Reference no: EM13760649
Computer Literacy
If you encounter a Trojan Horse what has happened? You read a fake email from a bank that appears to be asking for personal information. Someone has stolen your credit card and used it to purchase items online. A hacker placed a program in your computer that granted illegal access to your files. You have installed a virus protection program on your computer.
Question 2. 2. Which of the following is an example of computer phishing?
A fraudulent email from a bank asking for account information.
A virus that infects your computer and sends out information.
A software error in your computer and causes it to crash.
A computer hacker that breaks into your computer.
Question 3. 3. The term "computer literacy" dates back to what decade? (Points : 1)
1960s
1970s
1980s
1990s
Question 4. 4. A computer worm is MOST likely to attack your computer's: (Points : 1)
printer.
scanner.
memory.
monitor.
Question 5. 5. Many people describe computers as "complex" machines. What can this mean? (Points : 1)
Computers are smarter than humans.
Computers are understood by very few people because of their intricate technical components .
Computers run software programs with hard to use features.
Computers have had both a positive and negative effect on society.
Question 6. 6. Which of the following is NOT an example of systems software? (Points : 1)
Operating systems
Utilities
Device drivers
Applications
Question 7. 7. Which action BEST describes a branch in a computer program?
It jumps to a non-sequential line number.
It moves
one line number ahead.
It moves one line number backwards.
It stays on the same line number and calculates new data.
Question 8. 8. In the 1970s which company developed computer innovations such as the mouse, graphical user interface, and word processors?
Microsoft
IBM
Xerox
Apple
Question 9. 9. Which of the following is an operating system?
Microsoft
MAC
Apple
Windows
Question 10. 10. Which of the following components was a significant development featured in the Macintosh LISA computer?
C Prompt
Disk Operating System
Graphical User Interface
Memory
Identify what types of conflict you saw
: Identify what types of conflict you saw in one of this week's reading assignments. Give specific examples as support for each conflict you identified.
|
What mistakes do you need to avoid
: What sort of negotiating model would work with each group - What mistakes do you need to avoid?
|
Explain and what countries make up the apec
: What event marked the arrival of the Pacific Age? Please explain and what countries make up the APEC? When was it established? What is the APEC's share in global trade?
|
Write up a review of the article
: You will write up a review of the article and integrate course concepts into your review. Please make sure you both summarize the article and discuss how it relates to the course.
|
Virus protection program
: If you encounter a Trojan Horse what has happened? You read a fake email from a bank that appears to be asking for personal information. Someone has stolen your credit card and used it to purchase items online.
|
Write a essay paper on kate chopin
: Write a essay paper on Kate Chopin.
|
How sonnys blues should respond to grief
: What does it suggest about societal expectations regarding women and how Sonny's Blues should respond to grief? How might those expectations of grief still apply to women's roles?
|
Endocrine system disorders
: Is the obesity crisis hiding a bigger problem? video, and review any relevant Instructor Guidance.
|
Analyze how the different forces will come
: Explain why government regulation is or is not needed, citing the major reasons for government involvement in a market economy. Provide support for your explanation.
|