BCIS EXAM 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work? A CMS does not allow multiple contributors to use it at the same time. A CMS is just another name for a drag-and-drop procedure that anyone can perform without any restrictions. A CMS allows you to set roles for each person granting responsibility for certain webpages. A CMS just adds capabilities to a website so it does not matter who is working on the website or when.

A CMS allows you to set roles for each person granting responsibility for certain webpages.

How does studying website analytics allow a company perform better? A company will learn which colors and fonts work best. A company will learn when it needs to increase its bandwidth. A company will learn if a new corporate logo has increased market value. A company will learn how many times others have referred them.

A company will learn when it needs to increase its bandwidth.

Which of the following would most likely be a static website? A news site A blog A historical facts page An online shopping site

A historical facts page

What is an ISP? A telecommunications company that sells Internet access. A communications device that connects to a communications channel. A central point for cables in a network for data sharing. A system of two or more devices linked by wires, cables, or a telecommunications system.

A telecommunications company that sells Internet access.

Which of the following describes a domain registrar? A place that manages web servers and disk space. An administrator who oversees a system's uptime and runs reliability checks. A method for determining the amount of bandwidth needed for a specific website. A website where you can go to purchase a name for your website.

A website where you can go to purchase a name for your website.

What tool is used to understand how people use your website? Analytics Uptime FTP client Hyperlink

Analytics

Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent? Antivirus Antispyware Antispam Firewall

Antispyware

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened? Because of net neutrality, your ISP provider has reduced its bandwidth to cut costs, slowing the Internet for you. Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth. Because of FCC rules, content that requires more bandwidth is given preference over content that does not require as much bandwidth. Because of FCC rules, ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.

Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? RFID NFC Bluetooth IrDA

Bluetooth

Which of the following is true about broadband connections? Broadband connections turn off after lack of activity for a period of time, similar to when computers go to sleep. Broadband connections are "always-on" with devices connected to them. Broadband connections are difficult to find as there are few of them around today. Broadband connections require a wireless router in order to increase their speed.

Broadband connections are "always-on" with devices connected to them.

Marly was trying to finish some work on the train during her commute home, but the webpage was not displaying with the proper layout or formatting on her smartphone. Which of the following was likely coded incorrectly to cause the error?

CSS

Which of the following specifies the format and appearance of page content on webpages? URL HTML JavaScript CSS

CSS

How will cellular networks challenge cable and DSL providers in the future? Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services. Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services. Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services. Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.

Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.

It is often required to transfer huge files across locations within businesses and corporate offices. Email usually cannot handle such large files which is why file transfer tools are available to perform such tasks. Which of the following categories of programs and apps do these tools belong to? Productivity (business and personal) Communications Security File, disk, and system management

Communications

What does a DSL modem use to send and receive digital data? Copper telephone wiring Cable TV connections A wireless router A network interface card

Copper telephone wiring

What does XML use to describe data? A plugin Code editor Script-language Customized tags

Customized tags

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? Access controls Intellectual Property rights Digital Rights Management License Agreement

Digital Rights Management

Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link? CSS JavaScript HTML C++

HTML

Which of the following components on a webpage is created using HTML? Heading Background Color Slide show Layout

Heading

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use it and what actions they can perform? Incorporate biometrics and the need for passwords to access the application Ensure installation of antivirus software on every customer's computer Define the license agreements of the application appropriately List out copyright policies to be taken into account while using the application clearly

Incorporate biometrics and the need for passwords to access the application

____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware. Activation Registration Installation Upgrading

Installation

A company intends to improve the productivity of its developers so that the programming is easier and can be finished quickly with fewer syntax errors. What should the company provide to its developers to work? Integrated development environment (IDE) Procedural languages training Compiler/interpreter Code repositories

Integrated development environment (IDE)

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Copyright Intellectual property License agreement Digital Rights Management

Intellectual property

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? Wired network Intranet Extranet Virtual private network

Intranet

Which of the following statements is NOT true about a local firewall? It is a physical device that acts as a protective barrier. It is also called software firewall. It is often built into a company's operating system. It inspects data being transmitted to or from a network.

It is also called software firewall.

Why would you include a banner on your website?

It makes the website more easily identifiable to visitors.

Why is a cable modem classified as a digital model? It only sends digital data over a digital line. It sends and receives digital data over a digital line. It only receives digital data over a digital line. It uses copper wires to enable efficient digital data transfers.

It sends and receives digital data over a digital line.

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important? It will let you know if visitors dislike the company brand or product. It will let you know if customers are buying products somewhere else. It will let you know if your web page appears first when used in a search engine. It will let you know how the visitors are using the site and where there might be problems.

It will let you know how the visitors are using the site and where there might be problems.

What coding language makes a webpage interactive? HTML URL CSS JavaScript

JavaScript

What is a popular language for writing client-side scripts or scripts that run in your browser to control a webpage's behavior? HTML CSS JavaScript Python

JavaScript

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed? JavaScript HTML CSS Python

JavaScript

Which of the following statements is true about public networks? Many public networks are not secure. All public networks are free. Your home network is a public network. Hackers cannot intercept data transmitted over public networks.

Many public networks are not secure.

What defines the behavior of an object in object-oriented programming? Object by itself Class Method Device or platform on which the program runs

Method

Which of the following best defines responsive design? Pages are coded using a series of commands to generate the content. Pages automatically adjust the size of their content to display appropriately relative to the size of the screen. Pages are able to index and find your website regardless of browser. Pages interact with website content stored in a database on a web server.

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

At the monthly meeting, Che, Director of Development, realized that deadlines were disregarded and program codes were missed during development of the department's new interface. The product's budget and schedule were inconsistent so Che was having trouble getting a clear picture of the project and its progress. Whose role and responsibility was all of this? IT department Designer Project manager Programmer

Project manager

A project was successfully implemented for a banking customer. The team that worked on the project was deallocated on the closure of the project. However, the client came back after a couple of months with a few functionality changes and the company could not allocate the same set of developers back to the project. The new team of developers had a tough time understanding the existing code and functionalities. What could be the reason? Prototype was missing and hence the new team had a tough time. Proper documentation was missing that would have helped the new team understand the product better. The system proposal was missing and the new team could not be briefed adequately about the product. The feasibility study of the product was inadequate.

Proper documentation was missing that would have helped the new team understand the product better.

A software development team was asked to release a banking app by a certain date. The app is vast with high security access controls and multiple other features. The team could not meet the deadline with all of the features in it. Which of the following options is the best possible way to troubleshoot this scenario? Release an initial stable version with important features prioritized, and then add features as upgrades. Ignore the planning or analysis phase and focus more on the implementation phase. Omit a few features from the development plan, and release a single version, thereby saving time and cost. Postpone the due date and release a single and final version of the product with all features.

Release an initial stable version with important features prioritized, and then add features as upgrades.

What hardware is essential to creating a home Wi-Fi network? Printer Router Monitor Ethernet cord

Router

Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue? Service pack Patches Upgrades Restorers

Service pack

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering A zombie attack An evil twin Spyware

Social engineering

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? The company would have to use RFID transmitted through radio signals. The company would have to use an IrDA network protocol within close proximity. The company would have to use NFC to facilitate close-range communication. The company would have to use a high-speed data transmission with access to high bandwidth.

The company would have to use an IrDA network protocol within close proximity.

As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing? The amount of space that files will take up on your computer. The inability to access your files if you lose your Internet connection. The files you will lose if your computer crashes. How long it will take to access a backup of files.

The inability to access your files if you lose your Internet connection.

What is uptime? The speed at which data transfer takes place The amount of time you will need to create your website The measure of a web host's reliability The measure of how much time people spend on your website

The measure of a web host's reliability

How does a wireless network key work with an encrypted wireless network? The wireless key is the encryption code needed by the receiver to decode the file. The sending and receiving devices must know the wireless network key to communicate. The wireless network needs the key to decode the data before sending. The wireless network key is your password for logging onto an Internet email system to receive files.

The sending and receiving devices must know the wireless network key to communicate.

How do the HTML tags assist a web server in locating a web address? They create webpages that are compatible with all web browsers. They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader. They tell the reader how many times a page has been searched with the same criteria, leading the reader to assume this page is a correct match. They do not help a web server complete a search, they are only used in coding and server-side scripting.

They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? They use adware filling your screen with unwanted advertisements until you click on one. They overload the server with network traffic so webpages will not load. They disguise the network as an evil twin. They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another? They are interchangeable terms for the same hardware. They provide a central point for cables in a network. They transfer data to all devices. They can only connect to a single device.

They provide a central point for cables in a network.

If HTML is used to specify the content of the webpage, then what do you use CSS for? To make the webpage interactive To define the page layout To include multimedia content To connect to other pages with hyperlinks

To define the page layout

What is the U.S. Federal Communication Commission's role in regard to Internet access? To rate Internet sites similar to movie ratings To restrict Internet access by location and population To regulate the bandwidth each website can have To release rules surrounding Internet access

To release rules surrounding Internet access

Mario is trying to finalize an equipment order before work. He is using his smartphone while riding the train to the office, but for some reason not all the content is appearing. Mario tries turning the phone in his hand to see if landscape orientation would help with the layout problems, but it does not. What have the developers failed to do correctly so that Mario can interact the webpage on his smartphone? Code the site using HTML tags. Include all the server-side scripts for searchability. Enable search engine optimization. Use responsive design.

Use responsive design.

Which of the following would be considered a strong password? Password123 Abc123456789 CatCatCatCat Wbcm2!4!820!

Wbcm2!4!820!

What type of network sends signals through airwaves and usually does not require cables? Wired network Intranet Wireless network Virtual private network

Wireless network

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website? With no graphics, only text With all content on one page With responsive design With a static layout

With responsive design

Which of the following is an implementation of OOP concepts? Producing each functionality in a structured approach Writing objects and creating instances based on functional need Creating methods to define data format of object and create class to define the behavior of an object Writing one program with all functionality, behavior, data and actions

Writing objects and creating instances based on functional need

When using encryption from your home computer, how would you configure the router? You can use the wireless router to set the encryption key and type of encryption. You can use the wireless router to intercept encrypted information and block it from entering the network. You can use the wireless router to verify the security certificate of the encrypted data being sent. You can use the wireless router to encrypt and then decode the encryption on information sent and received.

You can use the wireless router to set the encryption key and type of encryption.

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____. a project an FTP client an absolute reference a consortium

a project

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. ethernet firewall protocol rootkit

firewall

In order for your router to access Internet connections, it must be connected to a _____. network hub switch modem

modem

Devices on a _____ area network are connected via Bluetooth. local wide metropolitan personal

personal

Which of the following is true about XML? It describes content and how to present it in a browser. It stores layout information in a text format for a browser to interpret. It provides a way to classify data and share it between applications. It contains predefined tags to describe placement of content on a webpage.

the third one

A business would use an analytic tool for all of the following EXCEPT _____. viewing the number of pages a person visited viewing the number of new and returning visitors viewing why someone visited your webpage deciding when to increase bandwidth

viewing why someone visited your webpage

Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. will allow user interaction is meant for infrequent updates is cheaper to maintain requires less storage space on a server

will allow user interaction

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. code computer hardware wireframes Microsoft office

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice? premiereditorialskills.com wordsmithing.com jin-102887.com R2D2editing.com

wordsmithing.com


Conjuntos de estudio relacionados

IB Design Technology Topic 1-6 (except 4)

View Set

Chapter 53: Assessment and Management of Patients with Male Reproductive Disorders

View Set

NUR 108 Ch 42 Stress and Adaptation

View Set

Chapter 28: Progressivism & the Republican Roosevelt

View Set

I. Enterprise Risk Management, Internal Controls, and Business Processes Part 1

View Set

Skills Lesson: Figurative Language and Imagery 80%

View Set

Emt ch16 Cardiovascular Emergencies

View Set