computers
Ultrathin laptops typically are more powerful than traditional laptops. False True
false
Which of the following best defines encryption?
A security method that scrambles or codes data as it is transmitted over a network.
Shane is a proponent of net neutrality. Which of the following describes one of the principles Shane believes in?
All Internet traffic should be treated equally.
What happens during POST?
All computer components are tested for proper operation.
Which of the following best describes alt text a. tools that can translate text into multiple languages b. scrolling text for dialogue in a video c. technology that uses audio output to describe screen contents d. descriptive text added to an object
D. descriptive text added to an object
Amy is purchasing a new computer. She is trying to decide which platform she needs. What question does she need to answer?
Do I want to use Windows or macOS?
Disabling privacy settings on your personal social media accounts is recommended to let potential employers see your interests and activities. true or false
False
One advantage of an LMS is that it enables robots to perform work that is too dangerous, detailed, or monotonous for people. True False
False
The purpose of an NIC is to enable a computer to act as a network server. False True
False
Luis is setting up his LinkedIn profile. Which of the following is true about using professional online social networking tools?
He should ask colleagues for recommendations that endorse his skills.
Aliyah is helping senior citizens at her local community center learn about online safety. Which of the following would Aliyah not recommend?
Keep you location sharing on so that you can verify you are making local transactions.
You can use social networking sites designed to provide business and employment-oriented services such as
Adrian is shopping online. Which of the following is true about e-commerce
Many C2C sites use email forwarding to connect buyer with seller to protect everyone's privacy.
Which of the following is not true about CC licenses?
Others can use, copy, or distribute others' work without giving credit.
Which of the following is not one of the SEM action steps?
Remove your data before disposing of your old devices.
Storing files to and retrieving files from cloud storage typically requires special software and capabilities including in an operating system. True False
false
Which of the following is not true about using web apps?
They take up a lot of storage space on your device.
For what purpose would a company enact an AUP?
To list guidelines and repercussions of the use of the Internet and other digital company resources.
A digital signature is used to verify a user's identity. True False
True
A plug-and-play device will begin functioning properly as soon as you connect it to a computer. True False
True
A voice synthesizer converts text to speech. True False
True
Most technology certifications do not require coursework assignments, but instead require you to pass an exam that demonstrates your proficiency in the area. True False
True
Netiquette includes the code of acceptable behaviors users should follow while on the Internet. True False
True
The ENERGY STAR program was developed to help reduce the amount of electricity used by computers and related devices. True or false
True
The terms software, program, and app all refer to a set of coded instructions that tell a computer or device what tasks to perform. True False
True
To broaden a search, you use a word stem, which is the base of a word. True False
True
Threads allow users to classify posts related to a particular topic. True False
false
Marist uses an online social network to share information with other users. Her feed shows ______.
a listing of the most recent content posted to the network
Kofi has been using an e-reader, but it is getting old. He wants a device that is similar in size and has a touch screen. Which would be the best fit for Kofi?
a tablet
Which two technologies are used to develop webpages? a. HTML b. AI c. CSS d. C++
a. HTML c.. CSS
Which three of the following are part of the definition of a computer? a. an electronic device b. operates under the control of instructions stores in its own memory c. can accept data, process data to produce information, and store information for future use d. connects multiple devices together to share information
a. an electronic device b. operates under the control of instructions stores in its own memory c. can accept data, process data to produce information, and store information for future use
Which of the following two are examples of C2C e-commerce? a. classified ads b. technical support c. auctions d. market research
a. classified ads c. auctions
Which two technologies are used to store data on internal hard drives? a. solid-state drive b. cloud server c. optical media b. magnetic hard disk drive
a. solid-state drive b. magnetic hard disk drive
People who aggregate data in order to sell it to third parties are called data ______.
brokers
Stevie is raising money to produce her independent student film. Which two of the following platforms could she use? a. Pinterest b. WeTransfer c. Indiegogo d. Kickstarter
c. Indiegogo d. Kickstarter
Which of the following best defines streaming? a. It is a way of receiving audio and video content on your device as it is being downloaded from the web. b. It involves wireless communication between two smart devices. c. It is used to capture and upload content to the web. d. It can be used to monitor heart rate, measure pulse, and count steps and transmit that data to an mHealth app.
c. It involves wireless communication between two smart devices.
Metadata is data that ______.
describes other data
Amy wants to extend her storage capabilities beyond her internal hard drive and to be able to use her files on other devices. She uses a USB cable to connect a/n ______ to her computer.
external hard drive
3D Secure is a standard protocol for verifying images and digital media and ensuring they do not contain malicious code. True False
false
A server is any computer or device that provides connections to other computers or devices on a network. True False
false
Computer manufacturers run benchmark tests to assess performance. True False
false
Ergonomics is an applied science that produces guidelines regarding the impact of e-waste. True False
false
In the 1960s, computers engineers developed silicon chips that placed the equivalent of thousands of vacuum tubes or transistors into a/n ______.
integrated circuit
LMS stands for ______ management system.
learning
A stylus is a/n ______.
pen-shaped digital tool for making selections and entering information on a touchscreen
Noa uses the upvote feature on the discussion forum network he uses to _____.
promote answers he finds useful
RSI is caused by ______.
repeated and long-term usage of devices
A computer that makes file available to users at a location called a data center is called a/n ______.
server
Sam is doing research before he buys a new computer or laptop. His last one overheated, so he is looking for one that includes technology to cool the processor. Which of the following is not a method for processor cooling?
smart thermometer
A touchpad is a touch-sensitive flat surface on which you drag your finger to move the pointer on the screen. True False
true
An SSD is a hard drive without moving parts and is faster and more durable than magnetic drives. True False
true
Electrical noise is defined as unwanted high-frequency energy. False True
true
Processors today are superscalar, which means they can execute more than one instruction per clock cycle. True False
true
Many developing countries have become disposal sites for e-waste by illegitimate recycling companies. False True
ture