NAME

Question Types


Start With


Question Limit

of 225 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. Trojan horse
  2. zipper
  3. Spam
  4. Flash memory cards
  5. RAM
  1. a _____ are the most common type of storage media for digital cameras and mobile phones.
    Select one:
    a. Mini-CDs
    b. Optical discs
    c. Cache packets
    d. Flash memory cards
  2. b ____ refers to unsolicited email sent to a large group of individuals at one time.
    Select one:
    a. Spam
    b. Phish
    c. Salami
    d. Profiling
  3. c Case-Based Critical Thinking Questions

    Case 6-1
    You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing.

    You have found an interesting calendar program at a Web site and downloaded it to help you stay organized. However, within a couple days of installing the program, your computer starts behaving oddly. Strange popups appear, the home page of your Internet browser has been switched, and the system is running sluggishly. You likely have installed a ____.
    Select one:
    a. virus
    b. worm
    c. Trojan horse
    d. botnet
  4. d The term memory when referring to computers usually means _____.
    Select one:
    a. ROM
    b. BIOS
    c. RAM
    d. RAID
  5. e In a File Explorer window, you can tell that a folder is compressed by the _____ icon displayed.
    Select one:
    a. exclamation point
    b. open folder
    c. zipper
    d. empty folder

5 Multiple Choice Questions

  1. The means by which you interact with any program on a computer is called the user ____.
    Select one:
    a. interface
    b. shunt
    c. plug-in
    d. GIU
  2. Case-Based Critical Thinking Questions

    Case 1-3
    Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding.

    In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____.
    Select one:
    a. plagiarism
    b. not plagiarism
    c. too little information to say
    d. both illegal and unethical
  3. A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network.
    Select one:
    a. LAN
    b. intranet
    c. VPN
    d. Internet P2P network
  4. SMS can transmit up to ____ characters in one message.
    Select one:
    a. 160
    b. 64
    c. 1,024
    d. 256
  5. To change which area of the workspace is visible in the program window, you can use the _______.
    Select one:
    a. zoom bars
    b. scroll bars
    c. resolution setting
    d. ScreenFilter

5 True/False Questions

  1. "Reply" to Travis_____ are very small pieces of semiconducting material that contain integrated circuits.
    Select one:
    a. Motherboards
    b. Computer chips
    c. Optical drives
    d. Expansion slots

          

  2. spoofed____ browsing allows you to open multiple Web pages at one time.
    Select one:
    a. Webbed
    b. Threaded
    c. Tabbed
    d. Reticulated

          

  3. Bluetooth____ is a wireless standard in the 2.4 GHz frequency band that is designed for very short-range connections, to replace cables between devices.
    Select one:
    a. MIFI
    b. WiMAX
    c. Bluetooth
    d. Red Hat

          

  4. biometricThe operating system is loaded into memory during the ____ process.
    Select one:
    a. kernel
    b. boot
    c. SOLE
    d. lacing

          

  5. database softwareCase-Based Critical Thinking Questions

    Case 3-2
    You are in the market for various kinds of application software.

    Your business has a growing client base as well as a growing inventory. You need to keep track of a good deal of information and be able to search for information quickly, so you decide to invest in ____.
    Select one:
    a. database software
    b. mastersheet software
    c. presentation software
    d. note taking software

          

Create Set