Computer & Internet Literacy Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following file extensions is commonly used for term papers and other word processing tasks? Group of answer choices

.docx

Which of the following file extensions is commonly used for drawings?

.gif

"Full HD" resolution is expressed as:

1920 x 1080

When you buy a new laptop, how much RAM should it come with?

4-8 GB

Blu-rays provide approximately ___ of storage space.

50 GB

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

File Explorer

The ___ is a computer within your computer that creates images.

GPU

If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .

Restore

Because they're inexpensive and reliable ___ have become extremely popular storage devices.

thumbdrives (USB or flash drives)

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

touchscreens

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.

uninstall

Persistent cookies store information about

user preferences.

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm

A transmission medium's capacity is called its _____.

bandwidth

A short (simple text) email uses about one ___ of data.

kilobyte

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

macro virus

The word modem stands for ____.

modulator-demodulator

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

The actual number of pixels in a monitor is called ___ resolution.

native

Two common categories of cybercrimes include single events and _____ series of events.

on-going

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

optical drive

Many manufacturers have made a(an)_____ optional equipment when purchasing a new laptop computer.

optical drives

Server banks have capacities measured in ___ .

petabytes

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

The smallest element of an image is called a(n) ___ .

pixel

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

players

A processor comprised of one control unit and one ALU is called a ____ .

single-core processor

Contact your ISP if your actual Internet speed is _____ than advertised.

slower

Data from the hard drive reaches the CPU ___ than data from the RAM.

slower

The average tablet computer has a ____ hard drive than the average desktop computer.

smaller

An unsolicited email message is called _____.

spam

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called _____ software.

system

To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.

CTRL + X

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Which of the following Internet services tends to provide the most consistent speeds?

DSL

Select the characteristics of desktop computers.

Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they don't need to be mobile. Desktops use a full OS.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ . Group of answer choices

Distributed Denial of Service

A quick way to rename files or folders in Windows is to select the item and then press the ___ key.

F2

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transfer Protocol

A separate processor (computer) in your computer that enhances your video is called the ___ .

Graphic processor (GPU)

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

Internet

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

ISP stands for:

Internet Service Provider

The abbreviation for megahertz is ___ .

MHz

Connecting digital musical devices to computers is accomplished by using ___ ports.

MIDI

The 2 most common audio file formats are WAV and ___ .

MP4

The search feature in the app store is represented by a(an) __________.

Magnifying glass

Windows OS is owned and maintained by _____ .

Microsoft

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

Network Operating System is abbreviated _____.

NOS

Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .

Organize

This type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

Projective Capacitive

Most tablets and phones use _____ as their main storage device.

SSD

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

Which of the following refers to the distribution of computer applications over the Internet and is commonly referred to as web apps?

SaaS

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

Save As

Spam messages are sometimes referred to as ___.

UBE

This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a computer.

USB

URL stands for ___ Resource Locator.

Uniform

To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .

View

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

WEP

One emerging data storage challenge is the incredible amount of video being uploaded to ___ .

YouTube

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.

bit

The smallest unit of data storage is a ___ . Group of answer choices

bit

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Data flows between different parts of the computer via _____ .

buses

In ASCII, eight bits are combined together to create one ____.

byte

Which might be a choice for Internet service in your area? Group of answer choices

cable Internet

If you wish to email a file to a friend, but find that it's too big for your email server, you can always ___ the file. Group of answer choices

compress

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

A disadvantage of cloud storage is that ___ . Group of answer choices

data is only available when you're online.

Screensize is measured by the ___ across the monitor.

diagonal

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double-click

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

drag

Routers that can send Internet signals over two distinct frequencies are called _____ routers.

dual band

Solid state drives store data using ___ .

electronic circuits

Which transmission medium has the largest bandwidth?

fiber optic

A URL identifies a particular __ address on the World Wide Web.

file

A security system separating 2 networks or even computers on the same network is called a ___ .

firewall

In order to keep your files organized, it's a good idea to create ___ and place your files in them.

folders

A desktop computer's RAM is measured in __ of data.

gigabytes

Storage capacity for laptop hard drives is typically described in terabytes or ___ .

gigabytes

What is equal to one cycle per second?

hertz

When determining how much cell phone data you need it is important to consider ___

how much data you currently use.

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must _____ it so he can start his assignments.

install

Putting software on a digital device, or adding hardware components and drivers to a digital device is called _____.

installing

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

longer

To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .

players

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

The two major concerns regarding cloud storage are reliability and ___ .

security

Resolution refers to the _____ and clarity of an image.

sharpness

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a _____

tablet

Which of the following represent the highest amount of storage?

terabyte

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

zombie


Set pelajaran terkait

Nurs 311 Addictions Homework Assignment

View Set

Combo with Microbiology Chapter 15 and 8 others

View Set

Chapter 36: Cardiomyopathy & Valvular Heart Disease Evolve Practice Questions

View Set

Το εσωτερικό της κεντρικής μονάδας

View Set

Somatic/Autonomic Nervous System

View Set