ITE 115 Quiz Questions
Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?
"the quick brown fox"
What search operator would you use with the word "Android" to find Android phone, Android smartphone, and Android cell phone?
* (asterisk)
Which of the following HTML code samples inserts a hyperlink in a webpage?
<a href="http://www.google.com">Google</a>
To insert a heading for a main topic on a webpage, which of the following tags should you use?
<h1> </h1>
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?
A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Google is an example of which type of website?
A search site
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
What is a MAC address?
A unique hardware address for your device
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
Adobe Premiere Clip
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?
Augmented reality
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Which of these is an optical medium of storage?
Blu-ray disc
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?
Emperor penguin colony
News360 is a search engine because it gathers, organizes, and then distributes web content.
False
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
Which of the following is a web app?
Google Docs
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps.
Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?
He is using technology to have students work cooperatively in groups and create a presentation.
Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use?
He should choose a navigation app with artificial intelligence that can provide information about preferred routes.
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?
He should have periodic anti-virus scanning and software upgraded on all computers.
In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.
Information Technology
Which of the following is true about XML?
It provides a way to classify data and share it between applications.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?
JavaScript
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
NOT Being cautious about what information you post on social networking sites.
Which of the following indicates a website is NOT secure?
NOT a lock icon is not displayed in the address bar
Which of the following is not an advantage of saving documents in the cloud?
NOT you can access the documents from any device connected to the internet
If you delete a shortcut from your desktop, have you also deleted the original file?
No, because a shortcut does not place the actual file, folder, or app on the desktop.
Which of the following best defines responsive design?
Pages automatically adjust the size of their content relative to the size of the screen.
At the beginning of the school year, each classroom was given one box of copy paper to make all their copies for the year. How do you think the teachers will be able to make that one box last all year long?
Place as many documents as possible online, reducing the need for paper printouts.
Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?
Processor core - some applications, especially games, have greater processor requirements
Gertie wants to buy a smartwatch by making an electronic payment. She is not willing to divulge her financial information, and her only bank account is not linked to any online payment service. Which of the following most aligns to what Gertie feels comfortable doing?
She should use a virtual account number to make the payment.
Cathy wants to buy a new watch online, but is concerned about security when making the purchase. Which of the following increases the chance that her payment is NOT secure?
Shopping on a website that uses the HTTP protocol
Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?
The author uses emotional language to express a single point of view
In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac toe, and other strategy games. How would you describe the developers' goal in teaching the computer these games?
The developers were using artificial intelligence
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection.
What is uptime?
The measure of a web host's reliability
Which of the following is NOT true about mobile health?
The need for visits to the doctor's office is increased.
Bentley is the head of a software development team and needs to use a web app for project management. Which of the following web apps best suits his needs?
Trello
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.
True
If you have information literacy, you can select the right tool to find the information you need.
True
Information literacy means you can evaluate whether online information is misleading, biased, or out of date.
True
Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.
True
Alicia often shows short, engaging videos to her fifth-grade science students. She has more success using RhythmOne instead of Google to find appropriate videos. Which of the following most likely explains why?
Unlike Google, RhythmOne uses speech recognition to match the audio part of the video with the search term.
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?
Use sleep modes and other power management features for computers and devices.
Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?
Use the web directories created by health research institutions.
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
Virtual reality (VR)
Which of the following would be considered a strong password?
Wbcm2!4!820!
Amanda is used to buying clothes from physical stores. Her friend, Stuart, prefers online shopping and wants to persuade her to shop online as well. Which of the following arguments can Stuart make to convince Amanda without painting a false picture?
You can shop online at any time of day and in any weather conditions
Cloud storage refers to the storage of data on ______.
a server on the Internet
JavaScript likely controls which of the following elements on a webpage
a slide show
What would you need to install if you have an app that is incompatible with your current operating system?
a virtual machine
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
active window
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?
agile development
During which phase of the SDLC is software tested to make sure each function works as intended?
all phases
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
analysis phase
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
android
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
antispyware
_____ ensures that the person requesting access to a computer is not an imposter.
authentication
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?
autoplay
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
be cautious about what information she posts
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
bluetooth
What determines the speed at which data travels?
bus width
What can you do to make sure you are not contributing to software piracy?
buy software only from legitimate resellers or directly from the manufacturer
Which of the following factors can affect processor performance of a CPU?
clock speed
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?
cloud storage
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting
What does a B2C website use to track the items you select on the website?
cookies
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
create a database of company projects, customers, and vendors
How can you protect personal information gathered by legitimate organizations?
create a separate email account for receiving information from websites
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Which of the following devices is the easiest to upgrade, such as by adding RAM?
desktop computers
If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?
digital forensics
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
digital rights management
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
drawing app
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
A router is a system of two or more devices linked by wires or cables.
false
All-in-one computers are easier to service and upgrade but occupy more space than desktop computers.
false
Bandwidth is a term that describes the number of devices connected to a network.
false
Big data is processed using relational databases.
false
HTML coding does not allow for lists using bullets. All lists have to be numbered.
false
HTML has remained the same ever since it was developed, which is why there is only one version.
false
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
false
If you want to become a digital citizen, you only have to buy a piece of technology.
false
Operating systems can run only if they are installed on a hard drive.
false
Programmers use compilers to test code to find errors and provide suggestions to fix them.
false
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
false
The Close button reduces a window so that it only appears as a button on the taskbar.
false
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
false
When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.
false
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
false
Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems?
faulty power or video cable
Which of the following is an authentication method to keep your data safe?
fingerprint scanner
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?
fourth generation language
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
freeware
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
Which of these hardware components can you use to store videos?
hard drive
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer
Which of the following components on a webpage is created using HTML?
heading
Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skills; he is good at figuring out what is wrong with computers and fixing them; and he is patient and helpful when others do not know how to use computers. As his college advisor, which technology careers would you suggest he explore?
help desk support
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
Which of the following is NOT a feature of an Integrated Development Environment (IDE)?
hosts webpages
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?
how visitors are using the site
Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?
html
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?
in RAM
When you save a Microsoft Office file to OneDrive, where are you saving it?
in a storage area located on the server
_____ is data and instructions entered into the memory of a device.
input
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
During the boot process, what does the processor do after the computer circuits receive power?
it begins to run the bootstrap program
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
it places the documents in a buffer
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
jpeg
In terms of privacy, which of the following is a best practice?
keeping your social security number hidden in a locked box in your home
When describing a client/server network, which of the following would be considered a client?
laptop
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Which of the following is a technology designed for use in manufacturing?
machine-to-machine (M2M) communications
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
make the program available as a web app
To access the Internet, a router must be connected to a _____.
modem
Which of the following does a software license usually specify?
number of people authorized to use the software
Digital information processed into a useful form is called _____.
output
A network administrator is usually not required on a _____ network.
peer-to-peer
Devices on a _____ area network are connected via Bluetooth.
personal
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
piracy
When considering a computer to purchase, which of the following factors involves the operating system of the computer?
platform
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
_____ are tools that track the memory usage, status, and errors of currently running software.
process managers
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?
project manager
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
What types of activities are ideal for a robot to perform?
repetitive tasks
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
restorers
What hardware is essential to creating a home Wi-Fi network?
router
Which of the following technologies assists users that have a visual disability?
screen readers
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
site license
Which of the following is an example of a personal area network?
smartwatch and phone connected via bluetooth
The set of activities performed to build a program is called the _____.
software development life cycle (SDLC)
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?
sparklines
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standards
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
tablet
Which of the following is a step in the boot process?
the operating system files are loaded into RAM
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?
they had to unzip or extract it
Why do companies use online collaborative productivity software?
to allow employees to share, edit, and comment on documents
Where can you pin frequently used apps for easy access?
to the taskbar
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
A device driver is a program that controls a device attached to the computer.
true
After designing a website, you transfer the website files from your local computer to a remote web server.
true
Each slide in a presentation has a layout that includes placeholders for certain types of content.
true
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.
true
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
true
If you upload photos to a NAS device, everyone with permissions to access the photos can access them.
true
New cars use embedded computers to make driving safer.
true
Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.
true
Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously.
true
The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.
true
When you create an app, you are protected under copyright laws, even before you apply for a copyright.
true
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
true
What type of security requires something you know and something you have that no one else has?
two factor authentification
Which property is assigned to a file by the operating system?
type
What should you do if a headset plugged into your computer is not working properly?
update the device driver
_____ are new releases of an app and may require an additional fee before you can install them.
upgrades
Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course?
use a learning management system (LMS) to put lectures and tests online
How can you protect a computer from electrical spikes and surges?
use a surge protector
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
A(n) _____ protects your device against unauthorized access.
user account
Which option lists the computer components in order from oldest to newest?
vacuum tubes, transistors, integrated circuits, microprocessors, personal computers
When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem?
video card
A business would use a website analytics tool for all of the following EXCEPT _____.
viewing why someone visited your webpage
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
virtual private network
What device do e-learning applications usually use to help users with visual impairment read digital content?
voice synthesizer
Which of the following is classified as input device?
webcam
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
with responsive design
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
word processor
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?
wordsmithing.com
Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work?
zoho writer