Computer Fluency pt2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is true about database fields?

- represents a characteristic of someone or something - a group a related characters in a database table

The reasons why you might want to add a microSD card to your smartphone

- you want to save more music files - you want to save more image files

The usual tasks of information systems (IS) security managers includes

-Creates and implements an organization's IS security measures -Responsible for keeping an organization's Wi-Fi network secure

What settings can you restrict in Mac OS X?

-Restrict user's access to other people through Game Center, Mail, and Messages - Which apps the user can access -Limit access to specific websites

What are the following steps in order to share a file on OneDrive with OneDrive account holder?

1. Open OneDrive and login if necessary 2. Select the files you wish to share 3. Click share at the top at the page 4. Choose either Get a link or Email and share the files

Cellular-capable

- require a data plan - can be connected to wifi or cellular network - can connect to the internet in more areas

Place the following steps in order if you wish to view all your files' extensions

1. Open a window in Window Explorer 2. On the command bar, click Organize 3. Click Folder and search options 4. Click the View tab and go to Advanced Settings 5. Uncheck Hide extensions for known file types

Select the usual tasks of database administrators (DBAs).

- Develops and maintains the database itself - Establishes user privileges for the database to help protect the data - monitors the database's performance

The characteristics of fiber optic lines

- Made of one or thousands of fibers - High speed transmission

The software that comes with a google drive account

- Presentation software - Word processing - Spreadsheet software

You need to create a new folder in windows named file management. Which of the following are ways you can create a new folder in Windows?

- Right-click any blank area in the Contents pane. Click New and then click Folder - Right-click a folder in the folders list. Click New and then click folder - on the command bar, click New Folder

The characteristics of SMS

- Stands for short message service - allows for short texts, typically up to 160 characters

This is the System and Security area that is accessed by clicking Control Panel > System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?

- Update your firewall settings -Turn Windows firewall on or off -Change notification settings

Select the usual tasks of information systems (IS) program managers

- Working with developers and senior management to procure and implement IS processes - Supervising IS technicians - Developing training plans and policies for IS

Wifi capable only

- can only be used in areas of Wifi reception - do not require a cellular data plan - generally less expensive

Which of the following file extensions is commonly used for term papers and other word processing tasks?

.docx

What is the proper order of steps for sharing a file using OneDrive?

1. Pick the file or folder you want to share 2. tap or click share at the top of the page 3. in the share box that appears, choose one of the sharing options: Get a link or Email 4. Your file is now shared!

Most new cell phones today come with approximately ____ of RAM

1GB-4GB

Windows lets you change the appearance of your folders. Place the following steps in order if you wanted to open your folder options to modify the look of a folder.

Click the folder, click organize (on the command bar), click folder and search options

NeXT's ____ computer capitalized on the Graphical User Interface

Cube

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sale and production?

DSS

Information and information systems are important in all areas of business. Operations?

Decision making software such as MIS

A DDos attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for _____

Distributed Denial of Service

Business management software that encompasses nearly all business activities in a corporation is called ____ software.

ERP

Because it's a Google product, downloading an app from the Play Store might require a(n)

Google login

Allowing the creation of the World Wide Web, ____ allowed users to send documents and images across networks

Hypertext Transfer Protocol (HTTP)

The roles of directing IS technicians, working with senior management to procure and implements IS, and developing policies for corporate IS typically falls to the ___

Information systems (information technology) problem manager

You have opened Internet Explorer and clicked the Tools button. Where should you click to delete cookies?

Internet options

A switch which device within a network sent a request based on the device's ____ address

Mac

Which of these devices are manufactured by Samsung?

Note and Galaxy

If you don't want to sign a long-term contract, you might choose to purchase a ___ phone

burner

Put your router near the ___ of your house or apartment, because the router broadcasts signals in equal strength in all directions.

center

A database that stores data in different physical locations and that users access through client/server networks is called a ____ database

distributed

Most routers are designed to broadcast their waves slightly ____

down

A wireless router that transmits Wi-Fi signals on 2 separate frequencies is a ____ -band router

dual

When you drag a file into the recycle Bin it cannot be recovered. True or false?

false

A URL identifies a particular ___ address on the World Wide Web

file

To limit the data or images that appear on your computer screen, add ___ to your search engines and browsers

filters

the reliability and the accuracy of the information in a database is referred to as data _____

integrity

All the tablet computers

- Apple iPad Pro - Amazon Fire HD 8 - Samsung Galaxy Note Pro

Which of these should business owners do to help protect their data?

- create strong password protections and protocols - establish strong firewall protection for their business's network - ensure antivirus software is installed and up-to-date

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following:

- decreased network speed - increased likelihood of security breaches - decreased employee performance

the characteristics of cellular service

- many smartphones can convert cellular signals into wifi signals - fastest-growing ISP - allows mobile devices to access the internet

Which of the two methods below take you to Google (Gmail) chat?

- open gmail and click on the chat area - open google hangouts and click on the chat area

Business owners, copyright holders, and network administrators publish ____, so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

AUPs

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called ___

Adware

With its iPhone, ___ is one of the leaders of the U.S. smartphone market

Apple

One way to copy a file is to click on the file and press CTRL + C, then more your cursor to the new site and press ____

CTRL + V

Creating a fake website to trick victims into divulging personal information is a type of phishing known as ____

Pharming

Information and information systems are important in all areas of business. Finance?

Providing current investment values and opportunities

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ____

Quarantine

Information and information systems are important in all areas of business. Accounting?

Records keeping and reporting

For which of the following activities would a typical accounting department need a strong information system?

Records keeping or reporting

Information and information systems are important in all areas of business. Marketing?

Search engine optimization online advertising and using social media

This is the settings area of Google chrome. Where would you click to adjust cookie and site data permissions?

Show advanced settings

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top level managers

By default Windows hides file extensions for known file types but you can unhide them if you wish. True or false?

True

If possible, it is often a good idea to ask your neighbors what ISP works best in your area when purchasing Internet service. True or False?

True

Your network's mobile switching station locates the MSS of the person you're calling, even if they use a different cell phone provider. True or false?

True

What is the incorrect statement about fee based antivirus and free anti virus software

Wrong: one of the positives of free anti virus software is their spam detection performance EXTRA right: Most of the free anti-virus programs perform almost as effectively as their fee-based counterparts. One of the main differences between free and fee anti-virus software is the number of features

The anti-virus software providers

avg, Norton by Symantec, mcafee

Changing the appearance of your folders can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the ___ bar and click organize

command

When Wyatt, Kevin, Sally, and Casey are all on the same business phone call it's referred to as

conference calling

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___. These come in 2 categories: 1 - detected, which usually result in system failures; and 2 - silent, which are much harder to discover and can cause lasting problems

corruption

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a ____.

cyberterrorist

The bandwidth required by streaming video offered by companies like Hulu and Netflix made unlimited ____ plans relatively expensive

data

When referring to management information systems, DSS stands for ____ support systems

decision

Reports provide a means of artfully extracting information from a database; ____ provides a means of accurately entering data into a database.

forms

Cell towers' radio frequencies are divided between 7 roughly ____ - shaped cells

hexagonal

The order in which data is organized in a database (characters, fields, records, tables, files, databases) is referred to the database ____

hierarchy

An IP address is determined by the network on which it is ___

hosted

While many smartphones look alike, they may have significant differences. Which of the following are water-resistant?

iPhone 7 and Galaxy S7

A form of spyware that records all actions typed on a keyboard is called a ____ logger

keystroke

Because it reduces an audio file's sampling rate to save space, the MP4 format is a ____ compression format

lossy

Before opening an Email, make sure you know and trust the sender. Email may contain ____

malware

Cell phones send and receive extremely weak ____ signals to and from cell towers

microwave

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network

mobile switching station

Examples of uploading files

posting a photo on social media posting a youtube video placing an ad on craigslist

After your phone's analog-digital converter chip changes the sound of your voice to a digital signal, the signal is enhanced by a digital signal ___.

processor

WPA stands for Wi-Fi ___ access

protected

So that users can find specific information quickly by using filters based on specific criteria, databases allow the creation of

queries

Wi-Fi waves are basically ____ waves

radio

In 2017, WannaCry infected nearly 250,000 computers in one day. This malware encrypted victims' data files and demanded payment for a decryption code. This type of malware is called

ransomware

To display or distribute a summary of data and archive snapshots of the data, data administrators or programmers create:

reports

Typically computer viruses must be ____ to attack and do damage to a digital device

run

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called ____ kiddies

script

The small computer within your phone that enhances the sound quality of your call is called a digital ____ processor

signal

The cell tower's base transmission station is connected to a mobile ____ station

switching

The android operating systems icon is what

the little green alien guy

The specific means by which your internet signal is carried is called its ____ media

transmission

The mobile switching station can connect calls to mobile switching stations belonging to other cellular networks

true

A router's signal gets ___ as it travels further from the router

weaker

Brain plans to only use his tablet computer in his home. He has a wireless network in his home. Brain can probably save money by purchasing a ____ tablet.

wifi only

Spam filters search for spam by watching for keywords and by monitoring suspicious ____ patterns and frequencies

word

Select what's true about troubleshooting a network

- check to make sure the cables are not damaged and that all cables are plugged in properly - a device that isn't positioned properly can cause weak signals and system issues - a poor signal can also be an indicator that the hardware may be old or improperly positioned

Place the followings steps in order to download a file on OneDrive to a digital devices

1. Open OneDrive and login if necessary 2. Select the files you wish to download 3. Click Download at the top of the page 4. Left click the downloaded file to open it!

The steps to share a file in google drive

1. Open your google drive account and sign in as necessary 2. Right-click on the file or folder you want to share 3. click share 4. enter the email address of the person with whom you want to share the file

Place the steps in order to create a WiFi hotspot with your android phone

1. Verify that your data plan allows tethering 2. tap the "settings" app 3. under "wireless/networks" tap "tethering" 4. Turn on the portable WiFi hotspot and note the password 5. Open the WiFi on your laptop or other device and select your phone's hotspot 6. Enter the password - you're in!

Positioning both of your router's antennas horizontally will give you the best chance of a parallel match thus increasing your signal strength. True or false?

false

firewall software used to block a user's access to specific internet content is called a(n) filter

internet


Set pelajaran terkait

Bergmen/Clem Acct 284 Exam 2 Review

View Set

nn.Module functions and defenitions

View Set

Международная Экономика

View Set

Ch 8- Race and Ethnicity in Sports

View Set