Computer Literacy

When a group of computers are linked together this allows them to share what?
Larger corporate, government and Internet applications may use powerful, expensive servers to support their daily operation. True/False
Laptops and other similar computer types can operate solely on batteries. True/False
Most websites such as MSN, Yahoo, or Google require payment for services. True/False
Servers like the one in the accompanying figure typically support only one computer at a time.
Similar to an editorial section in a newspaper, websites like blogs reflect the interest, opinions, and personalities of the author.
Storage devices like _______ hold data, instructions, and information for future use.
hard disk drive
Storage devices like the hard disk often function as a source of input because they transfer items from storage to memory. True/False
The major difference between server computers and client computers are that the client typically has more power, more storage space, and expanded communications capabilities. True/False
The term ______ refers to the worldwide collection of websites.
To select a ______ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow.
USB flash drives and memory cards usually hold more than hard disk. True/False
When connected to the same server, others connected can see what a user has typed. True/False
When using the MLA style, position in-text parenthetical references either at the _______.
bottom of the page as footnotes or at the end of the page as endnotes
A collection of computers and devices connected together, often wirelessly, via communications devices and transmission media.
A website that offers variety of Internet services from a single, convenient location
Alternate term for a laptop
network computer
A _____ symbol is another name for a dot symbol
A blog is an informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order. True/False
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. True/False
A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented. True/False
A game console is small enough to fit in one hand, making it more portable than the handheld game device. True/False
A hot spot is a wireless network that provides Internet connections to mobile computers and devices. True/False
A letterhead shouldn’t contain …
the company’s objective
A lower bandwidth means more data transmits. True/False
A megabyte is equal to approximately one billion characters. True/False
A mobile processor is a type of software for computers and mobile devices that reads a user’s specified web feeds and collects their most recent content. True/False
A note reference mark signals that an explanatory note exists at the bottom of the page as a ______.
A password is a unique combination of characters, such as letters of the alphabet or numbers that identifies one specific user. True/False
A phishing filter will prevent your browsing history, passwords, user names, and other personal information from being revealed. True/False
A search engine displays a list of webpage names that contain the search text. What is the term for that list?
A tag name is an identifier that links a ____ to a source.
A thesaurus can be used to look up a ______ or a word similar in meaning to a given word.
A web ______ is software that finds websites, webpages, images, videos. news, maps, and other information related to a specific topic.
search engine
A web ________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
search engine
A webpage is a collection of related websites. True/False
A ______ address is a number that uniquely identifies the location of each computer or device connected to the Internet.
A _____ address is a number that uniquely identifies the location of each computer or device connected to the Internet.
A ___ device is a computing device small enough to hold in your hand.
A _______ is a collaborative website that allows users to add to, modify, or delete the website content via their browser.
A _______ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
A ______ is a filtering program that stops pop-up ads from displaying on webpages.
A _______ is a mobile computing device designed for single-player or multiplayer video games.
game console
A _____ is a motion you make on a touch screen with the tip of one or more fingers or your hand.
A ________ is a named collection of stored data, instructions, or information and can contain text, images, video, and audio.
A ______ is a portable storage device that is small and lightweight enough to be transported on a keychain or in a pocket.
USB flash drive
A ____ is a type of software for computers and mobile devices that reads a user’s specified web feeds and collects their most recent content.
feed reader
A ___________ is an internet-capable phone that usually also includes a calendar, an appointment book, a calculator, a notepad, games, and several other apps.
A _____ is an input device that converts printed material into a form the computer can process.
A _______ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
search engine
A_____ name is the text based name that corresponds to the IP address of a server that host a website.
An ______ website offers exciting, challenging avenues for formal and informal teaching and learning.
A ___ ,which is similar to a password, consists of several words separated by spaces.
According to netiquette, is the use of all capital letters equivalent to shouting?
According to the MLA style, the __ is a list of sources that are referenced directly in a research paper.
work cited page
All mobile browsers support the use of plug-ins. True/False
“Middle” is a vertical alignment option. True/False
All social networking sites have a specialized audience. True/False
All social networking sites require to confirm a friendship. True/False
Although you can use a dialog box to indent paragraphs, Word provides a quicker way through the ___ .
horizontal ruler
An internet connection is not necessary for participating in e-commerce. True/False
A professional business document should have ____ (3 things).
a professional appearance, convey it’s message concisely, and convey it’s message clearly.
An entertainment website contains content that describes a cause, opinion, or idea. T/F
As an alternative to using the Color button on the picture tools format tab to display the color gallery, you can right-clikc the graphic, click ___ on the shortcut menu, click the Picture button, expand the Picture color section, and select desired options.
format picture
As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research. T/F
Automatic page breaks are determined by paper size, line spacing, and margin settings. T/F
Because technology is constantly changing, you must keep up with it to remain digitally _____.
Bing, Google, and Yahoo! are all examples of web ____.
search engines
Breakthroughs in surgery, medicine, and treatments seldom result from scientists’ use of computers. T/F
Business documents can include all of the following EXCEPT ______ .
personal letters
By default, the Normal style inserts a vertical space equal to ____ line(s) between each line of text.
By default, the Normal style places ____ points of blank space after each paragraph.
Define botnet
A group of compromised computers connected to a network that attacks other networks.
The term, payload, as it pertains to computer crime, is defined as ____.
the destructive event or prank the program is intended to deliver
The term, zombie, is _____.
A computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider.
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
digital forensics
What term is used to describe the process of restricting access to certain material on the web?
content filtering
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____.
information theft
________ is not a safeguard against the failure of hardware.
device-tracking apps
Information kept on an organizations premises has a higher security risk than information transmitted over networks. T/F
With selective backup, all the files in the computer automatically are chosen to be copied. T/F
Biometric devices are an unreliable method of identification and notification. T/F
A file a computer creates that records successful and unsuccessful access attempts.
an audit trail
A program that hides in a computer and allows someone from a remote location to take full control of the computer.
a rootkit
A written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal
an IT code of conduct
Someone who accesses a computer or network illegally with the intent of malicious action.