Exam 3: Computers and Mobile Devices: Evaluating the Possibilities
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
A joystick is a handheld vertical lever, mounted on a base, that you move in different directions to control the actions of the simulated vehicle or player.
(True/False)
4.8/5
(27)
Point-and-shoot cameras are much heavier and larger than SLR cameras.
(True/False)
4.9/5
(38)
Which design of tablet, as shown on the right in the accompanying figure, has an attached keyboard?

(Multiple Choice)
4.7/5
(38)
Most extended warranties cover the repair and replacement of computer components beyond the standard warranty.
(True/False)
4.9/5
(32)
What is the term for the technology that allows users to view message details such as the length of calls, for example?
(Multiple Choice)
4.8/5
(38)
Which of the following are small speakers that rest inside each ear canal?
(Multiple Choice)
4.7/5
(37)
Which of the following is the practice of sharing computing resources, such as servers, like those in the accompanying figure?

(Multiple Choice)
4.7/5
(29)
Describe in detail the steps to avoid malware infections on websites, social media, email, Flash memory storage, pop-up windows, and software.
(Not Answered)
This question doesn't have any answer yet
List at least seven of the specifications that a surge protector should meet or exceed.
(Not Answered)
This question doesn't have any answer yet
COGNITIVE ASSESSMENT You need to set up a computer to store and deliver email messages for your small business. Which of the following are you most likely to use?
(Multiple Choice)
4.8/5
(34)
COGNITIVE ASSESSMENT You go to your local town utility in order to pay your gas bill. Which of the following are you most likely to use?
(Multiple Choice)
5.0/5
(35)
COGNITIVE ASSESSMENT You are inside a sports arena with your friend. Both of you have Wi-Fi devices. For the devices to communicate with each other, what is the maximum distance they can be apart in this closed space?
(Multiple Choice)
4.9/5
(35)
What is the term for an ultrathin laptop (like the one shown in the accompanying figure) that uses the Windows operating system?

(Multiple Choice)
4.8/5
(37)
Critical Thinking Questions Case 3-1 You have had your desktop for several years and you have decided that it is time for you to purchase a new one. Before heading online to make your purchase, you re-familiarize yourself with a buyer's guide that you found in your Discovering Computers textbook. Which of the following is not a consideration from that buyer's guide?
(Multiple Choice)
4.8/5
(35)
What is the term for the picture/video message service available on smartphones and other mobile devices?
(Multiple Choice)
4.9/5
(36)
COGNITIVE ASSESSMENT Which of the following may need to happen before your Bluetooth headset can communicate with your smartphone?
(Multiple Choice)
4.8/5
(32)
The disorder known as ____________________ occurs when the technology consumes someone's entire social life.
(Short Answer)
4.8/5
(31)
COGNITIVE ASSESSMENT A thief has unfortunately captured your ATM card number by placing a panel on top of the face of an ATM, which was virtually undetectable to you. What is this technology called?
(Multiple Choice)
4.8/5
(24)
Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?
(Multiple Choice)
4.9/5
(39)
Showing 121 - 140 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)