Final
Alice stored a memory card in her wallet that had all the photographs of a recent trip she took. When she inserted the card into her laptop, her computer wasn't able to read it. Alice tried to access its contents on her other devices but could not. Based on this, which of the following is/are likely to be true?
-The memory card is damaged and its contents are permanently lost. -The memory card is damaged and storing it in a protective case could have avoided the damage.
which of the following are examples of pointing devices
-mouse -touchpad
Which of the following types of storage is/are used to transfer data from one computer to another?
-optical media -external hard drive
overheating caused by direct sunlight can damage the...
-processor -LCD screen -hard drive
Which of the following should you take into consideration when purchasing a computer?
-software and applications you intend to use -storage capacity
an operating system uses available storage space on a startup drive for...
-storing programs -storing apps - virtual memory
the main categories of software are...
-system -application -development
a laptop typically includes a...
-touchpad or trackpad -keyboard
which of the following is/are classified as input device(s)?
-webcam -mouse -touchpad
When should a user consider restoring the operating system?
-when the apps do not respond properly -when the computer is slow
Why is the .gov domain name so useful to know?
.gov sites have official authorization so they are usually reliable sites.
What is maximum speed for 802.11ac?
1 gigabit per second
7. Liesel is working on a research paper on a computer at her school's library. She saves it to the cloud, then signs off and packs her bookbag so she can get to class on time. On what device is her filed stored? Her USB flash drive The library's computer A remote server Her smartphone
A remote server
A modem can also function as what other piece of hardware?
A router
Query
A search term entered into a search engine to obtain results. In a database, a database object used to specify criteria that extract data based on criteria that the query creator specifies. Criteria are conditions for a field
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
Anusha wants to use her computer,rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
What is a MAC address?
A unique hardware address for your device
What would you need to install if you have an app that is incompatible with your current operating system?
A virtual machine
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Businesses use webinars for the following reasons EXCEPT _____.
A.
An operating system uses available storage space on a startup drive for _____. Select all that apply.
A. storing programs B. virtual memory C. storing apps
You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? (530602
A:BCC your supervisor in your response
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? (516208)
A:Change font size, style, and color of the keywords.
Which is a first step to deter thieves from accessing your financial information? (516103)
A:Do not provide over the phone or through email.
Businesses use webinars for the following reasons EXCEPT _____. (530599)
A:Group discussions
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?
Adjust the settings of the mouse through the settings dialog box
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
Adobe Premiere Clip -- Adobe Premiere Clip and FilmoraGo are video editing apps that allow you to modify video clips.
How do you know if a device is an input device or an output device?
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
B2B
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files? (516006)
B: Because he is using the same name, each time he saves he is overwriting his previous work.
How do you know if a device is an input device or an output device? (516020)
B:An input device • enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? (530432)
B:Because insiders sometimes create threats after incidents at their places of employment
What does the operating system do if you try to save a file with the same name into the same folder? (530409)
B:It overwrites the original file unless you add a number, date, or initials to differentiate the files.
You can monitor and protect your financial data in all of the following ways EXCEPT _____. (516088)
B:Requesting a credit and freezing your credit.
In the email communication process, what is the role of the email server? (516523)
B:Routing email messages through the Internet or a private network
What is a digital certificate? (516086)
B:Technology used to verify a user's identity
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? (516196)
B:Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Which of the following statements about browser security settings is false? (530443)
B:You must keep your history as long as you use the browser.
How would you describe the social networking site YouTube? (516521)
B:YouTube is a media and sharing network that lets users display and view videos and then post comments.
Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work? (530428)
B:Zoho writer
What is the main purpose of an operating system? (530386)
B:to coordinate the resources and CC 4-7 activities on a computer
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?
Because he is using the same name, each time he saves he is overwriting his previous work.
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? (530441)
Biometrics
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?
Bluetooth
Interference is a common problem with _____ devices. Select all that apply.
Bluetooth wireless
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
Broad network access
Which of the following is true about broadband connections?
Broadband connections are "always-on" with devices connected to them.
Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike?
C2C
Which of the following is an advantage to saving a file to a flash drive? (516001)
C: You can take it with you and then work on it on another computer.
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? (516218)
C:Create a database of company projects, customers and vendors.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? (516074)
C:It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Which of the following statements is true about the Clipboard? (516005)
C:It is temporary storage that holds a selection until you paste it into a document or folder.
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have? (530421)
C:It should have responsive design so that it is easy to use on mobile devices.
If you delete a shortcut from your desktop, have you also deleted the original file? (515986)
C:No, because a shortcut does not Increase place the actual file, folder, or app on the desktop
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her? (530399)
C:Use the search tool to locate the file by file name, content, or date.
14. When your computer accesses a webpage, what network architecture role is your computer filling? Peer Server Client Administrator
Client
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers, and vendors.
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of_____.
Cyberbullying
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? (516201)
D:A spreadsheet app to keep a record ofher expenses, sort data, and make calculations
Which of the following is the strongest password? (530439)
D:H@veAGr3atDaY!
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her? (515977)
D:The kernel is the • core of an operating system that manages memory, runs programs, and assigns resources.
Which of the following are ways to avoid computer viruses? (choose all that apply)
Do not open e-mail attachments from strangers. Do not share personal information with people you do not know. Install security updates on a regular basis
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage? (530419)
Drop Box
A graphics designer created the company's logo so the company can resize it to multiple dimensions based on the need without the use of any photo editors. Which of the following image file formats is most likely to have been used to make this happen?
EPS
Another term for a single-user license An end-user license agreement, or _____, grants one user the right to use the software.
EULA
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?
Enable sticky keys
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?
Enable sticky keys.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
Which explanation best explains the importance of using encryption?
Encryption protects sensitive information.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? (516070)
Ergonomics
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
Which of the following is the most reliable way to check the accuracy of a website?
Examine the sources cited by the website.
20. Which network type is often used for vendor access? Intranet Intranet Extranet Wireless network
Extranet
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
when using a Windows Internet browser, pressing ____ reloads a page
F5
Social networking sites never allow members to post messages on the pages of other members
FALSE
To join a social network, you can create an avatar
FALSE
You have no control over who views your social networking information
FALSE
4G and 5G networks provide slower data transmission speeds than 3G networks.
False
A Trojan is a malicious program that uses a computer network to replicate. (516075)
False
Bandwidth is a term that describes the number of devices connected to a network.
False
Before you can open and edit a compressed file, you need to zip it.
False
Big data is processed using relational databases. (516217)
False
Buying a collection of programs in a software suite usually costs significantly more than purchasing them individually.
False
Console systems only allow one game pad to be used at a time.
False
[email protected] is an appropriate email address to use for communicating with potential employers
False
Database software is software that allows users to organize data in rows and columns and perform calculations on the data.
False
Distributing programs outside the terms of a license agreement is a violation of copyright law but is not a federal crime.
False
Document management software allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project
False
Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. (516530)
False
Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. Group of answer choices
False
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. (516093)
False
The Close button reduces a window so that it only appears as a button on the taskbar.
False
The operating system assigns the file its name, location, and size.
False
When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy
False
When you save a document, the computer transfers the document from a storage medium to memory.
False
Wikis are not useful in education because students cannot use them to share notes and give feedback. (530585)
False
Wikis are not useful in education because students cannot use them to share notes and give feedback
False
Which of the following is used for security? Check all of the boxes that apply.
Firewall antivirus programs network backups
Posting hostile or insulting comments in response to someone else's blog post is called _____.
Flaming
You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?
Folder
If you have a file that has billions of bytes of data, then it would be measured in _____.
Gigabytes
Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?
High-quality product photos
How is digital audio better than analog audio in terms of quality?
Higher sampling rate amounts to higher bit rate and hence better audio quality.
10. Sonia works from home and uses the Internet often throughout the day. When they're home, Sonia's husband and children also use her network for gaming, social media, and streaming videos or music. What kind of network best describes Sonia's network? ISP network Business network Internet Home network
Home network
A unique location for a computer on the network:
IP address
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Which kind of cloud service requires the most technical skill to use?
IaaS
A(n) _____ is a small picture that represents a program, file, or hardware device.
Icon
In which of the following real-life situations would it be useful to use a digital certificate?
If you were signing a rental lease.
An email to a customer
In which of the following messages would the abbreviation brb (which stands for "be right back") NOT be appropriate?
In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called?
In-betweening
5. Celeste is preparing to lead a training session during a video conference. How can she engage the audience and encourage active participation? Encourage the audience to take notes Incorporate polling questions Wear a silly hat Ask for feedback by email
Incorporate polling questions Rationale: Some webinars are interactive and collaborative, allowing polling questions to survey the audience on a topic.
The hard disk drive on Joyce's laptop can store up to 500 GB of data. She usually only saves official documents and a few songs that she listens to while she works. However, when she uses more than three applications at the same time, her laptop responds more slowly. What should she do to optimize her storage?
Increase the RAM on her laptop so that more space for temporary storage of data is available, hence, increasing the performance
_____ is data and instructions entered into the memory of a device.
Input
Laptops, all-in-one desktops, and smartphones usually have _____
Internal microphones
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors.
Which of the following is NOT a step an operating system performs when printing a document?
It creates the document to be printed
Why is the access date important to include when citing a website? (select all that apply)
It indicates websites changes. It indicates website accessibility changes.
Which of the following is a characteristic of a strong password?
Letters,numbers, and symbols.
A remote server
Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored?
6. During his spare time, Richard is active with a political organization that sometimes takes a strong stance on controversial topics. He wants to post about his political activities on social media and connect with friends who have similar values. Which of the following sites would NOT be a good place to do this? Instagram Facebook Twitter LinkedIn
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
Linux
Logan is considering web app development as a career option. Which of the following languages does he not need to master? (516193)
Logo
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
Logo
13. Adrian is having a problem with setting up a new printer in his office, and he can't find the answers to his questions in the owner's manual. Which of the following resources would be the best place for Adrian to ask his questions and get targeted responses? Microblogging platform Message board Podcast subscription Social shopping network
Message board Rationale: Posting questions to a message board targeting a specific area of interest, such as computer hardware, invites responses.
An elementary school includes computer science as pat of its curriculum. Which of the following software could the school introduce to these students to create an awareness and interest in drawing and image editing, such that it closely simulates the real-time water colors, pastels, and oil paints that the children use?
Microsoft Paint
Which of the following is a step in the boot process?
NOT The operating system catalogs the files and folders on the system.
Which of the following is an authentication method to keep your data safe?
NOT encryption
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
NOT start window
When you want to add information to a document, what role does your operating system play?
NOT starts the word processing program
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
NOT the network most likely uses a firewall for protection
Which of the following terms refers to the area of the hard drive used for virtual memory?
NOT virtual file
A(n) _____ protects your device against unauthorized access.
NOT virtual machine
Why is network security important? Check all of the boxes that apply.
Network security allows organizations to continue to function. Network security keeps intruders out of the network. Network security prevents personal information from getting into the wrong hands.
Why would you want to connect your computer to a network?
Networks allow computers to share resources, such as hardware, software, data, and information
Provide immediate reactions to current and recent events
New Sites
Report facts as they occur
New Sites
Binary code uses alphanumeric characters to represent all values.
No
What does an operating system provide so you can interact with a device?
Not file storage
Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? Group of answer choices
Online Storefront
How can you display the main folders on a Windows computer
Open File Manager
How can you display the main folders on a Windows computer?
Open File Manager
Paul has opened a bespoke tailoring shop. He wants to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suites should he consider?
OpenOffice, G suite
You should unplug your computer if you _____.
Smell burning or see smoke rising from it
9. Nancy receives a call from someone claiming to work for the local Sheriff's Department. The caller says Nancy hasn't paid her speeding ticket, and she's about to be arrested unless she pays the fine with a credit card over the phone. What kind of attack is this? Social engineering Denial of service Phishing Trojan
Social engineering
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
~networks social
Social networks, including synonyms for networks
A set of instructions that tells a computer what to do, how to do it, and where to send the results or output is called ________.
Software
Which of the following statements is true of hackers? Check all of the boxes that apply.
Some hackers are criminals. Some hackers do it as a form of protest. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.
Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work?
Text messages containing bad news
What helps you evaluate websites for reliable information? (select all that apply)
The information you found is repeated or agrees with what you already know to be true. The domain name ending indicates the website is reliable (.gov, for example).
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
They had to unzip or extract it.
Which of the following are true of trademarks? Check all of the boxes that apply.
They protect logos. They show who the maker of the item is. They can be registered with the government.
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network
Which of the following statements describes patches?
They solve problems with software or security.
Where can you pin frequently used apps for easy access?
To the task bar
To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?
Transfer contents to an external storage device.
Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities.
Trojan horses
E-commerce job
Truck driver and Forklift
If you add a slideshow to play as your desktop theme, you have customized your system software
True
If you upload photos to a NAS device, everyone on the network can access them.
True
Many chatbot services provide support to employees and management rather than to customers.
True
Output methods include speakers, headphones, and interactive whiteboards.
True
True or False
True: You can post a Facebook status update from your smartphone. Mobile devices typically come pre-installed with "standard" apps like web browsers, media players, and mapping programs. Mobile devices need to work within limited screen space. Mobile apps are software programs that run on mobile devices like smartphones and tablets. False: A mobile app designed for an Apple iPhone will work on an Android phone as well. Operating systems of mobile devices can support full-scale software programs like Microsoft Word or Excel.
Which of the following is a utility that removes a program, as well as any associated entries in the system files?
Uninstaller
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
How is streaming of video or audio different from downloading it?
Unlike streamed content, downloaded content is stored on the computer.
Which learning model allows an AI system to create its own categories of data without labeling those categories
Unsupervised learning
A software __________ replaces small sections of existing software code with new, improved code to add enhancements or fix problems.
Update
An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make to achieve this?
Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.
A construction firm intends to use technology to help and enhance the design and architecture. In which of the following ways can the firm do that?
Use a computer-aided design software to create better and more accurate designs.
How can you protect a computer from electrical spikes and surges?
Use a surge Protector.
How can you protect a computer from electrical spikes and surges? (516076)
Use a surge protector
How can you check data on devices connected through IoT network?
Use a tablet
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1.Create a list of invitees; 2.Design the card; and 3.Personalize the card. How should he go about the task?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. -- When using mail merge, the document to be personalized must be prepared before the actual merging can happen.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1.Create a list of invitees; 2.Design the card: and 3.Personalize the card. How should he go about the task?
Use a word processor for step 1. graphics software for step 2, and mail merge for step 3.
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats. -- Many cross-platform app development tools provide a compiler that can translate existing code into different native platforms.
Alessandro wants to use his desktop computer to video chat with his mother.What hardware does he need to accomplish this?
Use his webcam and speakers so that he and his mother can both see and hear each other.
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?
Use the search tool to locate the file by file name, content, or date.
Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future?
Use vector images because they retain their clarity even when enlarged or shrunk.
Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in the future?
Use vector images because they retain their clarity even when enlarged or shrunk.
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
Use vector images because they retain their clarity even when enlarged or shrunk. -- Vector images retain their clarity and crispness even when they are enlarged or shrunk.
How could and online attacker use your profile to gather information about you to steal your identity?
Use your posts to figure out answers to possible security questions.
What are the parts of an email?
User ID "At" symbol Domain name
A(n) _____ protects your device against unauthorized access.
User account
Why has e-commerce expanded?
Users can trust the site with personal information.
Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. (530594)
Using your photos and posts to form impressions about your character
Social networking can leave you exposed to criminal activity in the following ways EXCEPT
Using your photos and posts to form impressions about your character
What facilitates bundling of video, audio, codec, and subtitles into a single package?
Video container
A video that is shared millions of times over social media in a short period of time is termed to be____
Viral
Which type of gaming system has sensors to detect the users' movements, and a head-mounted display that adjusts the vision and audio thereby replacing the environment as it would appear in real world?
Virtual World
Alice went to a movie theater where she was given special headsets with eyeglasses to watch the movie. Her experience was so immersive that she felt almost no barrier between herself and the media. Which of the following digital media could she have been experiencing?
Virtual reality
In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? (530590)
Voice over Internet Protocol (VoIP)
Which of the following statements describes the way networks are set up?
WANs are made up of LANs.
Which of the following statements is true of WANs?
WANs can be as big as the Internet.
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? (530586)
Web conferences
Word Processing Application or Other Application
Word Processing: Make a flyer for next week's hockey game. Write a quarterly performance review of your top employee. Update your resume to include your latest work experience. Other Application: Calculate quarterly earnings for the past five years, and chart the results. Calculate last quarter's sales product line and region. Input a new customer record into your customer database system.
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report? (530412)
Word processor
Public Domain
Work that you can use freely because it is not subject to copyright; the copyright may have expired or the owner may have explicitly released the work to the public domain
Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them from the website. If she has an internet connection what software can help her do her work?
Zoho writer
Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work?
Zoho writer
message board
a ______ or internet forum is an online discussion site where people in a conversation by posting messages
newsreader
a ______ program used to participate in a newsgroup, is often provided with some e-mail software
______ are programs that help people work and play online.
applications
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. (516524)
archive
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
you type out a few sentences in a MS Word file, and save it on your desktop. how is the data stored in the computer?
as a combination of 1s and 0s
dock
attaching the options bar to a specific area of the workspace
How fast data travels on the network:
bandwith
The maximum data transfer rate, or capacity, of a network or Internet connection:
bandwith
What is the meaning of ethics? Check all of the boxes that apply.
behavior that is good for everyone following the rules behaving in a way that would be easy to defend
What increases efficiency when using the Internet? Check all of the boxes that apply.
being prepared for a search looking to see that the information is reliable using the browser's "bookmark" tool
Which of the following applies to a trademark?
belongs to just one company or organization
in which format is data finally stored in computers?
binary digits
Type of graphic image where colors are assigned to individual screen pixels
bitmap
A _____ is a hacker who criminally breaches the security of a computer or network.
black hat
Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing?
block them
Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals?
blog
which of these is an optical medium of storage?
blu-ray discs
One of Richard's duties in his new job is to be active on LinkedIn and other professional social networks. Which of the following activities should he avoid when using social media for his company?
brain teasers
What determines the speed at which data travels?
bus width
Which of the following accurately completes this sentence. (choose all that apply) Online predators ____.
can go to jail if caught try to befriend young people
What information is revealed about an owner through their email?
can reveal their name
lets people access their stored data from a device that can access the Internet.
cloud computing
Jason takes many photographs on his smartphone while on vacation in Italy.If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?
cloud storage
Architects, scientists, interior designers, and engineers use _____ design software to create highly detailed and technically accurate drawings.
computer-aided
Telecommunications networks include _________ within an organization.
computers and telephones
Type of license that lets you use a specified number of software copies at any given time
concurrent-use
The ability to _______ to the Internet is a key feature shared by most mobile apps.
connect
The network backbone
connects routers to more efficiently route data.
menu
contains a list of commands you can use to perform tasks such as opening, saving, printing, and editing photos
Routers know where to send a network packet because they read the _______ contained in the packet. The ________ is the information that a user wants to send. A(n) ________ is an example of a payload.
control information payload email message
Which of the following is plagiarism?
copying a story from a book and then turning it in as your own creation
What is software piracy? Check all of the boxes that apply.
copying computer software or programs illegally making lots of copies and sharing with friends breaking the security on software so it can be used illegally
The legal right to copy, distribute, modify, and sell an original work
copyright
Which of the following protects intellectual property?
copyright
zoomify
creating a high-resolution image for the web, complete with a background and tools for navigation, panning, and zooming
There are various risks from attacks on Wi- Fi networks. These include all of the following EXCEPT _____. (516080
creating malware
Intellectual property can be defined as
creations made from peoples imagination
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. (516072)
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. (530433)
data backup
Cloud computing helps to address
data storage problems
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
database
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx? (530379)
date modified
Jennifer recently bought a new computer to type a new manuscript she's been working on. She also stored a lot of movies on it to watch during her free time. Though the performance was good at the beginning, it deteriorated quickly over a small period of time. Which of these is the most likely cause?
declining free space on the hard drive
_____ are standard settings that control how the screen is set up and how a document looks when you first start typing. (530397)
default settings
which of these, though not equally portable, is most powerful and usually easier to upgrade than others?
desktop computers
A _____ is software that helps peripheral devices communicate with a computer.
device driver
Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed.
device drivers
Carlos is arranging a series of weekly conference calls for people in different parts of the world. Which of the following tools can he use to inform participants about the call details?
digital calendar
A series of image frames displayed quickly enough for us to perceive them as continuous motion
digital video
You recently lost some files that were important to you so you have resolved to back up the contents of your hard disk on a series of rewritable DVDs. What kind of software will you use to do this?
disc burning
Liena
disinformation
Which of the following can you run to find and remove unnecessary files? (530374)
disk clean up utility
utility removes unused files like temporary Internet files from your hard drive so the computer doesn't search through unneeded files.
disk cleanup
Workplace ethics include
doing the work you have agreed to do while at work.
Ethics is a way of behaving so that you are
doing what is right
Obtain a software program from an online app store
download
File sharing is a way for people to
download entire books
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? (516219)
drawing app
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
drop box -- Many apps are available to do individual tasks. However, the apps that Patricia needs to use are a banking and payment app, a cloud storage app, a productivity app, a photo editing app, and a social media app.
Check all of the improvements and inventions of the 1970s.
e-mail hardware improvements improved data transmissions
What are some benefits of the Internet? (select all that apply)
ease of communication e-mail collaboration
What kind of application teaches a particular skill?
educational
What are examples of asynchronous communication?
email, social networking posts, and text messages
What was the first technology for communicating online?
email?
Software that runs on household appliances and consumer electronic devices
embedded
Simon has difficulty pressing and holding more than one key at a time, such as CTRL +ALT+DEL. What setting can he change to make this task easier?
enable sticky keys
specialty search
engine that provides access to academic information for research
general search
engine that searches web pages in its database that contain specific words or phrases
Operating systems can run only if they are installed on a hard drive. (530400)
false
The Close button reduces a window so that it only appears as a button on the taskbar. (515990)
false
The operating system assigns the file its name, location, and size. (516003)
false
To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.
false
When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy. (515970)
false
a joystick is a pen-type input device used to draw and tap on icons
false
all-in-one computers are easier to service and upgrade but occupy more space than desktop computers T/F
false
binary code uses alphanumeric character to represent all values T/F
false
console systems only allow one gamepad to be used at a time T/F
false
in order to support file sharing, your PC must run a network operating system T/F
false
most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations T/F
false
random access memory (RAM) is a permanent storage location T/F
false
speech recognition refers to a computer's ability to record and edit human speech T/F
false
the System Restore command in Windows returns deleted or modified documents T/F
false
The ability of a network to recover after any type of failure:
fault tolerence
Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems?
faulty power or video cable
In Windows, you use _____ to reorder, move, and navigate between folders. (530398)
file explorer
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
Posting hostile or insulting comments in response to someone else's blog post is called _____. (516534)
flaming
Solid state hard drives are a type of _________ memory
flash
solid state hard drives are a type of _________ memory
flash
Tammy spends time each day reading updates and news articles in her industry. She's always looking for new sources of quality information. What tool can best help her do this?
What you need to change to make words appear bigger on the page
font size
This defines what text characters look like
font type
Copyright protects the rights of the author of a book
for the life of the author plus seventy years
The ______ of a worksheet defines its appearance.
format
Slide __________ sets the appearance of text, objects, individual slides, or entire presentations.
formatting
An equation that performs a calculation to generate a value
formula
Software distributed free of charge via the Internet, where the developer retains the software rights
freeware
Part of the network that allows communication with other networks
gateway
If you have a file that has billions of bytes of data, then it would be measured in _____. (515997)
gigabytes
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
You would like to share information you found on a website. (select all that apply) You should:
give credit to the source of the information on the website. check to be sure this information is reliable and accurate.
What does an operating system provide so you can interact with a device? (530383)
graphical user interface
Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover? (530426)
graphics app
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
Samantha has a file named vacation.jpg. What type of file is it? (530385)
graphics file
Which of the following helps you more easily locate the files and folders you need?
grouping similar subfolders together in a folder
Which of these hardware components can you use to store videos?
hard drive
Around the world, all the laws governing behavior on the Internet are
hard to enforce.
The physical equipment
hardware
What do network operating systems use? Check all of the boxes that apply.
hardware software
If someone gets on the network who is not authorized to have access,
he can steal people's information. He can do damage to the network. he can make the network crash.
Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to perform the task?
he should use a scanner, which would convert an image into an electronic file
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? (516207)
header and footer
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer -- The header displays the same information at the top of each page of the document.
Which of the following is not an input device?
headphone
Communications software
helps your computer connect to a network and then work with communications standards to manage transmitting and receiving data.
Technology can lead to all of the following behavioral risks EXCEPT _____. (516071)
higher satisfaction with life
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
When you download a mobile app, the installation program installs an ______ for the app on your mobile desktop.
icon
Folder names should _____.
identify the content and purpose of the folder
Folder names should _____. (530381)
identify the name and content of the folder
source
if you are sending an e-mail message from your laptop to a classmate, the laptop is the _______
When you save a Microsoft Office file to OneDrive, where are you saving it?
in a storage area located on a server
When you save a Microsoft Office file to OneDrive, where are you saving it? (530378)
in a storage area located on a server
What happens when you delete a folder? (516009)
in goes in the trash folder or recycle bin
In a spreadsheet program, how is data organized?
in rows and columns collectively called a worksheet
Manny copied a table from a MS Excel file, closed the file, and then pasted the table in an MS Word document. Where did the copied table get stored after he copied it?
in the RAM
When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with?
incoming mail server
Celeste is preparing to lead a training session during a webinar. How can she engage the audience and encourage active participation?
incorporate polling questions
Which two factors most influenced the growth of the Internet during the 1970s?
increase in the power of computer hardware and increased funding from the National Science Foundation
Local Area Networks (LANs) _________.
increase networking speed
Social networking includes the following positive effects EXCEPT
increasing your privacy
Social networking includes the following positive effects EXCEPT _________. (530593)
increasing your privacy
Laptops, all-in-one desktops, and smartphones usually have...
internal microphones
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document? (515981)
it places a document in a buffer
The quality of an audio file is determined by____.
its bit rate
Which of the following email addresses would be the best fit for a business consultant?
3. Which of the following email addresses would be the best fit for a business consultant? [email protected] [email protected] [email protected] jefjones^[email protected]
[email protected] Rationale: Choose a user name that is easy to communicate to others verbally and that's easy to remember without trying to be humorous or offensive. Short user names, such as jeffjones, are easy to spell, easy to remember, and don't require unusual symbols.
Some mobile apps include on-screen ____________ to make typing and data input easier.
keyboards
Text that describes the contents of another cell or cells in a worksheet
label
What kind of software assists in the preparation of a will, for example?
legal
Which of the following is a characteristic of a strong password? (516081)
letters, numbers, and symbols
Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?
list of posts with the most recent ones at the top
The letters LAN stand for ______ Area Network.
local
Which of the following storage locations does NOT give you access to your files over the Internet by default?
local Hard Drive
Two of the computers at work suddenly can't go online or print over the network. The computers may be trying to share the same IP address.
logging off one of the computers, and then logging back on
TIFF, PNG, and GIF files can be compressed using _____ compression, so the files contain all of their original data when uncompressed.
lossless
Type of compression used in JPEG files where some of the original file data is discarded
lossy
Which of the following operating systems includes a virtual assistant? (530384)
macOS
You can typically go to the ______ Web site to download the latest versions of device drivers for your computer's peripherals.
manufacturer's
GPS and ____________ apps help you get directions and avoid traffic jams.
mapping
To watch video on a computer, you need special hardware plus software known as a _____.
media player
To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. (530595)
meeting invites
To observe professional messaging guidelines, you should avoid using the following EXCEPT
meeting invites
citizen journalist
members of the public who report on current events
Which of the following features is a way to make a computer do what you want it to do? (530401)
menu
Which of the following features is a way to make a computer do what you want it to do?
menu
Adrian is having a problem with setting up a new printer in his office, and he can't find the answers to his questions in the owner's manual. Which of the following resources would be the best place for Adrian to ask his questions and get targeted responses?
message board
When David posts his photos to a Facebook album, the Facebook site automatically places David's photos in chronological order by when they were taken and suggests places David might want to tag in the photos. How does Facebook know this information?
metadata
Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently? (530406)
minimize the window and then open a new one
A fitness tracker is an example of a(n) ______ device
mixed
a fitness tracker is an example of a(n) _____ device
mixed
To _______ a folder, select it and then drag it to a different folder.
move
float
moving the options bar to another area of the workspace
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
multimedia authoring
What should you do the first time you save a file? (530408)
name the file
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app -- Native apps can run even when the system is not connected to the Internet. The data is synchronized when the system gets connected to the Internet the next time.
Which of the following is a current development in networking?
need for better data storage
a computer typically connects to a router via a...
network interface card
The way the network is laid out, including all the interconnections:
network topology
WANs are
networks that cover a large geographic area
Everyone wants to avoid online predators. One good way to protect oneself is to
never give out personal information to people you have met online
The System Restore command in Windows returns deleted or modified documents.
no
Rows are typically represented by _______ and contain data for individual records.
numbers
metasearch engine
offers the convenience of searching many sources from one website
Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times.
on-demand
How can you display the main folders on a Windows computer? (530410)
open file manager
Copyrighted software whose source code is available to the public is known as _____ software. Copyrighted software, such as Linux, that is typically distributed free of charge and can be customized
open source
Windows, Apple's Mac OS, and Unix/Linux are just some of the most common
operating systems that can network.
_______ recognition converts scanned documents into editable text
optical character
instant messages
or real time messaging
Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes that apply.
organizing the storage of data accessing the Internet at the same time as other users
Digital information processed into a useful form is called _____.
output
Digital information processed into a useful form is called _____. (530396)
output
Software that is mass-produced and appeals to a wide range of users is called _____ software.
packaged
Swapping items between memory and storage is called _____.
paging
Swapping items between memory and storage is called _____. (530390)
paging
A type of network that does not use a router but shares data directly between computers:
peer to peer
A network administrator is usually not required on a _____ network.
peer-to-peer network
Cloud computing allows:
people to access information and applications from a web browser.
Trademark and copyright were first established so that
people's intellectual property would be protected
Benchmarking is an evaluation of _____.
performance
benchmarking is an evaluation of...
performance
digital images
pictures in electronic form
An operating system is also called a(n) _____.
platform
An operating system is also called a(n) _____. (530369)
platform
Operating system software, also called a(n) _____, manages computer hardware and software.
platform
______ can occur when recording words containing the letter "p" and "b".
plosives
what printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
plotter
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
plug-and-play devices
Yuri is preparing for a certification exam in his industry and needs to study. However, he has a long commute for work each day where he's driving in crowded traffic. What form of digital communication would best help Yuri put this time to good use
podcasts
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing? (530418)
portable app
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app -- Martha needs to develop an anti-virus app, which is a device management app. The app should be kept on a portable device so that it can be connected to the infected system when required.
Which of the following kinds of software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group?
presentation
which of these is not an input device?
printer
Which of the following devices can be connected to a network? Check all of the boxes that apply.
printers smartphones laptops tablet computers
Type of application software that automates common or repetitive tasks
productivity
The network backbone is not directly connected to computers. Instead, data goes through the______ first.
router
Which device is used to direct the flow of data on a computer network?
router
Rules for how routers communicate with one another and send data:
router protocols
Start a software program
run
what is the correct way to update a device driver?
run the update within the OS or the latest software from the device manufacturer's website
Talk into a microphone to "write" a report.
speech-to-text
what performance specification does 2 GHz refer to?
speed at which the processor executes instructions
The program that allows jobs like printing to be saved until the printer is ready for the next job:
spooler
Which of the following is an unethical use of the Internet?
spreading rumors or gossip about people
Programs that can track and steal your personal information and change the settings on your browser without your permission are called _____.
spyware
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standards
PSD format
stands for Photoshop Document Format, the default file format for files created from scratch in Photoshop
When all computers in a network are connected in a "star" formation:
star topology
Many mobile apps are written by third-party programmers to sell through app ________
stores
Technology that transfers only a segment of a video file at a time from the Web to your computer
streaming video
A _____ is a named collection of formats you apply to text in a word processing document. (530414)
style
A _____ is a named collection of formats you apply to text in a word processing document.
style -- A wireless remote control can be used to advance slides from anywhere without having to stand near the podium computer to do so.
The bootstrap program executes which of the following? (530392)
tests that check components such as RAM and storage
Create a voice-over narrative from a written script.
text-to-speech
Which of the following belongs in a website citation? (select all that apply)
the Internet address or web page address the person or organization responsible for the website the date when you got the information
Select the best answer to the question: Which of the following best describes e-commerce?
the ability to do business online
Which of the following is a step in the boot process? (530403)
the operating system files are loaded into RAM
display area
the portion of the document window that displays the photo or image
optimization
the process of changing the photo to make it most effective for its purpose
document window
the windowed area within the workspace that displays the active file or image
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?
through an online service
if you do not want to uIe your Internet service provider (ISP) for your email account, how can you acquire a webmail account? (530589)
through an online service
A slide _____________ is a miniature image of a slide.
thumbnail
Method used in editing video, using separate tracks for video and sound
timeline
zoom
to change or adjust the magnification
How might a business use a blog? (516518)
to communicate with customers
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
crop
to cut away some of the extra background in the editing process
Which of the following are goals of e-government? Check all of the boxes that apply.
to have a secure website to be able to protect the personal information of the people who use the site to make information about the government available
A hierarchical addressing scheme is used
to identify computers on the network.
Which of the following are uses for application software?
to make users more productive
A file manager is used for all of the following except ____. (516013)
to name files and folder
A file manager is used for all of the following except ____.
to name files and folders
resize
to scale or change the dimensions of the photo
A router sends data
to the correct computer. where it should go. based on the data's destination.
Where can you pin frequently used apps for easy access? (530404)
to the task bar
Where can you pin frequently used apps for easy access?
to the taskbar
An _____________ is an action that occurs as you move from slide to slide in a presentation.
transition
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation? (530425)
transitions
Graphics that help a viewer know when one scene ends and another begins are called _____ .
transitions
A device driver is a program that controls a device attached to the computer.
true
Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved.
true
Each slide in a presentation has a layout that includes placeholders for certain types of content. (530423)
true
If you add a slideshow to play as your desktop theme, you have customized your system software. (515985)
true
It is advised to fully charge the battery of a laptop before using it for the first time.
true
Local applications can be accessed only on the computers on which they are installed. (516189)
true
Output methods include speakers, headphones, and interactive whiteboards. (515983)
true
Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.
true
When you add information to a word- processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage. (530368)
true
What is an easy way to cut down on spam?
turn on the spam filter in your e-mail
Which property is assigned to a file by the operating system? (516027)
type
asynchronous
type of communication, such as blogging, where authors and readers do not need to be online at the same time
How is an executable file different from a data file? (515968)
unlike a data file you cannot open and read executable files
A network that anyone can access
unsecured network
What is spam? (select all that apply)
unwanted communication can be inappropriate or harmful
Computer viruses are:
unwanted programs that may harm the computer.
Install a newer version of your current software program
upgrade
How can you check data on devices connected through an IoT network? (530422)
use a tablet
How can you check data on devices connected through an IoT network?
use a tablet -- All IoT objects send or receive data to and from other devices. You can see the data sent or received using your mobile device or tablet, using an app designed to do this.
Productivity software that is customized for specific industries
vertical market
The Moving Pictures Experts Group (MPEG) is a popular _____ standard.
video compression
The person responsible for the creation of the group known as ICANN is
vinton cerf
You should set your _____ software to scan any incoming messages and programs to protect your computer. Software that scans incoming messages and programs to protect your computer
virus protection
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
visual basic -- Web apps rely on HTML5 to display information, CSS to format information, and JavaScript to manage app performance.
What does an operating system provide so you can interact with a device?
(GUI) Graphical user interface
What is the most common type of volatile memory?
(RAM) Random Access Memory
What are the steps to the communication process?
1. your computer or mobile device is the communication source 2. modem converts the message to electronic signals 3. communications channel such as cable TV line or fiber optic cable transmits the signals 4. receiving device, such as another modem converts the signal into an email message 5. destination device, such as a server accepts the message 6. server repeats the process to send the message to your classmate's computer or mobile device
What is the correct order for e-mail process
1. your e-mail program uses your internet connection to send your message to your e-mail server 2. the e-mail server determines the best route for the message and sends it to the first in the series of router along the path 3. the router sends the message to the recipient's e-mail server 4. the e-mail server stores the message into the recipient's mailbox 5. the recipient checks for messages, and the e-mail transfers the message to his or her e-mail program
Consider e-mail as public communication
DO
Read your messages before sending them to evaluate spelling, grammar, and tone
DO
Treat others as you would like to be treated
DO
Use all capital letters in messages and comments
DON'T
Use wording that might seem offensive or argumentative
DON'T
Technologies that include encryption to make digital content unreadable without a valid encryption key _____ technologies help to fight software piracy and prevent unauthorized copying of digital content.
DRM
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
DTP
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?
Data Analysis
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
Drawing App
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
Drawing app
[email protected] an appropriate email address to use for communicating with potential employers. (530598)
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
False
In Windows, the only way to copy or move files is to use the Clipboard.
False
Netiquette only applies to social media and social networking, not emails and instant messaging. (516528)
False
Operating systems can run only if they are installed on a hard drive.
False
RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
False
The only way to create a PDF file is in document management applications.
False
To prevent a laptop from being stolen, you can use a surge protector. (530438)
False
Twitter is an example of a wiki, which allows for collaborative editing by its users.
False
Most people used the Reply All button.
Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem?
What is the correct sequence of processing instructions in a machine cycle?
Fetch decode execute store
In Windows, you use _____ to reorder, move, and navigate between folders.
File Explorer
What can you do to make sure your online communications are civil and productive?
Follow netiquette guidelines.
An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other?
G Suite
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider? (530429)
G Suite
A feature to identify a picture's geographical location is known as___.
Geotagging
If you wanted to use information you found on a website, how could you do that in an ethical way? (select all that apply)
Give credit to the person or organization responsible for the site. Cite your sources.
A digital movie shows characters creating an illusion of natural motion, 360 degrees rotation, and life-like and dynamic experience on the screen. This movie most likely a(n)_____ movie.
3-D animation
Restricted Sites
A Web site that requires a subscription or other type of membership; many library sites are restricted
WiMAX or 802.16 standard
A communications standard that allows wireless communications across distances up to 30 miles
Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?
A device management portable app
How can you protect personal information gathered by legitimate organizations? (530431)
Create a separate email account for receiving information from websites.
What would a password manager allow you to do? (516101)
Create and store passwords.
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?
Create trendlines
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do? (516212)
Create trendlines
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT____.
Creating malware
Who enforces PCI compliance for merchants who accept credit card payments from customers?
Credit card companies
When you choose a(n) ___________ installation, you only install selected features, rather than all of the features associated with a software program. Software designed to meet the unique needs of an organization or business
Custom
Which of the following statements is NOT true about a local firewall?
A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system
Why is a fragmented disk slower than one that is defragmented?
A fragmented disk has many files stored in noncontiguous sectors.
Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?
A graphics app to design the cover page and place the desired text where needed
Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? (530597)
A lists of posts with the most recent ones at the top
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer Service Rep
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?
A photo of you horseback riding on the beach with friends
What is an ISP?
A telecommunications company that sells Internet access.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? (530427)
A:Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future? (530416)
A:Use vector images because they retain their clarity even when enlarged or shrunk.
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?
AI
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
The first network was called
ARPANET
How can you protect your information when using social media?
Accept friend requests from people you want to be friends with.
Brian needs to use an expensive application that his work provides on his computer at the office. However, he's traveling with his laptop and won't be back in his office for another week. Then Brian remembers his employer also makes the application available to employees through the cloud. What does Brian need to do next to use this application?
Access the application through his laptop's browser.
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
Active windo
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?
Adjust the settings for the mouse through the control panel.
Which of the following requests to Alexa is most likely to get the desired result?
Alexa, play Journey songs on Pandora.
When data in a spreadsheet program is changed, what occurs?
All calculations can be recalculated.
Search for other people on the site she might already know and add them to her friends list
Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list?
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your computer.
How can an attacker execute malware through a script? (516095)
An attacker can • attach a script to a program that you download which then infects your computer.
email client
An email program you use to send and receive email messages
Webmail
An email system in which users set up an account through an online service and then access email messages using a Web browser
In which of the following messages would the abbreviation brb NOT be appropriate
An email to a customer
Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
Android
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone? (530411)
Android
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android -- Amazon's App Store has apps only for Android users.
A series of images displayed in sequence to create the illusion of movement is called_____.
Animation
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?
Apache OpenOffice
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
Application
Computer-aid design(CAD) software helps architects,engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?
Artificial intelligence and machine learning
You type out a few sentences in an MS Word file, and save it on your desktop. How is this data stored in the computer?
As a combination of 1s and 0s
Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format?
As a list of the color numbers for all the pixels it contains
Jeanne writes a song, and Raul wants to perform it. What should Raul do?
Ask Jeanne for permission to use her song in the show.
Which of the following is NOT an example of modern-day artificial intelligence (AI) application?
Asking droids for critical information during a hyper-space mission
_____Programs and features are often integrated into video editing software.
Audio-editing
_____ ensures that the person requesting access to a computer is not an imposter. (530440)
Authentication
How will you decide which browser security settings to allow and which ones to block? (516094)
B:I will need to review each browser security setting and use my best judgement.
You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this
BCC your supervisor in your response
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? (530436)
Be cautious about what information she posts
Which of the following statements is true about the Clipboard?
Because he is using the same name, each time he saves he is overwriting his previous work. (The purpose of clipboard is to hold the file until you paste it.)
You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breech was done by an insider. Why would the company investigate the possibility of the breach being from an insider?
Because insiders create threats after incidents at their place of employment.
Why is it not safe to connect to public Wi-Fi networks? (530434)
Because these networks are rarely protected
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? (516527)
C:A photo of you horseback riding on the beach with friends.
How is a worm different from a Trojan? (516098)
C:A worm spreads through a network, whereas a Trojan hides inside another program
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? (516214)
C:Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.
Which of the following is an example of someone who is NOT practicing good netiquette? (516526)
C:Vance found • pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
Which of the following helps you more easily locate the files and folders you need? (530382)
C:grouping similar subfolders together in a folder
When you want to add information to a document, what role does your operating system play? (515961)
C:saves your unsaved work to temporary storage
Software used by architects, scientists, designers, and engineers to create technical drawings
CAD
Software necessary for a blog
CMS
Jake
CRM
Block the person
Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing?
Patricia has started a new interior designing business. Her top five tasks are creating designs, sharing them with her team and potential clients, making presentations for potential clients, sending and receiving payments, and carrying out marketing on social media. Which of the following sets of apps should she use?
Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? (516205)
D:Apache Open Office
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
Conditional formatting
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? (516211)
Conditional formatting
What are the two important components of CPU that help in processing the input into output?
Control Unit and Arithmetic Logic Unit
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers and vendors.
4. Which of the following is the most secure SSID for a wireless network at a family residence? Yellow door Linksys GoVols Thompson family Wi-Fi
GoVols Rationale: The name of a wireless network, referred to as the SSID (Service Set Identifier), should be generic and not contain information such as the owner's name (such as Thompson family), address or other location identifiers (yellow door), or model of the router (Linksys). Generic names might include something of interest to the owner (such as GoVols) so long as there are no indications outside the residence that would match this interest to the Wi-Fi's location.
Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?
HIPPA
You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT
HTML
What is the primary difference between HTML5 and adobe flash types of web animations?
HTML5 does not need the user to download additional plug-in software, unlike adobe Flash.
Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?
He can remotely collaborate with teammates on projects, deadlines, and events.
Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. Which among the following options will help him achieve this?
He can use a TV stick.
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? (516078)
He can use remote wiping to retrace the thief's steps
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief's steps.
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
He should make sure to bring a tablet.
Ryan wants to install a new operating system on his laptop, but first he needs to safely store all his data - over 80 GB - so he doesn't lose any of his files. How should Ryan back up all his data?
He should use an external hard drive to store the data because the amount of data he needs to store is quite large.
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
Header and Footer
Technology can lead to all of the following behavioral risks EXCEPT____.
Higher satisfaction with life.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
One of the biggest changes to the usability of the Internet for people was the ability to use an easy way to remember site addresses. Which of the following was responsible for this?
ICANN
Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
IaaS
Folder names should _____.
Identify the contents and purpose of the folder
16. Which of the following items is NOT required to have a functioning network? Software Data Hardware Internet
Internet Rationale: Many—but not all—networks are connected to the Internet.
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
What is one advantage of a company using an anonymous messaging app? (516546)
It allows for honest feedback without disclosing identities.
What is one advantage of a company using an anonymous messaging app
It allows for honest feedback without disclosing identities
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? (516545)
It allows the company to communicate to many users at once about an issue and release status updates.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? Group of answer choices
It allows the company to communicate to many users at once about an issue and release status updates
During the boot process, what does the processor do after the computer circuits receive power?
It begins to run the Bootstrap Program
Which outcome is one of the negative consequences of anonymous communication over the Internet?
It can lead to harassment and bullying.
Which of the following is not a step an operating system performs when printing a document?
It creates the document to be printed.
What happens when you delete a folder?
It goes the Recycle Bin or Trash folder
What happens when you delete a folder?
It goes to the Recycle Bin or Trash Folder
Which of the following statements describes antivirus software?
It identifies and removes viruses in computers.
Why is the date a file was modified useful?
It identifies the most recent version
Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.
It includes different parts that represent the location of a computer or device on a network. It is used for IP addresses.
Identify the disadvantages with wireless. Check all of the boxes that apply.
It is easier for unwanted intruders to access the network. The network takes some expertise to set up Interference can change how well devices connect.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer had been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.
It keeps the public informed about events in the town. People can pay bills. The government can share important information about issues with the people in that town
What does the operating system do if you try to save a file with the same name into the same folder?
It overwrites the original file unless you add a number, date, or initials to differentiate the files
What does the operating system do if you try to save a file with the same name into the same folder?
It overwrites the original file unless you add a number, date, or initials to differentiate the files.
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
How does encryption work? (516084)
It scrambles the key is used to unscramble it.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices. -- An app designed to give its users great experience on all devices should be available as both native and mobile apps, with a responsive design.
Which of the following statements describes spyware?
It tracks users' behavior online.
Which of the following statements describe encryption? Check all of the boxes that apply.
It turns data into cipher text. It makes data unreadable without a decryption It helps secure data. key.
Which best describes the significance of ARPANET?
It was the first WAN.
Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?
It will make the AI system sound more human.
Who first thought of the "galactic network?"
J. C. R. Licklider
Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do no experience a lag in loading of the website because of high-quality images?
JPEG
Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images?
JPEG
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website? (530424)
JPEG
WPA2 encryption
Kabir is buying a new wireless router and wants to make sure his Internet communications are private. What feature should the new router include?
In terms of privacy, which of the following is a best practice? (516079)
Keeping your Social hidden in a locked box in your home
Which of the following is not a hardware device that controls the movement of the pointer on a computer screen?
Keyboard
Overheating caused by direct sunlight can damage the _____. Select all that apply.
LCD screen, hard drive, processor
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client?
Laptop
How does discarding computers in a landfill affect the environment? (530430)
Lead and mercury in computer parts are seeping into the ground and water supply.
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
Make the program available as a web app
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
Make the program available as a web app. -- Web apps run in browsers and their files are stored on the cloud. Users can access them from anywhere on any device that has a web browser.
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office? (516187)
Make the program available as an app
Prepare the background area behind his chair.
Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview?
Which of the following statements is true about public networks?
Many public networks are not secure.
Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her?
Mason said a wake word
How would you describe the social networking site YouTube?
Media-sharing
Tags
Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos?
Which of the following features is a way to make a computer do what you want it to do?
Menu
25. Which network topology is most likely to continue to function well even if one device fails? Star network Ring network Bus network Mesh network
Mesh network
23. Which of the following devices is most likely owned and provided by the ISP? Router Modem Switch Hub
Modem
2. Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website? More control of the blog's content More expensive More branding consistency More exposure
More exposure
Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future?
More information about his needs
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
My Verizon VPN
21. Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem? VPN PAN NAS WAN
NAS
18. Mick's computer has been having trouble connecting to his wireless network. Sometimes it will connect and then loses the connection within a few minutes. Sometimes he can't get it to connect at all, even when the wireless router is just a few feet away from the computer. Mick's smartphone connects to the network fine, though. What network device most likely needs to be replaced? NIC Router Ethernet cable Modem
NIC
What technology allows Siri to understand you when you request a route to a location in a nearby city?
NLP
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?
NOT Go to the Start menu or Dock to see if the operating system saved it there
Which of the following statements is true about the Clipboard?
NOT It is temporary storage until you choose to remove it, even if you have already pasted it somewhere. A temporary Windows storage area that holds the selections you copy or cut so you can use them later.
During the boot process, what does the processor do after the computer circuits receive power?
NOT It loads the operating system into RAM.
If you delete a shortcut from your desktop, have you also deleted the original file?
NOT No, because a shortcut is just an organizing icon for apps and files.
Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently?
NOT Point to the title bar of the open window, and then drag the window to a new location
The part of a worksheet that displays the cell address of the active cell
Name box
What should you do the first time you save a file?
Name the file
What should you do the first time you save a file?
Name the file.
You can configure your wireless router to protect your devices in all of the following ways EXCEPT____.
Naming your router something you'll remember, like your street address.
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop? (516192)
Native app
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the internet. What type of app should he develop?
Native app
17. When an ISP throttles, or slows down, one customer's very busy Internet activity so that other customers don't experience slower Internet service, what concept is being challenged? Social engineering Freedom of choice Net neutrality Network security
Net neutrality
Which of the following statements describe network backups? Check all of the boxes that apply.
Network backups help secure networks against failure. Network backups are usually done nightly.
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
Which of the following are disadvantages of networks? Check all of the boxes that apply.
Network intruders can access all computers on a network. Networks are costly to set up
Which of the following statements best describes network security?
Network security protects individuals' privacy.
For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
Omnichannel strategy
credit line
On a Web page, a line of text near a photo or other reproduced content that states its source and any necessary copyright information
Using which of the following methods of accessing media does the user access an original file stored on the media distributor's server?
On-demand content
Digital information processed into a useful form is called _____.
Output
You are experiencing some problems with your operating system on your desktop and want to repair some problems with your hard disk. Which of the following will you use?
PC Maintenance Tool
Crowdsourcing
Paulo is trying to organize groups to clean a river, which has become clogged with plastic products after a recent storm. Which of the following social media tools can he use in his organizing efforts?
Which of the following is a trend in Internet computing?
People are using a greater number and variety of apps to help them do everyday things.
How can people check whether information they found on the Internet is reliable?
People can determine if what they read agrees with other information they know is true.
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing
The default libraries in Windows 7 are Documents, Music, __________, and Videos.
Pictures
What best describes the difference between plagiarism and fair use?
Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.
An operating system is also called a(n) ________.
Platform
11. Yuri is preparing for a certification exam in his industry and needs to study. However, he has a long commute for work each day where he's driving in crowded traffic. What form of digital communication would best help Yuri put this time to good use? Online conferencing Podcasts Voice-to-text Email
Podcasts
Popular presentation software that includes a video player
PowerPoint
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
Program window
What concerns are there about open source programs? (516015)
Programmers will add malicious code to damage a user's system.
What concerns are there about open source programs?
Programmers will add malicious code to damage a user's system
If several programs or apps are running simultaneously, your computer or device might use up its available _____. (530388)
RAM
If several programs or apps are running simultaneously, your computer or device might use up its available _____.
RAM
Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work?
RPA
NAS
Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem?
Which of the following is typical content for a podcast?
Radio shows
Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment?
Rapid Elasticity
Alejandro has a computer with a powerful processor on which he plays a game where he controls the characters' movements. The game produces at least 1 billion bits of information at 60 frames per second for display. Which of the following kinds of gaming is this an example of?
Real-time animation
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?
Receiving clerk
If you delete a folder by mistake, you can restore the folder using the _____________. Not emptying this lets files remain on your computer and take up space
Recycle Bin
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?
Reinforcement learning
Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements?
SaaS
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using
SaaS
PoE
Sandhya is installing a security camera at the entrance to her office. The camera needs power and network access, but there's no power outlet near the door. What technology can Sandhya use to get power to the security camera?
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive.
When you want to add information to a document, what role does your operating system play?
Saves your unsaved work to temporary storage
Include information that's been written and researches thorougly
Scholarly Sites
Published by professionals for professional audience
Scholarly Sites
provide access to articles and book that analyze events and place them in historical perspective
Scholarly Sites
What was the original intention for the creation of ARPANET?
Scientists could share information and collaborate.
Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list?
Search for other people on the site she might already know and add them to her friends list
Modern processors often have ____ levels of cache.
Three
Who came up with the idea for hypertex?
Tim Berners-Lee
12. When scheduling a conference call for people in different parts of the world, what factor complicates scheduling the call? Federal laws Weather patterns Email servers Time zones
Time zones
What technology can be used by people with a hearing disability to listen to a narration?
Speech-recognition
19. Quincy's password was recently stolen by a hacker who used a keylogger to capture Quincy's password as he entered it on his computer. What kind of malware is a keylogger? Worm Spyware Trojan Ransomware
Spyware
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
Which of the following terms refers to the area of the hard drive used for virtual memory?
Swap file
Video- sharing sites such as Youtube and Vimeo provide a place to post short videos called clips
TRUE
You can use Facebook's Live Feed tool to broadcast content as you post it
TRUE
Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos
Tags
Text messages containing bad news
Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work?
What is a digital certificate?
Technology used to verify a user's identity.
24. What kind of cable is connected to a DSL modem on the ISP's side of the device? TV cable Ethernet cable Telephone cable Power cable
Telephone cable
What should you use to stay informed about major events?
Television, radio, and other media print newspaper and news apps
The bootstrap program executes which of the following?
Tests that check components such as RAM and storage
You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. (530601)
The HTML coding
Word Stem
The base of a word, used in a Web search to broaden a search
When a document contains text displayed in 10-point Cambria, to what does the 10-point refer?
The font size
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
The had to unzip or extract it
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection.
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.
How is the environment impacted by computers being thrown away in landfills?
The lead and mercury is seeping into the ground and water supply.
email server
The main computer in an email system, which routes messages through the Internet or a private network
Which of the following is a step in the email communication process
The message travels along Internet routers to the recipient
The agency that started ARPANET was looking for technologies that could be used by
The military
Ethics
The moral principles that govern people's behavior; many schools and other organizations post codes of conduct for computer use, which can help you make ethical decisions while using a computer
Which of the following is a step in the boot process?
The operating system files are loaded into RAM.
Fair use doctrine
The part of copyright law that allows you to use a sentence or paragraph of text without permission if you include a citation to the original source
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
Which of the following are security dangers to using the Internet at work? Check all of the boxes that apply.
There is greater potential for data loss. Security breaches can occur. Viruses can get into the network.
Which of the following statements describe cookies? Check all of the boxes that apply.
They can be removed from a computer. They are mostly harmless and useful.
Which of the following statements describe computer firewalls? Check all of the boxes that apply.
They check incoming packets to make sure that they have the right credentials. They check the behaviors of packets.
Which of the following statements are true of network packets? Check all of the boxes that apply.
They contain control information. They contain user data. They are sent over a network.
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin.
Cloud computing and the Internet are two different technologies.
True
Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously.
True
The connector on a USB flash drive allows transmission of both data and power.
True
To use applications, a computer must be running an operating system.
True
When you add information to a word-processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage.
True
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
True
Word processing software includes a spelling checker, which reviews the spelling of individual words, sections of a document, or the entire document.
True
True or False
True: A slide can contain a link to another slide, another document, or a Web page. You can set the duration of an animation. Most presentation software lets you post and share presentations online. False: You cannot change the direction of the transition. The 6x6 rule means to keep all objects smaller than 6 inches tall and 6 inches wide.
External hardware can be connected without wires or cables.
Ture
Which property is assigned to a file by the operating system?
Type
CMS
What kind of software do you need to create a blog?
Net neutrality
When an ISP must provide the same level of service to all websites, regardless of their content or purpose, what concept is being supported?
Incoming mail server
When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with?
When does the boot process start?
When you turn on your computer
The trademarked name of the accepted standard for configuring wireless networks is .
WiFi
What is the name of the type of connection standard used in wireless networking?
WiFi
WAN stands for
Wide Area Network.
1. Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? Blog Email Podcasts Wiki
Wiki Rationale: A wiki is a collaborative website that lets several users create, add to, change, or delete content through a web browser.
Listen to music files on your computer.
Windows Media Player
Which of the following operating systems includes a virtual assistant?
Windows and macOS
What does WLAN stand for?
Wireless Local Area Network
What type of network sends signals through airwaves and usually does not require cables?
Wireless network
Which of the following devices can be used to advance slides without having to click a button on the laptop?
Wireless remote control
A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?
With simulators using motion-sensing consoles
Solid state hard drives are a type of _________ memory
Yes
In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?
VOIP
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
Which of the following kinds of information can be commonly inferred from a video file format name?
Video codec compatibility
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
Video conferencing application
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel
Virtual private network
Which of the following audio formats does not use any compression technique?
WAV
Which of the following is NOT a leading provider of PaaS and IaaS services?
Walmart
Which of the following would be considered a strong password?
Wbcm2!4!820!
Which of these e-commerce job roles could most likely be performed remotely from home or even from another country? Group of answer choices
Web Developer
An advantage to _____ is that you always have access to the most up-to-date version of the software without paying for an upgrade. Type of software where some applications are free, some require a one-time registration fee, and some require a periodic subscription charge
Web apps
A digital video camera that captures video and sends it directly to a computer
Web cam
A stylus is an input device.
yes
Compressing a file is also called _____ the file
zipping
Compressing a file is also called _____ the file. (530376)
zipping
In which of the following situations is a digital certificate useful? (530435)
You are signing a rental lease
Which of the following is NOT an advantage of saving documents in the cloud?
You can access the documents when you are not connected to the Internet
Which of the following is not an advantage of saving documents in the cloud?
You can access the documents when you are not connected to the Internet.
Which of the following is an advantage to saving a file to a flash drive?
You can take it with you and then work on it on another computer.
During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name?
You'll access this service over the Internet.
Compressing a file is also called _____ the file.
Zipping
social network
a Web site where members share interests, ideas, and information
What does the URL ending .com mean?
a business website
wiki
a collaborative Web site that people use to communicate with each other
panel
a collection of graphically displayed choices and command related to a specific tool or feature
stroke
a colored outline or edge
A client is
a computer that requests a service.
border
a decorative edge on a photo or a portion of a photo
which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
a desktop computer
What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer?
a faulty port
marquee
a flashing or pulsating border
moderator
a forum temporarily saves messages and often uses a ______ to approve messages before they are posted for others to read
Tools panel
a group of tools, or buttons, organized into a toolbar
submenu
a menu that displays another list of command when you point to, tap, or click a command on a menu
TCP/IP
a network protocol that defines how to route data across a network
Intellectual property issues cover many different types of creations. Which of the following are intellectual property? Check all of the boxes that apply.
a newspaper a student's diary the script of a play a painting hanging in a museum
photograph
a picture taken with a camera and stored as a digitized file
Photoshop Creative Cloud
a popular image editing software program produced by Adobe Systems Incorporated
tweet
a post to mircoblog such as Twitter
app (application)
a program designed to make users more productive
real-time messaging
a system that lets people exchange short messages while they are online is called a ________ system
file extension
a three or four letter suffix after the file name that distinguished the file type
tool icon
a tool on the Tools panel
wiki
a type of web page that a group of people can comment and make changes to
blog
a web page listing journal entries that provide commentary and information, usually about a particular interest
A(n) _________ refers to a fixed cell location that never changes.
absolute reference
Which of the following does cloud computing allow users to do? Check all of the boxes that apply.
access data from anywhere with the Internet connection store pictures and music store data
status bar
across the bottom of the document window and contains a magnification box
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows. (530372)
active window
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
active window
How would you design a webinar that would be interactive?
add a poll
How would you design a webinar that would be interactive? (516539)
add a poll
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following? (515988)
adjust the settings for the mouse through the control panel
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips? (530417)
adobe primere clip
Select the correct description of adware.
advertisements used in programs
Displays unsolicited advertisements in banners or pop-up windows
adware
A business can use a wiki in the following ways EXCEPT _____. Group of answer choices
aggregating content
A business can use a wiki in the following ways EXCEPT _____. (530591)
aggregating content
The document formatting feature you use to make paragraphs line up with the left side of the page
alignment
Select the item in the drop-down menu that best describes social networking:
allows users to find others with similar interests
podcast
an audio file distributed through downloads or feeds
Which of the following is an example of a payload?
an email message
A future trend of data storage is sure to be
an increase in cloud computing
What are some current and future trends for network technology? Check all of the boxes that apply.
an increase in the number and types of devices an increase in the number and types of applications an increase in the use of the cloud
blog
an informal Web site of time-stamped articles written in a journal format
You can apply _________ to add movements to slide text and objects.
animation
A wireless mobile device is set up so that it can receive a signal
anywhere its service broadcasts and it can receive a signal.
application bar
appears at the top of the workspace
options bar
appears below the Application bar
shortcut menu
appears when you press and hold or right-click a specific object in the Photoshop workspace
Eliminate unwanted background noise from your sound file.
audio-editing
What is missing in this list of information needed to cite a journal article? Title, journal title, edition, volume number, date, page numbers
author's name
which of the following refers to a condition in which the CPU performs well but the bus speed is slow?
bottlenecking
A network technology with a higher bandwidth than older technologies is called
broadband
The intersection of a single row and column in a worksheet
cell
A _______ describes the location of a cell based on its column and row location.
cell address
A worksheet is made up of _____ organized in a grid of rows and columns.
cells
Which behaviors should be avoided because they are wrong or illegal?
changing other people's files without permission
What are examples of synchronous communication?
chat groups, web conferencing, and VoIP
What is missing in this list of information needed to cite a book? Author, title, date, publisher
city and state where it was published
Computer that uses the service provided by a server:
client
In a network, servers receive requests from which of the following?
clients, which are the networked computers that request data.
A _____ is technology used to compress/decompress video files.
codec
What is the main benefit of a Wiki website?
collaborative content authoring
To navigate folders, you can expand and ______ them to display and hide their contents.
collapse
image-editing software
computer apps and programs that allow you to create and modify digital images
Which is the best definition of a network?
computers and hardware connected so that they can share data
A network packet contains two kinds of information. What are they?
control information and user data
Paulo is trying to organize groups to clean a river, which has become clogged with plastic products after a recent storm. Which of the following social media tools can he use in his organizing efforts?
crowd sourcing
some software lets you choose between standard and ______ installation
custom
What does network administration normally include? Check all of the boxes that apply.
design of the network security for the network documentation identifying and fixing issues
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
Reorganizes the data on a magnetic hard drive so that you can access files more quickly
disk defragmenter
panel group (tab group)
displays several panels horizontally
in which of the following storage device(s) does memory need to be constantly recharged to retain the contents?
dynamic RAM (DRAM)
Which of these improved the ability to send information over the network in the 1970s?
ethernet
A(n) _____ contains the instructions your computer or device needs to run programs and apps. (515966)
executable file
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
What is the term for the exception to copyright that allows you to use copyrighted work without permission?
fair use
All cloud technologies must be accessed over the Internet
false
Before you can open and edit a compressed file, you need to zip it. (516025)
false
In Windows, the only way to copy or move files is to use the Clipboard. (530380)
false
Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information
false
Netiquette only applies to social media and social networking, not emails and instant messaging.
false
Big data is processed using relational databases
false -- Big data is a large collection of data, usually unstructured, which cannot be processed using relational database model.
the root directory is the main list of...
files and folders on the drive
social search tool
finds subjective content, such as comments, reviews, and opinions
Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?
gamepad
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?
he should have periodic anti-virus scanning and software upgraded on all computers.
A ______ connects many different Ethernet devices and forwards packets to all connected devices.
hub
Which of the following is the most common cause of network failure?
human error
Text within a document that is linked to other information available to the reader:
hypertext
A(n) _____ is a small picture that represents a program, file, or hardware device. (530375
icon
site:www.apple.com social networking
information about Apple's social networking technologies
_____ is data and instructions entered into the memory of a device. (530394)
input
For downloaded software, the details of the software license usually appear during ______.
installation
where on a computer is the operating system generally stored?
internal hard-drive
DARPA was created to:
investigate technologies for the military in the US.
During the boot process, what does the processor do after the computer circuits receive power? (530391)
it begins to run the bootstrap process
Why is the date a file was modified useful? (516002)
it identifies the most useful version
An ________ lets you access files from different folders as if the files were stored together.
library
You adjust this to control the amount of white space in between rows of text
line spacing
Which of the following operating systems would allow a user to add functionality and sell or give away their versions? (515965)
linux
Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance.
malware
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
To access the Internet, a router must be connected to a _____.
modem
Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website?
more exposure
Which of the following are examples of pointing devices? Select all that apply
mouse touchpad
Who did the IAB ask for ideas about how people should behave on the Internet?
other users
social netork
pages about social networks, social networking, and a social network
"social networking sites"
pages about the exact phrase, social networking sites
P2P stands for
peer to peer
Devices on a _____ area network are connected via Bluetooth.
personal
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?
phishing
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? (516089)
phising
The illegal copying and distribution of copyrighted software is known as ______.
piracy
When publishers load software on a computer before selling it
preinstall
Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview?
prepare background
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? (530442)
pretexting
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? (530373)
program window
Software is written by software developers using computer-readable code called a(n) _______.
programming language
Which is the most suitable device to use in a classroom or a conference room to deliver presentations?
projector
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
property
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
No one can apply for a copyright on _____ software, and users are free to copy, modify, and resell this type of software. Software whose ownership rights are public property, and which is available to anyone at no cost
public domain
Which of the following uses of the Internet is unethical?
purchasing vacation flights online during work hours
The order in which certain jobs, such as print jobs, are received:
queue
Identify the examples of ethical behavior. (select all that apply)
quoting a website's information and citing the source making sure that the information is accurate
Which of the following is typical content for a podcast? (530588)
radio shows
What is the most common type of volatile memory?
random access memory (RAM)
What is the most common type of volatile memory? (530387)
random access memory (RAM)
A group of adjacent or nonadjacent cells
range
RAID stands for...
redundant array of independent disks
resolution
refers to the number of pixels per inch, printed on a page or displayed on a monitor
With more and more people using technology, what physical health diagnosis is on the rise? (516097)
repetitive strain injury
During the infection stage, what three actions does a computer virus typically perform?
replicate itself, conceal itself, activate when a condition or event occurs
Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem?
reply all button
If the image seems stretched, your computer's display may not be set to the default _____.
resolution
The clarity or sharpness of an image is called _____.
resolution
if the image seems stretched, your computer's display may not be set to the default...
resolution
The TCP/IP protocol was invented by
robert kahn and vinton cerf
In the email communication process, what is the role of the email server?
route emails through the internet
Equipment that directs data to the right location:
router
Routes data where it is meant to go
router
Creative Commons allows creators of intellectual property to
say how others can use their work.
How can you get the attention of a personal assistant app on your phone?
say the wake word
Device that converts a printed document into a bitmap file and assigns colors to each cell
scanner
Flatbed, sheet-fed, pen, and handheld are types of _____.
scanners
What was the original reason for the creation of ARPANET?
scientists and researchers could communicate and share information
A network that only people who have the right credentials can access
secured network
Which of the following best describes the path of a network packet on the Internet?
sender, router 1, router 2, router 3, receiver
The computer that responds to requests from the client computer:
server
online reference
service that connects you with a human librarian
You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?
share the post on your news feed
Creative Commons allows the creator of an artistic work to
share the work in the way she chooses to
Information or devices that can be accessed remotely from another computer:
shared resources
Small developers often use the _____ model as a low-cost distribution method.
shareware
On what type of network can you rent things such as cars, tools, and rooms? (530600)
sharing economy network
Which of the following are items that are concerns for e-government? Check all of the boxes that apply.
sharing information with people sharing trustworthy information keeping personal information safe
Which of the following increases or decreases how crisp the objects in a photo appear?
sharpness
What does e-commerce allow people to do? Check all of the boxes that apply.
shop online securely order items on the Internet set up an online store
pixel
short for picture element, is a single dot or point in a graphic on the screen
LANs are
short ranged networks that increase speed of the network
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her? (516029)
show her how to use file manager
Type of license agreement for packaged software, which is activated when you open the package
shrink wrap license
bounding box
similar to a text box in other applications, with a dotted outline and sizing handles
Wikis are
sites that allow for collaboration between many people
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? (530413)
slide master
Presentation software lets you create _________ to display your messages or ideas.
slides
Mobile technologies access the network and are recent inventions. What are mobile technologies? (select all that apply)
smartphones laptops tablets netbooks
Which of the following is an example of a personal area network?
smartwatch and phone connected via Bluetooth
you should unplug your computer if you...
smell burning or see smoke rising from it
What sites would you use to verify facts?
snopes.com and factcheck.org
Hayley is an accessibility advocate at a small college and frequently shares information with her co-workers about how to better accommodate students with learning challenges. The college president has complimented her efforts and asked her to find ways to make this information more readily available and better organized for new, incoming instructors. What kind of site might best help Hayley achieve this goal?
social curation
In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? (516541)
social curation sites
In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? Group of answer choices
social curation sites
Which of the following types of websites typically provides the least security? (530444)
social media sites
related:www.faceboook.com
social networking sites other than Facebook
The programs used to run the network
software
Software as a Service (SaaS) allows users to remotely access which of the following? Check all of the boxes that apply.
software data applications
Government agencies work to catch people who engage in software piracy, and_______ can also help to stop them by filing lawsuits.
software producers
Software piracy occurs when
someone steals software.
Which of the following terms refers to the area of the hard drive used for virtual memory? (530389)
swap file
A ______ connects network devices or different parts of a network and forwards messages to specific recipients.
switch
Your new calendar application allows you to make sure that your mobile device and your corporation's server both have the latest version of any updated information. What is the term for this capability?
synchronization
online
synchronous communication means that everyone who is communicating must be _______ at the same time
Type of software that is categorized as operating system (OS) software and utility programs The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it on.
system
What type of connection did networks use to communicate in the 1960s?
telephone
The bootstrap program executes which of the following?
tests that check components such as RAM and storage
Shadowing and reflection are examples of this
text effect
Troubleshooting is
the act of trying to fix what is wrong in a system.
When a word processing program user formats a document, what does the user change?
the document's appearance
The first idea for a communications network was called:
the galactic network
What is another name for the deep web?
the hidden web or invisible web
Network administration is concerned with which tasks?
the installation and maintenance of network hardware and software
workspace
the work area and panels are referred to collectively as the workspace
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation? (515998)
they had to unzip or extract it
modern processors often have ______ levels of cache
three
How are computers connected to one another?
through networks
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions -- The presentation will be created in presentation app. The images can be created and/or edited using graphics software. Similarly, videos can be modified using video editing apps and inserted into the presentation.
Data is either sent one piece at a time over the wire (serial) or many different wires carry parts of the same transmission(parallel):
transmission types
digital communications
transmitting information from one computer or mobile device to another
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? (516073)
trojan
A CPU converts the data entered through the keyboard into output displayed on the monitor T/F
true
Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously. (515989)
true
a specific touch motion you use to issue commands is called a gesture T/F
true
a stylus is an input device T/F
true
external hardware can be connected without wires or cables T/F
true
ink-jet printers use pressurized nozzles to spray ink onto paper T/F
true
solid state drives are more durable than hard disk drives T/F
true
storage device problems can prevent a computer from starting up properly T/F
true
the connector on a USB flash drive allows transmission of both data and power T/F
true
we can use Unicode coding scheme to support a larger variety of characters including Chinese, Japanese, and Arabic T/F
true
you can easily rearrange clips by dragging them T/F
true
Select the problem-solving strategies a network administrator is likely to use. Check all of the boxes that apply.
try things that have worked before check the manuals ask others who might know what the problem is
Solid state drives are more durable than hard disk drives.
ture
what is the first step to performing hardware maintenance?
turn off the computer and remove its power source
What type of security requires something you know and something you have that no one else has? (530437)
two-factor authentication
Remove a software program from your computer
uninstall
A(n) _____ protects your device against unauthorized access. (530407)
user account
Who can effectively use website authoring software?
users of all skill levels
which of the following is a necessary step in maintaining computer hardware?
using a UPS or a surge processor
the two categories of system software are...
utilities and operating systems
Type of program that includes device drivers Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a calendar.
utility
Type of graphic image based on simple objects that can be grouped and layered
vector
What would you need to install if you have an app that is incompatible with your current operating system? (515993)
virtual machine
Which of the following warns that the computer is infected and needs immediate attention?
virus hoax
Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services? Check all of the boxes that apply.
voice television Internet mobile phones
Software that converts text into speech is called a ______.
voice synthesizer
What device do e-learning applications usually use to help users with visual impairment read digital content?
voice synthesizer
software that converts text into speech is called a...
voice synthesizer
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? (530420)
web apps
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
web apps -- Google's G suite is a web-based productivity suite of applications. This will enable employees working from different locations to collaborate.
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? Group of answer choices
web confrences
collapsed
when panels appear as a button
expanded
when panels display their contents
Which of the following is an example of intellectual property?
when you create a drawing based on something from your own imagination
When does the boot process start?
when you turn on your computer
When does the boot process start? (530393)
when you turn on your computer
Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? Group of answer choices
wiki
When data is transmitted wirelessly, the computer needs_____ in order to receive it.
wireless access technology
Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?
word processing
IP address
Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet?
A router is a system of two or more devices linked by wires or cables.
False
While naming a file on the computer, if we press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?
'A' is converted to its ASCII binary code and stored in the memory unit. Then it is converted back to 'A' for display.
hardware specifications include which of the following
-RAM -CPU
Daniel wants to buy a desktop to use for playing games after work. He loves racing games and wants to make sure his laptop has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?
-RAM capacity - it provides temporary storage that applications use to run smoothly -Processor core - some applications, especially games, have greater processor requirements
What is the recommended solution if a computer performs slowly?
-Uninstall the programs and apps that are not needed. -Install additional RAM.
speakers and headphones can connect to devices using...
-a 3.5mm audio jack -bluetooth -USB
cloud storage is...
-an internet service that provides remote data storage -a safe and easy backup option for many consumers -good for sharing links to large files
interference is a common problem with ______ devices
-bluetooth -wireless
which of the following factors can affect processor performance of a CPU?
-clock speed -bus width
8. Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals? Blog Email Podcast Wiki
Blog
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keyword throughout the thesis. How can she do this in the word processor she is using?
Change font size, style, and color of the keywords.
22. Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email? Check his Sent Items folder Sign into his boss's email account Archive his older messages Organize his Inbox folder
Check his Sent Items folder
Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email?
Check his Sent Items folder.
You found something on the Internet about a topic for a paper. Which of the following are efficient ways to use the Internet? Check all of the boxes that apply.
Check to see if this information is reliable. Think critically about what you found to see if it makes sense based on your prior knowledge. Make sure that the Internet is the best place to be doing research of this type.
Which company most likely relies almost solely on B2B transactions in their course of business?
Chemical supply company
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report? (530415)
Database
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?
Date Modified
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?
Date modified
_____ are standard settings that control how the screen is set up and how a document looks when you first start typing.
Default settings
What US agency originally started ARPANET?
Department of Advanced Research Projects Agency
Which of the following can you run to find and remove unnecessary files?
Disk clean-up utility
You need to purchase a new application on behalf of your company, one that will track product inventory and manage shipping status. Which kind of software will you buy?
Distribution Software
Conducting a staff meeting online so employees from around the globe can join the discussion is an example of
E-Business
When using a Windows Internet browser, pressing _____ reloads a page
F5
Filters
In a Web search, a way to narrow a search to include only certain types of results, such as images or news, or pages posted in a certain date range, such as within the last 24 hours. In a database, a feature that selects a subset of records containing criteria you specify
When you save a Microsoft Office file to OneDrive, where are you saving it?
In a storage area located on a server
CARs Checklist
In evaluating a Web source, use this checklist to make sure that a source is Credible, Accurate, Reasonable, and has Support (including citations, quotations, and credit lines).
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? (516197)
M commerce app
Jamie plans to sell his pottery design through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
Create synthesized music files.
MIDI
Which technology is used to convert the electric current to digital form to store and play the synthesized music on a computer or mobile device?
MIDI technology
Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?
ML
What are the different types of citation styles?
MLA, APA, and Chicago
15. Paulo and a coworker have been chatting by email about their activities over the previous weekend and some issues that arose with a mutual friend. In the course of the email conversation, the coworker asks a question that requires Paulo to check with a manager in another department. Paulo decides to forward the email to the manager for further comment. Before hitting Send, what should Paulo do? List other coworkers to receive courtesy copies of the email Remove the text of the earlier emails Archive the email conversation Delete the earlier emails from his Inbox
Remove the text of the earlier emails Rationale: When replying to and forwarding an email, all previous emails in the conversation is often included in the email. Before forwarding an email to another party, check to determine whether text from earlier emails in the conversation should be deleted first.
When it comes to secure data storage on a network, which of the following statements is true?
Roles can be granted to individuals to view files and make changes to files on a network.
What hardware is essential to creating a home Wi-Fi network?
Router
System Software Rename
Select the Folder Click the Organize button Click Rename Type the folder name Press ENTER
On what type of network can you rent things such as cars, tools, and rooms?
Sharing economy network
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?
Show her how to use File Manager
_____ and Fotolia are examples of Web sites where you can download graphics and photos for a fee.
Shutterstock
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
Smart plug
A specific touch motion you use to issue commands is called a gesture
True
A feature, called wordwrap, allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line.
True
A file manager is used for all of the following except ____.
To change the contents of a file
How might a business use a blog
To communicate with customers
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
How do you create an email message? (516537)
Use an app or software to compose and send information.
How do you create an email message
Use an app or software to compose and send information
Firewall
What can you use as a protective barrier on a network to keep out unauthorized traffic?
Mesh network
Which network topology is most likely to continue to function well even if one device fails?
Extranet
Which network type is often used for vendor access?
Hub
Which of these devices would least likely be found on a modern network?