CS102
Also known as ______ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent. Select your answer, then click Done.
"white hat"
Click on the file name of the actual web page, then click Done.
**last part of the URL
Select three 3D modeling and animation software applications that artists and animators use to create 3D objects and animated characters, then click Done.
3ds Max, Blender, Maya
Works go into the public domain when their copyright expires, usually _____ years after an author dies. Select the your answer, then click Done.
70
Personal computers are meant to be used by only one person at a time. Which computers are not personal computers? Select two answers, then click Done.
ATM hotspot, & tape storage facility hotspot
Click on a computer programming language, then click Done.
C++
Select the safest place to back up your data, then click Done.
Cloud Backup NOT hard drive
Connor is surfing the internet at work. He does not know the rules regarding employer and employee web activity. Which option is true? Select your answer, then click Done.
Employer can watch all of Connor's activity without his knowledge.
Some embedded systems, such as "smart" lightbulbs and streaming media players, have the ability to connect to wireless networks and the Internet. These connected objects are known as the ______. Select your answer, then click Done.
Internet of Things (IoT)
Which of the following medical procedures primarily involve computers? Select two answers, then click Done.
MRI & fetal monitoring
Select two software applications that can help you keep track of your family's personal finances, then click Done.
Mint and YNAB are popular financial applications. Intuit Quicken is desktop application that synchronizes with mobile app. NOT Intuit TurboTax hotspot, Mint (cloud-based)
Professor Smith wants to create a strong password for his bank account. Click on two passwords that are secure.
P!g$BaNk#98
______ is one example of a gaming console. Select your answer, then click Done.
Sony PlayStation 4 (PS4)
Select the item that acts as a surge protector and a rechargeable battery, giving you enough time to save your work before shutting down your computer. When you are finished, click Done.
UPS
The ______flash drive is a solid state storage device that plugs into a ______ port. You have probably used one of these to transfer files between computers or store copies of important files. Select your answer, then click Done.
USB
Cables connect computers in a traditional network; however, more computers are now connected via ______. Select your answer, then click Done.
Wi-Fi
Most laptops and tablets connect to networks and the Internet using ______. Click your answer, then click Done.
Wi-Fi
Select three software applications that you can use to create a playlist of your favorite music, then click Done.
You chose Adobe Illustrator, chose Avid Pro Tools, chose Apple GarageBand, chose Adobe Illustrator, chose Audacity, and clicked the Done button.
Which of the following are a virtual assistant that responds to voice commands? Select the two correct answers, then click Done.
You chose Google's Assistant, chose Apple's Siri, and clicked the Done button.
Agencies such as the NSA and FBI monitor Internet activity and can require companies to turn over your ______. Select the three correct answers, then click Done.
You chose search history, chose social networking activity, chose email messages, and clicked the Done button.
When a server farm gets too big for its space, companies often use ______, thin computers that slide into racks that hold many of its companion servers. Select your answer, then click Done.0
blade server
A(n) ___ utility scrambles your data or communication, making it unreadable by anyone who doesn't have the proper key.
encryption
Cloud computing allows you to store your files and access applications in a(n) ______ account. Select your answer, then click Done.
online
Every computer or device that is on the Internet needs a(n) ______ address that uniquely identifies it. Select your answer, then click Done.
IP
Automated programs run by ______ frequently search, organize, and store your information for marketing purposes. Select the two correct answers, then click Done.
Social media companies & search engines
Home automation allows people to use a mobile device to ______. Select the three correct answers, then click Done.
activate door locks, turn lights on and off, control the temperature in the home
Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers, then click Done.
copyrighted photographs, copyrighted music, copyrighted videos
The devices that can read, write, and erase data are called _________. Select your answer, then click Done.
drives
A browser_______ is a separate program that adds a variety of useful features to the web browser, like Evernote or Google Hangouts. Select your answer, then click Done.
extension
A ______ represents 1,000 megabytes. Type your answer in the space provided, then click Done.
gigabyte
Instead of holding a smartphone while driving, it is safer to use ______ technology. Select your answer, then click Done.
hands-free
The ______is used to store data in tablets, smartphones, and digital cameras. The Secure Digital (SD) is the most common format currently in use, available in various speeds and storage capacities. Select your answer, then click Done.
memory card
___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker.
phishing
Mobile devices are not designed to handle frequent drops or crushing weight. The best way to avoid damage to your mobile device is to buy a _______. Choose the two correct answers, then click Done.
protected case NOT extended warranty or insurance plan
Click on the three mobile devices that feature a camera and microphone, speakers, wireless connectivity, and internal sensors, then click Done.
smartphone, tablet, smartwatch
Though macOS and Windows share similar features and functions, Mac users cite five key advantages of owning these types of computers. Select the five answers, then click Done.
support stability unified ecosystem widely used in businesess today, included software, fewer viruses idk
Before installing software on your computer, you need to accept the end-user license agreement (EULA) that states how you can legally ______ the software. Select your answer, then click Done.
use
With millions of computer infections and intrusions yearly, home users and businesses can no longer afford to be without ______ and malware protection. Select your answer, then click Done.
virus
Created in 1991, ______is an open source server operating system that users modify, enhance, and then freely distribute to other users. Select your answer, then click Done.
Linux
The physical locations where things are stored are known as storage ______. For example, DVD discs are a type of storage ______. Select your answer, then click Done.
Media
______ are lightweight, handheld computers that offer a variety of software and communication services for mobile users. Select your answer, then click Done.
Mobile devices
Select three personal information managers (PIMs) that you can use to manage contacts, create appointments, set up reminders, and send emails, then click Done.
Mozilla Thunderbird, Zimbra Desktop, Microsoft Outlook
The _____ is a combination mobile phone and handheld computer. Fill in the correct answer, then click Done.
NOT tablet **smartphone
Is it ethical to illegally download music because your friends are doing it? Select your answer, then click Done.
No its nor morally acceptable to downlaod copyrighted music files that didnt purchase
Who owns the Internet? Select your answer, then click Done.
No single person or group controls the network
Can a 32-bit operating system use 8 GB of RAM? Select your answer, then click Done.
No. A 32-bit operating system can only use up to 4 GB of RAM
Click on the two examples of operating system software, then click Done.
Not windows and microsoft office so IDONT****INGKNOW
Select four tasks you can complete with an office software suite, then click Done.
You chose Create reports and presentations, chose Schedule meetings, chose Analyze sales figures, chose Write letters, and clicked the Done button.
As NSFNET traffic grew in the 1980s, the NSF brought in private companies such as IBM to upgrade existing networks and create new ______, the connections that carry most of the Internet's traffic. Select your answer, then click Done.
backbones not networks
______ your data is a countermeasure against the threat of data loss. Select your answer, then click Done.
backing up
Mobile devices are not designed to handle frequent drops or crushing weight. What is one way to protect it from cracking? Select your answer, then click Done.
buy a protective case
You can see every single page, image, and video for all the web pages you have recently retrieved by looking at the browser ______. Select your answer, then click Done.
cache
Copying large chunks of data from a web page and pasting them into your schoolwork without properly citing the source is known as ______. Select all that apply, then click Done.
cheating, plagiarism
If you have a really large file, you may want to _______ or ZIP it before attaching it to an email or saving it to your storage device. Select your answer, then click Done.
compress
Click on the computer part(s) that performs actions based on instruction from a program. Click on the correct answer, then click Done.
computer, calculators, etc
When John's computer couldn't read his new DVD drive, he realized he needed to install a(n) ______ that instructs the operating system how to recognize and use the new drive. Select your answer, then click Done.
device driver
Compared to tablet computers, ______ are lighter, more affordable, and enjoy a longer battery life. People use them mainly to read books because their screens can be read in bright, outdoor conditions. Select your answer, then click Done.
e-book readers
Another popular use of the Internet is ______, which allows messages to be sent to electronic mailboxes in an instant. Select your answer, then click Done.
Everything posted to social media services or anywhere else on the Internet should be considered private. Select your answer, then click Done.
false
Select the item that allows you to protect your laptop from theft. When you are finished, click Done.
lock hotspot
Sara likes to use free Wi-Fi in public places like libraries and coffee shops. Is it okay if she does her online banking in a coffee shop? Select your answer, then click Done.
no
Many laptops and tablets sold today don't include disc drives because people use a(n) ______ to store their information. Click your answer, then click Done.
online account
______ refers to the processed results that a computer sends to you. Typically, the results appear on the computer's screen or on a printed piece of paper. Enter your answer in the space provided, then click Done.
output
A browser ______ is a separate program that allows your web browser to play several types of multimedia content. Select your answer, then click Done.
plug-in (extension adds variety of useful features to the web browser) NOT window
Many activities that are unethical are also illegal. Select two technology crimes that are illegal, then click Done.
sharing copyright files
______ refers to a variety of websites and services that allow individuals to connect with each other by sharing photos, news, and thoughts on just about anything. Click your answer, then click Done.
social media
Select the malware that is designed to report activity on your computer to another party. Select your answer, then click Done.
spyware hotspot
In addition to playing video games, a gaming console can be used to ______. Select the two correct answers, then click Done.
store photos, watch movies
The ______ is a mobile device that measures 7 to 10 inches in size and is an affordable and lightweight tool for reading electronic books, performing research, watching movies and staying in touch with friends and family. Fill in the correct answer, then click Done.
tablet
When a recipient opens an infected file, a ______ will activate itself and find more files to infect, often making your operating system unuseable. Select your answer, then click Done.
virus
Web pages that are linked to each other make up a ______. Select your answer, then click Done.
website
______ is an alternative operating system that has a familiar interface, can run off a USB drive, and has many free and open source applications. Select your answer, then click Done.
Ubuntu
A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, then click Done.
Wireless adapter ? NOT wireless LAN
______ is a short-range wireless technology that allows users to make and receive calls or text without using their hands. Select your answer, then click Done.
Bluetooth
Select four questions you should ask yourself to determine whether fair use applies to your situation, then click Done.
How much of the work is being copied? How will the copy affect the market? What is the nature of the work? What is the nature of the use?
______ is a password management utility that creates and saves all of your computer passwords, making it possible for you to only remember one password that works on all your computers and mobile devices. Select your answer, then click Done.
LastPass
Select three types of video editing software that professionals use to edit and export videos for use in movies, TV and websites, then click Done.
You chose Apple Final Cut Pro, chose Adobe Premiere, chose Avid Media Composer
Chloe wants a new computer but doesn't want to buy new software. She currently uses Microsoft Office on a a PC with a 64-bit processor that runs Microsoft Windows. Select two types of computers that will meet her needs, then click Done.
You chose Windows-based laptop computer, chose Windows-based desktop computer, and clicked the Done button.
Multi-user computers allow ______ to connect to them in order to access information or software stored inside them. Choose all that apply, then click Done.
You chose convertible laptops, chose desktop computers, chose desktop computers, chose laptop computers, chose desktop computers, chose personal computers, and clicked the Done button. **all the above choices
Some of today's most sophisticated technology exists because it was developed and funded by the military. Select the four area(s) of the military where computers are used today, then click Done.
You chose research, chose controlling drones, chose defense, chose random inspections, and clicked the Done button.
Professor Smith wants to create a strong password for his bank account. Click on three strong guidelines.
You clicked the 8 characters hotspot, clicked the uppercase and lowercase hotspot, clicked the symbols and numbers hotspot, and clicked the Done button.
Select two software applications that help you prepare your income taxes, then click Done.
You clicked the Intuit TurboTax hotspot, clicked the H&R Block hotspot, and clicked the Done button.
Computers now help a wide range of office workers complete their tasks more quickly and efficiently. For example, ______ use sophisticated software to track income and expenses for the company. Select your answer, then click Done.
accountants
Which backup tool allows you to access your home or office computer's backup from a mobile device? Select your answer, then click Done.
cloud backup provider hotspot
Freight companies need ______ to manage thousands of ships, planes, trains, and trucks that move goods around the world. Select your answer, then click Done.
computers
Click on the software applications that you would use to create a database for an individual or small business. Select your answer, then click Done.
database applications hotspot **Access & Base
A company needs to buy 20 computers with large monitors and comfortable keyboards. What type of PCs should the company buy? Select your answer, then click Done.
desktop computer
Many companies make their communication more secure by using HTTPS, a protocol that ______ communication that contains financial or personal information. Select your answer, then click Done.
encrypts
Similar to the address bar of a web browser, a ______ path shows the exact location of a file. Select your answer, then click Done.
file
Like all files on a computer, the file name or web page is located within a folder or directory. Click on the folder/subfolder structure, then click Done.
folders or directories *part before the last
Sara found a book on Amazon that she wants to purchase. She is in a coffee shop but flying back home in a few hours. Which location would be the best option for making her purchase and keeping her information secure?
home
Which part of the figure represents the input phase of the Information Processing Cycle? Click on the correct answer, then click Done.
input
Click on four websites that are generally a credible source of accurate information, then click Done.
*picture*
Also known as the ______, the CPU is the main processor of a computer. Select your answer, then click Done.
microprocessor
Input can take a variety of forms such as the text you type with your ______. Click on the correct image, then click Done.
mouse
Select the file extension of a video file, then click Done.
mp4 avi mov hotspot
A ______ helps you identify and examine possible threats that may harm your computer system. Select your answer, then click Done.
risk assessment
Windows and macOS allow you to ______ a file from just about anywhere. Select your answer, then click Done.
search
A ______ includes a bundle of security utilities in one package that can protect your computer from all types of malware. Select your answer, then click Done.
security suite
Which of these computers are the largest and most powerful computers in the world? Select your answer, then click Done.
supercomputers
A virtual private network (VPN) uses a method called ___ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet.
tunneling
In 1990, the first web page was created in a language called ______ and placed on the first web server. Select your answer, then click Done.
HTML
In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States. Select your answer, then click Done.
ARPANET NOT NSFNET
Owned by Google, ______ is an open source operating system that powers smartphones and tablets from companies such as Samsung, Motorola, HTC, and Google. Select your answer, then click Done.
Android
Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done.
HTTP
Cam has an account with Bank of America. He received an email to renew his account. What should he do?
Check with the bank hotspot
The ______ and memory determine the overall speed and performance of your computer. Select your answer, then click Done.
CPU
Intel and AMD are two companies that produce ______. Select your answer, then click Done.
CPUs
The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science. Select your answer, then click Done.
CSNET
Alex wants to buy a computer that he can use for playing video games. He plans to install a better video card when he has the money. Click on the computer that Alex should buy. Select your answer, then click Done.
Desktop computer
Click on the software applications that you could use to create a budget with charts. Select your answer, then click Done.
Excel, Calc or Numbers
Nathan uses Microsoft Word on his MacBook at work. He wants to work from home on his Windows-based Dell laptop. Can he install and run a copy of the Mac-based software on his PC at home? Select your answer, then click Done.
No, Mac-based software is not compatible with the Windows operating system.
The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET? Select your answer, then click Done.
TCP/IP & IP address? (protocol)?? NOT TCP/IP & Internet service providers (ISPs) combined
When you delete a file, it's placed in the Recycle Bin or Trash. You must ______ the Recycle Bin or Trash to completely remove the file from your computer. Select your answer, then click Done.
empty
One way to help prevent ___ is to check your credit reports regularly.
identity theft
Select the file extension for an audio file, then click Done.
mp3 m4a
Malware attempts to ______. Select the four correct answers, then click Done.
take control of a computer, destroy data, harm the flow of data through a network, steal information
A large smartphone that is almost the size of a tablet is called a ______. Select your answer, then click Done.
phablet
To ease the burden of buying expensive software, many companies offer a ______ that allows users to pay a monthly fee to use the software as long as they need it. Select your answer, then click Done.
subscription model
A network server, mainframe computer, and a ______ are types of multi-user computers. Select your answer, then click Done.
supercomputer
A supercomputer is a machine that can fill a warehouse-sized room. Select your answer, then click Done.
true
Wi-Fi signals generally reach 100 to 200 feet indoors, unless the signal is blocked by walls or floors. Select your answer, then click Done.
true
Web-based documents are normally referred to as ______. Select your answer, then click Done.
web pages NOT HTTP
______ such as Tor will mask your IP address from websites in order to protect your privacy when visiting a website that does not have a privacy policy. Select your answer, then click Done.
Anonymity software
Businesses never switched to Macs because they are only manufactured by Apple and typically cost more than a ______ computer. Select your answer, then click Done.
Windows-based
Also known as the ______, the CPU is the main processor of a computer. Select your answer, then click Done.
micro
A file is copied from the hard drive (storage) to ______ when you open it. When you close a file, it's removed from ______ and saved to the hard drive. Select your answer, then click Done.
random access memory (RAM)