Filters
Question type

Study Flashcards

Cloud storage refers to the storage of data on ______.


A) a server on the Internet
B) your mobile device
C) an external drive
D) your desktop computer

Correct Answer

verifed

verified

Maya wants to connect three peripheral devices to her laptop , but has only one USB port. What is the best way to connect all the devices?


A) Convert a different kind of port to a USB port.
B) Connect one device at a time.
C) Use a USB hub.
D) Use peripheral devices in the cloud.

Correct Answer

verifed

verified

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?


A) Attach a hashtag (#) to the post.
B) "Like" their post.
C) Extend your contacts to include more individuals.
D) Share the post on your news feed.

Correct Answer

verifed

verified

Ruthie needs to buy a new laptop for her college courses. One course requires her to use the full, installed version of Microsoft Office. Which operating systems should she choose for the laptop? S


A) ChromeOS
B) Android
C) Windows
D) iOS

Correct Answer

verifed

verified

Which of the following is a step in the email communication process?


A) The recipient opens an email attachment.
B) The message travels along Internet routers to the recipient.
C) Hardware on the server determines the best route for the data.
D) Your Internet service provider contacts software on the outgoing mail server to retrieve the message.

Correct Answer

verifed

verified

Which part of a webpage provides a list of links to other parts of the website.


A) Logo
B) Sidebar
C) Navigation Bar
D) Body

Correct Answer

verifed

verified

Is it advisable to enable automatic updates on security software?


A) Yes; this helps to catch and quarantine new malware before it harms the computer.
B) No; automatic updates can cause create problems in security software.
C) No; automatic updates require excessive storage space and slow the computer.
D) Yes, though you must pay an additional fee for automatic updates.

Correct Answer

verifed

verified

Ricky's social media account was recently hacked. His bank accounts and email accounts use the same password as his social media account, and within a week, they were also hacked. What could Ricky have used to prevent the original attack from affecting so many accounts?


A) Strong password
B) Password manager
C) Remote lockout
D) Encryption

Correct Answer

verifed

verified

How can you check data on devices connected through an IoT network?


A) Use a desktop
B) Use a server
C) Use a tablet
D) Use a network tracker

Correct Answer

verifed

verified

What is the most common type of volatile memory?


A) read-only memory (ROM)
B) flash memory
C) random access memory (RAM)
D) hard disk

Correct Answer

verifed

verified

What feature allows you to repeat steps automatically in a worksheet?


A) Formula
B) Pivot table
C) Macro
D) Conditional formatting

Correct Answer

verifed

verified

Which of these hardware components can you use to store videos?


A) External RAM
B) Programmable ROM
C) Hard drive
D) Motherboard

Correct Answer

verifed

verified

Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?


A) "The quick brown fox"
B) -The quick brown fox-
C) |The quick brown fox|
D) *The quick brown fox*

Correct Answer

verifed

verified

Jake is a sales rep for a trucking company and travels throughout the Mid w est. He uses a cloud-based _________ service so he can access updated information about his customers ' sales transactions from his laptop as he travels.


A) storage
B) CRM
C) email
D) ERP

Correct Answer

verifed

verified

Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?


A) They produce mostly inaccurate results.
B) Their results do not pertain to academic research.
C) Other search engines provide more reliable research.
D) They usually give biased results.

Correct Answer

verifed

verified

When David tries to connect to his home Wi-Fi network, he finds that the router's default Wi-Fi password isn't working even though it worked earlier that day. He resets the device so all the default settings are restored. Two days later, the same problem happens again. What should he change so attackers can't keep reconfiguring his router?


A) Wi-Fi password
B) SSID
C) Access password
D) Guest access

Correct Answer

verifed

verified

How is an executable file different from a data file?


A) Unlike a data file, you can manipulate an executable file.
B) Unlike a data file, executable files contain numbers, words and pictures.
C) Unlike a data file, you cannot open and read executable files.
D) Unlike a data file, executable files can be used for a presentation.

Correct Answer

verifed

verified

You can monitor and protect your financial data in all of the following ways EXCEPT _____.


A) Being cautious about what information you post on social networking sites.
B) Storing financial information in an unsent email message.
C) Querying unfamiliar purchases found on your bank statements.
D) Shredding financial documents before you discard them.

Correct Answer

verifed

verified

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?


A) phishing
B) cyberstalking
C) pretexting
D) research spoofing

Correct Answer

verifed

verified

Kang is a real estate broker and needs to buy software for five people in his office. What type of license agreement should he look for?


A) End user license agreement
B) Site license
C) Multiple-user license agreement
D) Public domain

Correct Answer

verifed

verified

Showing 581 - 600 of 1041

Related Exams

Show Answer