Deck 6: Purchasing and Maintaining a Computer

ملء الشاشة (f)
exit full mode
سؤال
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The longest battery life of a tablet on a single charge is around 4 hours.
سؤال
Often, the data on a computer is worth more than the computer itself.
سؤال
To prevent power fluctuations from damaging electronic components, you should always use a power suppressor with your computer.
سؤال
You can back up your files to remote servers over the Internet, called surge backup.
سؤال
A disk defragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files.
سؤال
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
سؤال
Use passwords that are at least five characters with a combination of upper-case and lowercase letters, numbers, and symbols.
سؤال
Utility programs can help return your computer to better working condition by scanning for viruses and spyware.
سؤال
File History is the backup and restore feature on a Windows 8.x computer.
سؤال
The amount of RAM you need is independent of what programs you intend to run.
سؤال
If you need Microsoft Office or other installed programs, keep in mind that some tablets and Chromebooks cannot run all programs.
سؤال
If you have a restricted budget, buy a computer with a more powerful processor and less memory-you can add more memory to it later.
سؤال
A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount of space.
سؤال
Computers with the Intel i7 processors are best for gamers and heavy technical users.
سؤال
Portable computers and peripherals may have an AC adapter as an external power supply.
سؤال
Many business people use scanning apps, turning their smartphones into portable scanners.
سؤال
You should shut down your computer or disconnect it from the Internet if you are not using it for extended periods of time.
سؤال
If you boot up your computer and it doesn't get past the startup screen, the problem might be with the hard drive.
سؤال
Adware poses a security risk because it can track and steal your personal information.
سؤال
Using ____ technology and real-time location systems, you can install computer-tracking software on your laptop.

A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
سؤال
Power is supplied by either ____ current from a wall outlet or from a battery.

A) SSD
B) EFS
C) AC
D) DC
سؤال
____ is temporary storage used to store data and operate programs while the computer is running.

A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
سؤال
More damaging than power outages are power ____.

A) sinks
B) crashes
C) fluctuations
D) platforms
سؤال
A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable computers.

A) external
B) magnetic
C) real-time
D) solid state
سؤال
You can store your documents, pictures, videos, and music using cloud computing technologies such as ____.

A) Bluetooth
B) CNET
C) DropBox
D) Chrome
سؤال
You can avoid data loss by using a(n) ____ to prevent power loss to your computer.

A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
سؤال
Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality than other types of computers.

A) tablet
B) ultrabook
C) notebook
D) desktop
سؤال
The ____ is the size and shape of the computer.

A) device driver
B) form factor
C) platform
D) operating system
سؤال
____ are useful is you are not familiar with computers or if you feel your computer might need replacement parts due to wear and tear.

A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
سؤال
A(n) ____ computer provides an attachable/detachable, flip-back, or swivel keyboard base that may also include extra ports or drives.

A) desktop
B) 2-in-1 laptop
C) all-in-one
D) tablet
سؤال
Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.

A) i3
B) i5
C) i7
D) i9
سؤال
____ devices store files permanently so you can retrieve them later.

A) Encrypting
B) Storage
C) Firewall
D) Platform
سؤال
One of the main operating systems for computers is ____.

A) Blackberry
B) Apple iOS
C) Windows
D) Android
سؤال
____ tags are one type of real-time location system.

A) UPS
B) RFID
C) EFS
D) FDE
سؤال
The ____ coordinates the functions of various hardware components and determines the types and brands of application software you can use.

A) virtual memory
B) device driver
C) platform
D) form factor
سؤال
The ____ controls the computer's operations.

A) device driver
B) form factor
C) memory
D) processor
سؤال
Storage capacity is measured in ____.

A) meters
B) volts
C) bytes
D) hertz
سؤال
Your best protection against data loss is to ____ your files to an external storage location.

A) convert
B) extend
C) process
D) back up
سؤال
An advantage of a(n) ____ computer is that internal system components and electronics are integrated into the back of the monitor.

A) desktop
B) notebook
C) laptop
D) a ll-in-one
سؤال
If you turn on your computer and you don't see a pointer on the screen, you might have problems with your ____.

A) CPU
B) pointing device
C) flash drive
D) platform
سؤال
You can optimize the way files are stored by running a disk ____ utility.

A) processing
B) encryption
C) service
D) defragmentation
سؤال
A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges.
Form factor

A) driver
B) firewall
C) form factor
D) platform
سؤال
When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
Anti-glare

A) antistatic
B) silicon
C) conductive
D) anti-glare
سؤال
The Windows ____ utility can identify temporary Internet files and other others that can be safely rem o ved.

A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
سؤال
When a program needs more RAM than is currently available on the computer, it calls on the hard drive to create ____ memory.

A) convertible
B) backup
C) virtual
D) flash
سؤال
A ____ drive is a small portable solid state storage device that plugs into a USB port.

A) convertible
B) soft
C) flash
D) virtual
سؤال
If the head touches the platter, or if dirt gets on the disk, you can have a ____.

A) power spike
B) head crash
C) head flash
D) peripheral crash
سؤال
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.

A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
سؤال
When cleaning a computer screen, you can use a 50/50 solution of water and ____.

A) dish soap
B) baking soda
C) ammonia
D) alcohol
سؤال
You can use a personal storage device, such as ____ , to back up your files.

A) DVDs
B) cloud drives
C) firewalls
D) tablets
سؤال
____ are words determined by users to identify themselves in the digital world.

A) Usernames
B) Passwords
C) Bytes
D) PINs
سؤال
____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.

A) Magnetic
B) Solid state
C) Optical
D) Convertible
سؤال
____ automatically protects all of the data on your computer.

A) Virtual memory
B) Optical storage
C) A firewall
D) Full disk encryption
سؤال
If two monitors connected to your computer are blank, you may have a damaged ____.

A) video card
B) firewall
C) tablet
D) internal hard drive
سؤال
A ____ is a software program that works to connect and control devices attached to your computer so they can communicate and work together.

A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
سؤال
____ programs show you unsolicited advertisements and banners or pop-up windows.

A) Firewall
B) Cloudware
C) Spyware
D) Adware
سؤال
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.

A) Usernames
B) Passwords
C) Bytes
D) PINs
سؤال
A computer ____ is malicious software that infects your computer without your knowledge or permission.
Cookie

A) virus
B) cookie
C) firewall
D) spike
سؤال
____ are short words or phrases kept secret by a person and used to gain access to a site or data.

A) Usernames
B) Passwords
C) PINs
D) Bytes
سؤال
Many phone makers are adding a smartphone ____ that prohibits a stolen device from unauthorized use.

A) "kill switch"
B) radio-frequency identification tag
C) cloud backup
D) device driver
سؤال
____ is a widely used, short-range communication technology that uses low energy, high speed signals

A) Bluetooth
B) USB
C) Infrared
D) RF
سؤال
Some people choose a platform based on its ____, or "look and feel".

A) peripherals
B) control panel
C) device driver
D) user interface
سؤال
Match between columns
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Mobile device
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Desktop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Laptop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
All-in-one
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Tablet
Less expensive than a comparable laptop; can be powerful; often used by businesses
Mobile device
Less expensive than a comparable laptop; can be powerful; often used by businesses
Desktop
Less expensive than a comparable laptop; can be powerful; often used by businesses
Laptop
Less expensive than a comparable laptop; can be powerful; often used by businesses
All-in-one
Less expensive than a comparable laptop; can be powerful; often used by businesses
Tablet
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Mobile device
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Desktop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Laptop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
All-in-one
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Tablet
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Mobile device
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Desktop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Laptop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
All-in-one
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Tablet
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Mobile device
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Desktop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Laptop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
All-in-one
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Tablet
سؤال
One disadvantage of cloud storage is ____.

A) if your Internet connection fails, you may have to manage for a length of time without access to your files
B) you cannot access your files while on the road
C) you need to have an external hard drive plugged into your computer
D) susceptibility to damage from motion and outside elements like dirt and dust
سؤال
When you use a password in addition to a temporary code sent to your mobile phone in order to log in to your online bank account, you are using ____.

A) two-factor authentication
B) a personal identification number
C) biometric data
D) data encryption
سؤال
Do not leave your phone in a hot car because the ____ can overheat and possibly explode.

A) mobile battery
B) GPS
C) display
D) uninterrupted power supply
سؤال
The best way to avoid spyware and adware is to install and run ____ software.

A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
سؤال
Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.

A) screen filters
B) LoJack for Laptops
C) personal identification numbers
D) firewalls
سؤال
You need to ____ wireless devices that use Bluetooth technology in order for them to communicate.

A) pair
B) bridge
C) connect
D) sync
سؤال
If you have power to a computer monitor but still don't see any images, ____.

A) verify that the monitor is connected to the computer
B) check to see that it is plugged into the power source
C) take the monitor or computer to a technician for repair
D) replace the computer's video card
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/71
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Purchasing and Maintaining a Computer
1
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
True
2
The longest battery life of a tablet on a single charge is around 4 hours.
False
3
Often, the data on a computer is worth more than the computer itself.
True
4
To prevent power fluctuations from damaging electronic components, you should always use a power suppressor with your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
5
You can back up your files to remote servers over the Internet, called surge backup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
6
A disk defragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
7
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
8
Use passwords that are at least five characters with a combination of upper-case and lowercase letters, numbers, and symbols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
9
Utility programs can help return your computer to better working condition by scanning for viruses and spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
10
File History is the backup and restore feature on a Windows 8.x computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
11
The amount of RAM you need is independent of what programs you intend to run.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
12
If you need Microsoft Office or other installed programs, keep in mind that some tablets and Chromebooks cannot run all programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
13
If you have a restricted budget, buy a computer with a more powerful processor and less memory-you can add more memory to it later.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
14
A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount of space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
15
Computers with the Intel i7 processors are best for gamers and heavy technical users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
16
Portable computers and peripherals may have an AC adapter as an external power supply.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
17
Many business people use scanning apps, turning their smartphones into portable scanners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
18
You should shut down your computer or disconnect it from the Internet if you are not using it for extended periods of time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
19
If you boot up your computer and it doesn't get past the startup screen, the problem might be with the hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
20
Adware poses a security risk because it can track and steal your personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
21
Using ____ technology and real-time location systems, you can install computer-tracking software on your laptop.

A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
22
Power is supplied by either ____ current from a wall outlet or from a battery.

A) SSD
B) EFS
C) AC
D) DC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ is temporary storage used to store data and operate programs while the computer is running.

A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
24
More damaging than power outages are power ____.

A) sinks
B) crashes
C) fluctuations
D) platforms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable computers.

A) external
B) magnetic
C) real-time
D) solid state
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
26
You can store your documents, pictures, videos, and music using cloud computing technologies such as ____.

A) Bluetooth
B) CNET
C) DropBox
D) Chrome
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
27
You can avoid data loss by using a(n) ____ to prevent power loss to your computer.

A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
28
Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality than other types of computers.

A) tablet
B) ultrabook
C) notebook
D) desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ____ is the size and shape of the computer.

A) device driver
B) form factor
C) platform
D) operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ are useful is you are not familiar with computers or if you feel your computer might need replacement parts due to wear and tear.

A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
31
A(n) ____ computer provides an attachable/detachable, flip-back, or swivel keyboard base that may also include extra ports or drives.

A) desktop
B) 2-in-1 laptop
C) all-in-one
D) tablet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
32
Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.

A) i3
B) i5
C) i7
D) i9
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ devices store files permanently so you can retrieve them later.

A) Encrypting
B) Storage
C) Firewall
D) Platform
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
34
One of the main operating systems for computers is ____.

A) Blackberry
B) Apple iOS
C) Windows
D) Android
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ tags are one type of real-time location system.

A) UPS
B) RFID
C) EFS
D) FDE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
36
The ____ coordinates the functions of various hardware components and determines the types and brands of application software you can use.

A) virtual memory
B) device driver
C) platform
D) form factor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
37
The ____ controls the computer's operations.

A) device driver
B) form factor
C) memory
D) processor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
38
Storage capacity is measured in ____.

A) meters
B) volts
C) bytes
D) hertz
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
39
Your best protection against data loss is to ____ your files to an external storage location.

A) convert
B) extend
C) process
D) back up
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
40
An advantage of a(n) ____ computer is that internal system components and electronics are integrated into the back of the monitor.

A) desktop
B) notebook
C) laptop
D) a ll-in-one
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
41
If you turn on your computer and you don't see a pointer on the screen, you might have problems with your ____.

A) CPU
B) pointing device
C) flash drive
D) platform
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
42
You can optimize the way files are stored by running a disk ____ utility.

A) processing
B) encryption
C) service
D) defragmentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
43
A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges.
Form factor

A) driver
B) firewall
C) form factor
D) platform
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
44
When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
Anti-glare

A) antistatic
B) silicon
C) conductive
D) anti-glare
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
45
The Windows ____ utility can identify temporary Internet files and other others that can be safely rem o ved.

A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
46
When a program needs more RAM than is currently available on the computer, it calls on the hard drive to create ____ memory.

A) convertible
B) backup
C) virtual
D) flash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
47
A ____ drive is a small portable solid state storage device that plugs into a USB port.

A) convertible
B) soft
C) flash
D) virtual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
48
If the head touches the platter, or if dirt gets on the disk, you can have a ____.

A) power spike
B) head crash
C) head flash
D) peripheral crash
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
49
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.

A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
50
When cleaning a computer screen, you can use a 50/50 solution of water and ____.

A) dish soap
B) baking soda
C) ammonia
D) alcohol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
51
You can use a personal storage device, such as ____ , to back up your files.

A) DVDs
B) cloud drives
C) firewalls
D) tablets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
52
____ are words determined by users to identify themselves in the digital world.

A) Usernames
B) Passwords
C) Bytes
D) PINs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.

A) Magnetic
B) Solid state
C) Optical
D) Convertible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
54
____ automatically protects all of the data on your computer.

A) Virtual memory
B) Optical storage
C) A firewall
D) Full disk encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
55
If two monitors connected to your computer are blank, you may have a damaged ____.

A) video card
B) firewall
C) tablet
D) internal hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
56
A ____ is a software program that works to connect and control devices attached to your computer so they can communicate and work together.

A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
57
____ programs show you unsolicited advertisements and banners or pop-up windows.

A) Firewall
B) Cloudware
C) Spyware
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
58
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.

A) Usernames
B) Passwords
C) Bytes
D) PINs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
59
A computer ____ is malicious software that infects your computer without your knowledge or permission.
Cookie

A) virus
B) cookie
C) firewall
D) spike
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
60
____ are short words or phrases kept secret by a person and used to gain access to a site or data.

A) Usernames
B) Passwords
C) PINs
D) Bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
61
Many phone makers are adding a smartphone ____ that prohibits a stolen device from unauthorized use.

A) "kill switch"
B) radio-frequency identification tag
C) cloud backup
D) device driver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
62
____ is a widely used, short-range communication technology that uses low energy, high speed signals

A) Bluetooth
B) USB
C) Infrared
D) RF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
63
Some people choose a platform based on its ____, or "look and feel".

A) peripherals
B) control panel
C) device driver
D) user interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
64
Match between columns
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Mobile device
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Desktop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Laptop
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
All-in-one
Small and portable; includes phone and text capabilities often through cellular service and Wi-Fi connections
Tablet
Less expensive than a comparable laptop; can be powerful; often used by businesses
Mobile device
Less expensive than a comparable laptop; can be powerful; often used by businesses
Desktop
Less expensive than a comparable laptop; can be powerful; often used by businesses
Laptop
Less expensive than a comparable laptop; can be powerful; often used by businesses
All-in-one
Less expensive than a comparable laptop; can be powerful; often used by businesses
Tablet
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Mobile device
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Desktop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Laptop
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
All-in-one
Internal system components and electronics are integrated into the back of the monitor, so the computer is one unit
Tablet
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Mobile device
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Desktop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Laptop
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
All-in-one
Light and portable; most can run using battery power for hours; can feature standard to high-end performance; uses built-in webcam and solid state drives; weighs from 2 to 8 pounds
Tablet
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Mobile device
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Desktop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Laptop
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
All-in-one
Smaller and cheaper than laptop computers; can be laid flat, and most fit easily into a purse or backpack; useful for online applications
Tablet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
65
One disadvantage of cloud storage is ____.

A) if your Internet connection fails, you may have to manage for a length of time without access to your files
B) you cannot access your files while on the road
C) you need to have an external hard drive plugged into your computer
D) susceptibility to damage from motion and outside elements like dirt and dust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
66
When you use a password in addition to a temporary code sent to your mobile phone in order to log in to your online bank account, you are using ____.

A) two-factor authentication
B) a personal identification number
C) biometric data
D) data encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
67
Do not leave your phone in a hot car because the ____ can overheat and possibly explode.

A) mobile battery
B) GPS
C) display
D) uninterrupted power supply
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
68
The best way to avoid spyware and adware is to install and run ____ software.

A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
69
Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.

A) screen filters
B) LoJack for Laptops
C) personal identification numbers
D) firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
70
You need to ____ wireless devices that use Bluetooth technology in order for them to communicate.

A) pair
B) bridge
C) connect
D) sync
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
71
If you have power to a computer monitor but still don't see any images, ____.

A) verify that the monitor is connected to the computer
B) check to see that it is plugged into the power source
C) take the monitor or computer to a technician for repair
D) replace the computer's video card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 71 في هذه المجموعة.