Final Flashcards

1
Q

Your operating system and your __________ combine to form a complete system that determines what your computer can do.

A

Computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two most common operating systems are

A

Microsoft Windows and Mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What part of the computer is the primary data processing component?

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of cable connects peripheral devices to a computer through a universal serial bus port?

A

USB Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which device receives signals from a computer and displays them onto a screen?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term describes the use of web applications that allow you to create, save and play games online?

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a free, cloud-based word processor that allows you to create, edit and collaborate in real-time with other users?

A

Google docs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an input device that produces a digital image file to be saved onto a computer called?

A

Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most important software on the computer? Why?

A

Operating system. It keeps everything in place and makes sure everything runs smoothly. An operating system not only runs the computer, but it also manages both hardware and software as well as the memory and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open source

A

refers to any software whose source code is made available free for any third party to review and modify. Free!!! So much public collaboration. Bugs fixed quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Most operating systems we use are known as what?

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

. What is an application?

A

Software that allows you to complete certain tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is known as the most important software that runs on a computer. Without it the computer is useless.

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the language of computers?

A

Ones and zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the software that communicates with your computer’s hardware and executes all software programs on your computer?

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CPU stand for…

A

Computer processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a program called when it secretly attaches to a document or program and then executes when the document or program is opened?

A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are output devices that produce audio from your computer called?

A

speakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company that provides internet service for a monthly fee is called a(n) _____?

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What lets you use the mouse to click icons, buttons, menus, and much more?

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two most common mobile operating systems?

A

Google Android and Apple IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every operating system has a GUI and they all look different from each other. True or false?

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three most common operating systems?

A

Linux, Mac OS X, Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The operating system does not manage computer memory, processes, hardware, and software. T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When you are multitasking on a computer, what does that mean?

A

You have more than one application open and running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Mobile operating systems have fewer features than a normal computer operating system. T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

File extension

A

A file extension is the three or four letters that can be found at the end of a file name following a period. They identify not only the characteristics of the file but also its use. Ex) .jpg This is typically used when dealing with images
.docx This extension is used with Word documents
.xlsx This extension is used with Excel Spreadsheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is one of the most common tricks that malware developers use?

A

to include the file extension of .exe, which means the program is executable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Select examples of software. (Select all that apply.)

  1. Mouse
  2. Computer Programs
  3. Applications Monitor
  4. Photo Editing Program
A

2,3,5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hardware and software need each other to function. T or F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When working on a computer, what software would allow you to complete tasks such as creating a document, designing a flyer, and writing a letter?

A

Word processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What software tool allows you to access the Internet?

A

Web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following are common types of desktop applications? (Select all that apply.)

  1. Word Processor
  2. Web Browser
  3. Media Player
  4. Games
A

1,2,3,4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A three or four-letter identifier found at the end of a file name that follows a period.

A

File extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The software that allows you to perform specific tasks is known as what.

A

applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Closed/commercial source

A

source code that is highly protected and only available to trusted employees and carefully vetted contractors. Ex) Microsoft Office. More access to customer support. Costly!!! Any bugs have to wait for next update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An image usually has what file extension?

A

.jpeg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

If you were working in Microsoft Word and saved your file, what would the file extension be?

A

.docx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

If you were working on a personal computer and downloaded a type of application software, that file extension would it be saved to your computer as?

A

.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When you download something to a PC, after you double click the .exe file (typically located in the downloads folder) what step comes next?

A

The dialogue box appears, follow instructions to complete installation of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

. When installing an application on a Mac, what is the format it is saved to your computer?

A

.dmg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Emails sometimes contain attachments that could include malware. What do those extensions typically end in?

A

.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a malicious computer virus designed to damage a computer called?

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the most widely used operating system for personal computers?

A

Microsoft Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following refers to a small, portable plug-n-play storage device used for storing files that plugs into a USB port?

A

USB Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What kind of software program allows you to create, edit, and print text documents?

A

A word processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following is a network cable that allows information to travel between wired devices?

A

Ethernet Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?

A

Hard Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the latest Mac operating system?

A

OSX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a hand-controlled electronic device used to manipulate the cursor on your computer screen called?

A

Mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following is a type of software that stores an organized collection of data on a computer?

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following is defined as a set of instructions executed by a computer?

A

Computer software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the output device that usually produces text and graphics onto paper called?

A

Printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following refers to a portable plug-n-play device used as a backup storage device?

A

External hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following refers to input or output devices that are used to communicate with a computer?

A

Peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What does the abbreviation USB stand for?

A

Universal serial bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Why did the HDMI connection grow in popularity?

A

It can handle both video and sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Everything appears to be normal, and your monitor is working, but you cannot seem to type on your keyboard. What should you check first?

A

Make sure your keyboard cord is securely in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What does RAM actually stand for?

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

If you try to run several programs at once and they are sluggish, what is something that you may consider adding to your device to make it run faster?

A

Extra RAM memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Video card

A

A circuit board used to manage the display on the monitor. (Ex. Nvidia, Geforce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Sound card

A

A circuit board that receives sound in digital form and reproduces it through speakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Router

A

A device that sends packets of data from one LAN (local area network) to another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Modem

A

A device that is used to transmit data from a computer through phone lines or a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Hard drive

A

A device that stores all software and files on your computer; reads and writes data onto a spinning magnetic or optical disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

CD ROM Drive

A

A device that writes data onto or reads data from a CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Floppy Drive

A

A disk drive that can read and write to floppy disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

USB port

A

A place on a computer where a USB cable is plugged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

inkjet printer

A

A common type of printer that sprays ionized drops of ink onto paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Expansion slots

A

Places on the motherboard where additional cards can be plugged in; mostly used to expand RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

LAN

A

Also known as a Local Area Network, this is a network of computers in a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

WAN

A

Also known as a Wide Area Network, this is a collection of LANs across a large area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Software

A

The set of instructions executed by a computer. (Ex. MS Word and Windows 10.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Power supply

A

Provides electricity to turn on and operate your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Hardware

A

The physical components that make up a computer system. (Ex. motherboard, hard drive, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The main circuit board of your computer; holds the RAM, CPU, video card, etc.

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The computer that manages access to resources on a network

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A type of printer uses laser beams to print high-resolution images onto paper.

A

laser printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

This device is used to capture your live movements in real time to broadcast online

A

webcam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The primary data processing component of a computer; also known as the Central Processing Unit

A

CPU

81
Q

This is used to cool the CPU (processor).

A

computer fan

82
Q

If your current computer does not have enough USB ports to support your devices there is nothing you can do about it. True or false

A

False

83
Q

What is AC power source

A

AC actually stands for alternating current. When plugged into your laptop or desktop, the AC adapter is used to convert the AC (alternating current) into DC (or direct current) that is used to power your computer. You may have heard the term AC adapter which is a device that converts the power source from one current to another.

84
Q

When plugged into your computer the AC adapter is used to convert the _____ current into the _____ current that will power your device.

A

Alternating, direct

85
Q

Microphones and Speakers were not originally built into computers. This is why there were separate ports for them.

A

True

86
Q

What year did the HDMI cable make its appearance?

A

2003

87
Q

Why would a business choose to have their systems use ethernet connections versus wireless connections?

A

Ethernet connections are more secure

88
Q

My computer won’t turn on. First…

A

Check the power source

89
Q

You went to lunch and came back, but now your computer monitor is completely black. What do you need to do?

A

Try moving around and clicking the mouse a few times.

90
Q

You have just sat down to complete your homework and now your computer won’t turn on at all. Since you are working on a desktop, you will need to check a couple of things. Where should you start?

A

Make sure that all power cords are plugged in securely and that your power outlet is working.

91
Q

If you try to run several programs at once and they are sluggish, you may consider adding what to your device?

A

Extra RAM memory

92
Q

ergonomics

A

Ergonomics encompasses the study of the efficiency of working conditions and then using that information to design a work place that is more effective for workers. For example, if you worked in an office where you had to retrieve printed documents, would it make more sense for you to have a printer in your own office or in a break room on a different floor? Now take that same set of thinking and apply it to your current workstation set up. Is the mouse within reach? Is the keyboard at a comfortable height? All of these things are important factors to consider when designing your computer setup.

93
Q

Electrostatic Discharge

A

Think about the times you may have shuffled your feet across the carpet, only to touch something and experience a small shock. Electrostatic discharge is similar, except you may not feel the shock because you are the one discharging the static electricity. However, if you are working inside of your computer, you may cause permanent damage if you touch an important component and short it out with an electrostatic discharge from your fingers.

94
Q

airplane mode.

A

disables all wireless transmission functions. helps save battery, helps charge faster.

95
Q

To put it simply the modem…

A

connects to the internet and the router allows you to connect devices to wifi.

96
Q

Starting and loading programs quickly is impacted more by the _____ than other components that also relate to the speed of your computer.

A

hard drive

97
Q

The Hard Drive is where short term information is stored.

A

False
(RAM is short term, hard drive is long term) (Hard drive does not reset after turned off) (RAM and hard drive work together whenever you open a program)

98
Q

Everything appears to be normal, and your monitor is working fine. However, you can’t seem to type on your keyboard. What should you check first?

A

Make sure the keyboard cables are securely in place in the ports.

99
Q

RAM

A

Also known as random-access memory, this temporarily stores information while you work on your computer.
RAM stands for random access memory and it represents the short term memory in your computer. Every time you turn your computer off your RAM is cleared. This is why you need to store anything you are working on to your hard drive so that you don’t lose any of your work.

100
Q

Starting and loading programs quickly is most impacted by the ____________.

A

Hard drive speed and capacity

101
Q

What is a peripheral device?

A

An external device that your computer can run without.

102
Q
Which of the following devices are considered peripheral? Select all that apply.
a.
Printer
b.
Speakers
c.
CPU
d.
Mouse
A

A,B,D

103
Q

What is the main function of the motherboard?

A

It is the main circuit board that connects essentially every part of the computer in some capacity.

104
Q

Your friend just bought a brand new computer but he is having trouble getting his machine to turn on. He’s called you for help. What are some of things he should double check? Select all that apply.

A. Try plugging in another device into the surge protector to be sure that it’s working properly.
B. Throw hands up in frustration and try again later.
C. Ensure the monitor is plugged into the surge protector.
D. Make sure all plugs are secure that connect the machine to the powersource.

A

A,C,D

105
Q

What is built into computers that help keep internal components cool?

A

Fan

106
Q

Put the steps in setting up a workstation in the proper order.

A
  1. Choose the proper location
  2. Connect the monitor
  3. Connect the keyboard and mouse
  4. Plug in the entire system
107
Q

What does it mean if you say something has “Bluetooth capabilities”?

A

The device can use radio technology to wirelessly connect to other devices.

108
Q

What happens when you enable the Airplane Mode on your device?

A

This action disables all wireless transmission functions.

109
Q

What connects directly to the internet source and is usually set up by the service provider?

A

Modem

110
Q

What is the first step in pairing a new Bluetooth device?

A

Using the settings on your device, turn on the Bluetooth capabilities.

111
Q

What device allows you to set up your home WiFi connections?

A

Router

112
Q

What is known as the most important software that runs on a computer? Without this software, the computer would not be able to do anything.

A

Operating system

113
Q

What feature lets you use the mouse to click icons, buttons, menus, and much more?

A

Graphical User Interface (GUI)

114
Q

The operating system does not manage computer memory, processes, hardware, and software.

A

False

115
Q

What is the most common way to obtain new software?

A

Internet download

116
Q

What is an open source operating system?

A

A free source, open to the public, that can be accessed and modified to suit an individual’s needs.

117
Q

What is an application?

A

Software that allows you to perform specific tasks.

118
Q

What is a closed source operating system?

A

A closed source, not open to the public that cannot be accessed or modified to suit an individual’s needs.

119
Q

What is the official name of an application on a desktop or a laptop?

A

Desktop application

120
Q

Why is it important to ensure that your software is updated? Select all that apply.

  1. It adds new features
  2. It removes old features
  3. It corrupts data
  4. It fixes and/or removes computer bugs
  5. It repairs security holes
A

1,2,4,5

121
Q

What do security patches do?

A

Covers security holes so that hackers can not access your data.

122
Q

Put the six steps of the troubleshooting process in order.

A
  1. Identify the problem.
  2. Establish a theory on why the problem occurred.
  3. Test the theory.
  4. Establish a plan of action and implement a solution.
  5. Verify your solution worked and put preventative measures in place.
  6. Document your findings, actions, and outcome.
123
Q

What does GUI stand for?

A

Graphical User Interface

124
Q

What is running more than one application at a time called?

A

Multi-tasking

125
Q

What are the three most common operating systems? Select all that apply.

1) HP
2) Ubuntu
3) Linux
4) Mac OSX
5) Microsoft Windows

A

3,4,5

126
Q

If an application freezes while running on your PC, what keys would you use to access the task manager?

A

CTRL + Alt + Delete

127
Q

If an application freezes while running on your Mac, what keys would you use to access the task manager?

A

Command + Option + ESC

128
Q

When an application is running slowly, what is the first thing you should check for?

A

Whether your application has been updated recently.

129
Q

If you notice that your entire computer seems to be running extremely slow, what is the first step you should take to diagnose the issue?

A

Run a virus scanner. You may have malware running in the background that is slowing things down.

130
Q

Why is it important to document the steps you took during the troubleshooting process?

A

So you will be able to remember what you have done and can avoid repeating mistakes

131
Q

What is the first step in the troubleshooting process?

A

Identify the problem.

132
Q

What is software?

A

Anything that tells hardware what to do and how to do it.

133
Q

Email is delivered electronically across the _________.

A

Internet

134
Q

Which of the following are examples of software.

  1. Computer programs
  2. Monitor
  3. Photo Editing program
  4. Applications
  5. Mouse
A

1,3,4

135
Q

How long does it take on average for email to be delivered?

A

minutes

136
Q

Why are free web based providers so popular?

A

You can access your email account from anywhere as long as you have internet connection.

137
Q

What is the three or four letter identifier found at the end of a file name that follows a period called?

A

File extension

138
Q

What is the first step in creating an email address?

A

Choosing a webmail provider

139
Q

Where do you view and manage emails?

A

Inbox

140
Q

What do you call the software that allows you to perform specific tasks?

A

Applications

141
Q

What computer software would allow you to complete tasks such as creating a document, designing a flyer, and writing a letter.?

A

Word processing software

142
Q

What does a file extension tell you about the file?

A

It’s characteristics and its use

143
Q

When you want to collaborate with someone using a Google Doc, what do you need in order to share the document?

A

The person’s email address

144
Q

If you are the creator of a Google Doc and need your partner to add or change information to the document, what permission setting do you need to give them?

A

person can edit

145
Q

What term is used for two or more PCs that are connected and share resources?

A

Peer to peer

146
Q

What is the correct term for files copied to a secondary location for preservation purposes?

A

backup

147
Q

If there is a secure socket layer in place, what will you need in addition to a user ID in order to access the shared files?

A

a password

148
Q

What does the “S” at the end of FTPS indicate?

A

secure

149
Q

What does the abbreviation SOHO stand for?

A

Small Office Home Office Router. This is the smallest of businesses and typically will have under 10 employees.

150
Q

What additional authentication method does SFTP use to ensure that data is secure?

A

SSH Keys

151
Q

What things should you consider when choosing a cellular connection? Select all that apply.

  1. Upgrades that come with your device
  2. Location
  3. Amount of data you have available on your plan.
  4. Number of devices that will have to use this connection method.
A

2,3,4

152
Q

The amount of data that can be sent from one point to another in a certain period of time is known as ________.

A

Bandwidth. The technical way to explain bandwidth is the volume of information per unit that a transmission medium (your internet connection) can handle. Basically the larger the bandwidth mans that more data can be moved in relation to speed. Think of it this way. Compare a garden hose and a fire hose. The garden hose is going to move water but it will be a smaller amount and it will take a lot longer to move a large amount. The fire hose has more volume (think bandwidth) and will move a lot of water much more quickly than a garden hose. In the same way, the greater bandwidth a device has, the more data will be transmitted and the amount of time for this data to travel will therefore be much quicker.

153
Q

What does FTP stand for?

A

File transfer protocol

154
Q

What is the slowest type of internet connection?

A

Dial up

155
Q

Place the following steps to configure your router in order.

A

During this process you will need to create a unique username and password for your router. Naming your router makes it easier for you to distinguish from others that you may pick up when searching for wireless networks. Strong passwords are important so that you can protect your data as well as keep others from using your network without your permission.

  1. After your router has been plugged in and you have power you will need to enter the router’s default IP address into the address bar and press enter.
  2. The router’s sign-in page will appear.
  3. The settings page will appear.
  4. Locate and select the save button to save your settings.
156
Q

While a wired connection provides the maximum amount of speed for an internet connection, there are several drawbacks. Choose all of the drawbacks of having a wired connection.

  1. Lack of mobility
  2. Wired connection require additional network sockets.
  3. Wired connections have greater security
  4. Wired connections provide greater speed than wireless ones.
A

1,2

157
Q

What are some of the advantages of cloud storage? Select all the correct answers.

  1. Control of resources
  2. Speed of connection
  3. Amount of storage space
  4. Less cost than other forms of storage
A

3,4

158
Q

When using SFTP to share files, what is encrypted in addition to the authentification information?

A

The data files

159
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

160
Q

What are some of the advantages of using a local storage method? Select all correct answers.

  1. Less cost than cloud storage
  2. Greater speed than cloud storage
  3. Greater space than cloud storage for the money
  4. Greater access to files and control of data
A

2,4

161
Q

What is the correct order for setting up a router?

A
  1. Connect your router to your Internet modem using an Ethernet cable.
  2. Plug in the power cable for the wireless router.
  3. Wait a few seconds to ensure power is on.
162
Q

Before “cloud storage” was a popular way to share information between people, what was used to transfer large files?

A

FTP

163
Q

What are some of the risks of using Peer to Peer (P2P) sharing networks? Select all the answers that apply.

  1. Hidden download of Trojan horses
  2. Hidden download of spyware
  3. Hidden download of computer viruses
  4. Identity theft
A

1,2,3,4

164
Q

What works in conjunction with a secure sockets layer (SSL) to ensure that data is transported safely?

A

HTTPs

165
Q

When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward.

A

Warning page

166
Q

What service allows people to send text messages with pictures and sounds from their device to other devices?

A

Electronic mail

167
Q

What allows browsers to retain the information from the pages you previously visited which will help make your web browsing experience even faster?

A

Cache

168
Q

Clicking on ads that appear on your screen is always a safe option. (T OR F)

A

False

169
Q

What search option can you use that does not track cookies or history?

A

Incognito

170
Q

What can self replicate without a host program and will spread without human interaction or directives from malware authors?

A

Worm. A worm will find the vulnerability in your system and infiltrate it. More advanced worms will encrypt data. Ransomware, which we will learn about shortly, is a great example of a worm at work.

171
Q

What symbol typically appears to the left of a secure site?

A

Padlock

172
Q

When using electronic mail (email), what is one thing you can do to help prevent potentially malicious emails from making their way into your inbox?

A

Set up a junk folder

173
Q

What is made to collect information and data and observe a user’s activity without their knowledge?

A

spyware. Spyware is a form of malware that often goes undetected. Spyware is one of the most common threats on the internet. It is specifically made to collect information and data, as well as observe a user’s activity without their knowledge. Spyware is related to adware, and once spyware is on your computer it can use your browsing history to create those fake ads we learned about earlier. It can capture Internet data, credit card numbers, and bank information. People using spyware can even steal your identity. When spyware is on your computer, no data is safe and your login and password information is considered compromised.

174
Q

What is usually present in the address bar If a site is not secure?

A

Red X through padlock and red line through https symbol.

175
Q

What is designed to look like a legitimate e-mail but contains malicious links that will deliver malware to your computer?

A

Phishing

176
Q

What should you make sure the web address begins with to ensure that you are browsing a secure site?

A

HTTPs

177
Q

What is something you may download unknowingly through free software that will then use cookies to track what you are searching for and is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase?

A

adware

178
Q

What are certain things you can do to protect your personal data when using a public workstation? Please check all that apply.

  1. Clear Cookies.
  2. Clear Cache.
  3. Run a virus protection program before using the computer.
  4. Sign out of accounts completely.
  5. Clear history.
A

1,2,4,5

179
Q

What is designed to infect a user’s system and encrypt their data so that your device will be locked up?

A

Ransomware. Sometimes the ransomware messages come across as though they are law enforcement and the user of the device has participated in illegal activity and now has to pay a fine to have their data released. Sometimes the cyber criminal is not subtle at all and demands a ransom, often in computer coin, before they release the lock on a person’s computer.

So, how does ransomware even get on your device? Most of the time it is unknowingly installed by the user themselves. This can happen by clicking ads, downloading images or files attached to emails, or clicking on pop-up links.

180
Q

What is VolP

A

VoIP stands for voice over internet protocol. VoIP is used to describe any kind of online phone service. To use a VoIP, you will need the proper hardware and a device that has enough processing power. In addition to those things, you must also have a broadband internet connection. VoIPs are a powerful form of communication because they allow you to use the internet to make phone calls linked with video so you can see the person you are talking to in real time even if they are halfway across the world

181
Q

DSL

A

also uses a phone line but it does not require a traditional landline like the dial-up connection, so it can be more dependable. The typical phone line has extra wires that are used for the internet connection in a DSL setup. DSL used to be more common, but with the newer types of connections, it is used less often now.

182
Q

Cable

A

connection has become more widespread and works by connecting the Internet using a broadband connection provided by a cable company. It can be faster than both dial-up and DSL service, but it is only available where cable TV is accessible.

183
Q

Cellular

A

connections, also referred to as 3G and 4G, are connected wirelessly through your ISP’s network. These cellular connections are not always as fast as DSL or cable, but they are convenient since they can be accessed by your phone. There also may be a limit of data that you can utilize each month.

184
Q

WEP

A

stands for wired equivalent privacy and it was introduced in the late 1990s. WEP is considered to be the weakest of the three wireless encryption protocols because it is so easily hacked.

185
Q

WPA and WPA2

A

WPA replaced WEP and WPA2 replaced WPA as the most current security protocol. As of 2006, all Wi-Fi certified products must use WPA2 security. WPA2 ensures there is government-grade data encryption in place to help protect your personal data. When searching for a new device, make sure that is labeled as Wi-Fi certified so that you know it meets all of the latest security standards.

186
Q

SSL

A

(secure sockets layer) is typically used on things like shopping or banking sites, or any site that needs to keep financial data secure.

187
Q

Typically cellular connections tend to have a _____ bandwidth.

A

High. This means that you will be able to transfer data in a short amount of time.

188
Q

Cellular, wired, wireless

A
Cellular = anywhere, less secure, slower
Wired = must be plugged in, fast, very secure
Wireless = must stay in range of router, not as secure, not fast
189
Q

What is FTP used for?

A

FTP is typically used for moving information from the computer you are working on to the server where a website is hosted. Before the “cloud” was a popular method of sharing and storing data, people typically used FTP. While many Internet users will never have a use for FTP, it is actually an essential tool for those building a website

190
Q

Peer to peer sharing

A

Peer-to-peer sharing, sometimes called P2P, is the sharing of digital media such as videos, music, e-books, etc from one computer to another. This type of network allows files from one computer to be shared to another computer without the need of a server. The individuals who utilize this network are referred to as peers –thus the name Peer-to-Peer sharing.

191
Q

Disadvantages of cloud storage

A

Not secure, slow internet connection speed, don’t have as much control over storage process

192
Q

Cookies are ____

A

Harmless

193
Q

Autofill

A

This feature will store the information you use, such as your username, mailing address, phone number, and so on. If you choose to use this feature, the next time you log on to a site your information will be auto-populated. While this sounds like a great time saver, the reality is that you are opening yourself up to the possibility of having your information taken, especially if you are using a computer workstation that other people may also use.

194
Q

Alternative technology

A

are the manufacturing or production methods that are less polluting and more resource-efficient than using traditional methods.

195
Q

Cloud computing

A

Cloud computing simply refers to all of the things you can remotely access over the internet. When something is stored in the cloud, it is stored on internet servers instead of directly onto your hard drive. There are two major reasons for doing this: convenience and reliability.

196
Q

Difference between web application and desktop application.

A

As mentioned previously, we know that desktop applications are installed directly on your device. On the other hand, web applications are different since they reside on servers in the cloud and do not require you to install them directly on your desktop. Some examples of online web applications include social media, photo editing, and some office suites. Web applications allow us to work efficiently while not taking up space on our devices. These web applications, like Google Docs, Microsoft Office 365, and most email, are becoming more popular, especially since you can access these services from any device at any time.

197
Q

Gesture interaction

A

Anytime you use a device with a touch screen that allows you to zoom in or out with just a pinch of two fingers or swipe left or right to change screens utilizes what is called a gesture interaction. As the demand for these types of devices grew, so did the idea of using gesture-based interaction to immerse a person into a virtual environment. Some gaming systems even tried to develop this idea with technology that would follow your gestures and mimic your movements on the screen.

198
Q

Difference between cloud computing and virtualization

A

The main difference between virtualization and cloud computing is that virtualization uses software to create multiple “separated” images of the hardware and software on the same computer. Cloud computing enables you to access a shared pool of computing resources (networks, servers, storage, applications, and services) through the internet that can provide for your individual needs without interrupting access for other people using the same resources. Thus, virtualization is software-based and the cloud is server-based.

199
Q

virtualization

A

Virtualization refers to creating a virtual computer system by simulating the functionality of hardware, such as a regular computer system. A virtual computer, known as a “virtual machine” (VM), is basically a software package that simulates what a regular computer can do. This software enables one computer, or one server, to host one or more virtual machines so that you can run different apps or even different operating systems on a single computer.