Computer Literacy (part 3)
Using _____________, students can design and create objects such as prosthetics.
A . 3D printing
If you receive an email message you suspect is spam, what should you do?
A . Delete the message without opening it
What is the best type of website for a paper that requires books and scholarly articles as resources?
A . a library services website
What is a codec?
A . a way to compress audio or video data
A function always starts with ____________, followed by __________.
A . an equal sign, the function name
Using the ______________ field in an email message prevents recipients from seeing that anyone else was copied.
A . blind carbon copy (BCC)
Although you can build tables in Excel, in Access you can ____________.
A . connect the data in tables
Which part of the following URL is the protocol? http://maps.google.com
A . http://
One purpose of a(n) ___________ website is to showcase the creative talent of the website author.
A . personal
To keep a workbook displayed in the Recent files list in Backstage view, you click the ________.
A . pushpin icon
Google ___________ let you see just one type of result at a time.
A . search modes
To use a search engine, you enter a _________.
A . search term
When attackers use third-party ads to infect your computer with malware, it is called _________.
D . malvertising
Which of the following is an option antivirus software typically lets you customize?
E . Setting a schedule for a virus scan.
Which of the following is not an advantage tablets have compared to laptops?
E . Their higher screen resolution makes them more suitable for watching movies.
Why did the traditional method of performing banking transactions have to change?
E . User behavior changed; people now use mobile devices for banking.
Which of the following is not a recommendation for protecting your identity?
E . Wait for businesses to contact you when their bills are late.
Digital certificates use a standard format called ____________.
E . X.509
What type of media should you avoid sharing on social networks?
E . inappropriate pictures that may embarrass you
Which of the following statements is false?
D . Omitting the © copyright symbol means your work is not copyrighted.
What do you need before your camera phone can scan QR codes?
D . QR reader app
Which of the following is a setting you can select in Microsoft Edge?
B . webpage to display when Edge starts
Which of the following is not a news site ranked in the top 10 most popular news sites?
C . sportsnews.com
What do the Paste Options determine?
C . the appearance of the pasted text
When you purchase a product online, by law, the seller will __________.
A . ship the product to you within 30 days of the sale
When creating passwords for online accounts, you should _________________.
A . use a different password for each account
If you want to buy zebra angelfish for your aquarium, which of the following search terms will provide the best results?
A . zebra angelfish
How can you verify an email message contains a legitimate concern from a company instead of a phishing scam?
D . Enter the company's web address in a browser to visit their website, and then sign in.
Which of the following is not a way to protect yourself online?
D . Enter your user name and password on any site that requests them.
Why should you avoid using "Cincinnati" in a domain name?
D . It is often misspelled
You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.
D . JavaScript
What can an organization do to keep its data safe?
D . Protect the data at every level, from individual computers to networks.
How can you extract all the files in the Assignments compressed folder to the Documents folder?
D . Right-click the Assignments compressed folder, click Extract All, select the Documents folder as the location for the uncompressed files, and then click Extract.
Why might you want to set up a personal hotspot?
D . Security—a personal hotspot is more secure than a public network.
What do users typically like about software suites?
D . The programs in the suite have similar user interfaces.
When you receive an email message from a company, what should you check in the sender's email address?
D . The sender's email address should match their official website address.
What should you do when shopping or banking online?
D . Use a secure payment method
What is an advantage of using web apps?
D . You do not have to update them
What is a blog?
D . a website organized by blog posts, or individual news stories
Which of the following is not a way cybercriminals try to gather your personal information on social media sites?
D . blocking your friend requests
E-commerce transactions between businesses and customers is called ________.
D . business-to-customer (B2C)
What can you use to clear dust from the ventilation fans on a computer?
D . can of compressed air
Which of the following describes applied ethics?
D . considers a real-life situation and determines moral actions to take
Secure websites ____________ information before sending it between computers.
D . encrypt
A(n) _____________ file is a binary file you use to run a program.
D . executable
Which of the following is not a blog type mentioned in the video?
D . experimental
A(n) _________ resolves top-level domains such as .com, .org, and .edu.
D . root DNS
What type of cookie retains information about your visit only until you close your browser?
D . session cookie
What are the two factors used in two-factor authentication?
D . something you know and something unique you have
Using the Report Wizard, you can _______ report information to organize its contents.
D . sort
To refine the in-between motions, a computer animator uses a mathematical function called a(n) _______.
D . spline
Which of the following is not a reason botmasters use botnets?
D . to access the Internet more quickly
To register a .edu top-level domain, you must be a(n) ____________.
D . two-year or four-year college or university
A ____________ app is one that runs on your smartphone or tablet.
E . mobile
Which of the following is not an example of social media?
E . product description webpage
When creating and editing a presentation, you can use the ________ to align objects on the slide.
E . rulers
Unlike viruses, which require the spreading of a host file, __________ are standalone software and do not need help to spread
E . worms
Which of the following is an example of a compressed file format?
A . MP3 (MPEG-1, Audio Layer 3)
How do you start searching for a scholarly article on Google Scholar?
A . Type the title of the article or keywords associated with it.
If you want to see how a Word document will look when published to the web, use ______
A . Web Layout view
To store an image in a computer, the image must be converted to _____________.
A . ones and zeroes
To join a social network, you sign up for a free account and fill out your _____________
A . profile
How can you tell whether one of the Wi-Fi networks shown here is an evil twin?
A . You cannot distinguish an evil twin network from a legitimate one.
What should you especially avoid posting to the public on social media sites so that strangers cannot find you in the physical world?
A . location-based information
The ___________ part of a Creative Commons license means that a user must publish the creator's name when using the creator's content.
B . Attribution
Which statement is true about laptops and desktop computers?
B . If the power goes out, a laptop's battery serves as a backup power source.
By default, Excel worksheets appear in ____________ view.
B . Normal
What did a Stanford study find about people who had to cut down a tree in a virtual world?
B . They used less paper in the real world
Cable and DSL Internet connections are called _____________ because they offer faster speeds than dial-up connections.
B . broadband
In a database table, each row is called a(n) __________ and each column is called a __________.
B . record, field
A wiki is a(n) ____________ that members of a group can edit.
B . webpage
Which of the following search tools would you use to filter out specific words?
b " " or e NOT
How can you determine the accuracy of an article?
A . Check for a list of references at the end of the article.
Which of the following is not a tip for creating an ergonomic workspace?
A . Position the display screen so that you look up at it.
Which of the following is not an advantage of using technology in a large classroom?
A . Students can select entertaining videos to view while the teacher is busy elsewhere.
What happens when you begin to read an e-book protected with digital rights management (DRM) software?
A . The DRM software contacts a DRM server to verify you purchased the e-book.
A typical ___________ is 48,000 Hz.
B . sample rate
Some virtual reality headsets are designed to work with your __________.
B . smartphone
What happens if you visit an unsecured website during a man-in-the-middle attack?
C . Information about your visit appears on the hacker's computer.
If different systems produce medical records, the systems must _____________.
C . be able to communicate with each other
In a column chart, the ___________ identifies what each color represents.
C . legend
Besides securing access to your Wi-Fi network, you should ____________.
C . secure access to your wireless router
What is the name for a device infected with malware that an attacker uses to control the device remotely?
C . zombie
Which of the following components most affects a computer's speed?
D . CPU
Which of the following options has the highest level of protection?
D . Encrypt with Password
For a company, intellectual property is _______________.
D . a large part of the company's value
What does antivirus software do?
E . It scans your computer to remove any viruses it finds.
________ apps are defined as those you download and run directly on the mobile device.
E . Native
What must you do before you can copy, cut, or move text on a PowerPoint slide?
E . Select the text.
Which of the following statements is true?
E . The duration of a copyright varies in different parts of the world.
Why should you look for an author's name when evaluating news shared through a social media website?
E . You can then determine whether the author has expertise to report on the topic
When you use cloud computing, what do you need to access your files and applications?
E . a web browser and an Internet connection
When an email message arrives at a domain name system (DNS) server, the server acts as a(n) _______.
E . address book
Why should you not remove a program by deleting its folder?
a (windows might need it) or d
Which of the following is not a step in creating an animation?
b (framing) or c (smoothing)
Which of the following is a similarity between updates and upgrades?
b (free of charge) or d
Attackers consider __________ relatively easy to access without authorization.
c home wifi or b
Which of the following is not an advantage of all-in-one computers?
c or d $
Which of the following is not an option when sharing a Google calendar?
c or e
The _________ file format is often used for photos and other web images.
a (jpg) or c(eps)
Which of the following is a common cause of computer eye strain?
D . using harsh lighting near the computer
When you search from the general to the specific, you are performing a __________.
D . vertical search
A(n) _________ is a tool hackers use to record your keystrokes.
E . keylogger