Computers Module 5/6
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
____ ensures that the person requesting access to a computer is not an imposter.
Authentication
A Trojan is a malicious program that uses a computer network to replicate.
False
To prevent a laptop from being stolen, you can use a surge protector.
False
Which of the following is the strongest password?
H@veAGr3atDaY!
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
a spreadsheet app to keep a record of her expenses, sort data, and make calculations
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
create a database of company projects, customers and vendors
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
In terms of privacy, which of the following is a best practice?
keeping your social security number hidden in a locked box in your home
Why is it not safe to connect to public Wifi networks?
because these networks are rarely protected
Which of these is not an option for formatting text?
copying a region of text
What would a password manager allow you to do?
create and store multiple strong passwords
Mobile first design is important because ___.
developers must provide simplified user experiences for apps that run on small screens
___ is the process of scrambling information in such a way that it cannot be read unless the user possesses the key.
encryption
How does encryption work?
it scrambles the information until the key is used to unscramble it
___ are attackers who want to attack computers but lack the knowledge needed to do so.
script kiddies
Wi-Fi protected access 2 personal encrypts wireless data transmissions and limits who can access the wifi network
true
You have the right to see your credit information.
true
Which type of app would most likely NOT be found included in a productivity suite?
web browser
Local application can be accessed only on the computers on which they are installed.
True
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
because insiders sometimes create threats after incidents at their places of employment
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
drawing app
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
it should have responsive design so that it is easy to use on mobile devices
How does discarding computers in a landfill affect the environment?
lead and mercury in computer parts are seeping into the ground and water supply
When creating a strong password ___ is the most important element.
length
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
slide master
Which of the following types of websites typically provides the least security?
social media sites
A ___ is a very short duration of a voltage increase that can be absorbed by a surge protector.
spike
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
How can you protect a computer from electrical spikes and surges?
use a surge protector
Rob is planning a housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
use a word processor for step 1, graphics software for step 2, and a mail merge for step 3
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
use cross-platform tools to write code that will translate the existing Android app code into different native formats
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
web apps
Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?
word processor
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
False
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
When you take a photo with a digital camera, most likely it is saved in ____ format.
JPG
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
adobe premiere clip
____ are programs that help you perform specific tasks when using your computer or smartphone
application software
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
biometrics
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
change font size, style, and color of the keywords
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting
Creating a _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Which is a first step to deter thieves from accessing your financial information?
do not provide personal information over the phone or through email
Patricia has started a new interior designing business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
drop box
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
false
The direction in which text is printed on a page is called style.
false
You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?
graphics and media
Which of the following is not a web browser setting for managing cookies?
have all cookies automatically expire after 45 days
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer
Technology can lead to all of the following behavioral risks EXCEPT____.
higher satisfaction with life
To run a productivity app with most complete and advanced capabilities, you would most likely ______.
install and run the software on your desktop or laptop computer
Each of the following is a factor that causes repetitive strain injury except
lack of restful sleep
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems connecting to the network. What type of app should she focus on developing?
portable app
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
When a value in a worksheet changes, then the spreadsheet program will ___.
recalculate any cells whose formulas depend on the value that changed
In a relational database, data is organized into rows of data called ____.
records
You can monitor and protect your financial data in all of the following ways EXCEPT ____.
storing financial information in an unsent email message.
A ____ is a named collection of formats you apply to text in a word processing document.
style
What is a digital certificate?
technology used to verify a user's identity
When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ______.
transition
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
trojan
A worm is a malicious program that uses a computer network to replicate.
true
Each slide in a presentation has a layout that includes placeholders for certain types of content.
true
To work with a web app, you use your browser on a computer or mobile device
true
What type of security requires something you know and something you have that no one else has?
two factor authentication
How can you check data on devices connected through an IoT network?
use a tablet
Sammy created a new logo for his client to use on the company website and office stationary. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
use vector images because they retain their clarity even when enlarged or shrunk