Computer Concepts 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

be cautious about what information she posts

there are various risks from attacks on wifi networks. these include all of the following except

creating malware

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

change font size, style and color of the keywords

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

create a database of company projects, customers and vendors

how can you protect personal information gathered by legitimate organizations

create a separate email account for receiving information from websites

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

it should have responsive design so that it is easy to use on mobile devices

which of the following is not a hardware device that controls the movement of the pointer on a computer screen

keyboard

which of the following operating systems includes a virtual assistant

macOS

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?

make the program available as a web app

What would a password manager allow you to do?

Create and store multiple strong passwords.

Why is the date a file was modified useful?

It identifies the most recent version

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images?

JPEG

what is the most common type of volatile memory

Random Access Memory (RAM)

How can an attacker execute malware through a script?

a script can run a series of instructions to download and run malware

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

a spreadsheet app to keep a record of her expenses, sort data, and make calculations

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

adobe premiere clip

how do you know if a device is an input device or an output device

an input device enters data and instructions into the memory of the device. an output device is how the processed information is displayed

Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?

android

_____ ensures that the person requesting access to a computer is not an imposter

authentication

Why is it not safe to connect to public Wi-Fi networks?

because these networks are rarely protected

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?

database

which is a first step to deter thieves from accessing your financial information

do not provide personal information over the phone or through email

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

drawing app

Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?

enable sticky keys

which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely

ergonomics

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

what does an operating system provide so you can interact with a device

graphical user interface

Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?

graphics app

which of the following is not an input device

headphone

How will you decide which browser security settings to allow and which ones to block?

i will need to review each browser security setting and use my best judgement

Folder names should _____.

identify the content and purpose of the folder

When you save a Microsoft Office file to OneDrive, where are you saving it?

in a storage area located on a server

___. is data and instructions entered into the memory of a device

input

which of the following is not a step an operating system performs when printing a document

it creates the document to be printed

isabel received a message on her computer that appeared to be from the FBI. it informed her that her computer has been locked and she would need to pay a fee to retrieve her data. how would you describe what is happening

it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer

what does the operating system do if you try to save a file with the same name into the same folder

it overwrites the original file unless you add a number, date, or initials to differentiate the files

How does discarding computers in a landfill affect the environment?

lead and mercury in computer parts are seeping into the ground and water supply

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

m-commerce app

which of the following features is a way to make a computer do what you want it to do

menu

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app

If you delete a shortcut from your desktop, have you also deleted the original file?

no because a shortcut does not place the actual file, folder, or app on the desktop

how can you display the main folders on a windows computer

open file manager

digital information processed into a useful form is called

output

what is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

an operating system is also called

platform

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?

portable app

which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information

pretexting

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?

program window

When you want to add information to a document, what role does your operating system play?

saves your unsaved work to temporary storage

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?

show her how to use file manager

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?

slide master

which of the following types of websites typically provides the least security

social media sites

you can monitor and protect your financial data in all of the following ways except

storing financial information in an unsent email message

a ___ is a named collection of formats you apply to text in a word processing document

style

which of the following terms refers to the area of the hard drive used for virtual memory

swap file

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?

the kernel is the core of an operating system that manages memory, runs programs, and assigns resources

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

they had to unzip or extract it

what is the main purpose of an operating system

to coordinate the resources and activities on a computer

Where can you pin frequently used apps for easy access?

to the taskbar

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

what type of security requires something you know and something you have that no else has

two factor authentication

how can you check data on devices connected through an IoT network

use a tablet

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?

use the search tool to locate the file by file name, content, or date

Logan is considering web app development as a career option. Which of the following languages does he not need to master?

visual basic

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?

what-if analysis

When does the boot process start?

when you turn on your computer

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?

word processor

which of the following is not an advantage of saving documents in the cloud

you can access the documents when you are not connected to the internet

Compressing a file is also called _____ the file

zipping


Set pelajaran terkait

Sem 3 - Unit 5 - Miscarriage/Fertility - NCO

View Set

Brainstem: Topography and Levels

View Set

Chapter 5 Part 1- Finger, Hand, and Wrist

View Set

Macro Test 35 Influence of monetary and fiscal policy on agg demand

View Set

Chapter 12 - Supply Chain management in the service industry

View Set

Chapter 10: Water-Soluble Vitamins

View Set

Intro to Nursing - Exam 4 Concepts - Modules 13-16

View Set

Chapter 18, Section 4 - Birth of the American Republic

View Set