Intro to Computers Final Practice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When considering your digital footprint, be certain to combine your personal online identity and professional online identity. True Or False

False

When creating passwords, make sure to use the same password for each account so that you do not forget! True Or False

False

________ online communication refers to communication that happens in real time, with two or more people online at the same time. 1)Synchronous 2)VoIP 3)Asynchronous 4)Face-to-face

Synchronous

Linux 1)Storage Device 2)Application Software 3)Input Device 4)Output Device 5)System Software

System Software

Once you have updated your browser, you will be free of viruses and malware permanently. True Or False

False

Only one item may be placed in the Clipboard at a time. true or false

False

Phishing redirects you to a phony website. True Or False

False

To display a taskbar icon's Jump List, double-click the icon. True Or False

False

Which part of the URL http://www.uaccm.edu/go is the domain name? 1)http: 2)www.uaccm 3)go 4).edu

www.uaccm

When on a secure website, clicking the ________ will open a security report about the website. key stop sign padlock check mark

Padlock

To transfer files/folders from the Clipboard to a new location, from the Clipboard group, click the ________ command. 1)Cut 2)Insert 3)Add 4)Paste

Paste

________ is a third-party payment site used to protect consumers against fraud. Facebook PayPal Second Life Visa.com

PayPal

________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network Pharming Phishing Spoofing Cyberbullying.

Phishing

A drive is an area of storage that is formatted with a file system compatible with your operating system. True Or False

True

A protocol is a set of rules for communication between devices that determine how data is formatted, transmitted, received, and acknowledged. True Or False

True

All applications must run under the direction of an operating system. True Or False

True

Cybercrime is any criminal activity on the Internet. True Or False

True

Each device that connects to a network must have some type of network adapter. True Or False

True

Google is an example of a search engine. True Or False

True

Most likely, your IP address is provided by your ISP. True Or False

True

Small-screen devices, such as tablets, e-readers, and smartphones, use mobile browsers. True Or False

True

The Snipping Tool program is included with Windows 10. True Or False

True

The Tell Me box is a search feature for Office commands. True Or False

True

The mouse pointer is any symbol that displays on your screen in response to moving your mouse. True Or False

True

You can create personal folders to store documents, pictures, and programs. True Or False

True

You should never download email attachments you weren't expecting because they might contain malware that could damage your computer and steal your personal information. True Or False

True

You must install Windows 10 to use Microsoft Office 2019. True Or False

false

A plug-in is created for a specific browser to add features to it. True Or False

False

After a new folder has been created, the name cannot be changed. True Or False

False

By the late 1980s, CSNET was the primary Internet backbone. True Or False

False

Cloud computing refers to applications that can be installed on a computer through the Microsoft Store. True Or False

False

HTTP is the authoring language that defines the structure of a webpage. True Or False

False

________ is the protocol that resolves a domain name such as ebay.com to an IP address. HTTP DNS IP DHCP

DNS

Peripheral devices are connected to the system unit through 1)pipelines 2)data buses 3)drive controllers 4)expansion cards

Expansion Cards

________ includes all the information that someone can find out about you by searching the web. Fair use A digital footprint SharePoint Ergonomics

A digital footprint

Mario Kart 1)System Software 2)Output Device 3)Application Software 4)Storage Device 5)Input Device

Application Software

Microsoft Excel 1)Storage Device 2)System Software 3)Input Device 4)Output Device 5)Application Software

Application Software

Microsoft Outlook 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software

Application Software

The________ is considered to be the brain of the computer 1)ALU 2)machine cycle 3)instruction cycle 4)CPU

CPU

The ______ acts as the brain of the computer 1)Video Card 2)Central Processing Unit (CPU) 3)Transistor 4)Vacuum Tube

Central Processing Unit (CPU)

Which of the following is NOT a hardware component 1)CPU 2)Keyboard 3)Mouse 4)Chrome Browser

Chrome Browser

A ________ blocks unauthorized access to a network. data packet firewall WPS wireless access point

Firewall

Examples of personal computers include all of the following EXCEPT ________. 1)mobile devices 2)notebooks 3)gaming systems 4)desktops

Gaming Systems

Solid State Drive 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software

Storage Device

Touchscreen 1)Output Device 2)Application Software 3)Input Device 4)System Software 5)Storage Device

Input Device

What is a numeric keypad 1) Output 2) Storage Device 3) Application Software 4) System Software 5) Input Device

Input Device

stylus 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software

Input Device

The ________ browser was first released by Microsoft in 1995. 1)Apple Safari 2)Google Chrome 3)Mozilla Firefox 4)Internet Explorer

Internet Explorer

Directly quoting or paraphrasing someone else's work without permission or credit ________. -requires you to apply for a copyright -means you have a patent pending -requires you to send a copy of your work to the WIPO -is plagiarism

Is Plagiarism

When you start your computer, you will first see the ________. 1)lock screen 2)home page 3)start menu 4)Microsoft store

Lock

Which of the below is NOT an output device 1)Printer 2)Speaker 3)Monitor 4)Microphone

Microphone

________ enables you to connect to the Internet using cellular 3G and 4G network standards. Satellite Internet access FTTH Mobile Internet access Municipal Wi-Fi

Mobile Internet Access

By the late 1980s, ________ was the primary Internet backbone. 1)CERN 2)ARPANET 3)NSFNET 4)CSNET

NFSFNET

Photo Printer 1)System Software 2)Input Device 3)Application Software 4)Storage Device 5)Output Device

Output Device

Which of the following is NOT true about how the Internet began? 1)The Internet started as a U.S. Department of Defense ARPA project in the 1950s. 2)In 1958, President Eisenhower created the Advanced Research Projects Agency (ARPA) to jump-start U.S. technology for the military. 2)It took about 10 years to develop the technology. 3)The original ARPANET had only four locations, called nodes.

The Internet started as a U.S. Department of Defense ARPA project in the 1950s.

A copyright protects literary and artistic works. True Or False

True

Which of the following is NOT a rule for creating strong passwords? Use at least six characters. Do not use any words that can be found in a dictionary. Use different passwords for different accounts. Change your passwords regularly.

Use at least six characters

Before opening email attachments, have the ________ scan the file to search for known viruses. security suite antivirus software SSID antispyware software

antivirus software

Microsoft Word 1)Input Device 2)Output Device 3)Storage Device 4)System Software 5)Application Software

Application Software

Turbo Tax 1)Input Device 2)Output Device 3)Storage Device 4)System Software 5)Application Software

Application Software

Headlines that are ambiguous and sensational that encourage you to click to read more are called _________. Phishing Malware Clickbait Firewall

Clickbait

________ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. Adware Clickjacking Malicious script scams Phishing

Clickjacking

In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login. 1)local area 2)peer-to-peer 3)client-server 4)server

Client Server

OneDrive is Microsoft's ________ storage product. 1)Shared 2)Removable 3)Cloud 4)Internal

Cloud

A(n) ________ file is smaller in size than the original file, takes up less storage space, and can be transferred to other computers quickly. 1)extracted 2)shared 3)compressed 4)blocked

Compressed

To copy selected files using a keyboard shortcut, hold down the ________ key as you drag the files to another folder. 1)lt 2)Windows 3)FN 4)Ctrl

Ctrl

You can use the keyboard shortcut ________ to cut text and place it on the Clipboard. Ctrl + V Ctrl + S Ctrl + X Ctrl + C

Ctrl+X

An unlawful attack against computers or networks that is done to intimidate a government or its people for a political or social agenda is known as ________. 1)cyberbullying 2)cyberterrorism 3)cyberstalking 4)cybercrime

Cyberterroism

Windows ________ is built into Windows 10 to help prevent viruses, spyware, and malware from being installed on your computer without your knowledge. 1)Hacker 2)Firewall 3)Defender 4)Blocker

Defender

The first step in saving a file is to ________. name the file open OneDrive determine the location to save the file open the Documents folder

Determine the location to save the file

The U.S. Department of Defense started e-commerce. True Or False

False

When you compress files, you are unzipping them True Or False

False

Windows 10 is an operating system that works only on mobile devices. True Or False

False

A printer is an example of a(n) 1)System Device 2)Output Device 3)Intergral Part of Every Computer 4)Processing Device

Output Device

Printer 1) Input Device 2) Output Device 3) Storage Device 4) System Software 5) Application Software

Output Device

By default, which of the following is NOT one of the default commands on the Quick Access Toolbar? Undo Redo Save Print

Print

________ define the rules for communication between network devices. 1)Domain controllers 2)Network operating systems 3)Protocols 4)Routers

Protocols

A USB flash drive is an example of a ________ storage device to transfer information from one computer to another. 1)removable 2)transferrable 3)wireless 4)collaborative

Removable

To return a window from full-screen view to its previous size, select ________ in the top-right corner of the window. 1)Resize 2)Restore Down 3)Back 4)Minimize

Restore Down

You can enter text into the ________ box to the right of Start to return suggested programs and features. 1)Lookup 2)Active 3)Search 4)Find

Search

Mass, unsolicited email messages, called ________, are the result of a malicious script scam. cookies adware spam malware

Spam

Hard Drive 1)Storage Device 2)System Software 3)Input Device 4)Output. Device 5)Application Software

Storage Device

A dialog box is a small window that displays options for completing a task True Or False

True

In File Explorer, to change how files in the file list display, click the ________ tab. 1)File 2)Home 3)View 4)Share

View

Which of the following is NOT true about using Web addresses? 1)The page that displays all of the pages in a website in one place is a sitemap. 2)The home page of a website is the main or starting page. 3)The domain name is sometimes called the second-level domain. 4)http:// is a top-level domain.

http://is a top-level domain

Which of the following is NOT true about the world wide web 1)The first White House website was launched in 1994. 2)In 1993, a group of graduate students released the Mosaic point-and-click graphical browser for the web, which later became Mozilla Firefox. 3)The milestone of having a million Internet hosts was reached in 1992. 4)A website consists of one or more web pages that all are located in the same place.

in 1993, a group of graduate students released the Mosaic point-and-click graphical browser for the web, which later became Mozilla Firefox

If you want to access your files anywhere from almost any connected device, you should store your files on your ________. Documents folder hard drive desktop OneDrive

one drive


Ensembles d'études connexes

Chapter 39: Oxygenation and Perfusion

View Set

Chapter 14 Self Assessment (Conceptual)

View Set

Using Positive & Negative Numbers, Decimals, and Fractions

View Set

Chapter 23 - Integumentary Problems (Med Surg) EAQ's

View Set