module 2 computer concepts exam4310 londonderry road suite 202 harrisburg, pa 17109
Unlike streamed content, downloaded content is stored on the computer. Cloud storage refers to the storage of data on ______. Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. . A software company is working on a new project for a mutual fund organization. CARS stands for Crisp, Accurate, Responsible, Supportable. called ARPANET in the 1960's to design a communications system which had multiple pathways for information, range from 1 Mbps to 150 Mbps but typically is 16 to 60 Mbps, 384 Kbps to 20 Mbps which is slower than cable speed but less expensive, similar to DSL but more global and expensive, a broadband internet service offered by a cable TV provider that uses the same wires to carry both TV and internet signals, telephone lines designed to carry signals and are much faster than ordinary telephone lines, an organizations unique name on the internet, which consists of a chosen name combined with a top level domain such as .com, .org, or .gov, a form of online communication among multiple people at the same time in a chat room, the real time communication between two or more participants over the internet, calls transmitted over the internet instead of over traditional telephone lines or cellular towers. Data to test your program can be found in the joke.txt and punchline.txt files. The module is split into two parts: the first part (A) is the same for all students, the second part (B) contains a number of parallel strands tailored to students interest. Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What laws or strategy are designed to prevent this illegal distribution? (T/F) E-commerce sites use Transport Layer Security (TLS) to create accounts and manage payment transactions without revealing your financial information. (T/F) Information literacy helps us to identify the tool most suited to elicit the kind of information we need. What type of cartoon is Vijay making? What type of program would have a class named Student with objects called fullTime and partTime? What top-level domains is generally used by Internet service providers? A copyrighted story whose copyright has expired; A copyrighted story the author provides permission for. Joe wants to use an engaging image as a hook in his presentation, but he's afraid of violating any copyright laws. An uninstaller removes the program files and any associated entries in the system files. Which of the following should he use as his search query to make this process fastest? Steve has built an online shopping website and he would like to increase his website ranking in the search results. Using the CARS checklist is one way to evaluate if a webpage's content as an information source. In one and a half to two pages discuss how societies use the chosen social media platform for economic growth . MODULE 2 COMPUTER CONCEPTS SKILLS TRAINING 1. What area of software development focuses on the user's reaction to and interaction with the software product? Module 2 Computer Concepts Exam.pdf. number of people authorized to use the software. Which of the following programming languages adds interactivity to websites? Saint Leo University. Which of the following devices should he use for game play? goawaykanye PLUS. One way to create a solid 3-D image for 3-D animation is to apply highlights and shadows to a _____. Information Technology Project Management: Providing Measurable Organizational Value, Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen. Nadia is shopping for a phone that can take photos and identify their geographical location. (T/F) Information literacy can help us recognize the fact that information on the web cannot be taken for face value and must be evaluated critically. Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What could be the reason? What can you do to make sure you are not contributing to software piracy? Which of the following can he do to find this information? Federal law protects credit card users & limits liability for unauthorized use c. Consider using digital wallet i. Suicidal Ideation Among Men and Women College Students. Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. _____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. At what point are you responsible for following the terms in a software license agreement? ; The photograph is available for all to see. LEARNING OUTCOME(S): At the end of this unit, you must: 1. Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. (T/F) A business transaction carried out with a person after being introduced on a social networking website is an example of e-commerce. The buyer has now changed the price in the purchase order to the invoice price. She finds an article on tracyshealthproducts.com. __________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Course Hero member to access this document, 9.1 Critical Thinking Challenge Renovating Your Company Website.docx, Technology for Success - Computer Concepts.docx, 11.3 Critical Thinking Challenge The DNA of Marketing a Webinar.docx, Wayne County Community College District BUS 225, West Georgia Technical College CISM 2201, Western Mindanao State University - Zamboanga City, 2nd Quarterly Assessment in empowerment technology.docx, University of the West Indies at St. Augustine, Western Mindanao State University - Zamboanga City BS CPE CPE 123, Florida National University INTRODUCTI DL-B1, University of the West Indies at St. Augustine COMP 1011, University Malaysia Sarawak IT TMX 1022, Clinical nursing skills techniques 8 th ed p 853 St Louis Mosby Correct Correct, Question 4 1 1 pts What is the common name for an agreement to protect one from, What is it called when a group of workers meet regularly to identify discuss and, 67 He Y et al Y 2019 Efficient removal of PbII from aqueous solution by a novel, The Clinical Instructor and Clinical Faculty will decide based on the number of, Monicas Mantles expects to sell 22000 mantles for 125 each next year The cost, Which is not a property of extender pigments a Increase Gloss b Increase, 13 a BL 1 in the accompanying diagram is Pams budget line Bundle A her optimal, All pattern details are not drafted correctly and accurately Speed Finished the, United States International University (USIU - Africa), Address Confirmaon 6 Accept Externally proofed Idenes Family Incident Response, A patient with diarrhea is incontinent of liquid stool The nurse documents that, Now that you have already explored qualitative research through its, RhetoricalEssayFinalDraft_CalieGallagher.docx, literature would have us believe that a pictured punch is not but a meteorology, Allowance for Doubtful Accounts has a debit balance of 600 at the end of the. RythmOne finds videos or other multimedia; uses speech recognition to match the audio part of a video with your search term. Glendale Community College. Which of the following kinds of gaming is this an example of? Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends? and more. Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Q. Is it advisable to enable automatic updates on security software? What strategy can a computer user employ to maximize the amount of CPU time allocated to the users process? Digital coupon tools are available as browser extensions. Where can you find the information about using an image that you obtained in a search result? What types of programs is the interviewer referring to? Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. 2. What should the app developers release to solve the problems? Now that you're signed into your desktop, you need to access the file Liam posted. MODULE 2: COMPUTER CONCEPT AND DESCRIPTION UNIT 1: HISTORY OF COMPUTERS I. Location of the server hosting the webpage; Design quality of the webpage. Question 6. Resolution of bitmap graphics is typically measured in ___________. The _______ member function moves a files write position to a specified byte in the file. Match. Which of the following is an example of an object-oriented programming language? A license filter in a search engine helps you find images online that you can legally copy for personal or commercial use without paying a fee. What can help Andy? What facilitates bundling of video, audio, codec, and subtitles into a single package? Articles published in a newspaper known to be non-aligned toward any political party. There are 2 correct answers to this question. Modify the avg2.py program to find the average of three exam scores. answer choices. Buy software only from legitimate resellers or directly from the manufacturer. A surgeon has to perform a complex brain surgery on a patient. Selected scenarios and case studies will apply evolutionary concepts, showing the fundamental importance of evolution to a broad range of the life sciences. Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? How can he find and use it without violating copyrights? 'A' is converted to binary code, which the CPU processes. $$ Assignment Interactive Summary Module 3 Computer Systems COM-203-OL02.docx. He wants to quickly crosscheck some facts he stated in his article. Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? A movie animates the credits and the title as 3-D text sinking in the ocean. What search engine tool should she use to find photos she can legally copy and share? Determine key events in the history of computers; 2. Computer Literacy test 3, Excel, module 2. Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. What most aligns to what Gertie feels comfortable doing? Require users to identify themselves using biometrics or passwords. Exam Key.pdf. Which of the following is NOT an image format to store photos? Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. T/F Data, once restricted to papers in the office filing cabinet, now flows freely both in and out of organizations, among employees, customers, contractors, and business partners. What is the primary difference between HTML 5 and Adobe Flash types of web animations? File transfer programs belong in what software category? 10. computer exam 2.pdf. According to chapter 2, is a website with a top level domain of .edu automatically trustworthy, or does its content need to be evaluated. Mateo is designing a diagram showing a water cycle that can extensively be used by various textbook publishers, and he wants to recover the costs he incurs designing it. What approaches can he use for his research? a set of rules for communication between devices that determines how data is formatted, transmitted, etc. Look for the image on Creative Commons using keywords 'monkey swinging. They are free to do so without seeking permission or paying royalty. Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Where do you submit your screenshot of your ILM Final (including your name and grade in the screenshot)? A video that is shared millions of times over social media in a short period of time is termed to be ____________ . What happened to the app? Which is MOST LIKELY to have been the browser he used? CS/IS 262. Carlos is creating an animation by drawing one image in a frame, followed by another image in a slightly different pose, and so on until the motion is complete. Artificial intelligence and machine learning. ; Patricia intends to study the analysis of the results of last five Presidential elections. World Wide Web; B2C website use; Distributions include the Linux kernel and supporting system software and libraries, many of which are provided . a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. magnetic. The quality of an audio file is determined by _____. Which of the following technologies should they use? when you click or take another action to accept the terms. (516242) Correct True Categorize the Various Types of Computer Hardware CC 3-14 Correct B:Processor core - some applications, especially games, have greater processor requirements . Which project team member should he contact for this information? Subject Question (ID) Result Response Remediation Computer Concepts In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly. Image 1 has a resolution of 1500 x 1225. Subject Question (ID) Result Response Remediation Computer Concepts An e-commerce website offers fewer models, colors, and sizes than a physical store. A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. Chapter #10 Lecture Quiz. Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device? A website is experiencing varying levels of traffic throughout the day and is not fully consuming server capacity all the time. Which of the following video resolutions produces the sharpest images and the largest files? Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of a website does Ronald maintain? With simulators usingmotion-sensing consoles. client. Yes; this helps to catch and quarantine new malware before it harms the computer. Where would be the most appropriate location for her to place it on the home page? Want to read all 2 pages? Keith, a 9th grade student, wants to find out if a Pete Clifford, an author of an article on inflation, is an expert in Applied Economics or not. What tools could Russ use to troubleshoot this issue? Which of the following types of software was most likely used to achieve this effect? The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts. Computer Concepts Exam 2. Alejandro has a computer with a powerful processor on which he plays a game where he controls the characters' movements. Unit 10. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. What is Susan most likely browsing? 7 / 50 Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. The sidebar of a webpage typically contains information about when the site was last updated. Marco needs a free image of a monkey swinging on a tree branch for a project. Che contracted with a software development team to create a program for his company. Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? What could be of concern to her while presenting her slides? During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? True. Software simulating a real or imagined environment that appears as 3-D space is also called a _____. Learn. Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? Ronald maintains a website that focuses on travel-related information. A banking app requires stringent access control measures for security reasons. Terms in this set (84) How The Internet Began. (T/F) Steffi needs to find the domain name of the webpage she is currently viewing. MODULE 2 COMPUTER CONCEPTS SKILLS TRAINING.docx - MODULE 2 COMPUTER CONCEPTS SKILLS TRAINING 1. She is not willing to divulge her financial information, and her only bank account is not linked to any online payment service. In addition to Microsoft Intune, which tool is used for Mobile Device Management. Which type of project development methodology should be adopted? He can search the Internet for other articles written by Pete on this topic; He can search LinkedIn to learn if Pete is an expert in that field. Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? Alexis changed a few default settings on a program she was using on her computer. Which of the following is an example of B2C e-commerce? Gertie wants to buy a smartwatch by making an electronic payment. Main Menu; . Alicia often uses short, engaging videos to engage her fifth-grade science students. You are his consultant. Use credit card not debit card i. TB 143. (T/F) Haven runs an online bridal store called Haven Bridals. Test. ? a small text file placed on your computer when you visit a website that is used to identify you when you return, CAPTCHA (Completely Automated Public Turing Test To Tell Computers And Humans Apart), a series of letters and numbers that are distorted in some way, a third party browser extension, such as adobe reader, accessing video or audio clips almost immediately after you click on a link on a webpage without waiting for the entire file to download, an online video that becomes extremely popular because of recommendations and social sharing, labeling images or files with keywords to make them easier to organize, search for, and share, protocol, domain name, top level domain, and resource/file name, Organization That Governs The Naming System, icann (internet corporation for assigned names and numbers), a unique numeric address assigned to each node on a network, originate from telephone numbers, all the blogs on the web and the connections between them, a website that enables you to edit content, even if it was written by someone else, trusting collective opinion of a crowd of people rather than an expert, a format used for distributing web feeds that change frequently, method of exchanging messages via the internet in which the message resides in the mailbox until you decide to read it, does not require the participants to be online at the same time, happens in real time, with two or more people online at the same time, private space where contacts can post status updates, chat, or initiate a video call using google accounts, file storage and sync storage launched by google, working from home and making use of the internet, telephone, and email, the largest image sharing site on the web, the internet address from a website, file, or document in general format, a conversation in a discussion board or forum, the use of technology networks for a local community, a website that enables you to save and share your bookmarks or favorites online, online communities that combine many of the features of other online tools, the hypertext system of info on the internet that enables you to navigate through pieces of info by using hyperlinks that connect them, the authoring language that defines the structure of a webpage, least expensive type of internet connection, names of companies that provide internet access to consumers, a program that extends the functionality of a mobile device, an artificial world that consists of images and sounds created by a computer and is affected by the actions of a person who is experiencing it, a Microsoft technology that enables employees in an organization to access info from any device, a service used to send brief electronic text messages to mobile devices, a protocol that encrypts info before it is sent across the internet, legal protection for literary and artistic works, a nonprofit organization that provides free legal tools to change the creator copyright terms from "All Rights Reserved" to "Some Rights Reserved", the code for acceptable behavior and manners while on the internet, malware computer program that replicates itself in order to spread to other computers, a program sent out by a search engine to crawl the web and gather info, google site to use when searching for scholarly material, refers to the creations of the mind, such a inventions, literary and artistic works, designs, and symbols, names, and images used in commerce, the year that google indexed over 1 billion pages, all the info that someone can find out about you by searching the web, a free file storage and file sharing service provided to anyone with a Microsoft account, the practice of using social media sites to sell products and services, conducting business on the web, buying or selling of products on the web, use this to search a particular website using google, president Bill Clinton makes the first presidential webcast, one business provides products or services for another, sell there goods and services online like amazon, people can sell, find, or trade items online with each other, the area at the top of the browser window in which you can type a URL to visit a website, a mouse gesture in which the user selects one or more objects and drags it to a different location, capture an image of all or part of a computer screen, growing network of physical objects that have sensors connected to the internet, applications and services that are accessed over the internet, process of updating computer files that are in two or more locations, details about a file that describe or identify it, Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen, Information Technology Project Management: Providing Measurable Organizational Value. True/False: Computers represent numbers using base 2 representation. Unfortunately, Alexis does not remember exactly what she changed. While starting an app, Ian received an error message indicating that the version was no longer supported. An growing organization needs to provide software to all of its current and future employees. Select all that apply., To quickly compare two terms in a search, include ___ between the terms. A process called _____ converts analog sound waves into digital sound. Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.
Ultrawide Monitor Picture By Picture, Utter Crossword Clue 4 Letters, Sailor Bailey Chicken And Orzo, Vanguard Construction Etf, Nevada Engineering License Lookup,