BCIS Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

A digital movie shows characters creating an illusion of natural motion, 360 degree rotation, and life-like and dynamic experience on the screen. This movie is most likely a(n)________ movie.

3-D animation

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?

A device management portable app

Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?

A graphics app to design the cover page and place the desired text where needed

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program

How can you protect your information when using social media?

Accept friend requests from people you want to be friends with

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer

Simone frequently downloads mobile apps from Amazon App store. What operating system does she have on her smartphone?

Android

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?

Apache OpenOffice

Computer-aideddesign software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?

Artificial intelligence and machine learning

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format?

As a list of the color numbers for all the pixels it contains

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider?

Because insiders create threats after incidents at their places of employment.

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

Change font size, style, and color of the keywords.

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

Conditional Formatting

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

Create a database of company projects, customers and vendors

Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?

Create trendlines

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

Cyberbullying

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

Drawing app

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

What is the primary difference between HTML5 and adobe flash types of web animations?

HTML5 does not need the user to download additional plug-in software, unlike adobe Flash.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

Header and Footer

How is digital audio better than analog audio in terms of quality?

Higher sampling rate amounts to higher bit rate and hence better audio quality.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called?

In-betweening

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does encryption work?

It scrambles the information until the key is used to unscramble it

The quality of an audio file is determined by ___________.

It's bit rate

Logan is considering web app development as a career option. Which of the following languages does he not need to master?

Logo

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

Which technology is used to convert the electric current to digital form to store and play the synthesized music on a computer or mobile device?

MIDI technology

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?

Make the program available as a web app.

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

Native App

Using which of following methods of accessing media does the user access an original file stored on the media distributor's server?

On-demand content

Paul has opened a bespoke tailoring shop. He wants to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suites should he consider?

OpenOffice, G suite

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

Alejandro has a computer with a powerful processor on which he plays a game where he controls the characters' movements. The game produces at least 1 billion bits of information at 60 frames per second for display. Which of the following kinds of gaming is this an example of?

Real-time animation

With more and more people using technology, what physical health diagnosis is on the rise?

Repetitive Strain injury

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

Rohan has to create a presentation out of his thesis summary. He expects the presentation to have at least 50 slides. Which of the following parts of the presentation should he design first?

Slide master

Avery is wondering if she could replace her traditional cable and satellite television subscription with a video streaming service to watch her favorite movies and TV shows on her TV. What, other than Internet connectivity, does she need to watch her favorite shows and movies?

Smart TV or a TV stick

What technology can be used by people with a hearing disability to listen to a narration?

Speech recognition

Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin?

Synthesized speech

What is a digital certificate?

Technology used to verify a user's identity

How is the environment impacted by computers being thrown away in landfills?

The lead and mercury is seeping into the ground and water supply

An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make it to achieve this?

Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

A construction firm intends to use technology to help and enhance the design and architecture. In which of the following ways can the firm do that?

Use a computer-aided design software to create better and more accurate designs.

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

How can you check data on devices connected through IoT network?

Use a tablet

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: Create a list of invitees; Design the card; and Personalize the card. How should he go about the task?

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future?

Use vector images because they retain their clarity even when enlarged or shrunk

How could an online attacker use your online profile to gather information about you to steal your identity?

Use your posts to figure out answers to possible security questions.

Which of the following kinds of information can be commonly inferred from a video file format name?

Video codec compatibility

Which of the following makes gaming the most realistic and interactive an experience?

Virtual World

Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who?

What-if analysis

Which of the following devices can be used to advance slides without having to click a button on the laptop?

Wireless remote control

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

With simulators using motion-sensing consoles

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work?

Zoho writer

A series of images displayed in sequence to create the illusion of movement is called ______________ .

animation

What would a password manager allow you to do?

create and store multiple strong passwords

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

A feature to identify a picture's geographical location is known as _________________.

geotagging

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

In which of the following real-life situations would it be useful to use a digital certificate?

if you were signing a rental lease

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

R esolution of bitmap graphics is typically measured in ___________.

pixels

We need a(n) _____________ to play certain types of audio files, like MP3, on a desktop or laptop.

stand-alone player

What facilitates bundling of video, audio, codec, and subtitles into a single package?

video container

A video that is shared millions of times over social media in a short period of time is termed to be ____________ .

viral

Which type of gaming system has sensors to detect the users' movements, and a head-mounted display that adjusts the vision and audio thereby replacing the environment as it would appear in real world?

virtual world


Conjuntos de estudio relacionados

World History Fall Final: Short Answers

View Set

Tutorial 08: Enhancing a Website with Multimedia

View Set

Chapter 8 Classes and Objects: A Deeper Look, Java Chapter 8 quiz, JAVA CH8, Chapter 9 Java 401, Ch. 10, Java Quizzes 10-end, Chapter 9 Inheritance

View Set