BCIS Exam #2
Ways you can monitor and protect your financial data
1. Being cautious about what information you post on social networking sites. 2. Querying unfamiliar purchases found on your bank statements. 3. Throwing financial documents older than three months in the trash.
Various risks from attacks on Wi-Fi networks
1. reading wireless transmissions 2. viewing or stealing computer data 3. downloading harmful content
A digital movie shows characters creating an illusion of natural motion, 360 degree rotation, and life-like and dynamic experience on the screen. This movie is most likely a(n)________ movie.
3-D animation
Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project?
A graphics app to design the cover page and place the desired text where needed
Peter has an old family photograph which wasn't taken using a professional camera, owing to which it looks blurred. Which software can he use to improve the quality of the photograph?
A photo-editing software like photoshop to enhance and retouch
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your computer.
Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
Android
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download?
Apache OpenOffice
Computer-aided design software helps architects, engineers, and scientist to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?
Artificial intelligence and machine learning
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
Change font size, style, and color of the keywords
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
Conditional formatting
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers and vendors.
What would a password manager allow you to do?
Create and store multiple strong passwords.
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
Drawing app
A graphics designer created the company's logo so the company can resize it to multiple dimensions based on the need without the use of any photo editors. Which of the following image file formats is most likely to have been used to make this happen?
EPS
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other?
G Suite
How is digital audio better than analog audio in terms of quality?
Higher sampling rate amounts to higher bit rate and hence better audio quality.
In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called?
In-betweening
Which of the following is not an analog device?
Laptop
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
Native app
Using which of following methods of accessing media does the user access an original file stored on the media distributor's server?
On-demand content
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Requesting a credit report and freezing your credit.
Rohan has to create a presentation out of his thesis summary. He expects the presentation to have at least 50 slides. Which of the following parts of the presentation should he design first?
Slide master
Avery is wondering if she could replace her traditional cable and satellite television subscription with a video streaming service to watch her favorite movies and TV shows on her TV. What, other than Internet connectivity, does she need to watch her favorite shows and movies?
Smart TV or a TV stick
Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin?
Synthesized speech
How is the environment impacted by computers being thrown away in landfills?
The lead and mercury is seeping into the ground and water supply.
How is streaming of video or audio different from downloading it?
Unlike streamed content, downloaded content is stored on the computer
An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make it to achieve this?
Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How can you check data on devices connected through IoT network?
Use a tablet
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1. Create a list of invitees; 2. Design the card; and 3. Personalize the card. How should he go about the task?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Which of the following kinds of information can be commonly inferred from a video file format name?
Video codec compatibility
Which of the following makes gaming the most realistic and interactive an experience?
Virtual World
Which of the following devices can be used to advance slides without having to click a button on the laptop?
Wireless remote control
A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?
With simulators using motion-sensing consoles
Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?
Word processor
Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an internet connection, what software can help her do her work?
Zoho writer
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
In which of the following real-life situations would it be useful to use a digital certificate?
if you were signing a rental lease
The quality of an audio file is determined by ___________.
its bit rate
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
Resolution of bitmap graphics is typically measured in _____
pixels
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
A video that is shared millions of times over social media in a short period of time is termed to be _______
viral