83%(12)10 out of 12 people found this document helpful
This preview shows page 11 - 15 out of 20 pages.
CONCEPTWorkstation Safety 14 and tablets currently outsell laptop and desktop computers.This statement describes the trend known as __________.•mobilization•visualization •personalization•automationRATIONALEMobile technology, including mobile devices (smartphones), mobile apps, and mobile operating systems (Android, iOS), has created a trend towards mobilization. The next generation of smartphones will be context-aware, and will make use of the growing availability of embedded physical sensors, and data-exchange capabilities. CONCEPTAdvancements in Computer Science15Michiko works for a credit union. When a new employee is hired, the manager contacts Michiko to add a new user to the network and to set appropriate permissions for that user.What is Michiko's role in her organization?
Database Administrator•Network Engineer•Systems AdministratorRATIONALEMichiko is a Systems Administrator. The duties of a Systems Administrator vary from one organization to another. Sometimes referred to "sysadmins," Systems Administrators usually install, support, and maintain servers and other computer systems, and plan for and respond to service outages and other problems.-to-information-technology-2/milestone_take_feedbacks/57018798/13/2020
Sophia :: WelcomePage 13 of 20CONCEPTComputer Scientists and their Roles 16Select the example of computer software.CONCEPTComputer Software 17Luis has an organized system of icons, files, and folders on his computer's home screen.Which element of the Microsoft Windows operating system is Luis using?
Sophia :: WelcomePage 14 of 20Device ManagerRATIONALECONCEPTThe Microsoft Windows Operating System 18Alexis received an email message from an unknown sender that included an attachment. If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?•Opening the attachment would release an active worm, which would infect her system with adware.•Opening the attachment would release a worm, which would infect her system with a virus.•Opening the attachment would release a passive worm, which would infect her system with adware.