangeable terms.

False

RAM is nonvolatile storage.

False

The colors displayed by an LCD monitor are made by combining which of the following colors?

Yellow, red, blue, and green

Computers store information in ______ (Base 2), which is difficult, if not impossible for humans to read.

binary

Eight binary digits is equal to ________.

1 byte

4) What is the fastest port on the market? 1.A solid-state port. 2.The Thunderbolt port. 3.A USB 3.1 port. 4.Serial Port.

2

Which of the following statements about flash memory is FALSE?

A flash drive is needed to read a flash memory card.

How do LCD monitors work?

A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals move around, blocking light waves generated, or letting them shine through, creating images on the screen.

Which of the following statements is FALSE? Bit is short for binary digit. A single bit can represent a single letter. When referring to computers, every number, letter, or special character consists of a unique combination of 8 bits. Everything a computer does is broken down into a series of 0s and 1s.

A single bit can represent a single letter.

Which of the following CANNOT be represented by a single byte? A special character such as @ A word such as Tom A number such as 45 A letter of the alphabet such as Y

A word such as Tom

Which of the following optical storage devices holds the most high-definition video?

BD

Which of the following storage devices has the most capacity?

BD

​​Question 2: Within a computer, information is stored using __________. Base 2 Base 8 Base 10 ​​Base 100

Base 2

Computers work only with ________.

Binary numbers (aka zeros and ones)

I know that soon I'll need a printer too. What choices do I have?

Inkjet printers and laser printers are the two main types of printers available for home computers.

What else can you tell me about inkjet printers and how they work?

Inkjet printers work by spraying tiny drops of ink onto paper. They offer quiet, fast, and high-quality printouts and are affordable. They can also print images that look like professional-quality photos.

Match each of the following terms to its definition: bit byte hertz megabyte terabyte

bit => 0 or 1 byte => 8 binary digits hertz => machine cycles per second megabyte => greater than a kilobyte, smaller than a gigabyte terabyte => more than one trillion bytes

In a computer, each_____ can represent one letter, number, or symbol.

byte

​​Question 2: Smartphones use cloud storage to __________. avoid texting charges speed up processing add extra sensor inputs ​synchronize files between the phone and other devices

​synchronize files between the phone and other devices

Question 5: Binary digits are also called __________. nibbles bites bytes ​​​bits

​​​bits

6) What kind of port is needed to connect an LCD monitor to a notebook computer? 1.You will want an HDMI port, which also allows you to connect a game console. 2.You will want an Ethernet port, which allows you to transfer data at 1,000 Mbps. 3.You will want a USB 3.1 port, which is a type of video port. 4.You will want a serial port.

1

When storing information in a computer, the binary numbering system uses a(n) ______ to represent an on switch.

1

2) If I have a 1 TB internal hard drive, will I also need any additional storage devices? 1.No, an internal hard drive with 1 TB of space has enough room to store all of your data, and it's easily portable. 2.Yes, you might want to purchase an external hard drive for better portability or to back up data on your internal hard drive. 3.Yes you should because an internal hard drive with 1 TB of space hardly has enough space to hold all of the information in one library book. 4.No, an internal hard drive with 1 TB of space is not enough; 256 GB would be better.

2

A(n) ______ is a laptop computer that can convert into a tablet-like device.

2-in-1 PC

1) What does an internal hard drive do? 1.The internal hard drive stores data in a portable format. 2.The hard drive is the computer's volatile memory. That means that data stored on the hard drive is erased when you shut off the computer. 3.The hard drive is the computer's permanent memory. Data stored on the hard drive is not erased when you shut off the computer. 4.The hard drive resembles a floppy disk drive but has a slightly wider opening.

3

1) What exactly is a byte? 1.A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one special character. 2.A byte is a string of 0s and 1s that represents special characters such as the @ sign in a computer. 3.A byte is a term used to represent eight bits of data. One byte can hold about one letter, one number, or one special character. 4.A byte is one bit.

3

4) What is a gigabyte? 1.A gigabyte is about one million bytes. 2.A gigabyte is approximately 1,000 bytes. 3.A gigabyte is about one billion bytes. 4.A gigabyte is about one trillion bytes.

3

5) What factors determine the processing power of a CPU? 1.Processing power is only determined by the number of tasks the main chip in the computer can perform in one second. 2.Processing power is measured by Hz, which represents the number of cores in the processor. 3.Processing power is determined by the speed of the processor, the number of cores, as well as other factors such as cache memory and FSB. 4.Processing power is determined by the amount of RAM in the system.

3

How many colors are used in the RGB system?

3

2) What does a kilobyte indicate? 1.A kilobyte (KB) is a unit of measure. It equals about 1 million bytes. 2.A kilobyte (KB) is a unit of measure. It equals about 100 bytes. 3.A kilobyte (KB) is a unit of measure. It equals about 1 trillion bytes. 4.A kilobyte (KB) is a unit of measure. It equals about 1,000 bytes.

4

3) If you have an external hard drive, is a flash drive needed? 1.You might want a flash drive if you want portability and need to store up to 500 GB. 2.You might want a flash drive if you want portability and need to store up to 600 GB. 3.You might want a flash drive if you want portability and need to store up to 356 GB. 4.You might want a flash drive if you want portability and need to store up to 256 GB.

4

Which of the following is NOT an example of data? A picture A word A sound A report

A report

The "brain" of the computer is the CPU.

True

A monitor's ________ is a measure of the difference in light intensity between the brightest white and the darkest black colors.

contrast ratio

Match each of the following terms to its definition: contrast ratio brightness viewing angle response time resolution

contrast ratio => the difference in light intensity between the brightest white and the darkest black colors a monitor can produce brightness => measured as candelas per square meter viewing angle => tells how far you can move to the side, above, or below a monitor before the image quality degrades below acceptable levels response time => how long it takes a pixel to change color resolution => number of pixels displayed on a screen

An LCD's viewing angle is measured in ________.

degrees

Ergonomics is an important consideration

for all computing devices.

​​Question 1: Smartphones are computer systems and contain __________. a mouse a thumb wheel nonvolatile storage, ports, and a CPU ​​battery backup

nonvolatile storage, ports, and a CPU

Match each of the following printer concepts or terms to its measurement or function: printer speed printer resolution inkjet printers all-in-one laser printers

printer speed => measured in ppm printer resolution => measured in dpi inkjet printers => affordable and produce photo-quality images all-in-one => combines the functions of a printer, scanner, copier, and fax into a single machine laser printers => generally produce the highest quality printouts

Which of the following is one of the four major functions of a computer?

processing

​​Question 1: Binary digits can be interpreted by the computer as all of the following EXCEPT __________. a character a number a color ​​an entire file

​​an entire file


Conjuntos de estudio relacionados

UCCS BGSO 4000 Midterm Fall 2019

View Set

Audit: M11 - Other Information and Supplementary Information

View Set

Chapter 4: Tissue: The Living Fabric (Homework)

View Set

formulating scientific questions quiz

View Set

Chapter 11: Motivation & Emotion

View Set