Computer Literacy (part 3)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Using _____________, students can design and create objects such as prosthetics.

A . 3D printing

If you receive an email message you suspect is spam, what should you do?

A . Delete the message without opening it

What is the best type of website for a paper that requires books and scholarly articles as resources?

A . a library services website

What is a codec?

A . a way to compress audio or video data

A function always starts with ____________, followed by __________.

A . an equal sign, the function name

Using the ______________ field in an email message prevents recipients from seeing that anyone else was copied.

A . blind carbon copy (BCC)

Although you can build tables in Excel, in Access you can ____________.

A . connect the data in tables

Which part of the following URL is the protocol? http://maps.google.com

A . http://

One purpose of a(n) ___________ website is to showcase the creative talent of the website author.

A . personal

To keep a workbook displayed in the Recent files list in Backstage view, you click the ________.

A . pushpin icon

Google ___________ let you see just one type of result at a time.

A . search modes

To use a search engine, you enter a _________.

A . search term

When attackers use third-party ads to infect your computer with malware, it is called _________.

D . malvertising

Which of the following is an option antivirus software typically lets you customize?

E . Setting a schedule for a virus scan.

Which of the following is not an advantage tablets have compared to laptops?

E . Their higher screen resolution makes them more suitable for watching movies.

Why did the traditional method of performing banking transactions have to change?

E . User behavior changed; people now use mobile devices for banking.

Which of the following is not a recommendation for protecting your identity?

E . Wait for businesses to contact you when their bills are late.

Digital certificates use a standard format called ____________.

E . X.509

What type of media should you avoid sharing on social networks?

E . inappropriate pictures that may embarrass you

Which of the following statements is false?

D . Omitting the © copyright symbol means your work is not copyrighted.

What do you need before your camera phone can scan QR codes?

D . QR reader app

Which of the following is a setting you can select in Microsoft Edge?

B . webpage to display when Edge starts

Which of the following is not a news site ranked in the top 10 most popular news sites?

C . sportsnews.com

What do the Paste Options determine?

C . the appearance of the pasted text

When you purchase a product online, by law, the seller will __________.

A . ship the product to you within 30 days of the sale

When creating passwords for online accounts, you should _________________.

A . use a different password for each account

If you want to buy zebra angelfish for your aquarium, which of the following search terms will provide the best results?

A . zebra angelfish

How can you verify an email message contains a legitimate concern from a company instead of a phishing scam?

D . Enter the company's web address in a browser to visit their website, and then sign in.

Which of the following is not a way to protect yourself online?

D . Enter your user name and password on any site that requests them.

Why should you avoid using "Cincinnati" in a domain name?

D . It is often misspelled

You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.

D . JavaScript

What can an organization do to keep its data safe?

D . Protect the data at every level, from individual computers to networks.

How can you extract all the files in the Assignments compressed folder to the Documents folder?

D . Right-click the Assignments compressed folder, click Extract All, select the Documents folder as the location for the uncompressed files, and then click Extract.

Why might you want to set up a personal hotspot?

D . Security—a personal hotspot is more secure than a public network.

What do users typically like about software suites?

D . The programs in the suite have similar user interfaces.

When you receive an email message from a company, what should you check in the sender's email address?

D . The sender's email address should match their official website address.

What should you do when shopping or banking online?

D . Use a secure payment method

What is an advantage of using web apps?

D . You do not have to update them

What is a blog?

D . a website organized by blog posts, or individual news stories

Which of the following is not a way cybercriminals try to gather your personal information on social media sites?

D . blocking your friend requests

E-commerce transactions between businesses and customers is called ________.

D . business-to-customer (B2C)

What can you use to clear dust from the ventilation fans on a computer?

D . can of compressed air

Which of the following describes applied ethics?

D . considers a real-life situation and determines moral actions to take

Secure websites ____________ information before sending it between computers.

D . encrypt

A(n) _____________ file is a binary file you use to run a program.

D . executable

Which of the following is not a blog type mentioned in the video?

D . experimental

A(n) _________ resolves top-level domains such as .com, .org, and .edu.

D . root DNS

What type of cookie retains information about your visit only until you close your browser?

D . session cookie

What are the two factors used in two-factor authentication?

D . something you know and something unique you have

Using the Report Wizard, you can _______ report information to organize its contents.

D . sort

To refine the in-between motions, a computer animator uses a mathematical function called a(n) _______.

D . spline

Which of the following is not a reason botmasters use botnets?

D . to access the Internet more quickly

To register a .edu top-level domain, you must be a(n) ____________.

D . two-year or four-year college or university

A ____________ app is one that runs on your smartphone or tablet.

E . mobile

Which of the following is not an example of social media?

E . product description webpage

When creating and editing a presentation, you can use the ________ to align objects on the slide.

E . rulers

Unlike viruses, which require the spreading of a host file, __________ are standalone software and do not need help to spread

E . worms

Which of the following is an example of a compressed file format?

A . MP3 (MPEG-1, Audio Layer 3)

How do you start searching for a scholarly article on Google Scholar?

A . Type the title of the article or keywords associated with it.

If you want to see how a Word document will look when published to the web, use ______

A . Web Layout view

To store an image in a computer, the image must be converted to _____________.

A . ones and zeroes

To join a social network, you sign up for a free account and fill out your _____________

A . profile

How can you tell whether one of the Wi-Fi networks shown here is an evil twin?

A . You cannot distinguish an evil twin network from a legitimate one.

What should you especially avoid posting to the public on social media sites so that strangers cannot find you in the physical world?

A . location-based information

The ___________ part of a Creative Commons license means that a user must publish the creator's name when using the creator's content.

B . Attribution

Which statement is true about laptops and desktop computers?

B . If the power goes out, a laptop's battery serves as a backup power source.

By default, Excel worksheets appear in ____________ view.

B . Normal

What did a Stanford study find about people who had to cut down a tree in a virtual world?

B . They used less paper in the real world

Cable and DSL Internet connections are called _____________ because they offer faster speeds than dial-up connections.

B . broadband

In a database table, each row is called a(n) __________ and each column is called a __________.

B . record, field

A wiki is a(n) ____________ that members of a group can edit.

B . webpage

Which of the following search tools would you use to filter out specific words?

b " " or e NOT

How can you determine the accuracy of an article?

A . Check for a list of references at the end of the article.

Which of the following is not a tip for creating an ergonomic workspace?

A . Position the display screen so that you look up at it.

Which of the following is not an advantage of using technology in a large classroom?

A . Students can select entertaining videos to view while the teacher is busy elsewhere.

What happens when you begin to read an e-book protected with digital rights management (DRM) software?

A . The DRM software contacts a DRM server to verify you purchased the e-book.

A typical ___________ is 48,000 Hz.

B . sample rate

Some virtual reality headsets are designed to work with your __________.

B . smartphone

What happens if you visit an unsecured website during a man-in-the-middle attack?

C . Information about your visit appears on the hacker's computer.

If different systems produce medical records, the systems must _____________.

C . be able to communicate with each other

In a column chart, the ___________ identifies what each color represents.

C . legend

Besides securing access to your Wi-Fi network, you should ____________.

C . secure access to your wireless router

What is the name for a device infected with malware that an attacker uses to control the device remotely?

C . zombie

Which of the following components most affects a computer's speed?

D . CPU

Which of the following options has the highest level of protection?

D . Encrypt with Password

For a company, intellectual property is _______________.

D . a large part of the company's value

What does antivirus software do?

E . It scans your computer to remove any viruses it finds.

________ apps are defined as those you download and run directly on the mobile device.

E . Native

What must you do before you can copy, cut, or move text on a PowerPoint slide?

E . Select the text.

Which of the following statements is true?

E . The duration of a copyright varies in different parts of the world.

Why should you look for an author's name when evaluating news shared through a social media website?

E . You can then determine whether the author has expertise to report on the topic

When you use cloud computing, what do you need to access your files and applications?

E . a web browser and an Internet connection

When an email message arrives at a domain name system (DNS) server, the server acts as a(n) _______.

E . address book

Why should you not remove a program by deleting its folder?

a (windows might need it) or d

Which of the following is not a step in creating an animation?

b (framing) or c (smoothing)

Which of the following is a similarity between updates and upgrades?

b (free of charge) or d

Attackers consider __________ relatively easy to access without authorization.

c home wifi or b

Which of the following is not an advantage of all-in-one computers?

c or d $

Which of the following is not an option when sharing a Google calendar?

c or e

The _________ file format is often used for photos and other web images.

a (jpg) or c(eps)

Which of the following is a common cause of computer eye strain?

D . using harsh lighting near the computer

When you search from the general to the specific, you are performing a __________.

D . vertical search

A(n) _________ is a tool hackers use to record your keystrokes.

E . keylogger


Set pelajaran terkait

patho quiz 7 check for understanding

View Set

aghsfr1 leçon 17 porter/ne pas porter

View Set

WEB WOC Ostomy Care: Quiz Questions

View Set

Google Level One Certification Review

View Set

Chapter 6 - Bones and Bone Tissues

View Set

Chapter 10. Photosynthesis: Energy from Sunlight (HOMEWORK & QUIZ)

View Set