Chapter 7 Checkpoint Flashcards
True or False: CAPS LOCK and NUM LOCK are two examples of toggle keys.
True
True or False: kiosks are designed to endure a high volume of use and can be used by hundreds of people per day.
True
True or False: motion input is utilized by the military for flight simulation and weapon training
True
True or False: a smaller frame rate results in a smaller file size for a video, as well as smoother playback .
False
True or False: optical character recognition (OCR) and optical mark recognition (OMR) are two technologies used by optical readers
True
True or False: it is important to exercise caution when using QR codes because they may direct your mobile computer or device to a malicious website or file.
True
True or False: a data collection device reads and scans data from a source document.
False
True or False: most current displays use CRT technology.
False
True or False: contrast ratio defines a display’s width relative to its height
False
True or False: every electronic device emits some level of radiation
True
True or False: printer resolution is measured by the number of pixels per inch a printer can print
False
True or False: the Individuals with Disabilities Education Act (IDEA) requires any company with 50 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers.
False
A _____ ________ is an instruction a user issues by responding to a message displayed by a program or app.
user response
Which of the following is not an example of a pointing device? A. touchpad B. trackball C. touch screen D. pointing stick
touch screen
Another name for a graphics tablet is a(n) __________.
digitizer
Air gestures are used in ________ ______.
motion input
The United States Postal Service uses the ________ bar code.
POSTNET
LCD displays typically produce color using _______-______ technology, which uses a separate transistor to supply charges to each liquid crystal cell.
active-matrix
__________ orientation refers to a printout that is wider than it is tall.
Landscape
How many subwoofers would a 7.2 speaker system contain?
2
any data and instructions entered into the memory of a computer
input
one or more keyboard keys that you press to perform an operation system or application-related task
keyboard shortcut
pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard
pointing stick
input device that contains buttons and/or wheels you operate with a thumb or other finger
touch-sensitive pad
computer or mobile device’s capability of distinguishing spoken words
voice recognition
light-sensing input device that reads printed text and graphics and then translates the result into a form the computer can process
scanner
the number of horizontal and vertical pixels in a display
resolution
chip that controls the manipulation and display of graphics on a display device
graphics processing unit
device that functions as both headphones and a microphone
headset
touch-sensitve device that displays the image on a connected computer screen, usually via projector
interactive whiteboard
What is keyboard monitoring software?
Keyboard monitoring software runs undetected and stores every keystroke in a file for later retrieval.
List steps you can take to detect keyboard monitoring software.
1) run detection software regularly
2) review hard disk files
3) check running programs
_______ ______ allows user to guide on-screen elements using air gestures.
Motion input
Name 3 disciplines in which motion input is being used.
1) entertainment
2) military
3) medical field
What is DV technology?
technology used with DV cameras that allows you to input, edit, manage, publish, and share your videos
List the steps involved in using DV technology.
1) Select a DV camera
2) Record a video
3) Transfer and manage views
4) Edit a video
5) Distribute a video
What is a streaming cam?
A camera that has the illusion of moving images because it sends a continual stream of still images
List steps you can take to prevent unauthorized webcam use.
1) Unplug the webcam
2) Cover the lens
3) Register the hardware
4) Use a strong password
Define printer hacking.
Printer hacking is where an individual from within the organization or outside the building can print a document without permission if the network is connected to the Internet.
List the steps you can take to secure printers.
1) Place printers in a secure room, not out in the open
2) If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life
3) Encrypt documents before sending them to the printer using a secured network
4) Restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print
5) Use a printer program to track and report the types of jobs, and keep a record of the users who sent them
6) Unplug the printer when it is not is use, of do not connect it to a network.
7) Update the printer with the latest firmware.