Exam 3: Computers and Mobile Devices: Evaluating the Possibilities
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
Which of the following refers to the case that contains and protects the motherboard?
(Multiple Choice)
4.8/5
(36)
Mobile users are susceptible to hardware theft because the size and weight of their computers and devices make them easy to steal.
(True/False)
4.8/5
(38)
A(n) ____________________ occurs when the electrical supply or voltage drops, often defined as more than five percent, below the normal volts.
(Short Answer)
4.7/5
(37)
List at least five different practices to adopt in order to avoid being a victim during an ATM visit.
(Not Answered)
This question doesn't have any answer yet
COGNITIVE ASSESSMENT A computer salesman refers to the shape and size of your new computer by a specific term. What term does he use?
(Multiple Choice)
4.9/5
(38)
COGNITIVE ASSESSMENT You are outside in a public park with your friend. Both of you have Wi-Fi devices. For the devices to communicate with each other, what is the maximum distance they can be apart?
(Multiple Choice)
4.7/5
(39)
List at least six precautions you should take to prevent technology-related tendonitis or CTS.
(Not Answered)
This question doesn't have any answer yet
In addition to basic phone capabilities, list at least six features of today's smartphones.
(Not Answered)
This question doesn't have any answer yet
Malware authors rarely focus on social media because it is so difficult to get personal information via that channel.
(True/False)
4.8/5
(27)
A large amount of e-waste ends up polluting developing countries, who accept the materials for profit.
(True/False)
4.9/5
(32)
Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer?
(Multiple Choice)
4.9/5
(47)
One common method of thwarting a smartphone thief is not to use the phone to check the time.
(True/False)
4.8/5
(41)
COGNITIVE ASSESSMENT You want to find a device that can connect to your mobile device and enable you to print. Which of the following do you use?
(Multiple Choice)
4.9/5
(33)
How many peripheral devices can you connect with a USB port?
(Multiple Choice)
4.8/5
(40)
Some handheld game device models are Internet capable for downloading games and apps.
(True/False)
4.8/5
(28)
Which of the following is built into an upright cabinet that stands alone?
(Multiple Choice)
4.9/5
(39)
Which of the following is an external device that provides connections to peripheral devices through ports built into the device?
(Multiple Choice)
4.9/5
(32)
Some phones use ____________________ text input, where you press one key on the keyboard or keypad for each letter in a word and software on the phone anticipates the word you want.
(Short Answer)
4.7/5
(39)
Showing 21 - 40 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)