Computer Concepts Mid-Term Spring 2019

Ace your homework & exams now with Quizwiz!

A(n) _________ is a combination of mobile phone and handheld computer. a. smartphone b. tablet c. ultraportable computer d. cloud computer

A

Every type of Internet service requires a connection and monthly payment to a(n): a. ISP b. VoIP c. LMS d. MMORPG

A

Microsoft Word, Google Chrome, iTunes, and Adobe Photoshop are examples of ___________. a. Applications b. Operating systems c. Internet service providers d. Mobile devices

A

The Analytical Engine, developed by ________, could be programmed using punched cards. a. Charles Babbage b. Joseph Marie Jacquard c. Ada Lovelace d. Alan Turing

A

The physical devices that make up a computer system are called: a. hardware b. software c. NFC d. data

A

The term "phishing" refers to ________. a. An email that tries to steal personal information b. The process of creating a new email address c. Accidentally sending an email to the wrong recipient d. Recovering a deleted email from the trash can

A

What is the Internet? a. A global network of computers and electronic devices b. A type of web browser c. A group of online communication tools, including email and instant messaging d. A global collection of different websites

A

When searching for facts on a controversial topic, it's best to stick to reliable, unbiased sources like ________. a. Encyclopedia Britannica Online c. popular blogs b. social networking sites d. Wikipedia

A

Which of the following is NOT a cloud storage service? a. Skype b. Dropbox c. Google Drive d. Microsoft OneDrive

A

Which of the following would be considered a strong password? a. p3MberLY%Av b. 123abc456def c. p@sswOrd1 d. w3st!

A

Windows Defender is a(n) _____________ that comes pre-installed on Windows 10. a. Antivirus software b. Word processor c. Web browser d. Digital assistant

A

You can open multiple websites within the same window using __________ . a. tabs b. pages c. links d. bookmarks

A

_________ allows messages to be sent to electronic mailboxes in an instant. a. Email b. NFC c. Cloud computing d. Real-time information

A

A file is stored in a ________. a. window b. folder c. File Explorer d. subfolder

B

All newer web browsers use a(n) _________ browsing interface, which allows you to have multiple web pages open in one browser window. a. aggregated b. tabbed c. networked d. Web 2.0

B

An uninvited email solicitation to buy something is an example of ________. a. flaming b. spam c. pharming d. instant messaging

B

Any email address placed in the _________ will be invisible to the recipients of your message. a. cc b. bcc c. to d. subject

B

Identify the correctly written email address below: a. janeAThotmail.com b. [email protected] c. jane.gmail@com d. jane&gmail.com

B

If you wish to pass on or re-send an email message to other individuals, you should use the _________ option. a. reply b. forward c. attachment d. bcc

B

In Windows 10, where does the Taskbar display on the desktop? a. top b. bottom c. left d. right

B

The largest network in the world is known as the _________, which connects billions of people and organizations throughout the world. a. World Wide Web b. Internet c. cloud d. Wi-Fi

B

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. a. zombie b. hacker c. Trojan d. worm

B

What is Cortana? a. The default web browser in Windows 10 b. A digital personal assistant c. A cloud-based storage service d. A file manager

B

What is Wi-Fi? a. A hard-wired Internet connection b. A wireless Internet connection c. A dial-up Internet connection d. A 3G/4G Internet connection

B

What is a browser cookie? a. It's a type of phishing scam. b. It's a small piece of data that tracks your preferences on different websites. c. It's a tool that can test a website's security. d. It's a plug-in that allows you to view special types of web content.

B

When you look at the back of your system unit, you will likely find a variety of plugs known as _________. a. bits b. ports c. drives d. controllers

B

Whenever you actively work on something using your computer, that work is temporarily stored in: a. a bay b. RAM c. a tape drive d. BD

B

Which of the following is NOT recommended when creating a strong password? a. Using a password generator to create more random passwords b. Using the same password for multiple accounts c. Using a password that's longer than six characters d. Including numbers, symbols, and special characters

B

Which of the following technologies allows you to store your files and use various applications in an online account? a. Augmented reality b. Cloud computing c. Bluetooth d. Streaming media

B

With _________ storage services, your files can be stored online and accessed from any Internet-connected device. a. augmented b. cloud c. multimedia d. mobile

B

_________ involves luring individuals into entering personal information into a website controlled by the hacker. a. Switching b. Phishing c. Pretexting d. Striping

B

_________ printers create an image directly on the paper by spraying ink through tiny nozzles. a. Laser b. Inkjet c. Dot matrix d. Thermal

B

A printer is classified as a(n) ________. a. integral part of every computer b. processing device c. output device d. system device

C

A(n) ________ is built by Apple and run the OS X operating system. a. tablet computer b. netbook c. Mac computer d. ultrabook

C

An original work is automatically protected by ________ the moment it's created. a. public domain b. Creative Commons c. Copyright d. Fair Use

C

In Google, how should you phrase your search if you want to exclude a certain word from your results (for example, "chocolate")? a. dessert (exclude: chocolate) b. dessert ~chocolate c. dessert -chocolate d. dessert NOT chocolate

C

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections? a. Facebook b. Google+ c. LinkedIn d. MySpace

C

Microsoft Edge is a new default _____________ that is intended to replace Internet Explorer. a. Start menu b. Window management tool c. Web browser d. Antivirus software

C

Online social interactions that exhibit anger and/or insults are known as: a. piracy b. telecommuting c. flaming d. trolling

C

The computer that has been traditionally found on the desks in many offices and homes is the _________ computer. a. mainframe b. blade c. desktop d. embedded

C

The main workspace of a Windows computer is called the _________. a. Folder b. Shortcut c. Desktop d. Explorer

C

The subject word (or words) of the topic you wish to find while using a search engine is called the ________. a. directory b. URL c. keyword d. web portal

C

To view web pages, you need special software known as a web: a. portal b. viewer c. browser d. server

C

Which of the below is NOT a(n) output device? a. Speaker b. Monitor c. Microphone d. Printer

C

Which of the following enlarges the size of a window to fill the entire screen? a. Minimize button b. Switch Windows button c. Restore Down/Maximize button d. Close button

C

Which of the following is NOT a web browser? a. Safari b. Chrome c. Bing d. Firefox

C

Which of the following is the most popular video sharing site, offering millions of different videos that have been uploaded by users? a. Spotify b. Netflix c. YouTube d. Hulu

C

Which of the following social networking sites focuses mostly on career networking? a. Facebook b. Meetup c. LinkedIn d. Twitter

C

Who is known as the father of computers? a. Al Gore b. Bill Gates c. Charles Babbage d. Steve Jobs

C

Windows, OS X, and Linux are examples of __________. a. Applications b. Internet service providers c. Operating systems d. Mobile devices

C

_________ are messages that try to trick you into providing sensitive information. a. HTTPS b. Cookie scams c. Phishing scams d. Plug-ins

C

Generally, when you receive an email, it will appear in your _________. a. Compose pane b. Calendar c. Message pane d. Inbox

D

If you were emailing a term paper and wanted to maintain its formatting, you would send it as a(n) ________. a. URL b. instant message c. protocol d. attachment

D

Many computers are now being connected via _________ networks, whereby communication takes place using radio waves. a. augmented b. personal c. multimedia d. wireless

D

The set of instructions that directs the computer to perform a variety of tasks is known as a(n): a. embedded system b. MMS c. LBS d. computer program

D

What is Microsoft Windows? a. A word processor b. A web browser c. An email service d. An operating system

D

Which of the following is NOT a good way to protect your computer? Check all that apply. a. Plug it into a surge protector. b. Install antivirus software. c. Back up important files d. Skip operating system updates.

D

Which of the following is an example of an email address a. www.garywinkler.net b. [email protected] c. www.uaptc@edu d. [email protected]

D

Why is it important to cite your sources? a. It gives you the legal right to distribute the original works b. It allows you to copy and paste without using quotation marks c. It ensures that the original author will receive royalties d. It gives credit to the original author and shows that you are not taking credit for someone else's work

D

You will often find _________ on a web document that, when clicked, act as connectors to another document on the World Wide Web. a. cookies b. bookmarks c. tags d. hyperlinks

D

________ were invented in 1947 and led to second-generation computers in the 1950s and 1960s. a. Vacuum tubes b. Integrated circuits c. Central processing unit d. Transistors

D

_________ is unsolicited email that is sent in bulk. a. LMS b. Meme c. IM d. Spam

D

A browser is a document on the World Wide Web that can include text, pictures, sound, and video.

False

Repeated hostile behavior with intent to psychological harm another individual is known as cyberterrorism.

False

Spam consists of little text files left on your hard disk by some websites you visit.

False

Spamming is writing an online message that uses derogatory, obscene, or inappropriate language.

False

The Control Panel is the only place to change system settings in Windows 10.

False

The HTTPS protocol in a URL indicates that the web page has been completed, sent, or loaded.

False

The Internet and websites are the same thing.

False

The Minimize button in the upper right of the file window closes the window.

False

There is no difference when using Google, Yahoo!, Bing, or other popular search engines. They all produce the same search results.

False

Use of all-capital letters on the Internet is considered appropriate online behavior

False

When you move a file to the Recycle Bin, it will be immediately deleted from your computer.

False

You can easily avoid plagiarism by simply changing a few words from the original source

False

You can only have one user account on a Windows computer.

False

You cannot get a computer virus if you install antivirus software.

False

[email protected] is an example of a website address.

False

A network allows users to communicate and share information between computers and various devices.

True

An Internet service provider (ISP) provides users with access to the Internet.

True

Charles Babbage is known as the father of computers.

True

Clicking ads and pop-ups could expose your computer to malware.

True

Email can be sent via a particular email program, such as Microsoft Outlook, or via a browser and a website, such as through Hotmail and Gmail.

True

Laptop computers possess a folding monitor that can rest flat against an area containing the keyboard and other hardware components.

True

Many people use several different methods for communicating online, depending on the situation

True

Nothing posted to social media services or anywhere else on the Internet should be considered private.

True

Some commonly used top-level domains are .net, .com, .gov, and .edu.

True

The URL is the website's unique address

True

The Windows desktop is the working area of Windows.

True

The motherboard is the largest circuit board in a personal computer

True

The section of an email known as "Cc" is used to send a copy of your message to individuals other than your primary recipient.

True

The things you share on social networking sites like Facebook are generally more public than things you share over email or instant messaging.

True

Websites are connected to one another through hyperlinks across the World Wide Web.

True

When something is saved to the cloud, it means it's stored on Internet servers instead of on your computer's hard drive.

True

When you delete a file or folder, it is moved from its current location to the Recycle Bin on your computer.

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

True

You can create folders inside other folders.

True

You can move or copy files using the Move to or Copy to buttons on the Home tab of File Explorer.

True

You can usually leave out www. when typing a URL into your web browser.

True

You should always mention attachments that are included with an email.

True

You view websites within a web browser, such as Internet Explorer.

True


Related study sets

Convergent and DIvergent Thinking

View Set

BUSINESS FOR LAW CHAPTER 8 QUESTIONS: CONSIDERATION

View Set

för dig som går i 7B Den som kommer först i match får 11 kr

View Set

OB Ch. 11 Rational & Nonrational Models of Decision Making

View Set

Econ Learning Plan 6 - Activity 6

View Set

Chapter 9: Social Stratification in the United States & Chapter 10: Global Inequality

View Set

Chapter VIII - DISCHARGE OF N.I.

View Set

PRACTICE MIDTERM - HESI Leadership

View Set