CSCI 101: Final Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

JPEG

(Joint Photographic Experts Group) The type of image file used most commonly by photographers.

PNG

(Portable Network Graphics) This supports advanced transparency, has a relatively average file size, and can be interlaced, optimizing for internet use.

SVG

(Scalable Vector Graphics) A graphics format designed specifically for Web display that automatically re-sizes when displayed on different screens

What is the minimum password length recommended by most security experts?

15-20 characters

Which of these file sizes is largest?

3 GB

Worm

A destructive computer program that bores its way through a computer's files or through a computer's network.

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Trojan

A program disguised as a harmless application that actually produces harmful results.

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

When David tries to connect to his home Wi-Fi network, he finds that the router's default Wi-Fi password isn't working even though it worked earlier that day. He resets the device so all the default settings are restored. Two days later, the same problem happens again. What should he change so attackers can't keep reconfiguring his router?

Access password

Andy is designing an app that he plans to post only in Apple's App Store. He doesn't plan on posting the app to any other app store. What development tool will he most likely use?

Adobe Photoshop

Jasmine needs to crop a group photo to show only her face so she can use it as a headshot for a job application. Which of these programs is the best fit for this task?

Adobe Photoshop

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

What is a use/application for the internet other than the World Wide Web?

Any of the following: Sending and receiving email. Searching and browsing information archives. Copying files between computers. Conducting financial transactions. Navigating (in your car, smart scooter, smart bike, or other) Playing interactive games. Video and music streaming.

List some devices for output device other than monitor and printer.

Any of the following: Speaker Projector Plotter Television Video Card

Given an example of a domain name.

Any of the following: microsoft.com quizlet.com google.com

Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group members use Windows laptops, and she has a macOS computer. One group member is using a Chromebook running ChromeOS. Which productivity suite would not work for the whole group?

Apple iWork

How can you connect a portable keyboard with a smartphone?

Bluetooth

Marina is giving a presentation to a client about real estate the client is interested in buying. However, the text on the slides is small, and thumbnails of the slides appear along the side of the screen, which is distracting. How can Marina fix this problem?

Change to slide show view.

Mia needs to upload her homework to her school's LMS for grading. She has several versions of the file that include feedback from her instructor , her brother, and a classmate. How can Mia ensure she's uploading the finished version for grading?

Check the modified date

Kris is finishing his homework at his school's computer lab. As he works, he opens a couple of social media accounts and checks his personal email account. What should Kris do now to protect his information from the next user of this computer?

Clear browsing data.

Skype is an app that allows you to make video calls to other Skype users. What type of app is Skype?

Communications app

Identify the hardware components of a computer.

Computer Box Keyboard Mouse Scanner Digitizing tablet Camera Microphone Monitor Printer Speaker

Adrian has made a list of his family's grocery expenses over the past year. He wants to highlight all the weeks where expenses exceeded the grocery budget so he can budget more accurately for the coming year. Which spreadsheet tool will allow him to do this automatically?

Conditional formatting

Lisa is hanging out at a coffee shop with her laptop to work on her research paper using Microsoft Office Online. What must she do before she starts working?

Connect to the Internet

After shopping for a used Jeep, Nichole starts noticing a lot of ads on her Instagram feed for Jeeps. How did Instagram know she's interested in buying a Jeep?

Cookies on her computer

Eric's brother, Simon, recently posted a YouTube video talking about Eric's low science grades due to spending too much time playing video games. The video explains how Eric got in trouble with their parents and has been grounded. Which of the following is the best description of Simon's behavior?

Cyberbullying

Jackson just saved his research paper on his USB flash drive so he can take it to school and work on it in the library's computer lab. What kind of data is the file on his flash drive?

Data at rest

When you access a secure website, what information does your browser use to verify that web server's identity and encryption information?

Digital certificate

Jerri just bought a new laptop to replace her old one. Which of the following is a responsible way she can dispose of the old computer?

Donate it to a charity.

Which of the following is the most secure password?

Elephantstarburstrubikseattle

Tristan just downloaded a new game he wants to play on his computer. What kind of file should he open in order to install and run the game?

Executable file

How could a thief get your credit card statement sent to his address instead of yours?

Fill out a change of address form at the post office.

What is the file management tool available by default on a macOS computer?

Finder

What type of window do you open to display a list of files?

Folder window

Shelle wants to design her database so it's easy for the receptionist or another assistant to enter client information. What object should she create to accomplish this goal?

Form

Which of the following is a valid app source for Android users?

Google Play Store

What does an operating system provide so you can interact with a device by tapping or clicking buttons, for example?

Graphical User Interface (GUI)

Jodie likes to answer social media surveys about her pets, where she grew up, what her favorite foods are, and where she goes for vacation. Why could this be a problem?

Hackers could use this information to answer security questions and access her online accounts.

Latonya wants to include a website link in her newsletter so readers can click the link and go straight to the website. What kind of formatting does she need to use?

Hyperlink

Lucas is looking for a photo from a recent beach trip to add to his presentation. The photo is saved in a folder with many other kinds of graphics and images. What file format should Lucas look for to find his photo?

JPEG

What is the core of an operating system called?

Kernel

What information do you need to decrypt an encrypted message?

Key

Which of the following is not a common element in a desktop window?

Launchpad button

Which of these operating systems could a developer copy, give to others, and sell to the public?

Linux

What feature allows you to repeat steps automatically in a worksheet?

Macro

Mariella is ready to study at a local coffee shop before her final exam in two days. As she settles in, the manager announces an evil twin attack is in progress and everyone should ensure they're connected to the shop's own Wi-Fi. Mariella checks her phone and finds it has already connected to the attacker's network. What should she do to protect her phone in the future?

Make sure she is connected to a legitimate network.

Miguel just purchased a photo editing app he's been saving up for. However, now he can't find it on his computer. He asks you for help. You open the Downloads folder and see the app's file. What should you check next?

Make sure the app is installed.

Marcie is finishing her research paper for biology class and asks for feedback from her roommate, Robin, on how it looks. Robin says has trouble finding the title of the paper. How can Marcie make the title stand out while maintaining consistency and a professional look to the paper?

Make the title font larger.

Ricky's computer keeps freezing when he's running several apps or webpages simultaneously. What resource does his computer probably need more of?

Memory

Erin is planning to develop an online app that users can access using any type of Apple device, including iPads and iPhones. Which app development trend should Eric learn about before she starts?

Mobile first design

What device's settings should be adjusted for a left-handed person?

Mouse

Lexie just bought a new smartphone and is looking through the pre-installed apps. She sees several apps she recognizes and some that are new to her. One of the apps is named for the manufacturer of her phone. What kind of app is this?

Native app

Who owns the internet?

No one owns the internet

If you create a file shortcut on your desktop, what happens to the file?

Nothing—it stays where it is.

In a desktop operating system, which part of the desktop displays the date and time and contains shortcuts to utilities such as audio controls and network connections?

Notification area

How is SaaS software distributed?

Online

What type of software manages the complete operation of a computer or mobile device?

Operating system

When you take a photo using your smartphone, what kind of data is the photo?

Output

Ricky's social media account was recently hacked. His bank accounts and email accounts use the same password as his social media account, and within a week, they were also hacked. What could Ricky have used to prevent the original attack from affecting so many accounts?

Password manager

Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company credit card number so she can pay for a business meal for her new clients. What kind of email is this?

Phishing

Which kind of chart or graph would best illustrate the percentage of students in a class who made an A on their test?

Pie chart

Remy is on a business trip with coworkers. One evening, they all go out for dinner. As Remy is about to post photos of the group on Facebook, a coworker suggests that might not be a good idea. Which of the following is the most legitimate security reason for not posting the photos?

Potential burglars could find out Remy and his friends are out of town.

Melissa's wallet was stolen while she was on vacation, and a couple of fraudulent charges came through before she could notify her credit card companies. What other measure should she take to protect her identity after the theft?

Put a freeze on her credit information.

Which type of memory is nonvolatile?

RAM

Lyle is working online when a message appears warning that his personal files have been encrypted so he cannot access them. He has 72 hours to pay hundreds of dollars to receive a key to decrypt the files. What type of malware is infecting Lyle's computer?

Ransomware

Sean drifted off while riding the bus home from work. When he woke up, he realized his smartphone was not in his jacket pocket where he usually carries it. However, he's not certain he picked it up off his desk when he left work. What security feature would ensure that no one who might have taken it can access Sean's email while he looks for his phone?

Remote lockout

Teresa wants to change the desktop theme on her laptop to display a new set of background images. What Windows tool should she use to select a desktop theme?

Settings dialog box

Ashleigh wants to add her company's logo to all of the slides in her presentation. Which software feature should she use to do this most efficiently?

Slide master

Gabe is clearing out his wallet because it has become too bulky. Which of the following items should he remove from his wallet permanently for security reasons?

Social Security card

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

AVI

Standard video format for Microsoft PCs

What can you do as an individual user for the computer to protect your information from hacking?

Stop giving away your personal information. Check your mobile app permissions. Review your security and privacy settings. Use passphrases. Use Antivirus software and install the latest software patches.

Nicholas is complaining there's not enough space on his slides to include all the text he needs. What advice should you give him to solve this problem?

Suggest that he use less text and stick to the main points.

There was a thunderstorm last night, and this morning, Sabine's computer won't turn on. What kind of electrical change most likely damaged her computer?

Surge

_____ are collections of records for a single subject, such as customer records, and store all the data in a database.

Table

Reggie works for a health insurance company and spends many hours each day entering data into a database. Recently he complained to his doctor about pain and stiffness in his neck and shoulders. Which of the following is his doctor most likely to recommend?

Take more frequent breaks.

Rochelle's browser on her Windows computer has frozen and is not responding to any commands. She wants to stop the app to solve the problem and does not need to save work she was doing in the browser. What administrative tool allows her to shut down the browser?

Task Manager

Which of these steps comes first in the boot process?

The device receives power from the power supply or battery, and sends it to the circuitry.

What happens to files in a folder on a Windows system when the folder is deleted?

The files are moved to the Recycle Bin.

Jamie recently downloaded a photo editing app that some of her friends said had some exciting features. Two days later, she found out her email account had been hacked. What kind of malware infected Jamie's computer?

Trojan

As Mia swipes her security card and is about to walk into her office building, a young man carrying several doughnut boxes clumsily approaches the door and asks her to hold it open for him. What kind of social engineering attack is this?

Urgency

Emma is working on a new resumé so she can apply for her first full-time job after college. She thinks her design is looking plain, though, and is worried she's missing important information. What advice can you give Emma to help her spruce up her resumé and make it look more professional?

Use a template

Rylie is trying to save a file named Rylie:Portfolio.docx, but she keeps getting an error message. How can she fix the problem?

Use the filename RyliePortfolio.docx instead.

Skyler needs to print mailing labels for a fundraising campaign her company is hosting. Which type of software should she use?

Word processing

Which of the following is not a task the operating system performs?

Write programs

How do you pay for Apache OpenOffice?

You pay nothing—it's free.

H.264

a codec primarily used in mobile phones and tablets

MP4

a common "container format" for video files that allows you to store a lot of video and audio information in a smaller file size

Branston is shopping for a laptop he can coordinate with his iPhone. Which laptop operating system should he choose?

iOS

What is physical health/security? Give some examples.

the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. ex. protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism

Which emoticon (smiley) means for sad?

😞 Sad Emoji The eyes are downturned and the mouth hangs in sadness.

Ruthie needs to buy a new laptop for her college courses. One course requires her to use the full, installed version of Microsoft Office. Which operating systems should she choose for the laptop?

Windows

What type of information is included in your user account?

Username and password

What characteristic makes the following password insecure? riv#MICYIP$qwerty

Uses characters in sequence


Kaugnay na mga set ng pag-aaral

DL1: AI. The Danger of AI is weirder than you think

View Set

Data Science Interview Questions

View Set

University of houston Hist 1378 Ch.21 America and the Great War

View Set

Unit 4B: Political Parties & Influencing Elections

View Set

Functional Anatomy Exam 1 Questions

View Set

ECON chapter 3 guided reading (lesson 1)

View Set