Exam 12: Technology and Computing: Part A

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A cloud server can be used to back up your data.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

What type of cyberattack is used to trick a user into giving valuable information to an attacker?

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

D

A scanner is a type of computer hardware.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Which of the following is not a computer hardware?

(Multiple Choice)
4.8/5
(29)

Rita is designing a digital card on her cellphone for her mother's birthday.She wants to crop out certain portions of her mother's photograph to use on the card.Which of these apps can she use to do this?

(Multiple Choice)
4.9/5
(34)

Which of the following statements is NOT true about network standards?

(Multiple Choice)
4.7/5
(36)

In which phase of the software development life cycle are the necessary hardware and programming languages/tools acquired?

(Multiple Choice)
4.8/5
(35)

The practice of social curationis when a website provides links to other relevant websites in its field.

(True/False)
4.8/5
(33)

How many different types of operating systems are there?

(Multiple Choice)
4.9/5
(36)

If you do not know how to code or design a website from scratch,then which of the following could you do instead?

(Multiple Choice)
4.9/5
(38)

Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend.Which of the following websites can she use to find this information?

(Multiple Choice)
4.8/5
(36)

The direction in which text is printed on a page is called style. ​

(True/False)
4.8/5
(39)

Every program or app requires RAM,which is the volatile and temporary storages for open apps and data.

(True/False)
4.8/5
(38)

If you want to be sure you are practicing green computing,which of the following would be something you would do?

(Multiple Choice)
5.0/5
(33)

The technology field has become rather elite,only hiring those with extreme talent in game design and Internet security.

(True/False)
4.9/5
(38)

Development is the process of creating programs and apps from idea stage to distribution to users.

(True/False)
4.7/5
(38)

Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.

(True/False)
4.7/5
(36)

For keywords pertaining to academic research,Google returns more relevant and reliable results than Google Scholar,since Google Scholar is a subsidiary of the larger umbrella of Google.

(True/False)
4.8/5
(36)

Speech recognition software allows a device like a laptop or smartphone to recognize the user's voice.

(True/False)
4.9/5
(38)

Bernie is an aspiring video game developer.Learning which of the following software(s)would benefit him the most?

(Multiple Choice)
4.7/5
(36)
Showing 1 - 20 of 22
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)