MId-Term Computer Concepts

¡Supera tus tareas y exámenes ahora con Quizwiz!

What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer? (516256)

A:A faulty port

How do you know if a device is an input device or an output device? (516020)

A:An input device allows you to enter data and instructions into the memory of a device. An output device is a useful form of processed data.

How can you determine if a device is an input device or an output device? (515982)

A:An input device allows you to enter data and instructions into the memory of a device. An output device is a useful form of the processed data

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? (516073)

B:A Trojan

How is a worm different from a Trojan? (516098)

C:A worm spreads through a network, whereas a Trojan hides inside another program.

In which format is data finally stored in computers? (516232)

C:Binary digits

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? (516214)

C:Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

Jason takes many photographs on his smartphone while on vacation in Italy.If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them? (516236)

C:Cloud storage

Which of these is not an input device?

C:Printer

It is advised to fully charge the battery of a laptop before using it for the first time. (516252)

True

Local applications can be accessed only on the computers on which they are installed. (516189)

True

Output methods include speakers, headphones, and interactive whiteboards. (515983)

True

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports. (516242)

True

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? (516208)

A:Change font size, style, and color of the keywords.

Which of these, though not equally portable, is most powerful and usually easier to upgrade than others? (516239)

A:Desktop computers

Why is the date a file was modified useful? (516002)

A:It identifies the most recent version.

Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone? (516186)

B:Android

What would a password manager allow you to do? (516101)

B:Create and store multiple strong passwords.

Where on a computer is the operating system generally stored? (516231)

B:Internal hard drive

Alessandro wants to use his desktop computer to video chat with his mother.What hardware does he need to accomplish this?

B:Use his webcam and speakers so that he and his mother can both see and hear each other.

Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who? (516210)

B:What-if analysis

Which of the following devices can be used to advance slides without having to click a button on the laptop? (516215)

B:Wireless remote control

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. (516072)

B:cyberbullying

If you have a file that has billions of bytes of data, then it would be measured in _____. (515997)

B:gigabytes

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him? (516240)

C:He should make sure to bring a tablet.

Ryan wants to install a new operating system on his laptop, but first he needs to safely store all his data - over 80 GB - so he doesn't lose any of his files. How should Ryan back up all his data? (516230)

C:He should use an external hard drive to store the data because the amount of data he needs to store is quite large.

Which of the following statements is true about the Clipboard? (516005)

C:It is temporary storage that holds a selection until you paste it into a document or folder.

What would happen if you tried to open a file created in one app in a different app? (515967)

C:It will not open.

When you compress a file, it is called _____ (515996)

C:zipping

What would you need to install if you have an app that is incompatible with your current operating system? (515993)

D:A virtual machine

How can you protect your information when using social media? (516069)

D:Accept friend requests from people you want to be friends with.

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? (516205)

D:Apache OpenOffice

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? (516207)

D:Header and Footer

What happens when you delete a folder? (516009)

D:It goes the Recycle Bin or Trash folder.

Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations. (516260)

False

The operating system is not part of the system software. (515960)

False

To prevent a laptop from being stolen, you can use a timelock device. (516077)

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site. (516067)

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. (516092)

False

Which is a first step to deter thieves from accessing your financial information? (516103)

A:Do not provide personal information over the phone or through email.

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to perform the task? (516245)

A:He should use a scanner, which would convert an image into an electronic file.

How can you protect a computer from electrical spikes and surges? (516076)

A:Use a surge protector.

A joystick is a pen-type input device used to draw and tap on icons. (516244)

False

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers. (516238)

False

Before you can open and edit a compressed file, you need to zip it. (516025)

False

The Close button reduces a window so that it only appears as a button on the taskbar. (515990)

False

The operating system assigns the file its name, location, and size. (516003)

False

Which of the following operating systems would allow a user to add functionality and sell or give away their versions? (515965)

A:Linux

Manny copied a table from a MS Excel file, closed the file, and then pasted the table in an MS Word document. Where did the copied table get stored after he copied it? (516227)

B:In the RAM

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images? (516199)

B:JPEG

In terms of privacy, which of the following is a best practice? (516079)

B:Keeping your Social Security number hidden in a locked box in your home

What is a digital certificate? (516086)

B:Technology used to verify a user's identity

What is the first step in the boot process? (515975)

B:The computer or device receives power from the power supply or battery and send it to the circuitry.

How is the environment impacted by computers being thrown away in landfills? (516068)

B:The lead and mercury is seeping into the ground and water supply.

Why are folders created? (516008)

B:To organize your files

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? (516074)

C:It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

What printer is commonly used to produce high-quality professional drawings such as architectural blueprints? (516247)

C:Plotter

Which of the following is a necessary step in maintaining computer hardware? (516275)

C:Using a UPS or a surge processor

Which of the following is a characteristic of a strong password? (516081)

C:letters, numbers, and symbols

Where are frequently used apps pinned for easy access? (516021)

D:To the taskbar

Technology can lead to all of the following behavioral risks EXCEPT _____. (516071)

D:higher satisfaction with life

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. (516093)

False

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? (516089)

C:phishing

With more and more people using technology, what physical health diagnosis is on the rise? (516097)

C:repetitive strain injury

Which is the most suitable device to use in a classroom or a conference room to deliver presentations? (516248)

D:Projector

A(n) _____ contains the instructions your computer or device needs to run programs and apps. (515966)

D:executable file

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document? (515981)

A:It places the document in a buffer.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do:Create a list of invitees;Design the card; andPersonalize the card.How should he go about the task? (516203)

A:Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future? (516220)

A:Use vector images because they retain their clarity even when enlarged or shrunk.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? (516070)

B:Ergonomics

Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components? (516246)

B:Gamepad

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? (516218)

C:Create a database of company projects, customers and vendors.


Conjuntos de estudio relacionados

NURS 1240 Pharmacology Medical Surgical Drugs Case Study EAQ

View Set

Microeconomics Final: Practice Questions

View Set

9.14 Operating System Troubleshooting

View Set

"A Million Metal Mosquitoes" study guide

View Set

1. Habituation and Sensitization

View Set

AP Stats Chapter 8- Confidence Intervals

View Set