Computers Test 2
Dominic is left handed and frustrated with his pointing device because the default settings are for right handed people. You can help Dominic solve his problem by telling him which of the following?
Adjust the settings for the mouse through the Settings dialog box
how do you know if a device is an input device or an output device
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers and vendors
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent versions. What file property should he examine to find the most recent version of Project.docx?
Date Modified
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
Dropbox
The operating system is not part of the system software
False
.....is data and instructions entered into the memory of a device
Input
Which of the following is not a step an operating system performs when printing a document?
It creates the document to be printed
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer
How does encryption work?
It scrambles the information until the key is used to unscramble it.
When you take a photo with a digital camera, most likely it is saved in ...... format
JPG
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
If you delete a shortcut from your desktop, have you also deleted the original file?
No because a shortcut does not place the actual file, folder or app on the desktop
If several programs or apps are running simultaneously, your computer or device might use up its available
RAM
which of the following is not true about RAM?
RAM is nonvolatile memory
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message
What is a digital certificate?
Technology used to verify a user's identity
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources
Jazmyn cannot find the paper she wrote last night. She is in a panic and you want to help her. What advice would you give her?
Use the search tool to locate the file by file name, content or date
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
Use vector images because they retain their clarity even when enlarged or shrunk
Which of the following is not an advantage of saving documents in the cloud?
You can access the documents when you are not connected to the Internet
Which of the following is an advantage to saving a file to a flash drive?
You can take it with you and then work on it on another computer
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
a spreadsheet app to keep a record of her expenses, sort data, and make calculations
Mobile first design is important because....
developers must provide simplified user experiences for apps that run on small screens
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
before you can open and edit a compressed file, you need to zip it
false
caps lock is a sticky key
false
file properties are the same no matter what type of file
false
the direction in which text is printed on a page is called style
false
an operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it
true
moving or copying a folder affects all of the contents of the folder
true
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
What type of app would most likely NOT be found included in a productivity suite?
web browser
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply
Output methods include speakers, headphones, and interactive whiteboards
True
the _____ window is the window you are currently using, which appears in front of any other open windows
active
_____ ensures that the person requesting access to a computer is not an imposter.
authentication
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
change font size, style, and color of the keywords
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting
which of these is not an option for formatting text?
copying a region of text
what would a password manager allow you to do?
create and store multiple strong passwords
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
_____ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
encryption
You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?
graphics and media
technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
_____ is any data and instructions entered into the memory
input
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
When a value in a worksheet changes, the spread sheet program will....
recalculate any cells whose formulas depend on the value that changed
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
____ are attackers who want to attack computers but lack the knowledge needed to do so
skript kiddies
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
slide master
Which of the following types of websites typically provides the least security?
social media sites
A _____ is a named collection of formats you apply to text in a word processing document.
style
A worm is a malicious program that uses a computer network to replicate.
true
Local applications can be accessed only on the computers on which they are installed
true
How can you protect a computer from electrical spikes and surges?
use a surge protector
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
use cross-platform tools to write code that will translate the existing android app code into different native formats
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
web apps
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
Which of the following is the strongest password?
H@veAGr3atDaY!
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
On a desktop, the ...... is the window you are currently using, and it appears in front of any open windows
active window
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
adobe premiere clip
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
biometrics
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
drawing app
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
A(n)......contains the instructions your computer or device needs to run programs and apps
executable file
A Trojan is a malicious program that uses a computer network to replicate.
false
Non-volatile memory is temporary and loses its contents when the power is turned off
false
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
false
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
false
a data file contains the instructions your computer or device needs to run programs and apps
false
a shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device
false
to prevent a laptop from being stolen, you can use a surge protector
false
when you move a file to the recycle bin or trash, it is permanently deleted
false
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?
fotor
If you have a file that has billions of bytes of data, then it would be measured in
gigabytes
GUI stands for _____ user interface
graphical
What does an operating system provide so you can interact with a device?
graphical user interface
Which of the following is not a web browser setting for managing cookies?
have all cookies automatically expire after 45 days
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer
A(n) ...... is a small picture that represents a program, file or hardware device
icon
To run a productivity app with most complete and advanced capabilities, you would most likely....
install and run the software on your desktop or laptop computer
What happens when you delete a folder?
it goes the recycle bin or trash folder
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
it should have responsive design so that it is easy to use on mobile devices
Each of the following is a factor that causes repetitive strain injury (RSI) except _____
lack of restful sleep
When creating a strong password _____ is the most important element
length
which of the following units measure millions of bytes of data
megabytes
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
An operating system is also called a(n)
platform
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
What concerns are there about open source programs
programs will add malicious code to damage a user's system
What is the most common type of volatile memory
random access memory (RAM)
In a relational database, data is organized into rows of data called....
records
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help?
show her how to use File Manager
A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.
spike
what is the temporary windows storage area that holds items you copy or cut called
the clipboard
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
Where can you pin frequently used apps for easy access
to the taskbar
When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ....
transition
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
true
each slide in a presentation has a layout that includes placeholders for certain types of content
true
the kernel is the core of an operating system
true
the operating system manages interactions between hardware and software
true
to work with a web app, you use your browser on a computer or mobile device
true
when you open the file manager you have access to frequently or recently opened files and folders, favorite files and folders, and the main folders on you computer or device
true
when you work on a file using a web app, changes are saved as you make them
true
you have the right to see your credit information.
true
What type of security requires something you know and something you have that no one else has?
two factor authentication
how can you check data on devices connected through an IoT network?
use a tablet
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
use a word processor for step 1, graphics software for step 2, and a mail merge for step 3
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
word processor
compressing a file is also called ...... the file
zipping