Computer Concepts 2
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
be cautious about what information she posts
there are various risks from attacks on wifi networks. these include all of the following except
creating malware
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
change font size, style and color of the keywords
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
create a database of company projects, customers and vendors
how can you protect personal information gathered by legitimate organizations
create a separate email account for receiving information from websites
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
it should have responsive design so that it is easy to use on mobile devices
which of the following is not a hardware device that controls the movement of the pointer on a computer screen
keyboard
which of the following operating systems includes a virtual assistant
macOS
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
make the program available as a web app
What would a password manager allow you to do?
Create and store multiple strong passwords.
Why is the date a file was modified useful?
It identifies the most recent version
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images?
JPEG
what is the most common type of volatile memory
Random Access Memory (RAM)
How can an attacker execute malware through a script?
a script can run a series of instructions to download and run malware
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
a spreadsheet app to keep a record of her expenses, sort data, and make calculations
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
adobe premiere clip
how do you know if a device is an input device or an output device
an input device enters data and instructions into the memory of the device. an output device is how the processed information is displayed
Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
android
_____ ensures that the person requesting access to a computer is not an imposter
authentication
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
which is a first step to deter thieves from accessing your financial information
do not provide personal information over the phone or through email
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
drawing app
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?
enable sticky keys
which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely
ergonomics
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
what does an operating system provide so you can interact with a device
graphical user interface
Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?
graphics app
which of the following is not an input device
headphone
How will you decide which browser security settings to allow and which ones to block?
i will need to review each browser security setting and use my best judgement
Folder names should _____.
identify the content and purpose of the folder
When you save a Microsoft Office file to OneDrive, where are you saving it?
in a storage area located on a server
___. is data and instructions entered into the memory of a device
input
which of the following is not a step an operating system performs when printing a document
it creates the document to be printed
isabel received a message on her computer that appeared to be from the FBI. it informed her that her computer has been locked and she would need to pay a fee to retrieve her data. how would you describe what is happening
it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer
what does the operating system do if you try to save a file with the same name into the same folder
it overwrites the original file unless you add a number, date, or initials to differentiate the files
How does discarding computers in a landfill affect the environment?
lead and mercury in computer parts are seeping into the ground and water supply
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
m-commerce app
which of the following features is a way to make a computer do what you want it to do
menu
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
If you delete a shortcut from your desktop, have you also deleted the original file?
no because a shortcut does not place the actual file, folder, or app on the desktop
how can you display the main folders on a windows computer
open file manager
digital information processed into a useful form is called
output
what is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
an operating system is also called
platform
Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?
portable app
which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information
pretexting
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
program window
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?
show her how to use file manager
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
slide master
which of the following types of websites typically provides the least security
social media sites
you can monitor and protect your financial data in all of the following ways except
storing financial information in an unsent email message
a ___ is a named collection of formats you apply to text in a word processing document
style
which of the following terms refers to the area of the hard drive used for virtual memory
swap file
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
the kernel is the core of an operating system that manages memory, runs programs, and assigns resources
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
they had to unzip or extract it
what is the main purpose of an operating system
to coordinate the resources and activities on a computer
Where can you pin frequently used apps for easy access?
to the taskbar
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
what type of security requires something you know and something you have that no else has
two factor authentication
how can you check data on devices connected through an IoT network
use a tablet
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?
use the search tool to locate the file by file name, content, or date
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
visual basic
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?
what-if analysis
When does the boot process start?
when you turn on your computer
Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?
word processor
which of the following is not an advantage of saving documents in the cloud
you can access the documents when you are not connected to the internet
Compressing a file is also called _____ the file
zipping