Term
What is computer privacy? |
|
Definition
Answer – Keeping your personal files and data secure and a secret from unauthorized viewing or tampering is called computer privacy. |
|
|
Term
Phishing is a common activity used to extract personal information from computers users and use the information for malicious purposes. |
|
Definition
Answers – True. Phishing extracts personal information and uses it for malicious purposes. |
|
|
Term
Trojan viruses can be stopped with which of the following: |
|
Definition
Answers – Antivirus software can stop most viruses that try to infect your computer. |
|
|
Term
The biggest security risks to your computer are: |
|
Definition
Answers – All of the above. All are potential risks to your computer and your information. |
|
|
Term
What is copyright violation? |
|
Definition
Answers – Using others’ intellectual property without permission is a copyright violation. |
|
|
Term
A keyboard is an example of a _____ device. |
|
Definition
Answers: A keyboard is an input device
|
|
|
Term
Function keys perform different actions depending on what program is running. |
|
Definition
Answers – True. Depending on what program is running, the function keys perform different actions. |
|
|
Term
The CPU acts as the _____ of the computer. |
|
Definition
Answers – The CPU acts as the brain of your computer, processing commands. |
|
|
Term
What determines the speed at which your computer performs tasks? |
|
Definition
Answer – The CPU determines the speed at which tasks are performed. |
|
|
Term
The operating system controls how programs work with each other. |
|
Definition
Answers – True. The operating system controls how programs work with each other. |
|
|
Term
You must have an internet service provider(ISP) to connect to the internet. |
|
Definition
Answers – ISP stands for Internet Service Provider |
|
|
Term
Every website on the internet has a unique IP address. |
|
Definition
Answers – True. Websites are located and opened by browsers using a unique IP address. |
|
|
Term
The ______ is a worldwide collection of public networks that are linked to each other for information exchange. |
|
Definition
Answers – World Wide Web (WWW) |
|
|
Term
Publishing a website requires a service provider to host the site on an internet server. |
|
Definition
Answer- If you want to publish a website you need to work with a service to host the files.bli |
|
|
Term
An electronic form of traditional postal mail that allows you to exchange messages and files over the network is called: |
|
Definition
|
|
Term
Digital technology has intergrated what we listen to, watch, and how we communicate. |
|
Definition
True. Digital technology has integrated what we listen to and watch, how we share information, and how we communicate. |
|
|
Term
You can download movies, music, and other media to all your devices including a smart tv, phone, tablet, and computer. |
|
Definition
True. All of your devices can share and use the same digital files. |
|
|
Term
With a _____ you can call, text, or email from just about anywhere. |
|
Definition
Smartphone. You can make phone calls, send text messages and email by using a smartphone. |
|
|
Term
A video game console can expand your viewing surface and run buisness and writing applications. |
|
Definition
False. A tablet can expand your viewing space and run business and writing applications. |
|
|
Term
Which of the following audio file formats is commonly not compressed. |
|
Definition
WAV are commonly not compressed in order to keep the highest possible sound quality. |
|
|
Term
MP3 files are commonly used to stream music on the internet. |
|
Definition
True. MP3 is a very popular file format for streaming audio on the Internet. |
|
|
Term
Speaking to your computer to write a document is an example of what? |
|
Definition
Speech recognition allows users to speak to a computer to dictate text documents. |
|
|
Term
All computers can use speech synthesis. |
|
Definition
False. Speech synthesis requires speech to text software, and speakers (or headphones) and any required sound cards. |
|
|