Fundamentals of Computer Science Exam Study Guide (STURKIE) PDF

Document Details

Uploaded by Deleted User

2024

STURKIE

Tags

computer science exam study guide basic computer functions digital media

Summary

This document is a study guide for a computer science exam. It includes questions and answers about basic computer functions, digital devices, and digital media.

Full Transcript

Fundamentals of Computer Science (Study Guide for Exam) Module 1 (Cengage) 1. Which of the following is NOT a basic function of a computer? a. Accept data b. Produce input c. Process data d. Store information 2. Digital ______ includes music, photos, and videos....

Fundamentals of Computer Science (Study Guide for Exam) Module 1 (Cengage) 1. Which of the following is NOT a basic function of a computer? a. Accept data b. Produce input c. Process data d. Store information 2. Digital ______ includes music, photos, and videos. a. animation b. playables c. multiplex d. media 3. Digital device ____________ is the trend of computers and devices with technologies that overlap. a. transference b. merging c. convergence d. compatibility 4. A common way to display a shortcut menu using a mouse is to ______. a. right-click b. drag c. double-click d. point 5. A(n) ______ is an output device that visually conveys text, graphics, and video information. a. printer b. display c. webcam d. scanner 6. www.cengagebrain.com is an example of a valid web ______. a. protocol b. server c. address d. link 7. Twitter and LinkedIn are examples of what kind of website? a. search engine b. homepage c. blog d. online social network 8. Which Internet communication service can you use to transfer items to and from other computers on the Internet? a. IM b. VoIP c. FTP d. Email 1 9. Several words separated by spaces used in place of a password are called what? a. symbol generators b. logical keys c. user names d. passphrases 10. In the educational practice of BYOD, what does D stand for? a. disc b. drive c. data d. device 11. A computer accepts data, called output. a. True b. False 12. A study concluded that drivers using hands-free technologies are distracted, miss visual clues, and have slower reaction times. a. True b. False 13. Gaming consoles are more portable than handheld gaming devices. a. True b. False 14. A headset contains both a microphone and a speaker. a. True b. False 15. Both earbuds and headphones usually include noise-cancelling technology that enable you to reduce the volume level needed. a. True b. False 16. Flash memory has many moving parts, making it less durable and shock resistant than other types of media. a. True b. False 17. By subscribing to an ISP, you can connect to the Internet through your computers and mobile devices. a. True b. False 18. Google is an example of a search engine. a. True b. False 19. Most people feel that they should be asked before someone posts a picture of them online. a. True b. False 2 20. With streaming media, you access the media content while it downloads. a. True b. False (Cengage) 21. The ______ network became functional in 1969, linking scientific and academic researchers across the United States. a. INTRANET b. AMERINET c. NETAMERICA d. ARPANET 22. Which of the following is NOT true about public Wi-Fi hot spot safety? a. Always keep your wireless connection on. b. Avoid accessing financial information. c. Sign out of websites. d. Do not leave your computer unattended. 23. ______ is a measure of the capability of a network to send and receive data. a. Bandwidth b. Net worth c. Broadband d. Streaming 24. A(n) ______ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network. a. IP address b. fixed location c. top-level domain d. URL 25. Which of the following specifies the headings, paragraphs, images, links, and other content elements of webpages? a. HTML b. RWD c. CSS d. JavaScript 26. A result from a search engine search is called a(n) ______. a. pick b. tag c. smack d. hit 27. Which of the following is true about privacy and security risks with online social networks? a. Provide as much information as possible during registration. b. If a friend asks for help, respond urgently to help him or her protect himself or herself. c. Limit the number of friends. d. Online social networks typically do not change privacy settings. 3 28. A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content. a. wiki b. portal c. bookmarking site d. microblog 29. During which phase of web publishing would you use a text editor to enter codes that instruct the browser how to display webpage content? a. Host b. Plan c. Design d. Create 30. A(n) ______ is an abusive or insulting message in online communication. a. grenade b. troll c. flame d. bomb 31. The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense. a. True b. False 32. Dial-up access is a type of broadband digital Internet connection. a. True b. False 33. The Internet uses two IP addressing schemes: IPv4 and IPv6. a. True b. False 34. Critics say that the Anticyber squatting Consumer Protection Act prohibits free speech and free market. a. True b. False 35. Chrome is a Microsoft browser included with the Windows operating system. a. True b. False 36. A web feed contains links to or information about updated or changed content on a website. a. True b. False 37. Search text generally is not case sensitive. a. True b. False 4 38. The collection of a user's Tweets forms a microblog. a. True b. False 39. A shopping cart allows a customer to collect items to purchase on an e-retail website. a. True b. False 40. A fingerprint is a small version of a larger image. a. True b. False IP Address Questions 41. Before an IP address is converted to decimal it starts out with how many binary characters? a. 8 b. 16 c. 32 42. A typical IP address looks like this? a. 172.16.26.01 b. 16.01.26.172 c. 26.01.172.16 d. 01.6.172.17 43. An IP address can be compared to a home address with a street and street number. Which part of this IP address 172.12,26.02 is considered the street name? a. 02 b. 12 c. 26 d. 172 44. This IP address 172.26.12.01 has been converted from decimal to binary. a. True b. False 45. Binary numbers are comprised of: a. Ones and zeros b. Twos and threes c. Ones and threes d. Zeros and twos Pixel Questions (Google Quiz) 46. A pixel color can be comprised of three colors mixed together. What are those colors? a. Yellow, Black, Silver b. Red, Green, Blue c. Yellow, Pink, Orange 47. A pixel is simply a square of color. a. True b. False 5 48. A pixel is the ____________ controllable element of a picture represented on a screen. a. Smallest b. Largest 49. What color pixel lights will be lit to make the purple color? a. Red and Blue b. Green and Blue c. Red and Green 50. The above graphic is a good example of how pixels look when you zoom into the picture. (True or False) the flower pixels are various colors of green and the leaves are various color of red. a. True b. False Module 1, Google Quiz 51. A computer dedicated to providing one or more services to other computers or devices on a network is called a: a. Laptop b. Server c. Wi-Fi d. Output Device 52. ______________ does not contain a tower and instead uses the same case to house the display and the processing circuitry. a. Desktop Computer b. Wearable Device c. All-In-One Computer d. All of the above 53. A computer is a(n): a. portable device that allows you to take photos and store the photographed images digitally. b. collection of related webpages. c. small mobile computing consumer device designed to be worn. d. electronic device that can accept data (input), process the data, and produce information (output) 6 54. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. a. Application b. Bluetooth c. Desktop d. Malware 55. An Internet Browser is: a. an Internet service that provides remote storage to computer users. b. software that enables users with an Internet connection to access and view webpages on a computer. c. software that finds websites, webpages, images, news, etc. related to a specific topic. d. a device that allows you to take photos and store the photographed images digitally. 56. An Internet service that provides remote storage to computer users is: a. Hard drive b. Flash drive c. Cloud storage d. Optical Disk Storage 57. A search engine is: a. a small, mobile computing consumer device designed to be worn. b. software that finds websites, webpages, images, videos, news, maps and other information related to a specific topic. c. when you sync computers and mobile devices. d. an Internet service that provides remote storage to computer users. 58. A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed is a: a. Backup b. Computer c. Application d. Digital Camera 59. A tablet is a: a. backup storage medium. b. thin, lighter-weight mobile computer that has a touch screen. c. small mobile computing consumer device designed to be worn. d. small portable device that is used primarily to take digital photos. 60. All smartphones use the same operating systems. a. True b. False 61. Tablets always come with separate keyboards. a. True b. False 62. A website normally consists of multiple webpages. a. True b. False 63. A smartphone is not considered a computer. 7 a. True b. False 64. A digital device that is used primarily for reading books. a. All-in-One Computer b. iPad c. Wearable Device d. E-Reader 65. A website that encourages members in its online community to share their interests, ideas, stories, photos, music and videos with other registered users. a. Application b. Online Social Network c. Server d. E-Book Reader 66. The trend of computers and devices with technologies that overlap is: a. Green Computing b. Digital Device Convergence c. Cloud Storage d. Backup Flash Drive 67. ____________ involves reducing the electricity consumed and environmental waste generated when using a computer. a. Internet Service Provider b. Green Computing c. Online Privacy d. Synchronize 68. A collection of computers and devices connected together, often wirelessly is a: a. Server b. Hard Drive c. Network d. Media Player 69. A laptop is a computer that has a separate tower. a. True b. False 70. ______________ is any hardware component that allows you to enter data and instructions into a computer or mobile device. a. Memory b. Internet c. Input Device d. Output Device Binary Questions (Kahoot) 71. Computers can only store: a. 0s and 1s b. RAM c. Text d. Pictures 8 72. A single 0 or 1 is known as a: a. Bit b. Byte c. Nibble d. Binary 73. Binary is known as: a. Base 10 b. Base 2 c. Hexadecimal d. All of the above 74. What number does this binary string represent? a. 3 b. 4 c. 5 d. 6 75. What number does this binary string represent? a. 1 b. 2 c. 3 d. 4 76. Adding a 1 on the end (right side) of any binary number makes it: a. Double b. Even c. Odd d. None of these answers 9 77. Using the binary conversion image above what is the binary number for 9: a. 1000 b. 1001 c. 1010 d. 1100 Future of Computers (CodeHS) 78. Which of the following fields use computers? a. Medicine b. Video Gaming c. Automotive (Cars) d. All of the above 79. Which of the following is an applications of Artificial Intelligence? a. Game AI’s b. Foreign language translation c. Recognizing handwriting d. All of the above History of Computers (CodeHS) 80. Which of the following statements is NOT true? a. Computers have only been around since the 1940’s b. One reason computers were first developed was to do mathematical computations faster c. Some modern computers include laptops, cell phones, and tablets d. Computers are able to perform tasks by using logic 81. Which of the following statements is the simplest and most accurate definition of a computer? a. A computer is a machine that is able to solve any problem. b. A computer is a machine that can be programmed. c. A computer is something that performs calculations by following and executing specific instructions to solve a problem d. A computer is something that runs applications and accesses the internet. e. 82. Which of the following choices correctly orders the early types of computers from earliest to most recent? a. Abacus, analytical Engine, ENIAC, IBM Laptop b. Analytical engine, Abacus, IBM Laptop, ENIAC c. ENIAC, Analytical Engine, Abacus, IBM Laptop d. IBM Laptop, ENIAC, Analytical Engine, Abacus 10 Computer Organization (CodeHS) 83. What is the purpose of an output device? a. To allow the computer to store information or programs. b. To allow the user to give data or information to the computer. c. To allow computers to connect and communicate with other computers. d. To allow the computer to display or communicate the result of a computation. 84. What is the purpose of an input device? a. To allow the computer to store information or programs. b. To allow the user to give data or information to the computer. c. To allow computers to connect and communicate with other computers. d. To allow the computer to display or communicate the result of a computation. 85. What is the purpose of a network device? a. To allow the computer to store information or programs. b. To allow the user to give data or information to the computer. c. To allow computers to connect and communicate with other computers. d. To allow the computer to display or communicate the result of a computation. 86. What is the purpose of a storage device? a. To allow the computer to store information or programs. b. To allow the user to give data or information to the computer. c. To allow computers to connect and communicate with other computers. d. To allow the computer to display or communicate the result of a computation. Software and Hardware (CodeHS) 87. Which of the following statements is something the operating system of a computer is responsible for doing? a. Managing memory allocations for all applications. b. Providing a way for the user to create text documents. c. Allowing the user to access the internet. d. Allow the user to write programs. 88. Which of the following items is an example of a user application? a. Browser b. Text editor c. Games d. All of the above 89. Which of the following choices lists the three main components of a computer’s hardware? a. CPU, Memory, Motherboard b. CPU, Flash memory, Processor c. Processor, Binary, RAM d. Input devices, Output devices, Motherboard 90. What does CPU stand for? a. Computer’s Processing Unit b. Computer’s Plug-in Unit c. Central Processing Unit d. Central Pushing Unit 11 91. Which of the following devices is the device that connects all of the physical components of computer together? a. CPU b. Memory c. Logic d. Motherboard Networks and the Internet (CodeHS) 92. Which of the following statements is NOT true about the Internet? a. The internet connects devices and networks all over the world b. The internet helps people collaborate to solve problems c. The Internet helps people communicate d. There are not negative consequences of the Internet, it is purely positive 93. How is the bandwidth of a network measured? a. Bitrate. Higher bitrate means higher bandwidth. b. Voltage. Higher voltage means higher bandwidth. c. Frequency of waves. Higher frequency means higher bandwidth. d. Light. More light means higher bandwidth. 94. What is latency of a computer system? a. The amount of data (in bits) that can be transmitted at any given time b. The distance that data needs to ravel in a network. c. The time it takes for a bit to travel from sender to receiver d. The strength of the network connection 95. What is the Internet Protocol (IP)? a. A set of rules describing what behavior is acceptable on the Internet b. A law that says that the Internet is for everyone c. A protocol that defines the structure of an Internet address and assign a unique address to every device on the Internet d. An agreement that sets a limit on the number of computers than can be on the Internet at any given time 96. What is the function of the Domain Name System (DNS)? a. To sell website names to web developers b. To assign a unique domain name to every computer c. To make sure that each IP address has only one corresponding domain name d. To translate domain names into IP addresses 97. According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com? a. about.example.com b. example.com/home c. example.com.org d. example.org 98. Which of the following statements are true about Internet routing? I – For any two points on the Internet, there exists only one path between the two points II – Routing on the Internet is fault tolerant and redundant a. I only b. II only c. Both I and II d. Neither I and II 12 99. What information is contained in a packet? a. The entirety of a digital message b. The entirety of a digital message, and metadata about the message, including where it came from and where it is going c. A small part of a digital message d. A small part of a digital message, and metadata about the message, including where it came from and where it is going 100. (True of False) Everyone in the world has Internet access. 101. What is the purpose of the Digital Millennium Copyright Act? a. To make all content on the Internet free for everyone to use. b. To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works. c. To criminalize plagiarism on the Internet. d. To allow for open source software on the Internet. 102. Which of the following best explains what happens when a new device is connected to the Internet? a. A device driver is assigned to the device. b. An Internet Protocol (IP) address is assigned to the device. c. A packet number is assigned to the device. d. A web site is assigned to the device. 103. Which of the following activities poses the greatest personal cybersecurity risk? a. Making a purchase on a online store that uses public key encryption to transmit information b. Paying a bill using a secure online electronic payment system c. Purchasing a couch by emailing credit card number to the couch owner d. Checking a bank account on a bank’s website that user HTTPS for secure communication 104. Which of the following is LEAST likely to indicate a phishing attack? a. An email from a website asks that you click on a link to reset your password. b. An email from our bank asks you to call the number on your card to verify a transaction. c. An email from your water utility company asks you to enter your date of birth and social security number for verification purposes. d. An email indicates you have won money, and ask you to enter your bank account number so the money can be transferred. 105. Which of the following is considered an unethical use of computer resources? a. Downloading file sharing software on your home computer b. Searching online for the answer to CodeHS exercises and quizzes c. Purchasing an app from an app store and downloading it directly to a mobile device d. Searching online for an electronic version of a textbook Digital Information (CodeHS) 106. What is data abstraction? a. Manipulating data to create something new b. Storing data in a little space as possible c. The process of simplifying complicated data into manageable chunks d. Filtering data to gain new knowledge 13 107. Which of the following are examples of encoding information? a. Representing fast food meals as numbers on the menu. For example a number 1 represents a hamburger. b. Assigning a numeric value to every area of a region, for example zip codes in the United States. c. Assigning a number to every character of the alphabet so we can represent sentences as series of simple digits. d. All of the above 108. What is the value of 1310 in binary? a. 1012 b. 11012 c. 11102 d. 100002 109. How many possible values can be created with only 2 bits? a. 4 b. 2 c. 11 d. 3 110. How many bits are used to encode a character according to the ASCII encoding scheme? a. 2 bits b. 4 bits c. 6 bits d. 8 bits 111. What is a pixel? a. A grid of several colors in a digital image b. Another name for a digital image c. A single tiny dot, or square, or color in a digital image d. A small picture 112. Using the conversion table above, what is the value of 9F16 in binary? a. 1001 11112 b. 1111 10012 c. 0111 10002 d. 1100 00112 14 113. What is the value of C16 in decimal? (Remember that Hexadecimal uses digits 0 – 9 and then A=10, B=11 and so forth. a. 1610 b. 1210 c. 610 d. 1310 114. What are the 3 color channels that make up a pixel according to the RGB color scheme? a. Red, Green, Blue b. Red, Blue, Yellow c. White, Black, Gray d. Cyan, Magenta, Yellow 115. Which of the following pixels has a color value of #ff0000 (expressed in hexadecimal) A. B. C. D 116. What is the range of values (expressed in decimal) that each color channel can have? a. 110 – 25610 b. 010 – 25510 c. -12810 – 12710 d. 010 - 12710 Web Design (CodeHS) 117. Which of the following is a valid HTML tag? a. h1 b. c. d. >h1< 118. Which of the following is an example of metadata about a webpage? a. The title of the webpage b. The body of the webpage c. An tag on the webpage d. All of the above 119. What is the function of the tag? a. Create a line break on the resulting webpage b. Create a horizontal line on the resulting webpage c. Italicize text d. Bold text 120. Which of the following is the correct HTML code to create a hyperlink that displays Click Me and links to google.com? a. Click Me b. https://google.com c. Click me https://google.com 15 d. Click Me 121. Which of the following lines of HTML code will insert a image into a webpage? a. https://codehs.com/static/img/logo.png b. src=”https://codehs.com/static/img/logo.png” c. d. 122. Which of the following HTML code snippets would produce the following web page: o Apples o Bananas o Oranges 123. Which of the following tags defines a table row? a. b. c. d. 16 124. Which of the following tags defines a table header? a. b. c. d. 125. Which of the following HTML code snippets will generate the following table? 17 126. Which of the following HTML code snippets is the proper way to set the background color of an tag to be blue? A. B. C. D. 127. Why do we use CSS? a. HTML wasn’t intended to be able to style web pages, CSS allows us to add style b. Separate the content of a web page from the design of a web page c. Easily modify the look and feel of a web site even at a large scale d. All of the above 128. Which of the following is a valid CSS rule? A. B. C. D. 18 129. Which of the following code CSS snippets will select all tags on a page and give them a height of 200 pixels? a. b. tag=”img”{ height: 200px; } c. img { height: 200px; } d. { Height: 200px; } HTML Quiz (Google Doc) 130. To create these italicized words, Today is Monday. on a webpage you would use the following HTML tag. a. Today is Monday. b. Today is Monday. c. Today is Monday. d. Today is Monday. 131. To create a horizontal line across a webpage you would use this tag. a. b. c. d. 132. To create the HTML list below: 1. Go to practice 2. Do my homework 3. Call Matthew you would use the following opening and closing HTML tags. a. b. c. d. 19 133. (True or False) The tags does need a closing tag. (Cengage) 134. Data that a computer accepts and processes is called _______. a. Information b. Input c. Bytes d. digital facts 135. Which of the following best describes an ultrabook? a. A laptop with a large, detachable screen. b. A thin laptop that uses a low-power processor. c. A supercomputer in laptop format. d. An e-book reader that has capabilities similar to a tablet. 136. Power users may work with a high-end desktop, sometimes called a(n) ______, designed to handle intense calculations and sophisticated graphics. a. Ultrabook b. Workstation c. Magnapower d. Supercomputer 137. Which of the following server types is housed in a slot on a metal frame? a. Dedicated b. Tower c. Rack d. Blade 138. How many instructions are supercomputers capable of processing in a single second? a. millions b. billions c. thousands d. trillions 139. Which manufacturer uses the term AirPods to refer to headphones that fit in your ear and connect wirelessly to devices? a. Nokia b. Apple c. Samsung d. Microsoft 140. Fitness games often communicate with a(n) ______ board, which is shaped like a weight scale and contains sensors. a. balance b. motion c. step d. activity 20 141. Which of the following would not fit on a desk or your hand? a. PC b. supercomputer c. Chromebook d. game console 142. What part of the body does CVS impact? a. Arms b. Ears c. Wrists d. Eyes 143. (True or False) A keyboard, mouse, and printer all are examples of peripheral devices. 144. (True or False) If you are purchasing a new desktop, chances are it will NOT include the latest version of your preferred operating system. 145. (True or False)Cloud computing uses server virtualization. 146. (True or False) An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name. 147. (True or False) A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, browser, and numerous other apps. 148. (True or False) A point-and-shoot camera is a high-end digital camera that has interchangeable lenses. 149. (True or False) A docking station has less functionality than a port replicator. 150. (True or False) A brownout is a complete power failure. (Cengage) 151. A(n) ______ has a goal of destroying data or stealing information. a. Hacker b. Cracker c. Cyberextortionist d. Script Kiddie 152. A(n) ______ demands payment to stop an attack. a. Cracker b. Hacker c. Cyberextortionist d. Script Kiddie 153. Another term for botnet is ______ army. a. ghost b. spy c. zombie d. vampire 21 154. What is an audit trail? a. a log of financial transactions b. a list of passwords and user names on a network c. a record of hacking attempts d. a file that records access attempts 155. A password ______ is a service that stores all of your account information securely. a. manager b. binder c. collection d. vault 156. PIN stands for personal identification ________. a. Number b. Note c. Network d. Name 157. A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action. a. check b. firewall c. lock d. control 158. An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt. a. code b. algorithm c. key d. password 159. A(n) ______ backup copies only the files that have changed since the last full backup. a. differential b. selective c. incremental d. partial 160. Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person. a. engineering b. manipulation c. misdirection d. hacking 161. (True or False) Software used to fight cybercriminals is called crimeware. 162. (True or False) A rootkit can be a backdoor. 22 163. (True or False) If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall. 164. (True or False) Two users can have the same email address. 165. (True or False) A hand geometry system measures the size and shape of a person's hand. 166. (True or False) Encryption is one safeguard against information theft. 167. (True or False) You should disable GPS tracking on your mobile device unless you need to use it. 168. (True or False) A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website. Module 5 Quiz (Kahoot) 169. A notice that guarantees a user a website is legitimate. a. Digital Certificate b. Internet Service Provider c. Script Kiddie d. Encryption 170. (True or False) Adware is a program that displays an online advertisement in a banner in a pop- up window. 171. A group of compromised computers connected to a network that are used to attack other networks. a. Cookie b. Hacker c. Botnet d. Firewall 172. Hardware or software that protects a network's resources from intrusion by users on another network. a. Cookie b. Firewall c. Malware d. Hacker 173. (True or False) Viruses, worms, and other malware can be hidden in downloaded game files and mobile apps. 174. Programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices. a. Firewall b. Digital Certificate c. Malware d. Cookie 175. A small text file that a web server stores on your computer. a. Botnet b. Cookie c. Backup d. Cyberterrorist 23 176. Someone who accesses a computer or network illegally. a. Cookie b. Malware c. Cybercrime d. Hacker 177. (True or False) When data is traveling to or from a computer to a cloud service, it can never be intercepted. 178. The process of converting data that is readable by humans into encoded characters to prevent unauthorized access. a. Encryption b. Password c. Restore d. Decryption 179. The unauthorized and illegal duplication of copyrighted software. a. Piracy b. Restore c. License d. Spoofing 180. A technique intruders use to make their network transmission appear legitimate to a victim computer or network. a. Hacking b. Restore c. Scamming d. Spoofing 181. A program placed on a computer or mobile device without the user's knowledge that secretly collects information. a. Piracy b. Spyware c. Encryption d. Script Kiddie 182. A compromised computer whose owner is unaware the computer or device is being controlled remotely by an outside source. a. Spyware b. Piracy c. Zombie d. Hacker 183. (True or False) Information Privacy is the right of individuals to deny or restrict the collection and use of information about them. 184. Which of these are examples of digital security risks? a. Internet/Network attacks b. Hardware Theft c. Information Theft d. All of the above 24 185. A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money. a. Adware b. Spyware c. Ransomware d. Trojan horse 186. A VPN is: a. Virtual Public Network b. Virtual Private Network c. Virtual Reality Box d. None of the above 187. (True or False) Viruses never damage your computer. 188. Phishing and spoofing scams can be perpetrated via email message, mobile phones, and: a. Websites b. Restaurants c. US Mail d. None of the above Module 1, Quiz (Kahoot) 189. A desktop that does not have a tower and instead houses the screen and system unit in the same case. a. Browser b. All-in-One c. Tablet d. Mobile Device 190. An Internet service that provides remote storage to computer users. a. Desktop b. Hard Drive c. Cloud Storage d. Network 191. The practice that involves reducing the electricity and environmental waste while using a computer and mobile device. a. Recycling b. Green Gardening c. Green Architecture d. Green Computing 192. (True or False) All-in-One computers are more portable than laptops. 25 193. A computer that delivers requested webpages to your computer or mobile device. a. Web server b. Browser c. Search engine d. Application 194. The process of matching the files on computers or mobile devices in two or more locations with each other. a. join b. sync c. connect d. manipulate 195. What is an avenue in a Karel world? a. A row b. A column c. A single point d. Karel’s position CodeHS, Introduction to Programing (with Karel) 196. If Karel starts at Street 1 and Avenue 3 facing East, what street and avenue will Karel be on when this code runs? a. Street 1 and Avenue 3 b. Street 4 and Avenue 4 c. Street 2 and Avenue 6 d. Street 6 and Avenue 2 197. If Karel is facing North and the code turnLeft( ); runs; which direction is Karel facing now? turnLeft( ); a. North b. South c. East d. West 198. What is a street in a Karel world? a. A row b. A column c. A single point d. Karel’s position 26 199. How many times should Karel turn left in order to turn right? a. 1 b. 2 c. 3 d. 4 200. What can be used to teach Karel to turn right? a. Functions b. Variables c. Dog treats d. All of the above 201. Which of these is a valid Karel command? a. move; b. MOVE; c. move (); d. move () 202. 27 203. 28

Use Quizgecko on...
Browser
Browser