Info 160
You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? -*Civil War -Captain America Civil War -"Captain America: Civil War" -Captain America *
"Captain America: Civil War"
In the URL https://www.whitehouse.gov/blog, which part is considered the top-level domain name? -http -www.whitehouse.gov -/blog -.gove
.gov
A(n) _____ is a laptop computer that can convert into a tablet-like device -2-in-1 PC -Chromebook -all-in-one PC -ultrabook
2-in-1 PC
Which of the Following is not an internet protocol? -FTP -HTTP -BitTorrent -ARPANET
ARPANET
Which of the following is considered a benefit of using simulation programs? -all of the above -they allow users to experience or control the software as if it were an actual event -they help to prevent costly errors -they allow users to experience potentially dangerous situations without risk
All of the above
Which is NOT an event associated with the beginning of the internet? -Vinton Cerf helped to develop the Internet communications protocol -Amazon.com was one of the first websites on the Internet -"Login" was intended to be the first network transmission -The U.S. Department of Defense creates ARPANET
Amazon.com was one of the first websites on the internet
Which of the following software packages would not be used to create mobile applications? -Thunkable -App Engine -Scratch -App inventor
App Engine
______ involve using a physical attribute such as a fingerprint for authentication -biometrics -backdoors -trojan horses -rootkits
Biometrics
Which of these is considered the "brains" of the computer? -RAM -ROM -CPU -USB
CPU
Choosing which features of software you want to install is what kind of installation? -Full installation -Restore installation -Single installation -Custom installation
Custom installation
Which view in File Explorer can you use to sort files by column heading? -Small icons -Details -Large icons -Tiles
Details
A 32-character password is an example of using biometrics -True -False
False
A macro is a program released early to the public for testing and evaluation -True -False
False
A touch pad is a pointing device usually found in tablets -True -False
False
App creation software includes tools like Adobe Photoshop -True -False
False
Catfishing is posting inflammatory remarks online to generate negative responses -True -False
False
Data and information are interchangeable terms -True -False
False
Encrypting data is not an appropriate measure for mobile devices such as smartphones -True -False
False
Modern desktop operating systems are considered single-user multitasking operating systems -True -False
False
Once files are placed in the Recycle Bin they cannot be recovered -True -False
False
Podcasts can only be created by professional organization -True -False
False
RAM is non-volatile storage -True -False
False
System restore points can only be created by Windows automatically on a regular schedule -True -False
False
When you subscribe to software, no license is necessary -True -False
False
A backup of all the data files on your computer can be managed easily using Windows 10 _______ utility. -File History -Windows Update -Recovery -Windows Defender
File History
The Windows app used for locating files and folders is -disk manager -library explorer -file explorer -finder
File explorer
Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under? -No license is necessary -GNU General Public License -Copyleft -Open Source License
GNU General Public License
Which of the following is a port? -ROM -HDMI -RAM -CPU
HDMI
Which of the following best describes the transmission lines with the fastest speed? -Main backbone -Primary backbone -Main internet -Internet backbone
Internet backbone
An example of an open source OS is -Linux -Windows -DOS -macOS
Linux
Which is NOT an example of a mobile operating system? -Windows 10 -MacOS -IOS -Android
MacOS
Which of the following would be an example of B2B business? -Google -Target -BestBuy -Omaha Paper
Omaha paper
Calendars, tasks, and e-mail can be found in which application? -OneNote -Outlook -Access -Excel
Outlook
Microsoft Office is an example of which type of software? -Proprietary application software -Open source system software -Open source application software -Proprietary system software
Proprietary application software
Which of the following is an example of financial management software? -Quicken -AudioAcrobat -Lumosity -Photos
Quicken
Which of the following devices would use a real-time operating system? -iPhone -Roomba Vacuum -Microsoft Surface tablet -all of the above
Roomba Vacuum
Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights? -Favorates -Search tools -History -Custom search
Search Tools
Which of the following statements is FALSE? -Smartphones generally have less computing power than desktop computers -Smartphones are considered a type of computer -Not all cell phones are smartphones -Smartphones do not contain a CPU
Smartphones do not contain a CPU
Software that is hosted by the vendor and accessed online is called -productivity software -application software -Software as a Service (SaaS) -open source software
Software as a Service (SaaS)
Which fo the following is not considered an accessibility utility? -System Restore -Narrator -Magnifier -Speech Recognition
System Restore
Which utility is used to exit from a non responsive program? -Disk cleanup -file explorer -task manager -system refresh
Task manager
Which of the following would you NOT see on a Windows 10 Start menu? -apps list -Task View -tiles -Power
Task view
Which statement is not true about the web? -The web was based on a protocol developed by Tim Berners-Lee -Special links are used to navigate from page to page on the web -The web is a subset of the internet -The web is based on the WWW protocol
The web is based on the WWW protocol
Course management software creates a virtual learning experience for students and houses course materials, tests, and discussion board -True -False
True
Different versions of Linux are known as distros -True -False
True
Google Docs is an example of Software as a Service -True -Fals
True
Google Docs is an example of a wiki -True -False
True
SSD drives are superior to conventional disk drives because they have no moving parts -True -False
True
Sending emails to lure people into revealing personal information is a technique known as phishing -True -False
True
The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website -True -False
True
The "brain" of the computer is the CPU -True -False
True
The power-on self-test ensures all peripheral devices are attached and operational -True -False
True
Virtual private networks make is just as secure to send information across a public network as it is on a secure private network -True -False
True
Your location can be captured from your mobile device even if app location tracking is turned off -True -False
True
Your social security number should never be shared on a website, in an email, or through messaging -True -False
True
The most common computer port is the _____ port -thunderbolt -expansion -WIFI -USB
USB
Which search strategy should you use to search for a specific phrase? -use quotation marks around the phrase -use a wild card around the phrase -include Boolean operators in the phrase -use asterisks around the phrase
Use quotation marks around the phrase
A feature in Windows 10 that is used to organize open windows into task-specific groups is called -Program Manager -Virtual View -Snap Assist -Virtual Desktops
Virtual Desktops
Which of the following is an uncompressed audio file format? -AAC -MP3 -WMA -WAV
WAV
Beta Software is made available because -wireless networking must be added -new programmers have been hired -a company is making an early release to test bugs -the company needs more profits
a company is making an early release to test bugs
Some spyware catches your private information by using -a spam filter -a keystroke logger -a data breach -botnets
a keystroke logger
Which best describes copyleft? -A single license covering a single user on a single device -A license that grants users the right to modify and redistribute the software -a license covering one user with multiple installations -a family pack license
a license that grants users the right to modify and redistribute the software
Which of the following is a sensor found in certain smartphones? -HDMI -hygrometer -RAM -accelerometer
accelerometer
Computer viruses can be spread by -sharing flash drives -downloading and running a file attached to an email -downloading a song from a peer-to-peer sharing site -all of the above
all of the above
When you are surfing the web anonymously, -the sites you visit are not stored in the browser history -temporary files created are immediately deleted you are using a browser that has privacy tools -all of the above
all of the above
Which of the following describes an IP address? -It is referred to as a dotted quad -It identifies any computer connecting to the Internet -It identifies a website -All of the above
all of the above
The width-to-height proportion of a monitor is known as what? -viewing density -aspect ratio -screen resolution -viewing plane
aspect ratio
BIOS stands for -bundled input output software -basic in order services -billable input output services -basic input output system
basic input output system
Ensuring that website content is not slanted in its point of view is checking for: -relevance -audience -bias -authority
bias
Authentication techniques that rely on personal biological traits are called -trojan horses -scanners -biometrics -botnets
biometrics
In a computer, _____ can represent either a 0 or a 1. -byte -integrated circuit -megabyte -bit
bit
Viruses that load from USB drives left connected to computers when computers are turned on are known as -encryption viruses -polymorphic viruses -script viruses -boot-sector viruses
boot-sector viruses
What is the navigation aid that shows users the path they have taken to get to a web page located within a website? -Bookmarks -Favorites -Breadcrumb trail -social bookmarks
breadcrumb trail
Which of the following does not describe a desktop e-mail client? -sending e-mails is not dependent on an internet connection -the e-mail program is installed on your computer -can access e-mail from any internet-connected device -e-mail is downloaded when the program is opened
can access e-mail from any internet-connected device
Once you encrypt your SD card, those files -are illegal -are backed up -are compressed and can be stored in less space -cannot be read if the SD card is put in another phone
cannot be read if the SD card is put in another phone
Digital audio software can be used to -create drafting blueprints -compute complex formulas -perform mathematical simulations -compose songs or soundtracks with virtual instruments
compose songs or soundtracks with virtual instruments
Which of the following is used to reduce the file size of a file or folder? -extraction -compression -defragmenter -shrinker
compression
Which of these has moving parts which makes them more prone to malfunction? -SSD -conventional hard disk drive -a flash memory card -thumb drive
conventional hard disk drive
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a _______ attack -backdoor -denial-of-service -scareware -stealth
denial-of-service
Which component of a computing device drains the battery the fastest? -display screen -Bluetooth adapter -hard drive -WIFI adapter
display screen
Which of the following can be both an input device and an output device -mouse -display screen -keyboard -laser printer
display screen
Ergonomics is an important consideration -only for laptop computers -for all computing devices -only for laptop and desktop computers, but never for mobile devices -only for desktop computers
for all computing devices
When you install all the most commonly used files and programs to your computer's hard drive, you have completed which kind of software installation? -complete -common -custom -full
full
Operating systems that have windows and icons have which type of user interface? -magnetic tape-based -command-driven -menu-driven -graphical user
graphical user
Which of the following is NOT found on a motherboard? -CPU -hard drive -RAM -ROM
hard drive
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as -malware theft -scareware theft -impersonation theft -identity theft
identity theft
When someone uses your personal information to pose as you, this is -cybersecurity -identity theft -white-hat hacking -a backdoor rootkit
identity theft
You're most likely to find an RTOS -on an iPad -on a mainframe -in a robotic camera -on a supercomputer
in a robotic camera
Which of the following is not one of the four major functions of a computer? -storage -processing -indexing -output
indexing
What type of printer works by spraying ink onto the paper? -3D -inkjet -laser -resolution
inkjet
______ printers work by spraying tiny drops of ink onto paper -Cloud-ready -Laser -Inkjet -Large format
inkjet
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called -signature -quarantine -updating -inoculation
inoculation
When a printer receives a command, it generates a unique signal to the OS which is called a(n) -interrupt -event -slice -none of the above
interrupt
A packet analyzer is called a sniffer because -it filters out spam -it starts a denial-of-service attack -it captures and reads data inside each packet -it detects high-speed transmissions
it captures and reads data inside each packet
Which type of software is not upgraded automatically? -Software as a Service -Mobile Apps -Subscription based -Locally installed
locally installed
Firewalls work by closing _____ in your computer -logical ports -logical doors -backdoors -software gaps
logical ports
Which category of social networking do Instagram and Youtube fit into? -Business collaboration -information sharing -Media sharing -Social commerce
media sharing
Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? -C2C -mobile commerce -B2B -Social commerce
mobile commerce
The software that allows you to edit Digital images, videos, as well as digital audio is called -multimedia software -distributed software -productivity software -encryption algorithms
multimedia software
Firewalls use a process of ______ to assign IP addresses to the devices internal to the network so hackers will not know what they are. -port blocking -VPN -network address translation (NAT) -packet filtering
network address translation (NAT)
Device drivers are -mapping programs to generate driving instructions -no longer used because of Plug and Play -always installed from a CD -often bundled with the operating system
often bundled with the operating system
LibreOffice is an example of which type of software? -open source software -beta software -freeware -Software as a Service (SaaS)
open source software
The process of adding a Windows 10 app to the Start menu is known as -visualizing -pinning -clipping -screening
pinning
When an OS processes tasks in a priority order, it is known as -preemptive interrupting -interruptive multitasking -preemptive multitasking -multitasking handling
preemptive multitasking
The most common output device for hard output is a -scanner -display screen -printer -speaker
printer
What web browser feature would be particularly useful when using public computers? -pinned tabs -privacy browsing -session restore -all of the above
privacy browsing
Which of the following functions of a computer is mostly responsible for turning data into information? -output -processing -storage -input
processing
Image-editing software allows you to -remove red eye -conduct product simulations -create drafting blueprints -compute complex formulas
remove red eye
The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the -root directory -main path -main directory -library directory
root directory
A _____ is a program that takes complete control of your computer without your knowledge. -rootkit -VPN -sniffer -botnet
rootkit
A surge protector may look like just another power strip but it also can -save your device if a voltage spike is sent through the electrical system -detect viruses -help manage heat -prevent theft
save your device if a voltage is sent through the electrical system
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as -scareware -adware -trackingware -spyware
scareware
A series of commands that are executed without your knowledge is a typical attribute of a(n) ________ virus -script -time bomb -encryption -boot-sector
script
Which of the following is not a component of a search engine? -spider -search assistant -indexer program -search engine software
search assistant
Which power control option leads to a cold boot? -Restart -Shut down -Sleep -Log off
shut down
Which type of productivity software would you most likely use to do calculations and what-if analyses? -Financial planning -spreadsheet -tax preparation -database
spreadsheet
The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software is called -system requirements -redistributing standards -hardware -minimum standards
system requirements
Which feature of a browser enables you to separate a browser tab into its own window? -pinned tabs -tear-off tabs -tabbed browsing -tab isolation
tear-off tabs
Beta software is never -system software -the final finished version of the software -open source software -application software
the final finished version of the software
A GUI user interface is special because -the menus are organized well -it uses a very small set of commands -it uses voice commands to run tasks -there is a set of icons that represent the OS tasks
there is a set of icons that represent the OS tasks
Which of the following is a good precaution to take when making online purchases? -make sure http: and an open padlock displays in the address bar -pay by debit card -use a private browser when purchasing items from a public computer -use the same strong password for all online accounts
use a private browser when purchasing items from a public computer
Touch-screen devices usually feature _____ keyboards -optical -physical -laser-projection -virtual
virtual
The OS can optimize RAM storage by using -virtual memory -an interrupt handler -a spooler -thrashing
virtual memory
Antivirus software looks for _____ to detect viruses in files -virus signatures -virus VPNs -virus artifacts -virus bots
virus signatures
Which of the following is not true when evaluating web articles for research? -You should check any links in a web article to see if they are timely and relevant -you can assume everything with an author listed is accurate and appropriate -you should evaluate web articles for bias and relevance -You should not use an article if there is not an author listed
you can assume everything with an author listed is accurate and appropriate