a. A device that has a screen and keyboard for input and output but does not do its own processing ![]() |
||
b. A device that allows users to store information ![]() |
||
c. A device that allows users to operate all computer functions ![]() |
||
d. A device that has a screen and keyboard for input only ![]() |
a. A software application program that allows users to operate the computer ![]() |
||
b. A powerful, high-end microcomputer which contains microprocessors ![]() |
||
c. A personal computer that is smaller in size ![]() |
||
d. A microcomputer which requires less power than a typical PC ![]() |
a. Operate like a desktop computer, but they are portable so they can be taken anywhere ![]() |
||
b. Do not have the same features as a desktop computer ![]() |
||
c. Operate like a tablet computer ![]() |
||
d. Operate similar to a smartphone ![]() |
a. High-capacity server computers for networks with many client workstations ![]() |
||
b. Medium-capacity server computers for a network ![]() |
||
c. Backup servers for a personal computer ![]() |
||
d. Backup servers for a laptop computer ![]() |
a. Manages the overall computer system ![]() |
||
b. Manages your computer and the devices connected to it ![]() |
||
c. Manages the computer hardware ![]() |
||
d. Manages the performance of software programs ![]() |
a. To tell the hardware what do to ![]() |
||
b. To process information ![]() |
||
c. To store information ![]() |
||
d. To access online programs ![]() |
a. To store information ![]() |
||
b. To perform calculations ![]() |
||
c. To be used as a Central Processing Unit (CPU) ![]() |
||
d. To process information ![]() |
a. Sending and receiving e-mail ![]() |
||
b. Accessing the Internet ![]() |
||
c. Viewing pictures and movies and playing games ![]() |
||
d. None of the above; computer use is limitless ![]() |
a. A microcomputer is a computer that has a microprocessor chip (or multiple microprocessors) as its CPU. ![]() |
||
b. A microcomputer is a smaller version of a desktop computer. ![]() |
||
c. A microcomputer is a networking system that can be used by individuals only. ![]() |
||
d. A microcomputer is a computer program that provides software data to the hardware. ![]() |
a. The computer’s software makes the computer work. ![]() |
||
b. The Intel processor works with a series of transistors in conjunction to make the computer work. ![]() |
||
c. The computer monitor activates the internal receptors, which makes the computer work. ![]() |
||
d. Connectivity to the Internet makes the computer hardware and software work. ![]() |
a. Forward your e-mail to another e-mail account on file. ![]() |
||
b. Discontinue your ability to use other online services. ![]() |
||
c. Send letters in the mail reminding you to utilize e-mail services. ![]() |
||
d. Discontinue your account due to inactivity. ![]() |
a. Request that transactions be performed using methods other than the Internet. ![]() |
||
b. Provide information requested without hesitation. ![]() |
||
c. Determine the best methods to transmit sensitive information online. ![]() |
||
d. Request that the business verify its information prior to sending payment. ![]() |
a. available computers. ![]() |
||
b. hardware and software components. ![]() |
||
c. narrow topics and well-defined research questions. ![]() |
||
d. computer terminology. ![]() |
a. It allows users to send outgoing e-mails only. ![]() |
||
b. It allows users to improve communication between sender and receiver. ![]() |
||
c. It allows users to work on e-mails without being connected to the Internet. ![]() |
||
d. It allows users to access various client accounts. ![]() |
a. a part of the web that users cannot see. ![]() |
||
b. a part of the Internet that is much larger than the retrievable part ordinary search engines can find. ![]() |
||
c. a part of the Internet which provides information other search engines cannot find. ![]() |
||
d. a part of the Internet which serves as additional information. ![]() |
a. provide digital message communication to individuals in the same city. ![]() |
||
b. enhance communication skills. ![]() |
||
c. communicate cheaply, quickly, and easily with people all over the world. ![]() |
||
d. communicate with individuals live and in real time. ![]() |
a. Create stronger passwords ![]() |
||
b. Use computer protection software ![]() |
||
c. Become more aware of personal data and who may be gathering it ![]() |
||
d. Do not readily provide personal information online ![]() |
a. To communicate cheaply, quickly, and easily with people all over the world ![]() |
||
b. To accomplish more using the Internet ![]() |
||
c. To send letters in e-mail instead of postal mail ![]() |
||
d. To provide another method of communicating online ![]() |
a. Internet Explorer, Firefox, Google Chrome ![]() |
||
b. Word, Excel, PowerPoint ![]() |
||
c. AOL, Google, Yahoo ![]() |
||
d. iTunes, Windows Media Player ![]() |
a. A network of computer networks and its users ![]() |
||
b. A network of data that can be accessed by various individuals ![]() |
||
c. A system of interlinked hypertext documents accessed via the Internet ![]() |
||
d. A system of interlinked data that can be accessed via the Internet ![]() |
a. Powering the computer on and off ![]() |
||
b. Starting up the computer from a completely powered-off state, skipping any welcome or other splash screens ![]() |
||
c. Disconnecting the computer from the network and the Internet ![]() |
||
d. Pressing the F2 command while holding the Power function ![]() |
a. Twice a year ![]() |
||
b. Weekly ![]() |
||
c. Monthly ![]() |
||
d. Yearly ![]() |
a. For each application, such as Adobe Reader or Microsoft Office, check for updates using the built-in method or via the support or download section of the application’s website. ![]() |
||
b. Routinely unplug the computer and restart it. ![]() |
||
c. Routinely search for software updates. ![]() |
||
d. Routinely put the computer in sleep mode instead of shutting it down. ![]() |
a. Verify that the video graphic card is installed correctly. ![]() |
||
b. Hit the escape key a few times to see if the computer will start. ![]() |
||
c. Ensure that the appropriate software is installed. ![]() |
||
d. Reset the surge protector. ![]() |
a. Running automated diagnostic utilities to determine whether there are any computer issues that need to be resolved ![]() |
||
b. Receiving notifications from the software company via e-mail to perform system checks ![]() |
||
c. Annually checking for updates from Microsoft ![]() |
||
d. Automatically installing software programs that may be of interest ![]() |
a. An individual who uses parts of the computer ![]() |
||
b. An individual who asks users permission to access sensitive information ![]() |
||
c. A “bad guy” who tries to break into (hack) computer systems ![]() |
||
d. A “good guy” who is skilled in protecting online information ![]() |
a. If there is an outage, it protects information from being lost. ![]() |
||
b. It protects the user from electric shock. ![]() |
||
c. It protects the user’s online information. ![]() |
||
d. It allows the user to send and receive data securely. ![]() |
a. Some individuals are simply curious. ![]() |
||
b. These individuals use this information for use in other crimes. ![]() |
||
c. They desire to seek revenge from others who have stolen their information. ![]() |
||
d. Data is transmitted so easily online that they can easily access it. ![]() |
a. Performing an online system check ![]() |
||
b. Regularly cleaning dust from the computer ![]() |
||
c. Performing a soft reset of the computer ![]() |
||
d. Regularly rebooting the computer ![]() |
a. Utilize virus protection software. ![]() |
||
b. Research a company thoroughly prior to visiting its website. ![]() |
||
c. Avoid going to specific websites. ![]() |
||
d. Avoid conducting any transactions online. ![]() |