Computer Literacy (part 3)

STUDY
PLAY
Which statement is true about laptops and desktop computers?
B
.
If the power goes out, a laptop's battery serves as a backup power source.
What does antivirus software do?
E
.
It scans your computer to remove any viruses it finds.
Which of the following is an option antivirus software typically lets you customize?
E
.
Setting a schedule for a virus scan.
Unlike viruses, which require the spreading of a host file, __________ are standalone software and do not need help to spread
E
.
worms
Why might you want to set up a personal hotspot?
D
.
Security—a personal hotspot is more secure than a public network.
A(n) _________ is a tool hackers use to record your keystrokes.
E
.
keylogger
What happens if you visit an unsecured website during a man-in-the-middle attack?
C
.
Information about your visit appears on the hacker's computer.
What type of cookie retains information about your visit only until you close your browser?
D
.
session cookie
Which of the following is not a recommendation for protecting your identity?
E
.
Wait for businesses to contact you when their bills are late.
Which of the following is not a reason botmasters use botnets?
D
.
to access the Internet more quickly
Besides securing access to your Wi-Fi network, you should ____________.
C
.
secure access to your wireless router
When you use cloud computing, what do you need to access your files and applications?
E
.
a web browser and an Internet connection
What is the name for a device infected with malware that an attacker uses to control the device remotely?
C
.
zombie
Which of the following is an example of social engineering?
...
Attackers consider __________ relatively easy to access without authorization.
c home wifi or b
Which of the following is not an advantage of all-in-one computers?
c or d $
Which of the following is not an advantage tablets have compared to laptops?
E
.
Their higher screen resolution makes them more suitable for watching movies.
Which of the following options has the highest level of protection?
D
.
Encrypt with Password
________ apps are defined as those you download and run directly on the mobile device.
E
.
Native
Digital certificates use a standard format called ____________.
E
.
X.509
Why did the traditional method of performing banking transactions have to change?
E
.
User behavior changed; people now use mobile devices for banking.
How can you verify an email message contains a legitimate concern from a company instead of a phishing scam?
D
.
Enter the company's web address in a browser to visit their website, and then sign in.
When attackers use third-party ads to infect your computer with malware, it is called _________.
D
.
malvertising
A(n) _________ resolves top-level domains such as .com, .org, and .edu.
D
.
root DNS
How can you extract all the files in the Assignments compressed folder to the Documents folder?
D
.
Right-click the Assignments compressed folder, click Extract All, select the Documents folder as the location for the uncompressed files, and then click Extract.
Why should you not remove a program by deleting its folder?
a (windows might need it) or d
What is an advantage of using web apps?
D
.
You do not have to update them
Which of the following is a similarity between updates and upgrades?
b (free of charge) or d
E-commerce transactions between businesses and customers is called ________.
D
.
business-to-customer (B2C)
Which of the following is not a way cybercriminals try to gather your personal information on social media sites?
D
.
blocking your friend requests
When you receive an email message from a company, what should you check in the sender's email address?
D
.
The sender's email address should match their official website address.
Which of the following is not a way to protect yourself online?
D
.
Enter your user name and password on any site that requests them.
What should you do when shopping or banking online?
D
.
Use a secure payment method
Which of the following components most affects a computer's speed?
D
.
CPU
What do you need before your camera phone can scan QR codes?
D
.
QR reader app
To refine the in-between motions, a computer animator uses a mathematical function called a(n) _______.
D
.
spline
You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.
D
.
JavaScript
Which of the following describes applied ethics?
D
.
considers a real-life situation and determines moral actions to take
Which of the following statements is false?
D
.
Omitting the © copyright symbol means your work is not copyrighted.
For a company, intellectual property is _______________.
D
.
a large part of the company's value
What can an organization do to keep its data safe?
D
.
Protect the data at every level, from individual computers to networks.
What happens when you begin to read an e-book protected with digital rights management (DRM) software?
A
.
The DRM software contacts a DRM server to verify you purchased the e-book.
What do users typically like about software suites?
D
.
The programs in the suite have similar user interfaces.
To register a .edu top-level domain, you must be a(n) ____________.
D
.
two-year or four-year college or university
When creating passwords for online accounts, you should _________________.
A
.
use a different password for each account
Some virtual reality headsets are designed to work with your __________.
B
.
smartphone
The ___________ part of a Creative Commons license means that a user must publish the creator's name when using the creator's content.
B
.
Attribution
Which of the following is an example of a compressed file format?
A
.
MP3 (MPEG-1, Audio Layer 3)
What type of media should you avoid sharing on social networks?
E
.
inappropriate pictures that may embarrass you
Which of the following is not an advantage of using technology in a large classroom?
A
.
Students can select entertaining videos to view while the teacher is busy elsewhere.
What are the two factors used in two-factor authentication?
D
.
something you know and something unique you have
Google ___________ let you see just one type of result at a time.
A
.
search modes
A(n) _____________ file is a binary file you use to run a program.
D
.
executable
In a column chart, the ___________ identifies what each color represents.
C
.
legend
If different systems produce medical records, the systems must _____________.
C
.
be able to communicate with each other
If you receive an email message you suspect is spam, what should you do?
A
.
Delete the message without opening it
The _________ file format is often used for photos and other web images.
a (jpg) or c(eps)
When you purchase a product online, by law, the seller will __________.
A
.
ship the product to you within 30 days of the sale
How do you start searching for a scholarly article on Google Scholar?
A
.
Type the title of the article or keywords associated with it.
Which of the following is not a step in creating an animation?
b (framing) or c (smoothing)
To join a social network, you sign up for a free account and fill out your _____________
A
.
profile
Using the ______________ field in an email message prevents recipients from seeing that anyone else was copied.
A
.
blind carbon copy (BCC)
What is a codec?
A
.
a way to compress audio or video data
How can you determine the accuracy of an article?
A
.
Check for a list of references at the end of the article.
When you search from the general to the specific, you are performing a __________.
D
.
vertical search
Which of the following is not a tip for creating an ergonomic workspace?
A
.
Position the display screen so that you look up at it.
A function always starts with ____________, followed by __________.
A
.
an equal sign, the function name
One purpose of a(n) ___________ website is to showcase the creative talent of the website author.
A
.
personal
If you want to buy zebra angelfish for your aquarium, which of the following search terms will provide the best results?
A
.
zebra angelfish
To use a search engine, you enter a _________.
A
.
search term
How can you tell whether one of the Wi-Fi networks shown here is an evil twin?
A
.
You cannot distinguish an evil twin network from a legitimate one.
Which part of the following URL is the protocol? http://maps.google.com
A
.
http://
What should you especially avoid posting to the public on social media sites so that strangers cannot find you in the physical world?
A
.
location-based information
In a database table, each row is called a(n) __________ and each column is called a __________.
B
.
record, field
To keep a workbook displayed in the Recent files list in Backstage view, you click the ________.
A
.
pushpin icon
Although you can build tables in Excel, in Access you can ____________.
A
.
connect the data in tables
To store an image in a computer, the image must be converted to _____________.
A
.
ones and zeroes
What must you do before you can copy, cut, or move text on a PowerPoint slide?
E
.
Select the text.
Secure websites ____________ information before sending it between computers.
D
.
encrypt
A typical ___________ is 48,000 Hz.
B
.
sample rate
Why should you look for an author's name when evaluating news shared through a social media website?
E
.
You can then determine whether the author has expertise to report on the topic
What did a Stanford study find about people who had to cut down a tree in a virtual world?
B
.
They used less paper in the real world
Cable and DSL Internet connections are called _____________ because they offer faster speeds than dial-up connections.
B
.
broadband
Using the Report Wizard, you can _______ report information to organize its contents.
D
.
sort
What is the best type of website for a paper that requires books and scholarly articles as resources?
A
.
a library services website
Which of the following is not an option when sharing a Google calendar?
c or e
Which of the following is not a blog type mentioned in the video?
D
.
experimental
If you want to see how a Word document will look when published to the web, use ______
A
.
Web Layout view
When creating and editing a presentation, you can use the ________ to align objects on the slide.
E
.
rulers
What can you use to clear dust from the ventilation fans on a computer?
D
.
can of compressed air
By default, Excel worksheets appear in ____________ view.
B
.
Normal
Using _____________, students can design and create objects such as prosthetics.
A
.
3D printing
Which of the following search tools would you use to filter out specific words?
b " " or e NOT
Which of the following is not an example of social media?
E
.
product description webpage
A ____________ app is one that runs on your smartphone or tablet.
E
.
mobile
Which of the following statements is true?
E
.
The duration of a copyright varies in different parts of the world.
What is a blog?
D
.
a website organized by blog posts, or individual news stories
When an email message arrives at a domain name system (DNS) server, the server acts as a(n) _______.
E
.
address book
Why should you avoid using "Cincinnati" in a domain name?
D
.
It is often misspelled
A wiki is a(n) ____________ that members of a group can edit.
B
.
webpage
Which of the following is a setting you can select in Microsoft Edge?
B
.
webpage to display when Edge starts
What do the Paste Options determine?
C
.
the appearance of the pasted text
Which of the following is a common cause of computer eye strain?
D
.
using harsh lighting near the computer
Which of the following is not a news site ranked in the top 10 most popular news sites?
C
.
sportsnews.com