CC-MidTerm Exam Study Guide

Ace your homework & exams now with Quizwiz!

What type of security requires something you know and something you have that no one else has?

2 factor authentication

The teachers in Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider ?

A learning management system

How is a worm different from a Trojan ?

A worm spreads through a network, whereas a Trojan hides inside another program

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?

Apache OpenOffice

When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files ?

Because he using the same name, each time he saves he is overwriting his previous work.

Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently ?

Click the minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window

Which of the following factors can affect processor performance of a CPU?

Clock speed

Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them ?

Cloud storage

Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing disp;ay problems ?

Faulty power or video cable

Which of the following is the strongest password?

H@veAGr3atDaY!

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgment

_____ is data and instructions entered into the memory of a device.

Input

Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described?

Intelligent classroom

Where on a computer is the operating system generally stored?

Internal hard drive

What does the operating system do if you try to save a file with the same name into the same folder?

It overwrites the original file unless you add a number, date, or initials to differentiate the files.

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

It places the document in a buffer.

How does discarding computers in a landfill affect the environment ?

Lead and mercury in computer parts are seeping into the ground and water supply.

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

What should you do the first time you save a file?

Name the file.

Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?

Processor core - some applications, especially games, have greater processor requirements

What technology is being used when you are sent an email saying you can track your package?

Scan code

You can monitor and protect your financial data in all of the following ways EXCEPT ______.

Storing financial information in an unsent email message.

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him ?

Tablets, though not as powerful as other mentioned devices, are convenient to use browse the internet, read emails and store basic data.

You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?

The kernel is the core of an operating system that manages memory, runs programs, and assigns resources

How do delivery companies track packages?

They use code-scanning technology.

Computer professionals often suggest restoring the operating system to resolve major computer issues. Which of the following should happen before this step ?

Transfer contents to an external storage device.

Logan is considering web app development as a career option. Which of the following languages does he not need to master ?

Visual Basic

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online ?

Web apps

Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?

a desktop computer

What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer ?

a faulty port

What is the binary system?

a number system with two digits, 0 and 1

How can an attacker execute malware through a script?

a script can run a series of instructions to download and run malware

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?

adjust the settings for the mouse through the settings dialog box

What technology can collect information to make decisions, reach conclusions, and combine information in new ways ?

artificial intelligence (AI)

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

artificial intelligence (AI)

Which of the following statements is true about the Clipboard ?

because he is using the same name, each time he saves he is overwriting his previous work

Why is it not safe to connect to public Wi-Fi networks?

because these networks are rarely protected

Which of the following refers to a condition in which the CPU performs well but the bus speed is slow?

bottlenecking

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?

captioning software can be used to transcribe what is being said

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

change font size, style, and color of the keywords

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?

computer-aided manufacturing

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting is used to highlight cells that meet the specified criteria

How can you protect personal information gathered by legitimate organizations?

create a separate email account for receiving information from websites

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Which of the following devices is the easiest to upgrade, such as by adding RAM?

desktop computers

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

A(n) _____ contains the instructions your computer or device needs to run programs and apps.

executable file

In Windows, you use _____ to reorder, move, and navigate between folders.

file explorer

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

What does an operating system provide so you can interact with a device?

graphical user interface

Which of the following helps you more easily locate the files and folders you need?

grouping similar subfolders together in a folder

Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use?

he should choose a navigation app with artificial intelligence that can provide information about preferred routes

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware ?

he should have periodic anti-virus scanning and software upgraded on all computers

Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control?

he will receive text messages to take his medications & check his insulin

Which of the following is not an input device ?

headphone

Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer?

her coffeemaker that she has set to turn on and make coffee every morning at the same time

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

Folder names should ____.

identify the content and purpose of the folder

Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?

in RAM

Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?

information security

What is the recommended solution if a computer performs slowly?

install additional RAM

Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?

internal hardware problem

Which of the following is a characteristic of a strong password ?

letters, numbers, and symbols

Which of the following is a technology designed for use in manufacturing?

machine to machine (M2M) communications

Which of the following features is a way to make a computer do what you want it to do?

menu

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

native app

Swapping items between memory and storage is called _____.

paging

When considering a computer to purchase, which of the following factors involves the operating system of the computer?

platform

Which of these is not an input device?

printer

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?

program window

What is the most common type of volatile memory?

random access memory (RAM)

Which of the following is the science that combines technology and engineering?

robotics

When you want to add information to a document, what role does your operating system play?

saves your unsaved work to temporary storage

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate?

scanner

Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?

schools use social networking tools to promote school events, work cooperatively on group projects, and teach concepts

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first ?

slide master

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

speech recognition software

What performance specification does 2 GHz refer to?

speed at which the processor executes instructions

In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac toe, and other strategy games. How would you describe the developers' goal in teaching the computer these games?

the developers were using artificial intelligence

How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products?

they use a GPS to avoid traffic delays

Why do companies use online collaborative productivity software ?

to allow employees to share, edit, and comment on documents

A file manager is used for all of the following except ____.

to change the contents of files

Where can you pin frequently used apps for easy access?

to the taskbar

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

What is the first step to performing hardware maintenance?

turn off the computer & remove its power source

How is an executable file different from a data file?

unlike a data file, you cannot open and read executable files

How can you protect a computer from electrical spikes and surges?

use a surge protector

How can you check data on devices connected through an IoT network?

use a tablet

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

use a word processor for step1, graphics software for step 2, & a mail merge for step 3

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

use cross platform tools to write code that will translate the existing android app code into different native formats

Which option lists the computer components in order from oldest to newest?

vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem ?

video card

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?

virtual reality (VR)

What device do e-learning applications usually use to help users with visual impairment read digital content?

voice synthesizer

When does the boot process start?

when you turn on your computer

Which of the following is an advantage to saving a file to a flash drive ?

you can take it with you and then work on it on another computer


Related study sets

Fundamentals Nursing Chapter 29 Perioperative Nursing

View Set

- AMT - Airframe - Aircraft Landing Gear Systems

View Set

Human Resource management Ch 9&10

View Set

ch 10- PPE acquisition and disposition

View Set