Final Exam Computer Concepts
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?
Adjust the settings for the mouse through the Settings dialog box.
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
Adobe Premiere Clip
How do you know if a device is an input device or an output device?
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Which of the following is the strongest password?
H@veAGr3atDaY!
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
What does the operating system do if you try to save a file with the same name into the same folder?
It overwrites the original file unless you add a number, date, or initials to differentiate the files.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
JPEG
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
Spreadsheet
What is a digital certificate?
Technology used to verify a user's identity
Which of the following is a step in the boot process?
The operating system files are loaded into RAM
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
Use animations
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Which of the following is an advantage to saving a file to a flash drive?
You can take it with you and then work on it on another computer.
Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work?
Zoho writer
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
Which of the following helps you more easily locate the files and folders you need?
grouping similar subfolders together in a folder
Which of the following is not an input device?
headphone
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
Folder names should _____.
identify the content and purpose of the folder
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Digital information processed into a useful form is called _____.
output
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
An operating system is also called a(n) _____.
platform
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
program window
What is the most common type of volatile memory?
random access memory (RAM)
The bootstrap program executes which of the following?
tests that check components such as RAM and storage
A file manager is used for all of the following except ____.
to change the contents of files
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
Make the program available as a web app.
What concerns are there about open source programs?
Programmers will add malicious code to damage a user's system
If several programs or apps are running simultaneously, your computer or device might use up its available _____.
RAM
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?
Show her how to use File Manager.
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
Slide master
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?
Use the search tool to locate the file by file name, content, or date.
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
Use vector images because they retain their clarity even when enlarged or shrunk.
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
Web apps
Which of the following is not an advantage of saving documents in the cloud?
You can access the documents when you are not connected to the Internet.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser.
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
active window
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
A(n) _____ protects your device against unauthorized access.
user account
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers and vendors.
What type of security requires something you know and something you have that no one else has?
two factor authentication
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices.
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
How can you display the main folders on a Windows computer?
Open File Manager.
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
How can you protect personal information gathered by legitimate organizations?
Create a separate email account for receiving information from websites.
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?
Because he is using the same name, each time he saves he is overwriting his previous work.
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
Conditional formatting
What would a password manager allow you to do?
Create and store multiple strong passwords.
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
Drawing app
_____ is data and instructions entered into the memory of a device.
Input
Which of the following is not a step an operating system performs when printing a document?
It creates the document to be printed.
What happens when you delete a folder?
It goes the Recycle Bin or Trash folder.
Why is the date a file was modified useful?
It identifies the most recent version.
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
Linux
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
What should you do the first time you save a file?
Name the File
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
Native app
If you delete a shortcut from your desktop, have you also deleted the original file?
No, because a shortcut does not place the actual file, folder, or app on the desktop.
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
They had to unzip or extract it.
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How can you check data on devices connected through an IoT network?
Use a tablet
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
Visual Basic
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?
What-if analysis
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
What does an operating system provide so you can interact with a device?
graphical user interface
Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover?
graphics app
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
When you save a Microsoft Office file to OneDrive, where are you saving it?
in a storage area located on a server
Which of the following features is a way to make a computer do what you want it to do?
menu
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Which of the following types of websites typically provides the least security?
social media sites
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?
sparklines
A _____ is a named collection of formats you apply to text in a word processing document.
style
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
Where can you pin frequently used apps for easy access?
to the taskbar
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware.
What would you need to install if you have an app that is incompatible with your current operating system?
A virtual machine
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
Be cautious about what information she posts.
Which of the following statements is true about the Clipboard?
Because he is using the same name, each time he saves he is overwriting his previous work.
In Windows, you use _____ to reorder, move, and navigate between folders.
Fille Explorer
Which of the following is not a hardware device that controls the movement of the pointer on a computer screen?
Keyboard
Which of the following operating systems includes a virtual assistant?
macOS
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
Which of the following terms refers to the area of the hard drive used for virtual memory?
swap file
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps.
Swapping items between memory and storage is called _____.
paging
Which property is assigned to a file by the operating system
Artist's Name
In which of the following situations is a digital certificate useful?
You are signing a rental lease.
When does the boot process start?
when you turn on your computer
Compressing a file is also called _____ the file.
zipping
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?
Apache OpenOffice
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
Change font size, style, and color of the keywords.
Dharma opens one window, does a little work, closes the window, and then opens a new one. Instead of opening and closing windows, what can Dharma do to work more efficiently?
Click the Minimize button to reduce the window to an icon on the taskbar, and then click the taskbar icon to redisplay the window.
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?
Date Modified
_____ are standard settings that control how the screen is set up and how a document looks when you first start typing.
Default settings
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
Drop box
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?
Enable sticky keys.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
Header and Footer
During the boot process, what does the processor do after the computer circuits receive power?
It begins to run the bootstrap program.