IT 101 Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Executable file

An __ contains the instructions your computer or device needs to run programs and apps

He can use the search tool to locate it by name, content, or date

Andre cannot find the document he was just working on and he needs to find it fast. How would he use the file manager to find it?

A spreadsheet app to keep record of her expenses, sort data, and make calculations

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

Show her how to use file manager

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?

Use a menu

Describe how a user can interact with a computer so it does what they want

Point to the title bar, then drag the window to it new location. If you drag it to the left or right side of the screen, it will snap to fill that half and then make the other windows thumbnails.

Dharma closes open windows, then opens a new window o do work, then closes it and reopens the first window to do more work. Which of the following are the correct instructions to give Dharma?

Fourth Step

During which step of the boot process does the computer or device load the operating system into RAM?

An attacker can attach a script to a program that you download which then infects your computer

How can an attacker execute malware through a script

Use your posts to figure out answers to possible security questions

How could an online attacker use your online profile to gather information about you to steal your identity?

An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.

How do you know is a device is an input or output device?

Surge Protector

How do you protect a computer from electrical spikes and surges

It scrambles the information until the key is used to unscramble it

How does encryption work?

A worm spreads through a network, whereas a Trojan hides inside another program

How is a worm different from a trojan?

Unlike a data file, you cannot open and read executable files

How is an executable file different from a data file?

The lead and mercury is seeping into the ground and water supply

How is the environment impacted by computers being thrown away

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

He can use remote wiping to retrace the thief's steps

Marcus recently had his cell phone stolen. All of the following are security features except

A device management portable app

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she use?

Use a word processes for step 1, graphics software for step 2, and a mail merge for step 3q

Rob is planning a housewarming party. 1. Create a list of invitees 2.Design the card 3. Personalize the card

A graphics app to design the cover page and place the desired text where needed

Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?

Show him how to look at the file properties, such as the date modified, which is updated each time he saves a document

Samir is really bad about naming his files in a meaningful way to reflect the content. How could you help him find the document he needs and eliminate all the extra work?

Enable sticky keys

Simon has difficulty pressing and holding multiple command keys at a time. What option does he have to still take advantage of using the shortcut keys?

They had to unzip or extract it

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PP Presentation?

Programmers will add malicious cod to damage a user's system

What concerns are there about open source programs?

It will overwrite it unless you add a number, date, or initials to differentiate it

What happens when you try to save a file with the same name into the same folder?

The computer or device receives power from the power supply or battery and send it to the circuitry

What is the first step in the boot process?

Create and store multiple strong passwords

What would a password manager allow you to do?

Do not provide personal information over the phone or through email

Which is he first step to deter thieves from accessing your financial information?

You can take it with you and then work on it on another computer

Which of the following is an advantage to a flash drive?

Linux

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

Ergonomics

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

An error warning came on, because he is not the administrator of the account

While working on a computer in the computer lab at school, a message popped up saying a new version of Java was ready to be installed. Trying to be helpful, Tomas clicked the Download Now button. What most likely happened next?

To organize files

Why are folders created?

It places the document in a buffer

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

You can open your computer or device's version of the task manager to view running programs and shut down the app

You are having trouble closing a program. You have tried to hit the close button, the keyboard shortcut to close the program, and closing it from the task bar. Before shutting down your computer, what other troubleshooting steps could you try?

Creating malware

there are various risks from attacks on Wi-Fi networks. These include all the following except

Phishing

what is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?


Ensembles d'études connexes

REAL 2.2.3: Seller's Agents Responsibilities and Negotiation Strategies

View Set

Securities Industries Essentials Exam (SIE)

View Set

Article IV-VII: The Role of the Constitution

View Set

SPC 1017 Quiz 1: Human Communication

View Set

5. sınıf Ünite 1 - HELLO ünitesi Kelimeleri

View Set

chapter 26 nervous system infections mcgraw hill microbiology

View Set

Principles of Economics Chapter 34

View Set