Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Study Set 1
Quiz 1: Introduction to the World of Computers
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
-As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.
Question 22
True/False
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
Question 23
True/False
In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
Question 24
True/False
A user inputs data into a computer, and then the computer processes it. _________________________
Question 25
Multiple Choice
In addition to the four primary computer operations, today's computers typically also perform ____ functions.
Question 26
Multiple Choice
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
Question 27
True/False
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
Question 28
True/False
Computer programmers are the people who use a computer to obtain information. _________________________
Question 29
Multiple Choice
In the early 1980s, ____ were invented and computer use increased dramatically.
Question 30
True/False
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
Question 31
True/False
In cloud worlds, online users can explore anonymously. _________________________
Question 32
True/False
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
Question 33
True/False
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
Question 34
True/False
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop. _________________________
Question 35
Multiple Choice
Fifty years ago, computers were used primarily by researchers and ____.
Question 36
Multiple Choice
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
Question 37
True/False
The ISP is the largest and most well-known computer network in the world. _________________________
Question 38
True/False
A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________