Technology Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True False

False

How does discarding computers in a landfill affect the environment? Data miners are digging up landfills looking for gold and platinum. Lead and mercury in computer parts are seeping into the ground and water supply. The computer parts quickly decay and become organic material Copper on circuit boards is creating fire hazards.

Lead and mercury in computer parts are seeping into the ground and water supply.

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? Photo editing app Social media app Banking and finance app M-commerce app

M-commerce app

Which of the following is classified as input device? Webcam Flash drive Speakers Earbuds

webcam

A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure? the words "secure website" in the home page footer ".com" or ".org" as the top-level domain of the website A shield icon in the address bar "https" as the protocol in the URL

"https" as the protocol in the URL

Simone just received a letter from her health care provider telling her she can create an account online that will give her access to all her health records. How would you describe what her provider is encouraging his patients to engage with? A BYOD (bring your own device) An intelligent workplace A learning management system (LMS) A mobile health app (mHealth)

A mobile health app (mHealth)

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? A spreadsheet app to keep a record of her expenses, sort data, and make calculations A word processor app to keep a record of her expenses and make calculations A device management app to track all the expenses she makes using her credit and debit cards A personal interest app to keep a track of all the expenses based on her personal interests

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files? Because he is using the same name, the second document is put on the Clipboard until he selects a new name. Because he is using the same name, the computer knows that the files are different so it adds a number to the name. Because he is using the same name, each time he saves he is overwriting his previous work. Because he is using the same name, the computer creates a new folder and saves it there.

Because he is using the same name, each time he saves he is overwriting his previous work.

Which of these is an optical medium of storage? Cloud storage Solid state drive Blu-ray disc Hard disk drive

Blue-ray discs

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? Convert all paper files to word documents. Continue with the old system. Create a database of company projects, customers and vendors. Transfer all financial record to spreadsheet.

Create a database of company projects, customers and vendors.

Which of the following is NOT a factor search engines consider when ranking search results? How often the search term appears on the webpage Design quality of the webpage How long the webpage has been published Number of other webpages that link to the page

Design quality of the webpage

If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you? Digital forensics Data scientist Web analytics Security specialist

Digital forensics

Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations. True False

False

Operating systems can run only if they are installed on a hard drive. True False

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. True False

False

To prevent a laptop from being stolen, you can use a surge protector. True False

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site. True False

False

You can avoid electronic waste by replacing devices every time a new version comes out. True False

False

In Windows, you use _____ to reorder, move, and navigate between folders. File Explorer Folder Explorer File Finder Finder

File Explorer

In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly. Personal Computing Information Technology Human Resources Engineering

Information Technology

Which technology device could be used to view a patient's internal organs? 3-D printer Mobile health record Electronic bracelet Ingestible camera

Ingestible camera

_____ is data and instructions entered into the memory of a device. Cache Output Input Booting

Input

What is the recommended solution if a computer performs slowly? Install anti-virus software. Decrease the brightness of the display. Install additional RAM. Verify if the AC adapter is connected properly.

Install additional RAM.

What happens when you delete a folder? It is marked as destroyed on your computer. It is emptied of its contents. It goes the Recycle Bin or Trash folder. It is permanently removed from the computer.It goes the Recycle Bin or Trash folder.

It goes the Recycle Bin or Trash folder.

Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website? DOC JPEG GIF TIFF

JPEG

What should you do the first time you save a file? Name the file. Set the file size. Change the creation date of the file. Compress the file.

Name the file

If you delete a shortcut from your desktop, have you also deleted the original file? No, because a shortcut is just an organizing icon for apps and files. No, because a shortcut does not place the actual file, folder, or app on the desktop. Yes, because a shortcut is linked to the actual file, folder, or app on the desktop. No, because a shortcut is a setting used to adjust the display, sounds, power battery, and storage.

No, because a shortcut does not place the actual file, folder, or app on the desktop.

At the beginning of the school year, each classroom was given one box of copy paper to make all their copies for the year. How do you think the teachers will be able to make that one box last all year long? Have students share copies and rotate who turns it in so each time one student gets a grade. Place as many documents as possible online, reducing the need for paper printouts. Email all the documents home, so the students can print them out there. Ask each parent to donate a box of paper so more copies can be made.

Place as many documents as possible online, reducing the need for paper printouts.

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer? Plug-and-play devices Video cards Monitors Printers

Plug-and-play devices

Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer? Discounts on future purchases Mobile payment plans Easy delivery of appliances to any location Price comparisons from different vendors

Price comparisons from different vendors

What types of activities are ideal for a robot to perform? Creative design work Critical thinking Repetitive tasks Group interaction

Repetitive tasks

Which of the following is the science that combines technology and engineering? Robotics Augmented reality Natural language processing Digital citizenship

Robotics

Joe wants to use an engaging image as a hook in his presentation, but he's afraid of violating any copyright laws. What should he do? Search for an image on Bing Search for an image on Yahoo Search for an image on Wolfram Alpha Search for an image on Creative Commons

Search for an image on Creative Commons

Cathy wants to buy a new watch online, but is concerned about security when making the purchase. Which of the following increases the chance that her payment is NOT secure? Shopping on a website that uses the HTTP protocol Shopping on a website that uses 3D Secure protocol Shopping on a website that uses Transport Layer Security Shopping using an e-wallet

Shopping on a website that uses the HTTP protocol

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? Title slide Slide master First slide Last slide

Slider Master

Which of the following is NOT an e-commerce transaction? Jezmyn books a hotel room in California for 3 days in the last week of December on Airbnb.com. Andrew sells a set of 7 books on Inventory Management to Austin on eBay. An automobile manufacturer sells 10,000 pickup trucks to a dealer on a B2B website. Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.

Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.

_____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not. A digital assistant The digital divide The Internet lag An intelligent divide

The digital divide

Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this? The photo uses copy protection software to limit access to the image. The president keeps the copyright to the photo while allowing others to use it. The president has the legal right to sell, publish, or distribute the photo. The photo is free of copyrights.

The photo is free of copyrights.

How do delivery companies track packages? They use a learning management system. They use GPS. They use robotic arms to load packages. They use code-scanning technology.

They use code-scanning technology.

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step? Disconnect the UPS. Transfer contents to an external storage device. Remove the internal hard drive on which the operating system is stored. Disconnect all output devices.

Transfer contents to an external storage device.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?worm spam ransomware Trojan

Trojan

A CPU converts the data entered through the keyboard into output displayed on the monitor. True False

True

A device driver is a program that controls a device attached to the computer. True False

True

A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world. True False

True

A specialty search engine lets you search online information sources that general search engines do not always access. True False

True

Each slide in a presentation has a layout that includes placeholders for certain types of content. True False

True

If you add a slideshow to play as your desktop theme, you have customized your system software. True False

True

If you have information literacy, you can select the right tool to find the information you need. False True

True

Information literacy means you can evaluate whether online information is misleading, biased, or out of date. True False

True

It is advised to fully charge the battery of a laptop before using it for the first time. True False

True

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports. True False

True

What is the most common type of storage device for transferring files from one computer to another? memory card tape drive internal hard drive USB flash drive

USB flash drive

How can you protect a computer from electrical spikes and surges? Unplug the computer when it is not in use. Use an uninterruptible power supply. Use a cable lock. Use a surge protector.

Use a surge protector.

Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this? Use his webcam and speakers so that he and his mother can both see and hear each other. Use his projector and webcam so that both he and his mother can clearly see and hear each other. Use his keyboard, monitor, and speakers so that both he and his mother can see, hear, and even text each other. Use a webcam and scanner to ensure that the quality of the call is good.

Use his webcam and speakers so that he and his mother can both see and hear each other.

Which of the following is a necessary step in maintaining computer hardware? Cleaning air vents Using a UPS or a surge processor Connecting peripheral devices to computer Rebooting the computer often

Using a UPS or a surge processor

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space. Green computing Virtual reality (VR) Natural language processing Internet of Things (IoT)

Virtual reality (VR)

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? Device management apps Portable apps Local apps Web apps

Web apps

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report? Presentation Word processor Spreadsheet Messaging

Word processor

What is the binary system? an 8-bit coding scheme a number system with 10 digits, 0-9 a 16-bit coding scheme a number system with two digits, 0 and 1

a number system with two digits, 0 and 1

Cloud storage refers to the storage of data on ______. your desktop computer your mobile device an external drive a server on the Internet

a server on the Internet

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows. minimized window restored window program window active window

active window

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and comments from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberstalking cyberbullying social engineering data mining

cyberbullying

What does an operating system provide so you can interact with a device? file storage platform flash drive graphical user interface

graphical user interface

Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover? spreadsheet video-editing app word processor graphics app

graphics app

Samantha has a file named vacation.jpg. What type of file is it? text file webpage Microsoft Word document graphics file

graphics file

Folder names should _____. contain more than 255 characters identify the content and purpose of the folder be as short as possible include an extension that indicates its contents

identify the content and purpose of the folder

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____. fair use rights intellectual property rights artistic rights digital rights

intellectual property rights

Which of the following is a characteristic of a strong password? letters, numbers, and symbols numbers in a series A short phrase personal information

letters, numbers, and symbols

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? cyberstalking pretexting research spoofing phishing

pretexting

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? folder window program window start window main window

program window

Which of the following types of websites typically provides the least security? online banking sites social media sites online shopping sites private business sites

social media sites

What type of hard drive has no moving parts, making it fast and durable? solid state drive tape drive magnetic hard drive DVD

solid state drive

A _____ is a named collection of formats you apply to text in a word processing document. heading orientation template style

style

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation? sounds transitions videos animations

transitions

Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use? www.weareone.org www.weareone.edu www.weareone.net www.weareone.com

www.weareone.org

Compressing a file is also called _____ the file extracting byting passing zipping

zipping

How is a worm different from a Trojan? A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. A worm spreads through a network, whereas a Trojan hides inside another program.

A worm spreads through a network, whereas a Trojan hides inside another program.

Which is a first step to deter thieves from accessing your financial information? Review financial and billing statements each month carefully. Be alert to signs that may indicate unusual activity in an account. Follow up on calls regarding purchases that were not made. Do not provide personal information over the phone or through email.

Do not provide personal information over the phone or through email.

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? Drawing app Paint app Photo editing app Video editing app

Drawing app

Which of these is not an input device? Scanner Printer Webcam Stylus

Printer

Which of the following is an example of green computing? Purchase new models of devices as soon as they are released. Keep devices turned on and ready to use, even at night. Purchase and use products with an ENERGY STAR label. Request printed receipts.

Purchase and use products with an ENERGY STAR label.

If several programs or apps are running simultaneously, your computer or device might use up its available _____. ROM RAM kernel libraries

RAM

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Shredding financial documents before you discard them. Storing financial information in an unsent email message. Being cautious about what information you post on social networking sites. Querying unfamiliar purchases found on your bank statements.

Storing financial information in an unsent email message.

Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce? Yes; it is a business transaction on a consumer-to-consumer website. No; e-commerce does not include the sale of used products. Yes; e-commerce always refers to a sale between consumers in different cities. No; credit cards are not an accepted mode of payment in e-commerce transactions.

Yes; it is a business transaction on a consumer-to-consumer website.

Which of the following is NOT likely to be found on a webpage? A navigation bar A formatting toolbar A sidebar A header

a formatting toolbar

A(n) _____ protects your device against unauthorized access. administrative tool user account virtual machine personalization app

administrative tool (this is not correct)

What is the most common type of volatile memory? random access memory (RAM) hard disk flash memory read-only memory (ROM)

random access memory (RAM)

With more and more people using technology, what physical health diagnosis is on the rise? repetitive strain injury cyberbullying cyberstalking technology addiction

repetitive strain injury

Which of the following is an advantage to saving a file to a flash drive? You can take it with you and then work on it on another computer. You can be assured that it saved your changes as you made them. You can access the file from any device connected to the Internet. You know that it is backed up on a hard drive in case you forget the file name.

You can take it with you and then work on it on another computer.

What technology can collect information to make decisions, reach conclusions, and combine information in new ways? artificial intelligence (AI) robotics embedded computers virtual reality (VR)

artificial intelligence (AI)


Conjuntos de estudio relacionados

Chapter 17: Control of Gene Expression in Eukaryotes

View Set

Programming Language and Toolkits Python Crash Course

View Set

AP Spanish IV - Tema 2 Comprensión

View Set

عواصم دول مجلس التعاون

View Set

Business Management 1 Objective 2.00

View Set

Chapter 9: Regional Economic Integration

View Set

Combo with A & P Blood and 1 other

View Set

Section 1: Sustainability & sustainable development

View Set

Test 3: Ch 52 Unintentional Injuries PrepU

View Set