Computer Applications 2019 Midterm Flashcards
51 Questions
101 Views

Computer Applications 2019 Midterm Flashcards

Created by
@VersatileCopernicium

Questions and Answers

What technology might Akira use to help with reading and seeing pictures on the computer screen?

  • Closed captioning
  • Braille printer
  • Graphic organizer
  • Screen reader (correct)
  • How do you think teachers can make one box of copy paper last all year?

  • Email all documents home
  • Have students share copies
  • Place documents online (correct)
  • Ask parents to donate paper
  • Which job should Juan apply for if he wants to protect data from threats?

  • Training and support
  • Technical support
  • Information security (correct)
  • Research and Software development
  • Which company was the first to develop personal computers?

    <p>Apple</p> Signup and view all the answers

    What are the benefits of pairing robots with human workers in manufacturing? (Select all that apply)

    <p>Quality is improved</p> Signup and view all the answers

    How can Benny ensure he doesn’t plagiarize in his research paper?

    <p>Add a formal citation</p> Signup and view all the answers

    Cloud storage refers to the storage of data on ________.

    <p>the web app's server</p> Signup and view all the answers

    Google is an example of which type of website?

    <p>A search site</p> Signup and view all the answers

    In a web app, where is data usually stored?

    <p>Cloud storage</p> Signup and view all the answers

    What could be of concern to Jodi while presenting her PowerPoint slides?

    <p>A poor internet connection</p> Signup and view all the answers

    In which format is data finally stored in computers?

    <p>Binary digits</p> Signup and view all the answers

    How should Ryan back up all his data?

    <p>Use an external hard drive</p> Signup and view all the answers

    What could cause an external drive to not be recognized when plugged into a computer?

    <p>A faulty port</p> Signup and view all the answers

    What devices do not require drivers to be manually installed?

    <p>Plug-and-play devices</p> Signup and view all the answers

    Which of the following should you consider when purchasing a computer? (Select all that apply)

    <p>Form factor</p> Signup and view all the answers

    How would Andre use the file manager to find a lost document?

    <p>Use the search tool to locate it</p> Signup and view all the answers

    How do you know if a device is an input device or an output device?

    <p>An input device enters data into memory; an output device displays processed information</p> Signup and view all the answers

    How is a program window different from a folder window?

    <p>A program window shows active applications and a folder window displays file contents</p> Signup and view all the answers

    Which Windows setting should Naomi select to create a slideshow of pictures from her vacation?

    <p>Personalization</p> Signup and view all the answers

    What concerns are there about open source programs?

    <p>Programmers will add malicious code</p> Signup and view all the answers

    Which file format should Aaron use to avoid lag in loading high-quality images for his blog?

    <p>JPEG</p> Signup and view all the answers

    Which app should Anusha use to analyze her monthly expenses?

    <p>Spreadsheet app</p> Signup and view all the answers

    If Jamie wants to sell pottery designs through his website, which type of app should he launch?

    <p>M-commerce app</p> Signup and view all the answers

    Which language does Logan not need to master for web app development?

    <p>Logo</p> Signup and view all the answers

    Which type of app should Rafael use to type his report about a class trip?

    <p>Word processor</p> Signup and view all the answers

    How can you protect a computer from electrical spikes and surges?

    <p>Use a surge protector</p> Signup and view all the answers

    How could an online attacker use your online profile to steal your identity?

    <p>Use your posts for security questions</p> Signup and view all the answers

    How does encryption work?

    <p>It scrambles the information</p> Signup and view all the answers

    What is happening to Isabel's computer if she received a message locked by the FBI?

    <p>It is likely ransomware</p> Signup and view all the answers

    Which of the following is a characteristic of a strong password?

    <p>Letters, numbers, and symbols</p> Signup and view all the answers

    _______________ superimposes game objects onto the live image of your surroundings.

    <p>Augmented reality</p> Signup and view all the answers

    Streaming audio stores data as one complete file to your device.

    <p>False</p> Signup and view all the answers

    To save storage space, digital video is _______________.

    <p>compressed</p> Signup and view all the answers

    The _______________ is a hybrid console with a built-in display.

    <p>Nintendo Switch</p> Signup and view all the answers

    Which of the following are intended to protect a copyright holder from unauthorized use? (Select all that apply)

    <p>Licenses</p> Signup and view all the answers

    A firewall protects your computer from data loss due to hardware failure.

    <p>False</p> Signup and view all the answers

    Service packs are free updates to an operating system.

    <p>True</p> Signup and view all the answers

    Additional software that takes up storage space is often called _______________.

    <p>bloatware</p> Signup and view all the answers

    What is the legal term for ownership of intangible assets like ideas and software?

    <p>Intellectual Property</p> Signup and view all the answers

    You can search every U.S. Government website at ________________.

    <p>usa.gov</p> Signup and view all the answers

    In a word processor, a template is a _______________.

    <p>predesigned document you can customize</p> Signup and view all the answers

    Which of the following should Betsy do to create a basic website?

    <p>Use WordPress or Squarespace template</p> Signup and view all the answers

    You should keep at least 50% of a hard drive free at all times.

    <p>True</p> Signup and view all the answers

    Both wired and wireless devices can connect to the same network.

    <p>True</p> Signup and view all the answers

    When using cellular service, your device transmits data via _______________.

    <p>radio waves</p> Signup and view all the answers

    Which of the following is NOT a common form of malware?

    <p>Bloatware</p> Signup and view all the answers

    A private network for use by customers, vendors, and/or suppliers is called a(n) _______________.

    <p>intranet</p> Signup and view all the answers

    Which step can help Chloe encrypt her activities on public WiFi?

    <p>Use VPN for secure access</p> Signup and view all the answers

    A real-time chat with an online customer service representative is an example of _______________.

    <p>instant messaging</p> Signup and view all the answers

    A group of characters that expresses an emotion is called a(n) _______________.

    <p>emoticon</p> Signup and view all the answers

    Which of the following are examples of social networking?

    <p>Facebook</p> Signup and view all the answers

    Study Notes

    Computer Applications Study Notes

    • Accessibility Technology for Visual Impairment:

      • Screen readers read aloud content from web pages and documents.
      • Closed captioning displays video dialogue in text form.
      • Braille printers convert digital content into Braille.
      • Graphic organizers help structure information visually.
    • Managing Limited Printing Resources:

      • Encourage email distribution of documents for home printing.
      • Promote sharing and rotating submitted copies among students.
      • Solicit parent donations for additional printing supplies.
      • Transition documents online to reduce paper usage.
    • Information Security Career:

      • Ideal job for protecting data from threats is in Information Security.
    • History of Personal Computers:

      • Apple was the pioneer in personal computer development.
    • Benefits of Robots in Manufacturing:

      • Robots enhance quality, streamline work processes, and achieve cost efficiency.
    • Avoiding Plagiarism in Academic Writing:

      • Formal citation is necessary when using another's explanation verbatim.
    • Understanding Cloud Storage:

      • Data is stored remotely on a web app's servers.
    • Types of Websites:

      • Google functions as a search site, assisting users in finding information.
    • Data Storage in Web Apps:

      • Web applications typically store data in the cloud.
    • Concerns While Presenting Online:

      • A poor internet connection could hinder slide presentations.
    • Data Representation in Computers:

      • Computer data is ultimately stored in binary digits.
    • Backing Up Data:

      • An external hard drive is best for backing up large amounts of data.
    • USB Flash Drive Recognition Issues:

      • A faulty USB port might prevent a flash drive from being recognized.
    • Plug-and-Play Devices:

      • These devices require no manual driver installation; they work immediately upon connection.
    • Considerations When Purchasing a Computer:

      • Important factors include form factor, intended software use, platform, and storage capacity.
    • Using File Management Tools:

      • The search tool in file managers can locate documents by name, content, or date.
    • Input and Output Devices Explanation:

      • Input devices enter data into a system; output devices display processed information.
    • Program vs. Folder Windows:

      • A program window shows a running program, while a folder window displays drive contents.
    • Windows Personalization Setting:

      • Use the personalization setting to change desktop themes, including slideshows.
    • Open Source Program Concerns:

      • Risks include the potential for malicious code added by programmers.
    • Best Image Format for Websites:

      • JPEG is preferred for quality images without causing lag on websites.
    • Apps for Expense Tracking:

      • A spreadsheet app is ideal for organizing and calculating expenses.
    • App Type for Selling Products:

      • An M-commerce app is suitable for selling goods online.
    • Web Development Languages:

      • Logo is not essential for web app development, while CSS, JavaScript, and HTML5 are needed.
    • Suitable App for Typing Reports:

      • A word processor is necessary for drafting reports effectively.
    • Electrical Protection for Computers:

      • Surge protectors prevent damage from electrical spikes.
    • Online Identity Theft Risks:

      • Attackers may exploit profiles for answers to security questions.
    • Understanding Encryption:

      • Encryption scrambles data until a key is applied to decrypt it.
    • Ransomware Description:

      • Messages demanding payment to unlock a computer indicate a ransomware attack.
    • Strong Password Characteristics:

      • Strong passwords include various characters like letters, numbers, and symbols.
    • Augmented Reality Definition:

      • Augmented reality merges digital objects with live surroundings.
    • Digital Video Storage:

      • Digital video is compressed to save storage space.
    • Hybrid Console Example:

      • The Nintendo Switch features a built-in display, differentiating it from traditional consoles.
    • Copyright Protection Measures:

      • Watermarks and licenses safeguard against unauthorized use of content.
    • Misconceptions about Firewalls:

      • Firewalls do not protect against data loss from hardware failure.
    • Operating System Updates:

      • Service packs for operating systems are provided as free updates.
    • Bloatware Definition:

      • Additional software that occupies storage space is known as bloatware.
    • Ownership of Intangible Assets:

      • Intellectual property refers to ownership rights over ideas and software.
    • U.S. Government Website Search:

      • The platform to search all U.S. government websites is usa.gov.
    • Templates in Word Processors:

      • Templates are pre-designed documents that can be tailored for various uses.
    • Website Creation without Coding:

      • Using platforms like WordPress or Squarespace allows non-coders to create websites easily.
    • Hard Drive Storage Recommendations:

      • Keeping at least 50% of a hard drive free is advisable for optimal performance.
    • Wired and Wireless Network Connectivity:

      • Both types of devices can connect to the same network.
    • Cellular Data Transmission:

      • Cellular services transmit data using radio waves.
    • Common Malware Types:

      • Bloatware is not classified under typical malware forms.
    • Definition of Intranets:

      • An intranet is a restricted network for customers, vendors, and suppliers.
    • Ensuring Secure Online Activities:

      • Utilizing a VPN can enhance security when accessing public networks.
    • Instant Messaging Examples:

      • Real-time chats with representatives exemplify instant messaging.
    • Emoticon Definition:

      • An emoticon represents emotions through a combination of characters.
    • Social Networking Examples:

      • Facebook serves as a classic example of social networking platforms.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz features flashcards to help you review key concepts related to computer applications. Topics include accessibility technologies, software tools, and more. Test your knowledge of assistive technologies that aid users with visual impairments.

    More Quizzes Like This

    Accessibility and Emerging Technologies
    10 questions
    Accessibility and Inclusive Design
    8 questions
    Artificial Intelligence and Accessibility
    5 questions
    Use Quizgecko on...
    Browser
    Browser