Self Test 4, 5, 6

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/172

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:06 PM on 3/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

173 Terms

1
New cards

True

Unless you are a network administrator, you likely will not directly interact with a server operating system.

2
New cards

True

In a GUI, a button is an icon you tap, or click to execute commands you need to work with an app.

3
New cards

small pictures that represent an app, file, or peripheral device

When working with his GUI, Isaak uses icons, which are ________.

4
New cards

billions

When a file size is measured in gigabytes, it is measured in _____ bytes of data.

5
New cards

True

Every program or app, including the operating system, requires RAM.

6
New cards

platform

An operating system also is called a _____.

7
New cards

starts up

Tierney’s computer goes through the boot process when it _______.

8
New cards

temporarily store open apps and data while they are being processed

Masha’s operating system uses RAM to _______.

9
New cards

placing data into a buffer

CJ’s computer is spooling, which means that it is ______.

10
New cards

window with controls that tell the system how to complete a command

In a GUI, a dialog box, is a _______.

11
New cards

False

To customize the operating system on a Window computer, you use the Customize dialog box.

12
New cards

the instructions needed to run a program or app

An executable file contains ______.

13
New cards

False

When you send a file or folder to the Recycle Bin or Trash folder, it is permanently removed from the device.

14
New cards

True

Microsoft OneDrive is an example to an app used to access a cloud storage location.

15
New cards

many users on networked computers

A server operating system supports ______.

16
New cards

Android & iOS

Examples of mobile operating system include the following.

17
New cards

system

The software that runs a computer is called the _______ software.

18
New cards

True

Microsoft Windows is a popular operating system.

19
New cards

False

You can use his computer or device without installing an operating system.

20
New cards

enable you yo perform maintenance-type tasks

Operating systems provide apps or programs called utilities that ________.

21
New cards

The score of an operating system, which manages memory, runs programs, and assigns resources.

What is kernel?

22
New cards

False

Yuri can use his computer or device without installing an operating system.

23
New cards

words, numbers, and pictures that you can manipulate

A data file contains ________.

24
New cards

turn a feature on or off each time a user clicks or presses it

A toggle key is used to ________.

25
New cards

False

An operating system’s Sleep option is used to shut down the computer.

26
New cards

.aspx & .xml

Shane is a web designer. Which type of file extensions is he likely to use for his work?

27
New cards

effects applied to objects, such as having a photo fade in

When Ben applies animations in his presentation, he is specifying _______.

28
New cards

False

It is recommended that when delivering a presentation, you should simply read the information on the sides.

29
New cards

True

Harry uses Bluetooth to connect his smartphone to a portable keyboard.

30
New cards

insert premade pictures and symbols

Emma uses clip art in her electronic documents to _____.

31
New cards

False

A worksheet is a collection of related workbooks contained within a single file.

32
New cards

device management

File managers and screen savers are examples of ____ apps.

33
New cards

a specific cell and does not change if you copy the formula to a new location

Muhammed is creating a formula in his worksheet. He uses an absolute cell reference to refer to ______.

34
New cards

Microsoft Teams & Slack

Which of the following are examples of messaging tools used for collaboration?

35
New cards

set of letters, numbers, and symbols that have the same style and appearance

A font is a _______.

36
New cards

False

All software programs are apps.

37
New cards

mathematical symbols

In a worksheet calculation, operators are ______.

38
New cards

record

Which of the following represents a complete set of field values for a specific person, place, or object?

39
New cards

if values meet specified criteria

Conditional formatting is applied _____.

40
New cards

banking and payment

Judson uses Venmo, which is a type of ____ app.

41
New cards

Apple iWork & Apache OpenOffice

Which of the following are examples of productivity suites?

42
New cards

False

Mobile apps are faster and have more features than native or desktop apps.

43
New cards

shapes, curves, lines, and text

Vector graphics consist of __________.

44
New cards

extract data based on a specific criteria or conditions

A query is used to ______.

45
New cards

data trends

Elena is preparing a report of sales data. She uses a sparkline to show ______.

46
New cards

True

The most secure shredder is a micro-shredder device.

47
New cards

True

In a social engineering attack, the attacker presents themselves as someone who can be trusted.

48
New cards

continuous cloud

Conor is deciding how to backup his data. He decides to choose the most comprehensive backup solution, which is _______.

49
New cards

True

A hacktivist is an attacker who target businesses or government agencies with which they disagree.

50
New cards

specifying the design and arrangement of items so he can work efficiently and safely

Kelvin makes sure he follows ergonomics, which means that he is _______.

51
New cards

True

Many websites consider cyberbullying to be free speech and will not censor it.

52
New cards

True

A computer virus is designed to copy itself into other programs.

53
New cards

phishing & typo squatting

Examples of social engineering attacks include _____.

54
New cards

donate, recycle & buy green

Which of the following are action steps of SEM?

55
New cards

Balanced & Strict

Microsoft Edge browser security modes include ________.

56
New cards

False

Today, hacker is the formal term used to describe an individual responsible for cyberattacks.

57
New cards

True

Cybersecurity refers to the ways you protect your devices and data.

58
New cards

False

It is recommended that you configure your devices to wait for your authorization to download and install patches.

59
New cards

False

Antivirus software is more complete security solution than animalware software.

60
New cards

Sustainable

The SEM initiative stands for _________ Electronics Management.

61
New cards

injury associated with repeated usage of devices

Dawood has an RSI, which is a ______.

62
New cards

interface

A GUI controls the ______ of an operating system.

63
New cards

virtualization

The practice of sharing computing resources among multiple computers or device is called _______.

64
New cards

False

A data file contains the instructions your computer or device needs to run programs and apps.

65
New cards

kernel

The core of an operating system is its ______.

66
New cards

default

Standard settings that control how the screen is set up are called ______ settings.

67
New cards

resources

An operating system controls the components required to perform work, called the _______.

68
New cards

True

When you move a file to the Recycle Bin or Trash, it still takes up storage space, but no longer appears in the folder or location where it was created.

69
New cards

partition

The separate hard disk space on which a virtual machine functions is called a _______.

70
New cards

administrator

The user account that provides full access to the computer is called a ________ account.

71
New cards

Gigabytes

Which of the following units measure billions of bytes of data?

72
New cards

web apps

Microsoft Office 365 and Google Docs are examples of _______.

73
New cards

Finder

You can locate a file in the macOS using the ________.

74
New cards

the device upon which it is installed

A native app runs from ______.

75
New cards

synchronize

When an app is available as both a web app and a native app, you can ______ the data and settings so that the app is set up the same way on all of your devices.

76
New cards

photo editing

Canva is an example of a _____ app.

77
New cards

True

Mobile apps are not as fast as and have fewer features than desktop apps.

78
New cards

after a period of no keyboard or mouse activity

A screen saver appears _______.

79
New cards

styl

A named collection of formats that are stored together and can be applied to text or objects is called a ______.

80
New cards

operators

In a spreadsheet formula, characters such as "+", "-", "*", and "/" are called ______.

81
New cards

animation

In a presentation, an effect that you apply to an object that makes the object appear, disappear, or move is called a(n) ______.

82
New cards

record

In a database table, a row of data in a table is called a _______>

83
New cards

bitmap

Most paint programs product ______ images.

84
New cards

drawing

Adobe Illustrator is an example of a _______ app.

85
New cards

True

Google Photos is an example of a photo management app.

86
New cards

technologies

Cybersecurity refers to protecting devices, networks, and programs with practices, processes, and _______.

87
New cards

identity theft

An attack that occurs when an attacker steals your Social Security number and then uses that to impersonate you is called ________.

88
New cards

increased speed of attacks

The one factor that undoubtedly accounts for the greatest difficulty in preventing attacks is ______.

89
New cards

Brokers

What category of cyber attacker sells software vulnerabilities to the highest bidder?

90
New cards

Ransomware

Which of the following attacks locks down a user’s device until a fee is paid?

91
New cards

The accuracy of the data cannot be verified

A risk of data collection is ______>

92
New cards

RSI

What is the name of the technology hazard that impacts your muscles, nerves, tendons, and ligaments

93
New cards

True

Data backups can protect you from more than just cybersecurity attacks.

94
New cards

length

The most important characteristic of a password that makes it resistant to attacks is ______.

95
New cards

Promptly installing patches

What is the most important step to protecting a device?

96
New cards

Antimalware software should be recognized as one tool for protection

Which of the following is correct about antimalware software?

97
New cards

True

A recommended ergonomic practice is to have your arms parallel to the floor at approximately a 90-degree angle.

98
New cards

True

Big data refers to large and complex data sources.

99
New cards

how a slide appears on the screen in his place of the previous cable

When Ben applies transitions in his presentation, he is specifying ________.

100
New cards

suite

A collection of productivity apps is called a productivity _______.

Explore top flashcards

flashcards
English 1111-Sadlier Unit IIII
20
Updated 1242d ago
0.0(0)
flashcards
APHUG Unit 6 & 7 Vocab
50
Updated 1066d ago
0.0(0)
flashcards
PSYC 14
64
Updated 188d ago
0.0(0)
flashcards
Kafli 9 - Choice and Preference
43
Updated 120d ago
0.0(0)
flashcards
Fifty common Russian verbs
51
Updated 435d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1206d ago
0.0(0)
flashcards
PA Drivers Permit Flashcards
166
Updated 1056d ago
0.0(0)
flashcards
Unit 1A
61
Updated 1160d ago
0.0(0)
flashcards
English 1111-Sadlier Unit IIII
20
Updated 1242d ago
0.0(0)
flashcards
APHUG Unit 6 & 7 Vocab
50
Updated 1066d ago
0.0(0)
flashcards
PSYC 14
64
Updated 188d ago
0.0(0)
flashcards
Kafli 9 - Choice and Preference
43
Updated 120d ago
0.0(0)
flashcards
Fifty common Russian verbs
51
Updated 435d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1206d ago
0.0(0)
flashcards
PA Drivers Permit Flashcards
166
Updated 1056d ago
0.0(0)
flashcards
Unit 1A
61
Updated 1160d ago
0.0(0)