A live webcam has the illusion of moving images because it sends a continual stream of still images.

True or False: CAPS LOCK and NUM LOCK are two examples of toggle keys.

True or False: kiosks are designed to endure a high volume of use and can be used by hundreds of people per day.

True or False: motion input is utilized by the military for flight simulation and weapon training

True or False: a smaller frame rate results in a smaller file size for a video, as well as smoother playback .

True or False: optical character recognition (OCR) and optical mark recognition (OMR) are two technologies used by optical readers

True or False: it is important to exercise caution when using QR codes because they may direct your mobile computer or device to a malicious website or file.

True or False: a data collection device reads and scans data from a source document.

True or False: most current displays use CRT technology.

True or False: contrast ratio defines a display's width relative to its height

True or False: every electronic device emits some level of radiation

True or False: printer resolution is measured by the number of pixels per inch a printer can print

True or False: the Individuals with Disabilities Education Act (IDEA) requires any company with 50 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers.

A _____ ________ is an instruction a user issues by responding to a message displayed by a program or app.

Which of the following is not an example of a pointing device?
A. touchpad
B. trackball
C. touch screen
D. pointing stick

Another name for a graphics tablet is a(n) __________.

Air gestures are used in ________ ______.

The United States Postal Service uses the ________ bar code.

LCD displays typically produce color using _______-______ technology, which uses a separate transistor to supply charges to each liquid crystal cell.

__________ orientation refers to a printout that is wider than it is tall.

How many subwoofers would a 7.2 speaker system contain?

any data and instructions entered into the memory of a computer

one or more keyboard keys that you press to perform an operation system or application-related task

pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard

input device that contains buttons and/or wheels you operate with a thumb or other finger

computer or mobile device's capability of distinguishing spoken words

light-sensing input device that reads printed text and graphics and then translates the result into a form the computer can process

the number of horizontal and vertical pixels in a display

chip that controls the manipulation and display of graphics on a display device

device that functions as both headphones and a microphone

touch-sensitve device that displays the image on a connected computer screen, usually via projector

What is keyboard monitoring software?

Keyboard monitoring software runs undetected and stores every keystroke in a file for later retrieval.

List steps you can take to detect keyboard monitoring software.

1) run detection software regularly
2) review hard disk files
3) check running programs

_______ ______ allows user to guide on-screen elements using air gestures.

Name 3 disciplines in which motion input is being used.

1) entertainment
2) military
3) medical field

technology used with DV cameras that allows you to input, edit, manage, publish, and share your videos

List the steps involved in using DV technology.

1) Select a DV camera
2) Record a video
3) Transfer and manage views
4) Edit a video
5) Distribute a video

A camera that has the illusion of moving images because it sends a continual stream of still images

List steps you can take to prevent unauthorized webcam use.

1) Unplug the webcam
2) Cover the lens
3) Register the hardware
4) Use a strong password

Printer hacking is where an individual from within the organization or outside the building can print a document without permission if the network is connected to the Internet.

List the steps you can take to secure printers.

1) Place printers in a secure room, not out in the open
2) If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life
3) Encrypt documents before sending them to the printer using a secured network
4) Restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print
5) Use a printer program to track and report the types of jobs, and keep a record of the users who sent them
6) Unplug the printer when it is not is use, of do not connect it to a network.
7) Update the printer with the latest firmware.

What type of reference is used to identify the location of webpages or files on the current website?

Each website on the internet is reached by a web address known as a URL (Uniform Resource Locator) that references a specific location on the internet.

Which display technology was developed by Apple produces vibrant colors and supports viewing from all angle?

A P3 wide color gamut provides users with a vibrant, true-to-life color palette. 10-bit depth. Pro Display XDR also features true 10-bit color depth, with the ability to produce more than a billion colors. Super-wide viewing angle.

Which of the following are special keys programmed to issue commands to a computer?

The F1 through F12 FUNCTION keys have special alternate commands. These keys are called enhanced function keys.

Is a collection of unprocessed items including text numbers images audio and video?

Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Information conveys meaning to users.

Toplist

Neuester Beitrag

Stichworte