Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Alice stored a memory card in her wallet that had all the photographs of a recent trip she took. When she inserted the card into her laptop, her computer wasn't able to read it. Alice tried to access its contents on her other devices but could not. Based on this, which of the following is/are likely to be true?

-The memory card is damaged and its contents are permanently lost. -The memory card is damaged and storing it in a protective case could have avoided the damage.

which of the following are examples of pointing devices

-mouse -touchpad

Which of the following types of storage is/are used to transfer data from one computer to another?

-optical media -external hard drive

overheating caused by direct sunlight can damage the...

-processor -LCD screen -hard drive

Which of the following should you take into consideration when purchasing a computer?

-software and applications you intend to use -storage capacity

an operating system uses available storage space on a startup drive for...

-storing programs -storing apps - virtual memory

the main categories of software are...

-system -application -development

a laptop typically includes a...

-touchpad or trackpad -keyboard

which of the following is/are classified as input device(s)?

-webcam -mouse -touchpad

When should a user consider restoring the operating system?

-when the apps do not respond properly -when the computer is slow

Why is the .gov domain name so useful to know?

.gov sites have official authorization so they are usually reliable sites.

What is maximum speed for 802.11ac?

1 gigabit per second

7. Liesel is working on a research paper on a computer at her school's library. She saves it to the cloud, then signs off and packs her bookbag so she can get to class on time. On what device is her filed stored? Her USB flash drive The library's computer A remote server Her smartphone

A remote server

A modem can also function as what other piece of hardware?

A router

Query

A search term entered into a search engine to obtain results. In a database, a database object used to specify criteria that extract data based on criteria that the query creator specifies. Criteria are conditions for a field

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

Anusha wants to use her computer,rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

What is a MAC address?

A unique hardware address for your device

What would you need to install if you have an app that is incompatible with your current operating system?

A virtual machine

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Businesses use webinars for the following reasons EXCEPT _____.

A.

An operating system uses available storage space on a startup drive for _____. Select all that apply.

A. storing programs B. virtual memory C. storing apps

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? (530602

A:BCC your supervisor in your response

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? (516208)

A:Change font size, style, and color of the keywords.

Which is a first step to deter thieves from accessing your financial information? (516103)

A:Do not provide over the phone or through email.

Businesses use webinars for the following reasons EXCEPT _____. (530599)

A:Group discussions

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?

Adjust the settings of the mouse through the settings dialog box

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

Adobe Premiere Clip -- Adobe Premiere Clip and FilmoraGo are video editing apps that allow you to modify video clips.

How do you know if a device is an input device or an output device?

An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.

Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?

B2B

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files? (516006)

B: Because he is using the same name, each time he saves he is overwriting his previous work.

How do you know if a device is an input device or an output device? (516020)

B:An input device • enters data and instructions into the memory of the device. An output device is how the processed information is displayed.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? (530432)

B:Because insiders sometimes create threats after incidents at their places of employment

What does the operating system do if you try to save a file with the same name into the same folder? (530409)

B:It overwrites the original file unless you add a number, date, or initials to differentiate the files.

You can monitor and protect your financial data in all of the following ways EXCEPT _____. (516088)

B:Requesting a credit and freezing your credit.

In the email communication process, what is the role of the email server? (516523)

B:Routing email messages through the Internet or a private network

What is a digital certificate? (516086)

B:Technology used to verify a user's identity

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? (516196)

B:Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Which of the following statements about browser security settings is false? (530443)

B:You must keep your history as long as you use the browser.

How would you describe the social networking site YouTube? (516521)

B:YouTube is a media and sharing network that lets users display and view videos and then post comments.

Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work? (530428)

B:Zoho writer

What is the main purpose of an operating system? (530386)

B:to coordinate the resources and CC 4-7 activities on a computer

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?

Because he is using the same name, each time he saves he is overwriting his previous work.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? (530441)

Biometrics

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?

Bluetooth

Interference is a common problem with _____ devices. Select all that apply.

Bluetooth wireless

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?

Broad network access

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike?

C2C

Which of the following is an advantage to saving a file to a flash drive? (516001)

C: You can take it with you and then work on it on another computer.

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? (516218)

C:Create a database of company projects, customers and vendors.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? (516074)

C:It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Which of the following statements is true about the Clipboard? (516005)

C:It is temporary storage that holds a selection until you paste it into a document or folder.

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have? (530421)

C:It should have responsive design so that it is easy to use on mobile devices.

If you delete a shortcut from your desktop, have you also deleted the original file? (515986)

C:No, because a shortcut does not Increase place the actual file, folder, or app on the desktop

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her? (530399)

C:Use the search tool to locate the file by file name, content, or date.

14. When your computer accesses a webpage, what network architecture role is your computer filling? Peer Server Client Administrator

Client

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

Create a database of company projects, customers, and vendors.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of_____.

Cyberbullying

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? (516201)

D:A spreadsheet app to keep a record ofher expenses, sort data, and make calculations

Which of the following is the strongest password? (530439)

D:H@veAGr3atDaY!

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her? (515977)

D:The kernel is the • core of an operating system that manages memory, runs programs, and assigns resources.

Which of the following are ways to avoid computer viruses? (choose all that apply)

Do not open e-mail attachments from strangers. Do not share personal information with people you do not know. Install security updates on a regular basis

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage? (530419)

Drop Box

A graphics designer created the company's logo so the company can resize it to multiple dimensions based on the need without the use of any photo editors. Which of the following image file formats is most likely to have been used to make this happen?

EPS

Another term for a single-user license An end-user license agreement, or _____, grants one user the right to use the software.

EULA

Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?

Enable sticky keys

Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?

Enable sticky keys.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

Which explanation best explains the importance of using encryption?

Encryption protects sensitive information.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? (516070)

Ergonomics

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

Which of the following is the most reliable way to check the accuracy of a website?

Examine the sources cited by the website.

20. Which network type is often used for vendor access? Intranet Intranet Extranet Wireless network

Extranet

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

when using a Windows Internet browser, pressing ____ reloads a page

F5

Social networking sites never allow members to post messages on the pages of other members

FALSE

To join a social network, you can create an avatar

FALSE

You have no control over who views your social networking information

FALSE

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

A Trojan is a malicious program that uses a computer network to replicate. (516075)

False

Bandwidth is a term that describes the number of devices connected to a network.

False

Before you can open and edit a compressed file, you need to zip it.

False

Big data is processed using relational databases. (516217)

False

Buying a collection of programs in a software suite usually costs significantly more than purchasing them individually.

False

Console systems only allow one game pad to be used at a time.

False

[email protected] is an appropriate email address to use for communicating with potential employers

False

Database software is software that allows users to organize data in rows and columns and perform calculations on the data.

False

Distributing programs outside the terms of a license agreement is a violation of copyright law but is not a federal crime.

False

Document management software allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project

False

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. (516530)

False

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. Group of answer choices

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. (516093)

False

The Close button reduces a window so that it only appears as a button on the taskbar.

False

The operating system assigns the file its name, location, and size.

False

When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy

False

When you save a document, the computer transfers the document from a storage medium to memory.

False

Wikis are not useful in education because students cannot use them to share notes and give feedback. (530585)

False

Wikis are not useful in education because students cannot use them to share notes and give feedback

False

Which of the following is used for security? Check all of the boxes that apply.

Firewall antivirus programs network backups

Posting hostile or insulting comments in response to someone else's blog post is called _____.

Flaming

You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?

Folder

If you have a file that has billions of bytes of data, then it would be measured in _____.

Gigabytes

Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?

High-quality product photos

How is digital audio better than analog audio in terms of quality?

Higher sampling rate amounts to higher bit rate and hence better audio quality.

10. Sonia works from home and uses the Internet often throughout the day. When they're home, Sonia's husband and children also use her network for gaming, social media, and streaming videos or music. What kind of network best describes Sonia's network? ISP network Business network Internet Home network

Home network

A unique location for a computer on the network:

IP address

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Which kind of cloud service requires the most technical skill to use?

IaaS

A(n) _____ is a small picture that represents a program, file, or hardware device.

Icon

In which of the following real-life situations would it be useful to use a digital certificate?

If you were signing a rental lease.

An email to a customer

In which of the following messages would the abbreviation brb (which stands for "be right back") NOT be appropriate?

In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called?

In-betweening

5. Celeste is preparing to lead a training session during a video conference. How can she engage the audience and encourage active participation? Encourage the audience to take notes Incorporate polling questions Wear a silly hat Ask for feedback by email

Incorporate polling questions Rationale: Some webinars are interactive and collaborative, allowing polling questions to survey the audience on a topic.

The hard disk drive on Joyce's laptop can store up to 500 GB of data. She usually only saves official documents and a few songs that she listens to while she works. However, when she uses more than three applications at the same time, her laptop responds more slowly. What should she do to optimize her storage?

Increase the RAM on her laptop so that more space for temporary storage of data is available, hence, increasing the performance

_____ is data and instructions entered into the memory of a device.

Input

Laptops, all-in-one desktops, and smartphones usually have _____

Internal microphones

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following is NOT a step an operating system performs when printing a document?

It creates the document to be printed

Why is the access date important to include when citing a website? (select all that apply)

It indicates websites changes. It indicates website accessibility changes.

Which of the following is a characteristic of a strong password?

Letters,numbers, and symbols.

A remote server

Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored?

6. During his spare time, Richard is active with a political organization that sometimes takes a strong stance on controversial topics. He wants to post about his political activities on social media and connect with friends who have similar values. Which of the following sites would NOT be a good place to do this? Instagram Facebook Twitter LinkedIn

LinkedIn

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

Linux

Logan is considering web app development as a career option. Which of the following languages does he not need to master? (516193)

Logo

Logan is considering web app development as a career option. Which of the following languages does he not need to master?

Logo

13. Adrian is having a problem with setting up a new printer in his office, and he can't find the answers to his questions in the owner's manual. Which of the following resources would be the best place for Adrian to ask his questions and get targeted responses? Microblogging platform Message board Podcast subscription Social shopping network

Message board Rationale: Posting questions to a message board targeting a specific area of interest, such as computer hardware, invites responses.

An elementary school includes computer science as pat of its curriculum. Which of the following software could the school introduce to these students to create an awareness and interest in drawing and image editing, such that it closely simulates the real-time water colors, pastels, and oil paints that the children use?

Microsoft Paint

Which of the following is a step in the boot process?

NOT The operating system catalogs the files and folders on the system.

Which of the following is an authentication method to keep your data safe?

NOT encryption

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?

NOT start window

When you want to add information to a document, what role does your operating system play?

NOT starts the word processing program

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

NOT the network most likely uses a firewall for protection

Which of the following terms refers to the area of the hard drive used for virtual memory?

NOT virtual file

A(n) _____ protects your device against unauthorized access.

NOT virtual machine

Why is network security important? Check all of the boxes that apply.

Network security allows organizations to continue to function. Network security keeps intruders out of the network. Network security prevents personal information from getting into the wrong hands.

Why would you want to connect your computer to a network?

Networks allow computers to share resources, such as hardware, software, data, and information

Provide immediate reactions to current and recent events

New Sites

Report facts as they occur

New Sites

Binary code uses alphanumeric characters to represent all values.

No

What does an operating system provide so you can interact with a device?

Not file storage

Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? Group of answer choices

Online Storefront

How can you display the main folders on a Windows computer

Open File Manager

How can you display the main folders on a Windows computer?

Open File Manager

Paul has opened a bespoke tailoring shop. He wants to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suites should he consider?

OpenOffice, G suite

You should unplug your computer if you _____.

Smell burning or see smoke rising from it

9. Nancy receives a call from someone claiming to work for the local Sheriff's Department. The caller says Nancy hasn't paid her speeding ticket, and she's about to be arrested unless she pays the fine with a credit card over the phone. What kind of attack is this? Social engineering Denial of service Phishing Trojan

Social engineering

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

~networks social

Social networks, including synonyms for networks

A set of instructions that tells a computer what to do, how to do it, and where to send the results or output is called ________.

Software

Which of the following statements is true of hackers? Check all of the boxes that apply.

Some hackers are criminals. Some hackers do it as a form of protest. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work?

Text messages containing bad news

What helps you evaluate websites for reliable information? (select all that apply)

The information you found is repeated or agrees with what you already know to be true. The domain name ending indicates the website is reliable (.gov, for example).

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

They had to unzip or extract it.

Which of the following are true of trademarks? Check all of the boxes that apply.

They protect logos. They show who the maker of the item is. They can be registered with the government.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network

Which of the following statements describes patches?

They solve problems with software or security.

Where can you pin frequently used apps for easy access?

To the task bar

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?

Transfer contents to an external storage device.

Often used as keyloggers to steal passwords to online accounts, _____disguise themselves as useful programs like utilities.

Trojan horses

E-commerce job

Truck driver and Forklift

If you add a slideshow to play as your desktop theme, you have customized your system software

True

If you upload photos to a NAS device, everyone on the network can access them.

True

Many chatbot services provide support to employees and management rather than to customers.

True

Output methods include speakers, headphones, and interactive whiteboards.

True

True or False

True: You can post a Facebook status update from your smartphone. Mobile devices typically come pre-installed with "standard" apps like web browsers, media players, and mapping programs. Mobile devices need to work within limited screen space. Mobile apps are software programs that run on mobile devices like smartphones and tablets. False: A mobile app designed for an Apple iPhone will work on an Android phone as well. Operating systems of mobile devices can support full-scale software programs like Microsoft Word or Excel.

Which of the following is a utility that removes a program, as well as any associated entries in the system files?

Uninstaller

How is an executable file different from a data file?

Unlike a data file, you cannot open and read executable files.

How is streaming of video or audio different from downloading it?

Unlike streamed content, downloaded content is stored on the computer.

Which learning model allows an AI system to create its own categories of data without labeling those categories

Unsupervised learning

A software __________ replaces small sections of existing software code with new, improved code to add enhancements or fix problems.

Update

An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make to achieve this?

Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

A construction firm intends to use technology to help and enhance the design and architecture. In which of the following ways can the firm do that?

Use a computer-aided design software to create better and more accurate designs.

How can you protect a computer from electrical spikes and surges?

Use a surge Protector.

How can you protect a computer from electrical spikes and surges? (516076)

Use a surge protector

How can you check data on devices connected through IoT network?

Use a tablet

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1.Create a list of invitees; 2.Design the card; and 3.Personalize the card. How should he go about the task?

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. -- When using mail merge, the document to be personalized must be prepared before the actual merging can happen.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1.Create a list of invitees; 2.Design the card: and 3.Personalize the card. How should he go about the task?

Use a word processor for step 1. graphics software for step 2, and mail merge for step 3.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats. -- Many cross-platform app development tools provide a compiler that can translate existing code into different native platforms.

Alessandro wants to use his desktop computer to video chat with his mother.What hardware does he need to accomplish this?

Use his webcam and speakers so that he and his mother can both see and hear each other.

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?

Use the search tool to locate the file by file name, content, or date.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future?

Use vector images because they retain their clarity even when enlarged or shrunk.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in the future?

Use vector images because they retain their clarity even when enlarged or shrunk.

Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?

Use vector images because they retain their clarity even when enlarged or shrunk. -- Vector images retain their clarity and crispness even when they are enlarged or shrunk.

How could and online attacker use your profile to gather information about you to steal your identity?

Use your posts to figure out answers to possible security questions.

What are the parts of an email?

User ID "At" symbol Domain name

A(n) _____ protects your device against unauthorized access.

User account

Why has e-commerce expanded?

Users can trust the site with personal information.

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. (530594)

Using your photos and posts to form impressions about your character

Social networking can leave you exposed to criminal activity in the following ways EXCEPT

Using your photos and posts to form impressions about your character

What facilitates bundling of video, audio, codec, and subtitles into a single package?

Video container

A video that is shared millions of times over social media in a short period of time is termed to be____

Viral

Which type of gaming system has sensors to detect the users' movements, and a head-mounted display that adjusts the vision and audio thereby replacing the environment as it would appear in real world?

Virtual World

Alice went to a movie theater where she was given special headsets with eyeglasses to watch the movie. Her experience was so immersive that she felt almost no barrier between herself and the media. Which of the following digital media could she have been experiencing?

Virtual reality

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? (530590)

Voice over Internet Protocol (VoIP)

Which of the following statements describes the way networks are set up?

WANs are made up of LANs.

Which of the following statements is true of WANs?

WANs can be as big as the Internet.

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? (530586)

Web conferences

Word Processing Application or Other Application

Word Processing: Make a flyer for next week's hockey game. Write a quarterly performance review of your top employee. Update your resume to include your latest work experience. Other Application: Calculate quarterly earnings for the past five years, and chart the results. Calculate last quarter's sales product line and region. Input a new customer record into your customer database system.

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report? (530412)

Word processor

Public Domain

Work that you can use freely because it is not subject to copyright; the copyright may have expired or the owner may have explicitly released the work to the public domain

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them from the website. If she has an internet connection what software can help her do her work?

Zoho writer

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work?

Zoho writer

message board

a ______ or internet forum is an online discussion site where people in a conversation by posting messages

newsreader

a ______ program used to participate in a newsgroup, is often provided with some e-mail software

______ are programs that help people work and play online.

applications

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. (516524)

archive

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

you type out a few sentences in a MS Word file, and save it on your desktop. how is the data stored in the computer?

as a combination of 1s and 0s

dock

attaching the options bar to a specific area of the workspace

How fast data travels on the network:

bandwith

The maximum data transfer rate, or capacity, of a network or Internet connection:

bandwith

What is the meaning of ethics? Check all of the boxes that apply.

behavior that is good for everyone following the rules behaving in a way that would be easy to defend

What increases efficiency when using the Internet? Check all of the boxes that apply.

being prepared for a search looking to see that the information is reliable using the browser's "bookmark" tool

Which of the following applies to a trademark?

belongs to just one company or organization

in which format is data finally stored in computers?

binary digits

Type of graphic image where colors are assigned to individual screen pixels

bitmap

A _____ is a hacker who criminally breaches the security of a computer or network.

black hat

Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing?

block them

Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals?

blog

which of these is an optical medium of storage?

blu-ray discs

One of Richard's duties in his new job is to be active on LinkedIn and other professional social networks. Which of the following activities should he avoid when using social media for his company?

brain teasers

What determines the speed at which data travels?

bus width

Which of the following accurately completes this sentence. (choose all that apply) Online predators ____.

can go to jail if caught try to befriend young people

What information is revealed about an owner through their email?

can reveal their name

lets people access their stored data from a device that can access the Internet.

cloud computing

Jason takes many photographs on his smartphone while on vacation in Italy.If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?

cloud storage

Architects, scientists, interior designers, and engineers use _____ design software to create highly detailed and technically accurate drawings.

computer-aided

Telecommunications networks include _________ within an organization.

computers and telephones

Type of license that lets you use a specified number of software copies at any given time

concurrent-use

The ability to _______ to the Internet is a key feature shared by most mobile apps.

connect

The network backbone

connects routers to more efficiently route data.

menu

contains a list of commands you can use to perform tasks such as opening, saving, printing, and editing photos

Routers know where to send a network packet because they read the _______ contained in the packet. The ________ is the information that a user wants to send. A(n) ________ is an example of a payload.

control information payload email message

Which of the following is plagiarism?

copying a story from a book and then turning it in as your own creation

What is software piracy? Check all of the boxes that apply.

copying computer software or programs illegally making lots of copies and sharing with friends breaking the security on software so it can be used illegally

The legal right to copy, distribute, modify, and sell an original work

copyright

Which of the following protects intellectual property?

copyright

zoomify

creating a high-resolution image for the web, complete with a background and tools for navigation, panning, and zooming

There are various risks from attacks on Wi- Fi networks. These include all of the following EXCEPT _____. (516080

creating malware

Intellectual property can be defined as

creations made from peoples imagination

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. (516072)

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. (530433)

data backup

Cloud computing helps to address

data storage problems

Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?

database

Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx? (530379)

date modified

Jennifer recently bought a new computer to type a new manuscript she's been working on. She also stored a lot of movies on it to watch during her free time. Though the performance was good at the beginning, it deteriorated quickly over a small period of time. Which of these is the most likely cause?

declining free space on the hard drive

_____ are standard settings that control how the screen is set up and how a document looks when you first start typing. (530397)

default settings

which of these, though not equally portable, is most powerful and usually easier to upgrade than others?

desktop computers

A _____ is software that helps peripheral devices communicate with a computer.

device driver

Unlike application software programs, which run in a window on your desktop, _____ usually run in the background whenever they're needed.

device drivers

Carlos is arranging a series of weekly conference calls for people in different parts of the world. Which of the following tools can he use to inform participants about the call details?

digital calendar

A series of image frames displayed quickly enough for us to perceive them as continuous motion

digital video

You recently lost some files that were important to you so you have resolved to back up the contents of your hard disk on a series of rewritable DVDs. What kind of software will you use to do this?

disc burning

Liena

disinformation

Which of the following can you run to find and remove unnecessary files? (530374)

disk clean up utility

utility removes unused files like temporary Internet files from your hard drive so the computer doesn't search through unneeded files.

disk cleanup

Workplace ethics include

doing the work you have agreed to do while at work.

Ethics is a way of behaving so that you are

doing what is right

Obtain a software program from an online app store

download

File sharing is a way for people to

download entire books

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? (516219)

drawing app

Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?

drop box -- Many apps are available to do individual tasks. However, the apps that Patricia needs to use are a banking and payment app, a cloud storage app, a productivity app, a photo editing app, and a social media app.

Check all of the improvements and inventions of the 1970s.

e-mail hardware improvements improved data transmissions

What are some benefits of the Internet? (select all that apply)

ease of communication e-mail collaboration

What kind of application teaches a particular skill?

educational

What are examples of asynchronous communication?

email, social networking posts, and text messages

What was the first technology for communicating online?

email?

Software that runs on household appliances and consumer electronic devices

embedded

Simon has difficulty pressing and holding more than one key at a time, such as CTRL +ALT+DEL. What setting can he change to make this task easier?

enable sticky keys

specialty search

engine that provides access to academic information for research

general search

engine that searches web pages in its database that contain specific words or phrases

Operating systems can run only if they are installed on a hard drive. (530400)

false

The Close button reduces a window so that it only appears as a button on the taskbar. (515990)

false

The operating system assigns the file its name, location, and size. (516003)

false

To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.

false

When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy. (515970)

false

a joystick is a pen-type input device used to draw and tap on icons

false

all-in-one computers are easier to service and upgrade but occupy more space than desktop computers T/F

false

binary code uses alphanumeric character to represent all values T/F

false

console systems only allow one gamepad to be used at a time T/F

false

in order to support file sharing, your PC must run a network operating system T/F

false

most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations T/F

false

random access memory (RAM) is a permanent storage location T/F

false

speech recognition refers to a computer's ability to record and edit human speech T/F

false

the System Restore command in Windows returns deleted or modified documents T/F

false

The ability of a network to recover after any type of failure:

fault tolerence

Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems?

faulty power or video cable

In Windows, you use _____ to reorder, move, and navigate between folders. (530398)

file explorer

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Posting hostile or insulting comments in response to someone else's blog post is called _____. (516534)

flaming

Solid state hard drives are a type of _________ memory

flash

solid state hard drives are a type of _________ memory

flash

Tammy spends time each day reading updates and news articles in her industry. She's always looking for new sources of quality information. What tool can best help her do this?

flipboard

What you need to change to make words appear bigger on the page

font size

This defines what text characters look like

font type

Copyright protects the rights of the author of a book

for the life of the author plus seventy years

The ______ of a worksheet defines its appearance.

format

Slide __________ sets the appearance of text, objects, individual slides, or entire presentations.

formatting

An equation that performs a calculation to generate a value

formula

Software distributed free of charge via the Internet, where the developer retains the software rights

freeware

Part of the network that allows communication with other networks

gateway

If you have a file that has billions of bytes of data, then it would be measured in _____. (515997)

gigabytes

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

You would like to share information you found on a website. (select all that apply) You should:

give credit to the source of the information on the website. check to be sure this information is reliable and accurate.

What does an operating system provide so you can interact with a device? (530383)

graphical user interface

Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover? (530426)

graphics app

Samantha has a file named vacation.jpg. What type of file is it?

graphics file

Samantha has a file named vacation.jpg. What type of file is it? (530385)

graphics file

Which of the following helps you more easily locate the files and folders you need?

grouping similar subfolders together in a folder

Which of these hardware components can you use to store videos?

hard drive

Around the world, all the laws governing behavior on the Internet are

hard to enforce.

The physical equipment

hardware

What do network operating systems use? Check all of the boxes that apply.

hardware software

If someone gets on the network who is not authorized to have access,

he can steal people's information. He can do damage to the network. he can make the network crash.

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to perform the task?

he should use a scanner, which would convert an image into an electronic file

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? (516207)

header and footer

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer -- The header displays the same information at the top of each page of the document.

Which of the following is not an input device?

headphone

Communications software

helps your computer connect to a network and then work with communications standards to manage transmitting and receiving data.

Technology can lead to all of the following behavioral risks EXCEPT _____. (516071)

higher satisfaction with life

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

When you download a mobile app, the installation program installs an ______ for the app on your mobile desktop.

icon

Folder names should _____.

identify the content and purpose of the folder

Folder names should _____. (530381)

identify the name and content of the folder

source

if you are sending an e-mail message from your laptop to a classmate, the laptop is the _______

When you save a Microsoft Office file to OneDrive, where are you saving it?

in a storage area located on a server

When you save a Microsoft Office file to OneDrive, where are you saving it? (530378)

in a storage area located on a server

What happens when you delete a folder? (516009)

in goes in the trash folder or recycle bin

In a spreadsheet program, how is data organized?

in rows and columns collectively called a worksheet

Manny copied a table from a MS Excel file, closed the file, and then pasted the table in an MS Word document. Where did the copied table get stored after he copied it?

in the RAM

When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with?

incoming mail server

Celeste is preparing to lead a training session during a webinar. How can she engage the audience and encourage active participation?

incorporate polling questions

Which two factors most influenced the growth of the Internet during the 1970s?

increase in the power of computer hardware and increased funding from the National Science Foundation

Local Area Networks (LANs) _________.

increase networking speed

Social networking includes the following positive effects EXCEPT

increasing your privacy

Social networking includes the following positive effects EXCEPT _________. (530593)

increasing your privacy

Laptops, all-in-one desktops, and smartphones usually have...

internal microphones

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document? (515981)

it places a document in a buffer

The quality of an audio file is determined by____.

its bit rate

Which of the following email addresses would be the best fit for a business consultant?

[email protected]

3. Which of the following email addresses would be the best fit for a business consultant? [email protected] [email protected] [email protected] jefjones^[email protected]

[email protected] Rationale: Choose a user name that is easy to communicate to others verbally and that's easy to remember without trying to be humorous or offensive. Short user names, such as jeffjones, are easy to spell, easy to remember, and don't require unusual symbols.

Some mobile apps include on-screen ____________ to make typing and data input easier.

keyboards

Text that describes the contents of another cell or cells in a worksheet

label

What kind of software assists in the preparation of a will, for example?

legal

Which of the following is a characteristic of a strong password? (516081)

letters, numbers, and symbols

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

list of posts with the most recent ones at the top

The letters LAN stand for ______ Area Network.

local

Which of the following storage locations does NOT give you access to your files over the Internet by default?

local Hard Drive

Two of the computers at work suddenly can't go online or print over the network. The computers may be trying to share the same IP address.

logging off one of the computers, and then logging back on

TIFF, PNG, and GIF files can be compressed using _____ compression, so the files contain all of their original data when uncompressed.

lossless

Type of compression used in JPEG files where some of the original file data is discarded

lossy

Which of the following operating systems includes a virtual assistant? (530384)

macOS

You can typically go to the ______ Web site to download the latest versions of device drivers for your computer's peripherals.

manufacturer's

GPS and ____________ apps help you get directions and avoid traffic jams.

mapping

To watch video on a computer, you need special hardware plus software known as a _____.

media player

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. (530595)

meeting invites

To observe professional messaging guidelines, you should avoid using the following EXCEPT

meeting invites

citizen journalist

members of the public who report on current events

Which of the following features is a way to make a computer do what you want it to do? (530401)

menu

Which of the following features is a way to make a computer do what you want it to do?

menu

Adrian is having a problem with setting up a new printer in his office, and he can't find the answers to his questions in the owner's manual. Which of the following resources would be the best place for Adrian to ask his questions and get targeted responses?

message board

When David posts his photos to a Facebook album, the Facebook site automatically places David's photos in chronological order by when they were taken and suggests places David might want to tag in the photos. How does Facebook know this information?

metadata

Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently? (530406)

minimize the window and then open a new one

A fitness tracker is an example of a(n) ______ device

mixed

a fitness tracker is an example of a(n) _____ device

mixed

To _______ a folder, select it and then drag it to a different folder.

move

float

moving the options bar to another area of the workspace

What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?

multimedia authoring

What should you do the first time you save a file? (530408)

name the file

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app -- Native apps can run even when the system is not connected to the Internet. The data is synchronized when the system gets connected to the Internet the next time.

Which of the following is a current development in networking?

need for better data storage

a computer typically connects to a router via a...

network interface card

The way the network is laid out, including all the interconnections:

network topology

WANs are

networks that cover a large geographic area

Everyone wants to avoid online predators. One good way to protect oneself is to

never give out personal information to people you have met online

The System Restore command in Windows returns deleted or modified documents.

no

Rows are typically represented by _______ and contain data for individual records.

numbers

metasearch engine

offers the convenience of searching many sources from one website

Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times.

on-demand

How can you display the main folders on a Windows computer? (530410)

open file manager

Copyrighted software whose source code is available to the public is known as _____ software. Copyrighted software, such as Linux, that is typically distributed free of charge and can be customized

open source

Windows, Apple's Mac OS, and Unix/Linux are just some of the most common

operating systems that can network.

_______ recognition converts scanned documents into editable text

optical character

instant messages

or real time messaging

Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes that apply.

organizing the storage of data accessing the Internet at the same time as other users

Digital information processed into a useful form is called _____.

output

Digital information processed into a useful form is called _____. (530396)

output

Software that is mass-produced and appeals to a wide range of users is called _____ software.

packaged

Swapping items between memory and storage is called _____.

paging

Swapping items between memory and storage is called _____. (530390)

paging

A type of network that does not use a router but shares data directly between computers:

peer to peer

A network administrator is usually not required on a _____ network.

peer-to-peer network

Cloud computing allows:

people to access information and applications from a web browser.

Trademark and copyright were first established so that

people's intellectual property would be protected

Benchmarking is an evaluation of _____.

performance

benchmarking is an evaluation of...

performance

digital images

pictures in electronic form

An operating system is also called a(n) _____.

platform

An operating system is also called a(n) _____. (530369)

platform

Operating system software, also called a(n) _____, manages computer hardware and software.

platform

______ can occur when recording words containing the letter "p" and "b".

plosives

what printer is commonly used to produce high-quality professional drawings such as architectural blueprints?

plotter

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?

plug-and-play devices

Yuri is preparing for a certification exam in his industry and needs to study. However, he has a long commute for work each day where he's driving in crowded traffic. What form of digital communication would best help Yuri put this time to good use

podcasts

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing? (530418)

portable app

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?

portable app -- Martha needs to develop an anti-virus app, which is a device management app. The app should be kept on a portable device so that it can be connected to the infected system when required.

Which of the following kinds of software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group?

presentation

which of these is not an input device?

printer

Which of the following devices can be connected to a network? Check all of the boxes that apply.

printers smartphones laptops tablet computers

Type of application software that automates common or repetitive tasks

productivity

The network backbone is not directly connected to computers. Instead, data goes through the______ first.

router

Which device is used to direct the flow of data on a computer network?

router

Rules for how routers communicate with one another and send data:

router protocols

Start a software program

run

what is the correct way to update a device driver?

run the update within the OS or the latest software from the device manufacturer's website

Talk into a microphone to "write" a report.

speech-to-text

what performance specification does 2 GHz refer to?

speed at which the processor executes instructions

The program that allows jobs like printing to be saved until the printer is ready for the next job:

spooler

Which of the following is an unethical use of the Internet?

spreading rumors or gossip about people

Programs that can track and steal your personal information and change the settings on your browser without your permission are called _____.

spyware

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

PSD format

stands for Photoshop Document Format, the default file format for files created from scratch in Photoshop

When all computers in a network are connected in a "star" formation:

star topology

Many mobile apps are written by third-party programmers to sell through app ________

stores

Technology that transfers only a segment of a video file at a time from the Web to your computer

streaming video

A _____ is a named collection of formats you apply to text in a word processing document. (530414)

style

A _____ is a named collection of formats you apply to text in a word processing document.

style -- A wireless remote control can be used to advance slides from anywhere without having to stand near the podium computer to do so.

The bootstrap program executes which of the following? (530392)

tests that check components such as RAM and storage

Create a voice-over narrative from a written script.

text-to-speech

Which of the following belongs in a website citation? (select all that apply)

the Internet address or web page address the person or organization responsible for the website the date when you got the information

Select the best answer to the question: Which of the following best describes e-commerce?

the ability to do business online

Which of the following is a step in the boot process? (530403)

the operating system files are loaded into RAM

display area

the portion of the document window that displays the photo or image

optimization

the process of changing the photo to make it most effective for its purpose

document window

the windowed area within the workspace that displays the active file or image

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?

through an online service

if you do not want to uIe your Internet service provider (ISP) for your email account, how can you acquire a webmail account? (530589)

through an online service

A slide _____________ is a miniature image of a slide.

thumbnail

Method used in editing video, using separate tracks for video and sound

timeline

zoom

to change or adjust the magnification

How might a business use a blog? (516518)

to communicate with customers

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

crop

to cut away some of the extra background in the editing process

Which of the following are goals of e-government? Check all of the boxes that apply.

to have a secure website to be able to protect the personal information of the people who use the site to make information about the government available

A hierarchical addressing scheme is used

to identify computers on the network.

Which of the following are uses for application software?

to make users more productive

A file manager is used for all of the following except ____. (516013)

to name files and folder

A file manager is used for all of the following except ____.

to name files and folders

resize

to scale or change the dimensions of the photo

A router sends data

to the correct computer. where it should go. based on the data's destination.

Where can you pin frequently used apps for easy access? (530404)

to the task bar

Where can you pin frequently used apps for easy access?

to the taskbar

An _____________ is an action that occurs as you move from slide to slide in a presentation.

transition

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation? (530425)

transitions

Graphics that help a viewer know when one scene ends and another begins are called _____ .

transitions

A device driver is a program that controls a device attached to the computer.

true

Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved.

true

Each slide in a presentation has a layout that includes placeholders for certain types of content. (530423)

true

If you add a slideshow to play as your desktop theme, you have customized your system software. (515985)

true

It is advised to fully charge the battery of a laptop before using it for the first time.

true

Local applications can be accessed only on the computers on which they are installed. (516189)

true

Output methods include speakers, headphones, and interactive whiteboards. (515983)

true

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.

true

When you add information to a word- processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage. (530368)

true

What is an easy way to cut down on spam?

turn on the spam filter in your e-mail

Which property is assigned to a file by the operating system? (516027)

type

asynchronous

type of communication, such as blogging, where authors and readers do not need to be online at the same time

How is an executable file different from a data file? (515968)

unlike a data file you cannot open and read executable files

A network that anyone can access

unsecured network

What is spam? (select all that apply)

unwanted communication can be inappropriate or harmful

Computer viruses are:

unwanted programs that may harm the computer.

Install a newer version of your current software program

upgrade

How can you check data on devices connected through an IoT network? (530422)

use a tablet

How can you check data on devices connected through an IoT network?

use a tablet -- All IoT objects send or receive data to and from other devices. You can see the data sent or received using your mobile device or tablet, using an app designed to do this.

Productivity software that is customized for specific industries

vertical market

The Moving Pictures Experts Group (MPEG) is a popular _____ standard.

video compression

The person responsible for the creation of the group known as ICANN is

vinton cerf

You should set your _____ software to scan any incoming messages and programs to protect your computer. Software that scans incoming messages and programs to protect your computer

virus protection

Logan is considering web app development as a career option. Which of the following languages does he not need to master?

visual basic -- Web apps rely on HTML5 to display information, CSS to format information, and JavaScript to manage app performance.

What does an operating system provide so you can interact with a device?

(GUI) Graphical user interface

What is the most common type of volatile memory?

(RAM) Random Access Memory

What are the steps to the communication process?

1. your computer or mobile device is the communication source 2. modem converts the message to electronic signals 3. communications channel such as cable TV line or fiber optic cable transmits the signals 4. receiving device, such as another modem converts the signal into an email message 5. destination device, such as a server accepts the message 6. server repeats the process to send the message to your classmate's computer or mobile device

What is the correct order for e-mail process

1. your e-mail program uses your internet connection to send your message to your e-mail server 2. the e-mail server determines the best route for the message and sends it to the first in the series of router along the path 3. the router sends the message to the recipient's e-mail server 4. the e-mail server stores the message into the recipient's mailbox 5. the recipient checks for messages, and the e-mail transfers the message to his or her e-mail program

Consider e-mail as public communication

DO

Read your messages before sending them to evaluate spelling, grammar, and tone

DO

Treat others as you would like to be treated

DO

Use all capital letters in messages and comments

DON'T

Use wording that might seem offensive or argumentative

DON'T

Technologies that include encryption to make digital content unreadable without a valid encryption key _____ technologies help to fight software piracy and prevent unauthorized copying of digital content.

DRM

Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?

DTP

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?

Data Analysis

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

Drawing App

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

Drawing app

[email protected] an appropriate email address to use for communicating with potential employers. (530598)

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

In Windows, the only way to copy or move files is to use the Clipboard.

False

Netiquette only applies to social media and social networking, not emails and instant messaging. (516528)

False

Operating systems can run only if they are installed on a hard drive.

False

RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

The only way to create a PDF file is in document management applications.

False

To prevent a laptop from being stolen, you can use a surge protector. (530438)

False

Twitter is an example of a wiki, which allows for collaborative editing by its users.

False

Most people used the Reply All button.

Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem?

What is the correct sequence of processing instructions in a machine cycle?

Fetch decode execute store

In Windows, you use _____ to reorder, move, and navigate between folders.

File Explorer

What can you do to make sure your online communications are civil and productive?

Follow netiquette guidelines.

An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other?

G Suite

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider? (530429)

G Suite

A feature to identify a picture's geographical location is known as___.

Geotagging

If you wanted to use information you found on a website, how could you do that in an ethical way? (select all that apply)

Give credit to the person or organization responsible for the site. Cite your sources.

A digital movie shows characters creating an illusion of natural motion, 360 degrees rotation, and life-like and dynamic experience on the screen. This movie most likely a(n)_____ movie.

3-D animation

Restricted Sites

A Web site that requires a subscription or other type of membership; many library sites are restricted

WiMAX or 802.16 standard

A communications standard that allows wireless communications across distances up to 30 miles

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?

A device management portable app

How can you protect personal information gathered by legitimate organizations? (530431)

Create a separate email account for receiving information from websites.

What would a password manager allow you to do? (516101)

Create and store passwords.

Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?

Create trendlines

Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do? (516212)

Create trendlines

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT____.

Creating malware

Who enforces PCI compliance for merchants who accept credit card payments from customers?

Credit card companies

When you choose a(n) ___________ installation, you only install selected features, rather than all of the features associated with a software program. Software designed to meet the unique needs of an organization or business

Custom

Which of the following statements is NOT true about a local firewall?

A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system

Why is a fragmented disk slower than one that is defragmented?

A fragmented disk has many files stored in noncontiguous sectors.

Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?

A graphics app to design the cover page and place the desired text where needed

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? (530597)

A lists of posts with the most recent ones at the top

Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?

Customer Service Rep

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends

What is an ISP?

A telecommunications company that sells Internet access.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? (530427)

A:Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future? (530416)

A:Use vector images because they retain their clarity even when enlarged or shrunk.

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?

AI

What special technology allows computers to perform the intense processing needed to perform machine learning?

ANN

The first network was called

ARPANET

How can you protect your information when using social media?

Accept friend requests from people you want to be friends with.

Brian needs to use an expensive application that his work provides on his computer at the office. However, he's traveling with his laptop and won't be back in his office for another week. Then Brian remembers his employer also makes the application available to employees through the cloud. What does Brian need to do next to use this application?

Access the application through his laptop's browser.

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.

Active windo

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?

Adjust the settings for the mouse through the control panel.

Which of the following requests to Alexa is most likely to get the desired result?

Alexa, play Journey songs on Pandora.

When data in a spreadsheet program is changed, what occurs?

All calculations can be recalculated.

Search for other people on the site she might already know and add them to her friends list

Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list?

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer.

How can an attacker execute malware through a script? (516095)

An attacker can • attach a script to a program that you download which then infects your computer.

email client

An email program you use to send and receive email messages

Webmail

An email system in which users set up an account through an online service and then access email messages using a Web browser

In which of the following messages would the abbreviation brb NOT be appropriate

An email to a customer

Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?

Android

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone? (530411)

Android

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

Android -- Amazon's App Store has apps only for Android users.

A series of images displayed in sequence to create the illusion of movement is called_____.

Animation

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?

Apache OpenOffice

What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?

Application

Computer-aid design(CAD) software helps architects,engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?

Artificial intelligence and machine learning

You type out a few sentences in an MS Word file, and save it on your desktop. How is this data stored in the computer?

As a combination of 1s and 0s

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format?

As a list of the color numbers for all the pixels it contains

Jeanne writes a song, and Raul wants to perform it. What should Raul do?

Ask Jeanne for permission to use her song in the show.

Which of the following is NOT an example of modern-day artificial intelligence (AI) application?

Asking droids for critical information during a hyper-space mission

_____Programs and features are often integrated into video editing software.

Audio-editing

_____ ensures that the person requesting access to a computer is not an imposter. (530440)

Authentication

How will you decide which browser security settings to allow and which ones to block? (516094)

B:I will need to review each browser security setting and use my best judgement.

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this

BCC your supervisor in your response

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? (530436)

Be cautious about what information she posts

Which of the following statements is true about the Clipboard?

Because he is using the same name, each time he saves he is overwriting his previous work. (The purpose of clipboard is to hold the file until you paste it.)

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breech was done by an insider. Why would the company investigate the possibility of the breach being from an insider?

Because insiders create threats after incidents at their place of employment.

Why is it not safe to connect to public Wi-Fi networks? (530434)

Because these networks are rarely protected

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? (516527)

C:A photo of you horseback riding on the beach with friends.

How is a worm different from a Trojan? (516098)

C:A worm spreads through a network, whereas a Trojan hides inside another program

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? (516214)

C:Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

Which of the following is an example of someone who is NOT practicing good netiquette? (516526)

C:Vance found • pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

Which of the following helps you more easily locate the files and folders you need? (530382)

C:grouping similar subfolders together in a folder

When you want to add information to a document, what role does your operating system play? (515961)

C:saves your unsaved work to temporary storage

Software used by architects, scientists, designers, and engineers to create technical drawings

CAD

Software necessary for a blog

CMS

Jake

CRM

Block the person

Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing?

Patricia has started a new interior designing business. Her top five tasks are creating designs, sharing them with her team and potential clients, making presentations for potential clients, sending and receiving payments, and carrying out marketing on social media. Which of the following sets of apps should she use?

Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? (516205)

D:Apache Open Office

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

Conditional formatting

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? (516211)

Conditional formatting

What are the two important components of CPU that help in processing the input into output?

Control Unit and Arithmetic Logic Unit

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

Create a database of company projects, customers and vendors.

4. Which of the following is the most secure SSID for a wireless network at a family residence? Yellow door Linksys GoVols Thompson family Wi-Fi

GoVols Rationale: The name of a wireless network, referred to as the SSID (Service Set Identifier), should be generic and not contain information such as the owner's name (such as Thompson family), address or other location identifiers (yellow door), or model of the router (Linksys). Generic names might include something of interest to the owner (such as GoVols) so long as there are no indications outside the residence that would match this interest to the Wi-Fi's location.

Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?

HIPPA

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT

HTML

What is the primary difference between HTML5 and adobe flash types of web animations?

HTML5 does not need the user to download additional plug-in software, unlike adobe Flash.

Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?

He can remotely collaborate with teammates on projects, deadlines, and events.

Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. Which among the following options will help him achieve this?

He can use a TV stick.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? (516078)

He can use remote wiping to retrace the thief's steps

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps.

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?

He should make sure to bring a tablet.

Ryan wants to install a new operating system on his laptop, but first he needs to safely store all his data - over 80 GB - so he doesn't lose any of his files. How should Ryan back up all his data?

He should use an external hard drive to store the data because the amount of data he needs to store is quite large.

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

Header and Footer

Technology can lead to all of the following behavioral risks EXCEPT____.

Higher satisfaction with life.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

One of the biggest changes to the usability of the Internet for people was the ability to use an easy way to remember site addresses. Which of the following was responsible for this?

ICANN

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?

IaaS

Folder names should _____.

Identify the contents and purpose of the folder

16. Which of the following items is NOT required to have a functioning network? Software Data Hardware Internet

Internet Rationale: Many—but not all—networks are connected to the Internet.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

What is one advantage of a company using an anonymous messaging app? (516546)

It allows for honest feedback without disclosing identities.

What is one advantage of a company using an anonymous messaging app

It allows for honest feedback without disclosing identities

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? (516545)

It allows the company to communicate to many users at once about an issue and release status updates.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? Group of answer choices

It allows the company to communicate to many users at once about an issue and release status updates

During the boot process, what does the processor do after the computer circuits receive power?

It begins to run the Bootstrap Program

Which outcome is one of the negative consequences of anonymous communication over the Internet?

It can lead to harassment and bullying.

Which of the following is not a step an operating system performs when printing a document?

It creates the document to be printed.

What happens when you delete a folder?

It goes the Recycle Bin or Trash folder

What happens when you delete a folder?

It goes to the Recycle Bin or Trash Folder

Which of the following statements describes antivirus software?

It identifies and removes viruses in computers.

Why is the date a file was modified useful?

It identifies the most recent version

Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.

It includes different parts that represent the location of a computer or device on a network. It is used for IP addresses.

Identify the disadvantages with wireless. Check all of the boxes that apply.

It is easier for unwanted intruders to access the network. The network takes some expertise to set up Interference can change how well devices connect.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer had been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.

It keeps the public informed about events in the town. People can pay bills. The government can share important information about issues with the people in that town

What does the operating system do if you try to save a file with the same name into the same folder?

It overwrites the original file unless you add a number, date, or initials to differentiate the files

What does the operating system do if you try to save a file with the same name into the same folder?

It overwrites the original file unless you add a number, date, or initials to differentiate the files.

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

It places the document in a buffer

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

It places the document in a buffer.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

How does encryption work? (516084)

It scrambles the key is used to unscramble it.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?

It should have responsive design so that it is easy to use on mobile devices. -- An app designed to give its users great experience on all devices should be available as both native and mobile apps, with a responsive design.

Which of the following statements describes spyware?

It tracks users' behavior online.

Which of the following statements describe encryption? Check all of the boxes that apply.

It turns data into cipher text. It makes data unreadable without a decryption It helps secure data. key.

Which best describes the significance of ARPANET?

It was the first WAN.

Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?

It will make the AI system sound more human.

Who first thought of the "galactic network?"

J. C. R. Licklider

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do no experience a lag in loading of the website because of high-quality images?

JPEG

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images?

JPEG

Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website? (530424)

JPEG

WPA2 encryption

Kabir is buying a new wireless router and wants to make sure his Internet communications are private. What feature should the new router include?

In terms of privacy, which of the following is a best practice? (516079)

Keeping your Social hidden in a locked box in your home

Which of the following is not a hardware device that controls the movement of the pointer on a computer screen?

Keyboard

Overheating caused by direct sunlight can damage the _____. Select all that apply.

LCD screen, hard drive, processor

Which of the following network standards applies to cellular networks?

LTE

When describing a client/server network, which of the following would be considered a client?

Laptop

How does discarding computers in a landfill affect the environment? (530430)

Lead and mercury in computer parts are seeping into the ground and water supply.

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?

Make the program available as a web app

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?

Make the program available as a web app. -- Web apps run in browsers and their files are stored on the cloud. Users can access them from anywhere on any device that has a web browser.

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office? (516187)

Make the program available as an app

Prepare the background area behind his chair.

Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview?

Which of the following statements is true about public networks?

Many public networks are not secure.

Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her?

Mason said a wake word

How would you describe the social networking site YouTube?

Media-sharing

Tags

Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos?

Which of the following features is a way to make a computer do what you want it to do?

Menu

25. Which network topology is most likely to continue to function well even if one device fails? Star network Ring network Bus network Mesh network

Mesh network

23. Which of the following devices is most likely owned and provided by the ISP? Router Modem Switch Hub

Modem

2. Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website? More control of the blog's content More expensive More branding consistency More exposure

More exposure

Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future?

More information about his needs

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

21. Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem? VPN PAN NAS WAN

NAS

18. Mick's computer has been having trouble connecting to his wireless network. Sometimes it will connect and then loses the connection within a few minutes. Sometimes he can't get it to connect at all, even when the wireless router is just a few feet away from the computer. Mick's smartphone connects to the network fine, though. What network device most likely needs to be replaced? NIC Router Ethernet cable Modem

NIC

What technology allows Siri to understand you when you request a route to a location in a nearby city?

NLP

Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?

NOT Go to the Start menu or Dock to see if the operating system saved it there

Which of the following statements is true about the Clipboard?

NOT It is temporary storage until you choose to remove it, even if you have already pasted it somewhere. A temporary Windows storage area that holds the selections you copy or cut so you can use them later.

During the boot process, what does the processor do after the computer circuits receive power?

NOT It loads the operating system into RAM.

If you delete a shortcut from your desktop, have you also deleted the original file?

NOT No, because a shortcut is just an organizing icon for apps and files.

Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently?

NOT Point to the title bar of the open window, and then drag the window to a new location

The part of a worksheet that displays the cell address of the active cell

Name box

What should you do the first time you save a file?

Name the file

What should you do the first time you save a file?

Name the file.

You can configure your wireless router to protect your devices in all of the following ways EXCEPT____.

Naming your router something you'll remember, like your street address.

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop? (516192)

Native app

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the internet. What type of app should he develop?

Native app

17. When an ISP throttles, or slows down, one customer's very busy Internet activity so that other customers don't experience slower Internet service, what concept is being challenged? Social engineering Freedom of choice Net neutrality Network security

Net neutrality

Which of the following statements describe network backups? Check all of the boxes that apply.

Network backups help secure networks against failure. Network backups are usually done nightly.

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

Which of the following are disadvantages of networks? Check all of the boxes that apply.

Network intruders can access all computers on a network. Networks are costly to set up

Which of the following statements best describes network security?

Network security protects individuals' privacy.

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

Omnichannel strategy

credit line

On a Web page, a line of text near a photo or other reproduced content that states its source and any necessary copyright information

Using which of the following methods of accessing media does the user access an original file stored on the media distributor's server?

On-demand content

Digital information processed into a useful form is called _____.

Output

You are experiencing some problems with your operating system on your desktop and want to repair some problems with your hard disk. Which of the following will you use?

PC Maintenance Tool

Crowdsourcing

Paulo is trying to organize groups to clean a river, which has become clogged with plastic products after a recent storm. Which of the following social media tools can he use in his organizing efforts?

Which of the following is a trend in Internet computing?

People are using a greater number and variety of apps to help them do everyday things.

How can people check whether information they found on the Internet is reliable?

People can determine if what they read agrees with other information they know is true.

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

The default libraries in Windows 7 are Documents, Music, __________, and Videos.

Pictures

What best describes the difference between plagiarism and fair use?

Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.

An operating system is also called a(n) ________.

Platform

11. Yuri is preparing for a certification exam in his industry and needs to study. However, he has a long commute for work each day where he's driving in crowded traffic. What form of digital communication would best help Yuri put this time to good use? Online conferencing Podcasts Voice-to-text Email

Podcasts

Popular presentation software that includes a video player

PowerPoint

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?

Program window

What concerns are there about open source programs? (516015)

Programmers will add malicious code to damage a user's system.

What concerns are there about open source programs?

Programmers will add malicious code to damage a user's system

If several programs or apps are running simultaneously, your computer or device might use up its available _____. (530388)

RAM

If several programs or apps are running simultaneously, your computer or device might use up its available _____.

RAM

Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work?

RPA

NAS

Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem?

Which of the following is typical content for a podcast?

Radio shows

Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment?

Rapid Elasticity

Alejandro has a computer with a powerful processor on which he plays a game where he controls the characters' movements. The game produces at least 1 billion bits of information at 60 frames per second for display. Which of the following kinds of gaming is this an example of?

Real-time animation

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?

Receiving clerk

If you delete a folder by mistake, you can restore the folder using the _____________. Not emptying this lets files remain on your computer and take up space

Recycle Bin

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?

Reinforcement learning

Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements?

SaaS

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using

SaaS

PoE

Sandhya is installing a security camera at the entrance to her office. The camera needs power and network access, but there's no power outlet near the door. What technology can Sandhya use to get power to the security camera?

Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?

Save a copy of the file on her local hard drive.

When you want to add information to a document, what role does your operating system play?

Saves your unsaved work to temporary storage

Include information that's been written and researches thorougly

Scholarly Sites

Published by professionals for professional audience

Scholarly Sites

provide access to articles and book that analyze events and place them in historical perspective

Scholarly Sites

What was the original intention for the creation of ARPANET?

Scientists could share information and collaborate.

Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list?

Search for other people on the site she might already know and add them to her friends list

Modern processors often have ____ levels of cache.

Three

Who came up with the idea for hypertex?

Tim Berners-Lee

12. When scheduling a conference call for people in different parts of the world, what factor complicates scheduling the call? Federal laws Weather patterns Email servers Time zones

Time zones

What technology can be used by people with a hearing disability to listen to a narration?

Speech-recognition

19. Quincy's password was recently stolen by a hacker who used a keylogger to capture Quincy's password as he entered it on his computer. What kind of malware is a keylogger? Worm Spyware Trojan Ransomware

Spyware

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

Which of the following terms refers to the area of the hard drive used for virtual memory?

Swap file

Video- sharing sites such as Youtube and Vimeo provide a place to post short videos called clips

TRUE

You can use Facebook's Live Feed tool to broadcast content as you post it

TRUE

Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos

Tags

Text messages containing bad news

Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work?

What is a digital certificate?

Technology used to verify a user's identity.

24. What kind of cable is connected to a DSL modem on the ISP's side of the device? TV cable Ethernet cable Telephone cable Power cable

Telephone cable

What should you use to stay informed about major events?

Television, radio, and other media print newspaper and news apps

The bootstrap program executes which of the following?

Tests that check components such as RAM and storage

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. (530601)

The HTML coding

Word Stem

The base of a word, used in a Web search to broaden a search

When a document contains text displayed in 10-point Cambria, to what does the 10-point refer?

The font size

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

The had to unzip or extract it

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.

How is the environment impacted by computers being thrown away in landfills?

The lead and mercury is seeping into the ground and water supply.

email server

The main computer in an email system, which routes messages through the Internet or a private network

Which of the following is a step in the email communication process

The message travels along Internet routers to the recipient

The agency that started ARPANET was looking for technologies that could be used by

The military

Ethics

The moral principles that govern people's behavior; many schools and other organizations post codes of conduct for computer use, which can help you make ethical decisions while using a computer

Which of the following is a step in the boot process?

The operating system files are loaded into RAM.

Fair use doctrine

The part of copyright law that allows you to use a sentence or paragraph of text without permission if you include a citation to the original source

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

Which of the following are security dangers to using the Internet at work? Check all of the boxes that apply.

There is greater potential for data loss. Security breaches can occur. Viruses can get into the network.

Which of the following statements describe cookies? Check all of the boxes that apply.

They can be removed from a computer. They are mostly harmless and useful.

Which of the following statements describe computer firewalls? Check all of the boxes that apply.

They check incoming packets to make sure that they have the right credentials. They check the behaviors of packets.

Which of the following statements are true of network packets? Check all of the boxes that apply.

They contain control information. They contain user data. They are sent over a network.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

Cloud computing and the Internet are two different technologies.

True

Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously.

True

The connector on a USB flash drive allows transmission of both data and power.

True

To use applications, a computer must be running an operating system.

True

When you add information to a word-processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage.

True

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

Word processing software includes a spelling checker, which reviews the spelling of individual words, sections of a document, or the entire document.

True

True or False

True: A slide can contain a link to another slide, another document, or a Web page. You can set the duration of an animation. Most presentation software lets you post and share presentations online. False: You cannot change the direction of the transition. The 6x6 rule means to keep all objects smaller than 6 inches tall and 6 inches wide.

External hardware can be connected without wires or cables.

Ture

Which property is assigned to a file by the operating system?

Type

CMS

What kind of software do you need to create a blog?

Net neutrality

When an ISP must provide the same level of service to all websites, regardless of their content or purpose, what concept is being supported?

Incoming mail server

When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with?

When does the boot process start?

When you turn on your computer

The trademarked name of the accepted standard for configuring wireless networks is .

WiFi

What is the name of the type of connection standard used in wireless networking?

WiFi

WAN stands for

Wide Area Network.

1. Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? Blog Email Podcasts Wiki

Wiki Rationale: A wiki is a collaborative website that lets several users create, add to, change, or delete content through a web browser.

Listen to music files on your computer.

Windows Media Player

Which of the following operating systems includes a virtual assistant?

Windows and macOS

What does WLAN stand for?

Wireless Local Area Network

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

Which of the following devices can be used to advance slides without having to click a button on the laptop?

Wireless remote control

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

With simulators using motion-sensing consoles

Solid state hard drives are a type of _________ memory

Yes

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?

VOIP

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

Which of the following kinds of information can be commonly inferred from a video file format name?

Video codec compatibility

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

Video conferencing application

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel

Virtual private network

Which of the following audio formats does not use any compression technique?

WAV

Which of the following is NOT a leading provider of PaaS and IaaS services?

Walmart

Which of the following would be considered a strong password?

Wbcm2!4!820!

Which of these e-commerce job roles could most likely be performed remotely from home or even from another country? Group of answer choices

Web Developer

An advantage to _____ is that you always have access to the most up-to-date version of the software without paying for an upgrade. Type of software where some applications are free, some require a one-time registration fee, and some require a periodic subscription charge

Web apps

A digital video camera that captures video and sends it directly to a computer

Web cam

A stylus is an input device.

yes

Compressing a file is also called _____ the file

zipping

Compressing a file is also called _____ the file. (530376)

zipping

In which of the following situations is a digital certificate useful? (530435)

You are signing a rental lease

Which of the following is NOT an advantage of saving documents in the cloud?

You can access the documents when you are not connected to the Internet

Which of the following is not an advantage of saving documents in the cloud?

You can access the documents when you are not connected to the Internet.

Which of the following is an advantage to saving a file to a flash drive?

You can take it with you and then work on it on another computer.

During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name?

You'll access this service over the Internet.

Compressing a file is also called _____ the file.

Zipping

social network

a Web site where members share interests, ideas, and information

What does the URL ending .com mean?

a business website

wiki

a collaborative Web site that people use to communicate with each other

panel

a collection of graphically displayed choices and command related to a specific tool or feature

stroke

a colored outline or edge

A client is

a computer that requests a service.

border

a decorative edge on a photo or a portion of a photo

which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?

a desktop computer

What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer?

a faulty port

marquee

a flashing or pulsating border

moderator

a forum temporarily saves messages and often uses a ______ to approve messages before they are posted for others to read

Tools panel

a group of tools, or buttons, organized into a toolbar

submenu

a menu that displays another list of command when you point to, tap, or click a command on a menu

TCP/IP

a network protocol that defines how to route data across a network

Intellectual property issues cover many different types of creations. Which of the following are intellectual property? Check all of the boxes that apply.

a newspaper a student's diary the script of a play a painting hanging in a museum

photograph

a picture taken with a camera and stored as a digitized file

Photoshop Creative Cloud

a popular image editing software program produced by Adobe Systems Incorporated

tweet

a post to mircoblog such as Twitter

app (application)

a program designed to make users more productive

real-time messaging

a system that lets people exchange short messages while they are online is called a ________ system

file extension

a three or four letter suffix after the file name that distinguished the file type

tool icon

a tool on the Tools panel

wiki

a type of web page that a group of people can comment and make changes to

blog

a web page listing journal entries that provide commentary and information, usually about a particular interest

A(n) _________ refers to a fixed cell location that never changes.

absolute reference

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with the Internet connection store pictures and music store data

status bar

across the bottom of the document window and contains a magnification box

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows. (530372)

active window

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.

active window

How would you design a webinar that would be interactive?

add a poll

How would you design a webinar that would be interactive? (516539)

add a poll

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following? (515988)

adjust the settings for the mouse through the control panel

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips? (530417)

adobe primere clip

Select the correct description of adware.

advertisements used in programs

Displays unsolicited advertisements in banners or pop-up windows

adware

A business can use a wiki in the following ways EXCEPT _____. Group of answer choices

aggregating content

A business can use a wiki in the following ways EXCEPT _____. (530591)

aggregating content

The document formatting feature you use to make paragraphs line up with the left side of the page

alignment

Select the item in the drop-down menu that best describes social networking:

allows users to find others with similar interests

podcast

an audio file distributed through downloads or feeds

Which of the following is an example of a payload?

an email message

A future trend of data storage is sure to be

an increase in cloud computing

What are some current and future trends for network technology? Check all of the boxes that apply.

an increase in the number and types of devices an increase in the number and types of applications an increase in the use of the cloud

blog

an informal Web site of time-stamped articles written in a journal format

You can apply _________ to add movements to slide text and objects.

animation

A wireless mobile device is set up so that it can receive a signal

anywhere its service broadcasts and it can receive a signal.

application bar

appears at the top of the workspace

options bar

appears below the Application bar

shortcut menu

appears when you press and hold or right-click a specific object in the Photoshop workspace

Eliminate unwanted background noise from your sound file.

audio-editing

What is missing in this list of information needed to cite a journal article? Title, journal title, edition, volume number, date, page numbers

author's name

which of the following refers to a condition in which the CPU performs well but the bus speed is slow?

bottlenecking

A network technology with a higher bandwidth than older technologies is called

broadband

The intersection of a single row and column in a worksheet

cell

A _______ describes the location of a cell based on its column and row location.

cell address

A worksheet is made up of _____ organized in a grid of rows and columns.

cells

Which behaviors should be avoided because they are wrong or illegal?

changing other people's files without permission

What are examples of synchronous communication?

chat groups, web conferencing, and VoIP

What is missing in this list of information needed to cite a book? Author, title, date, publisher

city and state where it was published

Computer that uses the service provided by a server:

client

In a network, servers receive requests from which of the following?

clients, which are the networked computers that request data.

A _____ is technology used to compress/decompress video files.

codec

What is the main benefit of a Wiki website?

collaborative content authoring

To navigate folders, you can expand and ______ them to display and hide their contents.

collapse

image-editing software

computer apps and programs that allow you to create and modify digital images

Which is the best definition of a network?

computers and hardware connected so that they can share data

A network packet contains two kinds of information. What are they?

control information and user data

Paulo is trying to organize groups to clean a river, which has become clogged with plastic products after a recent storm. Which of the following social media tools can he use in his organizing efforts?

crowd sourcing

some software lets you choose between standard and ______ installation

custom

What does network administration normally include? Check all of the boxes that apply.

design of the network security for the network documentation identifying and fixing issues

Which of the following can you run to find and remove unnecessary files?

disk cleanup utility

Reorganizes the data on a magnetic hard drive so that you can access files more quickly

disk defragmenter

panel group (tab group)

displays several panels horizontally

in which of the following storage device(s) does memory need to be constantly recharged to retain the contents?

dynamic RAM (DRAM)

Which of these improved the ability to send information over the network in the 1970s?

ethernet

A(n) _____ contains the instructions your computer or device needs to run programs and apps. (515966)

executable file

A(n) _____ contains the instructions your computer or device needs to run programs and apps.

executable file

What is the term for the exception to copyright that allows you to use copyrighted work without permission?

fair use

All cloud technologies must be accessed over the Internet

false

Before you can open and edit a compressed file, you need to zip it. (516025)

false

In Windows, the only way to copy or move files is to use the Clipboard. (530380)

false

Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information

false

Netiquette only applies to social media and social networking, not emails and instant messaging.

false

Big data is processed using relational databases

false -- Big data is a large collection of data, usually unstructured, which cannot be processed using relational database model.

the root directory is the main list of...

files and folders on the drive

social search tool

finds subjective content, such as comments, reviews, and opinions

Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?

gamepad

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?

he should have periodic anti-virus scanning and software upgraded on all computers.

A ______ connects many different Ethernet devices and forwards packets to all connected devices.

hub

Which of the following is the most common cause of network failure?

human error

Text within a document that is linked to other information available to the reader:

hypertext

A(n) _____ is a small picture that represents a program, file, or hardware device. (530375

icon

site:www.apple.com social networking

information about Apple's social networking technologies

_____ is data and instructions entered into the memory of a device. (530394)

input

For downloaded software, the details of the software license usually appear during ______.

installation

where on a computer is the operating system generally stored?

internal hard-drive

DARPA was created to:

investigate technologies for the military in the US.

During the boot process, what does the processor do after the computer circuits receive power? (530391)

it begins to run the bootstrap process

Why is the date a file was modified useful? (516002)

it identifies the most useful version

An ________ lets you access files from different folders as if the files were stored together.

library

You adjust this to control the amount of white space in between rows of text

line spacing

Which of the following operating systems would allow a user to add functionality and sell or give away their versions? (515965)

linux

Hackers create _______ to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance.

malware

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

To access the Internet, a router must be connected to a _____.

modem

Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website?

more exposure

Which of the following are examples of pointing devices? Select all that apply

mouse touchpad

Who did the IAB ask for ideas about how people should behave on the Internet?

other users

social netork

pages about social networks, social networking, and a social network

"social networking sites"

pages about the exact phrase, social networking sites

P2P stands for

peer to peer

Devices on a _____ area network are connected via Bluetooth.

personal

Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?

phishing

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? (516089)

phising

The illegal copying and distribution of copyrighted software is known as ______.

piracy

When publishers load software on a computer before selling it

preinstall

Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview?

prepare background

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? (530442)

pretexting

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? (530373)

program window

Software is written by software developers using computer-readable code called a(n) _______.

programming language

Which is the most suitable device to use in a classroom or a conference room to deliver presentations?

projector

Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.

property

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

No one can apply for a copyright on _____ software, and users are free to copy, modify, and resell this type of software. Software whose ownership rights are public property, and which is available to anyone at no cost

public domain

Which of the following uses of the Internet is unethical?

purchasing vacation flights online during work hours

The order in which certain jobs, such as print jobs, are received:

queue

Identify the examples of ethical behavior. (select all that apply)

quoting a website's information and citing the source making sure that the information is accurate

Which of the following is typical content for a podcast? (530588)

radio shows

What is the most common type of volatile memory?

random access memory (RAM)

What is the most common type of volatile memory? (530387)

random access memory (RAM)

A group of adjacent or nonadjacent cells

range

RAID stands for...

redundant array of independent disks

resolution

refers to the number of pixels per inch, printed on a page or displayed on a monitor

With more and more people using technology, what physical health diagnosis is on the rise? (516097)

repetitive strain injury

During the infection stage, what three actions does a computer virus typically perform?

replicate itself, conceal itself, activate when a condition or event occurs

Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem?

reply all button

If the image seems stretched, your computer's display may not be set to the default _____.

resolution

The clarity or sharpness of an image is called _____.

resolution

if the image seems stretched, your computer's display may not be set to the default...

resolution

The TCP/IP protocol was invented by

robert kahn and vinton cerf

In the email communication process, what is the role of the email server?

route emails through the internet

Equipment that directs data to the right location:

router

Routes data where it is meant to go

router

Creative Commons allows creators of intellectual property to

say how others can use their work.

How can you get the attention of a personal assistant app on your phone?

say the wake word

Device that converts a printed document into a bitmap file and assigns colors to each cell

scanner

Flatbed, sheet-fed, pen, and handheld are types of _____.

scanners

What was the original reason for the creation of ARPANET?

scientists and researchers could communicate and share information

A network that only people who have the right credentials can access

secured network

Which of the following best describes the path of a network packet on the Internet?

sender, router 1, router 2, router 3, receiver

The computer that responds to requests from the client computer:

server

online reference

service that connects you with a human librarian

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?

share the post on your news feed

Creative Commons allows the creator of an artistic work to

share the work in the way she chooses to

Information or devices that can be accessed remotely from another computer:

shared resources

Small developers often use the _____ model as a low-cost distribution method.

shareware

On what type of network can you rent things such as cars, tools, and rooms? (530600)

sharing economy network

Which of the following are items that are concerns for e-government? Check all of the boxes that apply.

sharing information with people sharing trustworthy information keeping personal information safe

Which of the following increases or decreases how crisp the objects in a photo appear?

sharpness

What does e-commerce allow people to do? Check all of the boxes that apply.

shop online securely order items on the Internet set up an online store

pixel

short for picture element, is a single dot or point in a graphic on the screen

LANs are

short ranged networks that increase speed of the network

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her? (516029)

show her how to use file manager

Type of license agreement for packaged software, which is activated when you open the package

shrink wrap license

bounding box

similar to a text box in other applications, with a dotted outline and sizing handles

Wikis are

sites that allow for collaboration between many people

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? (530413)

slide master

Presentation software lets you create _________ to display your messages or ideas.

slides

Mobile technologies access the network and are recent inventions. What are mobile technologies? (select all that apply)

smartphones laptops tablets netbooks

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

you should unplug your computer if you...

smell burning or see smoke rising from it

What sites would you use to verify facts?

snopes.com and factcheck.org

Hayley is an accessibility advocate at a small college and frequently shares information with her co-workers about how to better accommodate students with learning challenges. The college president has complimented her efforts and asked her to find ways to make this information more readily available and better organized for new, incoming instructors. What kind of site might best help Hayley achieve this goal?

social curation

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? (516541)

social curation sites

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? Group of answer choices

social curation sites

Which of the following types of websites typically provides the least security? (530444)

social media sites

related:www.faceboook.com

social networking sites other than Facebook

The programs used to run the network

software

Software as a Service (SaaS) allows users to remotely access which of the following? Check all of the boxes that apply.

software data applications

Government agencies work to catch people who engage in software piracy, and_______ can also help to stop them by filing lawsuits.

software producers

Software piracy occurs when

someone steals software.

Which of the following terms refers to the area of the hard drive used for virtual memory? (530389)

swap file

A ______ connects network devices or different parts of a network and forwards messages to specific recipients.

switch

Your new calendar application allows you to make sure that your mobile device and your corporation's server both have the latest version of any updated information. What is the term for this capability?

synchronization

online

synchronous communication means that everyone who is communicating must be _______ at the same time

Type of software that is categorized as operating system (OS) software and utility programs The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it on.

system

What type of connection did networks use to communicate in the 1960s?

telephone

The bootstrap program executes which of the following?

tests that check components such as RAM and storage

Shadowing and reflection are examples of this

text effect

Troubleshooting is

the act of trying to fix what is wrong in a system.

When a word processing program user formats a document, what does the user change?

the document's appearance

The first idea for a communications network was called:

the galactic network

What is another name for the deep web?

the hidden web or invisible web

Network administration is concerned with which tasks?

the installation and maintenance of network hardware and software

workspace

the work area and panels are referred to collectively as the workspace

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation? (515998)

they had to unzip or extract it

modern processors often have ______ levels of cache

three

How are computers connected to one another?

through networks

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions -- The presentation will be created in presentation app. The images can be created and/or edited using graphics software. Similarly, videos can be modified using video editing apps and inserted into the presentation.

Data is either sent one piece at a time over the wire (serial) or many different wires carry parts of the same transmission(parallel):

transmission types

digital communications

transmitting information from one computer or mobile device to another

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? (516073)

trojan

A CPU converts the data entered through the keyboard into output displayed on the monitor T/F

true

Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously. (515989)

true

a specific touch motion you use to issue commands is called a gesture T/F

true

a stylus is an input device T/F

true

external hardware can be connected without wires or cables T/F

true

ink-jet printers use pressurized nozzles to spray ink onto paper T/F

true

solid state drives are more durable than hard disk drives T/F

true

storage device problems can prevent a computer from starting up properly T/F

true

the connector on a USB flash drive allows transmission of both data and power T/F

true

we can use Unicode coding scheme to support a larger variety of characters including Chinese, Japanese, and Arabic T/F

true

you can easily rearrange clips by dragging them T/F

true

Select the problem-solving strategies a network administrator is likely to use. Check all of the boxes that apply.

try things that have worked before check the manuals ask others who might know what the problem is

Solid state drives are more durable than hard disk drives.

ture

what is the first step to performing hardware maintenance?

turn off the computer and remove its power source

What type of security requires something you know and something you have that no one else has? (530437)

two-factor authentication

Remove a software program from your computer

uninstall

A(n) _____ protects your device against unauthorized access. (530407)

user account

Who can effectively use website authoring software?

users of all skill levels

which of the following is a necessary step in maintaining computer hardware?

using a UPS or a surge processor

the two categories of system software are...

utilities and operating systems

Type of program that includes device drivers Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a calendar.

utility

Type of graphic image based on simple objects that can be grouped and layered

vector

What would you need to install if you have an app that is incompatible with your current operating system? (515993)

virtual machine

Which of the following warns that the computer is infected and needs immediate attention?

virus hoax

Integrated Services Digital Network (ISDN) is the digital transmission that allows which of the following services? Check all of the boxes that apply.

voice television Internet mobile phones

Software that converts text into speech is called a ______.

voice synthesizer

What device do e-learning applications usually use to help users with visual impairment read digital content?

voice synthesizer

software that converts text into speech is called a...

voice synthesizer

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? (530420)

web apps

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?

web apps -- Google's G suite is a web-based productivity suite of applications. This will enable employees working from different locations to collaborate.

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? Group of answer choices

web confrences

collapsed

when panels appear as a button

expanded

when panels display their contents

Which of the following is an example of intellectual property?

when you create a drawing based on something from your own imagination

When does the boot process start?

when you turn on your computer

When does the boot process start? (530393)

when you turn on your computer

Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? Group of answer choices

wiki

When data is transmitted wirelessly, the computer needs_____ in order to receive it.

wireless access technology

Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?

word processing

IP address

Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet?

A router is a system of two or more devices linked by wires or cables.

False

While naming a file on the computer, if we press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?

'A' is converted to its ASCII binary code and stored in the memory unit. Then it is converted back to 'A' for display.

hardware specifications include which of the following

-RAM -CPU

Daniel wants to buy a desktop to use for playing games after work. He loves racing games and wants to make sure his laptop has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?

-RAM capacity - it provides temporary storage that applications use to run smoothly -Processor core - some applications, especially games, have greater processor requirements

What is the recommended solution if a computer performs slowly?

-Uninstall the programs and apps that are not needed. -Install additional RAM.

speakers and headphones can connect to devices using...

-a 3.5mm audio jack -bluetooth -USB

cloud storage is...

-an internet service that provides remote data storage -a safe and easy backup option for many consumers -good for sharing links to large files

interference is a common problem with ______ devices

-bluetooth -wireless

which of the following factors can affect processor performance of a CPU?

-clock speed -bus width

8. Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals? Blog Email Podcast Wiki

Blog

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keyword throughout the thesis. How can she do this in the word processor she is using?

Change font size, style, and color of the keywords.

22. Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email? Check his Sent Items folder Sign into his boss's email account Archive his older messages Organize his Inbox folder

Check his Sent Items folder

Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email?

Check his Sent Items folder.

You found something on the Internet about a topic for a paper. Which of the following are efficient ways to use the Internet? Check all of the boxes that apply.

Check to see if this information is reliable. Think critically about what you found to see if it makes sense based on your prior knowledge. Make sure that the Internet is the best place to be doing research of this type.

Which company most likely relies almost solely on B2B transactions in their course of business?

Chemical supply company

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report? (530415)

Database

Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?

Date Modified

Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?

Date modified

_____ are standard settings that control how the screen is set up and how a document looks when you first start typing.

Default settings

What US agency originally started ARPANET?

Department of Advanced Research Projects Agency

Which of the following can you run to find and remove unnecessary files?

Disk clean-up utility

You need to purchase a new application on behalf of your company, one that will track product inventory and manage shipping status. Which kind of software will you buy?

Distribution Software

Conducting a staff meeting online so employees from around the globe can join the discussion is an example of

E-Business

When using a Windows Internet browser, pressing _____ reloads a page

F5

Filters

In a Web search, a way to narrow a search to include only certain types of results, such as images or news, or pages posted in a certain date range, such as within the last 24 hours. In a database, a feature that selects a subset of records containing criteria you specify

When you save a Microsoft Office file to OneDrive, where are you saving it?

In a storage area located on a server

CARs Checklist

In evaluating a Web source, use this checklist to make sure that a source is Credible, Accurate, Reasonable, and has Support (including citations, quotations, and credit lines).

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? (516197)

M commerce app

Jamie plans to sell his pottery design through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

Create synthesized music files.

MIDI

Which technology is used to convert the electric current to digital form to store and play the synthesized music on a computer or mobile device?

MIDI technology

Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?

ML

What are the different types of citation styles?

MLA, APA, and Chicago

15. Paulo and a coworker have been chatting by email about their activities over the previous weekend and some issues that arose with a mutual friend. In the course of the email conversation, the coworker asks a question that requires Paulo to check with a manager in another department. Paulo decides to forward the email to the manager for further comment. Before hitting Send, what should Paulo do? List other coworkers to receive courtesy copies of the email Remove the text of the earlier emails Archive the email conversation Delete the earlier emails from his Inbox

Remove the text of the earlier emails Rationale: When replying to and forwarding an email, all previous emails in the conversation is often included in the email. Before forwarding an email to another party, check to determine whether text from earlier emails in the conversation should be deleted first.

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network?

Router

System Software Rename

Select the Folder Click the Organize button Click Rename Type the folder name Press ENTER

On what type of network can you rent things such as cars, tools, and rooms?

Sharing economy network

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?

Show her how to use File Manager

_____ and Fotolia are examples of Web sites where you can download graphics and photos for a fee.

Shutterstock

Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?

Smart plug

A specific touch motion you use to issue commands is called a gesture

True

A feature, called wordwrap, allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line.

True

A file manager is used for all of the following except ____.

To change the contents of a file

How might a business use a blog

To communicate with customers

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

How do you create an email message? (516537)

Use an app or software to compose and send information.

How do you create an email message

Use an app or software to compose and send information

Firewall

What can you use as a protective barrier on a network to keep out unauthorized traffic?

Mesh network

Which network topology is most likely to continue to function well even if one device fails?

Extranet

Which network type is often used for vendor access?

Hub

Which of these devices would least likely be found on a modern network?


Set pelajaran terkait

Peds ATI Chapter 14 (Head Injury)

View Set

Principles of Macroeconomics Chapters 10, 11, & 13

View Set

HSF - Development of Heart I (L1,B2)

View Set