CS 102 - Section 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Select the file extension of an image file, then click Done.

.jpg, .png, .gif

When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.

AUP

___ is a security utility that protects your computer from various types of malware.

Anti-malware

Software makes a computer run and perform activities such as word and data processing. Click on four types of computer software, then click Done.

C++, Windows, MacOS, Microsoft Office

Considered "the brain" of the computer, the ______ organizes and carries out instructions to produce a desired output. Select the two correct answers, then click Done.

CPU microprocessor

Select the OS that requires an internet connection to run its software applications. Select your answer, then click Done.

Chrome OS

Select three places where you can safely back up your data, then click Done.

Cloud backup provider USB drive DVD disk

Location based services (LBS) use ______, cell phone towers, and nearby wireless access points to track the location of your mobile device. Select your answer, then click Done.

GPS

In 1984, Apple came out with the Mac, a PC that featured a revolutionary ______ that changed the way people interacted with computers. Select your answer, then click Done.

GUI

LCD and LED are two types of flat-panel monitors. Click on the monitor that is thinner, lighter, and more energy efficient with better contrast ratios, response times, and viewing angles. Select your answer, then click Done.

LED

Select four of the most popular desktop operating systems, then click Done.

Microsoft Windows MacOS Desktop LINUX Chrome OS

Select five ways to authenticate a user's identity.

NOT registered letter

The alphanumeric keys refer to the main set of keys that allow you to input letters, numbers, and punctuation. The most common arrangement of these keys is referred to as the ______ layout. Select your answer, then click Done.

QWERTY

The amount of ______ you have installed in your computer determines how many applications you can have open and work on at the same time. You can make your computer faster by adding more ______ or memory modules. Select your answer, then click D

RAM

Select three of the most popular server operating systems, then click Done.

UNIX LINUX Windows Server

The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.

all

The most fundamental unit of computing is the ______, which is represented as an on (1) or off (0) value. Type your answer in the space provided, then click Done.

bit

Image quality, also known as print resolution, is usually measured in dots per inch (dpi). The more dots per inch a printer can produce, the higher its image quality. Which printer produces the highest quality image? Select your answer, then click Done.

brother...CDW last one

David needs to purchase an affordable laptop for his child to use at school. The computer has to be affordable, lightweight, and able to access Google apps online. Which computer should he buy? Select your answer, then click Done.

chromebook

The motherboard is the largest ______ in the personal computer. Select your answer, then click Done.

circuit board

Hardware is any part of the computer you can touch. Click on all the images of computer hardware, then click Done.

click all images

When you copy, cut, or move files, they are temporarily placed on the ______. Select your answer, then click Done.

clipboard

Select the factors that determine a CPU's performance. Select the three correct answers, then click Done

clock rate brand and model multiple cores

______ allows you to store your files and use various applications in an online account. Select your answer, then click Done.

cloud

Many apps use ______ which is the gathering of information from a large group of people. Select your answer, then click Done.

crowdsourcing

Select the correct file hierarchy, then click Done.

drive, folder, file

______ is the most popular social network that allows users to post messages, photos or videos that can be viewed by the public or anyone in their social circle. Select your answer, then click Done.

facebook

Most desktop operating systems come with a ______ utility that examines and blocks Internet traffic. Select your answer, then click Done.

firewall

While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.

flaming trolling

If you are setting up new hard drive or fixing a corrupted USB flash drive, you may need to ______ it in order for it to work properly. Select your answer, then click Done.

format

______ are complete entertainment systems, offering Internet connectivity, movie rentals, photo storage and many other services, in addition to video games. Select your answer, then click Done

gaming consoles

Select four cloud computing storage services that allow you to save and access files online, then click Done.

google drive, dropbox, apple icloud, onedrive

Select the products that respond to a variety of voice commands on mobile devices. Choose all that apply, then click Done

google, sir, coron??

A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.

hacker

______ technology can enhance audio or video output from computers to make them ore relevant or noticeable. Select your answer, then click Done.

haptic

Whenever your operating system or browser issues a software update, you should apply it___.

immediately

Select the correct order of a computer's Information Processing Cycle, then click Done.

input, process, output, storage

What is another name for the the largest network in the world? Select your answer, then click Done.

internet

The development of ______ allowed data to be represented by magnets, which can hold their position or pattern to represent 0's and 1's without electricity. Select your answer, then click Done.

magnetic storage

Except for desktop computers, most computers have built-in ______ that are used for Internet voice calling, capturing audio for video recordings, and speech recognition. Select your answer, then click Done.

microphones

Made solely for tablets and smartphones, ______ operating systems support mobile apps, which are generally fast, touch friendly, and require little storage space. Select your answer, then click Done.

mobile

A large company such as a retail store or airline reservation system uses a ______ computer that acts as the central computer in a network. Select your answer, then click Done.

multi-user

A ______ allows users to communicate and share information between computers. Select your answer, then click Done.

network

David wants to set up a primary computer where he can store his company's website and share files and software with his coworkers. What type of multi-user computer does he need? Select your answer, then click Done.

network server

Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.

no...

Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.

none

The ______ must be loaded before any other software during the computer's start-up or boot process. The ______ is the software that allows other applications to run. Select your answer, then click Done.

operating system

Scanners use______ technology to convert objects into a digital format. Select your answer, then click Done.

optical

Optical storage devices use lasers to read or write data to the reflective surface of a(n) ___. Select your answer, then click Done.

optical disc

______ are connected to the motherboard and allow users to plug in external devices. Select your answer, then click Done.

ports

Select three items located in a system unit. Select your answers, then click Done.

power supply, cooling fan, drive bay

______ is a feature that will delete your history, cache and cookies the moment you close the private windows. Select your answer, then click Done.

private browsing

If you want to keep your computer and financial information safe from computer viruses and malware, then you need to install ______ software. Select your answer, then click Done.

security

Jack just bought a new mobile device. The first thing he should do is ______. Select all that apply, then click Done.

select all

Since ______ storage uses memory chips for storage, it has no moving parts like hard drives or optical drives. Select your answer, then click Done.

solid state

Most computers today include a complete sound system that includes a microphone, ______, and a sound card or processor. Select your answer, then click Done.

speakers

The purpose of ______ is to hold programs and data permanently, even when the computer is turned off. Select your answer, then click Done.

storage

NASA uses a ______ to conduct modeling and simulations for upcoming missions, forecast weather, and perform nuclear research. Select your answer, then click Done.

supercomputer

Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.

surge protector

Users typically interact with most computer software via an on-screen pointer in the form of an arrow. Click three pointing devices you can use to control the arrow, then click Done.

touch pad trackball optical mouse

______ accept input by allowing the user to place a fingertip directly on the computer screen. It's the primary way we interact with our tablets and smartphones. Select your answer, then click Done

touchscreens

A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.

trojan horse

A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.

worm

Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.

zombies


Set pelajaran terkait

079 Social NeuroScience Study Guide

View Set

Microprocessor System (MCSL51E) - Chapter 4: Instructions and Memory

View Set

Delegation and Prioritization - NCLEX Questions

View Set

CRJU1010: Introduction to Criminal Justice Final Exam Study Guide

View Set

Preparing Injections from an Ampule

View Set