Exam 6: Purchasing and Maintaining a Computer
Exam 1: Introduction to Computer Hardware75 Questions
Exam 2: Introduction to Computer Software75 Questions
Exam 3: System Software75 Questions
Exam 4: Application Software75 Questions
Exam 5: The World Wide Web75 Questions
Exam 6: Purchasing and Maintaining a Computer75 Questions
Exam 7: The Connected Computer70 Questions
Exam 8: Safety and Security70 Questions
Exam 9: Communication75 Questions
Exam 10: Information Literacy70 Questions
Exam 11: Introduction to Media70 Questions
Exam 12: A Changing World70 Questions
Select questions type
Many business people use scanning apps, turning their smartphones into portable scanners.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
The term Ultrabook is a registered trademark of the Intel Corporation. _________________________
Free
(True/False)
4.7/5
(32)
Correct Answer:
True
When cleaning a computer screen, you can use a 50/50 solution of water and ____.
(Multiple Choice)
4.9/5
(24)
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.
(Multiple Choice)
4.9/5
(31)
A ____ is software that helps peripheral devices communicate with a computer.
(Multiple Choice)
4.9/5
(35)
Hard drive storage uses magnetic technology to arrange particles on the disk.
(True/False)
4.8/5
(31)
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.
(Multiple Choice)
4.8/5
(37)
____ are short words or phrases kept secret by a person and used to gain access to a site or data.
(Multiple Choice)
4.9/5
(33)
If two monitors connected to your computer are blank, you may have a damaged ____.
(Multiple Choice)
4.8/5
(36)
A(n) ____ computer provides a detachable keyboard base that has extra ports or drives.
(Multiple Choice)
4.9/5
(38)
____ automatically protects all of the data on your computer.
(Multiple Choice)
4.7/5
(33)
Cloud storage technology uses light in the form of a low-power laser beam to record and read a disk. _________________________
(True/False)
4.7/5
(30)
You can use a cable lock to secure a computer to a table or desk. _________________________
(True/False)
4.8/5
(30)
____ is temporary storage used to store data and operate programs while the computer is running.
(Multiple Choice)
4.7/5
(38)
If you need Microsoft Office or other installed programs, keep in mind that not all tablets can run traditional programs.
(True/False)
4.8/5
(33)
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
(True/False)
4.8/5
(37)
Adware poses a security risk because it can track and steal your personal information. _________________________
(True/False)
4.9/5
(39)
Because wires can get tangled, many add-on devices can connect wirelessly using Bluetooth technology. _________________________
(True/False)
4.8/5
(37)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)