Computer Test 3
What is the term for the practice of using technology to harass, intimidate, or threaten others online?
  • Digital literacy
  • Data encryption
Explanation:
 

Cyberbullying is the deliberate use of digital communication tools to harass, intimidate, or threaten individuals, often through means like social media, emails, or messaging platforms. It encompasses actions such as spreading rumors, sending hurtful messages, and sharing private information without consent, causing significant emotional and psychological harm to victims.

The output quality of a printer is measured by
  • Dot per inch
  • Dot per sq. inch
  • Dots printed per unit time
  • All of above
Explanation:
 

The term "dots per inch" (DPI) is a standard measurement used to assess the resolution and quality of printed output from printers. It quantifies the number of individual ink dots a printer can produce within a one-inch area, directly correlating with the sharpness and detail of images and text on the printed page.

.………………… Is the appearance of typed characters?
  • Size
  • Format
  • Point
  • Colour
Explanation:
 

The term "format" in the context of typed characters refers to the overall appearance that includes attributes such as font style, size, boldness, italics, underline, color, and other typographic settings. It encompasses all aspects of how text is visually presented on a digital or printed medium, ensuring clarity and aesthetic appeal.

What does ISP stand for in the context of internet connectivity?
  • Internet Service Provider
  • Internet Security Protocol
  • Internet Speed Test
  • International Server Protocol
Explanation:
 

ISP (Internet Service Provider) refers to companies or organizations that offer access to the Internet and related services to individuals and businesses. They connect users to the global Internet infrastructure through various technologies like DSL, cable modem, and fiber optics, enabling activities such as web browsing, email, and online communication. Examples include Comcast, AT&T, and Verizon.

What is the primary benefit of using cloud-based storage solutions?
  • Limited storage capacity
  • High upfront costs
  • Scalability and remote access to data
  • Slow data retrieval times
Explanation:

The primary benefit of using cloud-based storage solutions is their scalability, allowing users to adjust storage capacity as needed without physical constraints. Additionally, they provide convenient remote access to data from any location with an internet connection, facilitating collaboration and enhancing productivity across distributed teams and individuals.

What component can be upgraded to improve wireless connectivity on a laptop computer?
  • CPU
  • Battery
  • Wireless network card (Wi-Fi card)
  • Monitor
Explanation:

Upgrading the wireless network card (Wi-Fi card) in a laptop improves wireless connectivity by enhancing support for newer Wi-Fi standards, increasing connection speeds, extending range, and improving reliability. This upgrade equips the laptop with advanced features like MIMO and beamforming, significantly boosting overall wireless performance and user experience.

Hackers
  • all have the same motive
  • break into other people’s computers
  • may legally break into computers as long as they do not do any damage
  • Explanation:

    The term "hacker" encompasses individuals with diverse skills and motives. While some engage in illegal activities like unauthorized access (black-hat hackers), others, such as ethical hackers (white-hat hackers), work legally to improve security by identifying vulnerabilities. This variety underscores the complexity and varied ethical standards within the hacker community.