Passing Grades
  • Start Selling
  • Blog
  • Contact
  • Help
  • 0

    Your cart is empty!

English

  • English
  • Spanish
  • Arabic
Create Account Sign In
  • All Items
    • Recent Items
    • Featured Items
    • Free Items
    • Top Authors
  • Economics
  • Nursing
    • Research Paper
    • Case Study
    • Discussion Post
    • Assignment
    • Exam Review
    • Test Bank
    • Exam
  • General
  • English
    • Creative Writing
    • Research Paper
    • Summary
    • Rhetorics
    • Questions & Answers
    • Literature
    • Research Paper
    • Journal
    • Exam
    • Grammar
    • Discussion Post
    • Essay
  • Business
    • Lecture Notes
    • Solution Manual
    • Presentation
    • Business Plan
    • Class Notes
    • Experiment
    • Summary
  • Pyschology
    • Hesi
    • Presentation
    • Essay
    • Summary
    • Study Guide
    • Essay
    • Test Bank
    • Solution Manual
    • Final Exam Review
    • Class Notes
  • Pages
    • About Us
    • Selling Tips
    • Delivery Policy
    • Faq
    • Privacy Policy
  • Flash Sale
  • Home
  • University of Maryland, University College IFSM 201 All Module Quizzes

University of Maryland, University College IFSM 201 All Module Quizzes

Add To Favorites

Share this item Share this item

  • Item Details
  • Comments (0)
  • Reviews (0)
  • Support
University of Maryland, University College IFSM 201 All Module Quizzes Question 1 Points: 10 out of 10 Which of the following best describes the system unit? Feedback  An electronic component made up of the modem and storage devices  Any hardware component that allows you to enter data  A case that contains the electronic components used to process data  Hardware that sends and receives data over transmission media Correct. Whether it is a desktop, laptop, tablet, handheld PC, or smartphone, the components needed to process data are found in the case. Question 2 Points: 10 out of 10 Which of the following type of system unit is not considered to belong to the family of PCs?  Notebook Feedback  Smart phone  Desktop  Workstation Correct. The processing power of the workstation puts it in a different class from standard PCs. Question 3 Points: 10 out of 10 When purchasing a PC, you should upgrade to the largest amount or number your budget will afford. Feedback Correct. You should purchase as much Random Access Memory (RAM) as your budget allows because it helps with processing speed of the computer. Question 4 Points: 10 out of 10 What is the purpose of an adapter card?  It provides battery power to retain information even when the power is turned off. RAM Feedback  It provides access to flash memory.  It joins a cable to a peripheral.  It enhances functions of a component of the system unit and/or provides connections to peripherals. Correct. Additional functionality such as enhanced video or sound is supported by an adapter card. Question 5 Points: 0 out of 10 What is the purpose of a heat sink? Feedback  To absorb heat generated by the memory modules  To keep the keyboard from overheating  To absorb heat generated by the processor chip  To keep the hard drive from overheating Incorrect. The hard drive generates very little heat while being used. Question 6 Points: 10 out of 10 What is an expansion slot? Feedback  A port used for special equipment  A socket on the motherboard that can hold an adapter card  A device that connects memory to the CPU  A device that joins a cable to a peripheral Correct. An expansion slot is a socket or slot on the motherboard where expansions cards are inserted. Question 7 Points: 10 out of 10 A bay would most likely hold a . Feedback Correct. A hard drive is a component that is installed in a bay inside the system case. Question 8 hard drive Points: 10 out of 10 How would a port most likely be used? Feedback  To provide a place for plugging in expansion cards  To connect additional input, output, storage, and communication devices to a PC  To connect the battery to the computer’s internal circuitry  To provide a place to insert a DVD drive via an opening in the system case Correct. Peripherals or external devices are connected via ports. Question 9 Points: 10 out of 10 Edwin is a consultant working for a large engineering firm. He travels to visit clients and uses his laptop and a smartphone to stay in touch with the home office. His computer must handle business-related software, and he must have a means of contacting clients and the home office. Into what category of user type would you put Edwin?  Power user Feedback  Home user  Mobile user  Small business/home user Correct. A mobile user typically has access to a mobile device (laptop or tablet PC), loaded with sophisticated business software. Edwin also needs mobile communication devices (a smartphone, and perhaps a wifi or datacard for internet access). Question 10 Points: 10 out of 10 Which type of user is most likely to require (not just prefer) a tablet PC?  A satellite user whose primary access to the internet is via a satellite download  A power user working in a corporate office  A mobile user who needs to carry his/her computing device on the road Feedback  A home user working solely at home Correct. The tablet PC is small and easy to carry, making it a good choice for someone who needs to travel with a computing device. Question 11 Points: 10 out of 10 You have been diagnosed with carpal tunnel syndrome in your wrists (related to extensive computer usage). What might be a solution for reducing stress on your wrists? Feedback  Use a flat waterproof keyboard.  Use a keypad that is projected on an external flat surface.  Use a split-style keyboard that separates and angles groups of keys into right- and left-hand portions.  Use a keyboard with internal lighting to support work in low-light conditions. Correct. The angle of the two sections of the keyboard provides a less stressful position of the wrists during typing. Question 12 Points: 10 out of 10 You want to make a system image disk - a copy of the drives that allow the operating system to run (it is used to restore your computer if your hard drive or computer stops working). The system image normally requires up to 32 GB of storage space. Which of the following storage devices would not be appropriate as a backup device? Feedback  A 64 GB flash or thumb drive inserted via a USB port  The 500 GB hard drive installed inside your PC system  A 1 TB external hard drive  A single read/write DVD disk Correct. A single DVD disk can, at most, hold up to 17 GB, not enough for the system image. Multiple DVD disks would be required. Question 13 Points: 10 out of 10 Which of the following are typically used as input devices?  Printer, USB flash drive, web camera Feedback  Modem, system unit, CD drive  Mouse, microphone, scanner  Memory, motherboard, speaker Correct. All three of these devices assist or prepare data for input into the computer. Question 14 Points: 10 out of 10 Which of the following is not an input device? Feedback  Keyboard  Printer  Mouse  Trackball Correct. The printer is an output device by which information is printed in a form that is usable for the user. Question 15 Points: 10 out of 10 Which of the following statements best describes cloud storage? Feedback  Data resides on a server (computer) that you access via the internet.  Data resides on an external drive connected to your computer.  Data resides on a website that you access via the internet.  Data resides on the hard drive installed in your computer. Correct. Cloud storage means your data resides not on your machine, but on the provider’s servers. Question 16 Points: 10 out of 10 What are the four basic categories of output? Feedback  Memory, storage, drives, and language  Text, graphics, audio, and video  Commands, responses, programs, and data  Instructions, pictures, commands, and graphics Correct. These are all types of output. Question 17 Points: 10 out of 10 A cable is a digital device that sends and receives digital modem data over the cable television network. Feedback Correct. This is also called a broadband modem, and it connects to a cable television jack. Question 18 Points: 10 out of 10 If you want to create a home network and want the greatest flexibility in where to locate various computers and other connected equipment around your house, which transmission media provides the most flexibility and least installation effort? Feedback  Fiber optic cable  Coaxial cable  Wireless radio waves  Telephone line Correct. The use of wireless transmission means that computers and other equipment can connect to a wireless router without using cable or wire connections to each piece of equipment. Question 19 Points: 10 out of 10 To protect the information and data you send or receive over the network, what other component is critical to install in your home network?  An uninterruptible power source  Wire, cable, or fiber optic connection between computers Feedback  Parental controls  A hardware or software firewall Correct. A firewall is needed to protect your data and your network from unauthorized access. Question 20 Points: 10 out of 10 Considering the various media options when constructing a home network, which media would be the least secure unless additional security measures are taken? Feedback  Category 5 twisted pair phone wire  Fiber optic cable  Coaxial Cable (used for TV signals)  Wireless connections (radio waves) Correct. Because data is being transmitted via unprotected radio waves, the data can more easily be intercepted and viewed. Thus it is important to encrypt data sent over wireless connections. Question 1 Points: 0 out of 10 Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members? Feedback  I will be use organizational supplies for official purposes only.  I will use my network account only for the purpose specified in my job description.  I will maintain the confidentiality of my username and password.  I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed. Incorrect. This statement is likely to appear in a company’s code of conduct rather than in a professional association’s code of ethics. Question 2 Points: 0 out of 10 You apply for a new credit card but are denied by the issuing institution. When you inquire as to the reason for the denial, you find out that your credit record has been compromised because someone else has used your PII to open an account and has run up a large volume of unpaid bills. This situation reflects which of the following? Feedback  Availability of your credit reports  Confidentially of your credit reports  Integrity of your credit reports Incorrect The confidentiality of a resource refers to who is able to read or access it. The credit card issuer has the right to ask for information from the credit reporting companies before issuing a credit card. Question 3 Points: 10 out of 10 Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?  Minimizing interaction with others on the social network Feedback  Reading the privacy policy of the social networking site  Monitoring your privacy settings and adjusting as necessary  Posting photos of friends Correct. Monitoring your privacy settings and adjusting as necessary is the most important thing you can do to ensure that this information does not get into the hands of a cyberstalker. Question 4 Points: 10 out of 10 What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records? Feedback  Your name and address  Your user ID and password  Your driver’s license number and credit card number Correct. Most of your records can be accessed only with a valid user ID and password. Question 5 Points: 10 out of 10 True or false? A friend gives you his single-user copy of a copyrighted software application program so that you can load it on your computer. Both of you are guilty of an inappropriate use of digital content sharing. Feedback  True  False Correct. You are guilty of copyright infringement for accepting the copyrighted material, but so is your friend who gave it to you. Question 6 Points: 10 out of 10 Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?  Take care of any property assigned to you Feedback  Use the organization’s supplies and services for official purposes only  Maintain the security and confidentiality of your user ID and password  Use your knowledge of organizational information in a responsible way Correct. Marissa, by making any comments about her company’s policies, is not treating the knowledge that she has about those policies in a responsible way; her actions may harm the reputation of her company. Therefore, she is violating a code of conduct provision that mandates using organizational information in a responsible way. Question 7 Points: 0 out of 10 Medical records are protected by the Health Insurance Portability and Accountability Act (HIPAA). Can your medical records be made available to others who request this information (employers, insurance companies, other doctors)?  Yes  No Feedback Incorrect. Confidential information is shared on a need-to-know basis among authorized people. This means that people who legitimately need the information can exchange it, with proper authorization. Question 8 Points: 10 out of 10 The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called . Feedback Correct. Malware, short for malicious software, is specialized software that takes advantage of vulnerabilities in computer hardware and software. Question 9 Points: 0 out of 10 Which of the following is good practice to ensure that you do not get malware on your computer from an online source?  Update your antivirus software either manually or automatically each time you connect to the internet.  Use only the latest version(s) of the browser(s) you normally use to access the internet.  Do not open email attachments. malware Feedback  Block all popups (activate the popup blocker for all sites). Incorrect. Some browsers use popup blockers to block unwanted popups such as advertising on websites. Blocking ALL popups may mean that you are unable to load certain sites. Instead, set your system internet security settings to notify you if a popup is needed. You can then make a decision to allow or disallow the popup. Question 10 Points: 10 out of 10 Having your personally identifiable information compromised is most closely related to . Feedback Correct. Identity theft is closely related to having one’s PII compromised. Once a criminal has your PII, the most likely consequence is that the PII will be used to steal your identity. Question 11 Points: 10 out of 10 identity thef t Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.  Use the same ID and password for all, and change them frequently (every 30 days).
© Report Copyright Violation

Contact the Author

Please Sign In to contact this author.

USD 16

    • Quality checked by Passing Grades
    • Future updates
    • 6 months support from mentor2000
Buy Now

Author Information

Clinton Wanjala

mentor2000

Member since April 2021

  • icon
  • icon
  • icon
  • icon
View Profile
  • total sales

    0
  • Favourites

    0
  • Comments

    0
    ( 0 Ratings )

Item Information

  • Released

    13 July 2023

  • Updated

    13 July 2023

  • Category

    Nursing

  • Item Type

    questions & answers

  • Tags

    University of Maryland University College IFSM 201 All Module Quizzes

More Related Items by mentor2000

TEST BANK FOR ESSENTIALS FOR NURSING PRACTICE 8TH EDITION BY POTTER ALL CHAPTERS
More Info

TEST BANK FOR ESSENT...

  • mentor2000

    mentor2000

  • test bank

...

17 USD

1

5

A &P 1 MA278 BSC2 FINAL MODULE II QUESTIONS & ANSWERS (100 SCORE)
More Info

A &P 1 MA278 BSC2 FI...

  • mentor2000

    mentor2000

  • test bank

...

8 USD

0

1

ATI COMPREHENSIVE 2021 GRADED A
More Info

ATI COMPREHENSIVE 20...

  • mentor2000

    mentor2000

  • ati

...

15 USD

0

0

Purchase

Download link will be sent to this email immediately after purchase.

MARKET FACTS

  • 120 Members
  • 391 Sales
  • 4671 Files

POPULAR CATEGORIES

  • Economics
  • Statistics
  • Philosophy
  • General
  • Computer Science
  • Nursing

More Info

  • Blog
  • Contact
  • Delivery Policy
  • Faq
  • Copyright Claims
  • Privacy Policy
  • Terms of Use

NEWSLETTER

Want more Study Materials? Subscribe to our mailing list to receive an update when new notes are published!

© 2023 Passing Grades. All rights reserved.