Computer Applications 2019 Midterm Flashcards

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What technology might Akira use to help with reading and seeing pictures on the computer screen?

  • Closed captioning
  • Braille printer
  • Graphic organizer
  • Screen reader (correct)

How do you think teachers can make one box of copy paper last all year?

  • Email all documents home
  • Have students share copies
  • Place documents online (correct)
  • Ask parents to donate paper

Which job should Juan apply for if he wants to protect data from threats?

  • Training and support
  • Technical support
  • Information security (correct)
  • Research and Software development

Which company was the first to develop personal computers?

<p>Apple (B)</p> Signup and view all the answers

What are the benefits of pairing robots with human workers in manufacturing? (Select all that apply)

<p>Quality is improved (B), Work is streamlined (C), Cost efficiency is achieved (D)</p> Signup and view all the answers

How can Benny ensure he doesn’t plagiarize in his research paper?

<p>Add a formal citation (C)</p> Signup and view all the answers

Cloud storage refers to the storage of data on ________.

<p>the web app's server</p> Signup and view all the answers

Google is an example of which type of website?

<p>A search site (B)</p> Signup and view all the answers

In a web app, where is data usually stored?

<p>Cloud storage (C)</p> Signup and view all the answers

What could be of concern to Jodi while presenting her PowerPoint slides?

<p>A poor internet connection (A)</p> Signup and view all the answers

In which format is data finally stored in computers?

<p>Binary digits (B)</p> Signup and view all the answers

How should Ryan back up all his data?

<p>Use an external hard drive (D)</p> Signup and view all the answers

What could cause an external drive to not be recognized when plugged into a computer?

<p>A faulty port (C)</p> Signup and view all the answers

What devices do not require drivers to be manually installed?

<p>Plug-and-play devices (D)</p> Signup and view all the answers

Which of the following should you consider when purchasing a computer? (Select all that apply)

<p>Form factor (A), Software and applications (B), Storage capacity (C), Platform or Operating System (D)</p> Signup and view all the answers

How would Andre use the file manager to find a lost document?

<p>Use the search tool to locate it (D)</p> Signup and view all the answers

How do you know if a device is an input device or an output device?

<p>An input device enters data into memory; an output device displays processed information (A)</p> Signup and view all the answers

How is a program window different from a folder window?

<p>A program window shows active applications and a folder window displays file contents (C)</p> Signup and view all the answers

Which Windows setting should Naomi select to create a slideshow of pictures from her vacation?

<p>Personalization (A)</p> Signup and view all the answers

What concerns are there about open source programs?

<p>Programmers will add malicious code (B)</p> Signup and view all the answers

Which file format should Aaron use to avoid lag in loading high-quality images for his blog?

<p>JPEG (A)</p> Signup and view all the answers

Which app should Anusha use to analyze her monthly expenses?

<p>Spreadsheet app (B)</p> Signup and view all the answers

If Jamie wants to sell pottery designs through his website, which type of app should he launch?

<p>M-commerce app (C)</p> Signup and view all the answers

Which language does Logan not need to master for web app development?

<p>Logo (B)</p> Signup and view all the answers

Which type of app should Rafael use to type his report about a class trip?

<p>Word processor (A)</p> Signup and view all the answers

How can you protect a computer from electrical spikes and surges?

<p>Use a surge protector (D)</p> Signup and view all the answers

How could an online attacker use your online profile to steal your identity?

<p>Use your posts for security questions (C)</p> Signup and view all the answers

How does encryption work?

<p>It scrambles the information (B)</p> Signup and view all the answers

What is happening to Isabel's computer if she received a message locked by the FBI?

<p>It is likely ransomware (A)</p> Signup and view all the answers

Which of the following is a characteristic of a strong password?

<p>Letters, numbers, and symbols (D)</p> Signup and view all the answers

_______________ superimposes game objects onto the live image of your surroundings.

<p>Augmented reality</p> Signup and view all the answers

Streaming audio stores data as one complete file to your device.

<p>False (B)</p> Signup and view all the answers

To save storage space, digital video is _______________.

<p>compressed</p> Signup and view all the answers

The _______________ is a hybrid console with a built-in display.

<p>Nintendo Switch</p> Signup and view all the answers

Which of the following are intended to protect a copyright holder from unauthorized use? (Select all that apply)

<p>Licenses (B), Watermarks (D)</p> Signup and view all the answers

A firewall protects your computer from data loss due to hardware failure.

<p>False (B)</p> Signup and view all the answers

Service packs are free updates to an operating system.

<p>True (A)</p> Signup and view all the answers

Additional software that takes up storage space is often called _______________.

<p>bloatware</p> Signup and view all the answers

What is the legal term for ownership of intangible assets like ideas and software?

<p>Intellectual Property (A)</p> Signup and view all the answers

You can search every U.S. Government website at ________________.

<p>usa.gov</p> Signup and view all the answers

In a word processor, a template is a _______________.

<p>predesigned document you can customize</p> Signup and view all the answers

Which of the following should Betsy do to create a basic website?

<p>Use WordPress or Squarespace template (C)</p> Signup and view all the answers

You should keep at least 50% of a hard drive free at all times.

<p>True (A)</p> Signup and view all the answers

Both wired and wireless devices can connect to the same network.

<p>True (A)</p> Signup and view all the answers

When using cellular service, your device transmits data via _______________.

<p>radio waves</p> Signup and view all the answers

Which of the following is NOT a common form of malware?

<p>Bloatware (A)</p> Signup and view all the answers

A private network for use by customers, vendors, and/or suppliers is called a(n) _______________.

<p>intranet</p> Signup and view all the answers

Which step can help Chloe encrypt her activities on public WiFi?

<p>Use VPN for secure access (A)</p> Signup and view all the answers

A real-time chat with an online customer service representative is an example of _______________.

<p>instant messaging</p> Signup and view all the answers

A group of characters that expresses an emotion is called a(n) _______________.

<p>emoticon</p> Signup and view all the answers

Which of the following are examples of social networking?

<p>Facebook (C)</p> Signup and view all the answers

Flashcards

What is a screen reader?

A program that reads aloud content from web pages and documents.

What is closed captioning?

Text displayed on a video to show the dialogue, helping those with hearing impairments.

What is a Braille printer?

A device transforming digital content into Braille, a tactile reading system for the visually impaired.

What are graphic organizers?

Visual aids that organize information into graphs, charts, or diagrams, making it easier to understand.

Signup and view all the flashcards

What is Information Security?

A field that focuses on protecting data from theft, unauthorized access, and other threats.

Signup and view all the flashcards

Who was a pioneer in personal computers?

A company that pioneered the development of personal computers, introducing the Apple II.

Signup and view all the flashcards

What are some benefits of robots in manufacturing?

Robots can increase efficiency and quality while reducing costs in manufacturing processes.

Signup and view all the flashcards

Why is formal citation important in academic writing?

When using someone else's words or ideas, it's important to cite the source to avoid plagiarism.

Signup and view all the flashcards

Explain cloud storage.

Data is stored on servers that are accessed over the internet, not directly on your device.

Signup and view all the flashcards

What is the main function of Google?

Google is primarily a search engine, helping users find information online.

Signup and view all the flashcards

Where is data typically stored in web apps?

Web applications often store data on remote servers instead of directly on your computer.

Signup and view all the flashcards

What is a concern when presenting online?

A weak internet connection could disrupt the flow of a presentation, making it difficult to view slides.

Signup and view all the flashcards

How is data represented inside computers?

Data is ultimately stored in binary digits, which are represented by 0s and 1s.

Signup and view all the flashcards

What is the best option for backing up large amounts of data?

External hard drives offer a reliable way to back up large amounts of data for safekeeping.

Signup and view all the flashcards

Why might a USB flash drive not be recognized by a computer?

A faulty USB port on your computer could prevent it from recognizing and reading a flash drive.

Signup and view all the flashcards

Explain what 'plug-and-play' devices are.

Plug-and-play devices work automatically as soon as they are connected without the need for manual driver installation.

Signup and view all the flashcards

What are some important factors to consider when buying a computer?

When buying a computer, you should consider form factor, intended software use, platform (Windows, macOS), and storage capacity.

Signup and view all the flashcards

How can you easily find files in a file manager?

File managers have search tools to find specific files by name, content, or date, making organization easier.

Signup and view all the flashcards

Explain the difference between input and output devices.

Input devices, like keyboards and mice, allow you to enter data into a computer, while output devices, like monitors and printers, display processed information.

Signup and view all the flashcards

What is the difference between a program window and a folder window?

A program window shows a running application, while a folder window displays the contents of a specific drive or directory.

Signup and view all the flashcards

How can you customize your Windows desktop?

The personalization setting lets you change desktop themes, including slideshows, making your computer unique.

Signup and view all the flashcards

What are some concerns about open source programs?

Open source programs can pose a risk of malicious code being added by programmers, since anyone can modify the code.

Signup and view all the flashcards

Which image format is preferred for websites and why?

JPEG is often preferred for websites because it balances image quality with file size, preventing website lag.

Signup and view all the flashcards

Which type of app is best for expense tracking?

Spreadsheets are ideal for organizing and calculating expenses, providing a neat overview.

Signup and view all the flashcards

What type of app is used for selling products online?

An M-commerce app is suitable for businesses selling products online, allowing convenient shopping.

Signup and view all the flashcards

Which languages are needed for web app development?

HTML5, CSS, and JavaScript are essential for web app development, while Logo is not.

Signup and view all the flashcards

What type of app is suitable for typing reports?

A word processor is a necessary tool for drafting reports, allowing for formatting, editing, and saving documents.

Signup and view all the flashcards

What is the importance of surge protectors for computers?

Surge protectors shield computers from sudden power surges, which can damage components.

Signup and view all the flashcards

How can an attacker exploit your online profiles for identity theft?

Attackers could find personal information in your online profiles, like answers to security questions, which they can use to steal your identity.

Signup and view all the flashcards

What is encryption and how does it work?

Encryption converts data into an unreadable code, requiring a specific key to decipher it, ensuring data security.

Signup and view all the flashcards

Describe what ransomware is.

Ransomware demands payment from users to unlock their computers after encrypting files, a common type of cyber attack.

Signup and view all the flashcards

What characteristics make a strong password?

Strong passwords use a combination of uppercase and lowercase letters, numbers, and symbols, making them harder to guess.

Signup and view all the flashcards

What is augmented reality (AR)?

Augmented reality adds digital elements to the real world, overlaying images, videos, or sound.

Signup and view all the flashcards

Why is digital video compressed before storage?

Digital video data gets compressed to reduce its size, making it easier to store and transmit online.

Signup and view all the flashcards

What makes the Nintendo Switch a hybrid console?

The Nintendo Switch is a hybrid console, meaning it can be used as a handheld device or connected to a TV, unlike traditional consoles.

Signup and view all the flashcards

Study Notes

Computer Applications Study Notes

  • Accessibility Technology for Visual Impairment:

    • Screen readers read aloud content from web pages and documents.
    • Closed captioning displays video dialogue in text form.
    • Braille printers convert digital content into Braille.
    • Graphic organizers help structure information visually.
  • Managing Limited Printing Resources:

    • Encourage email distribution of documents for home printing.
    • Promote sharing and rotating submitted copies among students.
    • Solicit parent donations for additional printing supplies.
    • Transition documents online to reduce paper usage.
  • Information Security Career:

    • Ideal job for protecting data from threats is in Information Security.
  • History of Personal Computers:

    • Apple was the pioneer in personal computer development.
  • Benefits of Robots in Manufacturing:

    • Robots enhance quality, streamline work processes, and achieve cost efficiency.
  • Avoiding Plagiarism in Academic Writing:

    • Formal citation is necessary when using another's explanation verbatim.
  • Understanding Cloud Storage:

    • Data is stored remotely on a web app's servers.
  • Types of Websites:

    • Google functions as a search site, assisting users in finding information.
  • Data Storage in Web Apps:

    • Web applications typically store data in the cloud.
  • Concerns While Presenting Online:

    • A poor internet connection could hinder slide presentations.
  • Data Representation in Computers:

    • Computer data is ultimately stored in binary digits.
  • Backing Up Data:

    • An external hard drive is best for backing up large amounts of data.
  • USB Flash Drive Recognition Issues:

    • A faulty USB port might prevent a flash drive from being recognized.
  • Plug-and-Play Devices:

    • These devices require no manual driver installation; they work immediately upon connection.
  • Considerations When Purchasing a Computer:

    • Important factors include form factor, intended software use, platform, and storage capacity.
  • Using File Management Tools:

    • The search tool in file managers can locate documents by name, content, or date.
  • Input and Output Devices Explanation:

    • Input devices enter data into a system; output devices display processed information.
  • Program vs. Folder Windows:

    • A program window shows a running program, while a folder window displays drive contents.
  • Windows Personalization Setting:

    • Use the personalization setting to change desktop themes, including slideshows.
  • Open Source Program Concerns:

    • Risks include the potential for malicious code added by programmers.
  • Best Image Format for Websites:

    • JPEG is preferred for quality images without causing lag on websites.
  • Apps for Expense Tracking:

    • A spreadsheet app is ideal for organizing and calculating expenses.
  • App Type for Selling Products:

    • An M-commerce app is suitable for selling goods online.
  • Web Development Languages:

    • Logo is not essential for web app development, while CSS, JavaScript, and HTML5 are needed.
  • Suitable App for Typing Reports:

    • A word processor is necessary for drafting reports effectively.
  • Electrical Protection for Computers:

    • Surge protectors prevent damage from electrical spikes.
  • Online Identity Theft Risks:

    • Attackers may exploit profiles for answers to security questions.
  • Understanding Encryption:

    • Encryption scrambles data until a key is applied to decrypt it.
  • Ransomware Description:

    • Messages demanding payment to unlock a computer indicate a ransomware attack.
  • Strong Password Characteristics:

    • Strong passwords include various characters like letters, numbers, and symbols.
  • Augmented Reality Definition:

    • Augmented reality merges digital objects with live surroundings.
  • Digital Video Storage:

    • Digital video is compressed to save storage space.
  • Hybrid Console Example:

    • The Nintendo Switch features a built-in display, differentiating it from traditional consoles.
  • Copyright Protection Measures:

    • Watermarks and licenses safeguard against unauthorized use of content.
  • Misconceptions about Firewalls:

    • Firewalls do not protect against data loss from hardware failure.
  • Operating System Updates:

    • Service packs for operating systems are provided as free updates.
  • Bloatware Definition:

    • Additional software that occupies storage space is known as bloatware.
  • Ownership of Intangible Assets:

    • Intellectual property refers to ownership rights over ideas and software.
  • U.S. Government Website Search:

    • The platform to search all U.S. government websites is usa.gov.
  • Templates in Word Processors:

    • Templates are pre-designed documents that can be tailored for various uses.
  • Website Creation without Coding:

    • Using platforms like WordPress or Squarespace allows non-coders to create websites easily.
  • Hard Drive Storage Recommendations:

    • Keeping at least 50% of a hard drive free is advisable for optimal performance.
  • Wired and Wireless Network Connectivity:

    • Both types of devices can connect to the same network.
  • Cellular Data Transmission:

    • Cellular services transmit data using radio waves.
  • Common Malware Types:

    • Bloatware is not classified under typical malware forms.
  • Definition of Intranets:

    • An intranet is a restricted network for customers, vendors, and suppliers.
  • Ensuring Secure Online Activities:

    • Utilizing a VPN can enhance security when accessing public networks.
  • Instant Messaging Examples:

    • Real-time chats with representatives exemplify instant messaging.
  • Emoticon Definition:

    • An emoticon represents emotions through a combination of characters.
  • Social Networking Examples:

    • Facebook serves as a classic example of social networking platforms.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser