Exam questions
What is an example of protecting your Internet privacy?
Following safe web browsing habits.
Social networking revolution started with?
Friendster
A key concept of the internet is that everything is governed by strict rules instead of it being open.
False
A vendor-neutral certification demonstrates expertise in one software product or program.
False
Ad trackers are used to display personalized cookies.
False
The general idea of the computer (a physical machine) was "born" because of mistakes in solar system tables.
False Born because inaccuracies in navigational tables
Hard disk drives contain no moving parts.
No
Bill Gates wrote the code for the software IBM used called Microsoft DOS.
False, he bought it
What replaced the vacuum tube?
Transistor
A biometric lock uses unique physical characteristics, such as your face or fingerprint, to control entry.
True
ENIAC was the first electrical, general-purpose digital computer.
True
Google was created in 1996 and originally called Back Rub
True
The embedded wires through which data travels are called a bus.
True
Tim Burness Lee created the world wide web which is just a subset of the internet.
True
YouTube was made in 2005 in order to share movies people made with their cameras and phones.
True
Apple created the first electronic spreadsheet.
true
Apple the company was saved from going out of business by the Ipod which is a digital music player
true
Steve Jobs was fired from Apple.
true
The Internet was created by modelling a mouse in a maze and was named ARPA for fear of war with the Russians.
true
The first personal computer was built by Xerox
true
in 2003 Android was born by 2 guys
true
Some workers are required to use a(n) _________ to connect to company servers.
virtual private network
The basic sound units of speech are called phonemes.
yes
The mircoprocessor was invented by Apple.
• False, it was Intel
What was the first browser?
•Mosaic/Netscape
What program encourages manufacturers to create energy-efficient devices?
Energy Star
Which of the following is NOT a cloud service provider?
macOS
If a printer isn't working, the first thing you should do is ______.
make sure it's plugged in and connected
To limit the potential damage from power spikes, use a(n) _______.
surge suppressor
The integrated circuit enabled ...
-Smaller computers -Lighter computers -The US to go to the moon
When considering the purchase of a peripheral, you should ______. Select all that apply.
-disregard customer reviews -know if your computer can connect to it
By recycling electronics, you can help _____.
-preserve limited resources -keep toxic materials out of the water we drink
Responsible tech disposal can include _____. Select all options that apply.
-throwing the item in the trash -donating the item to a refurbishing service
A smart thermostat can accomplish which of the following?
-unlock your front door -receive instructions from a smartphone app
To indicate whether a computer chip's electric circuit is on or off, you use a ___ to stand for "on" and a ___ to stand for "off".
1 (one), 0 (zero)
How does a computer work?
1. Data goes in. 2. Data is then "crunched" or understood. The central processing unit executes the instructions for translating the data into information. CPU is made up of the control unit and the arithmetic logic unit. Control Unit controls where the data goes and the ALU crunches data like a calculator. 3. As data goes around the machine cycle, it needs fast and accessible memory at different steps. For example, cache is fast, volatile, and temporary storage for memory. 4. Once data has been crunched and moved to memory, it goes to the output device. Other: Register is a specialized memory that's on CPUs and is faster than cache, memory, or storage. Computers turn data into information. Input devices put data into the computer and Output devices output the information through peripherals. Memory is a temporary storage device. All of the data in the information travels around the motherboard on a bus.
machine cycle
1. fetches instructions 2. decodes instructions 3. executes instructions 4. it stores the result equals a metronome in music (a practice tool that produces a steady pulse (or beat)
Binary is made up of
1s and 0s
How do speakers work?
A speaker is a paper cone with a magnet on the base of the cone and another magnet below that. An electric current runs through one of the magnets and changes the polarity from positive to negative. It bounces the cone back and forth in different wavelengths. This process is how we get different sounds that we hear.
Which of the following actions should you take when you see a message from a sender you don't recognize?
A:View it without interacting.
What type of electricity comes out of the walls?
AC- alternating current--an electric current that reverses its direction many times a second at regular intervals -Electrons change directions. Every single device that has a battery uses DC, direct current, which means that electrons only flow in one direction. When you plug a charger into the wall, the brick changes AC into DC, making the electrons flow in one direction because the battery accepts that power.
Examples of encoding schemes include ____
ASCII Unicode
Chloe works as a web content editor. She likes to work out of various cafes and uses free WiFi that they provide to access the Internet. Chloe's company, however, is concerned about the security of these networks. Which of the following steps can ensure that Chloe's activities on her computer remain encrypted?
C:Her firm should use virtual private network (VPN) to provide her secure access.
Creating a fake identity in order to target a victim on a dating app is called ________.
Catfishing
How does noise cancellation work?
Incoming ambient sound in the form of a sine wave is picked up by a microphone in the headphones. This sound is sent to the noise cancellation circuitry which measures that wave and produces the exact inverse of that wave. Then it sends it back to the headphone speaker. Now when both the ambient sound and the exact inverse hits your eardrum at the exact time, the eardrum doesn't move so you don't hear anything.
Which of the following components does a digital certificate include?
It verifies its own authenticity. -and web identity
Which cache levels are usually built onto the processor chip?
L1 and L2
Which of the following are examples of convergence? Select all that apply
Listening to a radio station over the Internet.Using a phone to unlock a smart lock on a door. Checking your emial on an e-reader.
Mirabel and Haley work for a software firm. One night at a party, Mirabel takes a picture of Haley surrounded by empty beer bottles. Mirabel found it funny and wanted to share it on her Facebook page. Should she do this? Select all that apply.
No
RAM stands for _______.
Random Access Memory
Sandra has been getting multiple blank calls every day from an unknown caller. She has also been getting rude emails from email addresses she does not recognize, and intimidating messages on Facebook Messenger from a fake profile. What can you conclude about Sandra?
She is a victim of cyberbullying.
What is a data broker?
Someone who sells personal information to third parties.
Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in an MS Word document. Why does this happen?
While storing sound, a computer stores a lot of information - like amplitude and frequency - that it does not while it saves text.
Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these ways can it help Deirdre? Select all that apply.
While text messaging, it will convert text into speech.
A router manages the flow of network traffic.
Yes
Both wired and wireless devices can connect to the same network.
Yes
Employers can use spyware to track program usage by employees.
Yes
Prolonged typing without sufficient breaks can cause nerve damage.
Yes
Recruiters can contact you about your resume on job search sites such as Monster and Indeed.
Yes
Full disk encryption protects _____.
a drive or device
Which of the following is NOT a common form of malware? Select all that apply a. adware b. bloatware c. spyware d. ransomware
b. bloatware
For storage, laptops use _____.
either a hard disk drive or a solid-state drive
The sticky keys feature enables users to _____.
execute keyboard combinations one key at a time
It is a good idea to use the same password for multiple accounts.
false
Was the internet made public in 1980's
false
RAM is measured in _______.
gigabytes
A ____ is a node. Select all that apply.
hubs, switches, routers, computers, tablets, mobile phones, printers, game consoles, and smart home devices
How does electricity work?
if electricity gets measured by an oscilloscope, an oscilloscope measures voltage over time. On screen, it looks like a sine wave. Good clean power over time has a smooth wave. (Not our wall, we create noise on the grid). Dirty power has an irregular wave because of the noise. When the voltage is high is called a spike. When the voltage is low it's called a brownout or under voltage. A surge protector protects against surges-occur when the flow of electricity is interrupted, then started again, or when something sends electricity flowing back into the system. A UPS (an uninterruptible power supply) protects against surges and provides power for brownouts and blackouts. The most common frequency of the alternating current is 60 cycles per second. Computers use that to set their clock speed. If cycle gets messed up the clock speed is messed up, and therefore the equipment gets messed up, which is why a surge protector is important.
A server that provides storage to network users is called _____.
network attached storage
A firewall protects your computer from data loss due to hardware failure.
no
When posting to a professional networking account, you should share stories and comments that _____.
offer valuable information to your target audience
Things to consider when buying a new computer include _______. Select all that apply.
operating system form factor
A peripheral device communicates with your computer through a(n) ____.
port
A Repetitive Strain Injury (RSI) may be related to which of the following? Select all that apply.
stressing the same muscles through repetition. maintaining the same posture for long periods of time. maintaining an abnormal posture for an extended period of time, such as holding your arms over your head. lifting heavy objects.