Technology Review-Computer Concepts
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
"https" as the protocol in the URL
If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?
'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.
If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
.mobi
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?
Because he is using the same name, each time he saves he is overwriting his previous work.
How are the ways AI learns similar to how you learn?
Both use past experiences to predict likely outcomes and responses.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
What does a B2C website use to track the items you select on the website?
cookies
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
Which of the following is NOT a factor search engines consider when ranking search results?
design quality of the webpage
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
What should you do the first time you save a file?
name the file
What types of activities are ideal for a robot to perform?
repetitive tasks
Local applications can be accessed only on the computers on which they are installed.
true
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
virtual reality (VR)
When does the boot process start?
when you turn on your computer
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
Change font size, style, and color of the keywords.
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
JPEG
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following would be considered a professional networking website?
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
If you delete a shortcut from your desktop, have you also deleted the original file?
No, because a shortcut does not place the actual file, folder, or app on the desktop.
Which of the following indicates a website is NOT secure?
The URL of the website begins with http.
Kay is researching the health benefits of avocados. She finds an article on the website tracyshealthproducts.com. Which of the following can assure Kay that the content is credible?
The article's author has been a nutritionist for the last three years.
To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?
Transfer contents to an external storage device.
What is the most common type of storage device for transferring files from one computer to another?
USB flash drive
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?
Use sleep modes and other power management features for computers and devices.
Which of the following is not an advantage of saving documents in the cloud?
You can access the documents when you are not connected to the Internet.
Which of the following is an advantage to saving a file to a flash drive?
You can take it with you and then work on it on another computer.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser.
Which of the following is NOT likely to be found on a webpage?
a formatting toolbar
Technology can lead to all of the following behavioral risks EXCEPT _____.
a sedentary lifestyle
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
_____ ensures that the person requesting access to a computer is not an imposter.
authentication
Which of these is an optical medium of storage?
blue-ray disc
In a web app, where is data usually stored?
cloud storage
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
create a database of company projects, customers and vendors
What would a password manager allow you to do?
create and store multiple strong passwords
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?
digital forensics
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
drawing app
Which of the following does a secure website use to safeguard transmitted information?
encryption
A joystick is a pen-type input device used to draw and tap icons.
false
Before you can open and edit a compressed file, you need to zip it.
false
Big data is processed using relational databases.
false
Haven runs an online bridal store called Haven Bridals. Her website is encrypted and uses a digital certificate. The website address for the store is http://www.havenbridals.com.
false
The Close button reduces a window so that it only appears as a button on the taskbar.
false
To prevent a laptop from being stolen, you can use a surge protector.
false
In Windows, you use _____ to reorder, move, and navigate between folders.
file explorer
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover?
graphics app
Which of these hardware components can you use to store videos?
hard drive
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page?
in the header
In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.
information technology
Which technology device could be used to view a patient's internal organs?
ingestible camera
Digital information processed into a useful form is called _____.
input
_____ is data and instructions entered into the memory of a device.
input
What is the recommended solution if a computer performs slowly?
install additional RAM
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.
intellectual property rights
Where on a computer is the operating system generally stored?
internal hard drive
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
main window
What are "hits" that search engines list on the first page?
most relevant results
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
What is the binary system?
number system with two digits, 0 and 1
What is the most common type of volatile memory?
random access memory (RAM)
Why is it not safe to connect to public Wi-Fi networks?
rarely protected
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
research spoofing
Which of the following is the science that combines technology and engineering?
robotics
Which of the following helps you more easily locate the files and folders you need?
saving all your files to the desktop
In which of the following situations is a digital certificate useful?
signing a rental lease
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
slide master
Which of the following types of websites typically provides the least security?
social media sites
Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends?
social networking website
A _____ is a named collection of formats you apply to text in a word processing document.
style
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
tablet
_____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
the digital divide
Why do companies use online collaborative productivity software?
to allow employees to share, edit, and comment on documents
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
A CPU converts the data entered through the keyboard into output displayed on the monitor.
true
A specialty search engine lets you search online information sources that general search engines do not always access.
true
An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from home.
true
An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing.
true
E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.
true
Each slide in a presentation has a layout that includes placeholders for certain types of content.
true
In Windows, the only way to copy or move files is to use the Clipboard.
true
It is advised to fully charge the battery of a laptop before using it for the first time.
true
Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.
true
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
Which of the following is a necessary step in maintaining computer hardware?
using a UPS or surge processor
Which of the following is classified as input device?
webcam
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?
what-if analysis
Compressing a file is also called _____ the file.
zipping