Intro to computers

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? a. incomplete documentation b. unfinished system proposal c. missing prototype d. inadequate feasibility study

a. incomplete documentation

What technology allows Siri to understand you when you request a route to a location in a nearby city? a. Natural language processing (NLP) b. Machine Learning (ML) c. Artificial intelligence (AI) d. Internet of Things (IoT)

a. natural language processing (NLP)

Devices on a _____ area network are connected via Bluetooth. a. personal b. metropolitan c. wide d. local

a. personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information. a. protocol b. topology c. standard d. syntax

a. protocol

Which of the following is the science that combines technology and engineering? a. Robotics b. Digital citizenship c. Augmented reality d. Natural language processing

a. robotics

A business would use a website analytics tool for all of the following EXCEPT _____. a. viewing why someone visited your webpage b. viewing the number of new and returning visitors c. deciding when to increase bandwidth d. viewing the number of pages a person visited

a. viewing why someone visited your webpage

Which of the following is NOT a leading provider of PaaS and IaaS services? a. Walmart b. Google c. Amazon d. Microsoft

a. walmart

At what point are you responsible for following the terms in a software license agreement? a. when you click or take another action to accept the terms b. when you purchase the software c. when you give the software to someone else d. when you register the software

a. when you click or take another action to accept the terms

Which of the following requests to Alexa is most likely to get the desired result? a. Alexa, I like the Journey albums. Play some of those and make sure you use Pandora. b. Alexa, play Journey songs on Pandora. c. Play Journey. d. Alexa, play Pandora music and include a lot of Journey songs.

b. Alexa, play Journey songs on Pandora.

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? a. cellular connection b. Bluetooth connection c. network cable d. power cable

b. Bluetooth connection

How can you protect personal information gathered by legitimate organizations? a. Use the same password and username for all your online accounts. b. Create a separate email account for receiving information from websites. c. Link your credit or debit card to your online accounts. d. Sign up for many online mailing lists.

b. Create a separate email account for receiving information from websites.

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes? a. HTML CMS b. HTML 5 validator c. HTML 5 code editor d. HTML5 debugger

b. HTML 5 validator

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? a. It did not include a promotional offer. b. It contained typos and other grammatical errors. c. The signature was consistent with other emails from his bank. d. It was written in an overly formal tone.

b. It contained typos and other grammatical errors.

How does discarding computers in a landfill affect the environment? a. Copper on circuit boards is creating fire hazards. b. Lead and mercury in computer parts are seeping into the ground and water supply. c. The computer parts quickly decay and become organic material d. Data miners are digging up landfills looking for gold and platinum.

b. Lead and mercury in computer parts are seeping into the ground and water supply.

Shawndrika recently had back surgery and her doctor told her to not spend long periods sitting. She works a lot on her computer for her job. Which of the following strategies could help her solve this problem? Choose two. a. Don't text and walk. b. Switch to a standing desk. c. Use speech-to-text technology. d. Take frequent breaks.

b. Switch to a standing desk. d. Take frequent breaks.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? a. Encryption b. Biometrics c. Two factor authentication d. Digital certificates

b. biometrics

Frank spends a lot of time monitoring recent customer reviews on Google for his basket weaving business. Most customers give tons of high praise for his intricate weaving work; but, today Frank discovered a scathing negative review posted by someone claiming the name "BasketMan." Clearly, this is a fake name, and Frank has no way of finding out who this person is in order to determine what he can do to fix the problem or even to know if it's a real customer and not a rival business. This is an example of __________. a. software piracy b. catfishing c. plagiarism d. spamming

b. catfishing

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. a. social engineering b. cyberbullying c. data mining d. cyberstalking

b. cyberbullying

Patrick, a real honest to goodness altruist, donates his old phone to a nearby charity, which takes phones and refurbishes them. After. they offer them at literally no cost to challenged populations in Patrick's area. The people that utilize this service can use their free phones to more easily find housing, employment, and other community resources. This program supports ______________. a. the Internet of Things (IoT) b. digital inclusion c. the digital divide d. an acceptable use policy (AUP)

b. digital inclusion

A network administrator is usually not required on a _____ network. a. intranet b. peer-to-peer c. metropolitan area d. client/server

b. peer-to-peer

Gertrude loves playing Fortnite with her online buddies on her Xbox connected to her TV. However, even Gertrude knows to often gets up, stretch, and walk around at least a bit once every hour to grab a snack or let her dog out to play. What problem is this habit most likely helping her avoid? a. Technology addiction b. Repetitive strain injury c. Accidental falls d. Text neck

b. repetitive strain injury

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. a. requires less storage space on a server b. will allow user interaction c. is cheaper to maintain d. is meant for infrequent updates

b. will allow user interaction

Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control? a. His doctor will be able to monitor him through the use of a smartphone. b. His health records will now be stored in the cloud. c. He will receive text reminders to take his medications and check his insulin. d. He will not have to visit the doctor as frequently.

c. He will receive text reminders to take his medications and check his insulin.

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? a. SaaS b. PaaS c. IaaS d. DBaaS

c. IaaS

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet? a. Specify the format b. Compress pages and multimedia content c. Publish to a web server d. Convert to a read-only file

c. Publish to a web server

Which of the following is an example of green computing? a. Keep devices turned on and ready to use, even at night. b. Purchase new models of devices as soon as they are released. c. Purchase and use products with an ENERGY STAR label. d. Request printed receipts.

c. Purchase and use products with an ENERGY STAR label.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? a. Auditing tools b. Process managers c. Restorers d. Patch finders

c. Restorers

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world? a. Voice output software can be used to translate what she is saying to text. b. Screen reader software can be used to read what is on the screen. c. A braille printer can be used to print documents. d. Captioning software can be used to transcribe what is being said.

d. Captioning software can be used to transcribe what is being said.

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages? a. To reflect a common brand b. To generate a similar look and feel c. To have the website blend in with others d. To give you finer control over the content

d. To give you finer control over the content

Henry has a research project that is due soon, and he forgot! He needs to find online resources to do research ASAP. When Henry starts his research, he sees that Wikipedia has a ton of information about his topic so he reads a bit to get his bearings on the topic. Henry knows to switch to peer-reviewed journals and professional publications for his formal sources that he will cite in his research project. Why does Henry not use Wikipedia as formal sources? a. Users can post false information in wikis. b. No one is familiar with wikis. c. Experienced editors verify changes made to wiki articles. d. Wikis can be heavily biased.

d. Wikis can be heavily biased.

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____. a. an absolute reference b. a consortium c. an FTP client d. a project

d. a project

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? a. Predictive development b. Waterfall model c. Rapid application development d. Agile development

d. agile development

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. a. alarm b. uninterruptible data supply c. private copy d. data backup

d. data backup

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? a. Send the email without attaching the report and ask the president to call you. b. Transfer the report to the cloud. c. Store the report on a flash drive that you have password-protected with the president's name. d. Encrypt the data in the report.

d. encrypt the data in the report

Which of the following technologies assists users that have a visual disability? a. on-screen keyboards b. colorful webpages c. captioning software d. screen readers

d. screen readers

A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network. a. navigation systems b. transistors c. kiosks d. sensors

d. sensors

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________. a. digital inclusion b. digital access c. data breaches d. the digital divide

d. the digital divide

How can you protect a computer from electrical spikes and surges? a. Use an uninterruptible power supply. b. Unplug the computer when it is not in use. c. Use a cable lock. d. Use a surge protector.

d. use a surge protector

Bandwidth is a term that describes the number of devices connected to a network. True False

False

Digital ethics does not matter to the individual that doesn't own a laptop or cell phone, as this does not apply to them. True False

False

A class is a type of object that defines the format of the object and the actions it can perform. True False

True

A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world. True False

True

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions. True False

True

A worm is a malicious program that uses a computer network to replicate. True False

True

After designing a website, you transfer the website files from your local computer to a remote web server. True False

True

An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from home. True False

True

An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing. True False

True

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load. True False

True

Before you name your website, you need to search for other sites using that name and then purchase a domain name. True False

True

4G and 5G networks provide slower data transmission speeds than 3G networks. True False

False

A router is a system of two or more devices linked by wires or cables. True False

False

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access. True False

False

All cloud technologies must be accessed over the Internet. True False

False

Mossimo decides to leave his smartphone in his sleek sports car as he heads out for a day long hike in the Appalachian Mountains. This is an example of a ______________. a. digital detox b. technology addiction c. digital footprint d. repetitive strain injury

a. digital detox

How does encryption work? a. It scrambles the information until the key is used to unscramble it. b. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. c. It is what happens when you download attachments from your email. d. It is a key that you insert into your computer to unlock your saved files.

a. It scrambles the information until the key is used to unscramble it.

Kendrick shares a viral blog post on social media that says the UK's National Health Service (NHS) has changed their recommendation for COVID shots. Kendrick is quickly bombarded by other people saying his information is wrong. What did Kendrick fail to do before posting this information? a. Verify the content with an authoritative source. b. Check the blog post for accessibility features, such as alt text. c. Check the blog post for bad grammar. d. Post an opposing point of view to maintain balance.

a. Verify the content with an authoritative source.

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? a. Project manager b. Programmer c. IT department d. Designer

a. Project manager

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? a. Site license b. Multiple user license agreement c. End user license agreement d. Single-user license agreement

a. Site license

How can an attacker execute malware through a script? a. A script can send you a fraudulent email message requesting confidential information. b. A script searches the Internet for personal information about you. c. A script can run a series of instructions to download and run malware. d. A script can retrieve and store your personal information, such as your online buying habits.

c. A script can run a series of instructions to download and run malware.

A modem can also function as what other piece of hardware? a. A hub b. A network interface card c. A router d. A switch

c. a router

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time? a. Machine learning (ML) b. Internet of Things (IoT) c. Artificial intelligence (AI) d. Natural language processing (NLP)

c. artificial intelligence

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? a. Resource pooling b. Measured service c. Broad network access d. Rapid elasticity

c. broad network access

Jennifer realizes she is getting a cramp in her neck after texting with her fellow animal rescue buddy for several minutes. She puts the phone down and takes her Bengal tiger for a walk. This is an example of ____________. a. digital literacy b. digital security c. digital citizenship d. digital etiquette

c. digital citizenship

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? a. Wi-Fi b. VPN c. Extranet d. Intranet

c. extranet

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert? a. targeted reference b. absolute reference c. relative reference d. blank reference

c. relative reference

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? a. Create a strict license agreement for the app. b. Require users to install antivirus software on their devices. c. Require users to identify themselves using biometrics or passwords. d. Display a stern warning on the welcome screen.

c. require users to identify themselves using biometrics or passwords.

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? a. Receiving clerk b. Hand picker c. Shipping clerk d. Freight mover

c. shipping clerk

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard? a. audiobook b. closed captioning c. speech recognition software d. Braille printer

c. speech recognition software

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? a. worm b. ransomware c. Trojan d. spam

c. trojan

What special technology allows computers to perform the intense processing needed to perform machine learning? a. PCI b. IoT c. NLP d. ANN

d. ANN


संबंधित स्टडी सेट्स

Personal Financial Statements Vocabulary

View Set

Leadership - Ch 8 - MGMT-5370-W01 - SEMINAR

View Set

Pharmacology II Prep U Chapter 38: Agents to Control Blood Glucose Levels

View Set

Chapter 12: Social Stratification

View Set