CGS concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You can place file and app icons on the desktop in which of the following operating systems? Select all that apply.

Microsoft Windows, macOS, Linux

A web app can be downloaded through a device's App Store.

No

Clicking the Save button always saves a file to the hard drive.

No

Navigating folders involves deleting and moving them.

No

Synchronous online classes allow students to participate on their own schedule.

No

To open a saved file, you must first open the app used to create the file.

No

Video-sharing sites offer exclusively free content.

No

A mobile app is a desktop app that you can open a mobile device.

No.

A standard account gives you full access to add other accounts on the operating system.

No.

Cellular networks send and receive data via an Internet service provider (ISP).

No.

Moving a folder makes a copy of the folder and places it in another location.

No.

_______ technology is a feature that allows one device to identify the status of another.

Presence

Which of these is an ergonomic guideline to technology use?

Proper physical alignment by using the right chair and aids.

A spreadsheet app is a type of productivity software.

Yes

An VPN allows a mobile user to connect securely over the Internet.

Yes

An operating system manages system resources including RAM.

Yes

Most application software apps open in a window on the screen.

Yes

Most file managers include a way to create a folder through the Save dialog box.

Yes

The Windows 10 Snap feature lets you quickly maximize a window's height.

Yes

You can search for apps by name or functionality.

Yes

A network interface card sends data between a computer and the network.

Yes.

Incoming rules control which programs and services on the network are allowed to access your device.

Yes.

Shutting down a device powers it off completely.

Yes.

Animation is a technique that creates the illusion of _____.

motion

Popular sound file formats include which of the following? Select all that apply.

mp3 WAV

A padlock icon in the address bar indicates the current website is unsafe.

no

All recipients are able to see the Bcc line of an email message.

no

Encryption is an effective replacement for a firewall.

no

If you have a question during a webinar, you should unmute yourself and interrupt the presenter before he/she moves on to another topic.

no

If you review products on your blog, you shouldn't tell readers if you're being compensated by the manufacturer.

no

Microblogs are for personal use only and cannot be utilized by corporations or institutions.

no

Most social networks serve only one purpose or one type of user.

no

Once you have added a friend or follower on a personal social network, you shouldn't remove them.

no

Only people who join an online community are part of a social network.

no

Smartphone video cameras include large image sensors that capture more light.

no

Streaming technology lets you watch video without an Internet connection.

no

Streaming television shows is possible only for pre-recorded content.

no

Teleconferencing enables hundreds of participants to read and respond to posts over a period of months or years.

no

To exchange messages on a social network, you must use a dedicated texting app.

no

A file saved in a standard file format can only be opened by the application that created it.

no.

Console systems only allow one gamepad to be used at a time.

no.

Game titles are usually compatible with all console systems.

no.

Graphics software allows you to edit audio files.

no.

When you download a file, you are moving it from an Internet location to your computer.

no.

Each computer or device on a network is called a(n) _____.

node

A switch sends data ______.

only to the intended device

A plug-in enables a browser to _____.

play or display certain multimedia files

SMS technically restricts the length of text messages to ____ alphanumeric characters.

160

Handheld game consoles usually consist of which of the following? Select all that apply.

3- to 5-inch screen buttons and other controls

Which of the following most likely indicates an app update?

4.3 to 4.4

Which of the following has the function of directing that data intended to reach a specific location along the right path?

A router

Default folders common to email software include _____. Select all that apply.

A. Trash B. Inbox D. Archive

Common blog software features include _____. Select all that apply.

A. the ability to add photos B. labeling or tagging of posts C. social media sharing tools D. theme or template chooser

_____ blends digital elements with the physical world around you.

Augmented reality

Which type of network connects devices attached to or implanted in the body?

BAN

A small notification that displays only a number on an app icon is called a..

Badge

How are desktop and mobile operating systems similar?

Both feature a graphical user interface (GUI).

How can we modify the style and appearance of text in a drawing program?

By using typography tools

Which of the following are the primary advantages of wired networks over wireless networks? Select all that apply.

C. speed of data transfer D. security

In Windows, you can select multiple files that are not listed sequentially by holding the ___ key while clicking the mouse.

CTRL

File compression is useful for __. Select all that apply.

Emailing a large file, creating an archive of older documents, saving storage space on a drive

Smart phones are designed to include hardware for ___. Select all that apply.

GPS navigation, WiFi connectivity, image sensing.

___________ animations signal that an element is interactive.

Hover

Which of the following protocols syncs messages across multiple devices?

IMAP

A disk utility is a tool for ___.

Improving performance.

Users can obtain an email address through a(n) _____. Select all that apply.

Internet service provider webmail service

Describe how geotagging is used in social networking.

It assigns a location to a posted image or video.

How does encryption work?

It does not allow unauthorized users to access the network

Common Bluetooth device problems include which of the following. Select all that apply.

Signal interference, pairing issues, low battery

Which of the following is an exception to why it is a good idea to follow netiquette?

So that we do not present objective analyses of current issues online.

___ allows the OS to manage multiple print jobs.

Spooling

In which of these ways are a mobile version and a desktop version of a successful app likely to be different? Select all that apply.

The mobile version provides a touch-based user interface as opposed to the desktop version, The mobile version presents content more concisely than the desktop version, The mobile version displays the most relevant information first, as opposed to the desktop version.

A small sequence within a process is called a(n)__.

Thread.

A mobile operating system is optimized for ___. Select all that apply.

Touch screen, faster file transfer, WiFi connectivity.

A submenu is usually identified by a(n)___.

Triangle symbol.

Which of these is not a malware and not harmful to your computer?

Utility software

You can run multiple operating systems on one computer using ____ machines.

Virtual

_____ analysis shows how different variables affect an outcome.

What-if

Some advantages of web app platforms include _______. Select all that apply.

ability to get started immediately on a task, interface is often similar to native apps you already use, online/cloud storage

Some benefits of podcasts include _____. Select all that apply.

ability to listen offline can be created at low cost wide variety of content

A(n) _____ defines who can access a network or device, when they can access it, and what actions they can take.

access controller

Sideloading is the act of installing _______.

apps from somewhere other than your device's app store

The form of communication that does not require participants to be online at the same time is called _______.

asynchronous

Digital communication methods transfer data in _____________ format.

binary

Storing and decoding data so it can play is called _____.

buffering

A cellular standard is a set of technical specifications for one type of _______.

cellular transmissions

CAD is an acronym for _____.

computer-aided design

Which of the following are characteristics of an effective presentation? Select all that apply.

contains one idea per slide, tells a story,

A database administrator (DBA) may perform which roles? Select all that apply.

controls user access to the database, manages day-to-day operations of a database, defines database structure, follows database security protocols

On a desktop OS, you typically ______ an icon to open an app.

double-click

Synthesized music is sound that is _____.

electronically generated

A virtual machine is defined as a(n)__.

emulation of a computer system

Malware _______ are delivery methods that take advantage of security flaws.

exploits

Benefits of donating computer equipment include _____. Select all that apply.

extending the useful life of the device, keeping e-waste out of landfills, avoiding having the device waste space in your home/office, helping someone who can't afford a new device

The goal of crowdsourcing is to gain support only from those in your immediate social circle.

false

When creating an email address, you should use the maximum allowed number of characters.

false

Digital video is used for which of the following? Select all that apply.

meetings, movies and TV shows, news stories,

A phoneme is a(n) _____.

individual unit of sound

Which of the following are signs of excessive Internet use? Select all that apply.

irritability when offline, sleep deprivation

Address spoofing makes an address appear legitimate by masking ______.

its true destination

CRT monitors are considered dangerous due to the amount of _____ they contain.

lead

What is the act of posting personal, eyewitness accounts of events as they occur called?

live blogging

What type of social media site is best suited for posting a how-to video series?

media sharing

Photo-editing apps let you do which of the following? Select all that apply.

remove blemishes, add text, crop

The measure of clarity or quality of a bitmap image is known as _____.

resolution

To close a window in Windows 10, you can __. Select all that apply.

right-click its button on the taskbar, then click Close window , click the Close button in the window's thumbnail on the taskbar, click the Close button in the upper-right corner of the window

Common features of video conference services include _____. Select all that apply.

screen sharing, ability to exchange files, collaborative whiteboards

To be successful in professional messaging, you should _____. Select all that apply.

share articles about the latest industry trends connect with current and former colleagues upload photos and media clips from a conference you organized

Typical uses of wikis include _____. Select all that apply.

sharing research company knowledge base virtual workspaces

To draw a perfect square with the rectangle tool, hold the _______ key.

shift

Which of these devices will eventually need to be recycled? Select all that apply.

smart phone, laptop, LCD monitor, television

Places you can recycle electronics include _____. Select all that apply.

some hardware and electronics stores, community recycling centers, device manufacturers.

Audio playback software allows you to do which of the following? Select all that apply.

stream music, create playlists, purchase new music

All database software includes features for storing data in a _____.

table

Net neutrality is the concept that one website has ______.

the same value or priority as any other website

The term "network architecture" refers to _____.

the structural configuration of a network

In general, logos and text are best created as _____ graphics.

vector

_____ graphics are mathematical instructions for creating lines, curves, and shapes.

vector

The purpose of biometric input is to _____.

verify identification and authentication

On-demand media is media that is available

whenever a user chooses.

A self-distributing program that seeks out security vulnerabilities is called a(n) ____

worm

All devices include a video card.

yes

Brownouts can damage components over time.

yes

It's smart to assume that emails and texts may be shared without your knowledge.

yes

Some tracking devices include an alarm that sounds if the device moves out of range.

yes

When drawing over an existing object in a paint app, ______.

you are replacing the existing object


Ensembles d'études connexes

Exam 1 - Generative AI and Chapter 1-3

View Set

Chapter 3 Biology - Cell Structure and Function

View Set

Management of Patients with Hypertension (Chapter 31)

View Set

Unit VI Documentation : reporting and recording

View Set