Deck 6: Assessment

Full screen (f)
exit full mode
Question
A scanner is a type of computer hardware.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following statements is NOT true about network standards?

A) The way computers access a network is related to the network standard.
B) Network standards specify the types of hardware used.
C) Network standards determine data transmission speeds.
D) Computers and devices successfully communicate on networks regardless of the standards used.
Question
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend.Which of the following websites can she use to find this information?

A) Yahoo
B) Gmail
C) Encyclopedia Britannica
D) Wikipedia
Question
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
Question
Rita is designing a digital card on her cellphone for her mother's birthday.She wants to crop out certain portions of her mother's photograph to use on the card.Which of these apps can she use to do this?

A) Chrome
B) Google Docs
C) Excel
D) Fotor
Question
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A) Malware
B) Trojans
C) Cyberbullying
D) Social engineering
Question
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
Question
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
Question
Which of the following is NOT computer hardware?

A) Printer
B) Device driver
C) Mouse
D) Central processing unit
Question
Development is the process of creating programs and apps from the idea stage to distribution to users.
Question
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A) Planning
B) Implementation
C) Design
D) Support and security
Question
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
Question
What type of system software manages memory?

A) operating system
B) screen saver
C) memory stick
D) file manager
Question
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
Question
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
Question
Bernie is an aspiring video game developer.Learning which of the following software would benefit him the most?

A) Computer-aided design software
B) Sampling software
C) 3-D animation software
D) System software
Question
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A) Throw old computers away at the dump.
B) Get the latest smartphone when it is released.
C) Buy devices with high power consumption.
D) Shut down your computer overnight.
Question
You can use a cloud server to back up your data.
Question
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A) Use a website builder such as Google Sites.
B) Use a search engine optimization tool to write the code for publication.
C) Contract with a vendor to use uptime for a true measure of your coding skills.
D) Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
Question
The direction in which text is printed on a page is called style.
​
Question
Which of the following is true about video conferences?

A) A video conference involves only one-way communication.
B) A video conference opens with an About page that includes directions, an agenda, and a poll.
C) A video conference always allows participants to see and hear each other.
D) A video conference is easily identifiable by its domain name and provider.
Question
The practice of social curation is when a website provides links to other relevant websites in its field.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Assessment
1
A scanner is a type of computer hardware.
True
2
Which of the following statements is NOT true about network standards?

A) The way computers access a network is related to the network standard.
B) Network standards specify the types of hardware used.
C) Network standards determine data transmission speeds.
D) Computers and devices successfully communicate on networks regardless of the standards used.
D
3
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend.Which of the following websites can she use to find this information?

A) Yahoo
B) Gmail
C) Encyclopedia Britannica
D) Wikipedia
A
4
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
Rita is designing a digital card on her cellphone for her mother's birthday.She wants to crop out certain portions of her mother's photograph to use on the card.Which of these apps can she use to do this?

A) Chrome
B) Google Docs
C) Excel
D) Fotor
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A) Malware
B) Trojans
C) Cyberbullying
D) Social engineering
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT computer hardware?

A) Printer
B) Device driver
C) Mouse
D) Central processing unit
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
Development is the process of creating programs and apps from the idea stage to distribution to users.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A) Planning
B) Implementation
C) Design
D) Support and security
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
What type of system software manages memory?

A) operating system
B) screen saver
C) memory stick
D) file manager
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
Bernie is an aspiring video game developer.Learning which of the following software would benefit him the most?

A) Computer-aided design software
B) Sampling software
C) 3-D animation software
D) System software
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A) Throw old computers away at the dump.
B) Get the latest smartphone when it is released.
C) Buy devices with high power consumption.
D) Shut down your computer overnight.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
You can use a cloud server to back up your data.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A) Use a website builder such as Google Sites.
B) Use a search engine optimization tool to write the code for publication.
C) Contract with a vendor to use uptime for a true measure of your coding skills.
D) Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
The direction in which text is printed on a page is called style.
​
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is true about video conferences?

A) A video conference involves only one-way communication.
B) A video conference opens with an About page that includes directions, an agenda, and a poll.
C) A video conference always allows participants to see and hear each other.
D) A video conference is easily identifiable by its domain name and provider.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
The practice of social curation is when a website provides links to other relevant websites in its field.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 22 flashcards in this deck.