Comp Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which search operator would you use to locate webpages, containing the exact phrase augmented reality, with the words in the same order?

"augmented reality"

Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?

"the quick brown fox"

What type of software do engineers and scientists use to create wireframe drawings of objects, which they can rotate to view from many angles?

3D CAD software

Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making?

3D animation

Ruby and SQL are examples of what type of language?

4GL

Which of these tags is not specified in the <body> section of a webpage?

<title>

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?

Add a formal citation and use the farmer's explanation in his paper.

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?

Adjust the settings for the mouse through the Settings dialog box.

How do you know if a device is an input device or an output device?

An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files and any associated entries in the system files.

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?

App Store for iOS

Which company was the first to develop a computer meant for personal use?

Apple

How will technology help people with disabilities become more transportation independent?

Automated vehicles will be developed.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Which of these is an optical medium of storage?

Blu-ray discs

What can you do to make sure you are not contributing to software piracy?

Buy software only from legitimate resellers or directly from the manufacturer.

A construction firm intends to use technology to enhance their architectural designs architecture. Which of the following technologies should they use?

CAD software

What do engineers use to create highly detailed and technically accurate drawings?

CAD software

Code to modify the background color of text or a webpage probably is an example of __.

CSS

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

Create a database of company projects, customers and vendors.

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

When you upload webpage files from your computer to a web server, you should use a(n) __.

FTP client

Which government agency is responsible for releasing the rules surrounding Internet access?

Federal Communications Commission (FCC)

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

G suite

Which of the following is a web app?

Google Docs

Which of the following is the strongest password?

H@veAGr3atDaY!

Code to specify webpage elements such as paragraphs, lists, links, audio or video files, is an example of __.

HTML

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?

HTML

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?

HTML 5 validator

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?

He should have periodic anti-virus scanning and software upgraded on all computers.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

It should have responsive design so that it is easy to use on mobile devices.

A(n)__ file uses lossy compression, which discards some of the original file data during compression.

JPG

When you take a photo with a digital camera, most likely it is saved in __ format.

JPG

When you can click a button on a website to run code to change the font size, the code that changes the font size dynamically probably is an example of __.

JavaScript

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Which of the following network standards applies to cellular networks?

LTE

A company's computers monitor assembly lines and equipment using __ communications.

M2M

Which of the following is a technology designed for use in manufacturing?

M2M communications

Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device?

MIDI technology

Which of the following is NOT an image format to store photos?

MP3

If you delete a shortcut from your desktop, have you also deleted the original file?

No, because a shortcut does not place the actual file, folder, or app on the desktop.

Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project?

One friend has an unreliable, slow Internet connection

Which of the following best defines responsive design?

Pages automatically adjust the size of their content relative to the size of the screen.

Which of the following is an example of green computing?

Purchase and use products with an ENERGY STAR label

If several programs or apps are running simultaneously, your computer or device might use up its available _____.

RAM

What is the most common type of volatile memory?

RAM

Which of the following is NOT true about RAM?

RAM is nonvolatile memory

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message.

In the web address www.microsoft.com, the ".com" is the __ meaning __.

TLD; commercial enterprise

What is a digital certificate?

Technology used to verify a user's identity

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.

Which of the following is NOT true about mobile health?

The need for visits to the doctor's office is increased

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure

How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products?

They use a GPS to avoid traffic delays.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

All of the following are pointing devices except

Touchpointer

What is the most common type of storage device for transferring files from one computer to another?

USB flash drive

How is streaming a video different from downloading it?

Unlike streamed content, downloaded content is stored on the computer.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?

Use his webcam and speakers so that he and his mother can both see and hear each other.

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?

Use sleep modes and other power management features for computers and devices.

Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?

Use vector images because they retain their clarity even when enlarged or shrunk.

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

Visit the manufacturer's website and install the latest updates for the app.

Which of the following would be considered a strong password?

Wbcm2!4!820!

Andy is writing an article and wants to verify a few facts. Which of the following websites is designed to provide answers to factual questions?

Wolfram Alpha

Which of the following is an example of specialty search engine?

Wolfram Alpha

Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?

Yes; it is a business transaction on a consumer-to-consumer website

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer.

Which of the following is not an advantage of e-commerce for consumers?

You have little risk of having your credit card number intercepted.

Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?

a desktop computer

What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer?

a faulty port

Which of the following is NOT likely to be found on a webpage?

a formatting toolbar

Which of the following would most likely be a static website?

a historical facts page

Who or what creates the index for a web directory?

a human editor

Simone just received a letter from her health care provider telling her she can create an account online that will give her access to all her health records. How would you describe what her provider is encouraging his patients to engage with?

a mobile health app (mHealth)

What is the binary system?

a number system with two digits, 0 and 1

Google is an example of which type of website?

a search site

Cloud storage refers to the storage of data on ______.

a server on the Internet

JavaScript likely controls which of the following elements on a webpage

a slide show

What is an ISP?

a telecommunications company that sells internet access

If you want to make a personal website and do not have any coding skills, you should probably use __.

a website builder

Which of these is most likely an example of a static website?

a website for learning about a local barbershops hours and services

Which of the following describes a domain registrar?

a website where you can go to purchase a name for your website

the __ window is the window you are currently using, which appears in front of any other open windows.

active

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.

active window

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

adobe premiere clip

__ text is descriptive text added to an object.

alternative

During which phase of the SDLC does the feasibility study take place?

analysis

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

analysis phase

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

android

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?

animated GIF

A series of images displayed in sequence to create the illusion of movement is called ______________ .

animation

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

antispyware

CSS lets you change the __ of a website.

appearance

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

artificial intelligence

Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?

artificial intelligence and machine intelligence

Mobile games were the first to popularize __, which uses an image of an actual place or thing and adds digital information to it.

augmented reality

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?

augmented reality

_____ ensures that the person requesting access to a computer is not an imposter.

authentication

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?

autoplay

Why is it not safe to connect to public Wi-Fi networks?

because these networks are rarely protected

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

biometrics

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

bluetooth

What determines the speed at which data travels?

bus width

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

change font size, style, and color of the keywords

If you are experiencing display problems on your computer, which of the following troubleshooting techniques might you attempt first?

check to see that all cables are properly connected

In OOP, a(n) ______ defines the format of an object and the actions the object can perform.

class

Which of the following is not a common network topology?

client/server network

Which of the following factors can affect processor performance of a CPU?

clock speed

In a web app, where is data usually stored?

cloud storage

Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?

cloud storage

Which of the following storage devices requires an Internet connection?

cloud storage

File transfer programs belong in what software category?

communications

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?

computer aided manufacturing

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting

A __ website gathers, organizes, and then distributes web content.

content aggregator

Ronald maintains a website that focuses on travel-related information. He gathers adventure posts from various travel blogs and shares them to his site. What type of a website does Ronald maintain?

content aggregator site

A business-to-consumer (B2C) website tracks the items you place in a shopping cart using __.

cookies

What does a B2C website use to track the items you select on the website?

cookies

What does a DSL modem use to send and receive digital data?

copper telephone wiring

Which of these is not an option for formatting text?

copying a region of text

_____ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work.

creative commons

Checking a website author's credentials is one way to establish a site's __?

credibility

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?

database

Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?

date modified

Older HTML tags that have been replaced with newer ways to accomplish the same task are called __.

deprecated

Which of the following is NOT a factor search engines consider when ranking search results?

design quality of the webpage

In which of the following types of computers is the system unit in separate housing from the monitor?

desktop computer

Which of the following devices is the easiest to upgrade, such as by adding RAM?

desktop computers

Mobile first design is important because __.

developers must provide simplified user experience for apps that run on small screens

BYOD stands for Bring Your Own __

device

Which of the following tells your computer how to connect to devices you might connect?

device driver

__ are smart devices that respond to a user's verbal commands by using search technology to provide an answer to a question or perform a task.

digital assistants

_____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

digital divide

If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?

digital forensics

A __ is an image you can see, store, and manipulate on a digital device.

digital graphic

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

digital rights management

Which of the following is not a safety precaution for securing a wireless network?

disable WPA2

Which of the following can you run to find and remove unnecessary files?

disk cleanup utility

Which of these is a use for JavaScript on a webpage?

displaying a slideshow of images

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

drawing app

Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?

drop box

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

encrypt the data in the report

Which of the following does a secure website use to safeguard transmitted information?

encryption

__ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key".

encryption

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

Which of the following describes a normal looking, yet fraudulent Wi-Fi network?

evil twin

A(n) _____ contains the instructions your computer or device needs to run programs and apps.

executable file

Which of the following lets you use a sentence or paragraph of text without permission if you include a citation to its source?

fair use doctrine

4G and 5G networks provide slower data transmission speeds than 3G networks.

false

A Trojan is a malicious program that uses a computer network to replicate.

false

A data file contains the instruction your computer or device needs to run programs and apps.

false

A router is a system of two or more devices linked by wires or cables.

false

A shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device.

false

A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer

false

Adware tracks and transmits personal information from your computer or device without your knowledge.

false

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.

false

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers.

false

An e-commerce website offers fewer models, colors, and sizes than a physical store

false

Automated vehicles decrease independent transportation options for people with disabilities.

false

Before you can open and edit a compressed file, you need to zip it.

false

CAPS LOCK is a sticky key.

false

Computers with AI use human intelligence to make decisions.

false

Embedded computers are standalone products that have many functions.

false

Encryption converts unrecognizable data into recognizable data.

false

File properties are the same no matter what type of file.

false

Flash memory is a type of volatile memory.

false

HTML coding does not allow for lists using bullets. All lists have to be numbered.

false

HTML has remained the same ever since it was developed, which is why there is only one version.

false

Jorge saw a computer named Watson on the game show Jeopardy and was surprised at how many answers Watson was able to get correct, especially because the math problems involved solving equations. Watson was using augmented reality to solve the problems.

false

Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations.

false

Non-volatile memory is temporary and loses its contents when the power is turned off.

false

Of all types of digital media, digital video files are the smallest and download faster than the other types.

false

Of the two types of digital animation, 2-D animation is considered superior to 3-D animation.

false

On a desktop or laptop computer, you should uninstall a program or app by using your system's file management program to delete the folder containing the program's files.

false

Plotters are small, lightweight printers that easily can be connected to mobile devices.

false

Programs only are considered restricted by copyright laws if the author has applied for legal protections.

false

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

false

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

false

The Internet Engineering Task Force (ITEF) sets standards for webpage design

false

The direction in which text is printed on a page is called style.

false

The first generation of computers used microprocessors.

false

The mobile health (mHealth) trend refers to doctors and nurses using smartphones or tablets to access health records stored on mobile devices.

false

The operating system is not part of the system software.

false

The waterfall method is an example of agile development.

false

To prevent a laptop from being stolen, you can use a surge protector.

false

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

false

Uninterruptable power supplies and surge suppressors will help protect your computer from power outages.

false

When accessed, an e-commerce website that sells carpentry tools displays a lock icon somewhere in the window of the browser. The address bar in the Chrome browser would identify this website as "insecure."

false

When looking for a job, you should use humorous or informal names for your account profiles, blog, or domain name to make yourself stand out.

false

When you move a file to the Recycle Bin or Trash, it is permanently deleted.

false

When you perform a search, a general search engine searches the entire Internet.

false

When you stream digital media, you must transfer the entire video or audio file to your computer.

false

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

firewall

Which of the following types of software creates a personal security zone around your computer or device?

firewall

Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

fotor

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

freeware

____ refers to a program that is copyrighted and provided at no cost, but the developer retains all rights to the product.

freeware

Nadia is shopping for a phone that can take photos and identify their geographical location. What feature should she look for when comparing phones?

geotagging

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

GUI stands for __ user interface.

graphical

What does an operating system provide so you can interact with a device?

graphical user interface

You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?

graphics and media

Which of these hardware components can you use to store videos?

hard drive

Which of the following is not a web browser setting for managing cookies?

have all the cookies automatically expire after 45 days

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer

Which of the following components on a webpage is created using HTML?

heading

A __ combines speakers and a microphone into one device.

headset

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?

how visitors are using the site

Which of the following indicates a secure website connection?

https in the URL

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?

image 1 is sharper and has a larger file size than image 2

Carlos is creating an animation by drawing one image in a frame, followed by another image in a slightly different pose, and so on until the motion is complete. What is this technique called?

in betweening

If you have __, you can evaluate whether information is misleading, biased, or out of date.

information literacy

Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?

information security

__ is any data and instructions entered into the memory.

input

_____ is data and instructions entered into the memory of a device.

input

What is the recommended solution if a computer performs slowly?

install additional RAM

To run a productivity app with most complete and advanced capabilities, you would most likely ___.

install and run the software on your desktop or laptop

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.

installation

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.

intellectual property

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____

intellectual property rights

Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described?

intelligent classroom

Where on a computer is the operating system generally stored?

internal hard drive

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

Which of the following is a private network used by organizations to communicate internally?

intranet

If a website is designed with responsive design concepts, then _____.

it appears correctly on any device regardless of screen size

Which of the following is not a step an operating system performs when printing a document?

it creates the document to be printed

What happens when you delete a folder?

it goes to the recycle bin or trash folder

Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?

it is using virtual reality

Why would you include a banner on your website?

it makes the website more easily identifiable to visitors

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

it places the document in a buffer

Why is an FTP client helpful?

it uploads files from your computer to a web server

The quality of an audio file is determined by _____.

its bit rate

What is a popular language for writing scripts that run in your browser to control a webpage's behavior?

javascript

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

javascript

Each of the following is a factor that causes repetitive strain injury (RSI) except __.

lack of restful sleep

When describing a client/server network, which of the following would be considered a client?

laptop

How does discarding computers in a landfill affect the environment?

lead and mercury in computer parts are seeping into the ground and water supply

Colleges use __ management systems (LMSs) to set up web-based training sites where students can check their progress in a course, take practice tests, and exchange messages with the instructor or other students.

learning

The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) ______.

learning management systems (LMS)

When creating a strong password __ is the most important element.

length

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?

license filter

With a search engine, you can use a __ to search for pictures that you can use, share, or modify for personal or commercial use.

license filter

Which of the following would be considered a professional networking website?

linkedin

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

m-commerce app

Which of the following statements is true about public networks?

many public networks are not secure

which of the following units measure millions of bytes of data?

megabytes

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

To access the Internet, a router must be connected to a _____.

modem

What are "hits" that search engines list on the first page?

most relevant results

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

my Verizon VPN

Which of these usually is NOT collected by a website analytics tool?

names of website visitors

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app

What internal device does a computer use to connect to a wired or a wireless network?

network interface card

Which of the following does a software license usually specify?

number of people authorized to use the software

For _____, the original media file is stored on the media distributor's server, so you can watch the content more than once.

on demand content

Which of the following is an advisable practice for securing data stored on a network?

only grant access to data to those with a legitimate need

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?

open source

When coding a hyperlink to a webpage that is external to your website, an accepted behavior is to __.

open the page in a new browser

A company's __ department oversees the centralized computer equipment and administers the network.

operations

A(n) ______ is an upgrade that addresses a single issue.

patch

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

patch finders

A network administrator is usually not required on a _____ network.

peer to peer

Devices on a _____ area network are connected via Bluetooth.

personal

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

Peter used a digital camera to take photos while hiking in Yellowstone National Park, but many photos turned out blurry. What software can he use to improve the quality of the photos?

photo-editing software such as Photoshop

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

piracy

Resolution of bitmap graphics is typically measured in ___________.

pixels

An operating system is also called a(n) _____.

platform

What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?

plotter

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?

plug and play devices

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?

portable app

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?

price comparisons from different vendors

Which of the following describes business-to-business (B2B) e-commerce purchase?

pricing can vary for each customer

Which of these is not an input device?

printer

In which category of software do Microsoft Office Word and Excel belong?

productivity

What concerns are there about open source programs?

programmers will add malicious code to damage a user's system

Which is the most suitable device to use in a classroom or a conference room to deliver presentations?

projector

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

public domain software

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

publish to a web server

What type of software accepts text as input and produces speech as output?

read aloud software

When a value in a worksheet changes, the spreadsheet program will __.

recalculate any cells whose formulas depend on the value that changed

In a relational database, data is organized into rows of data called __.

records

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?

relative reference

A web host's uptime is a measure of __.

reliability, so visitors can access your site without concerns that the web server is unavailable

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

What types of activities are ideal for a robot to perform?

repetitive tasks

Which of the following properties affects the quality of digital images?

resolution

__ refers to the clarity or sharpness of an image.

resolution

Which of the following troubleshooting tools would you use if you made an update that seems to have caused issues?

restorer

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

restorers

Which of the following is the science that combines technology and engineering?

robotics

What hardware is essential to creating a home Wi-Fi network?

router

A process called __ converts analog sound waves into digital sound.

sampling

A process called _____ converts analog sound waves into digital sound.

sampling

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate?

scanner

Under which of the following circumstances might you be most likely to contact a professional to repair your computer or mobile device?

screen is broken

__ are attackers who want to attack computers but lack the knowledge to do so.

script kiddies

A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network.

sensors

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

shareware

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?

show her how to use File Manager

On a webpage, a __ provides supplemental material such as social networking feeds and ads.

sidebar

A __ is a sophisticated computer animation useful for training and teaching in many fields.

simulation

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

site license

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?

slide master

Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. Besides Internet connectivity, what does she need to watch the shows on a TV?

smart TV or a TV stick

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

social engineering

Which of the following types of websites typically provides the least security?

social media sites

What type of hard drive has no moving parts, making it fast and durable?

solid state drive

When coding an image, HTML 5 requires you to __.

specify descriptive alternative information using the alt attribute

What technology can be used by people with a hearing disability to listen to a narration?

speech recognition

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

speech recognition software

Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?

spiders

A __ is a very short duration of a voltage increase that can be absorbed by a surge protector.

spike

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

star

A _____ is a named collection of formats you apply to text in a word processing document.

style

Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What technology does the smartphone use to make the assistant respond to Edwin?

synthesized speechq

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?

tablet

When you write HTML code, you use __ to describe the structure of information on a webpage.

tags

Which of the following indicates a website is NOT secure?

the URL of the website begins with http

What is the temporary Windows storage area that holds items you copy or cut called?

the clipboard

Which of the following is a disadvantage of using cloud computing to share files?

the inability to access your files if you lose your internet connection

The basic premise of __ is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.

the internet of things

____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

the internet of things

If your webpage contains a link to an external website and its web address changes, __.

the link on your website will no longer work

What is uptime?

the measure of a web hosts reliability

Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this?

the photo is free of copyrights

What does a file format refer to?

theorganizationandlayoutofdatainthefile

Why would you want to connect your computer to a network?

to access shared resources

Why do companies use online collaborative productivity software?

to allow employees to share, edit, and comment on documents

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

to give you finer control over the content

Where can you pin frequently used apps for easy access?

to the taskbar

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?

transfer contents to an external storage device

When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of an __.

transition

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

trojan

A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

true

A copyright is an originator's exclusive legal right to reproduce, publish, or sell intellectual property.

true

A digital citizen uses technology to be productive and efficient.

true

A digital coupon provides a promotional code you enter when you check out and pay for online purchases.

true

A kiosk is a freestanding booth usually placed in a public area that can contain a display device used to show information to the public or event attendees.

true

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.

true

A microprocessor is the brains of a computer.

true

A scanner converts a printed document into a bitmap file by dividing the image into a grid of tiny cells and assigning colors to each cell.

true

A worm is a malicious program that uses a computer network to replicate.

true

After designing a website, you transfer the website files from your local computer to a remote web server.

true

An EULA grants permission for one installation.

true

An intelligent classroom is one in which technology is used to facilitate learning and communication.

true

Before you name your website, you need to search for other sites using that name and then purchase a domain name.

true

Digital audio can be created by recording sound on a smartphone.

true

E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.

true

Each slide in a presentation has a layout that includes placeholders for certain types of content.

true

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.

true

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

true

If you have information literacy, you can select the right tool to find the information you need.

true

In an 8-bit coding schemes, 8 bits can represent one character.

true

In general, a high powered processor is not necessary for a computer that will be used primarily to check email and browse the web.

true

In order to run a program's source code, it must be translated into machine language.

true

Local applications can be accessed only on the computers on which they are installed.

true

Lossy compression discards some original content to create smaller files.

true

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.

true

Most video editing software shows the video as a timeline with separate tracks for video and sound.

true

Moving or copying a folder affects all of the contents of the folder.

true

Networks allow computers to share resources, such as hardware, software, data, and information.

true

New cars use embedded computers to make driving safer.

true

Output methods include speakers, headphones, and interactive whiteboards.

true

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.

true

Preinstalled programs and apps may be included as part of a marketing agreement between the device's manufacturer and a software development company.

true

Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.

true

The Energy Star program encourages manufacturers to reduce the amount of electricity used by computers and related devices.

true

The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.

true

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.

true

The kernel is the core of an operating system.

true

The operating system manages interaction between hardware and software.

true

The speed at which data travels on a bus is referred to as the world size.

true

To work with a web app, you use your browser on a computer or mobile device.

true

Two types of firewalls include hardware firewalls and software firewalls.

true

UX refers to the focus on the user's reaction and interaction to a product, including its efficiency, effectiveness, and ease of use.

true

When you create an app, you are protected under copyright laws, even before you apply for a copyright.

true

When you open the file manager you have access to frequently or recently opened the files and folders, favorite files and folders, and the main folders on your computer or device.

true

When you work on a file using a web app, changes are saved as you make them.

true

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmission and limits who can access the Wi-Fi network.

true

Wikipedia is a collaborative website where a team of people can publish or modify content on a webpage.

true

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

true

You have the right to see your credit card information.

true

You must be online to use web apps.

true

You use CSS to specify the appearance of content on a webpage

true

an operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it.

true

volatile memory loses its contents when power is removed.

true

What is the first step to performing hardware maintenance?

turn off the computer and remove its power source

What type of security requires something you know and something you have that no one else has?

two factor authentication

Each webpage is assigned a __, an address that identifies the location of the page on the Internet.

uniform resource locator (URL)

Which of the following is assigned to each webpage to identify its location on the Internet?

uniform resource locator (URL)

What should you do if a headset plugged into your computer is not working properly?

update the device driver

_____ are new releases of an app and may require an additional fee before you can install them.

upgrades

How can you protect a computer from electrical spikes and surges?

use a surge protector

How can you check data on devices connected through an IoT network?

use a tablet

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

Which of these should you NOT do when including a video from YouTube on your website?

use the <video> tag to access the video in your webpages HTML file

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?

use the search tool to locate the file by file name, content, or date

What area of software development focuses on the user's reaction to and interaction with the software product?

user experience

Which of the following is a necessary step in maintaining computer hardware?

using a UPS or a surge suppressor

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

using a motion sensing game console

Plagiarism is best defined as __?

using another's work and claiming it as your own

The hardware a digital device needs to play videos includes a screen, speakers, and a _____.

video card

Most __ shows media on a timeline with separate tracks for video and sound.

video editing software

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

A video that is shared millions of times over social media in a short period of time is termed to be ____________ .

viral

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?

virtual reality

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

virtual reality

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?

web apps

Which type of app would most likely NOT be found included in a productivity suite?

web browser

Which of the following is classified as input device?

webcam

A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.

webpage

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth

At what point are you responsible for following the terms in a software license agreement?

when you click or take another action to accept the terms

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.

will allow user interaction

What type of network sends signals through airwaves and usually does not require cables?

wireless network

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

with responsive design

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?

word processor

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com

Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use?

www.weareone.org

Which of the following is not an advantage of saving documents in the cloud?

you can access the documents when you are not connected to the internet

Which of these statements is true about XML?

you can export data from into XML to share with other applications

Which of the following is an advantage to saving a file to a flash drive?

you can take it with you and then work on it on another computer

Compressing a file is also called _____ the file.

zipping


Kaugnay na mga set ng pag-aaral

Ch. 17 Activity-Base Costing (ABC)

View Set

Skeletal system: bone structure & functions LearnSmart

View Set

Antoni Gaudi and the La Sagrada Familia

View Set

Chapter 11: Sizing and Fit Specifications

View Set

Chapter 1 - The Regulation of Employment

View Set

AUTO-2220: Automatic Transmission Diagnosis & Repair

View Set