Business Computing Quiz (Part 3)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Question 1

Which Internet communication service can you use to transfer items to and from other computers on the Internet?

FTP

Question 2

A mouse is an example of a(n) ______ device.

pointing

Question 3

Keyboards for mobile devices contain the same number of keys as desktop keyboards.

False

Question 4

Crowdsourcing is the practice of involving a large group of people to collectively contribute time, services, funds,
expertise, or ideas.

True

Question 5

Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.

True

Question 6

With an all-in-one computer the display device is separate from the tower.

False

Question 7

A headset contains both a microphone and a speaker.

True

Question 8

A(n) ______ consists of programs designed to make users more productive and/or assist them with personal tasks.

application
Question 9

C++ and JavaScript are examples of programming languages.

True

Question 10

Digital ______ includes music, photos, and videos.

media

Question 11

Case 1-2

Parvati wants to find out more information about purchasing a computer, so she performs a web search.

Which of the following is NOT true about Parvati's web search?

She will enter the desired search text in the Query box.

Question 12

DSL and FTTP are examples of wired ______ Internet service technologies.

broadband

Question 13

______ is a measure of the capability of a network to send and receive data.

Bandwidth

Question 14

Which of the following adds interactivity to webpages?

JavaScript

Question 15

A fingerprint is a small version of a larger image.

False
Question 16

The Safari browser comes preinstalled on Apple computers and devices.

True

Question 17

Chrome is a Microsoft browser included with the Windows operating system.

False

Question 18

A content aggregation website allows users to collect and compile content from a variety of websites about a particular
topic or theme.

True

Question 19

The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense.

True

Question 20

If you use an asterisk (*) in a search engine query, what are you trying to do?

Substitute characters.

Question 21

The collection of a user's Tweets forms a microblog.

True

Question 22

Most browsers require you to enter the protocol and host name in a web address.

False

Question 23

Which of the following is NOT true about PCs?

Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system.
Question 24

A(n) ______ notification is a message that initiates from the sending location without a request from the receiver. With
a(n) ______ notification, the receiver requests information from the sending location.

push, pull

Question 25

Which of the following best describes an ultrabook?

A thin laptop that uses a low-power processor.

Question 26

An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name.

False

Question 27

A mail server stores and manages email lists.

False

Question 28

Which of the following describes juice jacking?

When a hacker steals data from or transfers malware to a device via a USB cable at a charging station.

Question 29

______ is the process of initiating contact between two Bluetooth devices.

Pairing

Question 30

Critical Thinking Questions Case 3-2

Your school is in a safe neighborhood, but there have been a few thefts at ATMs. You work part-time in your school's
campus security office and have been asked to prepare tips for students about ATM safety.

Which of the following will you NOT recommend?

Count the cash immediately to ensure you receive the right amount.
Question 31

Smartphones and other mobile devices often can function as a portable media player.

True

Question 32

A frame that houses the system unit on a desktop is called a(n) ______.

tower

Question 33

A(n) ______ is a thin, lighter-weight mobile computer that has a touch screen.

tablet

Question 34

A(n) ______ combines video instruction and interaction with an instructor and students in an online classroom.

MOOC

Question 35

Which of the following is NOT an example of an operating system?

Office

Question 36

The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or
social media.

True

Question 37

Software registration typically is required.

False

Question 38

Because they are compressed, you usually cannot use backup files in their backed up form.

True
Question 39

Search tools typically use a(n) ______, which stores a variety of information about a file.

index

Question 40

Which of the following best describes disk defragmentation?

Reorganizing the hard disk so that files are stored in contiguous sectors.

Question 41

To cut selected text on a Windows computer, press COMMAND+X.

False

Question 42

Adjusting the ______ increases or decreases the crispness of objects in the photo.

sharpness

Question 43

You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What
phase are you in?

editing

Question 44

A text editor is used to type information when it does not need to be formatted with fonts or other styles.

True

Question 45

Two users can have the same email address.

False

Question 46

A(n) ______ has a goal of destroying data or stealing information.

cracker
Question 47

Intentionally erasing software is not an example of software theft.

False

Question 48

Piracy is the most common form of software theft.

True

Question 49

Email spoofing rarely is used in virus hoaxes and spam.

False

Question 50

Public key encryption is also called asymmetric key encryption.

False

Question 51

Case 5-1

You recently purchased a new laptop for home. You want to ensure that you are safe from malware.

You should make sure to do all of the following EXCEPT ______.

always stay connected to the Internet

Question 52

PIN stands for personal identification ______.

number

Question 53

Which of the following is not recommended to protect against hardware failure?

cables and locks


Question 54

A password ______ is a service that stores all of your account information securely.

manager

Question 55

You should disable GPS tracking on your mobile device unless you need to use it.

True

You might also like