Intro to Computers Final Practice
When considering your digital footprint, be certain to combine your personal online identity and professional online identity. True Or False
False
When creating passwords, make sure to use the same password for each account so that you do not forget! True Or False
False
________ online communication refers to communication that happens in real time, with two or more people online at the same time. 1)Synchronous 2)VoIP 3)Asynchronous 4)Face-to-face
Synchronous
Linux 1)Storage Device 2)Application Software 3)Input Device 4)Output Device 5)System Software
System Software
Once you have updated your browser, you will be free of viruses and malware permanently. True Or False
False
Only one item may be placed in the Clipboard at a time. true or false
False
Phishing redirects you to a phony website. True Or False
False
To display a taskbar icon's Jump List, double-click the icon. True Or False
False
Which part of the URL http://www.uaccm.edu/go is the domain name? 1)http: 2)www.uaccm 3)go 4).edu
www.uaccm
When on a secure website, clicking the ________ will open a security report about the website. key stop sign padlock check mark
Padlock
To transfer files/folders from the Clipboard to a new location, from the Clipboard group, click the ________ command. 1)Cut 2)Insert 3)Add 4)Paste
Paste
________ is a third-party payment site used to protect consumers against fraud. Facebook PayPal Second Life Visa.com
PayPal
________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network Pharming Phishing Spoofing Cyberbullying.
Phishing
A drive is an area of storage that is formatted with a file system compatible with your operating system. True Or False
True
A protocol is a set of rules for communication between devices that determine how data is formatted, transmitted, received, and acknowledged. True Or False
True
All applications must run under the direction of an operating system. True Or False
True
Cybercrime is any criminal activity on the Internet. True Or False
True
Each device that connects to a network must have some type of network adapter. True Or False
True
Google is an example of a search engine. True Or False
True
Most likely, your IP address is provided by your ISP. True Or False
True
Small-screen devices, such as tablets, e-readers, and smartphones, use mobile browsers. True Or False
True
The Snipping Tool program is included with Windows 10. True Or False
True
The Tell Me box is a search feature for Office commands. True Or False
True
The mouse pointer is any symbol that displays on your screen in response to moving your mouse. True Or False
True
You can create personal folders to store documents, pictures, and programs. True Or False
True
You should never download email attachments you weren't expecting because they might contain malware that could damage your computer and steal your personal information. True Or False
True
You must install Windows 10 to use Microsoft Office 2019. True Or False
false
A plug-in is created for a specific browser to add features to it. True Or False
False
After a new folder has been created, the name cannot be changed. True Or False
False
By the late 1980s, CSNET was the primary Internet backbone. True Or False
False
Cloud computing refers to applications that can be installed on a computer through the Microsoft Store. True Or False
False
HTTP is the authoring language that defines the structure of a webpage. True Or False
False
________ is the protocol that resolves a domain name such as ebay.com to an IP address. HTTP DNS IP DHCP
DNS
Peripheral devices are connected to the system unit through 1)pipelines 2)data buses 3)drive controllers 4)expansion cards
Expansion Cards
________ includes all the information that someone can find out about you by searching the web. Fair use A digital footprint SharePoint Ergonomics
A digital footprint
Mario Kart 1)System Software 2)Output Device 3)Application Software 4)Storage Device 5)Input Device
Application Software
Microsoft Excel 1)Storage Device 2)System Software 3)Input Device 4)Output Device 5)Application Software
Application Software
Microsoft Outlook 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software
Application Software
The________ is considered to be the brain of the computer 1)ALU 2)machine cycle 3)instruction cycle 4)CPU
CPU
The ______ acts as the brain of the computer 1)Video Card 2)Central Processing Unit (CPU) 3)Transistor 4)Vacuum Tube
Central Processing Unit (CPU)
Which of the following is NOT a hardware component 1)CPU 2)Keyboard 3)Mouse 4)Chrome Browser
Chrome Browser
A ________ blocks unauthorized access to a network. data packet firewall WPS wireless access point
Firewall
Examples of personal computers include all of the following EXCEPT ________. 1)mobile devices 2)notebooks 3)gaming systems 4)desktops
Gaming Systems
Solid State Drive 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software
Storage Device
Touchscreen 1)Output Device 2)Application Software 3)Input Device 4)System Software 5)Storage Device
Input Device
What is a numeric keypad 1) Output 2) Storage Device 3) Application Software 4) System Software 5) Input Device
Input Device
stylus 1)Input Device 2)Output device 3)Storage Device 4)System Software 5)Application Software
Input Device
The ________ browser was first released by Microsoft in 1995. 1)Apple Safari 2)Google Chrome 3)Mozilla Firefox 4)Internet Explorer
Internet Explorer
Directly quoting or paraphrasing someone else's work without permission or credit ________. -requires you to apply for a copyright -means you have a patent pending -requires you to send a copy of your work to the WIPO -is plagiarism
Is Plagiarism
When you start your computer, you will first see the ________. 1)lock screen 2)home page 3)start menu 4)Microsoft store
Lock
Which of the below is NOT an output device 1)Printer 2)Speaker 3)Monitor 4)Microphone
Microphone
________ enables you to connect to the Internet using cellular 3G and 4G network standards. Satellite Internet access FTTH Mobile Internet access Municipal Wi-Fi
Mobile Internet Access
By the late 1980s, ________ was the primary Internet backbone. 1)CERN 2)ARPANET 3)NSFNET 4)CSNET
NFSFNET
Photo Printer 1)System Software 2)Input Device 3)Application Software 4)Storage Device 5)Output Device
Output Device
Which of the following is NOT true about how the Internet began? 1)The Internet started as a U.S. Department of Defense ARPA project in the 1950s. 2)In 1958, President Eisenhower created the Advanced Research Projects Agency (ARPA) to jump-start U.S. technology for the military. 2)It took about 10 years to develop the technology. 3)The original ARPANET had only four locations, called nodes.
The Internet started as a U.S. Department of Defense ARPA project in the 1950s.
A copyright protects literary and artistic works. True Or False
True
Which of the following is NOT a rule for creating strong passwords? Use at least six characters. Do not use any words that can be found in a dictionary. Use different passwords for different accounts. Change your passwords regularly.
Use at least six characters
Before opening email attachments, have the ________ scan the file to search for known viruses. security suite antivirus software SSID antispyware software
antivirus software
Microsoft Word 1)Input Device 2)Output Device 3)Storage Device 4)System Software 5)Application Software
Application Software
Turbo Tax 1)Input Device 2)Output Device 3)Storage Device 4)System Software 5)Application Software
Application Software
Headlines that are ambiguous and sensational that encourage you to click to read more are called _________. Phishing Malware Clickbait Firewall
Clickbait
________ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. Adware Clickjacking Malicious script scams Phishing
Clickjacking
In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login. 1)local area 2)peer-to-peer 3)client-server 4)server
Client Server
OneDrive is Microsoft's ________ storage product. 1)Shared 2)Removable 3)Cloud 4)Internal
Cloud
A(n) ________ file is smaller in size than the original file, takes up less storage space, and can be transferred to other computers quickly. 1)extracted 2)shared 3)compressed 4)blocked
Compressed
To copy selected files using a keyboard shortcut, hold down the ________ key as you drag the files to another folder. 1)lt 2)Windows 3)FN 4)Ctrl
Ctrl
You can use the keyboard shortcut ________ to cut text and place it on the Clipboard. Ctrl + V Ctrl + S Ctrl + X Ctrl + C
Ctrl+X
An unlawful attack against computers or networks that is done to intimidate a government or its people for a political or social agenda is known as ________. 1)cyberbullying 2)cyberterrorism 3)cyberstalking 4)cybercrime
Cyberterroism
Windows ________ is built into Windows 10 to help prevent viruses, spyware, and malware from being installed on your computer without your knowledge. 1)Hacker 2)Firewall 3)Defender 4)Blocker
Defender
The first step in saving a file is to ________. name the file open OneDrive determine the location to save the file open the Documents folder
Determine the location to save the file
The U.S. Department of Defense started e-commerce. True Or False
False
When you compress files, you are unzipping them True Or False
False
Windows 10 is an operating system that works only on mobile devices. True Or False
False
A printer is an example of a(n) 1)System Device 2)Output Device 3)Intergral Part of Every Computer 4)Processing Device
Output Device
Printer 1) Input Device 2) Output Device 3) Storage Device 4) System Software 5) Application Software
Output Device
By default, which of the following is NOT one of the default commands on the Quick Access Toolbar? Undo Redo Save Print
________ define the rules for communication between network devices. 1)Domain controllers 2)Network operating systems 3)Protocols 4)Routers
Protocols
A USB flash drive is an example of a ________ storage device to transfer information from one computer to another. 1)removable 2)transferrable 3)wireless 4)collaborative
Removable
To return a window from full-screen view to its previous size, select ________ in the top-right corner of the window. 1)Resize 2)Restore Down 3)Back 4)Minimize
Restore Down
You can enter text into the ________ box to the right of Start to return suggested programs and features. 1)Lookup 2)Active 3)Search 4)Find
Search
Mass, unsolicited email messages, called ________, are the result of a malicious script scam. cookies adware spam malware
Spam
Hard Drive 1)Storage Device 2)System Software 3)Input Device 4)Output. Device 5)Application Software
Storage Device
A dialog box is a small window that displays options for completing a task True Or False
True
In File Explorer, to change how files in the file list display, click the ________ tab. 1)File 2)Home 3)View 4)Share
View
Which of the following is NOT true about using Web addresses? 1)The page that displays all of the pages in a website in one place is a sitemap. 2)The home page of a website is the main or starting page. 3)The domain name is sometimes called the second-level domain. 4)http:// is a top-level domain.
http://is a top-level domain
Which of the following is NOT true about the world wide web 1)The first White House website was launched in 1994. 2)In 1993, a group of graduate students released the Mosaic point-and-click graphical browser for the web, which later became Mozilla Firefox. 3)The milestone of having a million Internet hosts was reached in 1992. 4)A website consists of one or more web pages that all are located in the same place.
in 1993, a group of graduate students released the Mosaic point-and-click graphical browser for the web, which later became Mozilla Firefox
If you want to access your files anywhere from almost any connected device, you should store your files on your ________. Documents folder hard drive desktop OneDrive
one drive