intro to computer apps for buiz {{EXAM 1}}
Defragmenting and optimizing your hard drive will help it run more efficiently. --True --False
--True
Task View allows you to see thumbnail images of all windows and apps you currently have open. --True --False
--True
Windows Defender Firewall helps to block malware from infecting your computer. --True --False
--True
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? a. A spreadsheet app to keep a record of her expenses, sort data, and make calculations b. A word processor app to keep a record of her expenses and make calculations c. A personal interest app to keep a track of all the expenses based on her personal interests d. A device management app to track all the expenses she makes using her credit and debit cards
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
How do you know if a device is an input devict, or an output device?
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
What technology can collect information to make decisions, reach conclusions and combine information in new ways?
Artificial intelligence (AI)
A shortcut icon is the actual document or app. --True --False
False
All cloud technologies must be accessed over the Internet. --True --False
False
[email protected] is an appropriate email address to use for communicating with potential employers. ==True ==False
False
Copying and moving files are the same thing. --True --False
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. --True -- False
False
Netiquette only applies to social media and social networking, not emails and irant messaging. --True --False
False
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. --True --False
False
To prevent a laptop from being stolen, you can use a surge protector. --True --False
False
You can avoid electronic waste by replacing devices every time a new version comes out. True False
False
what is the strongest password?
H@veAGr3atDaY!
A CPU converts the data entered through the keyboard into output displayed on the monitor. --True --False
True
If a device on your computer is not working, you can open Device Manager to see if the device shows up or has any problems. --True --False
True
If you forget to save a document after you have edited it, when you attempt to close it, a dialog box will be displayed asking if you want to save your changes. --True --False
True
If you have information literacy, you can select the right tool to find the information you need. --True --False
True
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. --True --False
True
New cars use embedded computers to make driving safer. --True --False
True
Some apps are free, allowing you to download them without making a payment. --True --False
True
When a task requires administrator access, you might be prompted to authorize the task. --True --False
True
Wikipedia is a colaborative website where a team of people can polish or modify content on a webpage --True --False
True
Windows 10 is the newest version of Microsoft Windows, which is a popular and widely used operating system. --True --False
True
if a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. --True --False
True
In a web app, where is data usually stored? a.Cloud storage b.Local computer c.Application storage d.Mobile network
a -- cloud storage
What is the binary system?
a number system with two digits, 0 and 1
Emma needs to purchase a note-taking app for her iPhone. Which of the following source is typically safe for purchasing the app? a. App Store for iOS b. Email message containing download link c. Website called FreeAppleApps d. Flash drive containing apps her friend copied
a. App Store for iOS
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world? a. Captioning software can be used to transcribe what is being said. b. Voice output software can be used to translate what she is saying to text. c. Screen reader software can be used to read what is on the screen. d. A braille printer can be used to print documents.
a. Captioning software can be used to transcribe what is being said.
When Florence joins her father's construction business. she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? a. Create a database of company projects, customers and vendors. b. Continue with the old system. c. Transfer all financial record to spreadsheet. d. Convert all paper files to word documents
a. Create a database of company projects, customers and vendors.
Brendon wants to volunteer at the Red Cross, a nonprofit agency. He enters redcross.com in his browser, but cannot find the right website. What mistake is he making? a.He should enter redcross.org because Red Cross is a nonprofit organization. b.He should enter redcross.edu because Red Cross is an educational organization. c.He should enter redcross.net because Red Cross is a network provider. d.He should enter Red-Cross.com because that is the name of the commercial company.
a. He should enter redcross.org because Red Cross is a nonprofit organization.
_____ is data and instructions entered into the memory of a device. a.Input b.Booting c.Cache d.Output
a. Input
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? a. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. b. A hacker is trying to put a Trojan on her computer. c. A worm has infected her computer and she needs to unplug her device. d. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
a. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. a. The HTML coding b. The GPS location coordinates c. The file size d. The date a photo was taken
a. The HTML coding
To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step? a.Transfer contents to an external storage device. b.Disconnect all output devices. c.Disconnect the UPS. d.Remove the internal hard drive on which the operating system is stored.
a. Transfer contents to an external storage device.
in his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? a. Voice over Internet Protocol (VoIP) b. Voice-to-Text (VTT) c. Audio Internet service provider (AISP) d. Voice and video service (VVS)
a. Voice over Internet Protocol (VoIP)
__________ is a popular word processing program available with Windows. a. WordPad b. Writer c. Microsoft Word d. Docs
a. WordPad
how would you describe the social networking site YouTube? a. YouTube is a media-sharing network. b. YouTube is a social curation site. c. YouTube is a microblog. d. YouTube is a discussion forum
a. YouTube is a media-sharing network.
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows. a.active window b.program window c.restored window d.minimized window
a. active window
A(n) ____ is a unique combination of letters or numbers that identifies a specific user to Windows. a. user name b. administrative code c. password d. PIN
a. user name
Jodi is travelling to San Francisco for a conference. She has stored her PowerPoint slide on Microsoft's web app. What could be of concern to her while presenting her slides? a. Access to the latest version of the web app b. A poor internet connection c. Storage space on her external hard drive d. Storage space on her laptop
b. A poor internet connection
What is a MAC address? a. The connection needed to access to a cellular network b. A unique hardware address for your device c. An IP address unique to Apple's MAC computers d. An alternate name Internet Protocol version 6
b. A unique hardware address for your device
If you want to move a file, you first use the ____ button on the ribbon to move the file to a temporary storage location. a. Place b. Cut c. Restore d. Move
b. Cut
Which of the following is an authentication method to keep your data safe? a. Encryption b. Fingerprint scanner c. Body area network d. Software firewall
b. Fingerprint scanner
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? a.Heading style b.Header and Footer c.Page margin d.References
b. Header and Footer
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? a. Page margin b. Header and Footer c. References d. Heading style
b. Header and Footer
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? a.License agreement b.Piracy c.Access control d.Digital rights management
b. Piracy
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space? a. Save two copies of the file in OneDrive. b. Save a copy of the file on her local hard drive. c. Share the OneDrive folder with a friend. d. Encrypt the file before saving it to OneDrive.
b. Save a copy of the file on her local hard drive.
Cathy wants to buy a new watch online, but is concerned about security when making the purchase. Which of the following increases the chance that her payment is NOT secure? a.Shopping using an e-wallet b.Shopping on a website that uses the HTTP protocol c.Shopping on a website that uses 3D Secure protocol d.Shopping on a website that uses Transport Layer Security
b. Shopping on a website that uses the HTTP protocol
Which of the following is classified as input device? a.Speakers b.Webcam c.Flash drive d.Earbuds
b. Webcam
Is it advisable to enable automatic updates on security software? a. No; automatic updates can cause create problems in security software. b. Yes; this helps to catch and quarantine new malware before it harms the computer. c. No; automatic updates require excessive storage space and slow the computer. d. Yes, though you must pay an additional fee for automatic updates.
b. Yes; this helps to catch and quarantine new malware before it harms the computer.
What is it called when an attacker convinces vou to enter personal information at an imposter website arter receiving an emall rom a person masquerading as an employee from your bank"? a. identity theft b. phishing c. dumpster diving d. encryption
b. phishing
With more and more people using technology, what physical health diagnosis is on the rise? a.cyberbullying b.repetitive strain injury c.technology addiction d.cyberstalking
b. repetitive strain injury
The mouse operation of ___________- _____________ displays a shortcut menu a. double-clicking b. right-clicking c. right-dragging d. triple-clicking
b. right-clicking
Why would you want to connect your computer to a network? a. for added security b. to access shared resources c. to use the network's operating system d. to keep up with computing trends
b. to access shared resources
Compressing a file is also called _____ the file. a.byting b.zipping c.passing d.extracting
b. zipping
What is a Jump List? a. A list of similar files or apps b. A list of new files or apps c. A list of recently viewed files or apps d. A list of other files or apps vou might like to view
c. A list of recently viewed files or apps
A modem can also function as what other piece of hardware? a. A network interface card b. A hub c. A router d. A switch
c. A router
_________ are standard settings that control how the screen is set up and how a document looks when you first start typing a. Productivity settings b. Startup settings c. Default settings d. Customized settings
c. Default settings
CASE: You have purchased a brand-new Windows 10 computer for the new semester of your coursework, and you decide to spend some time learning about all of the properties of the computer's hard drive in order to make sure that you are using the computer to its fullest potential. One of the earliest lessons you learned as a computer user is the importance of backing up your work. Which of the following storage devices could you use? a. Tools tab b. This PC c. External hard drive d. Backup tab
c. External hard drive
Where on a computer is the operating system generally stored? a.Virtual memory b.RAM c.Internal hard drive d.Flash drive
c. Internal hard drive
Which Windows 10 version is simplified and designed primarily for home and small office users? a. Windows 10 Pro b. Windows 10 Education c. Windows 10 Home d. Windows 10 Enterprise
c. Windows 10 Home
Posting hostile or insulting comments in response to someone else's blog post is called a. cyberstalking b. doxxing c. flaming d.hashing
c. flaming
Which of the following does a secure website use to safeguard transmitted information? a.A lock icon b.The http protocol c.Digital certificate d.Encryption
d. Encryption
Which of the following statements is NOT true about a local firewall? a.It is a physical device that acts as a protective barrier. b.It inspects data being transmitted to or from a network. c.It is often built into a company's operating system. d.It is also called software firewall.
d. It is also called software firewall.
How does encryption work?
d. It scrambles the information until the kev is used to unscramble it.
Which of the following is NOT an image format to store photos? a.JPEG b.TIFF c.JPG d.MP3
d. MP3
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However he wants the radio limes so it appears that someone 1s interacting with it. What loT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling? a. smart security system b. Smart bulb c. Smart lock d. Smart plug
d. Smart plug
What performance specification does 2 GHz refer to? a. Time taken to store the instructions on RAM b. lime taken to fetch and decode instructions c. Speed at which data travels d. Speed at which the processor executes Instructions
d. Speed at which the processor executes Instructions
Which of the following touch screen gestures is used to zoom in? a. Swipe b. Pinch c. Press and hold d. Stretch
d. Stretch
How do delivery companies track packages? a.They use robotic arms to load packages. b.They use GPS. c.They use a learning management system. d.They use code-scanning technology.
d. They use code-scanning technology.
Found in all folder windows, the _______ lets you know which folder you are viewing. a. navigation bar b. status bar c. menu bar d. address bar
d. address bar
A(n) _____ contains the instructions your computer or device needs to run programs and apps. a.data file b.file extension c.spreadsheet d.executable file
d. executable file
To access the Internet, a router must be connected to a _____ a. switch b. network c. hub d. modem
d. modem
What do you call the rules each programming language has for writing instructions? a. grammar b. source code c. interpreter d. syntax
d. syntax
A video that is shared millions of times over social media in a short period of time is termed to be ____________ . a.concurrent b.fake c.original d.viral
d. viral
A desktop background does not allow use of your own pictures. --True --False
false
Secure passwords have......
more than eight characters, both uppercase and lowercase letters, special characters, and numbers.
Digital information processed into a useful form is called
output
Which type of memory is permanently Installed on your computer and attached to the motherboard?
read-only memory (ROM)
________ is a computer that controls access to the hardware and software on a network.
server
Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
use his webcam and speakers so that he and his mother can both see and hear each other.