Info 160

Ace your homework & exams now with Quizwiz!

You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? -*Civil War -Captain America Civil War -"Captain America: Civil War" -Captain America *

"Captain America: Civil War"

In the URL https://www.whitehouse.gov/blog, which part is considered the top-level domain name? -http -www.whitehouse.gov -/blog -.gove

.gov

A(n) _____ is a laptop computer that can convert into a tablet-like device -2-in-1 PC -Chromebook -all-in-one PC -ultrabook

2-in-1 PC

Which of the Following is not an internet protocol? -FTP -HTTP -BitTorrent -ARPANET

ARPANET

Which of the following is considered a benefit of using simulation programs? -all of the above -they allow users to experience or control the software as if it were an actual event -they help to prevent costly errors -they allow users to experience potentially dangerous situations without risk

All of the above

Which is NOT an event associated with the beginning of the internet? -Vinton Cerf helped to develop the Internet communications protocol -Amazon.com was one of the first websites on the Internet -"Login" was intended to be the first network transmission -The U.S. Department of Defense creates ARPANET

Amazon.com was one of the first websites on the internet

Which of the following software packages would not be used to create mobile applications? -Thunkable -App Engine -Scratch -App inventor

App Engine

______ involve using a physical attribute such as a fingerprint for authentication -biometrics -backdoors -trojan horses -rootkits

Biometrics

Which of these is considered the "brains" of the computer? -RAM -ROM -CPU -USB

CPU

Choosing which features of software you want to install is what kind of installation? -Full installation -Restore installation -Single installation -Custom installation

Custom installation

Which view in File Explorer can you use to sort files by column heading? -Small icons -Details -Large icons -Tiles

Details

A 32-character password is an example of using biometrics -True -False

False

A macro is a program released early to the public for testing and evaluation -True -False

False

A touch pad is a pointing device usually found in tablets -True -False

False

App creation software includes tools like Adobe Photoshop -True -False

False

Catfishing is posting inflammatory remarks online to generate negative responses -True -False

False

Data and information are interchangeable terms -True -False

False

Encrypting data is not an appropriate measure for mobile devices such as smartphones -True -False

False

Modern desktop operating systems are considered single-user multitasking operating systems -True -False

False

Once files are placed in the Recycle Bin they cannot be recovered -True -False

False

Podcasts can only be created by professional organization -True -False

False

RAM is non-volatile storage -True -False

False

System restore points can only be created by Windows automatically on a regular schedule -True -False

False

When you subscribe to software, no license is necessary -True -False

False

A backup of all the data files on your computer can be managed easily using Windows 10 _______ utility. -File History -Windows Update -Recovery -Windows Defender

File History

The Windows app used for locating files and folders is -disk manager -library explorer -file explorer -finder

File explorer

Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under? -No license is necessary -GNU General Public License -Copyleft -Open Source License

GNU General Public License

Which of the following is a port? -ROM -HDMI -RAM -CPU

HDMI

Which of the following best describes the transmission lines with the fastest speed? -Main backbone -Primary backbone -Main internet -Internet backbone

Internet backbone

An example of an open source OS is -Linux -Windows -DOS -macOS

Linux

Which is NOT an example of a mobile operating system? -Windows 10 -MacOS -IOS -Android

MacOS

Which of the following would be an example of B2B business? -Google -Target -BestBuy -Omaha Paper

Omaha paper

Calendars, tasks, and e-mail can be found in which application? -OneNote -Outlook -Access -Excel

Outlook

Microsoft Office is an example of which type of software? -Proprietary application software -Open source system software -Open source application software -Proprietary system software

Proprietary application software

Which of the following is an example of financial management software? -Quicken -AudioAcrobat -Lumosity -Photos

Quicken

Which of the following devices would use a real-time operating system? -iPhone -Roomba Vacuum -Microsoft Surface tablet -all of the above

Roomba Vacuum

Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights? -Favorates -Search tools -History -Custom search

Search Tools

Which of the following statements is FALSE? -Smartphones generally have less computing power than desktop computers -Smartphones are considered a type of computer -Not all cell phones are smartphones -Smartphones do not contain a CPU

Smartphones do not contain a CPU

Software that is hosted by the vendor and accessed online is called -productivity software -application software -Software as a Service (SaaS) -open source software

Software as a Service (SaaS)

Which fo the following is not considered an accessibility utility? -System Restore -Narrator -Magnifier -Speech Recognition

System Restore

Which utility is used to exit from a non responsive program? -Disk cleanup -file explorer -task manager -system refresh

Task manager

Which of the following would you NOT see on a Windows 10 Start menu? -apps list -Task View -tiles -Power

Task view

Which statement is not true about the web? -The web was based on a protocol developed by Tim Berners-Lee -Special links are used to navigate from page to page on the web -The web is a subset of the internet -The web is based on the WWW protocol

The web is based on the WWW protocol

Course management software creates a virtual learning experience for students and houses course materials, tests, and discussion board -True -False

True

Different versions of Linux are known as distros -True -False

True

Google Docs is an example of Software as a Service -True -Fals

True

Google Docs is an example of a wiki -True -False

True

SSD drives are superior to conventional disk drives because they have no moving parts -True -False

True

Sending emails to lure people into revealing personal information is a technique known as phishing -True -False

True

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website -True -False

True

The "brain" of the computer is the CPU -True -False

True

The power-on self-test ensures all peripheral devices are attached and operational -True -False

True

Virtual private networks make is just as secure to send information across a public network as it is on a secure private network -True -False

True

Your location can be captured from your mobile device even if app location tracking is turned off -True -False

True

Your social security number should never be shared on a website, in an email, or through messaging -True -False

True

The most common computer port is the _____ port -thunderbolt -expansion -WIFI -USB

USB

Which search strategy should you use to search for a specific phrase? -use quotation marks around the phrase -use a wild card around the phrase -include Boolean operators in the phrase -use asterisks around the phrase

Use quotation marks around the phrase

A feature in Windows 10 that is used to organize open windows into task-specific groups is called -Program Manager -Virtual View -Snap Assist -Virtual Desktops

Virtual Desktops

Which of the following is an uncompressed audio file format? -AAC -MP3 -WMA -WAV

WAV

Beta Software is made available because -wireless networking must be added -new programmers have been hired -a company is making an early release to test bugs -the company needs more profits

a company is making an early release to test bugs

Some spyware catches your private information by using -a spam filter -a keystroke logger -a data breach -botnets

a keystroke logger

Which best describes copyleft? -A single license covering a single user on a single device -A license that grants users the right to modify and redistribute the software -a license covering one user with multiple installations -a family pack license

a license that grants users the right to modify and redistribute the software

Which of the following is a sensor found in certain smartphones? -HDMI -hygrometer -RAM -accelerometer

accelerometer

Computer viruses can be spread by -sharing flash drives -downloading and running a file attached to an email -downloading a song from a peer-to-peer sharing site -all of the above

all of the above

When you are surfing the web anonymously, -the sites you visit are not stored in the browser history -temporary files created are immediately deleted you are using a browser that has privacy tools -all of the above

all of the above

Which of the following describes an IP address? -It is referred to as a dotted quad -It identifies any computer connecting to the Internet -It identifies a website -All of the above

all of the above

The width-to-height proportion of a monitor is known as what? -viewing density -aspect ratio -screen resolution -viewing plane

aspect ratio

BIOS stands for -bundled input output software -basic in order services -billable input output services -basic input output system

basic input output system

Ensuring that website content is not slanted in its point of view is checking for: -relevance -audience -bias -authority

bias

Authentication techniques that rely on personal biological traits are called -trojan horses -scanners -biometrics -botnets

biometrics

In a computer, _____ can represent either a 0 or a 1. -byte -integrated circuit -megabyte -bit

bit

Viruses that load from USB drives left connected to computers when computers are turned on are known as -encryption viruses -polymorphic viruses -script viruses -boot-sector viruses

boot-sector viruses

What is the navigation aid that shows users the path they have taken to get to a web page located within a website? -Bookmarks -Favorites -Breadcrumb trail -social bookmarks

breadcrumb trail

Which of the following does not describe a desktop e-mail client? -sending e-mails is not dependent on an internet connection -the e-mail program is installed on your computer -can access e-mail from any internet-connected device -e-mail is downloaded when the program is opened

can access e-mail from any internet-connected device

Once you encrypt your SD card, those files -are illegal -are backed up -are compressed and can be stored in less space -cannot be read if the SD card is put in another phone

cannot be read if the SD card is put in another phone

Digital audio software can be used to -create drafting blueprints -compute complex formulas -perform mathematical simulations -compose songs or soundtracks with virtual instruments

compose songs or soundtracks with virtual instruments

Which of the following is used to reduce the file size of a file or folder? -extraction -compression -defragmenter -shrinker

compression

Which of these has moving parts which makes them more prone to malfunction? -SSD -conventional hard disk drive -a flash memory card -thumb drive

conventional hard disk drive

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a _______ attack -backdoor -denial-of-service -scareware -stealth

denial-of-service

Which component of a computing device drains the battery the fastest? -display screen -Bluetooth adapter -hard drive -WIFI adapter

display screen

Which of the following can be both an input device and an output device -mouse -display screen -keyboard -laser printer

display screen

Ergonomics is an important consideration -only for laptop computers -for all computing devices -only for laptop and desktop computers, but never for mobile devices -only for desktop computers

for all computing devices

When you install all the most commonly used files and programs to your computer's hard drive, you have completed which kind of software installation? -complete -common -custom -full

full

Operating systems that have windows and icons have which type of user interface? -magnetic tape-based -command-driven -menu-driven -graphical user

graphical user

Which of the following is NOT found on a motherboard? -CPU -hard drive -RAM -ROM

hard drive

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as -malware theft -scareware theft -impersonation theft -identity theft

identity theft

When someone uses your personal information to pose as you, this is -cybersecurity -identity theft -white-hat hacking -a backdoor rootkit

identity theft

You're most likely to find an RTOS -on an iPad -on a mainframe -in a robotic camera -on a supercomputer

in a robotic camera

Which of the following is not one of the four major functions of a computer? -storage -processing -indexing -output

indexing

What type of printer works by spraying ink onto the paper? -3D -inkjet -laser -resolution

inkjet

______ printers work by spraying tiny drops of ink onto paper -Cloud-ready -Laser -Inkjet -Large format

inkjet

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called -signature -quarantine -updating -inoculation

inoculation

When a printer receives a command, it generates a unique signal to the OS which is called a(n) -interrupt -event -slice -none of the above

interrupt

A packet analyzer is called a sniffer because -it filters out spam -it starts a denial-of-service attack -it captures and reads data inside each packet -it detects high-speed transmissions

it captures and reads data inside each packet

Which type of software is not upgraded automatically? -Software as a Service -Mobile Apps -Subscription based -Locally installed

locally installed

Firewalls work by closing _____ in your computer -logical ports -logical doors -backdoors -software gaps

logical ports

Which category of social networking do Instagram and Youtube fit into? -Business collaboration -information sharing -Media sharing -Social commerce

media sharing

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? -C2C -mobile commerce -B2B -Social commerce

mobile commerce

The software that allows you to edit Digital images, videos, as well as digital audio is called -multimedia software -distributed software -productivity software -encryption algorithms

multimedia software

Firewalls use a process of ______ to assign IP addresses to the devices internal to the network so hackers will not know what they are. -port blocking -VPN -network address translation (NAT) -packet filtering

network address translation (NAT)

Device drivers are -mapping programs to generate driving instructions -no longer used because of Plug and Play -always installed from a CD -often bundled with the operating system

often bundled with the operating system

LibreOffice is an example of which type of software? -open source software -beta software -freeware -Software as a Service (SaaS)

open source software

The process of adding a Windows 10 app to the Start menu is known as -visualizing -pinning -clipping -screening

pinning

When an OS processes tasks in a priority order, it is known as -preemptive interrupting -interruptive multitasking -preemptive multitasking -multitasking handling

preemptive multitasking

The most common output device for hard output is a -scanner -display screen -printer -speaker

printer

What web browser feature would be particularly useful when using public computers? -pinned tabs -privacy browsing -session restore -all of the above

privacy browsing

Which of the following functions of a computer is mostly responsible for turning data into information? -output -processing -storage -input

processing

Image-editing software allows you to -remove red eye -conduct product simulations -create drafting blueprints -compute complex formulas

remove red eye

The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the -root directory -main path -main directory -library directory

root directory

A _____ is a program that takes complete control of your computer without your knowledge. -rootkit -VPN -sniffer -botnet

rootkit

A surge protector may look like just another power strip but it also can -save your device if a voltage spike is sent through the electrical system -detect viruses -help manage heat -prevent theft

save your device if a voltage is sent through the electrical system

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as -scareware -adware -trackingware -spyware

scareware

A series of commands that are executed without your knowledge is a typical attribute of a(n) ________ virus -script -time bomb -encryption -boot-sector

script

Which of the following is not a component of a search engine? -spider -search assistant -indexer program -search engine software

search assistant

Which power control option leads to a cold boot? -Restart -Shut down -Sleep -Log off

shut down

Which type of productivity software would you most likely use to do calculations and what-if analyses? -Financial planning -spreadsheet -tax preparation -database

spreadsheet

The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software is called -system requirements -redistributing standards -hardware -minimum standards

system requirements

Which feature of a browser enables you to separate a browser tab into its own window? -pinned tabs -tear-off tabs -tabbed browsing -tab isolation

tear-off tabs

Beta software is never -system software -the final finished version of the software -open source software -application software

the final finished version of the software

A GUI user interface is special because -the menus are organized well -it uses a very small set of commands -it uses voice commands to run tasks -there is a set of icons that represent the OS tasks

there is a set of icons that represent the OS tasks

Which of the following is a good precaution to take when making online purchases? -make sure http: and an open padlock displays in the address bar -pay by debit card -use a private browser when purchasing items from a public computer -use the same strong password for all online accounts

use a private browser when purchasing items from a public computer

Touch-screen devices usually feature _____ keyboards -optical -physical -laser-projection -virtual

virtual

The OS can optimize RAM storage by using -virtual memory -an interrupt handler -a spooler -thrashing

virtual memory

Antivirus software looks for _____ to detect viruses in files -virus signatures -virus VPNs -virus artifacts -virus bots

virus signatures

Which of the following is not true when evaluating web articles for research? -You should check any links in a web article to see if they are timely and relevant -you can assume everything with an author listed is accurate and appropriate -you should evaluate web articles for bias and relevance -You should not use an article if there is not an author listed

you can assume everything with an author listed is accurate and appropriate


Related study sets

Life, Health and Accident Questions for PSI Exams

View Set

Social and Personality Development Final Exam

View Set

Lecture 12: Prioritization and Delegation

View Set