Study Guide Flashcards
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A Trojan
How can you protect a computer from electrical spikes and surges?
Use a surge protector
How does encryption work?
It scrambles the information until the key is used to unscramble it
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief’s steps
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
What is a digital certificate?
Technology used to verify a user’s identity
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Throwing financial documents older than three months in the trash
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work
False
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
In animation, the higher the fps, the smoother the motion appears
Yes
Web animations can be used in which of the following ways? Select all that apply.
A. to grab attention
B. to reduce storage space
C. to entertain
D. to navigate a site
A. to grab attention
C. to entertain
D. to navigate a site
Lossy compression retains the original image data and can be uncompressed.
No
A digital audio workstation requires separate hardware in addition to a computing device.
No
Speech synthesizers use _____ to determine context before outputting.
preprocessing
Software that compresses and decompresses a video stream is called a ____.
codec
NOT Comdec
Yuki placed an image in her presentation, but she may need blow it up if her team thinks the slide does not require any text. She should use a bitmap image.
False
____________ consist of shapes, curves, lines and text created by mathematical formulas that contain instructions that define objects in an image
Vector Graphics
It is a branch of Artificial Intelligence that trains machines to learn from data, identify patterns and make decisions to progressively improve their performance without much human interaction.
Machine Learning
The two-digit system of 1s and 0s that computers use is called
Binary Number System
This allows a device or software identify the words and phrases people speak and then convert them to a format the device can read.
Synthesized Speech
User interface icons typically represent _____. Select all that apply.
A. Folder
B. File
C. App
D. Dialog boxes
A. Folder
B. File
C. App
A file format describes the way ___________.
data is represented and structured
Audio-editing software allows you to ____. Select all that apply.
A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise
A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise
superimposes game objects onto the live image of your surroundings
Augmented reality
The _ is a hybrid console with a built-in display.
Nintendo Switch
Before creating a graphic, you should _____. Select all that apply.
A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
C. Save it as SVA file
D. Think about where it will appear
A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
D. Think about where it will appear