CS 102 - Section 12
Select the file extension of an image file, then click Done.
.jpg, .png, .gif
When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.
AUP
___ is a security utility that protects your computer from various types of malware.
Anti-malware
Software makes a computer run and perform activities such as word and data processing. Click on four types of computer software, then click Done.
C++, Windows, MacOS, Microsoft Office
Considered "the brain" of the computer, the ______ organizes and carries out instructions to produce a desired output. Select the two correct answers, then click Done.
CPU microprocessor
Select the OS that requires an internet connection to run its software applications. Select your answer, then click Done.
Chrome OS
Select three places where you can safely back up your data, then click Done.
Cloud backup provider USB drive DVD disk
Location based services (LBS) use ______, cell phone towers, and nearby wireless access points to track the location of your mobile device. Select your answer, then click Done.
GPS
In 1984, Apple came out with the Mac, a PC that featured a revolutionary ______ that changed the way people interacted with computers. Select your answer, then click Done.
GUI
LCD and LED are two types of flat-panel monitors. Click on the monitor that is thinner, lighter, and more energy efficient with better contrast ratios, response times, and viewing angles. Select your answer, then click Done.
LED
Select four of the most popular desktop operating systems, then click Done.
Microsoft Windows MacOS Desktop LINUX Chrome OS
Select five ways to authenticate a user's identity.
NOT registered letter
The alphanumeric keys refer to the main set of keys that allow you to input letters, numbers, and punctuation. The most common arrangement of these keys is referred to as the ______ layout. Select your answer, then click Done.
QWERTY
The amount of ______ you have installed in your computer determines how many applications you can have open and work on at the same time. You can make your computer faster by adding more ______ or memory modules. Select your answer, then click D
RAM
Select three of the most popular server operating systems, then click Done.
UNIX LINUX Windows Server
The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.
all
The most fundamental unit of computing is the ______, which is represented as an on (1) or off (0) value. Type your answer in the space provided, then click Done.
bit
Image quality, also known as print resolution, is usually measured in dots per inch (dpi). The more dots per inch a printer can produce, the higher its image quality. Which printer produces the highest quality image? Select your answer, then click Done.
brother...CDW last one
David needs to purchase an affordable laptop for his child to use at school. The computer has to be affordable, lightweight, and able to access Google apps online. Which computer should he buy? Select your answer, then click Done.
chromebook
The motherboard is the largest ______ in the personal computer. Select your answer, then click Done.
circuit board
Hardware is any part of the computer you can touch. Click on all the images of computer hardware, then click Done.
click all images
When you copy, cut, or move files, they are temporarily placed on the ______. Select your answer, then click Done.
clipboard
Select the factors that determine a CPU's performance. Select the three correct answers, then click Done
clock rate brand and model multiple cores
______ allows you to store your files and use various applications in an online account. Select your answer, then click Done.
cloud
Many apps use ______ which is the gathering of information from a large group of people. Select your answer, then click Done.
crowdsourcing
Select the correct file hierarchy, then click Done.
drive, folder, file
______ is the most popular social network that allows users to post messages, photos or videos that can be viewed by the public or anyone in their social circle. Select your answer, then click Done.
Most desktop operating systems come with a ______ utility that examines and blocks Internet traffic. Select your answer, then click Done.
firewall
While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.
flaming trolling
If you are setting up new hard drive or fixing a corrupted USB flash drive, you may need to ______ it in order for it to work properly. Select your answer, then click Done.
format
______ are complete entertainment systems, offering Internet connectivity, movie rentals, photo storage and many other services, in addition to video games. Select your answer, then click Done
gaming consoles
Select four cloud computing storage services that allow you to save and access files online, then click Done.
google drive, dropbox, apple icloud, onedrive
Select the products that respond to a variety of voice commands on mobile devices. Choose all that apply, then click Done
google, sir, coron??
A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.
hacker
______ technology can enhance audio or video output from computers to make them ore relevant or noticeable. Select your answer, then click Done.
haptic
Whenever your operating system or browser issues a software update, you should apply it___.
immediately
Select the correct order of a computer's Information Processing Cycle, then click Done.
input, process, output, storage
What is another name for the the largest network in the world? Select your answer, then click Done.
internet
The development of ______ allowed data to be represented by magnets, which can hold their position or pattern to represent 0's and 1's without electricity. Select your answer, then click Done.
magnetic storage
Except for desktop computers, most computers have built-in ______ that are used for Internet voice calling, capturing audio for video recordings, and speech recognition. Select your answer, then click Done.
microphones
Made solely for tablets and smartphones, ______ operating systems support mobile apps, which are generally fast, touch friendly, and require little storage space. Select your answer, then click Done.
mobile
A large company such as a retail store or airline reservation system uses a ______ computer that acts as the central computer in a network. Select your answer, then click Done.
multi-user
A ______ allows users to communicate and share information between computers. Select your answer, then click Done.
network
David wants to set up a primary computer where he can store his company's website and share files and software with his coworkers. What type of multi-user computer does he need? Select your answer, then click Done.
network server
Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.
no...
Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.
none
The ______ must be loaded before any other software during the computer's start-up or boot process. The ______ is the software that allows other applications to run. Select your answer, then click Done.
operating system
Scanners use______ technology to convert objects into a digital format. Select your answer, then click Done.
optical
Optical storage devices use lasers to read or write data to the reflective surface of a(n) ___. Select your answer, then click Done.
optical disc
______ are connected to the motherboard and allow users to plug in external devices. Select your answer, then click Done.
ports
Select three items located in a system unit. Select your answers, then click Done.
power supply, cooling fan, drive bay
______ is a feature that will delete your history, cache and cookies the moment you close the private windows. Select your answer, then click Done.
private browsing
If you want to keep your computer and financial information safe from computer viruses and malware, then you need to install ______ software. Select your answer, then click Done.
security
Jack just bought a new mobile device. The first thing he should do is ______. Select all that apply, then click Done.
select all
Since ______ storage uses memory chips for storage, it has no moving parts like hard drives or optical drives. Select your answer, then click Done.
solid state
Most computers today include a complete sound system that includes a microphone, ______, and a sound card or processor. Select your answer, then click Done.
speakers
The purpose of ______ is to hold programs and data permanently, even when the computer is turned off. Select your answer, then click Done.
storage
NASA uses a ______ to conduct modeling and simulations for upcoming missions, forecast weather, and perform nuclear research. Select your answer, then click Done.
supercomputer
Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.
surge protector
Users typically interact with most computer software via an on-screen pointer in the form of an arrow. Click three pointing devices you can use to control the arrow, then click Done.
touch pad trackball optical mouse
______ accept input by allowing the user to place a fingertip directly on the computer screen. It's the primary way we interact with our tablets and smartphones. Select your answer, then click Done
touchscreens
A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.
trojan horse
A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.
worm
Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.
zombies