BUS 1305 exam 2
The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?
A learning management system
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Which company was the first to develop a computer meant for personal use
Apple
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
Be cautious about what information she posts.
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?
Captioning software can be used to transcribe what is being said.
Businesses use webinars for the following reasons EXCEPT
Group discussions
Which of the following is the strongest password?
H@veAGr3atDaY!
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Which of the following would be considered a professional networking website?
What rules should guide your behavior when you interact with friends and coworkers on social media?
Netiquette-Netiquette refers to the rules of Internet etiquette that guide online behavior.
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
Repetitive strain injury-Genevieve is helping to prevent or reduce repetitive strain injuries (RSI) that impact muscles, nerves, tendons, and ligaments in joints while playing video games by taking frequent breaks. She can also change position regularly during playtime, keep a good posture, and get regular exercise.
___ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
The Internet of Things
is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
The digital divide
Cloud storage refers to the storage of data on ______.
a server on the Internet
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a
digital detox
Technology can lead to all of the following behavioral risks EXCEPT
higher satisfaction with life
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing-Phishing is when an attacker convinces his or her victim to enter personal information at an imposter website after receiving a fictious email from a bank.
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?
It is using virtual reality.
What is a digital certificate?
Technology used to verify a user's identity
Which of the following is a step in the email communication process?
The message travels along Internet routers to the recipient.
How do advertisers use data to know which products would most likely appeal to you?
They track your Facebook and Instagram posts and "likes."
How might a business use a blog?
To communicate with customers
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.
True
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How do you create an email message?
Use an app or software to compose and send information.
Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?
Verify the content with an authoritative source.-
____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
Virtual reality (VR)
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?
Web conferences
How would you describe the social networking site YouTube?
YouTube is a media-sharing network.
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of
a hoax-A hoax is the deliberate posting of content intended to cause harm or mislead people by tricking them into believing something that is false. The Mars hoax first began in 2002 and has resurfaced periodically since then.
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.
catfishing-Creating a fake profile for the purpose of misleading others or to leave malicious comments on a website is called catfishing.
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ____
digital footprint-All the information about an individual that exists online, including personal accounts, social media posts, communications, online searches, activities, app usage, and even comments and photos posted by other people about the person contribute to that person's digital footprint.
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supportsdigital inclusion
digital inclusion-Digital inclusion is the movement to ensure that all users, regardless of economic or geographic constraints, have access to the devices, data, and infrastructure to receive high-speed, accurate, reliable information. The goal of digital inclusion is to ensure that everyone has access to online resources related to educational, civic, and employment opportunities, healthcare, and communication.
Social networking includes the following positive effects EXCEPT
increasing your privacy
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.
intellectual property rights
The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) _
learning management system (LMS)
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of
the digital divide-The digital divide is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not. By providing free Internet access during the crisis, the Internet service provider enabled more people were able to access Internet-based resources that they needed.
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality (VR)