CS102

Ace your homework & exams now with Quizwiz!

Also known as ______ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent. Select your answer, then click Done.

"white hat"

Click on the file name of the actual web page, then click Done.

**last part of the URL

Select three 3D modeling and animation software applications that artists and animators use to create 3D objects and animated characters, then click Done.

3ds Max, Blender, Maya

Works go into the public domain when their copyright expires, usually _____ years after an author dies. Select the your answer, then click Done.

70

Personal computers are meant to be used by only one person at a time. Which computers are not personal computers? Select two answers, then click Done.

ATM hotspot, & tape storage facility hotspot

Click on a computer programming language, then click Done.

C++

Select the safest place to back up your data, then click Done.

Cloud Backup NOT hard drive

Connor is surfing the internet at work. He does not know the rules regarding employer and employee web activity. Which option is true? Select your answer, then click Done.

Employer can watch all of Connor's activity without his knowledge.

Some embedded systems, such as "smart" lightbulbs and streaming media players, have the ability to connect to wireless networks and the Internet. These connected objects are known as the ______. Select your answer, then click Done.

Internet of Things (IoT)

Which of the following medical procedures primarily involve computers? Select two answers, then click Done.

MRI & fetal monitoring

Select two software applications that can help you keep track of your family's personal finances, then click Done.

Mint and YNAB are popular financial applications. Intuit Quicken is desktop application that synchronizes with mobile app. NOT Intuit TurboTax hotspot, Mint (cloud-based)

Professor Smith wants to create a strong password for his bank account. Click on two passwords that are secure.

P!g$BaNk#98

______ is one example of a gaming console. Select your answer, then click Done.

Sony PlayStation 4 (PS4)

Select the item that acts as a surge protector and a rechargeable battery, giving you enough time to save your work before shutting down your computer. When you are finished, click Done.

UPS

The ______flash drive is a solid state storage device that plugs into a ______ port. You have probably used one of these to transfer files between computers or store copies of important files. Select your answer, then click Done.

USB

Cables connect computers in a traditional network; however, more computers are now connected via ______. Select your answer, then click Done.

Wi-Fi

Most laptops and tablets connect to networks and the Internet using ______. Click your answer, then click Done.

Wi-Fi

Select three software applications that you can use to create a playlist of your favorite music, then click Done.

You chose Adobe Illustrator, chose Avid Pro Tools, chose Apple GarageBand, chose Adobe Illustrator, chose Audacity, and clicked the Done button.

Which of the following are a virtual assistant that responds to voice commands? Select the two correct answers, then click Done.

You chose Google's Assistant, chose Apple's Siri, and clicked the Done button.

Agencies such as the NSA and FBI monitor Internet activity and can require companies to turn over your ______. Select the three correct answers, then click Done.

You chose search history, chose social networking activity, chose email messages, and clicked the Done button.

When a server farm gets too big for its space, companies often use ______, thin computers that slide into racks that hold many of its companion servers. Select your answer, then click Done.0

blade server

A(n) ___ utility scrambles your data or communication, making it unreadable by anyone who doesn't have the proper key.

encryption

Cloud computing allows you to store your files and access applications in a(n) ______ account. Select your answer, then click Done.

online

Every computer or device that is on the Internet needs a(n) ______ address that uniquely identifies it. Select your answer, then click Done.

IP

Automated programs run by ______ frequently search, organize, and store your information for marketing purposes. Select the two correct answers, then click Done.

Social media companies & search engines

Home automation allows people to use a mobile device to ______. Select the three correct answers, then click Done.

activate door locks, turn lights on and off, control the temperature in the home

Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers, then click Done.

copyrighted photographs, copyrighted music, copyrighted videos

The devices that can read, write, and erase data are called _________. Select your answer, then click Done.

drives

A browser_______ is a separate program that adds a variety of useful features to the web browser, like Evernote or Google Hangouts. Select your answer, then click Done.

extension

A ______ represents 1,000 megabytes. Type your answer in the space provided, then click Done.

gigabyte

Instead of holding a smartphone while driving, it is safer to use ______ technology. Select your answer, then click Done.

hands-free

The ______is used to store data in tablets, smartphones, and digital cameras. The Secure Digital (SD) is the most common format currently in use, available in various speeds and storage capacities. Select your answer, then click Done.

memory card

___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker.

phishing

Mobile devices are not designed to handle frequent drops or crushing weight. The best way to avoid damage to your mobile device is to buy a _______. Choose the two correct answers, then click Done.

protected case NOT extended warranty or insurance plan

Click on the three mobile devices that feature a camera and microphone, speakers, wireless connectivity, and internal sensors, then click Done.

smartphone, tablet, smartwatch

Though macOS and Windows share similar features and functions, Mac users cite five key advantages of owning these types of computers. Select the five answers, then click Done.

support stability unified ecosystem widely used in businesess today, included software, fewer viruses idk

Before installing software on your computer, you need to accept the end-user license agreement (EULA) that states how you can legally ______ the software. Select your answer, then click Done.

use

With millions of computer infections and intrusions yearly, home users and businesses can no longer afford to be without ______ and malware protection. Select your answer, then click Done.

virus

Created in 1991, ______is an open source server operating system that users modify, enhance, and then freely distribute to other users. Select your answer, then click Done.

Linux

The physical locations where things are stored are known as storage ______. For example, DVD discs are a type of storage ______. Select your answer, then click Done.

Media

______ are lightweight, handheld computers that offer a variety of software and communication services for mobile users. Select your answer, then click Done.

Mobile devices

Select three personal information managers (PIMs) that you can use to manage contacts, create appointments, set up reminders, and send emails, then click Done.

Mozilla Thunderbird, Zimbra Desktop, Microsoft Outlook

The _____ is a combination mobile phone and handheld computer. Fill in the correct answer, then click Done.

NOT tablet **smartphone

Is it ethical to illegally download music because your friends are doing it? Select your answer, then click Done.

No its nor morally acceptable to downlaod copyrighted music files that didnt purchase

Who owns the Internet? Select your answer, then click Done.

No single person or group controls the network

Can a 32-bit operating system use 8 GB of RAM? Select your answer, then click Done.

No. A 32-bit operating system can only use up to 4 GB of RAM

Click on the two examples of operating system software, then click Done.

Not windows and microsoft office so IDONT****INGKNOW

Select four tasks you can complete with an office software suite, then click Done.

You chose Create reports and presentations, chose Schedule meetings, chose Analyze sales figures, chose Write letters, and clicked the Done button.

As NSFNET traffic grew in the 1980s, the NSF brought in private companies such as IBM to upgrade existing networks and create new ______, the connections that carry most of the Internet's traffic. Select your answer, then click Done.

backbones not networks

______ your data is a countermeasure against the threat of data loss. Select your answer, then click Done.

backing up

Mobile devices are not designed to handle frequent drops or crushing weight. What is one way to protect it from cracking? Select your answer, then click Done.

buy a protective case

You can see every single page, image, and video for all the web pages you have recently retrieved by looking at the browser ______. Select your answer, then click Done.

cache

Copying large chunks of data from a web page and pasting them into your schoolwork without properly citing the source is known as ______. Select all that apply, then click Done.

cheating, plagiarism

If you have a really large file, you may want to _______ or ZIP it before attaching it to an email or saving it to your storage device. Select your answer, then click Done.

compress

Click on the computer part(s) that performs actions based on instruction from a program. Click on the correct answer, then click Done.

computer, calculators, etc

When John's computer couldn't read his new DVD drive, he realized he needed to install a(n) ______ that instructs the operating system how to recognize and use the new drive. Select your answer, then click Done.

device driver

Compared to tablet computers, ______ are lighter, more affordable, and enjoy a longer battery life. People use them mainly to read books because their screens can be read in bright, outdoor conditions. Select your answer, then click Done.

e-book readers

Another popular use of the Internet is ______, which allows messages to be sent to electronic mailboxes in an instant. Select your answer, then click Done.

email

Everything posted to social media services or anywhere else on the Internet should be considered private. Select your answer, then click Done.

false

Select the item that allows you to protect your laptop from theft. When you are finished, click Done.

lock hotspot

Sara likes to use free Wi-Fi in public places like libraries and coffee shops. Is it okay if she does her online banking in a coffee shop? Select your answer, then click Done.

no

Many laptops and tablets sold today don't include disc drives because people use a(n) ______ to store their information. Click your answer, then click Done.

online account

______ refers to the processed results that a computer sends to you. Typically, the results appear on the computer's screen or on a printed piece of paper. Enter your answer in the space provided, then click Done.

output

A browser ______ is a separate program that allows your web browser to play several types of multimedia content. Select your answer, then click Done.

plug-in (extension adds variety of useful features to the web browser) NOT window

Many activities that are unethical are also illegal. Select two technology crimes that are illegal, then click Done.

sharing copyright files

______ refers to a variety of websites and services that allow individuals to connect with each other by sharing photos, news, and thoughts on just about anything. Click your answer, then click Done.

social media

Select the malware that is designed to report activity on your computer to another party. Select your answer, then click Done.

spyware hotspot

In addition to playing video games, a gaming console can be used to ______. Select the two correct answers, then click Done.

store photos, watch movies

The ______ is a mobile device that measures 7 to 10 inches in size and is an affordable and lightweight tool for reading electronic books, performing research, watching movies and staying in touch with friends and family. Fill in the correct answer, then click Done.

tablet

When a recipient opens an infected file, a ______ will activate itself and find more files to infect, often making your operating system unuseable. Select your answer, then click Done.

virus

Web pages that are linked to each other make up a ______. Select your answer, then click Done.

website

______ is an alternative operating system that has a familiar interface, can run off a USB drive, and has many free and open source applications. Select your answer, then click Done.

Ubuntu

A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, then click Done.

Wireless adapter ? NOT wireless LAN

______ is a short-range wireless technology that allows users to make and receive calls or text without using their hands. Select your answer, then click Done.

Bluetooth

Select four questions you should ask yourself to determine whether fair use applies to your situation, then click Done.

How much of the work is being copied? How will the copy affect the market? What is the nature of the work? What is the nature of the use?

______ is a password management utility that creates and saves all of your computer passwords, making it possible for you to only remember one password that works on all your computers and mobile devices. Select your answer, then click Done.

LastPass

Select three types of video editing software that professionals use to edit and export videos for use in movies, TV and websites, then click Done.

You chose Apple Final Cut Pro, chose Adobe Premiere, chose Avid Media Composer

Chloe wants a new computer but doesn't want to buy new software. She currently uses Microsoft Office on a a PC with a 64-bit processor that runs Microsoft Windows. Select two types of computers that will meet her needs, then click Done.

You chose Windows-based laptop computer, chose Windows-based desktop computer, and clicked the Done button.

Multi-user computers allow ______ to connect to them in order to access information or software stored inside them. Choose all that apply, then click Done.

You chose convertible laptops, chose desktop computers, chose desktop computers, chose laptop computers, chose desktop computers, chose personal computers, and clicked the Done button. **all the above choices

Some of today's most sophisticated technology exists because it was developed and funded by the military. Select the four area(s) of the military where computers are used today, then click Done.

You chose research, chose controlling drones, chose defense, chose random inspections, and clicked the Done button.

Professor Smith wants to create a strong password for his bank account. Click on three strong guidelines.

You clicked the 8 characters hotspot, clicked the uppercase and lowercase hotspot, clicked the symbols and numbers hotspot, and clicked the Done button.

Select two software applications that help you prepare your income taxes, then click Done.

You clicked the Intuit TurboTax hotspot, clicked the H&R Block hotspot, and clicked the Done button.

Computers now help a wide range of office workers complete their tasks more quickly and efficiently. For example, ______ use sophisticated software to track income and expenses for the company. Select your answer, then click Done.

accountants

Which backup tool allows you to access your home or office computer's backup from a mobile device? Select your answer, then click Done.

cloud backup provider hotspot

Freight companies need ______ to manage thousands of ships, planes, trains, and trucks that move goods around the world. Select your answer, then click Done.

computers

Click on the software applications that you would use to create a database for an individual or small business. Select your answer, then click Done.

database applications hotspot **Access & Base

A company needs to buy 20 computers with large monitors and comfortable keyboards. What type of PCs should the company buy? Select your answer, then click Done.

desktop computer

Many companies make their communication more secure by using HTTPS, a protocol that ______ communication that contains financial or personal information. Select your answer, then click Done.

encrypts

Similar to the address bar of a web browser, a ______ path shows the exact location of a file. Select your answer, then click Done.

file

Like all files on a computer, the file name or web page is located within a folder or directory. Click on the folder/subfolder structure, then click Done.

folders or directories *part before the last

Sara found a book on Amazon that she wants to purchase. She is in a coffee shop but flying back home in a few hours. Which location would be the best option for making her purchase and keeping her information secure?

home

Which part of the figure represents the input phase of the Information Processing Cycle? Click on the correct answer, then click Done.

input

Click on four websites that are generally a credible source of accurate information, then click Done.

*picture*

Also known as the ______, the CPU is the main processor of a computer. Select your answer, then click Done.

microprocessor

Input can take a variety of forms such as the text you type with your ______. Click on the correct image, then click Done.

mouse

Select the file extension of a video file, then click Done.

mp4 avi mov hotspot

A ______ helps you identify and examine possible threats that may harm your computer system. Select your answer, then click Done.

risk assessment

Windows and macOS allow you to ______ a file from just about anywhere. Select your answer, then click Done.

search

A ______ includes a bundle of security utilities in one package that can protect your computer from all types of malware. Select your answer, then click Done.

security suite

Which of these computers are the largest and most powerful computers in the world? Select your answer, then click Done.

supercomputers

A virtual private network (VPN) uses a method called ___ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet.

tunneling

In 1990, the first web page was created in a language called ______ and placed on the first web server. Select your answer, then click Done.

HTML

In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States. Select your answer, then click Done.

ARPANET NOT NSFNET

Owned by Google, ______ is an open source operating system that powers smartphones and tablets from companies such as Samsung, Motorola, HTC, and Google. Select your answer, then click Done.

Android

Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done.

HTTP

Cam has an account with Bank of America. He received an email to renew his account. What should he do?

Check with the bank hotspot

The ______ and memory determine the overall speed and performance of your computer. Select your answer, then click Done.

CPU

Intel and AMD are two companies that produce ______. Select your answer, then click Done.

CPUs

The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science. Select your answer, then click Done.

CSNET

Alex wants to buy a computer that he can use for playing video games. He plans to install a better video card when he has the money. Click on the computer that Alex should buy. Select your answer, then click Done.

Desktop computer

Click on the software applications that you could use to create a budget with charts. Select your answer, then click Done.

Excel, Calc or Numbers

Nathan uses Microsoft Word on his MacBook at work. He wants to work from home on his Windows-based Dell laptop. Can he install and run a copy of the Mac-based software on his PC at home? Select your answer, then click Done.

No, Mac-based software is not compatible with the Windows operating system.

The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET? Select your answer, then click Done.

TCP/IP & IP address? (protocol)?? NOT TCP/IP & Internet service providers (ISPs) combined

When you delete a file, it's placed in the Recycle Bin or Trash. You must ______ the Recycle Bin or Trash to completely remove the file from your computer. Select your answer, then click Done.

empty

One way to help prevent ___ is to check your credit reports regularly.

identity theft

Select the file extension for an audio file, then click Done.

mp3 m4a

Malware attempts to ______. Select the four correct answers, then click Done.

take control of a computer, destroy data, harm the flow of data through a network, steal information

A large smartphone that is almost the size of a tablet is called a ______. Select your answer, then click Done.

phablet

To ease the burden of buying expensive software, many companies offer a ______ that allows users to pay a monthly fee to use the software as long as they need it. Select your answer, then click Done.

subscription model

A network server, mainframe computer, and a ______ are types of multi-user computers. Select your answer, then click Done.

supercomputer

A supercomputer is a machine that can fill a warehouse-sized room. Select your answer, then click Done.

true

Wi-Fi signals generally reach 100 to 200 feet indoors, unless the signal is blocked by walls or floors. Select your answer, then click Done.

true

Web-based documents are normally referred to as ______. Select your answer, then click Done.

web pages NOT HTTP

______ such as Tor will mask your IP address from websites in order to protect your privacy when visiting a website that does not have a privacy policy. Select your answer, then click Done.

Anonymity software

Businesses never switched to Macs because they are only manufactured by Apple and typically cost more than a ______ computer. Select your answer, then click Done.

Windows-based

Also known as the ______, the CPU is the main processor of a computer. Select your answer, then click Done.

micro

A file is copied from the hard drive (storage) to ______ when you open it. When you close a file, it's removed from ______ and saved to the hard drive. Select your answer, then click Done.

random access memory (RAM)


Related study sets

STATS Chapter 3 START ALL GRAPHS AT ZERO

View Set

PCC 2 Diabetes practice questions

View Set

Accounts receivables and liabilities

View Set

Chapter 9: Muscles and Chapter 10 Test 3 (BIO 201 SUMMER 2019), A&P Lecture Ch. 8,9,11, Mastering HW Ch 9, Mastering Chapter 10 Activities, Ch. 7 Muscles A&P

View Set