Computer questions to study
Business e-mail etiquette
- profesisonsalim- remember your correspondence represents your organization -negative news is best given face to face -email can be misinterpreted-phone call might be better -remain formal-highest level of courtesy -avoid jargon or text style shortcuts -keep attachment call small
Popular platform
- windows operating system (OS)- most common for personal computers -macOS-used on apple computers -android OS- most common smartphone OS worldwide -iOS- OS used on iPhones, most common smartphone OS in the US
History of the macOS
-2001, apple related first version of its Mac, operating system (OS) known as OS X "Cheetah" based on UNIX architecture -2012, each of the OS was named after fast and agile cat -2013 apple related OS X 10.9 "Mavericks", its a well know surfing spot in northern California
*Describe black hat hackers
-Access computer systems with the intent of causing damage or stealing data -also known as hackers or crackers -Motivation is usually personal or financial gain - can also e involved in cyber espionage, protest or may be addicted to thrill of hacking devices -Richard stall man invention definition to express maliciousness of criminal hacker vs white hat hacker who performs hacking duties to identify places to repair
Viruses can infect a digital device in several ways including
-By opening an infected email attachment -By downloading an infected file from the internet -By sharing an infected file -By visiting a contaminated website -Disguised as images, audio, video files -By inserting or connecting an infected disk, disc, or drive -By not running or maintaining your antivirus program
Ethical issues with social media
-Every time you search for information on the web, post a social media site, or make online purchases you actions are being recorded -every action you take leaves a cyber/digital footprint -data benefits marketers, businesses and entity that tracks online behavior -consumers have little(or not) control over what data are collected or used -information being collected by websites like google, apple, Facebook, twitter, instagram, Facebook and thousand more companies
Windows, Apple, and Android constantly vie for market share
-Microsoft Windows-69..81% -macOS- 19.95% -chrome OS-6.58% -linux OS-1.32%
Software License
-a legal document that governs the use or redistribution of software -in the US under copyrighted law all registered software is copyright protected, in both source cod and object code forms (except open source public domains software) -typical software license grant the license (or end user)the right to one or more copies of software
Describe trojans
-a program that appears legitimate but executes an unwanted activity when activated -similar to viruses but don't replicate themselves and are often found attached to free downloads and apps -commonly used by cyberthevies and hackers to gain unauthorized access to a user's device or systems -often used to find passwords, destroy data, or bypass firewalls
According to the CIA Triad, in which of the following examples is an organization ensuring data integrity? A) During an acquisition, logistics data are secure transferred to the acquiring company's servers B) Access to important data is limited so that only certain employees are able to modify that data C) A company has a long standing policy to disable the user names and password for executives after their employment has ended, but not for lower level employees who have left the company
A and B
Select what true regarding all in one computers: A) All in one computers house every component except the keyboard and mouse inside the same case as the monitor B) All in one computers are designed to be highly mobile so that they can be used by people on the go C) All in one computers are hinged computers D) An all in one computer is a stationery device with a separate keyboard and mouse
A and D
Which of the listed programs are used to create documents, basic webpages and desktop publishing? A)Microsoft Word B) Microsoft notepad C) Microsoft Excel D) Microsoft publisher
A) Microsoft Word
Select what as true regarding uninstalling software: A) Uninstalling system software is not recommended B) Be cautious when uninstalling software from the OS manufacturer C) Be cautious when uninstalling software from the computer manufacturer D) You can uninstall any program that comes with your computer without causing an impact on performance
A, B, C
Which of the following should you consider when buying a new computer? A) What is the cost B) Does it have HDMI ports C) Does it have an SD card slot D) Does it come with Windows XP
A, B, C
Which are important considerations when purchasing a new computer? A) what is it's price B) How much RAM does it come with C) Does it come with windows NT D) Does the device have USB ports
A, B, D
Which of the following should both consider when buying a new computer? A) Does it have an SD card slot B) Does it come with windows 10 C) What is the size of the RAM D) What is the cost
A,C,D
What is the right order of the operations in Microsoft Excel lowest to highest Parenthesis Exponent Division Addition
Addition, Division, Exponent, Parenthesis
Cyberattacks are the following two types
Attacks where goal is to disable target's computer or disrupt network activity Attacks where the goal is to get unauthorized access to the targets computer data
A two-in-one computer combines a tablet with a detachable __________ to make a relatively powerful, yet mobile computer A) Printer B) Keyboard C) Motherboard D) Mouse
B
What is the alert for a grammar error A) Red double underlines B) Blue double underlines C) Green sine underline D) Blue wavy underlines
B
Select the reason you might purchase a tablet computer A) You need a computer that you can use while walking B) You need a highly mobile computer that works well for reading ebooks or for online gaming C) You need a computer you can easily upgrade with additional memory of RAM D) You need a computer with a large amount of storage
B and C
Which of the following is not a presentation software term? A) Speaker notes B) Speaker image C) Slide D) Slide master
B) Speaker image
Variety of cookie settings that can be adjusted in google chrome including
Blocking/allowing cookies by default Deleing cookies Making exceptions for cookies form specific websites or domains
The following are all true for instagram except A) Instagram is a photo sharing app that is available for download to a variety of digital devices B) according to instagram "Instagram is a fun and quirky way to share your life with friends through a series of pictures C) Instagram charges a fee to download the app D) If you specify a location with your photo you can opt to have instagram check you in a foursquare
C
What mange's hardware and software, supports the computer's basic functions and runs programs: A) RAM B) RDM C) operating system D) biOS
C
All of the following are common ports that are included with laptop computers except A) Ethernet ports B) HDMI ports C) MIDI ports D) USB ports
C) MIDI ports
Which of the following might be risky to uninstall from a windows PC laptop? A) Cisco WebEx meetings B) Apple software update C) Microsoft work 6-9 converter D) Angry birds
C) Microsoft work 6-9 converter
CIA Triad and Integrity
Covers methods used for confirming data are authentic, accurate, and protected from modifications by unauthorized users, it helps to ensure data and information have not been changed in an unauthorized way and that the source of the information is authentic
Devices which house every component except the keyboard and mouse inside the same case as the monitor are called _________ computers A) Laptop B) Desktop C) Mainframe D) All-in-one
D
What manages hardware and software, supports the computer's basic functions, and runs programs? A) RAM B) BIOS C) ROM D) Operating system
D
Which of the listed programs are used for creating documents, basic web pages, and desktop publishing A) Microsoft publisher B) Microsoft Excel C) Microsoft Notepad D) Microsoft Word
D
All new laptop computers come with optical disk installed: true or false
False
Assets are
Information Software Hardware
Fee-based versus free antivirus software
Main difference is number of features. Fee base software usually comes with identity theft protections, firewalls, parental controls, tech support Most free antivirus programs performed almost as effectively as their fee based software
What is the correct order to steps to use when uninstalling a program in Windows 10 using the search features? Click settings Select Apps & features Select a program you wish to uninstall Open to start menu Click system on the settings menu
Open the start menu, click settings, click system on the settings menu, select apps & features, select a program you wish to uninstall
Cyberattack include the following
Pharming and phishing Spamming anf spoofing Spyware Trojan and viruses Identify and information theft Denial service (DoS) and distribution denial of service (DDoS) attack
How much RAM (memory) will your computer need?
RAM=random access memory -more multitasking=more memory required -laptop and desktop computers range from 4GB to 16GB of RAM -most new smartphones range from 1GB to over 4GB of RAM -to save money is to purchase a computer that has an expandable memory then add RAM as needed
Types of software license
Software licenses: end user license agreement Single-user license: restricts the use of the software to one user at a time Network license: allow anyone on a network the right to use the software Site license: similar to network licenses but the software is installed on the device that qualifies users in an organization
Craigslist and e-bay belong to the C2C category of e-commerce True or false
True
Installing programs on a computer with macOS
You can install software to Mac computer via internet or optical disc (if Mac has an optical drive)
How many firewall app do you need?
You only need one firewall app on your personal computer (PC) having more can cause conics and problems. Microsoft Windows and Mac OS X operating systems include firewall software
Types of cybersecurity threats
an event or condition that has the potential for causing asset loss and consequences or impact from such loss
*Firewall options
application that excites tasks different from those executed by antivirus or anti malware apps Helps protect against worms and hackers; antivirus apps help protect against viruses Anti-malware apps protect against malware Need all three in order to be fully protected
How do computer viruses work?
computer virus attacks a digital device using series of actions -virus arrives via email attachment, fire download or when user visits website that has been infected -action such as running or opening an infected file activates the virus -once activated virus copies itself into files and other locations on computers -next infection spreads to other computers via infected email, files, or contact with infected websites -finally the payload or competent of a virus that executes the malicious activity hits the computer and other infected devices They repeat over and turn in full-blown virus attack
Explain intellectual property/categories
consist of human knowledge and idea that are protected by law against unauthorized use by others -consists of four categories: patent, trademark, copyrights, and trade secrets -protects against unauthorized use, sal, or distribution of software, music, movies, video games, and many other digital products
Trojans can be used to
delete, block, copy, and modify data Disrupt computer performance
Describe hackers and what they are involved in
hackers attempt to gain unauthorized access to networks via hacking to steal and corrupt information and data Hacking refers to activities that seek compromise the security of digital devices such as laptop computers, smartphones, tablet, and entire networks Most hackers are involved in unlawful activities (cybercrime) and are motivated by financial gain, protest, information gathering (spying) and even just for challenge of hacking a system
Cybersecurity exploits/ what exploits
identification of system vulnerability uses vulnerability to carry out malicious activity Exploits is which a system vulnerability can be used by a hacker to execute malicious activity on a system
What do cybersecurity exploits do?
include specific codes, command sequences, open source exploit kits designed to take advantage of software vulnerability or flaw in system security Allow for intruder to remotely access a network to gain unwarranted privileges to move deeper into the organization's network
Types of asset loss
intentional, unintentional, accidental, incidental, misuse, abuse, error, weakness, defect, fault or failure event, and associated conditions
Causes of asset loss
specific cause of asset loss arise from a variety of situations and event to adversity, which are referred to as distribution, hazards, or threats
Describe cyberterrorists
uses computer and internet to laugh attack against computer systems for political and ideological reasons Attack include distribution of e-commerce and government sites The power gird and public utilities have also been targeted
windows operating system
windows is owned by the Microsoft Corporation. windows 10, the latest version, includes a digital assistant called Cortona
Attaching a file to an outlook message
you can attach variety of files to an outlook message including documents, files, images, and video 1. vist outlook and login 2.create new message 3.click attach file 4.navigate to desire file 5.select the desired file 6.click inter or attack as copy -file should now be attached to the message
Installing programs on a computer with macOS
you can instal software to a Mac computer via the internet or from an optical dic (if Mac device has an optical drive)
*Autonomous virus killing robots
-according to intel-AI powered robot named violet, is being tested for disinfecting contaminated surfaces using UV light -7inch robot with humanoid appearance that was developed by Akara, an Irish startup that specializes in designing artificially intelligent helpers for healthcare industry -uses Intel, Movidius, Myriad, X vision processing unit (VPU)to navigate safetly around people while disinfecting hospitals surfaces -a VPU is a specific type of microprocessor that was developed to accelerate machine and artificial intelligence technologies -similar to video processing unit that's used for graphic processing -uses ultraviolet light to sanitize (destroying bacteria and viruses)
Pros of online dating
-allows wide variety of people -good for shy people -you can get intimate contact without meeting in person
Productivity software
-applications that allow users to work more efficiently -traditional productivity apps include Microsoft Office and the other business apps Two categories: -apps designed for use by individuals(MS office, google docs, iWork, quicken -apps designed for businesses(quickbooks, sage HRMS, inside salebox,etc
Smart medical imaging software
-being developed by IBM that will be used for assisting radiologist in interpreting medical images such as CT scans -software named Avicenna -takes information from a patient's medical record as well as information/images from medical scan to suggest possible diagnosis's and treatments -intended to be used by doctors to speed up workflow and reduce diagnosis error
*Describe how a virus infects a computer
-computer virus is a type of harmful computer code or computer program that's written to change the way a computer operates -designed to spread from one digital device to another -viruses operate by introducing or attaching itself to a legitimate program or document in order to spread its malicious code
Role of data analysis
-data analysis used data to gain information -collects data for entry into database -interprets information provided by database -creates report for senior management -most data analysis have associated degree or higher in IT or strong skills with spreadsheets and databases
Tools that can be used to ensure data integrity include
-data backup -checksum- sequence of letter and numbers that is use to check for errors -data correction codes -availability of information
How to diagnose a hacker system and signs
-digital device hacking has become so common that almost everyone has to deal with it at least once in their lives -some signs of a system or device has been hacked: -fake antivirus message- noticed messages, power down your computer and root boot in safe mode, in safe mode run you antivirus program -unwanted browser toolbars -frequent random pop ups -fake emails or social media messages from your account smartphones and tablets can be hacked, so protect these devices
Finger reader
-finger reader assists visually impaired to access printed text -it can also be used for language translation -the device's camera point down from the finger -currently connects to android devices but is in development stage
*Linux operating system
-free and open source software that can be used and modified by anyone without legal protection -most common OS on servers, mainframes, and supercomputers -underlying OS for most video game consoles and embedded computers as well as the underlying software for the Android OS -only a very small percentage of personal computers use Linux OS
Advantages of Linux OS
-free to download and use -less susceptible to viruses -modifiable by users
Smart contact lens for diabetics
-google and Novartis international global healthcare company teamed up to create a wearable smart contact lens that can help patients with diabetes in measuring their glucose level - lens have embedded ultra-slim microchip as well as small antenna -microchip processes information about glucose levels from the user's tears and sends that information via antenna to smartphone -testing was supposed to start 2016 but has been delayed -smart contact lens can also help those with variety of eye problems
What screen size do you need?
-important to determine what screen size best suits you need -may be best to visit computer retire to help you decide -the larger the screen size, the larger the device -larger screens make it easier to edit text or images -if you plan on watching video, consider a device with a high resolution display
Installing programs in windows 10
-in windows 10 you can install software by downloading it from the internet or using an optical disk -once you have found the program you want click download, once program is downloaded, click open or run to install the program -most common way to download software is from the internet
Role of an IS program manager
-information systems (IS) also known as information technology (IT) program manager -supervise and directs an organization's IS technicians -works with developers and senior management to procure and implement IS processes -develops training plans and policies for IS -most have program managers have bachelors degree or higher in IT, experiences as an IS technician
Installing software
-installing is loading software -includes adding hardware and associated drivers -installing allows you to maximize your computers productivity -may need to install variety of software on new device to maximize its use
The macOS
-known for great graphics capabilities -industry standard for photo editing, film/movie development, graphic design,etc -Hollywood loves apple! -macOS has a reputation for easy use
Strength of windows OS
-most popular OS worldwide -used by most businesses and government agencies -highest selection of app -many manufactures=more competition=less expensive
disadvantages of macOS
-not widely used as personal computer(PC) or windows -generally cost more than comparable PC'S -only use Apply proprietary or licensed software
weaknesses of windows OS
-often considered not as intuitive as Apple products -possibly more prone to viruses -constantly revised and updated
Cons of online dating
-profiles can be faked or enhanced - are they really who they say they are? -focuses more on physical attractiveness attractivness
Identify factors that damage computer hardware
-protecting a digital device from power surge: lightning or other large electrical input can destroy electronics, use surge suppressor and unplug electronics when violent thunderstorms are imminent -protecting a digital device from overheating: heat can damage a digital device, important to ensure air can properly circulate through system unit of device. phons and tablets shouldn't be left out in sun or in hot spaces -protecting digital device from humidity: humidity can negatively impact the performance of a digital device. Its a good idea to let digital device acclimate to an environment before turning it off -protecting a digital device from magnetic fields: magnetic fields can influence the flow of electricity in a digital device and impact a computer's hard drive. Minimize exposure of digital device to magnetic fields
System software
-provides structure and control necessary to run the computer and its peripheral devices -two major components of system software; operating system and utility software
Advantages of macOS
-relatively few viruses -outstanding graphics capabilities -attractive design
*Projective capacitive (Pro-Cap) touchscreen
-sensor grid sandwiched between two glass layers -allows two finger gestures -voltage applied to the screen -finger draws a small amount of electrical current (creates a ground) that screen's sensor detects
Describe computer viruses
-software that infects computer and is created using computer codes -computer viruses typically have to be "run" to attack and do damage -viruses can destroy programs or alter computer or network -have ability to replicate themselves -computer viruses cannot reproduce and spread without proper programming such as that contaminated in a file or document
Discuss Internet piracy
-stealing of copyrighted software -software piracy occurs when copyrighted software is illegally copied, distributed, modified, or sold over the internet this is direct infringement/illegal \ -studies show that consumers spend $25 billion and waste 1.2 billion hours per year as result of downloading pirated software -companies spend $750 billion on issue relating to pirated software
Disadvantages of Linux OS
-steep learning curve -compatibility issues with some programs
How to chose the amount of storage your computer needs
-storage=size of computer's hard drive -typical laptop hard drive=500GB to 1TB -typical tablet hard drive=16-256GB -SD movies=1-2GB, HD movie=3-5GB -Solid-state hard drives tend to be smaller and more expensive, they also much faster and require less energy providing longer battery life -don't overspend computer's storage you can always stop files on the cloud or on flash drives
What is resolution?
-the number of horizontal and vertical pixels on a display screen -clarity of an image -measured in lines of pixels -more pixels=higher resolution -color depth=amount of data(number of transistors)supporting each individual pixel
What is a touchscreen
-touchscreens are sensitive to the touch of a finger or stylus -touchscreens are included in devices such as phones, tablets, laptops -used at ATMs and point of sale terminals -touchscreen come in a few different categories one for phones, tablet, laptops is the projective pro capacitive (Pro-Cap)
Uninstalling software
-uninstalling=removing software -may want to uninstall some software you don't need -removing unwanted software clears hard drive space
*Optical drives
-used in DVD,Blu-ray, and CD players -a type of computer drive that writes and reads data using laser -work by rotating an inserted disc - speed measured in revolutions per minute(RPM) of the spinning disc -actual discs=optical media -opical drives retire large amount of space and uses more electricity (battery life) than solid state drive so many laptops don't come with one
other considerations when purchasing a computer
-what is the advertised battery life? -how many universal serial bus(USB) port does it have? -does it have high definition multimedia interface (HDMI) ports? HDMI ports can be good when wanting to display prevention on a TV -does it have an SD slot? secure digital (SD) card cslots are great for those who use digital cameras
What questions must be addressed when choosing a computer?
-what type of device? mobile? stationery? -what is its primary use? school? correspondence? gaming? multipurpose? -how much do you have to spend? is it in your price range? does it have a solid state hard drive(SSD) also called flash storage, is after but more expensive than traditional hard drive -(most student use windows OS since laptops provide portability and windows is used in businesses
A terabyte equals approximately one________ bytes? A) Trillion B) Thousand C) Billio D) Million
A
Which of the following is a strength of the Linux platform? A) Free to download and use B) Less susceptible to viruses than Mac OS C) Most widely used OS in desktops and laptops D) Most widely used OS in smartphones and tablets
A