Question 1
Which Internet communication service can you use to transfer items to and from other computers on the Internet?
FTP
Question 2
A mouse is an example of a(n) ______ device.
pointing
Question 3
Keyboards for mobile devices contain the same number of keys as desktop keyboards.
False
Question 4
Crowdsourcing is the practice of involving a large group of people to collectively contribute time, services, funds,
expertise, or ideas.
True
Question 5
Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.
True
Question 6
With an all-in-one computer the display device is separate from the tower.
False
Question 7
A headset contains both a microphone and a speaker.
True
Question 8
A(n) ______ consists of programs designed to make users more productive and/or assist them with personal tasks.
application
Question 9
C++ and JavaScript are examples of programming languages.
True
Question 10
Digital ______ includes music, photos, and videos.
media
Question 11
Case 1-2
Parvati wants to find out more information about purchasing a computer, so she performs a web search.
Which of the following is NOT true about Parvati's web search?
She will enter the desired search text in the Query box.
Question 12
DSL and FTTP are examples of wired ______ Internet service technologies.
broadband
Question 13
______ is a measure of the capability of a network to send and receive data.
Bandwidth
Question 14
Which of the following adds interactivity to webpages?
JavaScript
Question 15
A fingerprint is a small version of a larger image.
False
Question 16
The Safari browser comes preinstalled on Apple computers and devices.
True
Question 17
Chrome is a Microsoft browser included with the Windows operating system.
False
Question 18
A content aggregation website allows users to collect and compile content from a variety of websites about a particular
topic or theme.
True
Question 19
The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense.
True
Question 20
If you use an asterisk (*) in a search engine query, what are you trying to do?
Substitute characters.
Question 21
The collection of a user's Tweets forms a microblog.
True
Question 22
Most browsers require you to enter the protocol and host name in a web address.
False
Question 23
Which of the following is NOT true about PCs?
Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system.
Question 24
A(n) ______ notification is a message that initiates from the sending location without a request from the receiver. With
a(n) ______ notification, the receiver requests information from the sending location.
push, pull
Question 25
Which of the following best describes an ultrabook?
A thin laptop that uses a low-power processor.
Question 26
An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name.
False
Question 27
A mail server stores and manages email lists.
False
Question 28
Which of the following describes juice jacking?
When a hacker steals data from or transfers malware to a device via a USB cable at a charging station.
Question 29
______ is the process of initiating contact between two Bluetooth devices.
Pairing
Question 30
Critical Thinking Questions Case 3-2
Your school is in a safe neighborhood, but there have been a few thefts at ATMs. You work part-time in your school's
campus security office and have been asked to prepare tips for students about ATM safety.
Which of the following will you NOT recommend?
Count the cash immediately to ensure you receive the right amount.
Question 31
Smartphones and other mobile devices often can function as a portable media player.
True
Question 32
A frame that houses the system unit on a desktop is called a(n) ______.
tower
Question 33
A(n) ______ is a thin, lighter-weight mobile computer that has a touch screen.
tablet
Question 34
A(n) ______ combines video instruction and interaction with an instructor and students in an online classroom.
MOOC
Question 35
Which of the following is NOT an example of an operating system?
Office
Question 36
The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or
social media.
True
Question 37
Software registration typically is required.
False
Question 38
Because they are compressed, you usually cannot use backup files in their backed up form.
True
Question 39
Search tools typically use a(n) ______, which stores a variety of information about a file.
index
Question 40
Which of the following best describes disk defragmentation?
Reorganizing the hard disk so that files are stored in contiguous sectors.
Question 41
To cut selected text on a Windows computer, press COMMAND+X.
False
Question 42
Adjusting the ______ increases or decreases the crispness of objects in the photo.
sharpness
Question 43
You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What
phase are you in?
editing
Question 44
A text editor is used to type information when it does not need to be formatted with fonts or other styles.
True
Question 45
Two users can have the same email address.
False
Question 46
A(n) ______ has a goal of destroying data or stealing information.
cracker
Question 47
Intentionally erasing software is not an example of software theft.
False
Question 48
Piracy is the most common form of software theft.
True
Question 49
Email spoofing rarely is used in virus hoaxes and spam.
False
Question 50
Public key encryption is also called asymmetric key encryption.
False
Question 51
Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
always stay connected to the Internet
Question 52
PIN stands for personal identification ______.
number
Question 53
Which of the following is not recommended to protect against hardware failure?
cables and locks
Question 54
A password ______ is a service that stores all of your account information securely.
manager
Question 55
You should disable GPS tracking on your mobile device unless you need to use it.
True