Computers Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Dominic is left handed and frustrated with his pointing device because the default settings are for right handed people. You can help Dominic solve his problem by telling him which of the following?

Adjust the settings for the mouse through the Settings dialog box

how do you know if a device is an input device or an output device

An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

Create a database of company projects, customers and vendors

Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent versions. What file property should he examine to find the most recent version of Project.docx?

Date Modified

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?

Dropbox

The operating system is not part of the system software

False

.....is data and instructions entered into the memory of a device

Input

Which of the following is not a step an operating system performs when printing a document?

It creates the document to be printed

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

It places the document in a buffer

How does encryption work?

It scrambles the information until the key is used to unscramble it.

When you take a photo with a digital camera, most likely it is saved in ...... format

JPG

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

If you delete a shortcut from your desktop, have you also deleted the original file?

No because a shortcut does not place the actual file, folder or app on the desktop

If several programs or apps are running simultaneously, your computer or device might use up its available

RAM

which of the following is not true about RAM?

RAM is nonvolatile memory

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message

What is a digital certificate?

Technology used to verify a user's identity

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware there were kernels in her computer. What do you tell her?

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources

Jazmyn cannot find the paper she wrote last night. She is in a panic and you want to help her. What advice would you give her?

Use the search tool to locate the file by file name, content or date

Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?

Use vector images because they retain their clarity even when enlarged or shrunk

Which of the following is not an advantage of saving documents in the cloud?

You can access the documents when you are not connected to the Internet

Which of the following is an advantage to saving a file to a flash drive?

You can take it with you and then work on it on another computer

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

a spreadsheet app to keep a record of her expenses, sort data, and make calculations

Mobile first design is important because....

developers must provide simplified user experiences for apps that run on small screens

Which of the following can you run to find and remove unnecessary files?

disk cleanup utility

before you can open and edit a compressed file, you need to zip it

false

caps lock is a sticky key

false

file properties are the same no matter what type of file

false

the direction in which text is printed on a page is called style

false

an operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it

true

moving or copying a folder affects all of the contents of the folder

true

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

What type of app would most likely NOT be found included in a productivity suite?

web browser

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply

Output methods include speakers, headphones, and interactive whiteboards

True

the _____ window is the window you are currently using, which appears in front of any other open windows

active

_____ ensures that the person requesting access to a computer is not an imposter.

authentication

Why is it not safe to connect to public Wi-Fi networks?

because these networks are rarely protected

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

change font size, style, and color of the keywords

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting

which of these is not an option for formatting text?

copying a region of text

what would a password manager allow you to do?

create and store multiple strong passwords

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

_____ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."

encryption

You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?

graphics and media

technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

_____ is any data and instructions entered into the memory

input

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

When a value in a worksheet changes, the spread sheet program will....

recalculate any cells whose formulas depend on the value that changed

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

____ are attackers who want to attack computers but lack the knowledge needed to do so

skript kiddies

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?

slide master

Which of the following types of websites typically provides the least security?

social media sites

A _____ is a named collection of formats you apply to text in a word processing document.

style

A worm is a malicious program that uses a computer network to replicate.

true

Local applications can be accessed only on the computers on which they are installed

true

How can you protect a computer from electrical spikes and surges?

use a surge protector

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

use cross-platform tools to write code that will translate the existing android app code into different native formats

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?

web apps

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

Android

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

G suite

Which of the following is the strongest password?

H@veAGr3atDaY!

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

On a desktop, the ...... is the window you are currently using, and it appears in front of any open windows

active window

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

adobe premiere clip

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

biometrics

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?

database

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

drawing app

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

A(n)......contains the instructions your computer or device needs to run programs and apps

executable file

A Trojan is a malicious program that uses a computer network to replicate.

false

Non-volatile memory is temporary and loses its contents when the power is turned off

false

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

false

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

false

a data file contains the instructions your computer or device needs to run programs and apps

false

a shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device

false

to prevent a laptop from being stolen, you can use a surge protector

false

when you move a file to the recycle bin or trash, it is permanently deleted

false

Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

fotor

If you have a file that has billions of bytes of data, then it would be measured in

gigabytes

GUI stands for _____ user interface

graphical

What does an operating system provide so you can interact with a device?

graphical user interface

Which of the following is not a web browser setting for managing cookies?

have all cookies automatically expire after 45 days

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer

A(n) ...... is a small picture that represents a program, file or hardware device

icon

To run a productivity app with most complete and advanced capabilities, you would most likely....

install and run the software on your desktop or laptop computer

What happens when you delete a folder?

it goes the recycle bin or trash folder

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

it should have responsive design so that it is easy to use on mobile devices

Each of the following is a factor that causes repetitive strain injury (RSI) except _____

lack of restful sleep

When creating a strong password _____ is the most important element

length

which of the following units measure millions of bytes of data

megabytes

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

An operating system is also called a(n)

platform

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?

portable app

What concerns are there about open source programs

programs will add malicious code to damage a user's system

What is the most common type of volatile memory

random access memory (RAM)

In a relational database, data is organized into rows of data called....

records

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help?

show her how to use File Manager

A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.

spike

what is the temporary windows storage area that holds items you copy or cut called

the clipboard

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

Where can you pin frequently used apps for easy access

to the taskbar

When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ....

transition

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

true

each slide in a presentation has a layout that includes placeholders for certain types of content

true

the kernel is the core of an operating system

true

the operating system manages interactions between hardware and software

true

to work with a web app, you use your browser on a computer or mobile device

true

when you open the file manager you have access to frequently or recently opened files and folders, favorite files and folders, and the main folders on you computer or device

true

when you work on a file using a web app, changes are saved as you make them

true

you have the right to see your credit information.

true

What type of security requires something you know and something you have that no one else has?

two factor authentication

how can you check data on devices connected through an IoT network?

use a tablet

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

use a word processor for step 1, graphics software for step 2, and a mail merge for step 3

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?

word processor

compressing a file is also called ...... the file

zipping


Ensembles d'études connexes

Lesson 2-3 - MODULE 1: Overview of Tourism and Hospitality

View Set

MedSurg 1 Chapter 62 Cerebrovascular Disorders

View Set

Chapter 11: Community Assessment

View Set

Small business Development Ch 7 In class exam review

View Set

Texas 30-Hour Principles of Real Estate II with Flex Units

View Set

The Middle east (countries and capitals)

View Set