Deck 6: Purchasing and Maintaining a Computer

Full screen (f)
exit full mode
Question
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
Use Space or
up arrow
down arrow
to flip the card.
Question
The longest battery life of a tablet on a single charge is around 4 hours.
Question
Often, the data on a computer is worth more than the computer itself.
Question
To prevent power fluctuations from damaging electronic components, you should always use a power suppressor with your computer.
Question
You can back up your files to remote servers over the Internet, called surge backup.
Question
A disk defragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files.
Question
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
Question
Use passwords that are at least five characters with a combination of upper-case and lowercase letters, numbers, and symbols.
Question
Utility programs can help return your computer to better working condition by scanning for viruses and spyware.
Question
File History is the backup and restore feature on a Windows 8.x computer.
Question
The amount of RAM you need is independent of what programs you intend to run.
Question
If you need Microsoft Office or other installed programs, keep in mind that some tablets and Chromebooks cannot run all programs.
Question
If you have a restricted budget, buy a computer with a more powerful processor and less memory-you can add more memory to it later.
Question
A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount of space.
Question
Computers with the Intel i7 processors are best for gamers and heavy technical users.
Question
Portable computers and peripherals may have an AC adapter as an external power supply.
Question
Many business people use scanning apps, turning their smartphones into portable scanners.
Question
You should shut down your computer or disconnect it from the Internet if you are not using it for extended periods of time.
Question
If you boot up your computer and it doesn't get past the startup screen, the problem might be with the hard drive.
Question
Adware poses a security risk because it can track and steal your personal information.
Question
Using ____ technology and real-time location systems, you can install computer-tracking software on your laptop.

A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
Question
Power is supplied by either ____ current from a wall outlet or from a battery.

A) SSD
B) EFS
C) AC
D) DC
Question
____ is temporary storage used to store data and operate programs while the computer is running.

A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
Question
More damaging than power outages are power ____.

A) sinks
B) crashes
C) fluctuations
D) platforms
Question
A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable computers.

A) external
B) magnetic
C) real-time
D) solid state
Question
You can store your documents, pictures, videos, and music using cloud computing technologies such as ____.

A) Bluetooth
B) CNET
C) DropBox
D) Chrome
Question
You can avoid data loss by using a(n) ____ to prevent power loss to your computer.

A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
Question
Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality than other types of computers.

A) tablet
B) ultrabook
C) notebook
D) desktop
Question
The ____ is the size and shape of the computer.

A) device driver
B) form factor
C) platform
D) operating system
Question
____ are useful is you are not familiar with computers or if you feel your computer might need replacement parts due to wear and tear.

A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
Question
A(n) ____ computer provides an attachable/detachable, flip-back, or swivel keyboard base that may also include extra ports or drives.

A) desktop
B) 2-in-1 laptop
C) all-in-one
D) tablet
Question
Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.

A) i3
B) i5
C) i7
D) i9
Question
____ devices store files permanently so you can retrieve them later.

A) Encrypting
B) Storage
C) Firewall
D) Platform
Question
One of the main operating systems for computers is ____.

A) Blackberry
B) Apple iOS
C) Windows
D) Android
Question
____ tags are one type of real-time location system.

A) UPS
B) RFID
C) EFS
D) FDE
Question
The ____ coordinates the functions of various hardware components and determines the types and brands of application software you can use.

A) virtual memory
B) device driver
C) platform
D) form factor
Question
The ____ controls the computer's operations.

A) device driver
B) form factor
C) memory
D) processor
Question
Storage capacity is measured in ____.

A) meters
B) volts
C) bytes
D) hertz
Question
Your best protection against data loss is to ____ your files to an external storage location.

A) convert
B) extend
C) process
D) back up
Question
An advantage of a(n) ____ computer is that internal system components and electronics are integrated into the back of the monitor.

A) desktop
B) notebook
C) laptop
D) a ll-in-one
Question
If you turn on your computer and you don't see a pointer on the screen, you might have problems with your ____.

A) CPU
B) pointing device
C) flash drive
D) platform
Question
You can optimize the way files are stored by running a disk ____ utility.

A) processing
B) encryption
C) service
D) defragmentation
Question
A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges.
Form factor

A) driver
B) firewall
C) form factor
D) platform
Question
When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
Anti-glare

A) antistatic
B) silicon
C) conductive
D) anti-glare
Question
The Windows ____ utility can identify temporary Internet files and other others that can be safely rem o ved.

A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
Question
When a program needs more RAM than is currently available on the computer, it calls on the hard drive to create ____ memory.

A) convertible
B) backup
C) virtual
D) flash
Question
A ____ drive is a small portable solid state storage device that plugs into a USB port.

A) convertible
B) soft
C) flash
D) virtual
Question
If the head touches the platter, or if dirt gets on the disk, you can have a ____.

A) power spike
B) head crash
C) head flash
D) peripheral crash
Question
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.

A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
Question
When cleaning a computer screen, you can use a 50/50 solution of water and ____.

A) dish soap
B) baking soda
C) ammonia
D) alcohol
Question
You can use a personal storage device, such as ____ , to back up your files.

A) DVDs
B) cloud drives
C) firewalls
D) tablets
Question
____ are words determined by users to identify themselves in the digital world.

A) Usernames
B) Passwords
C) Bytes
D) PINs
Question
____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.

A) Magnetic
B) Solid state
C) Optical
D) Convertible
Question
____ automatically protects all of the data on your computer.

A) Virtual memory
B) Optical storage
C) A firewall
D) Full disk encryption
Question
If two monitors connected to your computer are blank, you may have a damaged ____.

A) video card
B) firewall
C) tablet
D) internal hard drive
Question
A ____ is a software program that works to connect and control devices attached to your computer so they can communicate and work together.

A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
Question
____ programs show you unsolicited advertisements and banners or pop-up windows.

A) Firewall
B) Cloudware
C) Spyware
D) Adware
Question
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.

A) Usernames
B) Passwords
C) Bytes
D) PINs
Question
A computer ____ is malicious software that infects your computer without your knowledge or permission.
Cookie

A) virus
B) cookie
C) firewall
D) spike
Question
____ are short words or phrases kept secret by a person and used to gain access to a site or data.

A) Usernames
B) Passwords
C) PINs
D) Bytes
Question
Many phone makers are adding a smartphone ____ that prohibits a stolen device from unauthorized use.

A) "kill switch"
B) radio-frequency identification tag
C) cloud backup
D) device driver
Question
____ is a widely used, short-range communication technology that uses low energy, high speed signals

A) Bluetooth
B) USB
C) Infrared
D) RF
Question
Some people choose a platform based on its ____, or "look and feel".

A) peripherals
B) control panel
C) device driver
D) user interface
Question
Match between columns
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Mobile device
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Desktop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Laptop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
All-in-one
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Tablet
Less expensive than a comparable laptop; can be powerful; often used by businesses
Mobile device
Less expensive than a comparable laptop; can be powerful; often used by businesses
Desktop
Less expensive than a comparable laptop; can be powerful; often used by businesses
Laptop
Less expensive than a comparable laptop; can be powerful; often used by businesses
All-in-one
Less expensive than a comparable laptop; can be powerful; often used by businesses
Tablet
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Mobile device
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Desktop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Laptop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
All-in-one
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Tablet
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Mobile device
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Desktop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Laptop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
All-in-one
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Tablet
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Mobile device
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Desktop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Laptop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
All-in-one
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Tablet
Question
One disadvantage of cloud storage is ____.

A) if your Internet connection fails, you may have to manage for a length of time without access to your files
B) you cannot access your files while on the road
C) you need to have an external hard drive plugged into your computer
D) susceptibility to damage from motion and outside elements like dirt and dust
Question
When you use a password in addition to a temporary code sent to your mobile phone in order to log in to your online bank account, you are using ____.

A) two-factor authentication
B) a personal identification number
C) biometric data
D) data encryption
Question
Do not leave your phone in a hot car because the ____ can overheat and possibly explode.

A) mobile battery
B) GPS
C) display
D) uninterrupted power supply
Question
The best way to avoid spyware and adware is to install and run ____ software.

A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
Question
Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.

A) screen filters
B) LoJack for Laptops
C) personal identification numbers
D) firewalls
Question
You need to ____ wireless devices that use Bluetooth technology in order for them to communicate.

A) pair
B) bridge
C) connect
D) sync
Question
If you have power to a computer monitor but still don't see any images, ____.

A) verify that the monitor is connected to the computer
B) check to see that it is plugged into the power source
C) take the monitor or computer to a technician for repair
D) replace the computer's video card
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Purchasing and Maintaining a Computer
1
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
True
2
The longest battery life of a tablet on a single charge is around 4 hours.
False
3
Often, the data on a computer is worth more than the computer itself.
True
4
To prevent power fluctuations from damaging electronic components, you should always use a power suppressor with your computer.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
5
You can back up your files to remote servers over the Internet, called surge backup.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
6
A disk defragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
7
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
8
Use passwords that are at least five characters with a combination of upper-case and lowercase letters, numbers, and symbols.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
9
Utility programs can help return your computer to better working condition by scanning for viruses and spyware.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
10
File History is the backup and restore feature on a Windows 8.x computer.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
11
The amount of RAM you need is independent of what programs you intend to run.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
12
If you need Microsoft Office or other installed programs, keep in mind that some tablets and Chromebooks cannot run all programs.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
13
If you have a restricted budget, buy a computer with a more powerful processor and less memory-you can add more memory to it later.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
14
A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount of space.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
15
Computers with the Intel i7 processors are best for gamers and heavy technical users.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
16
Portable computers and peripherals may have an AC adapter as an external power supply.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
17
Many business people use scanning apps, turning their smartphones into portable scanners.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
18
You should shut down your computer or disconnect it from the Internet if you are not using it for extended periods of time.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
19
If you boot up your computer and it doesn't get past the startup screen, the problem might be with the hard drive.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
20
Adware poses a security risk because it can track and steal your personal information.
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
21
Using ____ technology and real-time location systems, you can install computer-tracking software on your laptop.

A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
22
Power is supplied by either ____ current from a wall outlet or from a battery.

A) SSD
B) EFS
C) AC
D) DC
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
23
____ is temporary storage used to store data and operate programs while the computer is running.

A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
24
More damaging than power outages are power ____.

A) sinks
B) crashes
C) fluctuations
D) platforms
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable computers.

A) external
B) magnetic
C) real-time
D) solid state
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
26
You can store your documents, pictures, videos, and music using cloud computing technologies such as ____.

A) Bluetooth
B) CNET
C) DropBox
D) Chrome
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
27
You can avoid data loss by using a(n) ____ to prevent power loss to your computer.

A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
28
Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality than other types of computers.

A) tablet
B) ultrabook
C) notebook
D) desktop
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
29
The ____ is the size and shape of the computer.

A) device driver
B) form factor
C) platform
D) operating system
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
30
____ are useful is you are not familiar with computers or if you feel your computer might need replacement parts due to wear and tear.

A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) ____ computer provides an attachable/detachable, flip-back, or swivel keyboard base that may also include extra ports or drives.

A) desktop
B) 2-in-1 laptop
C) all-in-one
D) tablet
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
32
Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.

A) i3
B) i5
C) i7
D) i9
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
33
____ devices store files permanently so you can retrieve them later.

A) Encrypting
B) Storage
C) Firewall
D) Platform
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
34
One of the main operating systems for computers is ____.

A) Blackberry
B) Apple iOS
C) Windows
D) Android
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
35
____ tags are one type of real-time location system.

A) UPS
B) RFID
C) EFS
D) FDE
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ coordinates the functions of various hardware components and determines the types and brands of application software you can use.

A) virtual memory
B) device driver
C) platform
D) form factor
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ controls the computer's operations.

A) device driver
B) form factor
C) memory
D) processor
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
38
Storage capacity is measured in ____.

A) meters
B) volts
C) bytes
D) hertz
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
39
Your best protection against data loss is to ____ your files to an external storage location.

A) convert
B) extend
C) process
D) back up
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
40
An advantage of a(n) ____ computer is that internal system components and electronics are integrated into the back of the monitor.

A) desktop
B) notebook
C) laptop
D) a ll-in-one
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
41
If you turn on your computer and you don't see a pointer on the screen, you might have problems with your ____.

A) CPU
B) pointing device
C) flash drive
D) platform
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
42
You can optimize the way files are stored by running a disk ____ utility.

A) processing
B) encryption
C) service
D) defragmentation
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
43
A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges.
Form factor

A) driver
B) firewall
C) form factor
D) platform
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
44
When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
Anti-glare

A) antistatic
B) silicon
C) conductive
D) anti-glare
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
45
The Windows ____ utility can identify temporary Internet files and other others that can be safely rem o ved.

A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
46
When a program needs more RAM than is currently available on the computer, it calls on the hard drive to create ____ memory.

A) convertible
B) backup
C) virtual
D) flash
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
47
A ____ drive is a small portable solid state storage device that plugs into a USB port.

A) convertible
B) soft
C) flash
D) virtual
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
48
If the head touches the platter, or if dirt gets on the disk, you can have a ____.

A) power spike
B) head crash
C) head flash
D) peripheral crash
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
49
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.

A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
50
When cleaning a computer screen, you can use a 50/50 solution of water and ____.

A) dish soap
B) baking soda
C) ammonia
D) alcohol
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
51
You can use a personal storage device, such as ____ , to back up your files.

A) DVDs
B) cloud drives
C) firewalls
D) tablets
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
52
____ are words determined by users to identify themselves in the digital world.

A) Usernames
B) Passwords
C) Bytes
D) PINs
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
53
____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.

A) Magnetic
B) Solid state
C) Optical
D) Convertible
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
54
____ automatically protects all of the data on your computer.

A) Virtual memory
B) Optical storage
C) A firewall
D) Full disk encryption
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
55
If two monitors connected to your computer are blank, you may have a damaged ____.

A) video card
B) firewall
C) tablet
D) internal hard drive
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
56
A ____ is a software program that works to connect and control devices attached to your computer so they can communicate and work together.

A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
57
____ programs show you unsolicited advertisements and banners or pop-up windows.

A) Firewall
B) Cloudware
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
58
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.

A) Usernames
B) Passwords
C) Bytes
D) PINs
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
59
A computer ____ is malicious software that infects your computer without your knowledge or permission.
Cookie

A) virus
B) cookie
C) firewall
D) spike
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
60
____ are short words or phrases kept secret by a person and used to gain access to a site or data.

A) Usernames
B) Passwords
C) PINs
D) Bytes
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
61
Many phone makers are adding a smartphone ____ that prohibits a stolen device from unauthorized use.

A) "kill switch"
B) radio-frequency identification tag
C) cloud backup
D) device driver
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
62
____ is a widely used, short-range communication technology that uses low energy, high speed signals

A) Bluetooth
B) USB
C) Infrared
D) RF
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
63
Some people choose a platform based on its ____, or "look and feel".

A) peripherals
B) control panel
C) device driver
D) user interface
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
64
Match between columns
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Mobile device
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Desktop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Laptop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
All-in-one
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Tablet
Less expensive than a comparable laptop; can be powerful; often used by businesses
Mobile device
Less expensive than a comparable laptop; can be powerful; often used by businesses
Desktop
Less expensive than a comparable laptop; can be powerful; often used by businesses
Laptop
Less expensive than a comparable laptop; can be powerful; often used by businesses
All-in-one
Less expensive than a comparable laptop; can be powerful; often used by businesses
Tablet
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Mobile device
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Desktop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Laptop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
All-in-one
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Tablet
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Mobile device
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Desktop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Laptop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
All-in-one
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Tablet
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Mobile device
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Desktop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Laptop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
All-in-one
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Tablet
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
65
One disadvantage of cloud storage is ____.

A) if your Internet connection fails, you may have to manage for a length of time without access to your files
B) you cannot access your files while on the road
C) you need to have an external hard drive plugged into your computer
D) susceptibility to damage from motion and outside elements like dirt and dust
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
66
When you use a password in addition to a temporary code sent to your mobile phone in order to log in to your online bank account, you are using ____.

A) two-factor authentication
B) a personal identification number
C) biometric data
D) data encryption
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
67
Do not leave your phone in a hot car because the ____ can overheat and possibly explode.

A) mobile battery
B) GPS
C) display
D) uninterrupted power supply
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
68
The best way to avoid spyware and adware is to install and run ____ software.

A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
69
Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.

A) screen filters
B) LoJack for Laptops
C) personal identification numbers
D) firewalls
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
70
You need to ____ wireless devices that use Bluetooth technology in order for them to communicate.

A) pair
B) bridge
C) connect
D) sync
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
71
If you have power to a computer monitor but still don't see any images, ____.

A) verify that the monitor is connected to the computer
B) check to see that it is plugged into the power source
C) take the monitor or computer to a technician for repair
D) replace the computer's video card
Unlock Deck
Unlock for access to all 71 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 71 flashcards in this deck.