computers test 3
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____. a.digital signature b.business report c.data report d.digital quotient
a
An employee using an office computer to check personal emails is an example of _____. a.unauthorized use b.legitimate access c.hacking d.fair use
a
Identify a protocol that is used to retrieve emails. a.Post Office Protocol (POP3) b.File Transfer Protocol (FTP) c.Simple Mail Transfer Protocol (SMTP) d.Address Resolution Protocol (ARP)
a
Identify how wireless networks differ from wired networks. a.Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. b.Unlike wired networks, wireless networks can be accessed only when they are connected to the home network. c.Unlike wired networks, wireless networks tend to be faster and more secure. d.Unlike wired networks, wireless networks physically connect the computers and other devices on the network.
a
When you share a computer, to ensure that no one else who uses that computer has access to your files, you should _____ before shutting down the system. a.sign out of Windows 10 b.move all files to the root directory c.copy all files to the root directory d.connect the system to another Windows 10 device
a
Which of the following is an advantage of Internet Protocol Version 6 (IPv6) and is not available in Internet Protocol Version 4 (IPv4)? a.In IPv6, all devices in a home or business are accessible on the Internet directly by their own Internet Protocol (IP) address. b.IPv6 uses 32-bit addresses, which allows for 232 possible unique addresses. c.In IPv6, the router always recalculates a checksum when header fields are altered, such as time to live (TTL) or hop limit. d.IPv6 addresses can be used for television and radio broadcasting.
a
Which of the following is true of Microsoft Edge? a.While typing Web addresses, there is no need to type www. b.The start page appears when the domain name and top-level domain of a Web site are typed. c.The home page is the start page in Edge. d.Web addresses are always case-sensitive and are typed in either uppercase or lowercase letters.
a
Which of the following provides leadership in addressing issues that may impact the future of the Internet? a.The Internet Society b.The Internet Standards Process c.The Internet Archive d.The World Wide Web Consortium (W3C)
a
Which of the following statements are true of Internet2? a.It is the first national network to use 100 Gigabit Ethernet over its entire footprint. b.It supports only low bandwidth applications. c.It initially connected four supercomputers. d.It uses low-performance networks which can link only 200 member institutions to deploy and test new network applications and technologies.
a
Which of the following statements is true of Wi-Fi (802.11)? a.Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. b.The speed of a Wi-Fi network is independent of the number of solid objects between the access point and the computer or other device being used. c.Wi-Fi is designed for low-range data transfers—typically between 10 and 30 feet indoors and 30 to 90 feet outdoors. d.The speed of a Wi-Fi network is independent of the Wi-Fi standard being used.
a
Which of the following statements is true of a network adapter? a.It needs to support the type of cabling or signals being used. b.It prevents the conversion of signals from digital to analog, and vice versa. c.It is independent of the type of Internet access being used. d.It is built into a device as a bridged card.
a
Which of the following statements is true of a newly created compressed folder? a.It appears in the same folder as the files and folders you compressed. b.It takes an auto-set temporary name that only the administrator of the system can change. c.A compressed folder cannot be uncompressed. d.A compressed folder occupies more space than its uncompressed version.
a
Which of the following statements is true of a pointer? a.It changes shape depending on its location on the screen. b.It is a box that displays information about an item. c.It appears on the screen even if you use a touchscreen device. d.It restricts a user from opening multiple tabs or task panels at a time.
a
Which of the following statements is true of the Transmission Control Protocol (TCP)? a.It is faster than the User Data Protocol (UDP). b.It is responsible for the delivery of data. c.It is used in broadcast and multicast connections. d.It does not allow users to create block boundaries.
a
____ occurs when someone obtains enough information about a person to be able to masquerade as that person. a.Identity theft b.Phishing c.Pharming d.Data theft
a
_____ a file places it in a new location but does not remove it from its current location. a.Copying b.Shifting c.Altering d.Transforming
a
_____ is an example of an online payment service. a.PayPal b.Fotki c.E-portfolio d.Vonage
a
_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers. a.Phishing b.Smishing c.Vishing d.Pharming
a
_____ occurs when an online buyer receives the proper items but falsely claims that they never arrived. a.Online auction fraud b.Online domain poisoning c.Online pharming d.Online media hack
a
in File Explorer windows, Windows displays a(n) _____ on the folder icon of compressed folders. a.zipper b.arrowhead c.ampersand d.lock
a
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access. a.proxy b.virus c.digital signature d.firewall
b
According to the online version of the Merriam-Webster Dictionary, the term _____ means "to steal and pass off the ideas or words of another as one's own." a.journalism b.plagiarize c.dualism d.peptonize
b
Facebook is an example of a(n) _____. a.e-learning platform b.social networking site c.Webinar d.wiki
b
Fast Ethernet has a maximum speed of _____. a.400 Gbps b.100 Mbps c.40 Mbps d.10 Gbps
b
In the context of networking hardware, which of the following is true of wired networks that have a central device called a hub? a.The network breaks down the data at the sender's end and then reassembles it at the receiver's end. b.The bandwidth of the network is shared. c.The network forwards the data only to the intended receiver. d.The network is extremely efficient.
b
Rihanna owns a publication in New Jersey. She uses a Web-based software, Open Journals, to manage her publication works. She often downloads many Web-based applications needed for her work. Here, _____ are the companies that distribute Web-based software facilities to Rihanna over the Internet. a.Interface providers b.Application service providers c.Payment solution providers d.Legacy utility providers
b
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network. a.hotspots b.encryption c.viewports d.wireframes
b
The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception. a.Do Not Call Implementation Act b.U.S. SAFE WEB Act of 2006 c.PROTECT Act of 2003 d.Real WEB ID Act
b
The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies. a.Computer Fraud and Abuse Act b.Homeland Security Act c.American Recovery and Reinvestment Act d.U.S. SAFE WEB Act
b
The lock screen in Windows 10 displays _____. a.the used and the remaining disk space b.a picture along with the current date and time c.all the installed applications on a PC d.all the available windows themes for a PC
b
The term podcast is derived from the _____. a.web of "pods" or connections that visitors used to podcast sites can create b.iPod c.podge craft d.acronym for Point of Delivery
b
To permanently delete the files stored in the Recycle Bin, right-click the Recycle Bin and then click _____ on the shortcut menu. a.Block Recycle Bin b.Empty Recycle Bin c.Refresh Recycle Bin d.Delete Recycle Bin
b
Which of the following is a term used by individual providers for fiber-to-the-premises (FTTP)? a.Netiquette b.Verizon FOS c.WiMAX d.Podcast
b
Which of the following is true of a Web note? a.It cannot be saved to a reading list. b.It saves a static version of a Web page. c.It cannot be saved to OneNote. d.It is saved as a link of a Web page
b
Which of the following is true of the HISTORY pane in Microsoft Edge? a.It lists the links related to history and evolution of Edge. b.It lists Web addresses for the Web sites you have visited. c.It lists Web addresses you have marked as favorites. d.It lists the links related to the previous versions of Edge.
b
Which of the following statements is true of the global positioning system (GPS) ? a.It is used to avail work from home facilities. b.It is used in determining exact geographic locations. c.It uses satellite technology to schedule meetings with clients. d.It provides medical information and services worldwide.
b
With fixed WiMAX, it is feasible to provide coverage to an entire city or other geographical area by using _____. a.a single WiMAX tower with overlapping hotzones b.multiple WiMAX towers and overlapping hotzones c.a single WiMAX tower with a single hotspot d.multiple WiMAX towers and a single hotspot
b
_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals. a.Authentication b.Encryption c.Decryption d.Authorization
b
Conventional television and radio networks, cellular telephone networks, and satellite TV networks are examples of _____. a.bounded networks b.reinforced networks c.wireless networks d.wired networks
c
Identify a disadvantage of Web-based training and distance learning. a.Each user cannot learn at his or her own pace. b.Content cannot be updated as needed. c.There is a possibility of technological problems. d.Employee training is impossible.
c
If more than one tab is open, to exit edge, you should click the: a.Disconnect button of any one tab. b.Close button of any one tab. c.Close button on the title bar, and then the Close All button on the dialog box that appears. d.Disconnect button on the title bar, and then the Disconnect All button on the dialog box that appears.
c
In Microsoft Edge, a Web note: a.cannot be saved as an image. b.can be saved as a link of a Web page. c.can be saved to OneNote. d.cannot be saved to a reading list.
c
In the EASE OF ACCESS window, you can turn on the Narrator, which is a _____. a.theme developer b.document reporter c.screen reader d.color enhancer
c
In the context of network topologies, which of the following is true of a star network? a.The network contains multiple devices so that data can take any of several possible paths from source to destination. b.It is a network that uses a central cable to which all network devices connect. c.It is a network that uses a central device through which all network transmissions are sent. d.The network continues to function even if the central device fails.
c
In the context of tabs, which of the following is true of Microsoft Edge? a.Each tab in Edge forgets the Web pages that have been viewed on that tab. b.Edge cannot open a link in a new tab. c.When you start Edge, the start page appears in a tab in the application window. d.Edge can open only one tab at a time.
c
In the term Windows 10, "10" indicates the _____. a.number of registers in the system b.maximum allowed Microsoft accounts c.version of the operating system d.number of applications in the system
c
Instant messaging is commonly referred to as _____. a.tweet b.pin c.chat d.post
c
Internet2 is _____. a.an application that allows people to collaborate, socialize, and share information online b.used to support low-bandwidth application c.a research and development tool that is focused on speed d.designed to eventually replace the Internet
c
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s. a.contiguous signals b.exponential signals c.digital signals d.ramp signals
c
The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented. a.Do Not Call Implementation Act b.U.S. SAFE WEB Act c.Child Online Protection Act d.Homeland Security Act
c
The _____ regulates how Web sites can collect information from minors and communicate with them. a.Child Identity Theft Protection Act b.Children's Internet Protection Act c.Children's Online Privacy Protection Act d.Child Online Protection Act
c
The main disadvantage of fiber-optic cabling is _____. a.the use of metallic fiber strands instead of glass or plastic fiber strands b.its susceptibility to interference c.the initial expense of both the cable and the installation d.its slow speed when used to connect networks housed in separate buildings
c
Which of the following is a difference between the Favorites list and a reading list in Microsoft Edge? a.The Favorites list contains only Web pages, whereas a reading list contains only Web sites. b.The Favorites list temporarily saves links to Web pages, whereas a reading list saves links to Web pages permanently. c.The Favorites list can be organized into folders, whereas a reading list cannot be organized. d.The Favorites list can be accessed by clicking a cross-shaped button, whereas a reading list can be accessed by clicking an arrow-shaped button.
c
Which of the following is a recorded audio or video file that can be downloaded via the Internet? a.A spider b.A search phrase c.A podcast d.A podcast
c
Which of the following is true of deleting Web pages and Web notes in Edge? a.Deleting Web pages and Web notes is not possible once shared .b.Deleting Web pages and Web notes reduces the free space on the computer hard drive. c.Deleting Web pages and Web notes keeps entries current and streamlined. d.Deleting Web pages and Web notes from the Hub is not possible.
c
Which of the following is true of the Back and Forward buttons in Microsoft Edge? a.They display a blank area of the current web page to close the SETTINGS pane. b.They open a linked Web page in a new tab. c.They move only between those Web pages that have been viewed on that tab. d.They are used to scroll to different areas of a Web page.
c
Which of the following provides a quick overview of the message topic, similar to a headline? a.Cc line b.Body line c.Subject line d.From line
c
Which of the following statements is true of a file or folder deleted from removable media, such as a USB drive, or from a network drive? a.It is moved to the Recycle Bin. b.It can be restored only within the root directory. c.It is permanently deleted. d.It can be recovered whenever required.
c
Which of the following statements is true of the Minimize button? a.It restores a window to its previous size. b.It resizes a window to fill the screen. c.It shrinks a window to its button on the taskbar. d.It summarizes the commands applied on a window.
c
You can make Windows 10 more accessible to someone with physical limitations by using the _____ window. a.PIPELINED BOOKMARKS b.LIMITED USABILITY c.EASE OF ACCESS d.COMFORT OF INTERFACING
c
____ refers to following a predesignated procedure to eliminate oneself from marketing lists or otherwise preventing any personal information from being obtained or shared by others. a.Opting in b.Wiping c.Opting out d.Spamming
c
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information. a.Phishing b.Vishing c.Pharming d.Smishing
c
A _____ requires the person requesting access to provide information that only an authorized user is supposed to know. a.possessed entity access system b.possessed object access system c.possessed conferral access system d.possessed knowledge access system
d
Identify a method of data transmission used primarily with local area networks (LANs). a.Packet switching b.Circuit switching c.Clocking d.Broadcasting
d
If you need to rename a file, select the file, click the Home tab on the ribbon, and then click the Rename button in the _____ group. a.Review b.Insert c.Options d.Organize
d
If you pin a Web page to the start menu, you: a.can open the Web page without Internet connection. b.need to open the folder containing the Web page every time you want to access it. c.need to first start Edge to open the Web page. d.can find the Web page as a tile on the right side of the menu.
d
In an email message, a name stored in the contact list or the email address of the original sender appears in the _____ line. a.Body b.Subject c.From d.To
d
In the context of applications in Windows 10, which of the following is true of Mail? a.To use Mail, users do not require an Internet connection. b.To use Mail, users do not require an email address. c.It functions differently based on the type of computer. d.It functions regardless of the type of operating system.
d
The biggest advantage of Voice over Internet Protocol (VoIP) is _____. a.high-quality streaming of movies and television shows b.voice clarity c.0% downtime d.cost savings
d
When you drag a file or folder from one location to another on the same drive, _____. a.the root directory asks you to rename the file or folder and then place it on the drive b.the file or folder has a copy of itself created in the new location c.the root directory creates a copy of the file or folder on every drive on the system d.the file or folder moves from its original location to the new location
d
Which of the following is a true statement about the printing of Web pages? a.The data on Web pages can be printed only if copied to any Office application. b.The orientation of the Web pages being printed cannot be changed. c.The printer-friendly version of Web pages prints all the information in them. d.The print settings can be changed for the Web pages being printed.
d
Which of the following is one of the key enhancements of Bluetooth 4.0? a.Use of Wi-Fi signals b.Need of cables between devices for data transfer c.Large-range connectivity d.Energy efficiency
d
Which of the following items appears in the Folders list in the left pane of the Mail window? a.Reminders b.View settings c.Calendars d.Drafts
d
Which of the following ranges of the electromagnetic spectrum is sometimes referred to as the wireless spectrum? a.Infrared (IR) transmission b.Gamma ray' c.X-ray d.Radio frequency (RF)
d
Which of the following statements is true when more than one window is open in an app? a.The open windows are transformed into tablet mode of viewing. b.Each open window will be closed before a new app opens. c.Each open window will have a corresponding individual button on the taskbar. d.The open windows are grouped together in one button representing the app.
d
_____ are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet. a.Hardware and software organizations b.Infrastructure companies c.Intranet societies d.Governments
d
_____ is a box on the taskbar that you type text in or use to interact verbally with Windows using Cortana to search for anything stored on your computer, including apps, files such as documents, pictures, music, and videos, and settings, as well as search the Web for pages related to your search text. a.Quest Information box b.Multilingual search box c.Swift type dialog box d.Ask me anything box
d
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers. a.Smishers b.Feeders c.Pharmers d.Skimmers
d
_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content. a.Cybersquatting b.Cyberbonding c.Cybersailing d.Cyberstalking
d
_____ usually combines some type of possessed knowledge along with either a possessed object or a biometric feature. a.Two-factor encryption b.Mono authentication c.Mono encryption d.Two-factor authentication
d
A file identifier is the three or four characters that follow the dot in a file name and that identify the file type. True False
false
A folder name in Windows 10 can have up to 1020 characters. True False
false
A maximized window can be repositioned. True False
false
A public Internet access point at an airport or a coffeehouse is known as a piconet. True False
false
An app is a work area on the desktop that contains text, files, or other data and tools for performing tasks. True False
false
Antivirus can infect any device, including personal computers, smartphones, tablets, and printers that contain computing hardware and software. True False
false
Communication that takes place through a telephone is an example of simplex transmission. True False
false
Denial of service attacks today are often directed toward popular or controversial sites and typically are carried out via multiple computers. This is known as a concentrated denial of service attack. True False
false
Even if you clear your browsing History, Edge remembers the Web pages that you have viewed. True False
false
Even if you delete messages from the Deleted Items folder, the messages are deleted temporarily. True False
false
If you respond to questions or insert comments in the original email, you should use the same text color to type your additions, thereby ensuring uniformity. True False
false
In a File Explorer window, the Navigation Bar contains buttons for frequently used commands. True False
false
In a client-server network, network clients provide access to software, files, and other resources that are being shared via the network. True False
false
In fiber-optic cables, single fiber strands are used for full-duplex data transmissions. True False
false
In the People app, the collected information about a contact is called memoranda. True False
false
Initially, ARPANET connected four mainframe computers. True False
false
Mobile wireless Internet access requires a DSL modem and is available only to users who are relatively close to a telephone switching station and who have telephone lines capable of handling DSL. True False
false
Permanently deleted files can be retrieved from the Recycle Bin by clicking the Restore All button on the Recycle Bin Tools Manage tab. True False
false
The current standards for cellular networks today in the United States is 5G. True False
false
The default desktop you see after you first install Windows 10 is a white background with a picture of light streaming through one square that represents a window. True False
false
The file content of an attachment appears within the message body of an email. True False
false
The reading list in Edge is organized in folders. True False
false
The root directory, or top level, of the hard disk is only for user-created files and folders. True False
false
The sizing buttons appear on the left end of the title bar of a window. True False
false
Twitter lets you post updates called tweets of up to 200 characters that anyone can view. True False
false
Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of the hacker at that time. True False
false
When you delete a message from your Mail inbox, it is permanently removed from the Inbox. True False
false
Wikis are typically edited by an individual, whereas a blog is a collaborative Web page and intended to be modified by multiple individuals. True False
false
You can open only one tab at a time in Edge. True False
false
A single server can act as a network server, a file server, a print server, and/or a mail server or Web server. True False
true
As part of the reply to an email, Mail fills in the To and Subject boxes and includes the text of the original message. True False
true
Despite its popularity in academia and with government researchers, the Internet went virtually unnoticed by the public and the business community for over two decades because it required computers and it was hard to use. True False
true
If a window is a program window, clicking the Close button can stop the program from running. True False
true
In Edge, you can save a Web note as a favorite. True False
true
Online auctions are the most common ways to purchase items online from other individuals. True False
true
Pharming most often takes place via a company's DNS server, which routes Web page requests corresponding to company URLs. True False
true
Shutting down your computer makes sure that it starts quickly the next time you use it. True False
true
The Print dialog box shows a preview of the printed page based on the current print settings. True False
true
The term modem is often used interchangeably with network adapter when describing devices used to obtain Internet access via certain networks. True False
true
The type of device used, the type of Internet connection and service wanted, and the geographical location determine the Internet service provider (ISP) options. True False
true
To avoid plagiarizing Web page content, one should credit Web page sources when they are used in papers, on Web pages, or in other documents. True False
true
To rename or edit a compressed file or folder, you must extract it first. True False
true
Twisted-pair cabling can be used with both analog and digital data transmission. True False
true
Using the People app, you can pin your contacts to the Start menu. True False
true
Video data requires the most amount of bandwidth when compared to text data. True False
true
When more than one window is open on a desktop, only one can be the active window. True False
true
When you click the Maximize button, the window resizes to fill the screen. True False
true
You use File Explorer windows to navigate, view, and work with the contents and resources on your computer. True False
true