Software Simulation Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following does NOT allow you to search for files or folders

Using the Help and Support Window.

A specialized chip included in the cell phone that handles digital compression data is called the _______ .

digital signal processor

A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

digital signal processor chip

Business conducted on the Web is known as

e-commerce

Windows Firewall CANNOT protect your computer from ________.

e-mail spam

One of the most popular C2C websites is ________

eBay

A(n) ______ , such as Thunderbird, allows you to read your email even after you are no longer connected to the Internet.

email client

Windows Firewall will detect or disable viruses and worms that are already on your computer.

false

A(n) ________ is a message board where people can discuss similar interests in an asynchronous environment.

forum

If hackers wanted to record everything that you type, such as a credit card number, they could install a(n)

keystroke logger

The following are basic functions that adware and spyware generally perform EXCEPT ________.

keystroke logging

The term _______ refers to adware and spyware

malware

________ are hardware components that often contain firewalls.

routers

SMM stands for

social media marketing

Raw files are larger than JPEG files.

true

Social media is used by a B2C company to help customers become more aware of the company's products.

true

Twitter is an example of a microblogging site

true

VoIP can be considered an alternative to a traditional landline phone service

true

You can allow readers to post comments to your blog posts.

true

A portable media player can play files with all of the following file extensions EXCEPT ________.

.accdb

Windows Defender is one of the Windows 8.1 Action Center tools

False

The operating system of a cell phone is stored in ________

ROM

A(n) ________ feed keeps you updated on podcasts and news feeds to which you have subscribed.

RSS

Security and Maintenance are the two types of Windows Action Center tools.

True

A(n) ________ is similar to an online journal, in which you can write about anything you want to share.

blog

___________, a technology that uses radio waves to transmit signals, allows you to synchronize your cell phone or smartphone with your desktop computer wirelessly

bluetooth

A tablet uses a full traditional operating system

false

You can only edit content on a wiki if you are the original author.

false

Yelp is an example of a(n) ________ site.

review

Every new cell/smartphone has to include a GPS chip

true

Facebook is available worldwide

true

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as Paypal.

true

Traditional, text-based chat rooms allow complete strangers to communicate with each other.

true

VoIP stands for Voice over Internet Protocol.

true

When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created.

true

Windows Defender protects your computer from all of the following EXCEPT ________

unexpected software updates

Instead of limiting you to just text, a(n) _____ allows you to maintain a video journal.

video blog and Vlog

To keep your cell phone or smartphone number private, you should consider assigning your device a(n) _____ phone number.

virtual

You can make a phone call over the Internet using ______ instead of traditional phone lines.

voIP

If you want definitions for computer terminology, of the sites mentioned in the Sound Byte, go to

webopedia

Of the websites mentioned in the Sound Byte, to find the meaning of an acronym like CPU, you would use

webopedia

What subcategories would you NOT find in the Computer topic on the How Stuff Works website

Digital photography

The site mentioned in the Sound Byte offers help for Windows-related problems

Microsoft Support

_______ devices can communicate with each other with a single tap

NFC and Near field communication

In the Windows Explorer window, this pane displays Favorites, Libraries, Computer, and Network information

Navigation

Which site is a resource specifically intended for students in grades 3 through 12?

New York Times Learning Network

The area on the right side of the taskbar that keeps you informed about processes that are occurring in the background, such as antivirus software, network connections, and other utility programs, is the

Notification area

How do you change the desktop theme in Windows 7

Open the Control Panel and click Change the theme under Appearance and Personalization.

________ recommends music to you based on your listening preferences.

Pandora

Google ________ is an online store that delivers software for Android devices

Play

If you want to copy a file from one folder to another on the same drive, what would you do

Press and hold CTRL, click the file, drag the file to the new folder, and release the mouse

When you receive an email message, and you want to reply back to the sender and the other recipients of the original message, you should use ________.

Reply all

The practice of using social media to sell services is called ________.

SMM

Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

Sampling rate

________ is a very well-known free VoIP provider

Skype

Which of the following mobile devices is the lightest?

Smartphone

________ is a social bookmarking site that helps you to find other websites based on topics that interest you.

StumbleUpon

To find Microsoft-related downloads to update your system, you would use Microsoft's ________ site

Support

Which of the following is NOT an IM service?

TalkToMe

An unusual advertisement on your computer screen that pops up is usually caused by ________

adware or spyware

A moderated chat room ensures that ________.

all content is screened

Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.

false

SMS messages are limited to a maximum of 160 words

false

SMS technology sends both text and pictures.

false

Smartphones all use the Android operating system

false

The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.

false

There are more virus attacks on cell phone and smartphones than there are on PCs.

false

When you first get a computer, you must go to the Control Panel and enable Windows Firewall

false

When you participate in a chat room, the text you wrote is deleted after you log out.

false

With Skype software installed on your phone, you can call any phone number for free

false

You can allow others to legally use photos you upload to Flickr by tagging those images with the keyword "public."

false

iPhones let you add SD flash cards

false

A(n) _____ is your best defense to keep hackers out of your computer.

firewall

A dynamic program—such as a clock, a stock market ticker, or a weather window—that displays on the desktop is a

gadget

All of the following are unwanted software a hacker could install on your computer, EXCEPT ________.

ghosts

GPS stands for

global positioning system

A hacker can use a Trojan ______ to remotely control your PC.

horse

When you create a new folder, the folder name displays

in edit mode

The two main components of Windows Action Center are

maintenance and security

Backing up and updating your system is a function of the ________

maintenance component of Windows tools

The tools that enable users to create user-generated content, connect, network, and share are called social ________.

media

Digital camera resolution is measured in

megapixels

Custom file properties such as names, places, and descriptions that are added to files are called

metadata

The primary input devices for smartphones are ________

microphone and touch pad

The website in the Sound Byte includes webinars and videos on Office products

microsoft office training

When using a cell phone, a base transceiver station picks up a request for service and then passes the request to a central location called a(n) _______

mobile switching center

You can send messages that include photos and videos between mobile devices using ________ technology

multimedia message service (MMS)

A(n) ____ is the smallest computer that runs a traditional desktop operating system.

netbook

The is produced by the associated newspaper and contains current news stories from the publication.

new york times learning network

The website in the Sound Byte contains links to student opinion polls

new york times learning network

iOS and Android are ______ for tablets and smartphones.

operating systems

If you would like to get a security report about a website, you can click on the ________ icon when it is available.

padlock

Napster used ______ sharing to transfer files between users.

peer-to-peer

Google _____ is an online store delivering software for mobile devices.

play

The arrow, I-beam, or other symbol that shows the location or position of the mouse on your screen is the mouse

pointer

When using Yahoo! Mail, the Yahoo! Address Book is an example of a useful _______ window.

pop up

The _______ of a digital camera refers to the number of data points recorded for a captured image.

resolution

The ____ is the number of times that an analog wave is measured each second in an analog-to-digital conversion.

sampling rate

The global positioning system is a network of 21 ________ plus 3 working spares

satellites

A main difference between the tablet and the smartphone is the ________.

screen size

Podcasts allow time ________, which means that you can listen on your own schedule.

shifting

Text messaging is also called ________.

short message service (SMS)

You can activate this by pointing to an object and clicking the right mouse button

shortcut menu

An email ________ is a block of text that is automatically put at the end of your messages.

signature

________ is an example of asynchronous communication.

Email

Cellular networks offer faster data-transfer speed than WiFi offers

false

Instant messaging only allows you to talk to one person at a time.

false

LinkedIn allows you to chat with other people in real-time.

false

One disadvantage of using a chat room is that you cannot access it from a tablet or smartphone.

false

One way to stay current on a technology blog is to subscribe to the DNS feed for that blog.

false

Which of the following is NOT a video file extension?

.jpg

Which of the following is a social network?

Facebook

The Apple iPhone uses a version of Apple's _____ as its operating system.

OS X

The main technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is

E Ink and electronic ink

________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.

E-text

1. A simple drawing program included with Windows 7. 2. Displays the Start button and the name of any open documents; it may also display shortcut buttons for other programs. 3. Command at the bottom of the Start menu that takes you to all available programs on your computer. 4. To remove the window from the screen without closing it. 5. To increase the size of a window to fill the screen.

1. Paint 2. Taskbar 3. All Programs 4. Minimize 5. Maximize

1. The bar at the right side of a window that enables you to move up and down to view information that extends beyond the top and bottom of the screen. 2. The bar at the bottom of a window that enables you to move left and right to view information that extends beyond the left and right edges of the screen. 3. Move the mouse pointer while holding down the left mouse button, and then release at the appropriate time. 4. Work that you save and store on a drive, such as a Word document or a PowerPoint presentation. 5. A program that enables you to create and manage folders, and copy, move, sort, and delete files.

1. Vertical scroll bar 2. Horizontal scroll bar 3. Drag 4. File 5. Windows Explorer

Match each of the following terms to its description: (5 points) 1. VoIP 2. IM 3. chat room 4. synchronous 5. SMS

1. allows you to make phone calls over the Internet 2. messaging between two people that disappears when the session ends 3. where people who do not know each other, but have similar interests, can discuss topics 4. real-time communication 5. used for text messaging

Match each of the following terms to its definition: (5 points) 1. digital signal processor 2. mobile switching center 3. telephony 4. analog-to-digital converter 5. codec

1. compresses cell phone data for easy transmission 2. central location to which a base station transfers a cell phone service request 3. the use of equipment to provide voice communications over a distance 4. changes your voice's sound waves into digital signals 5. rule using hardware or software that compress audio and video information

Match each of the following terms to it's definition: (5 points) 1. MP3 2. PMP 3. MPEG-4 4. GPS 5. MMS

1. digital music file format 2. portable media player 3. digital video file format 4. uses satellites to locate a device 5. technology that allows the sending of text, sound, images, and video clips

Match the following sites to their content: (5 points) 1. How Stuff Works 2.New York Times Learning Network 3. Microsoft Office Training 4. Webopedia 5. Microsoft Support

1. explains the mechanics of items from computers to health equipment 2. includes lesson plans for a variety of subjects 3. contains webinars and videos on a variety of skills for applications like Excel 4. contains definitions of computer terms 5. has a feature that allows you to ask questions to a community of users

Match each of the following terms to its description: (5 points) 1. Cc: 2. Bcc: 3. To: 4. signature line 5. subject line

1. field used to include someone on the email but they are not the main recipient 2. field used to keep the recipients' email addresses private 3. field normally used to send an email to a friend 4. block of text automatically added to the end of an email message 5. describes the content of an email message

Match each of the following terms to its meaning: (5 points) 1. data mining 2. aggressive advertising 3. keystroke logger 4. pop-up blocker 5. tracking

1. gathers personal information about you 2. displays enticing information to tempt you to buy 3. records everything you type, like credit card numbers 4. utility to stop extra Internet windows from opening 5. records Internet surfing habits

Match each of the following terms to its definition: (5 points) 1. copyleft 2. sampling rate 3. tethering 4. e-text 5. digital rights management

1. granting of certain rights to a work while retaining other rights 2. number of times an analog wave is measured 3. connecting a computer to the Internet through a smartphone's cellular access 4. digitized text displayed by electronic devices 5. allows only limited use of legally purchased materials

Match each of the following terms to its definition: (5 points) 1. resolution 2. Bluetooth 3. analog 4. SMS 5. data plan

1. number of data points used to capture and image 2. uses radio wave to transmit data 3. continuous sound or light waves 4. text messaging 5. determines the cost and amount of data transfer for mobile devices

Match each of the following terms to its meaning: (5 points) 1. firewall 2. hacker 3. Trojan horse 4. router 5. virus

1. prevents intrusion into your computer 2. a person who poses a threat to your computer 3. software that controls your computer from another location 4. a potential hardware firewall 5. a small program that can compromise a computer system

Match each of the following terms to its definition: (5 points) 1. tablet PC 2. laptop 3. smartphone 4. e-reader 5. notebook

1. provides PIM capabilities, application software, and special handwriting and speech recognition capabilities 2. runs a traditional OS and is lightweight 3. combines computer functionality with telephony 4. device that can display e-text and has supporting tools, like note taking, bookmarks, and integrated dictionaries 5. all the capabilities of a desktop plus portability

The distance between two near field communication (NFC) devices is limited to about ________.

1.5 inches

1. The Windows 7 user interface that features a three-dimensional look, with transparent window frames, live previews of open windows, and multiple color schemes. 2. A program that captures a screen or part of a screen. 3. Displays information about the drive, folder, or file selected in the Content pane. 4. A set of instructions that coordinates the activities of your computer. 5. A computer interface that shows documents as they will look in their final form and uses icons to represent programs.

1.Windows Aero 2.Snipping Tool 3. Details pane 4. Operating system 5. Graphical user interface

SMS messages are limited to a maximum of ________ characters

160

In the United States, e-books account for about ________ of all book sales

20% to 30%

What is iOS?

An operating system for mobile devices

________ communication allows you to send a message to someone who is not online at the same time.

Asynchronous

Services that one business provides for another are called ________.

B2B

When you buy a textbook online from Amazon.com, you are participating is ________ e-commerce.

B2C

When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private.

Bcc:

Which of the following uses radio waves to transmit data signals over short distances?

Bluetooth

Which of the following is an example of a social bookmarking site?

Delicious

________ e-commerce allows anyone to sell or trade your items online

C2C

Which of the following is NOT a social news site?

CNN

Which of the following is NOT a Microsoft Support option

Call (800) MICROSOFT

If you want to move a file from one folder to another on the same drive, what would you do

Click and drag the file to the new folder.

How do you open a new Finder window in the Mac Snow Leopard operating system

Click the File menu and click New Finder Window.

How do you change the desktop background in the Mac Snow Leopard operating system

Click the System Preferences icon on the dock. Under Personal, click Desktop & Screen Saver

If you want to move a file to a different drive, what would you do

Click the file, press CTRL+X, click the new folder, and press CTRL+V

_______-based chats require you to install specific software in order to access them.

Client

________ allows only limited use of media that have been legally purchased

Digital rights management

How do you pin an application to the Start menu in Windows 7

Drag the application's icon from the desktop to the Start menu

________ is a service that allows you to place video phone calls to other users.

FaceTime

A keystroke logger allows hackers to take control of your computer

False

All pop-ups are malicious.

False

Computers with low-bandwidth connections are more susceptible to hackers

False

Windows Action Center can only be used to troubleshoot computer problems.

False

When you create a search folder, it displays in the Navigation pane under this category

Favorites

Two top-selling tablets are the iPad and the

Galaxy

A(n) ________ cable carries all audio and video information from devices to a connected TV.

HDMI

Which site has topics within the Computer category for hardware, peripherals, and security

How Stuff Works

Which site is divided into categories such as Science and Tech?

How Stuff Works

________ was designed to allow you to take and edit photos on a smartphone and upload them to the Web automatically.

Instagram

Which of the following is a method of synchronous online communication?

Instant Messaging

The desktop version of _______ has an option to turn its popup blocker off and on.

Internet Explorer and IE

Which of the following is NOT true about email?

It cannot be accessed by hackers.

Which of the following statements about VoIP is FALSE?

It is limited to contacting people in the United States.

The most common file types supported by digital cameras are raw uncompressed (RAW) data and

JPEG

Which of the following digital image formats compresses the image file?

JPEG

The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.

Kickstarter

________ is a business-centered social network that is designed for business connections.

LinkedIn

Which site offers webinars and videos on a variety of skills for applications like Microsoft Word and Access

Microsoft Office Training

Adware displays promotional items on user computers

True

Backdoor programs and zombies are used to launch denial-of-service attacks

True

The Windows 8.1 Troubleshooting Wizard detects problems and attempts to fix them.

True

________ is an example of a microblogging site that allows a limited number of characters in a post.

Tumblr

Many mobile devices include a micro ________ port

USB

_____is content created by people who are not professional writers or photographers.

User-generated content

1) Which site has easy-to-read overviews of a lot of technical information?

Webopedia

To find the meaning of an acronym like ROM, you would use ________.

Webopedia

Which site is like an online dictionary of computer terms

Webopedia

________ is an example of a social sharing site where anyone can share video that they create

YouTube

_________ can be used to launch denial-of-service attacks.

Zombies

Your mobile device files can be synchronized using

a cloud service

The three or four characters to the right of the period in a file name is called

a file extension

When using a cell phone, a(n) _____ converter chip changes your voice's sound waves into digital signals.

analog-to-digital and analog to digital

A(n) ________ chip converts sound waves from a voice into digital signal.

analog-to-digital converter

A(n) ________ converts your voice's sound waves into digital signals

analog-to-digital converter chip

All of the following can protect you from hackers EXCEPT ________.

antispam software

In a virtual community, you can communicate with other people by using a(n) ________.

avatar

Each cell in a cellular network is a geographic area centered on a(n) _______ station, which is a large communications tower.

base transceiver

Windows Firewall _

blocks unwanted intrusions

A(n) _______ is used to ensure that you are a human creating a new email account and not a computer.

captcha

When you set up a new email account, you may have to enter a distorted series of letters and numbers, called a ________, to ensure that you are a human and not a computer.

captcha

A(n) ______ is a rule that squeezes the same audio and video information into less space

codec and compression/decompression

Wikis are designed for ________, allowing people to contribute more than just posting a response.

collaboration

If you have a LinkedIn account, you will have _____ instead of friends.

connections

_____ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.

copyleft

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.

crowdsourcing

An Internet connectivity plan is also known as a ________ plan

data

The practice of advertisers using software that tracks personal information about you is called ________.

data mining

Internet connectivity plans are usually known as

data plans

The working area of the Windows 7 screen—consisting of program icons, a taskbar, a Start button, and gadgets—is the

desktop

The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.

digital convergence

All of the information that someone can find out about you by searching the web is called your ________.

digital footprint

All of the following are advantages of VoIP EXCEPT ________.

excellent reliability during Internet or power outages

A viral video is one that can infect your computer with malware.

false

Academic research projects are encouraged to use Wikipedia since the information available on any topic has been edited by professionals for accuracy.

false

All of the email programs available today allow you to include images.

false

All of the posts that you make to Twitter are public, meaning that you cannot restrict anyone from seeing them.

false

Any email that you send is private, and it cannot be read by anyone other than the person to whom it is addressed.

false

Facebook, which is a(n) ______ , is an online community that allows you to keep in touch with friends and family through chat and posted messages.

social network

The purpose of a firewall is to ________.

stop computers that are connected to the Internet from being attractive to hackers

Email sends electronic messages using ________ technology.

store-and-forward

SMS delivers messages to the appropriate mobile device using __________ technology

store-and-forward

About.com is an example of a(n) ________ search engine

subject-oriented

Making sure the data on two devices are the same is referred to as _________ .

synchronizing

All of the following are included in the Security category of the Windows Action Center, EXCEPT ________

system backup

A conversation that takes place on a discussion board is called a ________.

thread

A social bookmarking site allows you to share your bookmarks with others online.

true

An advantage to using a webmail interface is that your email is available to you from anywhere whenever you are online.

true

Businesses have started to use instant messaging tools to help provide customer support.

true

DRM-free music can legally be moved from system to system

true

If you have a webcam, VoIP allows you to video chat with a friend in Europe.

true

In a virtual world, you can select an avatar is a virtual body.

true

Inexpensive phones with modest processors and simple interfaces are called feature phones.

true

It is a good idea to obtain an email account that is not tied to your ISP, so that when you change service providers you won't lose your email account.

true

Most forums require you to create an account if you want to post to a discussion board.

true

One example of a B2B service is web hosting

true

One way to access email is to read it online through a webmail interface

true

Social news sites allow some content to be submitted by users

true

Synchronous online communication happens in real-time with two or more people online at the same time.

true

When you send an email to your professor, a server holds on to that email until the professor requests it.

true

Windows includes a software firewall

true

You should be wary about entering your credit card number into a website whose URL does not begin with https because they are not using any security.

true


Ensembles d'études connexes

45 - week 4 - Algebra 1 pg. 33- 45

View Set

Неврологія задачі

View Set

California: Real Estate Principles - Chapter 16

View Set

Principles of Leadership FINAL - True/False

View Set