Computer & Internet Literacy Exam 1
Which of the following file extensions is commonly used for term papers and other word processing tasks? Group of answer choices
.docx
Which of the following file extensions is commonly used for drawings?
.gif
"Full HD" resolution is expressed as:
1920 x 1080
When you buy a new laptop, how much RAM should it come with?
4-8 GB
Blu-rays provide approximately ___ of storage space.
50 GB
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
File Explorer
The ___ is a computer within your computer that creates images.
GPU
If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .
Restore
Because they're inexpensive and reliable ___ have become extremely popular storage devices.
thumbdrives (USB or flash drives)
Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.
touchscreens
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.
uninstall
Persistent cookies store information about
user preferences.
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm
A transmission medium's capacity is called its _____.
bandwidth
A short (simple text) email uses about one ___ of data.
kilobyte
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
macro virus
The word modem stands for ____.
modulator-demodulator
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
The actual number of pixels in a monitor is called ___ resolution.
native
Two common categories of cybercrimes include single events and _____ series of events.
on-going
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .
optical drive
Many manufacturers have made a(an)_____ optional equipment when purchasing a new laptop computer.
optical drives
Server banks have capacities measured in ___ .
petabytes
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
A request for an electronic "echo" or response from another computer or server is called a ____.
ping
The smallest element of an image is called a(n) ___ .
pixel
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
players
A processor comprised of one control unit and one ALU is called a ____ .
single-core processor
Contact your ISP if your actual Internet speed is _____ than advertised.
slower
Data from the hard drive reaches the CPU ___ than data from the RAM.
slower
The average tablet computer has a ____ hard drive than the average desktop computer.
smaller
An unsolicited email message is called _____.
spam
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called _____ software.
system
To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.
CTRL + X
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
Which of the following Internet services tends to provide the most consistent speeds?
DSL
Select the characteristics of desktop computers.
Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they don't need to be mobile. Desktops use a full OS.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ . Group of answer choices
Distributed Denial of Service
A quick way to rename files or folders in Windows is to select the item and then press the ___ key.
F2
A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .
File Transfer Protocol
A separate processor (computer) in your computer that enhances your video is called the ___ .
Graphic processor (GPU)
Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.
Internet
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
ISP stands for:
Internet Service Provider
The abbreviation for megahertz is ___ .
MHz
Connecting digital musical devices to computers is accomplished by using ___ ports.
MIDI
The 2 most common audio file formats are WAV and ___ .
MP4
The search feature in the app store is represented by a(an) __________.
Magnifying glass
Windows OS is owned and maintained by _____ .
Microsoft
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
Network Operating System is abbreviated _____.
NOS
Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .
Organize
This type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
Projective Capacitive
Most tablets and phones use _____ as their main storage device.
SSD
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.
SSDs
Which of the following refers to the distribution of computer applications over the Internet and is commonly referred to as web apps?
SaaS
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
Save As
Spam messages are sometimes referred to as ___.
UBE
This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a computer.
USB
URL stands for ___ Resource Locator.
Uniform
To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .
View
The original wireless network privacy and protection standard for Wi-Fi was known as ___ .
WEP
One emerging data storage challenge is the incredible amount of video being uploaded to ___ .
YouTube
Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.
bit
The smallest unit of data storage is a ___ . Group of answer choices
bit
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Data flows between different parts of the computer via _____ .
buses
In ASCII, eight bits are combined together to create one ____.
byte
Which might be a choice for Internet service in your area? Group of answer choices
cable Internet
If you wish to email a file to a friend, but find that it's too big for your email server, you can always ___ the file. Group of answer choices
compress
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
cyberattack
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberterrorist
A disadvantage of cloud storage is that ___ . Group of answer choices
data is only available when you're online.
Screensize is measured by the ___ across the monitor.
diagonal
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
double-click
If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
drag
Routers that can send Internet signals over two distinct frequencies are called _____ routers.
dual band
Solid state drives store data using ___ .
electronic circuits
Which transmission medium has the largest bandwidth?
fiber optic
A URL identifies a particular __ address on the World Wide Web.
file
A security system separating 2 networks or even computers on the same network is called a ___ .
firewall
In order to keep your files organized, it's a good idea to create ___ and place your files in them.
folders
A desktop computer's RAM is measured in __ of data.
gigabytes
Storage capacity for laptop hard drives is typically described in terabytes or ___ .
gigabytes
What is equal to one cycle per second?
hertz
When determining how much cell phone data you need it is important to consider ___
how much data you currently use.
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must _____ it so he can start his assignments.
install
Putting software on a digital device, or adding hardware components and drivers to a digital device is called _____.
installing
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
longer
To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .
players
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
The two major concerns regarding cloud storage are reliability and ___ .
security
Resolution refers to the _____ and clarity of an image.
sharpness
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a _____
tablet
Which of the following represent the highest amount of storage?
terabyte
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
zombie