computers

Ace your homework & exams now with Quizwiz!

Ultrathin laptops typically are more powerful than traditional laptops. False True

false

Which of the following best defines encryption?

A security method that scrambles or codes data as it is transmitted over a network.

Shane is a proponent of net neutrality. Which of the following describes one of the principles Shane believes in?

All Internet traffic should be treated equally.

What happens during POST?

All computer components are tested for proper operation.

Which of the following best describes alt text a. tools that can translate text into multiple languages b. scrolling text for dialogue in a video c. technology that uses audio output to describe screen contents d. descriptive text added to an object

D. descriptive text added to an object

Amy is purchasing a new computer. She is trying to decide which platform she needs. What question does she need to answer?

Do I want to use Windows or macOS?

Disabling privacy settings on your personal social media accounts is recommended to let potential employers see your interests and activities. true or false

False

One advantage of an LMS is that it enables robots to perform work that is too dangerous, detailed, or monotonous for people. True False

False

The purpose of an NIC is to enable a computer to act as a network server. False True

False

Luis is setting up his LinkedIn profile. Which of the following is true about using professional online social networking tools?

He should ask colleagues for recommendations that endorse his skills.

Aliyah is helping senior citizens at her local community center learn about online safety. Which of the following would Aliyah not recommend?

Keep you location sharing on so that you can verify you are making local transactions.

You can use social networking sites designed to provide business and employment-oriented services such as

LinkedIn

Adrian is shopping online. Which of the following is true about e-commerce

Many C2C sites use email forwarding to connect buyer with seller to protect everyone's privacy.

Which of the following is not true about CC licenses?

Others can use, copy, or distribute others' work without giving credit.

Which of the following is not one of the SEM action steps?

Remove your data before disposing of your old devices.

Storing files to and retrieving files from cloud storage typically requires special software and capabilities including in an operating system. True False

false

Which of the following is not true about using web apps?

They take up a lot of storage space on your device.

For what purpose would a company enact an AUP?

To list guidelines and repercussions of the use of the Internet and other digital company resources.

A digital signature is used to verify a user's identity. True False

True

A plug-and-play device will begin functioning properly as soon as you connect it to a computer. ​ True False

True

A voice synthesizer converts text to speech. True False

True

Most technology certifications do not require coursework assignments, but instead require you to pass an exam that demonstrates your proficiency in the area. True False

True

Netiquette includes the code of acceptable behaviors users should follow while on the Internet. True False

True

The ENERGY STAR program was developed to help reduce the amount of electricity used by computers and related devices. True or false

True

The terms software, program, and app all refer to a set of coded instructions that tell a computer or device what tasks to perform. True False

True

To broaden a search, you use a word stem, which is the base of a word. True False

True

Threads allow users to classify posts related to a particular topic. True False

false

Marist uses an online social network to share information with other users. Her feed shows ______.

a listing of the most recent content posted to the network

Kofi has been using an e-reader, but it is getting old. He wants a device that is similar in size and has a touch screen. Which would be the best fit for Kofi?

a tablet

Which two technologies are used to develop webpages? a. HTML b. AI c. CSS d. C++

a. HTML c.. CSS

Which three of the following are part of the definition of a computer? a. an electronic device b. operates under the control of instructions stores in its own memory c. can accept data, process data to produce information, and store information for future use d. connects multiple devices together to share information

a. an electronic device b. operates under the control of instructions stores in its own memory c. can accept data, process data to produce information, and store information for future use

Which of the following two are examples of C2C e-commerce? a. classified ads b. technical support c. auctions d. market research

a. classified ads c. auctions

Which two technologies are used to store data on internal hard drives? a. solid-state drive b. cloud server c. optical media b. magnetic hard disk drive

a. solid-state drive b. magnetic hard disk drive

People who aggregate data in order to sell it to third parties are called data ______.

brokers

Stevie is raising money to produce her independent student film. Which two of the following platforms could she use? a. Pinterest b. WeTransfer c. Indiegogo d. Kickstarter

c. Indiegogo d. Kickstarter

Which of the following best defines streaming? a. It is a way of receiving audio and video content on your device as it is being downloaded from the web. b. It involves wireless communication between two smart devices. c. It is used to capture and upload content to the web. d. It can be used to monitor heart rate, measure pulse, and count steps and transmit that data to an mHealth app.

c. It involves wireless communication between two smart devices.

Metadata is data that ______.

describes other data

Amy wants to extend her storage capabilities beyond her internal hard drive and to be able to use her files on other devices. She uses a USB cable to connect a/n ______ to her computer.

external hard drive

3D Secure is a standard protocol for verifying images and digital media and ensuring they do not contain malicious code. True False

false

A server is any computer or device that provides connections to other computers or devices on a network. True False

false

Computer manufacturers run benchmark tests to assess performance. True False

false

Ergonomics is an applied science that produces guidelines regarding the impact of e-waste. True False

false

In the 1960s, computers engineers developed silicon chips that placed the equivalent of thousands of vacuum tubes or transistors into a/n ______.

integrated circuit

LMS stands for ______ management system.

learning

A stylus is a/n ______.

pen-shaped digital tool for making selections and entering information on a touchscreen

Noa uses the upvote feature on the discussion forum network he uses to _____.

promote answers he finds useful

RSI is caused by ______.

repeated and long-term usage of devices

A computer that makes file available to users at a location called a data center is called a/n ______.

server

Sam is doing research before he buys a new computer or laptop. His last one overheated, so he is looking for one that includes technology to cool the processor. Which of the following is not a method for processor cooling?

smart thermometer

A touchpad is a touch-sensitive flat surface on which you drag your finger to move the pointer on the screen. True False

true

An SSD is a hard drive without moving parts and is faster and more durable than magnetic drives. True False

true

Electrical noise is defined as unwanted high-frequency energy. False True

true

Processors today are superscalar, which means they can execute more than one instruction per clock cycle. True False

true

Many developing countries have become disposal sites for e-waste by illegitimate recycling companies. False True

ture


Related study sets

Chapter 66: Caring for Clients with Burns

View Set

Pharmacology ATI Learning System Quiz

View Set

8th grade mcgraw-hill solar system

View Set

NU 3600 Exam III: Global Health I&II and Disaster Care I&II

View Set

Competitive Programming - Bit Shifting, Formulas, and More., Machine Learning - Andrew Ng, Vanilla JS Project Bits, Programming Paradigms & Functional Programming & Haskell, Angular 2, Javascript: OOP, Design Patterns and more, JS Datastructures, Rea...

View Set

Psychology Final, Test #3, Broadwell

View Set

Chapter 6 EXAM: Home Owner's Policies

View Set

Medsurge exam 3 part 3 ( ch. 62 finish & 68 )

View Set