BUS 1305 Final

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/124

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

125 Terms

1
New cards
which company was the first to develop a computer meant for personal use?
Apple
2
New cards
Cloud storage refers to the storage of data on \_____
a server on the Internet
3
New cards
what technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
4
New cards
\_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space
virtual reality (VR)
5
New cards
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality (VR)
6
New cards
how do advertisers use data to know which products would most likely appeal to you?
they track your Facebook and Instagram posts and "likes"
7
New cards
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
8
New cards
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's \_____.
intellectual property rights
9
New cards
The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?
a learning management system
10
New cards
which of the following would be considered a professional networking website?
LinkedIn
11
New cards
\____ is an environment where processors are embedded in objects that communicate with one another via Internet or wireless networks.
The Internet of Things
12
New cards
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?
It is using virtual reality.
13
New cards
T/F: A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.
True
14
New cards
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?
captioning software can be used to transcribe what is being said
15
New cards
\____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
the digital divide
16
New cards
The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) \______.
learning management system (LMS)
17
New cards
Which of the following is a web app?
Google Docs
18
New cards
Which of the following is assigned to each webpage to identify its location on the Internet?
uniform resource locator (URL)
19
New cards
A(n) \______ is an electronic document that can contain text, graphics, sound, video, and links.
webpage
20
New cards
Cloud storage refers to the storage of data on \_______.
a server on the Internet
21
New cards
In a web app, where is data usually stored?
cloud storage
22
New cards
Google is an example of which type of website?
A search site
23
New cards
Which of the following does a secure website use to safeguard transmitted information?
encryption
24
New cards
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?
Yes; it is a business transaction on a consumer-to-consumer website.
25
New cards
T/F: An e-commerce website offers fewer models, colors, and sizes than a physical store
False
26
New cards
Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?
Price comparisons from different vendors
27
New cards
What does a B2C website use to track the items you select on the website?
cookies
28
New cards
Which of the statements about B2B e-commerce is correct?
Examples of B2B services are advertising, technical support, and training.
29
New cards
Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce website will Blackbaud have?
business to business
30
New cards
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?
spiders
31
New cards
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's \_____.
intellectual property rights
32
New cards
Which of the following people will benefit the most from using a B2B website?
Akiko, who helps smaller businesses establish themselves in the market
33
New cards
Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?
add a formal citation and use the farmer's explanation in the paper
34
New cards
Where can you find the information about using an image that you obtained in a search result?
A usage rights filter shows information about using an image
35
New cards
What are "hits" that search engines list on the first page?
most relevant results
36
New cards
T/F: A specialty search engine lets you search online information sources that general search engines do not always access.
True
37
New cards
Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?
The author uses emotional language to express a single point of view.
38
New cards
T/F: You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated.
False. CARS stands for credible, accurate, reasonable, and supportable.
39
New cards
Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study?
Articles published in a newspaper known to be neutral toward any political party.
40
New cards
Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?
Use the web directories created by health research institutions
41
New cards
Which of the following stories can be said to be in the public domain?
A copyrighted story whose copyright has expired
42
New cards
Kyle likes to keep in touch with his friends and family using the Internet. He enjoys sharing pictures, music, and ideas. He also enjoys playing games with others online. Which of the following online platforms should he use to do all of this?
Facebook, because it is an online social network that allows game play.
43
New cards
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
"https" as the protocol in the URL
44
New cards
Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?
Other search engines provide more reliable research.
45
New cards
What is the binary system?
a number system with two digits, 0 and 1
46
New cards
Which of these is an optical medium of storage?
Blu-ray disc
47
New cards
Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?
processor core- some applications, especially games, have greater processor requirements
48
New cards
Alex needs to email his graduation certificate to a prospective employer. He only has physical copies of the certificate. What device could he use to create an electronic copy of the certificate?
scanner
49
New cards
Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?
Gamepad
50
New cards
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
Plotter
51
New cards
What is the most suitable device to use in a classroom or a conference room to deliver presentations?
Projector
52
New cards
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
Plug-and-play devices
53
New cards
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
a desktop computer
54
New cards
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?
He should have periodic anti-virus scanning and software upgraded on all computers.
55
New cards
Which of these is not an input device?
printer
56
New cards
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
57
New cards
An operating system is also called a(n) \_______
platform
58
New cards
A(n) \____ contains the instructions your computer or device needs to run programs and apps.
executable file
59
New cards
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
60
New cards
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
61
New cards
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
62
New cards
\____ is data and instructions entered into the memory of a device.
Input
63
New cards
Which of the following is not an input device?
headphone
64
New cards
Technology can lead to all of the following behavioral risks EXCEPT \_________.
higher satisfaction with life
65
New cards
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of \________.
cyberbullying
66
New cards
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
67
New cards
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
68
New cards
How can you protect a computer from electrical spikes and surges?
use a surge protector
69
New cards
in terms of privacy, which of the following is a best practice?
keeping your Social security number hidden in a locked box in your home
70
New cards
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
71
New cards
Which of the following is the strongest password?
H@veAGr3atDaY!
72
New cards
\_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
73
New cards
How does encryption work?
It scrambles the information until the key is used to unscramble it.
74
New cards
What is a digital certificate?
Technology used to verify a user's identity.
75
New cards
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
76
New cards
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser
77
New cards
Which of the following types of websites typically provides the least security?
social media sites
78
New cards
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
79
New cards
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
80
New cards
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
81
New cards
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
82
New cards
Creating a(n) \_____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
83
New cards
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
84
New cards
Which would a password manager allow you to do?
Create and store multiple strong passwords
85
New cards
In which of the following situations is a digital certificate useful?
You are signing a rental lease
86
New cards
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email
87
New cards
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
be cautious about what information she posts
88
New cards
What type of security requires something you know and something you have that no one else has?
two factor authentication
89
New cards
Which of the following problematic behaviors relies on the use of digital technology?
cyberbullying
90
New cards
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of \____________.
digital citizenship
91
New cards
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
acceptable use policy (AUP)
92
New cards
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of \__________.
catfishing
93
New cards
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of \___________.
the digital divide
94
New cards
What rules should guide your behavior when you interact with friends and coworkers on social media?
netiquette
95
New cards
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own \___________.
digital footprint
96
New cards
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a \______________.
digital detox
97
New cards
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
repetitive strain injury
98
New cards
Lacey just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with her old phone?
Reset the old phone to factory settings
99
New cards
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?
remove the battery and throw it in the trash
100
New cards
How might a business use a blog?
To communicate with customers