Computer Fluency pt2
What is true about database fields?
- represents a characteristic of someone or something - a group a related characters in a database table
The reasons why you might want to add a microSD card to your smartphone
- you want to save more music files - you want to save more image files
The usual tasks of information systems (IS) security managers includes
-Creates and implements an organization's IS security measures -Responsible for keeping an organization's Wi-Fi network secure
What settings can you restrict in Mac OS X?
-Restrict user's access to other people through Game Center, Mail, and Messages - Which apps the user can access -Limit access to specific websites
What are the following steps in order to share a file on OneDrive with OneDrive account holder?
1. Open OneDrive and login if necessary 2. Select the files you wish to share 3. Click share at the top at the page 4. Choose either Get a link or Email and share the files
Cellular-capable
- require a data plan - can be connected to wifi or cellular network - can connect to the internet in more areas
Place the following steps in order if you wish to view all your files' extensions
1. Open a window in Window Explorer 2. On the command bar, click Organize 3. Click Folder and search options 4. Click the View tab and go to Advanced Settings 5. Uncheck Hide extensions for known file types
Select the usual tasks of database administrators (DBAs).
- Develops and maintains the database itself - Establishes user privileges for the database to help protect the data - monitors the database's performance
The characteristics of fiber optic lines
- Made of one or thousands of fibers - High speed transmission
The software that comes with a google drive account
- Presentation software - Word processing - Spreadsheet software
You need to create a new folder in windows named file management. Which of the following are ways you can create a new folder in Windows?
- Right-click any blank area in the Contents pane. Click New and then click Folder - Right-click a folder in the folders list. Click New and then click folder - on the command bar, click New Folder
The characteristics of SMS
- Stands for short message service - allows for short texts, typically up to 160 characters
This is the System and Security area that is accessed by clicking Control Panel > System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?
- Update your firewall settings -Turn Windows firewall on or off -Change notification settings
Select the usual tasks of information systems (IS) program managers
- Working with developers and senior management to procure and implement IS processes - Supervising IS technicians - Developing training plans and policies for IS
Wifi capable only
- can only be used in areas of Wifi reception - do not require a cellular data plan - generally less expensive
Which of the following file extensions is commonly used for term papers and other word processing tasks?
.docx
What is the proper order of steps for sharing a file using OneDrive?
1. Pick the file or folder you want to share 2. tap or click share at the top of the page 3. in the share box that appears, choose one of the sharing options: Get a link or Email 4. Your file is now shared!
Most new cell phones today come with approximately ____ of RAM
1GB-4GB
Windows lets you change the appearance of your folders. Place the following steps in order if you wanted to open your folder options to modify the look of a folder.
Click the folder, click organize (on the command bar), click folder and search options
NeXT's ____ computer capitalized on the Graphical User Interface
Cube
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sale and production?
DSS
Information and information systems are important in all areas of business. Operations?
Decision making software such as MIS
A DDos attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for _____
Distributed Denial of Service
Business management software that encompasses nearly all business activities in a corporation is called ____ software.
ERP
Because it's a Google product, downloading an app from the Play Store might require a(n)
Google login
Allowing the creation of the World Wide Web, ____ allowed users to send documents and images across networks
Hypertext Transfer Protocol (HTTP)
The roles of directing IS technicians, working with senior management to procure and implements IS, and developing policies for corporate IS typically falls to the ___
Information systems (information technology) problem manager
You have opened Internet Explorer and clicked the Tools button. Where should you click to delete cookies?
Internet options
A switch which device within a network sent a request based on the device's ____ address
Mac
Which of these devices are manufactured by Samsung?
Note and Galaxy
If you don't want to sign a long-term contract, you might choose to purchase a ___ phone
burner
Put your router near the ___ of your house or apartment, because the router broadcasts signals in equal strength in all directions.
center
A database that stores data in different physical locations and that users access through client/server networks is called a ____ database
distributed
Most routers are designed to broadcast their waves slightly ____
down
A wireless router that transmits Wi-Fi signals on 2 separate frequencies is a ____ -band router
dual
When you drag a file into the recycle Bin it cannot be recovered. True or false?
false
A URL identifies a particular ___ address on the World Wide Web
file
To limit the data or images that appear on your computer screen, add ___ to your search engines and browsers
filters
the reliability and the accuracy of the information in a database is referred to as data _____
integrity
All the tablet computers
- Apple iPad Pro - Amazon Fire HD 8 - Samsung Galaxy Note Pro
Which of these should business owners do to help protect their data?
- create strong password protections and protocols - establish strong firewall protection for their business's network - ensure antivirus software is installed and up-to-date
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following:
- decreased network speed - increased likelihood of security breaches - decreased employee performance
the characteristics of cellular service
- many smartphones can convert cellular signals into wifi signals - fastest-growing ISP - allows mobile devices to access the internet
Which of the two methods below take you to Google (Gmail) chat?
- open gmail and click on the chat area - open google hangouts and click on the chat area
Business owners, copyright holders, and network administrators publish ____, so that users understand what is expected and permissible when they use the network, computer equipment, and/or software
AUPs
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called ___
Adware
With its iPhone, ___ is one of the leaders of the U.S. smartphone market
Apple
One way to copy a file is to click on the file and press CTRL + C, then more your cursor to the new site and press ____
CTRL + V
Creating a fake website to trick victims into divulging personal information is a type of phishing known as ____
Pharming
Information and information systems are important in all areas of business. Finance?
Providing current investment values and opportunities
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ____
Quarantine
Information and information systems are important in all areas of business. Accounting?
Records keeping and reporting
For which of the following activities would a typical accounting department need a strong information system?
Records keeping or reporting
Information and information systems are important in all areas of business. Marketing?
Search engine optimization online advertising and using social media
This is the settings area of Google chrome. Where would you click to adjust cookie and site data permissions?
Show advanced settings
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
Top level managers
By default Windows hides file extensions for known file types but you can unhide them if you wish. True or false?
True
If possible, it is often a good idea to ask your neighbors what ISP works best in your area when purchasing Internet service. True or False?
True
Your network's mobile switching station locates the MSS of the person you're calling, even if they use a different cell phone provider. True or false?
True
What is the incorrect statement about fee based antivirus and free anti virus software
Wrong: one of the positives of free anti virus software is their spam detection performance EXTRA right: Most of the free anti-virus programs perform almost as effectively as their fee-based counterparts. One of the main differences between free and fee anti-virus software is the number of features
The anti-virus software providers
avg, Norton by Symantec, mcafee
Changing the appearance of your folders can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the ___ bar and click organize
command
When Wyatt, Kevin, Sally, and Casey are all on the same business phone call it's referred to as
conference calling
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___. These come in 2 categories: 1 - detected, which usually result in system failures; and 2 - silent, which are much harder to discover and can cause lasting problems
corruption
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ____.
cyberterrorist
The bandwidth required by streaming video offered by companies like Hulu and Netflix made unlimited ____ plans relatively expensive
data
When referring to management information systems, DSS stands for ____ support systems
decision
Reports provide a means of artfully extracting information from a database; ____ provides a means of accurately entering data into a database.
forms
Cell towers' radio frequencies are divided between 7 roughly ____ - shaped cells
hexagonal
The order in which data is organized in a database (characters, fields, records, tables, files, databases) is referred to the database ____
hierarchy
An IP address is determined by the network on which it is ___
hosted
While many smartphones look alike, they may have significant differences. Which of the following are water-resistant?
iPhone 7 and Galaxy S7
A form of spyware that records all actions typed on a keyboard is called a ____ logger
keystroke
Because it reduces an audio file's sampling rate to save space, the MP4 format is a ____ compression format
lossy
Before opening an Email, make sure you know and trust the sender. Email may contain ____
malware
Cell phones send and receive extremely weak ____ signals to and from cell towers
microwave
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network
mobile switching station
Examples of uploading files
posting a photo on social media posting a youtube video placing an ad on craigslist
After your phone's analog-digital converter chip changes the sound of your voice to a digital signal, the signal is enhanced by a digital signal ___.
processor
WPA stands for Wi-Fi ___ access
protected
So that users can find specific information quickly by using filters based on specific criteria, databases allow the creation of
queries
Wi-Fi waves are basically ____ waves
radio
In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called
ransomware
To display or distribute a summary of data and archive snapshots of the data, data administrators or programmers create:
reports
Typically computer viruses must be ____ to attack and do damage to a digital device
run
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called ____ kiddies
script
The small computer within your phone that enhances the sound quality of your call is called a digital ____ processor
signal
The cell tower's base transmission station is connected to a mobile ____ station
switching
The android operating systems icon is what
the little green alien guy
The specific means by which your internet signal is carried is called its ____ media
transmission
The mobile switching station can connect calls to mobile switching stations belonging to other cellular networks
true
A router's signal gets ___ as it travels further from the router
weaker
Brain plans to only use his tablet computer in his home. He has a wireless network in his home. Brain can probably save money by purchasing a ____ tablet.
wifi only
Spam filters search for spam by watching for keywords and by monitoring suspicious ____ patterns and frequencies
word
Select what's true about troubleshooting a network
- check to make sure the cables are not damaged and that all cables are plugged in properly - a device that isn't positioned properly can cause weak signals and system issues - a poor signal can also be an indicator that the hardware may be old or improperly positioned
Place the followings steps in order to download a file on OneDrive to a digital devices
1. Open OneDrive and login if necessary 2. Select the files you wish to download 3. Click Download at the top of the page 4. Left click the downloaded file to open it!
The steps to share a file in google drive
1. Open your google drive account and sign in as necessary 2. Right-click on the file or folder you want to share 3. click share 4. enter the email address of the person with whom you want to share the file
Place the steps in order to create a WiFi hotspot with your android phone
1. Verify that your data plan allows tethering 2. tap the "settings" app 3. under "wireless/networks" tap "tethering" 4. Turn on the portable WiFi hotspot and note the password 5. Open the WiFi on your laptop or other device and select your phone's hotspot 6. Enter the password - you're in!
Positioning both of your router's antennas horizontally will give you the best chance of a parallel match thus increasing your signal strength. True or false?
false
firewall software used to block a user's access to specific internet content is called a(n) filter
internet