Computers Module 5/6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

Android

____ ensures that the person requesting access to a computer is not an imposter.

Authentication

A Trojan is a malicious program that uses a computer network to replicate.

False

To prevent a laptop from being stolen, you can use a surge protector.

False

Which of the following is the strongest password?

H@veAGr3atDaY!

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

a spreadsheet app to keep a record of her expenses, sort data, and make calculations

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

create a database of company projects, customers and vendors

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?

database

In terms of privacy, which of the following is a best practice?

keeping your social security number hidden in a locked box in your home

Why is it not safe to connect to public Wifi networks?

because these networks are rarely protected

Which of these is not an option for formatting text?

copying a region of text

What would a password manager allow you to do?

create and store multiple strong passwords

Mobile first design is important because ___.

developers must provide simplified user experiences for apps that run on small screens

___ is the process of scrambling information in such a way that it cannot be read unless the user possesses the key.

encryption

How does encryption work?

it scrambles the information until the key is used to unscramble it

___ are attackers who want to attack computers but lack the knowledge needed to do so.

script kiddies

Wi-Fi protected access 2 personal encrypts wireless data transmissions and limits who can access the wifi network

true

You have the right to see your credit information.

true

Which type of app would most likely NOT be found included in a productivity suite?

web browser

Local application can be accessed only on the computers on which they are installed.

True

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

because insiders sometimes create threats after incidents at their places of employment

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

drawing app

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

it should have responsive design so that it is easy to use on mobile devices

How does discarding computers in a landfill affect the environment?

lead and mercury in computer parts are seeping into the ground and water supply

When creating a strong password ___ is the most important element.

length

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?

slide master

Which of the following types of websites typically provides the least security?

social media sites

A ___ is a very short duration of a voltage increase that can be absorbed by a surge protector.

spike

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

How can you protect a computer from electrical spikes and surges?

use a surge protector

Rob is planning a housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

use a word processor for step 1, graphics software for step 2, and a mail merge for step 3

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

use cross-platform tools to write code that will translate the existing Android app code into different native formats

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?

web apps

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?

word processor

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

G suite

When you take a photo with a digital camera, most likely it is saved in ____ format.

JPG

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

adobe premiere clip

____ are programs that help you perform specific tasks when using your computer or smartphone

application software

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

biometrics

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

change font size, style, and color of the keywords

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting

Creating a _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Which is a first step to deter thieves from accessing your financial information?

do not provide personal information over the phone or through email

Patricia has started a new interior designing business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?

drop box

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

false

The direction in which text is printed on a page is called style.

false

You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?

graphics and media

Which of the following is not a web browser setting for managing cookies?

have all cookies automatically expire after 45 days

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer

Technology can lead to all of the following behavioral risks EXCEPT____.

higher satisfaction with life

To run a productivity app with most complete and advanced capabilities, you would most likely ______.

install and run the software on your desktop or laptop computer

Each of the following is a factor that causes repetitive strain injury except

lack of restful sleep

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems connecting to the network. What type of app should she focus on developing?

portable app

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

When a value in a worksheet changes, then the spreadsheet program will ___.

recalculate any cells whose formulas depend on the value that changed

In a relational database, data is organized into rows of data called ____.

records

You can monitor and protect your financial data in all of the following ways EXCEPT ____.

storing financial information in an unsent email message.

A ____ is a named collection of formats you apply to text in a word processing document.

style

What is a digital certificate?

technology used to verify a user's identity

When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ______.

transition

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

trojan

A worm is a malicious program that uses a computer network to replicate.

true

Each slide in a presentation has a layout that includes placeholders for certain types of content.

true

To work with a web app, you use your browser on a computer or mobile device

true

What type of security requires something you know and something you have that no one else has?

two factor authentication

How can you check data on devices connected through an IoT network?

use a tablet

Sammy created a new logo for his client to use on the company website and office stationary. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?

use vector images because they retain their clarity even when enlarged or shrunk


Set pelajaran terkait

Macro ch 3 practice test mindtap

View Set

Title VII of the Civil Rights Act of 1964

View Set

Biology study guide Chp.7-4 The Diversity of Cellular life

View Set

Exam One silvestri practice questions

View Set