Professional Documents
Culture Documents
TRUE/FALSE
1. Once you determine your budget, you can narrow your search to look for the best computer that fits
your budget.
3. If you have a restricted budget, buy a computer with a more powerful processor and less
memory—you can add more memory to it later.
4. If you need Microsoft Office or other installed programs, keep in mind that not all tablets can run
traditional programs.
6. Once you determine the form factor for your computer, the next decision you need to make is what
oeprating system you will use.
7. A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount
of space.
8. Advantages of the convertible form factor include that it is small and portable and often includes
phone and text capabilities.
9. Computers with the Intel i7 processors are best for gamers and heavy technical users.
10. The amount of RAM you need is independent of what programs you intend to run.
11. Many business people use scanning apps, turning their smartphones into portable scanners.
ANS: T PTS: 1 REF: 6-5
12. Heat is bad for electronics, but low temperatures are unlikely to damage a computer’s mechanical and
electronic components.
13. Hard drive storage uses magnetic technology to arrange particles on the disk.
15. Often, the data on a computer is worth more than the computer itself.
16. You can back up your files to remote servers over the Internet, called surge backup.
17. File History is the backup and restore feature on a Windows 8.x computer.
18. Use passwords that are at least five characters with a combination of upper- and lowercase letters,
numbers, and symbols.
19. You should shut down your computer or disconnect it from the Internet if you are not using it for
extended periods of time.
20. If you boot up your computer and it doesn’t get past the startup screen, the problem might be with the
hard drive.
MODIFIED TRUE/FALSE
1. Cloud storage technology uses light in the form of a low-power laser beam to record and read a disk.
_________________________
ANS: F, Optical
3. A disk degragmentation utility removes unused files from your hard drive so the computer doesn’t
search through unneeded files. _________________________
ANS: F, cleanup
4. Utility programs can help return your computer to better working condition by scanning for viruses
and spyware. _________________________
5. Adware poses a security risk because it can track and steal your personal information.
_________________________
ANS: F, Spyware
ANS: F
GB
gigabytes
gigabytes (GB)
GB (gigabytes)
8. Because wires can get tangled, many add-on devices can connect wirelessly using Bluetooth
technology. _________________________
9. To prevent power fluctuations from damaging electronic components, you should always use a(n)
power suppressor with your computer. _________________________
ANS: F, surge
10. You can use a cable lock to secure a computer to a table or desk. _________________________
3. The ____ coordinates the functions of various hardware components and determines the types and
brands of application software you can use.
a. virtual memory c. platform
b. device driver d. form factor
ANS: C PTS: 1 REF: 6-3
4. An advantage of a(n) ____ computer is that internal system components and electronics are integrated
into the back of the monitor.
a. desktop c. laptop
b. notebook d. all-in-one
ANS: D PTS: 1 REF: 6-4
5. Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality
than other types of computers.
a. tablet c. notebook
b. ultrabook d. desktop
ANS: A PTS: 1 REF: 6-4
6. A(n) ____ computer provides a detachable keyboard base that has extra ports or drives.
a. desktop c. ultrabook
b. convertible d. tablet
ANS: B PTS: 1 REF: 6-4
7. One of the main operating systems for desktop and laptop computers is ____.
a. Blackberry c. Windows
b. Apple iOS d. Android
ANS: C PTS: 1 REF: 6-4
9. ____ is temporary storage used to store data and operate programs while the computer is running.
a. Random Access Memory (RAM) c. Flash memory
b. Virtual memory d. Encrypting File System (EFS)
ANS: A PTS: 1 REF: 6-4
10. Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.
a. i3 c. i7
b. i5 d. i9
ANS: A PTS: 1 REF: 6-4
11. ____ devices store files permanently so you can retrieve them later.
a. Encrypting c. Firewall
b. Storage d. Platform
ANS: B PTS: 1 REF: 6-5
13. A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable
computers.
a. external c. real-time
b. magnetic d. solid state
ANS: D PTS: 1 REF: 6-5
14. ____ are useful is you are not familiar with computers, or if you feel your computer might need
replacement parts due to wear and tear.
a. Extended warranties c. Encrypting file systems
b. Surge suppressors d. Optical sotrage technologies
ANS: A PTS: 1 REF: 6-5
15. Hard drive storage uses ____ technology to arrange particles on the disk.
a. laser c. cloud
b. magnetic d. virtual memory
ANS: B PTS: 1 REF: 6-6
16. Power is supplied by either ____ current from a wall outlet or from a battery.
a. SSD c. AC
b. EFS d. DC
ANS: C PTS: 1 REF: 6-7
17. You can avoid data loss by installing a(n) ____ to prevent power loss to your computer.
a. solid state drive c. firewall
b. surge suppressor d. uninterruptible power supply
ANS: D PTS: 1 REF: 6-7
19. To prevent power fluctuations from damaging your computer, you should always use a(n) ____ with
your computer.
a. uninterruptible power supply c. solid state drive
b. virtual memory system d. surge suppressor
ANS: D PTS: 1 REF: 6-7
20. Using ____ technology and real-time location systems, you can install computer-tracking software on
your laptop.
a. global positioning system c. uninterruptible power supply
b. encrypting file system d. personal identification number
ANS: A PTS: 1 REF: 6-8
22. You can store your documents, pictures, videos, and music using cloud computing technologies such
as ____.
a. Bluetooth c. DropBox
b. CNET d. Chrome
ANS: C PTS: 1 REF: 6-8
23. Your best protection against data loss is to ____ your files to an external storage location.
a. convert c. process
b. extend d. back up
ANS: D PTS: 1 REF: 6-8
24. You can use a personal storage device such as ____ to back up your files.
a. DVDs c. firewalls
b. cloud drives d. tablets
ANS: A PTS: 1 REF: 6-8
25. ____ are short words or phrases kept secret by a person and used to gain access to a site or data.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: B PTS: 1 REF: 6-9
26. ____ are short number sequences, kept secret and frequently used by banks, used to access accounts.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: D PTS: 1 REF: 6-9
27. ____ are words determined by users to identify themselves in the digital world.
a. Usernames c. Bytes
b. Passwords d. PINs
ANS: A PTS: 1 REF: 6-9
28. A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited
data exchanges.
a. driver c. form factor
b. firewall d. platform
ANS: B PTS: 1 REF: 6-10
29. ____ “scrambles” or encodes data so that even if unauthorized users somehow gain access to your
files, they will not be able to read or understand what is in them.
a. Virtual memory c. Data encryption
b. Optical storage d. A firewall
ANS: C PTS: 1 REF: 6-10
31. ____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.
a. Magnetic c. Optical
b. Solid state d. Convertible
ANS: A PTS: 1 REF: 6-10
32. If the head touches the platter, or if dirt gets on the disk, you can have a ____.
a. power spike c. head flash
b. head crash d. peripheral crash
ANS: B PTS: 1 REF: 6-11
33. When a program needs more RAM than is currently available on the computer, it calls on the hard
drive to create ____ memory.
a. convertible c. virtual
b. backup d. flash
ANS: C PTS: 1 REF: 6-11
34. You can optimize the way files are stored by running a disk ____ utility.
a. processing c. service
b. encryption d. defragmentation
ANS: D PTS: 1 REF: 6-12
35. If two monitors connected to your computer are blank, you may have a damaged ____.
a. video card c. tablet
b. firewall d. internal hard drive
ANS: A PTS: 1 REF: 6-12
36. If you turn on your computer, and you don’t see a pointer on the screen, you might have problems with
your ____.
a. CPU c. flash drive
b. pointing device d. platform
ANS: B PTS: 1 REF: 6-12
37. A ____ drive is a small portable solid state storage device that plugs into a USB port.
a. convertible c. flash
b. soft d. virtual
ANS: C PTS: 1 REF: 6-14
38. When cleaning a computer screen, you can use a 50/50 solution of water and ____.
a. dish soap c. ammonia
b. baking soda d. alcohol
ANS: D PTS: 1 REF: 6-15
39. When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
a. antistatic c. conductive
b. silicon d. anti-glare
ANS: A PTS: 1 REF: 6-16
40. The Windows ____ utility can identify temporary Internet files and other others that can be safely
remvoed.
a. Disk Defragmentation c. Firewall
b. Disk Cleanup d. Defender
ANS: B PTS: 1 REF: 6-17
41. A ____ is software that helps peripheral devices communicate with a computer.
a. disk optimization utility c. device driver
b. virtual memory utility d. firewall
ANS: C PTS: 1 REF: 6-17
42. ____ programs show you unsolicited advertisements and banners or pop-up windows.
a. Firewall c. Spyware
b. Cloudware d. Adware
ANS: D PTS: 1 REF: 6-18
43. A computer ____ is malicious software that infects your computer without your knowledge or
permission.
a. virus c. firewall
b. cookie d. spike
ANS: A PTS: 1 REF: 6-18
44. The best way to avoid spyware and adware is to install and run ____ software.
a. disk optimization c. prevention
b. all-in-one d. cloud storage
ANS: C PTS: 1 REF: 6-18
45. Some people choose a platform based on its ____, or “look and feel”.
a. peripherals c. device driver
b. control panel d. user interface
ANS: D PTS: 1 REF: 6-4
Another random document with
no related content on Scribd:
The various nationalities are segregated in the courtyard porticos of El-Azhar.
Instruction is free and almost entirely in the Koran. If a student doesn’t like one
professor, he moves on to another.
The corpse of the king was taken out long ago and history does
not record what became of it. All we know of him comes from
Herodotus, who says he was a vicious, bad man, and that during the
fifty years he ruled the Egyptians he oppressed the people terribly.
He built the Pyramid by forced labour, keeping a gang of more than
one hundred thousand workmen at it for over twenty years. The
stones forming the outside, which have now been taken away, were
even larger than those still standing, but many of those that are left
are as high as a table and many feet in length. The sides of this
Pyramid are in the form of immense stairs, which narrow as they go
upward. There are two hundred and fifty of these high steps. If one
will go to his dining room and climb upon the table two hundred and
fifty-two times he will experience something of the work I had in
climbing up the Pyramid. His exertion will be harder, however, for he
will not have the help of three half-naked Arabs who were given to
me by the Sheik of the Pyramids, and who almost worried the life out
of me in their demands for backsheesh all the way up. My wife
happened to call me by my given name and during the remainder of
that trip I was “Mr. Frank” to these heathen. While they jerked my
arms nearly off in pulling me from one ledge to another, they howled
out in a barbaric sing-song a gibberish of English, interspersing it
with Cherokee whoops, something like this: