Filters
Question type

Study Flashcards

Adware poses a security risk because it can track and steal your personal information. _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ computer provides a detachable keyboard base that has extra ports or drives.


A) desktop
B) convertible
C) ultrabook
D) tablet

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

If you need Microsoft Office or other installed programs, keep in mind that not all tablets can run traditional programs.

A) True
B) False

Correct Answer

verifed

verified

____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.


A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

If two monitors connected to your computer are blank, you may have a damaged ____.


A) video card
B) firewall
C) tablet
D) internal hard drive

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

____ automatically protects all of the data on your computer.


A) Virtual memory
B) Optical storage
C) A firewall
D) Full data encryption

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The term Ultrabook is a registered trademark of the Intel Corporation. _________________________

A) True
B) False

Correct Answer

verifed

verified

True

When cleaning a computer screen, you can use a 50/50 solution of water and ____.


A) dish soap
B) baking soda
C) ammonia
D) alcohol

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Many business people use scanning apps, turning their smartphones into portable scanners.

A) True
B) False

Correct Answer

verifed

verified

True

____ is temporary storage used to store data and operate programs while the computer is running.


A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Because wires can get tangled, many add-on devices can connect wirelessly using Bluetooth technology. _________________________

A) True
B) False

Correct Answer

verifed

verified

Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.

A) True
B) False

Correct Answer

verifed

verified

____ are short words or phrases kept secret by a person and used to gain access to a site or data.


A) Usernames
B) Passwords
C) PINs
D) Bytes

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Cloud storage technology uses light in the form of a low-power laser beam to record and read a disk. _________________________

A) True
B) False

Correct Answer

verifed

verified

The ____ is the size and shape of the computer.


A) device driver
B) form factor
C) platform
D) operating system

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Hard drive storage uses magnetic technology to arrange particles on the disk.

A) True
B) False

Correct Answer

verifed

verified

You can use a cable lock to secure a computer to a table or desk. _________________________

A) True
B) False

Correct Answer

verifed

verified

____ are short number sequences, kept secret and frequently used by banks, used to access accounts.


A) Usernames
B) Passwords
C) Bytes
D) PINs

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.

A) True
B) False

Correct Answer

verifed

verified

True

A ____ is software that helps peripheral devices communicate with a computer.


A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 75

Related Exams

Show Answer