Technology Review-Computer Concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?

"https" as the protocol in the URL

If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?

'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.

If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?

.mobi

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?

Because he is using the same name, each time he saves he is overwriting his previous work.

How are the ways AI learns similar to how you learn?

Both use past experiences to predict likely outcomes and responses.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

What does a B2C website use to track the items you select on the website?

cookies

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?

database

Which of the following is NOT a factor search engines consider when ranking search results?

design quality of the webpage

Which of the following can you run to find and remove unnecessary files?

disk cleanup utility

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

What should you do the first time you save a file?

name the file

What types of activities are ideal for a robot to perform?

repetitive tasks

Local applications can be accessed only on the computers on which they are installed.

true

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

virtual reality (VR)

When does the boot process start?

when you turn on your computer

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

Change font size, style, and color of the keywords.

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

It should have responsive design so that it is easy to use on mobile devices.

Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

JPEG

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Which of the following would be considered a professional networking website?

LinkedIn

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

If you delete a shortcut from your desktop, have you also deleted the original file?

No, because a shortcut does not place the actual file, folder, or app on the desktop.

Which of the following indicates a website is NOT secure?

The URL of the website begins with http.

Kay is researching the health benefits of avocados. She finds an article on the website tracyshealthproducts.com. Which of the following can assure Kay that the content is credible?

The article's author has been a nutritionist for the last three years.

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?

Transfer contents to an external storage device.

What is the most common type of storage device for transferring files from one computer to another?

USB flash drive

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?

Use sleep modes and other power management features for computers and devices.

Which of the following is not an advantage of saving documents in the cloud?

You can access the documents when you are not connected to the Internet.

Which of the following is an advantage to saving a file to a flash drive?

You can take it with you and then work on it on another computer.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

Which of the following is NOT likely to be found on a webpage?

a formatting toolbar

Technology can lead to all of the following behavioral risks EXCEPT _____.

a sedentary lifestyle

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

artificial intelligence (AI)

_____ ensures that the person requesting access to a computer is not an imposter.

authentication

Which of these is an optical medium of storage?

blue-ray disc

In a web app, where is data usually stored?

cloud storage

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

create a database of company projects, customers and vendors

What would a password manager allow you to do?

create and store multiple strong passwords

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?

digital forensics

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

drawing app

Which of the following does a secure website use to safeguard transmitted information?

encryption

A joystick is a pen-type input device used to draw and tap icons.

false

Before you can open and edit a compressed file, you need to zip it.

false

Big data is processed using relational databases.

false

Haven runs an online bridal store called Haven Bridals. Her website is encrypted and uses a digital certificate. The website address for the store is http://www.havenbridals.com.

false

The Close button reduces a window so that it only appears as a button on the taskbar.

false

To prevent a laptop from being stolen, you can use a surge protector.

false

In Windows, you use _____ to reorder, move, and navigate between folders.

file explorer

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover?

graphics app

Which of these hardware components can you use to store videos?

hard drive

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page?

in the header

In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.

information technology

Which technology device could be used to view a patient's internal organs?

ingestible camera

Digital information processed into a useful form is called _____.

input

_____ is data and instructions entered into the memory of a device.

input

What is the recommended solution if a computer performs slowly?

install additional RAM

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.

intellectual property rights

Where on a computer is the operating system generally stored?

internal hard drive

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?

main window

What are "hits" that search engines list on the first page?

most relevant results

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

What is the binary system?

number system with two digits, 0 and 1

What is the most common type of volatile memory?

random access memory (RAM)

Why is it not safe to connect to public Wi-Fi networks?

rarely protected

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

research spoofing

Which of the following is the science that combines technology and engineering?

robotics

Which of the following helps you more easily locate the files and folders you need?

saving all your files to the desktop

In which of the following situations is a digital certificate useful?

signing a rental lease

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?

slide master

Which of the following types of websites typically provides the least security?

social media sites

Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends?

social networking website

A _____ is a named collection of formats you apply to text in a word processing document.

style

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?

tablet

_____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

the digital divide

Why do companies use online collaborative productivity software?

to allow employees to share, edit, and comment on documents

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

A CPU converts the data entered through the keyboard into output displayed on the monitor.

true

A specialty search engine lets you search online information sources that general search engines do not always access.

true

An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from home.

true

An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing.

true

E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.

true

Each slide in a presentation has a layout that includes placeholders for certain types of content.

true

In Windows, the only way to copy or move files is to use the Clipboard.

true

It is advised to fully charge the battery of a laptop before using it for the first time.

true

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.

true

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

Which of the following is a necessary step in maintaining computer hardware?

using a UPS or surge processor

Which of the following is classified as input device?

webcam

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?

what-if analysis

Compressing a file is also called _____ the file.

zipping


Ensembles d'études connexes

Chapter 6 - Personal Auto Policy

View Set

8/B - QUOTATIONS IN ACADEMIC WRITING

View Set

Longitude and Latitude TEST for History

View Set

Dynamic Earth: Continental Drift

View Set