Intro to Computer Final Study Guide

Ace your homework & exams now with Quizwiz!

If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?

'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.

Which of the following top-level domains is generally used by Internet service providers?

.net

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

A.I.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Which of these is an optical medium of storage?

Blu-Ray disc

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

Which of the following types of RAM needs to be constantly recharged to retain the contents?

Dynamic Ram (DRAM)

When accessed, an e-commerce website that sells carpentry tools displays a lock icon somewhere in the window of the browser. The address bar in the Chrome browser would identify this website as "insecure."

False

In windows, you use ____ to reorder, move, and navigate between folders.

File explorer

Which of the following is a web app?

Google Docs

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps.

Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control?

He will receive text reminders to take his medications and check his insulin.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Folder names should_____

Identify the content and purpose of the folder

How does encryption work?

It scrambles the information until the key is used to unscramble it.

What are "hits" that search engines list on the first page?

Most relevant results

Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?

Processor core - some applications, especially games, have greater processor requirements

Which of the following is an example of green computing?

Purchase and use products with an ENERGY STAR label.

Which of the following is the science that combines technology and engineering?

Robotics

A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network.

Sensors

Gertie wants to buy a smartwatch by making an electronic payment. She is not willing to divulge her financial information, and her only bank account is not linked to any online payment service. Which of the following most aligns to what Gertie feels comfortable doing?

She should use a virtual account number to make the payment.

A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.

True

What is the first step to performing hardware maintenance?

Turn off the computer and remove its power source

What is the most common type of storage device for transferring files from one computer to another?

USB flash drive

Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course?

Use a learning management system (LMS) to put lectures and tests online.

Which of the following is a necessary step in maintaining computer hardware?

Using a UPS or a surge processor

____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Virtual Reality

When should a user consider restoring the operating system?

When programs or apps do not start properly

Cloud storage refers to the storage of data on ______.

a server on the internet

In a web app, where is data usually stored?

cloud storage

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

__ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work.

creative commons

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Which of the following is NOT a factor search engines consider when ranking search results?

design quality of the webpage

A Trojan is a malicious program that uses a computer network to replicate.

false

A joystick is a pen-type input device used to draw and tap icons.

false

An e-commerce website offers fewer models, colors, and sizes than a physical store.

false

If you want to become a digital citizen, you only have to buy a piece of technology.

false

Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations.

false

To prevent a laptop from being stolen, you can use a surge protector.

false

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

false

You can avoid electronic waste by replacing devices every time a new version comes out.

false

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.

intellectual property rights

Where on a computer is the operating system generally stored?

internal hard drive

What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?

plotter

Which of these is not an input device?

printer

Which of the following technologies assists users that have a visual disability?

screen readers

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

speech recognition software

Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?

spiders

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?

tablet

___ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

the digital divide

Why do companies use online collaborative productivity software?

to allow employees to share, edit, and comment on documents

A CPU converts the data entered through the keyboard into output displayed on the monitor.

true

A device driver is a program that controls a device attached to the computer.

true

A specialty search engine lets you search online information sources that general search engines do not always access.

true

An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from home.

true

An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing.

true

E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.

true

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.

true

Information literacy means you can evaluate whether online information is misleading, biased, or out of date.

true

It is advised to fully charge the battery of a laptop before using it for the first time.

true

New cars use embedded computers to make driving safer.

true

Online classified ads are an example of C2C e-commerce.

true

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.

true

Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.

true

Which of the following is assigned to each webpage to identify its location on the Internet?

uniform resource locator (URL)

What should you do if a headset plugged into your computer is not working properly?

update device driver

How would you describe an intelligent workplace?

uses technology to connect and communicate

Which option lists the computer components in order from oldest to newest?

vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem?

video card

A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.

webpage

Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?

yes


Related study sets

Chapter 16: Labor and Delivery: PREPU

View Set

chem final (palazzo) chapters 6-9

View Set

Chapter 59 PrepU: Assessment and Management of Patients with Male Reproductive Orders

View Set

ISTC 1005-01 PowerPoint Study Guide

View Set

13 - Project Stakeholder Management

View Set

{ACCT 101} Chapter 8: Current Liabilities Exam-3

View Set