BCIS Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

The difference between LAN and WAN is _____

Geographical area

The reduction of electricity consumed and the environmental waste generated when using a computer is called ____

Green computing

Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link?

HTML

Collectively, the four operations of input, process, output, and storage is considered to be the _____

Information processing cycle

Any hardware component used to enter data is a(n) ____

Input device

_________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.

Installation

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?

Interpreters

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a- Wired network b- Virtual private network c- Extranet d- Intranet

Intranet

What is uptime?

The measure of a web host's reliability

A modem can also function as what other piece of hardware? a- A switch b- A router c- A network interface card d- A hub

A router

What is a MAC address? a- An IP address unique to Apple's MAC computers b- The connection needed to access to a cellular network c- A unique hardware address for your device d- An alternate name Internet Protocol version 6

A unique hardware address for your device

Which of the following describes a domain registrar?

A website where you can go to purchase a name for your website.

Businesses use webinars for all of the following reasons except?

Group discussions

____ conveys meaning and is useful to one or more people

Information

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.

Installation

____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.

Installation

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders

A _____ includes the file name and possibly a directory or folder name

Path

A printer that produces photo-quality pictures is considered to be a(n) ____

Photo printer

_______ are types of tools that track the memory usage, status, and errors of currently running software.

Process Manager

_____ are tools that track the memory usage, status, and errors of currently running software.

Process managers

__________ are types of tools that track the memory usage, status, and errors of currently running software.

Process managers

In which category of software do Microsoft Office Word and Excel belong?

Productivity

A ____ is a set of computer instructions that carries out a task on the computer

Program

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load.

True

Flash memory cards are solid-state media with no moving parts

True

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

True

Magnetic Disks use magnetic particles to store items on the disks surface

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.

True

Microsoft Windows 10 is compatible with office, 2010,2013, and 2016

True

When you create an app, you are protected under copyright laws, even before you apply for a copyright.

True

A flash memory storage device that plugs into a USB port is called a

USB Flash Drive

A _____ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network

Worm

Which of the following is an implementation of OOP concepts?

Writing objects and creating instances based on functional need

A business can use a wiki in all of the following ways EXCEPT for ______.

aggregating content

A business can use a wiki in all the following ways EXCEPT for _____.

aggregating content

During which phase of the SDLC is software tested to make sure each function works as intended? -all phases -design -analysis -implementation

all phases

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

If you want to remove an older email from your inbox, but not permanently delete it, you can _______ it.

archive

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? a- The company would have to use NFC to facilitate close-range communication. b- The company would have to use RFID transmitted through radio signals. c- The company would have to use an IrDA network protocol within close proximity. d- The company would have to use a high-speed data transmission with access to high bandwidth.

c- The company would have to use an IrDA network protocol within close proximity.

In a connected network, how are hubs and switches similar to one another? a- They transfer data to all devices. b- They are interchangeable terms for the same hardware c- They provide a central point for cables in a network. d- They can only connect to a single device.

c- They provide a central point for cables in a network.

Which of the following tools translates the source code of a procedural program into binary code?

compiler

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

crash

Which of the following is not a resource able to be shared in a network? a- Files b- Printers c- Software d- Motherboards

d- Motherboards

A URL consists of a ____, domain name, sometimes the path to a specific web page or location in a web page, and the web page name

protocol

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials.

piracy

What is an ISP?

A telecommunications company that sells Internet access.

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?

App Store for iOS

A storage device is used to store data when the data is not being used in memory

True

A kilobyte represents approximately ____ memory locations

1,000

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to set roles for each person granting responsibility for certain webpages.

How does studying website analytics allow a company perform better?

A company will learn when it needs to increase its bandwidth.

During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken, would be a bad one?

A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary

During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken would be a bad one?

A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary.

Which of the following would most likely be a static website?

A historical facts page

What is an evil twin in the computer world? a- A device infected with malware that an attacker uses to control the device remotely. b- An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence. c- A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. d- A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

Simon established a startup. He wanted to secure a domain name and have a website to market and sell his products. In this regard, which of the following should be the first step?

Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements.

How would you design a webinar that would be interactive?

Add a poll

A software company is working on a new project for a mutual fund organization. The client expects the scope the project to be flexible; their goals are evolving and they needed to test the product as and when components are finished . Which type of project development methodology should be adopted?

Agile Development

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as and when components are finished. Which type of project development methodology should be adopted?

Agile development

A company received a proposal for the development of a new software. While analyzing the specifications, it was found that there was no clear goal and the scope of the project could evolve. Which methodology should the company adopt to execute this project?

Agile development methodology/ model

Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer?

An open source program

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files, as well as any associated entries in the system files.

In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing?

Analysis phase

What tool is used to understand how people use your website?

Analytics

Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent?

Antispyware

What type of program would have a class named Student with objects called fullTime and partTime?

B:object-oriented program

Why does net neutrality affect Internet connections?

Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a TV show, your brother is playing an online game, and your parents are both checking emails. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened? a- Because of FCC rules, ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided. b- Because of FCC rules, content that requires more bandwidth is given preference over content that does not require as much bandwidth. c- Because of net neutrality, your ISP provider has reduced its bandwidth to cut costs, slowing the Internet for you. d- Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?

Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? a- RFID b- IrDA c- Bluetooth d- NFC

Bluetooth

Which of the following is true about broadband connections? a- Broadband connections are "always-on" with devices connected to them. b- Broadband connections require a wireless router in order to increase their speed. c- Broadband connections turn off after lack of activity for a period of time, similar to when computers go to sleep. d- Broadband connections are difficult to find as there are few of them around today.

Broadband connections are "always-on" with devices connected to them.

Marly was trying to finish some work on the train during her commute home, but the webpage was not displaying with the proper layout or formatting on her smartphone. Which of the following was likely coded incorrectly to cause the error?

CSS

Which of the following specifies the format and appearance of page content on webpages?

CSS

How will cellular networks challenge cable and DSL providers in the future? a- Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services. b- Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services. c- Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services. d- Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.

Cellular providers are continuing to increase theirs speeds and bandwidth causing users to drop cable and DSL services.

______ storage is an internet service that provides hard disk storage to computer users

Cloud

_____ is an internet service that provides hard disk storage online to computer users

Cloud storage

Each ____ on a menu performs a specific action

Command

File transfer programs belong in what software category?

Communications

It is often required to transfer huge files across locations within businesses and corporate offices. Email usually cannot handle such large files which is why file transfer tools are available to perform such tasks. Which of the following categories of programs and apps do these tools belong to?

Communications

What does a DSL modem use to send and receive digital data? a- A wireless routerb- Copper telephone wiringc- Cable TV connectionsd- A network interface card

Copper telephone wiring.

File management does not include ____

Copying files

The LCD monitor uses a liquid ______ display to produce images on the screen

Crystal

Which of the following could indicate a DoS attack on your company server? a- Customers are required to enter personal information as they complete an order form. b- Customers cannot download the most recent newsletter. c- Customers cannot view the website on their device because the page will not load. d- Customers are receiving too many emails about special offers.

Customers cannot view the website on their device because the page will not load.

What does XML use to describe data?

Customized tags

______ is a collection of unprocessed items

Data

Which of the following is a general guideline for developers?

Define the standards, or sets of rules and procedures, to create a standard product.

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital Rights Management

Screen resolution indicates the number of pixels (_____) that the computer used to display the letters, numbers, graphics, and background you see on the screen

Dots

Archie wants to use a newly launched web browser on his computer. What steps should he ideally follow to get it on his system?

Download the program from the manufacturer's website and install it on his computer.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? a- You could encrypt the data and then use the company NAS device and assign permissions only to the president. b- You could send the email and then forget to attach the report causing the president to call and ask you about it. c- You could encrypt the data in the report that only you can decode. d- You could send a flash drive with the report on it that you have password protected with the president's name.

Encrypt the data in the report

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? a- Extranet b- VPN c- Wi-Fi d- Intranet

Extranet

A dialog bar is displayed when windows 10 needs to supply information to you

False

A gigabyte represents approximately one million memory locations

False

A graphical user interface is an interface that displays graphics only

False

A root kit is a collective name for malicious software that is secretly added to a users computer that act without the users knowledge and deliberately alter the computers operations

False

A smart band is a narrow band that forms a circle on the disks surface

False

Cloud backup software periodically saves your files and settings to an external hard drive.

False

Like a virus or worm, a Trojan horse does not replicate itself to other computers

False

Programmers use compilers to test code to find errors and provide suggestions to fix them.

False

Sleep command will save all of your work and then shut the computer down

False

T/F: Some of the more commonly used system software programs are word processing, presentation, spreadsheet, database and email

False

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

_________ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.

Firewall

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

Fourth generation language

A ____ is a set of choices, often graphical, arranges in a grid or in a list

Gallery

Which of the following components on a webpage is created using HTML?

Heading

A scroll bar is a ____ bar that appears when the contents of an area may not be visible completely on the screen

Horizontal, vertical

______ is the communications standard used to transfer pages on the web

Hypertext transfer protocol

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use it and what actions they can perform?

Incorporate biometrics and the need for passwords to access the application

A company intends to improve the productivity of its developers so that the programming is easier and can be finished quickly with fewer syntax errors. What should the company provide to its developers to work?

Integrated development environment (IDE)

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.

Intellectual property

What is one advantage of a company using an anonymous messaging app?

It allows for honest feedback without disclosing identities.

An online game developer had an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email? a- The signature was consistent with other emails from your bank. b- It was written in an overly formal tone. c- It contained typos and other grammatical errors. d- It did not include a promotional offer.

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall? a- It is also called software firewall. b- It is often built into a company's operating system. c- It inspects data being transmitted to or from a network. d- It is a physical device that acts as a protective barrier.

It is also called software firewall

What is the working procedure of DevOps methodology?

It produces programs quickly, and then offers continuous updates to increase the functionality of the program.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important?

It will let you know how the visitors are using the site and where there might be problems

Which of the following is an example of an object-oriented programming language?

Java

A ____ is an input device on which you key in, or type, data.

Keyboard

______ are keys you press to quickly perform a task using the keyboard

Keyboard Shortcuts

Which of the following network standards applies to cellular networks?

LTE

When describing a client/server network, which of the following would be considered a client? a- Desktop b-External hard drive c- Laptop d- Printer

Laptop

_____ off the computer closes any open programs, allows users to save any unsaved documents, end the Windows 10 system, and makes the computer available for other users

Logging

A utility program will allow you to complete:

Managing disk drives, printers and other media

Which of the following statements is true about public networks? a- Your home network is a public network. b- All public networks are free. c- Hackers cannot intercept data transmitted over public networks. d-Many public networks are not secure.

Many public networks are not secure.

To maintain professional communication, you should avoid using all of the following EXCEPT _____.

Meeting invites

To maintain professional communication, you should avoid using all of the following EXCEPT ________.

Meeting invites

The main circuit board of the system unit is the _____

Motherboard

Which of the following is not a resource able to be shared in a network?

Motherboards

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? a- Jenn's iPhone b- My Verizon VPN c- xfinitywifi d- Starbucks Wi-Fi

My Verizon VPN

What internal device does a computer use to connect to a wired or a wireless network? a- Network interface card b- Motherboard c- Switch d-Hub

Network interface card

A gigabyte represents approximately ____ memory locations

One billion

A(n) ____ allows users to communicate with and control their computers

Operating System

Which of the following best defines responsive design?

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

A task pane can remain open while working in a document

True

At the monthly meeting, Che, Director of Development, realized that deadlines were disregarded and program codes were missed during development of the department's new interface. The product's budget and schedule were inconsistent so Che was having trouble getting a clear picture of the project and its progress. Whose role and responsibility was all of this?

Project manager

A project was successfully implemented for a banking customer. The team that worked on the project was deallocated on the closure of the project. However, the client came back after a couple of months with a few functionality changes and the company could not allocate the same set of developers back to the project. The new team of developers had a tough time understanding the existing code and functionalities. What could be the reason?

Proper documentation was missing that would have helped the new team understand the product better.

What kind of products are accessible from the Internet without requiring permission to use them, thereby free from being subjected to copyright violations?

Public domain products

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public domain software

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

Publish to a web server

Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this?

Ransomware

Which software development method uses highly skilled programmers to shorten the development process while producing quality software?

Rapid Application development model

A software development team was asked to release a banking app by a certain date. The app is vast with high security access controls and multiple other features. The team could not meet the deadline with all of the features in it. Which of the following options is the best possible way to troubleshoot this scenario?

Release an initial stable version with important features prioritized, and then add features as upgrades.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

When it comes to secure data storage on a network, which of the following statements is true? a- Encrypted files are not able to be saved on a network attached storage device. b- Files stored on a network are accessible to all who can access that network. c- Passwords are the safest method for protecting files on a network. d- Roles can be granted to individuals to view files and make changes to files on a network.

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network? a- Router b- Ethernet cord c- Monitor d- Printer

Router

In the email communication process, what is the role of the email server?

Routing email messages through the Internet or a private network.

Which commonly used programming language is used to manage, access, and search for database content?

SQL

Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue?

Service pack

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?

Service pack

Which of the following programs are distributed for little or no cost, or for a brief trial period?

Shareware

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

Shareware

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a- She has installed switches that interact with the installed app on her phone. b- She uses a hub at her home that she connects to through the app. c- She dialed into her home modem through the app and sent a command through the router. d- She has a home network with smart home devices.

She has a home network with smart home devices.

The ____ shows the name of every computer user on the computer

Sign-in screen

An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase?

Site license

Daniela's company has made the decision to allow employees to work from home as the company has outgrown their physical space. Knowing that not all employees may have the same device, what would be the best method of digital communication that would allow employees to see each other and participate in meetings seamlessly?

Skype

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?

Social curation sites

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a- A zombie attack b- Spyware c- Social engineering d- An evil twin

Social engineering

______ is an online community that encourages members to shake their interests, ideas, photos, videos, etc. with other users.

Social networking

____ is the process of creating programs and apps from the idea stage to distribution to users.

Software development

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

A utility program allows a user to perform maintenance type tasks usually relates to managing a computer, it's devices or it's programs

True

In a _______ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a- Mesh b- Ring c- Star d- Bus

Star

Which of the following is not a general guideline for developers?

Start programming before creating a proposal.

During which phase does the program or app receive necessary maintenance, such as fixing errors or improving its functionality, performance monitoring to ensure the efficiency of the program or app?

Support and Security phase

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

Support and security phase

The case that contains electronic components of the computer used to process data is a ____

System Unit

Hector wants to purchase a new laptop. Which of the following is the most important pre-installed program that he should check for on the laptop before buying it, so that he can start to use the laptop as soon as he owns it?

System software

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?

Tester

You posted new photographs from your trek to Nepal up on Shutterfly, and the site asks you to review the metadata. You would review all of the following EXCEPT _______.

The HTML coding

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

How does a wireless network key work with an encrypted wireless network? a- The wireless network key is your password for logging onto an Internet email system to receive files. b- The sending and receiving devices must know the wireless network key to communicate. c- The wireless key is the encryption code needed by the receiver to decode the file. d- The wireless network needs the key to decode the data before sending.

The sending and receiving devices must know the wireless network key to communicate

How do the HTML tags assist a web server in locating a web address?

They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader.

Devices on a _____ area network are connected via Bluetooth. a- Personal b- Local c- Wide d- Metropolitan

personal

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? a- They overload the server with network traffic so webpages will not load. b- They disguise the network as an evil twin. c- They use adware filling your screen with unwanted advertisements until you click on one. d- They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

They disguise the network as an evil twin.

If you do not want to use your Internet Service Provider (ISP) for your email account, how could you acquire a webmail account?

Through an online service

How might a business use a blog?

To communicate with customers

If HTML is used to specify the content of the webpage, then what do you use CSS for?

To define the page layout

What is the U.S. Federal Communication Commission's role in regard to Internet access? a- To release rules surrounding Internet access b- To restrict Internet access by location and population c- To regulate the bandwidth each website can have d- To rate Internet sites similar to movie ratings

To release rules surrounding Internet access

A(n) ______ is a narrow record in band that forms a full circle on the surface of the disk

Track

A class is a type of object that defines the format of the object and the actions it can perform.

True

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.

True

_____ are new releases of an app and may require an additional fee before you can install them.

Upgrades

___________ might include additional features not available in the version you currently are running. They are new releases of the program or app, and may require an additional fee to enable the program to install.

Upgrades

How do you create an email message?

Use an app or software to compose and send information.

Mario is trying to finalize an equipment order before work. He is using his smartphone while riding the train to the office, but for some reason not all the content is appearing. Mario tries turning the phone in his hand to see if landscape orientation would help with the layout problems, but it does not. What have the developers failed to do correctly so that Mario can interact the webpage on his smartphone?

Use responsive design

A company develops a gaming application that intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this?

Use the activation technique

A company develops a gaming application that it intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this?

Use the activation technique

What area of software development focuses on the user's reaction to and interaction with the software product?

User experience

A(n) ____ is hardware and software that you use to control and communicate with your PC

User interface

Social networking can leave you exposed to criminal activity in all of the following ways except?

Using photo and posts found about you on the apps to form opinions about your ethics and character.

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in bikini on Facebook and texted them to other men in the office.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? -Extranet -Intranet -Wireless network -Virtual private network

Virtual private network

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? a-Intrane tb- Wireless network c- Virtual private network d- Extranet

Virtual private network

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

Visit the manufacturer's website and install the latest updates for the app.

Which of the following would be considered a strong password?

Wbcm2!4!820!

What type of network sends signals through airwaves and usually does not require cables? - Wireless Network - Wired Network - Intranet - Virtual Private Network

Wireless network

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

With responsive design

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

With stimulators using motion- sensing consoles

Is it advisable to enable automatic updates on security software?

Yes; this helps in catching and quarantining any new malware before they harm the computer.

When using encryption from your home computer, how you configure the router? a- You can use the wireless router to intercept encrypted information and block it from entering the network. b- You can use the wireless router to verify the security certificate of the encrypted data being sent. c- You can use the wireless router to set the encryption key and type of encryption. d- You can use the wireless router to encrypt and then decode the encryption on information sent and received.

You can use the wireless router to set the encryption key and type of encryption.

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?

You could encrypt the data in the report that only you can decode.

How would you describe the social networking site YouTube?

YouTube is a media-sharing network that lets users display and view videos and then post comments.

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.

digital rights management

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. a- ethernet b- firewall c- protocol d- rootkit

firewall

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

firewall

Posting hostile or insulting comments in response to someone else's blog post is called _____.

flaming

Posting hostile or insulting comments in response to someone else's blog post is called _______.

flaming

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

freeware

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

Social networking includes all of the following positive effects except ________.

increased privacy

Social networking includes all of the following positive effects except _________.

increased privacy

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

integrated development environment (IDE)

What is a popular language for writing client-side scripts or scripts that run in your browser to control a webpage's behavior?

javascript

What defines the behavior of an object in object-oriented programming?

method

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

In order for your router to access Internet connections, it must be connected to a _____. a- hub b- modem c- network d- switch

modem

Which of the following does a software license usually specify?

number of people authorized to use the software

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

What do you call the rules each programming language has for writing instructions?

syntax

As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing? a- How long it will take to access a backup of files. b- The inability to access your files if you lose your Internet connection. c- The files you will lose if your computer crashes. d-The amount of space that files will take up on your computer.

the inability to access your files if you lose your Internet connection.

A business would use an analytic tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

waterfall method

At what point are you responsible for following the terms in a software license agreement?

when you click or take another action to accept the terms

Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website _______.

will allow user interaction

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com


Conjuntos de estudio relacionados

Binary, Hexadecimal, octal and all that shizzle

View Set

Chapter 22: Management of Patients with Arrhythmias and Conduction Problems

View Set

Energy and Forms of Energy, Energy Transformation

View Set

2.1 Concepts of Effective Communication

View Set

Chapter 1: The Sociology of Health, Illness, and Health Care

View Set

Researching Online - Digital Citizenship

View Set

Nursing Care of the Child With an Alteration in Mobility/Neuromuscular or Musculoskeletal Disorder

View Set

DMV Practice Test #3, Permit Practice #2, Nevada's Driver Handbook, DE 17, Practice Driving Test 3, drivers, Driving

View Set