Software Simulation Quiz
Which of the following does NOT allow you to search for files or folders
Using the Help and Support Window.
A specialized chip included in the cell phone that handles digital compression data is called the _______ .
digital signal processor
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor chip
Business conducted on the Web is known as
e-commerce
Windows Firewall CANNOT protect your computer from ________.
e-mail spam
One of the most popular C2C websites is ________
eBay
A(n) ______ , such as Thunderbird, allows you to read your email even after you are no longer connected to the Internet.
email client
Windows Firewall will detect or disable viruses and worms that are already on your computer.
false
A(n) ________ is a message board where people can discuss similar interests in an asynchronous environment.
forum
If hackers wanted to record everything that you type, such as a credit card number, they could install a(n)
keystroke logger
The following are basic functions that adware and spyware generally perform EXCEPT ________.
keystroke logging
The term _______ refers to adware and spyware
malware
________ are hardware components that often contain firewalls.
routers
SMM stands for
social media marketing
Raw files are larger than JPEG files.
true
Social media is used by a B2C company to help customers become more aware of the company's products.
true
Twitter is an example of a microblogging site
true
VoIP can be considered an alternative to a traditional landline phone service
true
You can allow readers to post comments to your blog posts.
true
A portable media player can play files with all of the following file extensions EXCEPT ________.
.accdb
Windows Defender is one of the Windows 8.1 Action Center tools
False
The operating system of a cell phone is stored in ________
ROM
A(n) ________ feed keeps you updated on podcasts and news feeds to which you have subscribed.
RSS
Security and Maintenance are the two types of Windows Action Center tools.
True
A(n) ________ is similar to an online journal, in which you can write about anything you want to share.
blog
___________, a technology that uses radio waves to transmit signals, allows you to synchronize your cell phone or smartphone with your desktop computer wirelessly
bluetooth
A tablet uses a full traditional operating system
false
You can only edit content on a wiki if you are the original author.
false
Yelp is an example of a(n) ________ site.
review
Every new cell/smartphone has to include a GPS chip
true
Facebook is available worldwide
true
If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as Paypal.
true
Traditional, text-based chat rooms allow complete strangers to communicate with each other.
true
VoIP stands for Voice over Internet Protocol.
true
When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created.
true
Windows Defender protects your computer from all of the following EXCEPT ________
unexpected software updates
Instead of limiting you to just text, a(n) _____ allows you to maintain a video journal.
video blog and Vlog
To keep your cell phone or smartphone number private, you should consider assigning your device a(n) _____ phone number.
virtual
You can make a phone call over the Internet using ______ instead of traditional phone lines.
voIP
If you want definitions for computer terminology, of the sites mentioned in the Sound Byte, go to
webopedia
Of the websites mentioned in the Sound Byte, to find the meaning of an acronym like CPU, you would use
webopedia
What subcategories would you NOT find in the Computer topic on the How Stuff Works website
Digital photography
The site mentioned in the Sound Byte offers help for Windows-related problems
Microsoft Support
_______ devices can communicate with each other with a single tap
NFC and Near field communication
In the Windows Explorer window, this pane displays Favorites, Libraries, Computer, and Network information
Navigation
Which site is a resource specifically intended for students in grades 3 through 12?
New York Times Learning Network
The area on the right side of the taskbar that keeps you informed about processes that are occurring in the background, such as antivirus software, network connections, and other utility programs, is the
Notification area
How do you change the desktop theme in Windows 7
Open the Control Panel and click Change the theme under Appearance and Personalization.
________ recommends music to you based on your listening preferences.
Pandora
Google ________ is an online store that delivers software for Android devices
Play
If you want to copy a file from one folder to another on the same drive, what would you do
Press and hold CTRL, click the file, drag the file to the new folder, and release the mouse
When you receive an email message, and you want to reply back to the sender and the other recipients of the original message, you should use ________.
Reply all
The practice of using social media to sell services is called ________.
SMM
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Sampling rate
________ is a very well-known free VoIP provider
Skype
Which of the following mobile devices is the lightest?
Smartphone
________ is a social bookmarking site that helps you to find other websites based on topics that interest you.
StumbleUpon
To find Microsoft-related downloads to update your system, you would use Microsoft's ________ site
Support
Which of the following is NOT an IM service?
TalkToMe
An unusual advertisement on your computer screen that pops up is usually caused by ________
adware or spyware
A moderated chat room ensures that ________.
all content is screened
Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.
false
SMS messages are limited to a maximum of 160 words
false
SMS technology sends both text and pictures.
false
Smartphones all use the Android operating system
false
The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
false
There are more virus attacks on cell phone and smartphones than there are on PCs.
false
When you first get a computer, you must go to the Control Panel and enable Windows Firewall
false
When you participate in a chat room, the text you wrote is deleted after you log out.
false
With Skype software installed on your phone, you can call any phone number for free
false
You can allow others to legally use photos you upload to Flickr by tagging those images with the keyword "public."
false
iPhones let you add SD flash cards
false
A(n) _____ is your best defense to keep hackers out of your computer.
firewall
A dynamic program—such as a clock, a stock market ticker, or a weather window—that displays on the desktop is a
gadget
All of the following are unwanted software a hacker could install on your computer, EXCEPT ________.
ghosts
GPS stands for
global positioning system
A hacker can use a Trojan ______ to remotely control your PC.
horse
When you create a new folder, the folder name displays
in edit mode
The two main components of Windows Action Center are
maintenance and security
Backing up and updating your system is a function of the ________
maintenance component of Windows tools
The tools that enable users to create user-generated content, connect, network, and share are called social ________.
media
Digital camera resolution is measured in
megapixels
Custom file properties such as names, places, and descriptions that are added to files are called
metadata
The primary input devices for smartphones are ________
microphone and touch pad
The website in the Sound Byte includes webinars and videos on Office products
microsoft office training
When using a cell phone, a base transceiver station picks up a request for service and then passes the request to a central location called a(n) _______
mobile switching center
You can send messages that include photos and videos between mobile devices using ________ technology
multimedia message service (MMS)
A(n) ____ is the smallest computer that runs a traditional desktop operating system.
netbook
The is produced by the associated newspaper and contains current news stories from the publication.
new york times learning network
The website in the Sound Byte contains links to student opinion polls
new york times learning network
iOS and Android are ______ for tablets and smartphones.
operating systems
If you would like to get a security report about a website, you can click on the ________ icon when it is available.
padlock
Napster used ______ sharing to transfer files between users.
peer-to-peer
Google _____ is an online store delivering software for mobile devices.
play
The arrow, I-beam, or other symbol that shows the location or position of the mouse on your screen is the mouse
pointer
When using Yahoo! Mail, the Yahoo! Address Book is an example of a useful _______ window.
pop up
The _______ of a digital camera refers to the number of data points recorded for a captured image.
resolution
The ____ is the number of times that an analog wave is measured each second in an analog-to-digital conversion.
sampling rate
The global positioning system is a network of 21 ________ plus 3 working spares
satellites
A main difference between the tablet and the smartphone is the ________.
screen size
Podcasts allow time ________, which means that you can listen on your own schedule.
shifting
Text messaging is also called ________.
short message service (SMS)
You can activate this by pointing to an object and clicking the right mouse button
shortcut menu
An email ________ is a block of text that is automatically put at the end of your messages.
signature
________ is an example of asynchronous communication.
Cellular networks offer faster data-transfer speed than WiFi offers
false
Instant messaging only allows you to talk to one person at a time.
false
LinkedIn allows you to chat with other people in real-time.
false
One disadvantage of using a chat room is that you cannot access it from a tablet or smartphone.
false
One way to stay current on a technology blog is to subscribe to the DNS feed for that blog.
false
Which of the following is NOT a video file extension?
.jpg
Which of the following is a social network?
The Apple iPhone uses a version of Apple's _____ as its operating system.
OS X
The main technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is
E Ink and electronic ink
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
E-text
1. A simple drawing program included with Windows 7. 2. Displays the Start button and the name of any open documents; it may also display shortcut buttons for other programs. 3. Command at the bottom of the Start menu that takes you to all available programs on your computer. 4. To remove the window from the screen without closing it. 5. To increase the size of a window to fill the screen.
1. Paint 2. Taskbar 3. All Programs 4. Minimize 5. Maximize
1. The bar at the right side of a window that enables you to move up and down to view information that extends beyond the top and bottom of the screen. 2. The bar at the bottom of a window that enables you to move left and right to view information that extends beyond the left and right edges of the screen. 3. Move the mouse pointer while holding down the left mouse button, and then release at the appropriate time. 4. Work that you save and store on a drive, such as a Word document or a PowerPoint presentation. 5. A program that enables you to create and manage folders, and copy, move, sort, and delete files.
1. Vertical scroll bar 2. Horizontal scroll bar 3. Drag 4. File 5. Windows Explorer
Match each of the following terms to its description: (5 points) 1. VoIP 2. IM 3. chat room 4. synchronous 5. SMS
1. allows you to make phone calls over the Internet 2. messaging between two people that disappears when the session ends 3. where people who do not know each other, but have similar interests, can discuss topics 4. real-time communication 5. used for text messaging
Match each of the following terms to its definition: (5 points) 1. digital signal processor 2. mobile switching center 3. telephony 4. analog-to-digital converter 5. codec
1. compresses cell phone data for easy transmission 2. central location to which a base station transfers a cell phone service request 3. the use of equipment to provide voice communications over a distance 4. changes your voice's sound waves into digital signals 5. rule using hardware or software that compress audio and video information
Match each of the following terms to it's definition: (5 points) 1. MP3 2. PMP 3. MPEG-4 4. GPS 5. MMS
1. digital music file format 2. portable media player 3. digital video file format 4. uses satellites to locate a device 5. technology that allows the sending of text, sound, images, and video clips
Match the following sites to their content: (5 points) 1. How Stuff Works 2.New York Times Learning Network 3. Microsoft Office Training 4. Webopedia 5. Microsoft Support
1. explains the mechanics of items from computers to health equipment 2. includes lesson plans for a variety of subjects 3. contains webinars and videos on a variety of skills for applications like Excel 4. contains definitions of computer terms 5. has a feature that allows you to ask questions to a community of users
Match each of the following terms to its description: (5 points) 1. Cc: 2. Bcc: 3. To: 4. signature line 5. subject line
1. field used to include someone on the email but they are not the main recipient 2. field used to keep the recipients' email addresses private 3. field normally used to send an email to a friend 4. block of text automatically added to the end of an email message 5. describes the content of an email message
Match each of the following terms to its meaning: (5 points) 1. data mining 2. aggressive advertising 3. keystroke logger 4. pop-up blocker 5. tracking
1. gathers personal information about you 2. displays enticing information to tempt you to buy 3. records everything you type, like credit card numbers 4. utility to stop extra Internet windows from opening 5. records Internet surfing habits
Match each of the following terms to its definition: (5 points) 1. copyleft 2. sampling rate 3. tethering 4. e-text 5. digital rights management
1. granting of certain rights to a work while retaining other rights 2. number of times an analog wave is measured 3. connecting a computer to the Internet through a smartphone's cellular access 4. digitized text displayed by electronic devices 5. allows only limited use of legally purchased materials
Match each of the following terms to its definition: (5 points) 1. resolution 2. Bluetooth 3. analog 4. SMS 5. data plan
1. number of data points used to capture and image 2. uses radio wave to transmit data 3. continuous sound or light waves 4. text messaging 5. determines the cost and amount of data transfer for mobile devices
Match each of the following terms to its meaning: (5 points) 1. firewall 2. hacker 3. Trojan horse 4. router 5. virus
1. prevents intrusion into your computer 2. a person who poses a threat to your computer 3. software that controls your computer from another location 4. a potential hardware firewall 5. a small program that can compromise a computer system
Match each of the following terms to its definition: (5 points) 1. tablet PC 2. laptop 3. smartphone 4. e-reader 5. notebook
1. provides PIM capabilities, application software, and special handwriting and speech recognition capabilities 2. runs a traditional OS and is lightweight 3. combines computer functionality with telephony 4. device that can display e-text and has supporting tools, like note taking, bookmarks, and integrated dictionaries 5. all the capabilities of a desktop plus portability
The distance between two near field communication (NFC) devices is limited to about ________.
1.5 inches
1. The Windows 7 user interface that features a three-dimensional look, with transparent window frames, live previews of open windows, and multiple color schemes. 2. A program that captures a screen or part of a screen. 3. Displays information about the drive, folder, or file selected in the Content pane. 4. A set of instructions that coordinates the activities of your computer. 5. A computer interface that shows documents as they will look in their final form and uses icons to represent programs.
1.Windows Aero 2.Snipping Tool 3. Details pane 4. Operating system 5. Graphical user interface
SMS messages are limited to a maximum of ________ characters
160
In the United States, e-books account for about ________ of all book sales
20% to 30%
What is iOS?
An operating system for mobile devices
________ communication allows you to send a message to someone who is not online at the same time.
Asynchronous
Services that one business provides for another are called ________.
B2B
When you buy a textbook online from Amazon.com, you are participating is ________ e-commerce.
B2C
When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private.
Bcc:
Which of the following uses radio waves to transmit data signals over short distances?
Bluetooth
Which of the following is an example of a social bookmarking site?
Delicious
________ e-commerce allows anyone to sell or trade your items online
C2C
Which of the following is NOT a social news site?
CNN
Which of the following is NOT a Microsoft Support option
Call (800) MICROSOFT
If you want to move a file from one folder to another on the same drive, what would you do
Click and drag the file to the new folder.
How do you open a new Finder window in the Mac Snow Leopard operating system
Click the File menu and click New Finder Window.
How do you change the desktop background in the Mac Snow Leopard operating system
Click the System Preferences icon on the dock. Under Personal, click Desktop & Screen Saver
If you want to move a file to a different drive, what would you do
Click the file, press CTRL+X, click the new folder, and press CTRL+V
_______-based chats require you to install specific software in order to access them.
Client
________ allows only limited use of media that have been legally purchased
Digital rights management
How do you pin an application to the Start menu in Windows 7
Drag the application's icon from the desktop to the Start menu
________ is a service that allows you to place video phone calls to other users.
FaceTime
A keystroke logger allows hackers to take control of your computer
False
All pop-ups are malicious.
False
Computers with low-bandwidth connections are more susceptible to hackers
False
Windows Action Center can only be used to troubleshoot computer problems.
False
When you create a search folder, it displays in the Navigation pane under this category
Favorites
Two top-selling tablets are the iPad and the
Galaxy
A(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
Which site has topics within the Computer category for hardware, peripherals, and security
How Stuff Works
Which site is divided into categories such as Science and Tech?
How Stuff Works
________ was designed to allow you to take and edit photos on a smartphone and upload them to the Web automatically.
Which of the following is a method of synchronous online communication?
Instant Messaging
The desktop version of _______ has an option to turn its popup blocker off and on.
Internet Explorer and IE
Which of the following is NOT true about email?
It cannot be accessed by hackers.
Which of the following statements about VoIP is FALSE?
It is limited to contacting people in the United States.
The most common file types supported by digital cameras are raw uncompressed (RAW) data and
JPEG
Which of the following digital image formats compresses the image file?
JPEG
The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
Kickstarter
________ is a business-centered social network that is designed for business connections.
Which site offers webinars and videos on a variety of skills for applications like Microsoft Word and Access
Microsoft Office Training
Adware displays promotional items on user computers
True
Backdoor programs and zombies are used to launch denial-of-service attacks
True
The Windows 8.1 Troubleshooting Wizard detects problems and attempts to fix them.
True
________ is an example of a microblogging site that allows a limited number of characters in a post.
Tumblr
Many mobile devices include a micro ________ port
USB
_____is content created by people who are not professional writers or photographers.
User-generated content
1) Which site has easy-to-read overviews of a lot of technical information?
Webopedia
To find the meaning of an acronym like ROM, you would use ________.
Webopedia
Which site is like an online dictionary of computer terms
Webopedia
________ is an example of a social sharing site where anyone can share video that they create
YouTube
_________ can be used to launch denial-of-service attacks.
Zombies
Your mobile device files can be synchronized using
a cloud service
The three or four characters to the right of the period in a file name is called
a file extension
When using a cell phone, a(n) _____ converter chip changes your voice's sound waves into digital signals.
analog-to-digital and analog to digital
A(n) ________ chip converts sound waves from a voice into digital signal.
analog-to-digital converter
A(n) ________ converts your voice's sound waves into digital signals
analog-to-digital converter chip
All of the following can protect you from hackers EXCEPT ________.
antispam software
In a virtual community, you can communicate with other people by using a(n) ________.
avatar
Each cell in a cellular network is a geographic area centered on a(n) _______ station, which is a large communications tower.
base transceiver
Windows Firewall _
blocks unwanted intrusions
A(n) _______ is used to ensure that you are a human creating a new email account and not a computer.
captcha
When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.
captcha
A(n) ______ is a rule that squeezes the same audio and video information into less space
codec and compression/decompression
Wikis are designed for ________, allowing people to contribute more than just posting a response.
collaboration
If you have a LinkedIn account, you will have _____ instead of friends.
connections
_____ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.
copyleft
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.
crowdsourcing
An Internet connectivity plan is also known as a ________ plan
data
The practice of advertisers using software that tracks personal information about you is called ________.
data mining
Internet connectivity plans are usually known as
data plans
The working area of the Windows 7 screen—consisting of program icons, a taskbar, a Start button, and gadgets—is the
desktop
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
digital convergence
All of the information that someone can find out about you by searching the web is called your ________.
digital footprint
All of the following are advantages of VoIP EXCEPT ________.
excellent reliability during Internet or power outages
A viral video is one that can infect your computer with malware.
false
Academic research projects are encouraged to use Wikipedia since the information available on any topic has been edited by professionals for accuracy.
false
All of the email programs available today allow you to include images.
false
All of the posts that you make to Twitter are public, meaning that you cannot restrict anyone from seeing them.
false
Any email that you send is private, and it cannot be read by anyone other than the person to whom it is addressed.
false
Facebook, which is a(n) ______ , is an online community that allows you to keep in touch with friends and family through chat and posted messages.
social network
The purpose of a firewall is to ________.
stop computers that are connected to the Internet from being attractive to hackers
Email sends electronic messages using ________ technology.
store-and-forward
SMS delivers messages to the appropriate mobile device using __________ technology
store-and-forward
About.com is an example of a(n) ________ search engine
subject-oriented
Making sure the data on two devices are the same is referred to as _________ .
synchronizing
All of the following are included in the Security category of the Windows Action Center, EXCEPT ________
system backup
A conversation that takes place on a discussion board is called a ________.
thread
A social bookmarking site allows you to share your bookmarks with others online.
true
An advantage to using a webmail interface is that your email is available to you from anywhere whenever you are online.
true
Businesses have started to use instant messaging tools to help provide customer support.
true
DRM-free music can legally be moved from system to system
true
If you have a webcam, VoIP allows you to video chat with a friend in Europe.
true
In a virtual world, you can select an avatar is a virtual body.
true
Inexpensive phones with modest processors and simple interfaces are called feature phones.
true
It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you won't lose your email account.
true
Most forums require you to create an account if you want to post to a discussion board.
true
One example of a B2B service is web hosting
true
One way to access email is to read it online through a webmail interface
true
Social news sites allow some content to be submitted by users
true
Synchronous online communication happens in real-time with two or more people online at the same time.
true
When you send an email to your professor, a server holds on to that email until the professor requests it.
true
Windows includes a software firewall
true
You should be wary about entering your credit card number into a website whose URL does not begin with https because they are not using any security.
true