









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A computer literacy quiz consisting of multiple choice questions covering various technology terms, security risks, and privacy concerns. The quiz tests the ability to identify correct answers related to computer hardware, software, the internet, and cybersecurity.
Typology: Exams
1 / 16
This page cannot be seen from the preview
Don't miss anything!
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. Select one: a. computer savvy b. technology literate c. computer competent d. computer literate correct answer: d. computer literate The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called: Select one: a. HALO animation. b. computer forensics. c. robotics. d. RFID simulation. correct answer: b. computer forensics. ________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements. Select one: A.. RFID b. PPS c. POS d. GPS correct answer: A.. RFID Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually. Select one: a. robotics b. forecasting c. simulation d. computer forensics correct answer: a. robotics All of the following are examples of real security and privacy risks EXCEPT Select one: a. viruses. b. hackers. c. spam. d. identity theft. correct answer: c. spam.
Unwanted electronic e-mail is called Select one: a. software. b. spam. c. adware. d. spyware. correct answer: b. spam. Children who do not have access to ________ and ________ won't be prepared for future employment. Select one: a. television, video games b. databases, data mining c. the Internet, computers d. information, data correct answer: c. the Internet, computers The difference between people with access to computers and the Internet and those without this access is known as the: Select one: a. Internet divide. b. broadband divide. c. digital divide. d. Web divide. correct answer: c. digital divide. Which of the following is NOT necessarily part of being computer literate? Select one: a. being able to build a computer b. using the Internet wisely c. avoiding hackers and viruses d. protecting your privacy correct answer: a. being able to build a computer The process of searching huge amounts of data with the hope of finding a pattern is called Select one: a. data warehousing. b. data searching. c. data retrieval. d. data mining. correct answer: d. data mining. Information technology careers are on the rise. Select one: a. True b. False correct answer: True Hardware refers to the programs that give commands to the computer. Select one: a. True
b. personal digital assistants. c. pocket computers. d. digital phones. correct answer: A. Smartphones A ________ runs a full-featured operating system and weighs less than two pounds. Select one: a. smartphone b. netbook c. PDA d. PIM correct answer: b. Netbook The Apple iPhone uses a version of ________ as an operating system. Select one: a. Windows Mobile b. Linux c. Mac OS X d. Red Hat correct answer: c. Mac OS X With regard to computer protection, quarantining is defined as: Select one: a. placing a found virus in a secure area on the hard drive. b. repairing the infected file. c. updating your antivirus software. d. deleting the infected file. correct answer: a. placing a found virus in a secure area on the hard drive. The most likely method a hacker would use to access a computer is Select one: a. sitting down at a computer and installing hacking software. b. entering through a company intranet. c. entering through the Internet. d. overhearing your password and/or log-on information. correct answer: c. entering through the Internet. Rules for creating passwords include all of the following EXCEPT: Select one: a. keep your password a secret. b. create a hard-to-guess password, with a combination of letters and numbers. c. keep your password written down and stored in any easy-to-remember location. d. change your password frequently. correct answer: d. change your password frequently. ________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. Select one: a. Shareware
b. Malware c. Spyware d. Adware correct answer: c. Spyware A majority of online credit card fraud results from: Select one: a. phishing. b. auction fraud. c. unsolicited e-mail. d. computer intrusions. correct answer: a. phishing. All of the following can be used for backing up data files EXCEPT: Select one: a. external hard drives. b. DVDs. c. RAM. d. flash drives correct answer: c. RAM. ________ is data that has been organized or presented in a meaningful fashion. Select one: a. Information b. A number c. A symbol d. A character correct answer: a. Information Laser printers use essentially the same process for printing as inkjet printers do. Select one: a. True b. False correct answer: b. False Digital cameras, camcorders, and Webcams are common devices for capturing pictures and video and are all considered output devices. Select one: a. True b. False correct answer: a. True External hard drives are often used to back up data that is contained on the internal hard drive. Select one: a. True b. False correct answer: a. True A ________ is approximately 1 million bytes. Select one: a. gigabyte b. terabyte
c. standby mode. d. a cold boot. correct answer: a. a warm boot. The hard disk drive is a ________ storage device, meaning that it stores data permanently. Select one: a. nonvolatile b. volatile c. temporary d. random correct answer: a. nonvolatile Flash drives plug into a(n): Select one: a. USB port. b. drive bay. c. expansion slot. d. serial port. correct answer: a. USB port RAM is considered volatile storage, which means it is: Select one: a. temporary. b. read-only. c. random. d. permanent. correct answer: a. temporary. The ________ language consists of just two digits: 0 and 1. Select one: a. binary b. data processing c. application d. base 10 correct answer: a. binary ________ is the set of computer programs that enables the hardware to perform different tasks. Select one: a. Hardware b. Data c. Software d. Binary data correct answer: c. Software The Internet is: Select one: a. the same as the Web. b. an internal communication system for a business. c. a communication system for the U.S. government. d. a large network of networks. correct answer: d. a large network of networks. Voice over Internet (VoIP) enables you to use the Internet for phone calls.
Select one: a. True b. False correct answer: a. True There are virtually no privacy risks in using today's newest social networking sites. Select one: a. True b. False correct answer: b. False If you post a picture on your own social networking site, it may become available to the public via search engines. Select one: a. True b. False correct answer: a. True If you wanted to keep a written online journal, you would use: Select one: a. a weblog. b. a listserv. c. e-mail. d. a podcast. correct answer: a. a weblog. A Web site that allows anyone to add or edit content is called a: Select one: a. podcast. b. multiuser site. c. wiki. d. weblog. correct answer: c. wiki. Podcasts enable you to Select one: a. post journal entries on the Web. b. communicate with friends in real time. c. broadcast over the Internet using compressed audio files such as MP3s and MP4s. d. edit video files over the Web. correct answer: c. broadcast over the Internet using compressed audio files such as MP3s and MP4s. Facebook and MySpace are considered to be: Select one: a. e-commerce Web sites. b. social networking Web sites. c. business-to-business Web sites. d. phishing Web sites. correct answer: b. social networking Web sites.
a. hyperlinks. b. social networks. c. e-mail. d. blogs. correct answer: a. hyperlinks. Instant messaging (IM) services are programs that enable you to: Select one: a. communicate with others who are online. b. send, receive, and edit files. c. broadcast over the Internet using compressed audio files such as MP3s. d. post journal entries on the Web. correct answer: a. communicate with others who are online. The Internet is the largest computer network in the world. Select one: a. True b. False correct answer: a. True The Internet and the World Wide Web are the same thing. Select one: a. True b. False correct answer: b. False Phishing attempts to trick people to reveal their sensitive information. Select one: a. True b. False correct answer: a. True Google's China Web site not allowing search results for sites considered illegal or objectionable by the Chinese government is an example of: Select one: a. personal privacy. b. fair use. c. intellectual property. d. censorship. correct answer: d. censorship. Which type of software is used to make a slide show? Select one: a. spreadsheet software b. presentation software c. word processing software d. system software correct answer: b. presentation software Wizards are step-by-step guides for performing complicated tasks in application software. Select one: a. True
b. False correct answer: a. True Speech-recognition software must be trained to an individual's dialect and accent. Select one: a. True b. False correct answer: a. True MP3 is a type of video compression. Select one: a. True b. False correct answer: b. False Which type of software is used at colleges to keep track of student records? Select one: a. system software b. word processing software c. database software d. presentation software correct answer: c. database software Shareware is software that is distributed as trial software for a limited time. Select one: a. True b. False correct answer: a. True Microsoft Office and Corel WordPerfect Office are examples of: Select one: a. open source products. b. freeware products. c. software suites. d. personal information manager applications. correct answer: c. software suites. Which type of software lets you dictate letters, e-mails, and voice commands? Select one: a. word processing software b. audio editing software c. speech-recognition software d. content-delivery software correct answer: c. speech-recognition software Multimedia software includes all of the following EXCEPT: Select one: a. image editing software. b. animation software. c. utility software. d. audio editing software. correct answer: c. utility software.
installed? Select one: a. PDF b. MP c. DOC d. HTTP correct answer: a. PDF Which of the following is software that you can use for an unlimited time at no charge? Select one: a. Web-based application software b. Internet-based software c. freeware d. alpha version software correct answer: c. freeware Microsoft Word and Writer are examples of: Select one: a. system software. b. word processing software. c. utility software. d. graphic software. correct answer: b. word processing software. Illegally copying an application onto another computer is called: Select one: a. software piracy. b. hacking. c. phishing. d. file sharing. correct answer: a. software piracy. Software you can use to create a budget is called: Select one: a. graphics software. b. spreadsheet software. c. utility software. d. word processing software. correct answer: b. spreadsheet software. In a spreadsheet, the columns and rows form individual boxes called: Select one: a. worksheets. b. cells. c. addresses. d. intersects correct answer: b. cells. The cell address F7 indicates that the cell: Select one: a. is at row F, column 7 of the worksheet. b. contains a label value of "F7."
c. is used in a formula involving the value "F7" d. is at row 7, column F of the worksheet. correct answer: d. is at row 7, column F of the worksheet. The primary benefit of a spreadsheet program is: Select one: a. its ability to create charts. b. its ability to have multiple worksheets in one workbook. c. its ability to automatically recalculate. d. the preprogrammed functions correct answer: c. its ability to automatically recalculate. All computers have operating systems. Select one: a. True b. False correct answer: a. True Microsoft Windows and Mac OS use a ________ interface. Select one: a. menu-driven b. virtual c. command-driven d. graphical user correct answer: d. graphical user The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and systems memory. Select one: a. RAM b. application software c. motherboard d. operating system correct answer: d. operating system Which of the following is NOT a function of the operating system? Select one: a. It manages the removal of spyware. b. It manages the processor. c. It provides a way for software applications to work with the CPU. d. It provides a user interface. correct answer: a. It manages the removal of spyware. The bars on the side and bottom of a window that control which part of the information in the window is displayed are called: Select one: a. scrollbars. b. arrows. c. toolbars.
Select one: a. clean out your Startup folder. b. defrag your hard drive. c. remove spyware programs. d. clear out unnecessary files. correct answer: d. clear out unnecessary files. Which of the following is NOT a main disadvantage of a desktop computer as compared to notebooks? Select one: a. A desktop computer is harder to move around. b. A desktop computer requires more space. c. A desktop computer is easier to expand. d. A desktop computer is more expensive. correct answer: d. A desktop computer is more expensive. The CPU consists of which two parts? Select one: a. the control unit and the front side bus b. the arithmetic logic unit and the front side bus c. the control unit and cache memory d. the control unit and the arithmetic logic unit correct answer: d. the control unit and the arithmetic logic unit