ITE exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Why is it important to be able to export data in an XML format It allows data to be shared between applications Needed to assign attributes Controls the appearance of the webpage Convert code into HTML for a webpage

It allows data to be shared between applications

After designing a webpage you transfer the website files from your local computer to remote web server True or false

True

Assembly languages are used second generation of languages that use second symbolic codes such as A for add,M for multiply, and L for load? True or false

True

If you upload photos to a Nas device everyone with permissions to access the photos can access them True or false

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. True or false

True

You use CSS to to specify the appearance of content on a webpage. True or false

True

What area of software development focuses on the user's reaction to and interaction with the software product? System documentation User experience Quality assurance Technical feasible

User experience

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website? • with responsive design • with a static layout • no graphics only text • all content on one page

With responsive design

Which of the following would be considered a strong password

Wbcm2!4!820!

Programers use compilers to test code to find errors and provide suggestions to fix them True or false *debuggers

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. True or false

False

Social-Networking sites have a history of providing tight security and giving users a clear understanding of how security works True or false

False

When including an image and HTML code you would use a <a href> tag True or false

False

4G and 5G networks provide slower data transmission speeds than 3G networks. True or false

Fasle

Which of the following is the strongest password?

H@veAGr3atDaY!

Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link? CSS HTML C++ JavaScript

HTML

What defines the behavior of an object in object oriented programming? Device or platform on which the program runs Class Method Object by self

method

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? Mobile hotspot Bluetooth connection Virtual private network Cell phone hotspot

mobile hotspot

Which of the following websites most likely uses XML-formatted data? • an e-commerce site that lets you compare products from different vendors • an entertainment site that plays videos • an e-commerce site that lets you keep a wish list • A new site that displays up-to-date headlines

an ecommerce site that lets you compare products from different vendors

Which of the following tools translates the source code of a procedural program into binary code? Source code editor Debugger Code repository Compiler

compiler

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? Piracy Crash Patch Activation

crash

To insert a heading for a main topic on a webpage, which of the following tags should you use? • <title> • <h1> • <h4> • <main>

<h1>

When using a content management system (CMS) how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work? • A CMS allows you to grant access to capabilities such as adding or moving content based on a contributors role • The CMS just adds capabilities to website so it does not matter who is working on the website or when • CMS does not allow multiple contributors to use it at the same time • A CMS is just another name for a dragon drop procedure that anyone can perform without any restrictions

A CMS allows you to grant access to capabilities such as adding or moving content based on a contributors role

Which of the following describes an evil twin? • advice infected with malware that an attacker uses to control the device remotely • A normal looking at fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it • A type of malware that disguised as itself as or hides itself in a legitimate file and then causes damage to programs and data when opened • an identified risk that gains administrator level access to a computer or network without the system or users detecting its presence

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

How can an attacker execute malware through a script? • The script can send you a fraud an email message requesting confidential information • A script can run a series of instructions to download and run malware • A script searches the Internet for personal information about you • A script can retrieve and store your personal information, such as your online buying habits

A script can run a series of instructions to download and run malware.

How is a worm different from a Trojan? • A worm gathers information in transmits to a server where as a Trojan hides and then spreads throughout a network • A worm reproduces itself on the same computer rather Trojan attempts to spread through the network • A worm spreads through an at work, where as a Trojan hides inside another program • A worm prevents advice from functioning until a ransom is paid, or as a Trojan gathers information and transmit it to another device

A worm spreads through a network, whereas a Trojan hides inside another program.

Which software development method uses highly skilled programmers to shorten the development process while producing quality software? Agile development methodology Rapid application development model Predictive development model Waterfall model

Agile development methodology

Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. Meant for in frequent updates Cheaper to maintain Allow user interaction Requires less storage space on a server

Allow user interaction

Why should we use in uninstaller that comes with an operating system rather than the files management program to delete the folder containing the programs files to remove a software or app from a device? • An uninstaller removes the program files and any associated entries in the system files • it can be difficult to find the folder containing the program files • and UnInstaller moves the program files to the recycle bin for safety, but deleting a folder permanently removed them • and UnInstaller Makes a back up before moving to program files

An uninstaller removes the program files and any associated entires in the system files

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? • post all types of photos more often • be cautious about what information she posts • ignore notices from the social networking site about changes to the security • allow anyone who friends her to view her information

Be cautious about what information she posts.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? Two factor authentication Biometrics Encryption Digital certificates

Biometrics

How can you protect personal information gathered by legitimate organizations? • sign up for many online mailing list • link your credit or debit card to your online accounts • create a separate email account for receiving information from websites • use the same password and username for all your online accounts

Create a separate email account for receiving information from websites.

What would a password manager allow you to do? •Prevent you from using birthdays in your passwords •Make sure you do not repeat passwords on similar accounts •Create and store multiple strong passwords •Test your memorization skills

Create and store multiple strong passwords.

Which of the following could indicate a DoS attack on your company server • customers are required to enter personal information is a complete an order form • customers are receiving too many emails about special offers • customers cannot view the website on their device because the page will not load • customers cannot download the most recent newsletter

Customers cannot view the website on their device because the page will not load

What does XML use to describe data? Code editor Script language A plug-in Customize tags

Customized tags

Which is a first steep to deter thieves from accessing your financial information? • review financial and billing statements about each month carefully • Do not provide personal information over the phone or through email • follow up on calls regarding purchases that were not made • be alert to signs that may indicate unusual activity in an account

Do not provide personal information over the phone or through email

A Trojan is a malicious program that uses a computer network to replicate. True or false *worm

False

After you finish designing and creating your website you need to transfer it to a folder on your computer that your browser can access True or false

False

HTML coding does not allow for lists using bullets. All lists have to be numbered. True or false

False

HTML has remained the same ever since it was developed, which is why there is only one version. True or false

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send a private information because wireless networks encrypt all data anyway True or false

False

Which of the following is an authentication method to keep your data safe? Fingerprint scanner Body area network Encryption Software firewall

Fingerprint scanner

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? Software as a service Custom software Freeware Public domain software

Freeware

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? • he can use remote tracking to retrace the thief's steeps • if the thief enters an incorrect passcode three times, the phone takes a picture of the thief and emails it to Marcus • The current location of his phone can be pinpointed on a map through the phones GPS • his phone can generate an alarm even if it is on mute

He can use remote tracking to retrace the thieves steps

Which of the following is NOT a feature of an integrated Development Environment (IED)? • hosts webpages • automatically indents code • ensures code follows HTML specifications • displays tags in other different colors

Hosts webpages

Well starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve this issue? • visit the manufacturers website and install the latest updates for the app • uninstall the app and reinstall • restart the app and close the error message whenever it opens • use system software update the operating system

Is it the manufacturers website and install the latest updates for the app

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? • A worm has infected her computer and she needs to unplug her device • nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now • it is most likely ransomeware because it is telling her she has to verify payment information to unlock the computer • A hacker is trying to put a Trojan in her computer

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Why is a cable modem classified as a digital model? • it only sends digital data over a digital line • it sends and receives digital data over a digital line • it only receives digital data over a digital line • it uses copper wires to enable efficient digital data transfers

It sends and receives digital data over a digital line.

Why is an FTP (file transfer protocol) client helpful? • it creates the domain name for the use on the web server • it previews the web pages before you publish them • it searches through code defined errors and suggest replacements • it uploads files from your computer to a web server

It uploads files from your computer to a web server

What is a popular language for writing scripts that run in your browser to control a webpages behavior? • JavaScript • css • HTML • python

JavaScript

How does discarding computers in a landfill affect the environment? • copper on circuit boards is creating fire hazards • lead in mercury and computer parts are seeping into the ground and water supply • dad of minors are digging up landfills looking for gold and platinum • The computer parts quickly decay and become organic material

Lead and mercury in computer parts are seeping into the ground and water supply.

Which of the following statements is true about public networks? • many public networks are not secure • all public networks are free • your home network is a public network • hackers cannot intercept data transmitted over public networks

Many public networks are not secure.

What is it called when an attacker convinces you to enter personal information at an impostor website after receiving an email from a person masquerading as an employee from your bank? Dumpster diving Encryption Identity theft Phishing

Phishing

_______ are tools that track the memory usage, status, and errors of currently running software Auditing instruments System information lists Process managers Patch finders

Process managers

In which category of software do Microsoft office word and excel belong? Productivity Security Personal interest Graphics and media

Productivity

Integrated Development Environment (IDE) stores files and folders for your website in a directory called ___________ • consortium • absolute reference • FTP client • project

Project

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? Auditing tools Patch finders Restores Process managers

Restores

Which commonly used programming language is used to manage access and search for database content? HTML SQL C++ Java

SQL

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? • she uses a hub at her home that she connects through the app • she has installed switches that interact with the installed app on her phone • she has a home network work with smart home devices • she dialed into her home modem through the app and sent a command through the router

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering A zombie attack An evil twin Spyware

Social engineering

________ is the process of creating programs and apps from the idea stage to distribution to users Object oriented programming System auditing Software development Cloud computing

Software development

In a ___ network each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connection device fails then all other devices will still be able to communicate Bus Ring Star Mesh

Star

Which of the following is a disadvantage of using cloud computing to share files? • The amount of space that files will take up on your computer • The inability to access your files if you lose your Internet connection • The files you will lose if your computer crashes • how long it will take to access a back up of files

The inability to access your files if you lose your Internet connection.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? • They use ad where to fill your screen with unwanted advertisements until you click one • they overload the server with that work traffic so webpages will not load • they disguise the network as an evil twin • they encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins

They disguise the network as an evil twin.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? Trojan Ransom ware Worm Spam

Trojan

What type of security require some thing you know and something you have that no one else has? Two factor authentication Biometric security Two part password Data mining

Two factor authentification

How can you protect a computer from electrical spikes and surges? Use an uninterruptible power supply Use a surge protector Use a cable lock Unplug the computer when it is not in use

Use a surge protector.

At what point are you responsible for following the terms in a software license agreement? • when you click or take another action to accept the terms • when you purchase the software • when you give this software to someone else • when you register the software

When you click or take another action to accept the terms

When using encryption from your home computer, how would you configure the router? • you can use the wireless router to set the encryption key and type of encryption • you can use the wireless router to intercept encrypted information and block it from entering the network • you can use the wireless router to verify the security certificate of the encrypted data being sent • you can use the wireless router to encrypt and then decode the encryption on information sent and received

You can use the wireless router to set the encryption key and type of encryption.

Which of the following components on a webpage is created using HTML? Background color Slideshow Heading Layout

heading

Which of the following is a characteristic of a strong password? A short phrase Letters numbers and symbols Numbers in a series Personal information

letters, numbers, and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. • turning off remote management to the device • naming your router something or remember, like your street address • utilizing guest access when needed and turning it off when guests leave • creating a strong password to access the router

naming your router something you'll remember, like your street address

Which of the following does a software license usually specify? • steps for installing and uninstalling software • Number of people authorized to use software • amount of RAM required to run software • geographic locations where users can run software

number of people authorized to use the software

Which of the following is an example of a personal area network? •Computers connected within a city • computers connected within a home • Smart watch and phone connected via Bluetooth • phone and computer connected via Wi-Fi

smartwatch and phone connected via Bluetooth

Which of the following types of websites typically provides the least security? Online banking sites Online shopping sites Private businesses sites Social media sites

social media sites

The set of activities performed to build a program is called the ____ Integrative development environment Software development lifecycle Object oriented program loop Prototyping

software development life cycle (SDLC)

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. Topologies Architectures Standards Protocol

standards

What do you call the rules each programming language has for writing instructions? Syntax Source code Grammar Interpreter

syntax

What type of network sends signals through airwaves and usually does not require cables? Wired network Intranet Wireless network Virtual private network

wireless network

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice? • jin-102887.com • premerskills.com • R2D2editing.com • wordsmithing.com

wordsmithing.com


Conjuntos de estudio relacionados

us government - unit 1: the history of civics and government

View Set

Chapter 62 - Pituitary and Adrenal Gland issues

View Set

Chapter 11: Maternal Adaptation During Pregnancy

View Set

TEXTBOOK: Ch. 5: Analyzing the Industry and Market

View Set

Vocabulary Workshop Level E Unit 8 - Synonyms and antonyms

View Set

Vocabulary Workshop Level C Unit 6 sentences

View Set

Ch 7 on-the-job training methods

View Set