intro to computer apps for buiz {{EXAM 1}}

Ace your homework & exams now with Quizwiz!

Defragmenting and optimizing your hard drive will help it run more efficiently. --True --False

--True

Task View allows you to see thumbnail images of all windows and apps you currently have open. --True --False

--True

Windows Defender Firewall helps to block malware from infecting your computer. --True --False

--True

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? a. A spreadsheet app to keep a record of her expenses, sort data, and make calculations b. A word processor app to keep a record of her expenses and make calculations c. A personal interest app to keep a track of all the expenses based on her personal interests d. A device management app to track all the expenses she makes using her credit and debit cards

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

How do you know if a device is an input devict, or an output device?

An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.

What technology can collect information to make decisions, reach conclusions and combine information in new ways?

Artificial intelligence (AI)

A shortcut icon is the actual document or app. --True --False

False

All cloud technologies must be accessed over the Internet. --True --False

False

[email protected] is an appropriate email address to use for communicating with potential employers. ==True ==False

False

Copying and moving files are the same thing. --True --False

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. --True -- False

False

Netiquette only applies to social media and social networking, not emails and irant messaging. --True --False

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. --True --False

False

To prevent a laptop from being stolen, you can use a surge protector. --True --False

False

You can avoid electronic waste by replacing devices every time a new version comes out. True False

False

what is the strongest password?

H@veAGr3atDaY!

A CPU converts the data entered through the keyboard into output displayed on the monitor. --True --False

True

If a device on your computer is not working, you can open Device Manager to see if the device shows up or has any problems. --True --False

True

If you forget to save a document after you have edited it, when you attempt to close it, a dialog box will be displayed asking if you want to save your changes. --True --False

True

If you have information literacy, you can select the right tool to find the information you need. --True --False

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. --True --False

True

New cars use embedded computers to make driving safer. --True --False

True

Some apps are free, allowing you to download them without making a payment. --True --False

True

When a task requires administrator access, you might be prompted to authorize the task. --True --False

True

Wikipedia is a colaborative website where a team of people can polish or modify content on a webpage --True --False

True

Windows 10 is the newest version of Microsoft Windows, which is a popular and widely used operating system. --True --False

True

if a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. --True --False

True

In a web app, where is data usually stored? a.Cloud storage b.Local computer c.Application storage d.Mobile network

a -- cloud storage

What is the binary system?

a number system with two digits, 0 and 1

Emma needs to purchase a note-taking app for her iPhone. Which of the following source is typically safe for purchasing the app? a. App Store for iOS b. Email message containing download link c. Website called FreeAppleApps d. Flash drive containing apps her friend copied

a. App Store for iOS

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world? a. Captioning software can be used to transcribe what is being said. b. Voice output software can be used to translate what she is saying to text. c. Screen reader software can be used to read what is on the screen. d. A braille printer can be used to print documents.

a. Captioning software can be used to transcribe what is being said.

When Florence joins her father's construction business. she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? a. Create a database of company projects, customers and vendors. b. Continue with the old system. c. Transfer all financial record to spreadsheet. d. Convert all paper files to word documents

a. Create a database of company projects, customers and vendors.

Brendon wants to volunteer at the Red Cross, a nonprofit agency. He enters redcross.com in his browser, but cannot find the right website. What mistake is he making? a.He should enter redcross.org because Red Cross is a nonprofit organization. b.He should enter redcross.edu because Red Cross is an educational organization. c.He should enter redcross.net because Red Cross is a network provider. d.He should enter Red-Cross.com because that is the name of the commercial company.

a. He should enter redcross.org because Red Cross is a nonprofit organization.

_____ is data and instructions entered into the memory of a device. a.Input b.Booting c.Cache d.Output

a. Input

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? a. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. b. A hacker is trying to put a Trojan on her computer. c. A worm has infected her computer and she needs to unplug her device. d. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

a. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. a. The HTML coding b. The GPS location coordinates c. The file size d. The date a photo was taken

a. The HTML coding

To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step? a.Transfer contents to an external storage device. b.Disconnect all output devices. c.Disconnect the UPS. d.Remove the internal hard drive on which the operating system is stored.

a. Transfer contents to an external storage device.

in his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? a. Voice over Internet Protocol (VoIP) b. Voice-to-Text (VTT) c. Audio Internet service provider (AISP) d. Voice and video service (VVS)

a. Voice over Internet Protocol (VoIP)

__________ is a popular word processing program available with Windows. a. WordPad b. Writer c. Microsoft Word d. Docs

a. WordPad

how would you describe the social networking site YouTube? a. YouTube is a media-sharing network. b. YouTube is a social curation site. c. YouTube is a microblog. d. YouTube is a discussion forum

a. YouTube is a media-sharing network.

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows. a.active window b.program window c.restored window d.minimized window

a. active window

A(n) ____ is a unique combination of letters or numbers that identifies a specific user to Windows. a. user name b. administrative code c. password d. PIN

a. user name

Jodi is travelling to San Francisco for a conference. She has stored her PowerPoint slide on Microsoft's web app. What could be of concern to her while presenting her slides? a. Access to the latest version of the web app b. A poor internet connection c. Storage space on her external hard drive d. Storage space on her laptop

b. A poor internet connection

What is a MAC address? a. The connection needed to access to a cellular network b. A unique hardware address for your device c. An IP address unique to Apple's MAC computers d. An alternate name Internet Protocol version 6

b. A unique hardware address for your device

If you want to move a file, you first use the ____ button on the ribbon to move the file to a temporary storage location. a. Place b. Cut c. Restore d. Move

b. Cut

Which of the following is an authentication method to keep your data safe? a. Encryption b. Fingerprint scanner c. Body area network d. Software firewall

b. Fingerprint scanner

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? a.Heading style b.Header and Footer c.Page margin d.References

b. Header and Footer

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? a. Page margin b. Header and Footer c. References d. Heading style

b. Header and Footer

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? a.License agreement b.Piracy c.Access control d.Digital rights management

b. Piracy

Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space? a. Save two copies of the file in OneDrive. b. Save a copy of the file on her local hard drive. c. Share the OneDrive folder with a friend. d. Encrypt the file before saving it to OneDrive.

b. Save a copy of the file on her local hard drive.

Cathy wants to buy a new watch online, but is concerned about security when making the purchase. Which of the following increases the chance that her payment is NOT secure? a.Shopping using an e-wallet b.Shopping on a website that uses the HTTP protocol c.Shopping on a website that uses 3D Secure protocol d.Shopping on a website that uses Transport Layer Security

b. Shopping on a website that uses the HTTP protocol

Which of the following is classified as input device? a.Speakers b.Webcam c.Flash drive d.Earbuds

b. Webcam

Is it advisable to enable automatic updates on security software? a. No; automatic updates can cause create problems in security software. b. Yes; this helps to catch and quarantine new malware before it harms the computer. c. No; automatic updates require excessive storage space and slow the computer. d. Yes, though you must pay an additional fee for automatic updates.

b. Yes; this helps to catch and quarantine new malware before it harms the computer.

What is it called when an attacker convinces vou to enter personal information at an imposter website arter receiving an emall rom a person masquerading as an employee from your bank"? a. identity theft b. phishing c. dumpster diving d. encryption

b. phishing

With more and more people using technology, what physical health diagnosis is on the rise? a.cyberbullying b.repetitive strain injury c.technology addiction d.cyberstalking

b. repetitive strain injury

The mouse operation of ___________- _____________ displays a shortcut menu a. double-clicking b. right-clicking c. right-dragging d. triple-clicking

b. right-clicking

Why would you want to connect your computer to a network? a. for added security b. to access shared resources c. to use the network's operating system d. to keep up with computing trends

b. to access shared resources

Compressing a file is also called _____ the file. a.byting b.zipping c.passing d.extracting

b. zipping

What is a Jump List? a. A list of similar files or apps b. A list of new files or apps c. A list of recently viewed files or apps d. A list of other files or apps vou might like to view

c. A list of recently viewed files or apps

A modem can also function as what other piece of hardware? a. A network interface card b. A hub c. A router d. A switch

c. A router

_________ are standard settings that control how the screen is set up and how a document looks when you first start typing a. Productivity settings b. Startup settings c. Default settings d. Customized settings

c. Default settings

CASE: You have purchased a brand-new Windows 10 computer for the new semester of your coursework, and you decide to spend some time learning about all of the properties of the computer's hard drive in order to make sure that you are using the computer to its fullest potential. One of the earliest lessons you learned as a computer user is the importance of backing up your work. Which of the following storage devices could you use? a. Tools tab b. This PC c. External hard drive d. Backup tab

c. External hard drive

Where on a computer is the operating system generally stored? a.Virtual memory b.RAM c.Internal hard drive d.Flash drive

c. Internal hard drive

Which Windows 10 version is simplified and designed primarily for home and small office users? a. Windows 10 Pro b. Windows 10 Education c. Windows 10 Home d. Windows 10 Enterprise

c. Windows 10 Home

Posting hostile or insulting comments in response to someone else's blog post is called a. cyberstalking b. doxxing c. flaming d.hashing

c. flaming

Which of the following does a secure website use to safeguard transmitted information? a.A lock icon b.The http protocol c.Digital certificate d.Encryption

d. Encryption

Which of the following statements is NOT true about a local firewall? a.It is a physical device that acts as a protective barrier. b.It inspects data being transmitted to or from a network. c.It is often built into a company's operating system. d.It is also called software firewall.

d. It is also called software firewall.

How does encryption work?

d. It scrambles the information until the kev is used to unscramble it.

Which of the following is NOT an image format to store photos? a.JPEG b.TIFF c.JPG d.MP3

d. MP3

Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However he wants the radio limes so it appears that someone 1s interacting with it. What loT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling? a. smart security system b. Smart bulb c. Smart lock d. Smart plug

d. Smart plug

What performance specification does 2 GHz refer to? a. Time taken to store the instructions on RAM b. lime taken to fetch and decode instructions c. Speed at which data travels d. Speed at which the processor executes Instructions

d. Speed at which the processor executes Instructions

Which of the following touch screen gestures is used to zoom in? a. Swipe b. Pinch c. Press and hold d. Stretch

d. Stretch

How do delivery companies track packages? a.They use robotic arms to load packages. b.They use GPS. c.They use a learning management system. d.They use code-scanning technology.

d. They use code-scanning technology.

Found in all folder windows, the _______ lets you know which folder you are viewing. a. navigation bar b. status bar c. menu bar d. address bar

d. address bar

A(n) _____ contains the instructions your computer or device needs to run programs and apps. a.data file b.file extension c.spreadsheet d.executable file

d. executable file

To access the Internet, a router must be connected to a _____ a. switch b. network c. hub d. modem

d. modem

What do you call the rules each programming language has for writing instructions? a. grammar b. source code c. interpreter d. syntax

d. syntax

A video that is shared millions of times over social media in a short period of time is termed to be ____________ . a.concurrent b.fake c.original d.viral

d. viral

A desktop background does not allow use of your own pictures. --True --False

false

Secure passwords have......

more than eight characters, both uppercase and lowercase letters, special characters, and numbers.

Digital information processed into a useful form is called

output

Which type of memory is permanently Installed on your computer and attached to the motherboard?

read-only memory (ROM)

________ is a computer that controls access to the hardware and software on a network.

server

Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?

use his webcam and speakers so that he and his mother can both see and hear each other.


Related study sets

EXCEL Chapter 7, Excel Chapter 7

View Set

Chapter 16: During Labor and Birth

View Set

Sustainability Midterm, Business and Sustainability Midterm

View Set