CIS 110 Introduction to Computers Final Exam

Ace your homework & exams now with Quizwiz!

To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____. Select one: a. .exe b. .jpg c. .com d. .vbs

.jpg

A folder name can have up to _____ characters. Select one: a. 8 b. 11 c. 255 d. 256

255

In the accompanying figure, the item in box _____ holds the results of processing. Select one: a. 1 b. 3 c. 4 d. 5

3

An email address consists of your username and the server name separated by the ____ symbol. Select one: a. / b. % c. @ d. &

@

A(n) _____ is a rectangular work area on the desktop that contains a program, text, files, or other data and tools. Select one: a. window b. portal c. app d. smartcard

window

The files you create in Excel are called _______. Select one: a. documents b. presentations c. workbooks d. databases

workbooks

Unlike ____, ____ cannot replicate themselves. Select one: a. Trojan horses, worms b. viruses, worms c. worms, Trojan horses d. worms, viruses

worms, Trojan horses

In a File Explorer window, you can tell that a folder is compressed by the _____ icon displayed. Select one: a. exclamation point b. open folder c. zipper d. empty folder

zipper

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Travis sent you, Jill, Jack, Marlene, Bernie, and Raja an email. You want to reply, but only Travis needs to see the response. Select one: a. "Reply All" then delete unnecessary recipients b. "New" to Travis, then cut and paste his original email into your new email c. "Reply" to Travis d. "Reply" and put Travis in Bcc

"Reply" to Travis

The Bold button on the Word ribbon is an example of a(n) _______ button. Select one: a. bidirectional b. toggle c. active d. passive

toggle

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A teacher shares a poem with the class. Damon tells you this is ____. Select one: a. not plagiarism b. plagiarism c. too little information to say d. unethical but not illegal

too little information to say

A(n) ____ is essentially an upside-down mouse that can be more comfortable to use. Select one: a. touchpad b. gnome c. trackball d. spinstick

trackball

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Jenny sent you an email. You want to respond to it, and also to show Ben your response. But you don't want Jenny to see that you've sent it to Ben. Select one: a. "Reply" with Ben as Cc b. "Forward" to Ben c. "New" to Ben, Bcc to Jenny d. "Reply" with Ben as Bcc

"Reply" with Ben as Bcc

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Howard sent you an email with a good idea for a widget. You want to respond. You also want to bring Terry, who has experience with widgets, into the conversation. Select one: a. "New" to Terry, cut and paste Howard's original email b. "Reply" with Bcc to Terry c. "Reply" with Cc to Terry d. "Forward" to Terry with Bcc to Howard

"Reply" with Cc to Terry

SMS can transmit up to ____ characters in one message. Select one: a. 160 b. 64 c. 1,024 d. 256

160

In the accompanying figure, the item in box _____ stores data and instructions before and during processing. Select one: a. 1 b. 3 c. 5 d. 6

5

BD-R dual-layer discs can store up to _____ of data. Select one: a. 700 MB b. 8.5 GB c. 50 GB d. 1 TB

50 GB

In the accompanying figure, the item in box _____ takes instructions and translates them into a form that the control unit can understand. Select one: a. 2 b. 3 c. 4 d. 6

6

In the accompanying figure, the item in box _____ requests instructions and data from the cache or RAM and makes sure they are in the proper order for processing. Select one: a. 2 b. 3 c. 5 d. 7

7

Copyrights remain in effect until ____ after the creator's death. Select one: a. a year and a day b. 10 years c. a century d. 70 years

70 years

Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors. Select one: a. 100 b. 300 c. 500 d. 900

900

You may not use the _____ character when creating a folder name. Select one: a. > b. ! c. @ d. .

>

In the accompanying figure, box _______ provides one-click access to commonly used commands, such as Save, Undo, and Redo. Select one: a. H b. A c. K d. M

A

In the accompanying figure, clicking the area denoted by box _______ provides access to Backstage view. Select one: a. C b. G c. M d. K

C

____ was the predecessor of the Internet. Select one: a. DRAGnet b. ARPANET c. APPLENET d. TARP-Net

ARPANET

You use the _______ to conduct a search using the default search site for Internet Explorer. Select one: a. status bar b. navigation pane c. Address bar d. Apps bar

Address bar

____ images are created by coloring the individual pixels in an image. Select one: a. Bitmap b. Vector c. Illustrator d. Radial

Bitmap

____ is a wireless standard in the 2.4 GHz frequency band that is designed for very short-range connections, to replace cables between devices. Select one: a. MIFI b. WiMAX c. Bluetooth d. Red Hat

Bluetooth

In the accompanying figure, you can type entries into the location(s) marked by box _______. Select one: a. B b. C c. F d. G

C

The first hard drive in a computer is usually drive _____. Select one: a. C b. A c. E d. Z

C

The _____ is the main processing device for a computer. Select one: a. CPU b. cache c. USB d. FPU

CPU

Case-Based Critical Thinking Questions Case 5-3 With all the types of Internet connections available, it's important to be able to keep them straight. These questions will test how well you understand the options. ____ has a typical speed of 10-25 Mbps, and is the most widely used type of home broadband connection. Select one: a. DSL b. Fixed wireless c. Cable Internet d. Satellite

Cable Internet

_____ memory is very fast memory circuitry located near the CPU that is used to speed up processing. Select one: a. ROM b. Flash c. Cache d. ALU

Cache

The Forward feature leaves the _______ box(es) blank. Select one: a. Cc and Bcc b. Bcc only c. To only d. To, Cc, and Bcc

Cc and Bcc

____ refers to data, applications, and even resources stored on computers accessed over the Internet. Select one: a. Telecommuting b. Cloud computing c. The Ethernet d. Embedded computing

Cloud computing

____ cable uses a thick center wire surrounded by insulation and covered with braided wire to block electromagnetic interference. Select one: a. Fiber-optic b. CAT5 c. Twisted-pair d. Coax

Coax

____ software includes any software that is developed and sold for a profit. Select one: a. Commercial b. Industry-ware c. Freeware d. Vaporware

Commercial

Case-Based Critical Thinking Questions Case 4-2 Arnold has asked you to help him learn the dizzying array of new communications technologies being developed today. You ask Arnold which of the following companies in the United States is currently NOT supporting WiMAX-based 4G cellular networks. He answers, correctly, ____. Select one: a. AT&T Wireless b. Verizon Wireless c. T-Mobile d. CompUSA

CompUSA

_____ are very small pieces of semiconducting material that contain integrated circuits. Select one: a. Motherboards b. Computer chips c. Optical drives d. Expansion slots

Computer chips

____ is the legal right to sell, publish, or distribute an original artistic or literary work. Select one: a. Trademark b. Service mark c. Copyright d. Prima corpus

Copyright

To select nonadjacent files, press and hold the _____ key while selecting individual files. Select one: a. Shift b. Tab c. Ctrl d. Windows

Ctrl

All of the following are shortcut keys for either cutting, copying, or pasting EXCEPT _______. Select one: a. Ctrl+V b. Ctrl+P c. Ctrl+X d. Ctrl+C

Ctrl+P

The keyboard shortcut for cutting text or objects is _______. Select one: a. Ctrl+C b. Ctrl+V c. Ctrl+Z d. Ctrl+X

Ctrl+X

The term ____ encompasses any illegal act involving a computer. Select one: a. Wardriving b. Websparring c. Nethacking d. Cybercrime

Cybercrime

In the accompanying figure, box _____ represents a status bar. Select one: a. A b. B c. C d. D

D

In the accompanying figure, the Address bar is denoted by box _____. Select one: a. D b. F c. A d. E

E

The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices. Select one: a. Gold Star b. ENERGY STAR c. LEED d. GreenWare

ENERGY STAR

The Formulas tab is unique to _______. Select one: a. Word b. Excel c. PowerPoint d. Access

Excel

Today, many notebook and netbook computers use _____ instead of PC Cards to give them additional capabilities. Select one: a. ExpressCard modules b. flash chips c. FireWire expansion slots d. USB cards

ExpressCard modules

_____ means to create an uncompressed copy of a compressed file or folder. Select one: a. Zipping b. Extracting c. Extruding d. Exploding

Extracting

In the accompanying figure, you would click the location(s) shown in box _______ to open another dialog box or window. Select one: a. F b. E c. B d. H

F

All wireless applications in the United States use specific frequencies as assigned by the ____. Select one: a. FTC b. FCC c. NTSB d. W3C

FCC

You use _____ to navigate, view, and work with the contents and resources on your computer. Select one: a. application windows b. dialog boxes c. Start windows d. File Explorer windows

File Explorer windows

____ programs reduce the size of files so they take up less storage space. Select one: a. File management b. Backup and recovery c. Cleanup d. File compression

File compression

_____ are the most common type of storage media for digital cameras and mobile phones. Select one: a. Mini-CDs b. Optical discs c. Cache packets d. Flash memory cards

Flash memory cards

_____ has/have begun to replace _____ for storing system information such as a computer's BIOS. Select one: a. Flash memory chips, ROM b. RAM, ROM c. ROM, flash memory chips d. Buses, ROM registers

Flash memory chips, ROM

If you wish to send a received message on to someone who wasn't in the original recipients' list, use the _______ command. Select one: a. Forward b. Forward all c. Reply all d. Broadcast

Forward

In the accompanying figure, box _______ points to a list box or boxes. Select one: a. B b. C c. F d. G

G

Most operating systems today primarily use a ____. Select one: a. GUI b. command-line interface c. YUI d. neural net interface

GUI

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Based on the text's guidelines, choose the best folder name. Select one: a. Gaspard-Conf-Call-June-2014 b. Gaspard Call: 6-14 c. gcc614 d. Gaspard Corporation, LLC Conference Call to Discuss Strategic Realignment, noon, June 2014

Gaspard-Conf-Call-June-2014

In the accompanying figure, box _______ represents the view buttons. Select one: a. A b. B c. L d. H

H

You can find the _______ tab on the ribbon in all Office programs. Select one: a. HOME b. INSERT c. REVIEW d. VIEW

HOME

The ____ develops networking standards. Select one: a. ANSI b. WWW c. IEEE d. TCP/IP

IEEE

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. AT&T, Comcast are ____. Select one: a. ISPs b. software companies c. key Internet organizations d. ASPs

ISPs

____ occurs when someone obtains enough information about a person to be able to masquerade as that person. Select one: a. Spoofing b. Pharming c. Identity theft d. Data theft

Identity theft

Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. You want to return to a Web site you visited two or three days ago. Which of the following scenarios will get you there? Select one: a. In the app, you swipe down from the top, tap "Favorites," tap "History," and scan the selections for the right Web site. b. In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site. c. In the app, you open the Favorites Center, tap the History tab, then search for the right Web site. d. In the desktop application, you right-click a blank area of the current Web page, click "History," click the "All" arrow, then scan the selections for the right Web site.

In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site.

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. A blogger, your school's Web site, an online encyclopedia are ____. Select one: a. ASPs b. infrastructure companies c. Internet content providers d. users

Internet content providers

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Next, Clarice meets with a client who leases two floors in a high-rise downtown. He wants to connect them all to their own network. So Clarice explains the various kinds of ____ he should consider. Select one: a. WANs b. PANs c. LANs d. MANs

LANs

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice drives to her office from the suburbs. At the coffeeshop outside her office, she uses the public wireless network to check her email. Six blocks away, at the park where she takes her lunch, she uses the same wireless network. However, when she gets home she needs to use another network. The network Clarice uses during her workday is most likely a(n) ____. Select one: a. LAN b. MAN c. VPN d. extranet

MAN

Microsoft and Google have created large networks known as ____ to provide free or low-cost Internet access to area residents. Select one: a. PANs b. LANs c. MANs d. WANs

MANs

____ is a generic term that refers to any type of malicious software. Select one: a. Malware b. Cookie c. Virus d. Bug

Malware

_____ consists of high-performance storage servers that are connected individually to a network to provide storage for the computers connected to that network. Select one: a. NAS b. SAN c. RAID d. Cloud storage

NAS

The text lists all of the following as commonly used Web browsers EXCEPT ____. Select one: a. Navigator b. Internet Explorer c. Chrome d. Firefox

Navigator

_____ are thin circular discs made out of polycarbonate, topped with layers of materials and coatings used to store data and protect the disc. Select one: a. Platters b. Optical discs c. SSDs d. Hybrid hard drives

Optical discs

____ refers to following a predesignated procedure to remove yourself from marketing lists. Select one: a. Downsizing b. Rabbitholing c. Opting out d. Deprofiling

Opting out

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Which of the following file names would not be accepted by Windows? Select one: a. Tully Experience.docx b. Outstanding Shares <protected>.docx c. [email protected] d. t.docx

Outstanding Shares <protected>.docx

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice has a client looking to create a network for her mobile phone, headset, digital camera, and PDA. Clarice tells her about ____ options. Select one: a. PAN b. WAN c. intranet d. VPN

PAN

____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information. Select one: a. Spamming b. Pharming c. Barnstorming d. Phishing

Phishing

The _____ standard means that a computer automatically configures new devices as soon as they are installed and the computer is powered up. Select one: a. Plug and Play b. Fast I/O c. Click and Go d. Slot and Start

Plug and Play

_______ is used to create a collection of slides that can contain text, charts, pictures, sound, movies, etc. Select one: a. PowerPoint b. Word c. Access d. Excel

PowerPoint

____ is one of the primary operations of a computer. Select one: a. Administration b. Sorting c. Processing d. Throughput

Processing

A(n) _______ is a box with descriptive text about a button, an object, or another element on the screen, which appears when you point to the button or object. Select one: a. ScreenTip b. contextual tab c. gallery d. Mini toolbar

ScreenTip

_____ is a method of storing data on two or more hard drives that work together. Select one: a. RAID b. SAN c. NAS d. Cloud computing

RAID

The term memory when referring to computers usually means _____. Select one: a. ROM b. BIOS c. RAM d. RAID

RAM

Most wireless networking applications use frequencies in the ____ band. Select one: a. RF b. audible c. IR d. UV

RF

_____ are the fastest type of memory used by the CPU. Select one: a. ROMs b. Level 1 caches c. Level 2 caches d. Registers

Registers

If you receive an email message that includes multiple recipients, and you wish to respond back to the same list of recipients, use the _______ command. Select one: a. Forward b. Forward all c. Reply d. Reply all

Reply all

Text messaging is also known as ____. Select one: a. SMH b. VoIP c. IM d. SMS

SMS

The ____ protocol is used to deliver email over the Internet. Select one: a. HTTP b. XML c. FTP d. SMTP

SMTP

____ programs are distributed on the honor system. Select one: a. Malware b. Shareware c. Freeware d. Vaporware

Shareware

To select a series of adjacent files, click the first desired file, press and hold the _____ key, then click the last desired file. Select one: a. Shift b. Tab c. Ctrl d. Windows

Shift

____ refers to unsolicited email sent to a large group of individuals at one time. Select one: a. Spam b. Phish c. Salami d. Profiling

Spam

____ generally run one program at a time, as fast as possible. Select one: a. Supercomputers b. Mainframes c. Quantum computers d. Thin clients

Supercomputers

____ browsing allows you to open multiple Web pages at one time. Select one: a. Webbed b. Threaded c. Tabbed d. Reticulated

Tabbed

____ is the most well-known computer network in the world. Select one: a. Skynet b. Telnet c. The Internet d. AOL

The Internet

Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. You have opened a file, but cannot make modifications to it. What is the most likely reason? Select one: a. The file is within a compressed folder. b. You have opened the file with the wrong program c. You are working in desktop mode. d. The desktop application is made for Windows 7.

The file is within a compressed folder.

The accompanying figure shows a File Explorer window in _____ view. Select one: a. Tiles b. Details c. Large Icons d. List

Tiles

A ____ is a type of malware that masquerades as something else. Select one: a. switchbot b. zombie c. Trojan horse d. worm

Trojan horse

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have found an interesting calendar program at a Web site and downloaded it to help you stay organized. However, within a couple days of installing the program, your computer starts behaving oddly. Strange popups appear, the home page of your Internet browser has been switched, and the system is running sluggishly. You likely have installed a ____. Select one: a. virus b. worm c. Trojan horse d. botnet

Trojan horse

____ cable is the least expensive type of networking cable and has been in use the longest. Select one: a. Coaxial b. Fiber-optic c. Twisted-pair d. Packet-switched

Twisted-pair

Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. The earliest operating system mentioned in this chapter is ____. Select one: a. UNIX b. Linux c. DOS d. Mac OS

UNIX

Mac OS is based on the ____ operating system. Select one: a. LiMaX b. UNIX c. DOS d. FORTRAN

UNIX

As you click different links on Web pages, the _______ in the Address bar change(s). Select one: a. URL b. history tiles c. protocol d. pins

URL

_______ is used to enter, edit, and format text. Select one: a. Word b. PowerPoint c. Excel d. Access

Word

A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network. Select one: a. LAN b. intranet c. VPN d. Internet P2P network

VPN

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice sometimes accesses her work computer at home via the Internet. She does so knowing that her connection is secure and private. The connection path she uses is an example of a(n) ____. Select one: a. intranet b. extranet c. VPN d. supranet

VPN

Today, the standard term for placing telephone calls over the Internet is ____. Select one: a. podcasting b. Internet telephony c. cyberchatting d. VoIP

VoIP

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You live in a 20-unit apartment building. You notice that your wireless Internet seems to run more slowly many evenings, after your upstairs neighbor has come home from work. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con

Wi-Fi piggybacking

Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. Your uncle talks about the Windows operating environment. He is most likely referring to his experience in using ____. Select one: a. Windows Mobile b. Windows 7 c. Windows Me d. Windows 3.1

Windows 3.1

The latest version of the Windows operating system is ____. Select one: a. Windows XP b. Windows 10 c. Windows Vista d. Windows 8

Windows 8

Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. A file that was once in one folder is now in another folder, and missing from the original folder. Why? Select one: a. You dragged the file, and the two folders are on different drives. b. You dragged the file, and the two folders are on the same drive. c. You used the Copy command instead of the Cut command. d. The Clipboard was full and unable to accept the file.

You dragged the file, and the two folders are on the same drive.

Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. As you begin typing a URL into the Address bar, no suggested Web pages appear. Why? Select one: a. Suggested Web pages never appear in the Address bar. b. You are using the app and not the desktop application. c. You have deleted your history. d. You are operating Internet Explorer in protected mode.

You have deleted your history.

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. The folder is quite large, and you compress it for archiving. Which of the following is true of the compressed folder? Select one: a. You may only give the compressed folder a name from one of the files within the folder. b. You must begin the compressed folder's name with the * character to distinguish it. c. You may only use a maximum of 16 characters in the compressed folder's name. d. You must extract any file from the folder before changing the file's name.

You must extract any file from the folder before changing the file's name.

Using only what you can see in the accompanying figure, you can say that the box marked A is pointing to _______. Select one: a. a URL b. the home page c. the status bar d. the current default search engine

a URL

Cable Internet service requires ____. Select one: a. a cable modem b. digital telephone lines c. a satellite receiver d. a cable TV subscription

a cable modem

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. You want a program that can use formulas to perform calculations, and organize numbers and values into rows and columns. You most likely want ____. Select one: a. a word processing program b. a spreadsheet program c. presentation software d. note taking software

a spreadsheet program

In the Internet Explorer desktop application, the View favorites, feeds, and history button looks like _______. Select one: a. a turning gear b. a house c. a star d. two overlapping boxes

a star

In the path C:\Book\Chapter8\images\fly.jpg, "Chapter8" is _____. Select one: a. a top-level folder b. a subfolder under "images" c. a subfolder under "Book" d. the drive name

a subfolder under "Book"

If you point to an application button on the desktop taskbar, _____. Select one: a. a thumbnail of the application window appears b. the application becomes active c. the application is maximized d. a shortcut menu appears

a thumbnail of the application window appears

According to the text, no matter what kind of Internet connection setup you arrange for your computer, you will likely need to select these two things: ____. Select one: a. RJ-45 wiring & coaxial cabling b. a username and a payment method c. phone number, username d. WiFi channel, payment method

a username and a payment method

Case-Based Critical Thinking Questions Case 5-2 There are widely varied types of online communication and online writing-each with their own special purpose. Knowing what category of information you're trying to find on the Web will help you make more efficient and effective use of your time. In each of the following questions, give the answer that best describes the item listed in the question. A free online encyclopedia updated by thousands of active contributors and visited by individuals around the world is ____. Select one: a. a wiki b. a blog c. Twitter d. iDingo

a wiki

A two-part button consists of the button and _______. Select one: a. an arrow next to or below the button b. its dialog box c. a corresponding button elsewhere on the ribbon d. the icon that executes the command

an arrow next to or below the button

The way a network is designed to communicate is known as its ____. Select one: a. architecture b. protocol path c. topology d. latency

architecture

When you click "Empty Recycle Bin," files stored in the Recycle Bin _____. Select one: a. return to their original position b. can be retrieved using the Restore tab on the ribbon c. are permanently deleted d. are compressed

are permanently deleted

A(n) ______ is a file you send with an email message. Select one: a. tag b. addendum c. attachment d. widget

attachment

The majority of discarded computer equipment sent to recyclers in developed nations ends up ____. Select one: a. being reused in new computer components b. being safely separated and recycled within the United States c. being sent to foreign nations with lax environmental standards d. being ground into the underlayment used in highways

being sent to foreign nations with lax environmental standards

A fingerprint reader is an example of a(n) ____ access system. Select one: a. holistic b. biometric c. ephemeral d. trivial

biometric

A ____ is an online personal journal accessible to the public, usually created and updated by one individual. Select one: a. wiki b. blog c. podcast d. plank

blog

The operating system is loaded into memory during the ____ process. Select one: a. kernel b. boot c. SOLE d. lacing

boot

A group of zombie computers controlled by one individual, working together in a coordinated fashion, is called a(n) ____. Select one: a. zero-day threat b. botnet c. wardriver d. etherbomb

botnet

Web pages are viewed using a Web ____. Select one: a. bug b. spinner c. browser d. compiler

browser

DVD ____ refers to recording data onto a recordable or rewritable DVD. Select one: a. ripping b. burning c. tracing d. authoring

burning

A _____ is an electronic path over which data can travel. Select one: a. router b. bus c. redundant array of disks d. sluice

bus

A(n) ____ network uses a central cable to which all network devices connect. Select one: a. ether-ring b. star c. bus d. mesh

bus

To ensure a unique email address for everyone in the world, usernames must be unique within each ____. Select one: a. region b. nation c. hub d. domain name

domain name

You can change your start page _______. Select one: a. from within the Internet Explorer app only b. by triple-clicking the Address bar c. by working with the Internet Options dialog box, General tab d. only when you first start Internet Explorer

by working with the Internet Options dialog box, General tab

To save a favorite in the Internet Explorer app, you _______. Select one: a. click the Pin site button, then click Add to favorites b. simply type '%' at the end of the URL in the Address bar c. drag the Address bar to the upper-left corner of the screen, then release d. are out of luck; you can only add favorites in the desktop application

click the Pin site button, then click Add to favorites

A(n) ____ is a computer that requests and uses network resources from a(n) ____. Select one: a. client, peer b. server, ISP c. ISP, client d. client, server

client, server

When only one file is open in an application, clicking the application's Close button _______. Select one: a. closes only the file b. closes the file and the application c. is dimmed and unclickable d. has different effects depending on the application open

closes the file and the application

Windows Live SkyDrive is an example of _____ storage. Select one: a. NAS b. SAN c. cloud d. direct

cloud

On most computer systems, the smallest storage area on a hard disk is a(n) _____. Select one: a. track b. cluster c. SSD d. cylinder

cluster

The accompanying figure shows a(n) ____. Select one: a. GUI b. HUI c. command-line interface d. UNIX interface

command-line interface

Maliciously altering the content of a competitor's commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource. Select one: a. computer sabotage b. Cyberterrorism c. cracking d. a dot con

computer sabotage

A smart card is the size of a _____. Select one: a. postage stamp b. credit card c. sheet of A4 paper d. postcard

credit card

Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____. Select one: a. data b. information c. networks d. hardware

data

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Your business has a growing client base as well as a growing inventory. You need to keep track of a good deal of information and be able to search for information quickly, so you decide to invest in ____. Select one: a. database software b. mastersheet software c. presentation software d. note taking software

database software

Operating systems used with personal computers are typically referred to as ____ operating systems. Select one: a. desktop b. network c. mobile d. embedded

desktop

Most networking media send data using ____ signals. Select one: a. flash b. digital c. analog d. contiguous

digital

A(n) ____ is designed to authenticate the identity of an individual or organization; it contains the name of the entity, a serial number, an expiration date, and a key pair. Select one: a. e-vitation b. digital certificate c. online watermark d. authenti-stamp

digital certificate

A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn't been tampered with after it was sent. Select one: a. valid IP packet list b. Wi-Fi piggyback c. digital signature d. e-thumbprint

digital signature

Most Internet connections today are ____ (always-on) connections. Select one: a. dial-up b. lossless c. direct d. scaled

direct

When a Web site is requested by its ____, the corresponding ____ is looked up using one of the Internet's DNS servers. Select one: a. domain name, IP address b. IP address, domain name c. TCP/IP route, ring topography d. ISP, HTML code

domain name, IP address

IP addresses and their corresponding ____ identify computers available through the Internet. Select one: a. HTML codes b. TCP/IP routes c. ring topographies d. domain names

domain names

Small programs called ____ are used to communicate with peripheral devices such as monitors, printers, and keyboards. Select one: a. buses b. threads c. drivers d. page files

drivers

The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____. Select one: a. mobile devices b. fifth-generation computers c. embedded computers d. miniframes

embedded computers

A happy face or sad face image placed in the message text of an email is called a(n) _______. Select one: a. emoticon b. charm c. facetile d. winkie

emoticon

Only ____ email can be transmitted safely and privately. Select one: a. work b. Web-based c. encrypted d. logged

encrypted

A company network that is accessible to authorized outsiders is called a(n) ____. Select one: a. WAN b. extranet c. intranet d. VPN

extranet

A _______ is a shortcut to a Web page saved in a list in the Internet Explorer desktop application. Select one: a. Slice b. favorite c. frequent d. histogram

favorite

".docx" is an example of a(n) _______. Select one: a. taskpane shortcut b. Clipboard snippet c. file extension d. PowerPoint file

file extension

The accompanying figure shows various examples of _____. Select one: a. embedded drives b. flash memory cards c. external hard drives d. ZIP drives

flash memory cards

A _______ is a menu or grid that shows visual representations of the options available for a button. Select one: a. taskpane b. gallery c. tableau d. ScreenTip

gallery

The term ____ computing refers to the use of computers in an environmentally friendly manner. Select one: a. green b. blue c. bio d. tonic

green

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. Router manufacturer, maker of the latest Web browser, computer designer are ____. Select one: a. ASPs b. key Internet organizations c. hardware and software companies d. users

hardware and software companies

Search engines return a list of links to Web pages that match your search criteria, called ____. Select one: a. hits b. homers c. webcrawlers d. hotspots

hits

A Wi-Fi ____ is a location with a direct Internet connection and a wireless access point that allows users to connect wirelessly to the Internet. Select one: a. hotspot b. honeypot c. broadband d. linkup

hotspot

When you type a URL into the Address bar and press the Enter key, Internet Explorer automatically adds _______ to the URL and then displays the page. Select one: a. html::80 b. IE10:// c. TCP/IP d. http://

http://

When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____. Select one: a. http b. https c. SEC-http d. a deadbolt symbol

https

File naming rules differ from folder naming rules _____. Select one: a. in specifying a different maximum length for file names b. in no way; the rules are the same c. in the characters that are not allowed d. in that two files in different folders may not have the same name

in no way; the rules are the same

The means by which you interact with any program on a computer is called the user ____. Select one: a. interface b. shunt c. plug-in d. GIU

interface

When you drag a file or folder from one location to another on the same drive, it _____. Select one: a. is copied, not moved b. is moved, not copied c. is automatically extracted d. is automatically compressed

is moved, not copied

When you delete a message from the Inbox, _______. Select one: a. the sender's name is deleted from your Contacts as well b. it is moved to the Deleted items folder c. it is immediately permanently deleted d. it is moved to a holding area on the desktop or the Start screen

it is moved to the Deleted items folder

From the accompanying figure, you can say that _______. Select one: a. this Internet Explorer application currently has no saved favorites b. it is not possible to go forward to a more recent URL, only back c. the computer has a touch screen d. the screen is not maximized

it is not possible to go forward to a more recent URL, only back

The core of the computer's operating system is called the ____. Select one: a. boot sector b. node c. shell d. kernel

kernel

The use of multiple _______ is sometimes called using a search phrase. Select one: a. hits b. search results c. search engines d. keywords

keywords

To conduct a Web search, you type ____ into a search box on a search site. Select one: a. passwords b. passphrases c. spiders d. keywords

keywords

Clicking the small button in the right corner of many groups on the ribbon tabs _______. Select one: a. expands the group b. launches a dialog box related to that group c. locks the group d. opens the Clipboard

launches a dialog box related to that group

Most storage servers are based on _____. Select one: a. magnetic tape b. flash memory c. optical discs d. magnetic hard disks

magnetic hard disks

A large organization that needs a computer to run the programs that staff use during the day, and then spend the night performing payroll and billing, most likely will buy a ____. Select one: a. mainframe b. supercomputer c. cloud computer d. midrange server

mainframe

All of the following typically use the same operating systems as desktop computers EXCEPT ____. Select one: a. notebooks b. netbooks c. mobile phones d. tablets

mobile phones

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. both illegal and unethical

not plagiarism

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____. Select one: a. cyberterrorism b. identity theft c. online harassment d. cyberstalking

online harassment

Clicking the FILE tab _______. Select one: a. opens a dialog box b. adds contextual tabs to the ribbon c. gives you access to editing and formatting features d. opens Backstage view

opens Backstage view

Without a(n) ____, a computer cannot function. Select one: a. pointing device b. application suite c. operating system d. optical drive

operating system

Email is typically transmitted ____. Select one: a. in encrypted form b. through a VPN c. over public media d. at times of low Internet usage

over public media

Hacking most often occurs ____. Select one: a. in upscale suburban areas b. when an attacker has physical access to a vulnerable computer c. over the Internet or another network d. on college campuses

over the Internet or another network

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Lastly, you need a specialized program to help you track your personal expenses, balance your checking accounts, and write checks. You were looking at buying ____, but you realized that much of what you need is already available via online banking with your local bank. Select one: a. database software b. accounting software c. personal finance software d. vector software

personal finance software

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon rightly says this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. illegal, though probably still ethical

plagiarism

Presenting someone else's work as your own is ____. Select one: a. libel b. trademark infringement c. plagiarism d. unethical but not illegal

plagiarism

Magnetic hard drives contain round pieces of metal called _____, which are coated with a magnetizable substance. Select one: a. platters b. cylinders c. SSDs d. saucers

platters

A communications ____ determines how devices on a network communicate. Select one: a. protocol b. topography c. hierarchy d. bridge

protocol

Wireless networks usually use ____ signals to send data. Select one: a. analog b. radio c. fiber-optic d. contiguous modulation

radio

A wireless ____ is commonly used to connect both wireless and wired devices to a network and to connect that network to an Internet connection via the appropriate broadband modem. Select one: a. coupling b. jumper c. router d. NAC

router

The most common tasks you perform in any Office application are to create, open, _______, and close files. Select one: a. share b. delete c. edit d. save

save

To change which area of the workspace is visible in the program window, you can use the _______. Select one: a. zoom bars b. scroll bars c. resolution setting d. ScreenFilter

scroll bars

Google, Yahoo!, and Bing are all examples of ____. Select one: a. social networking software b. search sites c. third-party cookies d. tracking engines

search sites

Special Web pages called ____ are available to help you locate what you are looking for on the Internet. Select one: a. robots b. search sites c. Web bugs d. scanner pages

search sites

With ____ transmission, data is sent one bit at a time. Select one: a. serial b. parallel c. pulse d. fiber-optic

serial

Facebook is an example of a(n) ____ site. Select one: a. social networking b. Webinar c. ISP d. wiki

social networking

The term ____ refers to the programs or instructions used to tell a computer what to do, and allow people to use a computer to perform specific tasks. Select one: a. hardware b. networking c. vaporware d. software

software

Sometimes, related software programs are sold bundled together as a(n) ____. Select one: a. operating system b. software suite c. incentivization d. software cluster

software suite

The biggest advantage of fiber-optic cabling is ____. Select one: a. ruggedness b. speed c. price d. flexibility

speed

A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be. Select one: a. phramed or framed b. spear phished c. spoofed d. sponged

spoofed

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have received an email from your bank asking you to update your account information and verify your password. Suspicious, you hover your mouse over one of the links in the email. It turns out that the actual link does not go to the bank's Web site, but to another site you are unfamiliar with. Knowing what you do about data theft, you assume that the bank's true Web site has been ____ at this Web site in order to trick people into giving their personal information to a thief. Select one: a. phished b. phramed or framed c. piggybacked d. spoofed

spoofed

The text recommends all of the following for creating strong passwords EXCEPT ____. Select one: a. using at least eight characters b. using a combination of upper- and lowercase letters c. creating a password from an easy-to-remember passphrase d. stringing together easy-to-remember family names

stringing together easy-to-remember family names

A(n) ____ prevents power spikes from harming your computer system. Select one: a. surge suppressor b. UPS c. rugged frame d. antivirus suite

surge suppressor

The _____ is a small quartz crystal located on the motherboard. Select one: a. ALU b. system clock c. bus interface d. heat sink

system clock

The technical term for the complete malfunction of a computer system is ____. Select one: a. BSOD b. asset demechanization c. file corruption d. system failure

system failure

The ribbon is organized into _______ and groups. Select one: a. panes b. quadrants c. workspaces d. tabs

tabs

Web pages are displayed on _______ in the Internet Explorer desktop application. Select one: a. slices b. dialogs c. slides d. tabs

tabs

The desktop _____ is a horizontal bar containing buttons that provide quick access to common tools and running programs. Select one: a. taskbar b. Charms bar c. Start screen d. notification area

taskbar

The accompanying figure shows _______. Select one: a. the Internet Explorer desktop application b. the Internet Explorer app c. the Windows 8 desktop d. a page of search results

the Internet Explorer desktop application

In the accompanying figure, you know that there is no previously displayed window because _____. Select one: a. box E is at the root directory b. the buttons in box B are grayed out c. none of the subdirectories in box A are opened d. box D does not have a History tab visible

the buttons in box B are grayed out

When a software program is purchased, ____. Select one: a. the buyer is buying the software b. the buyer can modify and resell the software c. the buyer may always install the software on as many systems as he or she wishes d. the buyer acquires a software license specifying the terms of use

the buyer acquires a software license specifying the terms of use

When you delete a file from a USB drive, _____. Select one: a. the file is deleted permanently b. the file moves to the Recycle Bin c. a backup of the file is moved to your SkyDrive d. the total storage space on your USB drive is reduced by the file's size

the file is deleted permanently

If you are using a monitor set to a lower resolution and you can't find a ribbon button, you might need to click _______ first. Select one: a. Close b. the taskbar c. the group button d. the scroll bar

the group button

If you see a paperclip icon next to a message in the message list, that means _______. Select one: a. the message is time-sensitive b. the message is high-priority c. the message has been read d. the message has an attachment

the message has an attachment

System software consists of ____. Select one: a. the operating system & utility programs that control a computer b. productivity programs such as Microsoft Office c. RAM, the hard disk, and any USB flash drives attached d. only those programs that operate enterprise-class servers

the operating system & utility programs that control a computer

A red wavy line under a word you type in the message section of Mail means _______. Select one: a. the word is a hyperlink b. the word is not in the built-in spell checker c. the word is too complex for the tone of the rest of the message d. there are synonyms to the word that you might prefer

the word is not in the built-in spell checker

More than ____ of all home Internet connections in the United States are broadband. Select one: a. one-third b. two-thirds c. three-quarters d. 90%

two-thirds

An employee using a company computer to check personal email is an example of ____. Select one: a. fair use b. unauthorized use c. unauthorized access d. hacking

unauthorized use

An email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server. Select one: a. URL b. username c. password d. TLD

username

A(n) ____ is a software program that performs a specific task, usually related to managing or maintaining the computer system. Select one: a. application b. utility program c. kernel d. device driver

utility program

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. Select one: a. worm b. Trojan horse c. virus d. DDoS

virus

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. One evening you notice that your Internet seems to be running slower than normal. You look out your living room window and see a strange car parked on the street in front of your house, and someone's inside. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con

war driving


Related study sets

BLAW 300 Ch. 4 Mindtap Practice Questions

View Set

Chapter 2: Explaining Threat Actors and Threat Intelligence

View Set

Historic Costume Exam 2 (Quizzes)

View Set