What is described as a portable device that can be used to call, text, take photographs and browse the Internet?
ICDL Computer & Online Essentials 4

Flashcard
•
Computers
•
Professional Development
•
Easy
Tracy Treacher
Used 2+ times
FREE Resource
Student preview

20 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Smartphone
Answer explanation
A smartphone is a portable device that allows users to call, text, take photographs, and browse the Internet, making it the correct choice. The other options do not offer all these functionalities.
2.
FLASHCARD QUESTION
Front
Which government service is most likely provided over the internet?
Back
Online tax inquiries
Answer explanation
Online tax inquiries can be efficiently handled over the internet, allowing users to access information and services remotely. In contrast, services like prison management, waste collection, and marriage registration typically require in-person interaction.
3.
FLASHCARD QUESTION
Front
Which one of the following is most likely used by a mobile media device when accessing the Internet? Intranet, Cable, Satellite, Wi-fi
Back
Wi-fi
Answer explanation
Wi-fi is the most common method for mobile media devices to access the Internet, providing wireless connectivity. In contrast, intranet is a private network, cable is typically for wired connections, and satellite is less common for mobile use.
4.
FLASHCARD QUESTION
Front
Which one of the following may allow malware to enter a computer?
Back
Downloading software from the Internet
Answer explanation
Downloading software from the Internet can introduce malware if the source is untrustworthy. Unlike scanning or backing up, which are protective measures, downloading can directly expose a computer to harmful software.
5.
FLASHCARD QUESTION
Front
What best describes malware?
Back
Software that is used to infiltrate a computer system without the owner's consent.
Answer explanation
Malware is defined as software designed to infiltrate or damage a computer system without the owner's consent. The correct choice highlights this unauthorized access, distinguishing it from legitimate software functions.
6.
FLASHCARD QUESTION
Front
Which one of the following passwords is an example of good practice? Options: 12061985, password1, w1g_w@ms, access
Back
w1g_w@ms
Answer explanation
The password 'w1g_w@ms' is a good practice as it combines letters, numbers, and special characters, making it complex and harder to guess. In contrast, the other options are either too simple or easily guessable.
7.
FLASHCARD QUESTION
Front
What helps with data recovery in the event of data loss from a computer?
Back
A backup procedure
Answer explanation
A backup procedure is essential for data recovery, as it involves creating copies of data that can be restored in case of loss. The other options do not provide a means to recover lost data.
Create a free account and access millions of resources
Similar Resources on Quizizz
16 questions
Basic Parts of Computer

Flashcard
•
6th - 10th Grade
17 questions
08 - Protecting Yourself FLASHCARD

Flashcard
•
9th - 12th Grade
16 questions
Protecting Yourself

Flashcard
•
6th - 8th Grade
16 questions
Computer Basics

Flashcard
•
7th Grade
16 questions
LAP NF 003 S 5.02

Flashcard
•
12th Grade
15 questions
Computers Input and Output

Flashcard
•
4th Grade
15 questions
Computers Input and Output

Flashcard
•
4th Grade
15 questions
IT Fun 5.2 Vocab: The Internet

Flashcard
•
9th - 12th Grade
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade