a. A device that has a screen and keyboard for input and output but does not do its own processing | ||
b. A device that allows users to store information | ||
c. A device that allows users to operate all computer functions | ||
d. A device that has a screen and keyboard for input only |
a. A software application program that allows users to operate the computer | ||
b. A powerful, high-end microcomputer which contains microprocessors | ||
c. A personal computer that is smaller in size | ||
d. A microcomputer which requires less power than a typical PC |
a. Operate like a desktop computer, but they are portable so they can be taken anywhere | ||
b. Do not have the same features as a desktop computer | ||
c. Operate like a tablet computer | ||
d. Operate similar to a smartphone |
a. High-capacity server computers for networks with many client workstations | ||
b. Medium-capacity server computers for a network | ||
c. Backup servers for a personal computer | ||
d. Backup servers for a laptop computer |
a. Manages the overall computer system | ||
b. Manages your computer and the devices connected to it | ||
c. Manages the computer hardware | ||
d. Manages the performance of software programs |
a. To tell the hardware what do to | ||
b. To process information | ||
c. To store information | ||
d. To access online programs |
a. To store information | ||
b. To perform calculations | ||
c. To be used as a Central Processing Unit (CPU) | ||
d. To process information |
a. Sending and receiving e-mail | ||
b. Accessing the Internet | ||
c. Viewing pictures and movies and playing games | ||
d. None of the above; computer use is limitless |
a. A microcomputer is a computer that has a microprocessor chip (or multiple microprocessors) as its CPU. | ||
b. A microcomputer is a smaller version of a desktop computer. | ||
c. A microcomputer is a networking system that can be used by individuals only. | ||
d. A microcomputer is a computer program that provides software data to the hardware. |
a. The computer's software makes the computer work. | ||
b. The Intel processor works with a series of transistors in conjunction to make the computer work. | ||
c. The computer monitor activates the internal receptors, which makes the computer work. | ||
d. Connectivity to the Internet makes the computer hardware and software work. |
a. Forward your e-mail to another e-mail account on file. | ||
b. Discontinue your ability to use other online services. | ||
c. Send letters in the mail reminding you to utilize e-mail services. | ||
d. Discontinue your account due to inactivity. |
a. Request that transactions be performed using methods other than the Internet. | ||
b. Provide information requested without hesitation. | ||
c. Determine the best methods to transmit sensitive information online. | ||
d. Request that the business verify its information prior to sending payment. |
a. available computers. | ||
b. hardware and software components. | ||
c. narrow topics and well-defined research questions. | ||
d. computer terminology. |
a. It allows users to send outgoing e-mails only. | ||
b. It allows users to improve communication between sender and receiver. | ||
c. It allows users to work on e-mails without being connected to the Internet. | ||
d. It allows users to access various client accounts. |
a. a part of the web that users cannot see. | ||
b. a part of the Internet that is much larger than the retrievable part ordinary search engines can find. | ||
c. a part of the Internet which provides information other search engines cannot find. | ||
d. a part of the Internet which serves as additional information. |
a. provide digital message communication to individuals in the same city. | ||
b. enhance communication skills. | ||
c. communicate cheaply, quickly, and easily with people all over the world. | ||
d. communicate with individuals live and in real time. |
a. Create stronger passwords | ||
b. Use computer protection software | ||
c. Become more aware of personal data and who may be gathering it | ||
d. Do not readily provide personal information online |
a. To communicate cheaply, quickly, and easily with people all over the world | ||
b. To accomplish more using the Internet | ||
c. To send letters in e-mail instead of postal mail | ||
d. To provide another method of communicating online |
a. Internet Explorer, Firefox, Google Chrome | ||
b. Word, Excel, PowerPoint | ||
c. AOL, Google, Yahoo | ||
d. iTunes, Windows Media Player |
a. A network of computer networks and its users | ||
b. A network of data that can be accessed by various individuals | ||
c. A system of interlinked hypertext documents accessed via the Internet | ||
d. A system of interlinked data that can be accessed via the Internet |
a. Powering the computer on and off | ||
b. Starting up the computer from a completely powered-off state, skipping any welcome or other splash screens | ||
c. Disconnecting the computer from the network and the Internet | ||
d. Pressing the F2 command while holding the Power function |
a. Twice a year | ||
b. Weekly | ||
c. Monthly | ||
d. Yearly |
a. For each application, such as Adobe Reader or Microsoft Office, check for updates using the built-in method or via the support or download section of the application's website. | ||
b. Routinely unplug the computer and restart it. | ||
c. Routinely search for software updates. | ||
d. Routinely put the computer in sleep mode instead of shutting it down. |
a. Verify that the video graphic card is installed correctly. | ||
b. Hit the escape key a few times to see if the computer will start. | ||
c. Ensure that the appropriate software is installed. | ||
d. Reset the surge protector. |
a. Running automated diagnostic utilities to determine whether there are any computer issues that need to be resolved | ||
b. Receiving notifications from the software company via e-mail to perform system checks | ||
c. Annually checking for updates from Microsoft | ||
d. Automatically installing software programs that may be of interest |
a. An individual who uses parts of the computer | ||
b. An individual who asks users permission to access sensitive information | ||
c. A "bad guy" who tries to break into (hack) computer systems | ||
d. A "good guy" who is skilled in protecting online information |
a. If there is an outage, it protects information from being lost. | ||
b. It protects the user from electric shock. | ||
c. It protects the user's online information. | ||
d. It allows the user to send and receive data securely. |
a. Some individuals are simply curious. | ||
b. These individuals use this information for use in other crimes. | ||
c. They desire to seek revenge from others who have stolen their information. | ||
d. Data is transmitted so easily online that they can easily access it. |
a. Performing an online system check | ||
b. Regularly cleaning dust from the computer | ||
c. Performing a soft reset of the computer | ||
d. Regularly rebooting the computer |
a. Utilize virus protection software. | ||
b. Research a company thoroughly prior to visiting its website. | ||
c. Avoid going to specific websites. | ||
d. Avoid conducting any transactions online. |