Module 8,9,10

¡Supera tus tareas y exámenes ahora con Quizwiz!

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

Why would you include a banner on your website?

*It makes the website more easily identifiable to visitors.

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

Which of the following is an implementation of OOP concepts?

Writing objects and creating instances based on functional need

Simon established a startup. He wanted to secure a domain name and have a website to market and sell his products. In this regard, which of the following should be the first step?

Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email?

It contained typos and other grammatical errors.

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important?

It will let you know how the visitors are using the site and where there might be problems.

What coding language makes a webpage interactive?

Java Script

Which of the following network standards applies to cellular networks?

LTE

When describing a client/server network, which of the following would be considered a client?

Laptop

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

How does a wireless network key work with an encrypted wireless network? Group of answer choices

The sending and receiving devices must know the wireless network key to communicate.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network

A business would use an analytic tool for all of the following EXCEPT _____. Group of answer choices

viewing why someone visited your webpage

Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.

will allow user interaction

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

To access the Internet, a router must be connected to a _____.

modem

A network administrator is usually not required on a _____ network.

peer-to-peer network

What is an ISP?

A telecommunications company that sells Internet access.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

What does XML use to describe data? Group of answer choices

Customized Tags

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital Rights Management

Bandwidth is a term that describes the number of devices connected to a network.

False

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?

Interpreters

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is true about public networks?

Many public networks are not secure.

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

An open source program

Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer? (module 8)

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

How do the HTML tags assist a web server in locating a web address? Group of answer choices

They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader.

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel

Virtual private network

installation

is the process of setting up the program to work with a computer or mobile device, and other hardware (module 8)

During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken, would be a bad one?

A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary.

Which of the following statements is NOT true about a local firewall?

A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system

What is a MAC address?

A unique hardware address for your device

Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer? (module 8)

An open source program

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

Java Script

Which of the following is an authentication method to keep your data safe?

NOT encryption

How does studying website analytics allow a company perform better?

Not:A company will learn if a new corporate logo has increased market value.

What kind of products are accessible from the Internet without requiring permission to use them, thereby free from being subjected to copyright violations?

Public Domain Products

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

Which of the following programs are distributed for little or no cost, or for a brief trial period?

Shareware

The company would have to use an IrDA network protocol within close proximity.

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? (module 10)

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

A modem can also function as what other piece of hardware?

A router

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line

What is uptime?

Not: The speed at which data transfer takes place

Which of the following best defines responsive design? Group of answer choices

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials.

Piracy

In which category of software do Microsoft Office Word and Excel belong?

Productivity

At the monthly meeting, Che, Director of Development, realized that deadlines were disregarded and program codes were missed during development of the department's new interface. The product's budget and schedule were inconsistent so Che was having trouble getting a clear picture of the project and its progress. Whose role and responsibility was all of this?

Project manager

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet? Group of answer choicesSpecify the formatPublish to a web serverConvert to a read-only fileCompress pages and multimedia content

Publish to a web server

Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this? Group of answer choices

Ransomeware

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

What hardware is essential to creating a home Wi-Fi network?

Router

Hector wants to purchase a new laptop. Which of the following is the most important pre-installed program that he should check for on the laptop before buying it, so that he can start to use the laptop as soon as he owns it? Group of answer choicesMedia playerWeb browserSystem softwareProductivity software

System Software

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Which of the following would be considered a strong password?

Wbcm2!4!820!

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com

Use the activation technique.

A company develops a gaming application that it intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this? (module 8)

Integrated development environment (IDE)

A company intends to improve the productivity of its developers so that the programming is easier and can be finished quickly with fewer syntax errors. What should the company provide to its developers to work? (module 8)

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

A router is a system of two or more devices linked by wires or cables.

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

If you upload photos to a NAS device, everyone on the network can access them.

True

Mario is trying to finalize an equipment order before work. He is using his smartphone while riding the train to the office, but for some reason not all the content is appearing. Mario tries turning the phone in his hand to see if landscape orientation would help with the layout problems, but it does not. What have the developers failed to do correctly so that Mario can interact the webpage on his smartphone?

Use responsive design.

A company develops a gaming application that it intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this?

Use the activation technique.

Is it advisable to enable automatic updates on security software? Group of answer choices

Yes; this helps in catching and quarantining any new malware before they harm the computer.

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?

You could encrypt the data in the report that only you can decode.

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An installer removes the program files, as well as any associated entries in the system files.

What tool is used to understand how people use your website?

Analytics

How will cellular networks challenge cable and DSL providers in the future?

Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

What is the working procedure of DevOps methodology? Group of answer choices

It produces programs quickly, and then offers continuous updates to increase the functionality of the program.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

What is a popular language for writing client-side scripts or scripts that run in your browser to control a webpage's behavior?

Java Script

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

NOT the network most likely uses a firewall for protection

Why would you want to connect your computer to a network?

Networks allow computers to share resources, such as hardware, software, data, and information

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.

Not: an absolute reference

Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue?

Service Pack

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Devices on a _____ area network are connected via Bluetooth.

personal


Conjuntos de estudio relacionados

Life Insurance Chapter Quiz Questions

View Set

Chp. 5, 6, 7, & 9 Quiz Questions

View Set

Life Insurance: Life Policy Riders

View Set

NU470 Week 9: Evolve Elsevier EAQ Collaboration/Leadership

View Set