1/172
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
True
Unless you are a network administrator, you likely will not directly interact with a server operating system.
True
In a GUI, a button is an icon you tap, or click to execute commands you need to work with an app.
small pictures that represent an app, file, or peripheral device
When working with his GUI, Isaak uses icons, which are ________.
billions
When a file size is measured in gigabytes, it is measured in _____ bytes of data.
True
Every program or app, including the operating system, requires RAM.
platform
An operating system also is called a _____.
starts up
Tierney’s computer goes through the boot process when it _______.
temporarily store open apps and data while they are being processed
Masha’s operating system uses RAM to _______.
placing data into a buffer
CJ’s computer is spooling, which means that it is ______.
window with controls that tell the system how to complete a command
In a GUI, a dialog box, is a _______.
False
To customize the operating system on a Window computer, you use the Customize dialog box.
the instructions needed to run a program or app
An executable file contains ______.
False
When you send a file or folder to the Recycle Bin or Trash folder, it is permanently removed from the device.
True
Microsoft OneDrive is an example to an app used to access a cloud storage location.
many users on networked computers
A server operating system supports ______.
Android & iOS
Examples of mobile operating system include the following.
system
The software that runs a computer is called the _______ software.
True
Microsoft Windows is a popular operating system.
False
You can use his computer or device without installing an operating system.
enable you yo perform maintenance-type tasks
Operating systems provide apps or programs called utilities that ________.
The score of an operating system, which manages memory, runs programs, and assigns resources.
What is kernel?
False
Yuri can use his computer or device without installing an operating system.
words, numbers, and pictures that you can manipulate
A data file contains ________.
turn a feature on or off each time a user clicks or presses it
A toggle key is used to ________.
False
An operating system’s Sleep option is used to shut down the computer.
.aspx & .xml
Shane is a web designer. Which type of file extensions is he likely to use for his work?
effects applied to objects, such as having a photo fade in
When Ben applies animations in his presentation, he is specifying _______.
False
It is recommended that when delivering a presentation, you should simply read the information on the sides.
True
Harry uses Bluetooth to connect his smartphone to a portable keyboard.
insert premade pictures and symbols
Emma uses clip art in her electronic documents to _____.
False
A worksheet is a collection of related workbooks contained within a single file.
device management
File managers and screen savers are examples of ____ apps.
a specific cell and does not change if you copy the formula to a new location
Muhammed is creating a formula in his worksheet. He uses an absolute cell reference to refer to ______.
Microsoft Teams & Slack
Which of the following are examples of messaging tools used for collaboration?
set of letters, numbers, and symbols that have the same style and appearance
A font is a _______.
False
All software programs are apps.
mathematical symbols
In a worksheet calculation, operators are ______.
record
Which of the following represents a complete set of field values for a specific person, place, or object?
if values meet specified criteria
Conditional formatting is applied _____.
banking and payment
Judson uses Venmo, which is a type of ____ app.
Apple iWork & Apache OpenOffice
Which of the following are examples of productivity suites?
False
Mobile apps are faster and have more features than native or desktop apps.
shapes, curves, lines, and text
Vector graphics consist of __________.
extract data based on a specific criteria or conditions
A query is used to ______.
data trends
Elena is preparing a report of sales data. She uses a sparkline to show ______.
True
The most secure shredder is a micro-shredder device.
True
In a social engineering attack, the attacker presents themselves as someone who can be trusted.
continuous cloud
Conor is deciding how to backup his data. He decides to choose the most comprehensive backup solution, which is _______.
True
A hacktivist is an attacker who target businesses or government agencies with which they disagree.
specifying the design and arrangement of items so he can work efficiently and safely
Kelvin makes sure he follows ergonomics, which means that he is _______.
True
Many websites consider cyberbullying to be free speech and will not censor it.
True
A computer virus is designed to copy itself into other programs.
phishing & typo squatting
Examples of social engineering attacks include _____.
donate, recycle & buy green
Which of the following are action steps of SEM?
Balanced & Strict
Microsoft Edge browser security modes include ________.
False
Today, hacker is the formal term used to describe an individual responsible for cyberattacks.
True
Cybersecurity refers to the ways you protect your devices and data.
False
It is recommended that you configure your devices to wait for your authorization to download and install patches.
False
Antivirus software is more complete security solution than animalware software.
Sustainable
The SEM initiative stands for _________ Electronics Management.
injury associated with repeated usage of devices
Dawood has an RSI, which is a ______.
interface
A GUI controls the ______ of an operating system.
virtualization
The practice of sharing computing resources among multiple computers or device is called _______.
False
A data file contains the instructions your computer or device needs to run programs and apps.
kernel
The core of an operating system is its ______.
default
Standard settings that control how the screen is set up are called ______ settings.
resources
An operating system controls the components required to perform work, called the _______.
True
When you move a file to the Recycle Bin or Trash, it still takes up storage space, but no longer appears in the folder or location where it was created.
partition
The separate hard disk space on which a virtual machine functions is called a _______.
administrator
The user account that provides full access to the computer is called a ________ account.
Gigabytes
Which of the following units measure billions of bytes of data?
web apps
Microsoft Office 365 and Google Docs are examples of _______.
Finder
You can locate a file in the macOS using the ________.
the device upon which it is installed
A native app runs from ______.
synchronize
When an app is available as both a web app and a native app, you can ______ the data and settings so that the app is set up the same way on all of your devices.
photo editing
Canva is an example of a _____ app.
True
Mobile apps are not as fast as and have fewer features than desktop apps.
after a period of no keyboard or mouse activity
A screen saver appears _______.
styl
A named collection of formats that are stored together and can be applied to text or objects is called a ______.
operators
In a spreadsheet formula, characters such as "+", "-", "*", and "/" are called ______.
animation
In a presentation, an effect that you apply to an object that makes the object appear, disappear, or move is called a(n) ______.
record
In a database table, a row of data in a table is called a _______>
bitmap
Most paint programs product ______ images.
drawing
Adobe Illustrator is an example of a _______ app.
True
Google Photos is an example of a photo management app.
technologies
Cybersecurity refers to protecting devices, networks, and programs with practices, processes, and _______.
identity theft
An attack that occurs when an attacker steals your Social Security number and then uses that to impersonate you is called ________.
increased speed of attacks
The one factor that undoubtedly accounts for the greatest difficulty in preventing attacks is ______.
Brokers
What category of cyber attacker sells software vulnerabilities to the highest bidder?
Ransomware
Which of the following attacks locks down a user’s device until a fee is paid?
The accuracy of the data cannot be verified
A risk of data collection is ______>
RSI
What is the name of the technology hazard that impacts your muscles, nerves, tendons, and ligaments
True
Data backups can protect you from more than just cybersecurity attacks.
length
The most important characteristic of a password that makes it resistant to attacks is ______.
Promptly installing patches
What is the most important step to protecting a device?
Antimalware software should be recognized as one tool for protection
Which of the following is correct about antimalware software?
True
A recommended ergonomic practice is to have your arms parallel to the floor at approximately a 90-degree angle.
True
Big data refers to large and complex data sources.
how a slide appears on the screen in his place of the previous cable
When Ben applies transitions in his presentation, he is specifying ________.
suite
A collection of productivity apps is called a productivity _______.