0% found this document useful (0 votes)
25 views11 pages

Com 1 2

The document defines various computing terms including formulas, version history, identity theft, cloud storage, presentations, power supplies, responsibility, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views11 pages

Com 1 2

The document defines various computing terms including formulas, version history, identity theft, cloud storage, presentations, power supplies, responsibility, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

COMP ANS KEY

This allows you to see the formula used in a cell


- show formulas

A cloud base web application, used for automatic com**tion


- Google sheet

In order to retrieve a previous working sheet in Google Sheets I am going to


- Use version history in google sheets

Malicious program designed to execute at a predetermined time and/or date.


- Malware

Malicious program that causes damage.


- Malware

In Google SHeet this allows you to provide information such as the location, the owner, date
modified, and created.
- Document details

Avoid sending indiscreet pictures, drunk pictures, drug use pictures or unedited home video.
- Share discretion

This allows you to create a copy of your current document and allows the users to be able to go
back to the previous changes of your document
- Version history

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying
information belonging to another.
- Identity theft

You will be guaranteed that in case your Chromebook gets lost, stolen, or damaged, you won't
lose your files.
- Cloud base

Presentation program included as part of the free, web-based Google Docs Editors suite offered
by Google.
- Google slides

Universal Serial Bus Flash Disk


- All of the above
It provides electricity to run the system like the motherboard, fans, and other internal and
external devices that need electricity. It has 5 volts supply to power electronic circuits and 12
volts mostly to power fans.
- Power supply

All apps provide support which makes them a lot more useful than they once were.
- True

The heart of cyber citizenship.


- Cyber responsibility

Since Chrome OS is a simple operating system, Chromebooks don't need a lot of power
- Battery life

Republic Act 4200 pertains tog


- Anti wire tapping

In Sharing in Google Sheets the owner of the document will be able to do the following except
- Can share as owner

Nothing is more irritating than trying to have a conversation with someone who is engrossed in
their phone or computer.
- Make people reality

The integrity of traffic data and subscriber information relating to communication services
provided by a service provider shall be preserved for a minimum period of six (6) months from
the date of the transaction.
- Preservation

One way to proceed to Google Sheets is by typing in the URL


- https://docs.google.com/spreadsheets/

is a non-destructive program that is designed to log every keystroke made on a computer.


- Key loggers

Unauthorized hindering or interference with the functioning of a computer or computer network


by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer
data or program, electronic document, or electronic data messages, and including the
introduction or transmission of viruses.
- System interface

I can be able to create a shortcut in my Google Drive in Google Docs, Sheets and Slides by:
- Add shortcut to create google doc
After you type in URL or choose from Google Apps then Sheets where does it proceed
- Google sheet home screen

Republic Act 8792 pertains to:


- E commerce

In google sheet home this allows you to open a file


- All of the above

It is a right to have access to the internet intent to have the technology that allows u access to
the internet and cellular networks
- Cyber privilege

In proper way to communicate while interacting people online


- Computer Etiquette

Chrome OS-powered device generally don't have largenard drives and other righ-imp sipes This
means it lighter than most laptops that make more ideal for road warriors
- Weight

An operating system developed and owned by Google is based on Linux and is open-source
and free to use.
- Chrome operating system

Chrome OS ja open-source the signed for completamistive browsing the web and running
Android apps and does not nood high-end share to Work Shareware
- Freeware

In google sheets you can be able to mind your working spreadsheet in


- Six formats

Software designed to force pre-chosen ads to display on your system


- Adware

The software that supports a computer's functions such as scheduling tasks executing
applications and controlling peripherals
- Operating system

The acquisition of a domain name over the internet in bad faith to profit mislead destroy
retion and deprive others from registering the same
- Cybersquatting

Think about it before sending a friend request or accepting an invitation


- Choose friend wisely
Unauthorized access without right to computer system or application.
- Illegal Access

it common to users that computers can perform their task fast compared to people that it take
some time before can be atile to finish computing
- Speed

Respect for online frondom should be amar to that examined by our constitution, especially the
Bill of Rights
- Cyber citizenship

The kind of cyber footprinting that entered knowingly posted or entered online
- Intentional footprinting

Deals with the procedures, values and practices that govern the process of communing
computing technology and its matest disciplines without damaging or violating the mari values
and pellets of any individuals organizations or entity
- Computer ethics

Anything that pointed online automatically becomes the copyright protected product of the
crester
- Cyber property

Downloading songs you didn't purchase


- Digital piracy

Malicious programs angurned to look me a valid program, malang it difficult to astingaan from
programs that are supposed to be there
- TroJan

Communicating with someone using the letters is akin to yelling at that person.
which considered rude and an inappropriate way to communicate with someone entei
- Capital letters

The right's given to persons over the creations of their minds


- Intellectual property rights

Post large files to your own space and send people in the link
- Don't email large

What should be followed in creating a formula in google sheets


- {}{}()
I can be able to transfer my opened google sheet file by
- Use the move

The unlawful prohibited acts defined and pamianaple by Republic Act No. 9775
- Child pornography

Users cannot play high-end and popular gamers on Chrome OS devices because they are not
supported and you cannot be able to play many gates on Chromebooks since they want
powerful machines
- All of the above

Chromebooks are cloud-based the storage space you get on a Chromebook generally a lot
smaller than what you would expect on a Windows laptop
- Limited storage capacity

The allows you to create a Template that will.be applied in all of your design examples and
Images or logo without copy aria pasting to your previous of new slide
- Master

This is a feature of Google slides where you can be able to put specific side and amplayed in
your presentation
- Link

There are a range of ways we can be recognized online.


- Cyber identity

Every citizen of the cyber word as the right to privacy


- Cyber right

Google Chrome OS you can access all these find documents on other devices with an internet
connection anytime.
- Cloud base

Right to explore personal interests without unique interference


- Pursuit

The experience isn't always the best and some apps may not work at all, while others will have
limited functionality
- Wifi connectivity

Once the conditions are being mit the format and color in a cell change
- Conditional formatting
Computers are used arresting officer to create databases of persons nouating the te The
agencies are using computers making affidavits preparation, and preservation of midence like
mobile phones with text message Bocni meon chat messages pictures VIDEO and other
electronic evidence that is allowed by the rules of court
- Law enforcement

it can hold information in a very mitt pepod although the power supply is turned on. These are
more economical in cost and consumption of electricity at a reasonable speed
- DRAM

it can hold information in a very mitt period although the power supply in turned on. These are
more economical in cost and consumption of electricity at reasonable spent
- DRAM

Footprints include such thing as cookies search engine metrics and social media Tracking
- Unauthorized footprints

This allows you to remove the notes in a cell


- Clear notes

Chrome OS is more secure than Windows aptops especially since most of what you download
will be from my Play Store it provides frequent and automatic Chrome OS updates woluding
built-in virus protection
- Secure

Especially involving the internet, represents an extension of existing criminal Dehuvior alongside
some novel illegal activities
- Cyber crime
-
is the rights privileges and responsibilities required of internet and cellular networks
- Cyber citizenship

I can be able to email my google sheet in the following format Except


- Open office spreadsheets format

In google sheet
- Not great for gaming

Chrome OS con about simplicity. The Chromebook operating system is so simple that everyone
would not find any difficulty inding it it hoots up and works fast in seconds
- Simple
it you have given someone your email address or if you are in a position where people.could
reasonably be expected to contact you try one and your email address is public have the
courtesy to reply to their message within a few days
- Respond to email promotly

A small packet of information from a visited webserver stored on your system by your computers
browse
- Cookies

The unauthorized input anteration, or deletion of computer gata or program or interference in


the functioning of a computer system
- Fraud

A security baner designed to keep unwanted intrapers outiude a computer system or network
while allowing safe cortmunication between systems and users on the gr
- Firewall

Refers only to the communication's origin, destination route time date, size, quration, or type of
underlying service, but not content nor gentities
- Traffic data

Unlawful or prohibited acts as defined in Article 355 of the Revised Penal Code
- Libel

Republic Act 995 pertains to


- Anti photo

Avoid name-caling, cuning, coxpressing desperately offensivs opinion social media.


- Use respectful language

Computers can provide people wath entertainment where they can now watch TV programa
movies and shows vill the internet They can be able to play multiplayer or role-playing gamen,
and lasten to music
- Industry
Brain of Computer
- Central Processing Unit

Every time we go online transmit anything over a cellular network, we leave a trace of that activity
- Cyber footprinting

Is around like a phonograph record. It spins when inserted into the disk drive of the computer. The
Read and Write heads inserted into the disk drive of the computer
- Floppy disc

A security barrier designed to keep unwanted intruders “outside” a computer system or network
while allowing safe communication between systems and users on the “inside”
- Firewall

A popular image file format. It is commonly used by digital cameras to store photos.
- JPEG

A form of social engineering carried out by black hats in …


- Phishing

A malicious program designed to execute when a certain criterion is met


- Logic Bomb

This allows you to create a copy of your current document and allows the user to be able to go
back to the previous changes of your document
- Version history

Computers aid humans in industrial jobs. Like the creation of designs of products, regulate the
manufacturing of products. For example, ….
- Industry

This function enables users to be able to get the highest value based on the given range in the
spreadsheet
- Max

Right for fair and reasonable treatment online


- Life

A global computer network providing a variety of information and communication facilities,


consisting of interconnected networks using standardized communication protocols.
- Internet

The rights given to persons over the creations of their minds


- Intellectual Property Rights

Unauthorized interception of any non-public transmission of computer data to, from, or within a
computer system
- Illegal interception

The repeated use of electronic communications to harass or frighten someone


- Cyberstalking

Users of Google Sheets can be able to create a shortcut by


- Add shortcut to Drive
The experience isn’t always the best and some apps may not work at all, while others will have
limited functionality
- Communication failure

I can be able to transfer my opened Google Sheet file by

- Use the move

Google Chrome OS you can access all the files and documents on other devices with an internet
connection anytime

- - Data files

Chrome OS is designed to be cloud-based as much as possible. You have all of Google’s


services available including Google Docs for creating documents, Drive for storing your files and
Photos for all your images
- Android App Support

In Google Sheets home this allows you to open a file


- Owned by me

In Google Sheets home this allows you to open a file


- Open file picker

You might also like