Test 2- information technology
Microsoft Word can be used to create and edit formatted text. That formatted text is normally saved in which kind of file to enable subsequent editing of that formatted text by Microsoft Word?
.doc or .docx
In 2012, the social data value of a user on Facebook was about _____ (in USD).
100 dollars
Early forms of email appeared in the _____ .
1960
Given the following uncompressed text, which is a more reasonable LZ dictionary? "Mark Smith, 100 Main St., Smithville"
1: Ma, 2: Smith
"Knowledge" workers spend nearly _____ of their time writing and reading emails.
30%
Texting is extremely popular among teenagers, with the average teenager sending about _____ text messages per day in 2012.
60
A text message containing characters from alphabets such as Chinese, Arabic, or Cyrillic is limited to _____ characters.
70
If cell A1 contains 55 and cell B1 contains 11, which entry into cell C1 results in 66?
=A1+B1
How is user information sometimes used by others? Information is aggregated from multiple sources and then resold to other companies at a higher rate. All of the above Information can be used by unfriendly persons to bully, blackmail, or coerce a user. Information is used to tailor which online ads a user sees on the Internet.
All of the above
Which of the following could be used to infer more about a user than what the user intentionally posts online? All of the above An email that transmits the sender's IP along with the message Purchasing items with a credit card GPS data embedded in a tweet
All of the above
Which of the following statements is true? All of the above Old paper documents, which were previously only available offline, are increasingly being imported and becoming available on the Internet. Information that may not be retrievable today may be retrievable tomorrow due to changes in terms of service, public policy, law, and technical privacy settings. Improvements in searching techniques enable search engines to gather information from, and make meaningful connections between, a greater number of data sources.
All of the above
An audio recording app stores audio in a file consisting of _____.
Analog audio converted to digital values (numbers)
Which of the following statements is true?
Apps may embed hidden data such as time and location data in a photo.
What does an email filter do?
Automatically takes a user-specified action, such as applying a category label
No recipient of an email will see the email addresses of the _____ field.
BCC
Which of the following social-media activities is most likely to POSITIVELY impact a hiring decision for a potential employee of a job for a college-graduate?
Background information supporting candidate's professional qualifications
WordPress.com and Tumblr.com are popular websites that provide services to users to create and share _____.
Blogs
What does digital audio recorded from a microphone and digital audio synthesized with electronic instruments have in common?
Both recorded and synthesized audio require a digital-to-analog converter for playback.
If cell C1 has a formula that correctly computes the sum of cells A1 and B1, and A1 contains 55 and B1 contains 11, then C1 will be 66. What happens if A1's content is then changed to 20?
C1 immediately changes to 31
A spreadsheet's columns and rows are labeled with letters and numbers. Which represents the cell 5 rows down and 3 columns to the right?
C5
The intersection of a row and column in a spreadsheet is called a(n) _____.
Cell
Which of the following is NOT an effective guideline to managing email?
Checking email every hour to keep the number of messages in the inbox low.
Which of the following is NOT a good strategy to protect a user's personal identity?
Create multiple accounts so the user's information cannot be linked to a single individual.
Which is not a common use of spreadsheets
Creating formatted text, like a resume that nicely shows a person's education/experience
Which of the following is NOT a good strategy to contain personal information on the Internet?
Delete old posts that are no longer relevant to a user's changing interests.
Which of the following statements is most true?
Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.
Which factors contribute to security problems?
Human behavior, responding to fraudulent requests, and outdated encryption all contribute.
_____ is a common protocol for retrieving email messages via the Internet.
IMAP
What happens to information once information is shared online?
Information can be manipulated or taken out of context
How can two images with the same dimensions, pixel density, and resolution have different file sizes?
One image file is compressed while the other is not
Which of the following statements is most true? Employers and colleges rarely consider a candidate's social-media content before making a decision. Social media apps are widely recognized as a being a safe and private way to express oneself A user's online identities, actions, and relationships rarely have consequences in the real-world. Online activities are increasingly used to make real-world decisions
Online activities are increasingly used to make real-world decisions.
Which of the following images appears the sharpest?
Resolution of 1920 x 1080, pixel density of 300 ppi
What would be the first word of an SQL instruction used to list all people in a database who are 21 years old?
SELECT
Another name for a text messaging is _____.
SMS
A(n) _____ is responsible for storing and delivering text messages.
SMSC (short message service center)
_____ is a common protocol for sending email messages via the Internet.
SMTP
A user's computer plays audio but too quietly. The user has made several predictions and conducted numerous tests, but hasn't determined the problem and has run out of predictions. In a good troubleshooting process, which is the best next step?
Search the web for "Computer audio is too quiet"
A smartphone has no WiFi Internet connectivity in a user's home. The user predicts that the problem is that the Internet is not working throughout the home. Which is the best test to try to either confirm or deny that predicted problem?
See if another device in the home like a computer has Internet connectivity
Times New Roman has tiny lines at the tips of letters, creating an appearance of old-style writing with a fountain pen. Those tiny lines are called _____.
Serifs
Which of the following statements regarding information that has been shared on the Internet is FALSE?
User information can be easily deleted.
Which is NOT a key item that a presentation app helps a user create, for display on slides?
Video
Which of the following is a protocol for encrypting data sent over WiFi networks?
WPA2
_____ is a free online encyclopedia, in which a community of users continuously add and improve articles.
Wikipedia
Which of the following is the most appropriate for vector graphics?
a bar chart with solid color
Facebook revenues are mostly from _____ .
advertisement
An encrypted message can be viewed by _____ .
an authorized user
Live streaming means to record and share a video of an event _____.
as the event happens
Lossy compression provides more compression than lossless compression, and is appropriate for _____.
audio files
MP3 is a common compression technique for _____.
audio files
Which is LEAST likely to have a built-in option to save as pdf or print to pdf?
audio player app
In 2015, more than 200 _____ emails were sent and received worldwide each day. (Select the closest value)
billion
A _____ is a website organized into entries (called posts) that can be written by a single person, a small group of people, or a company.
blog
For what are wiki-based platforms typically used?
collaborative development of content by multiple user
A zip file can group multiple files into one file, and commonly may also include _____ of those files.
compressing
Which of the following is a technique that strives to analyze language usage, faces, locations, and other items to match information to a unique individual?
data mining
A user wishes to keep a record of all employees that work at a company, and to quickly be able to get answers to questions like "Which employees earn over $50,000?" or "How many employees live in California?". Which application is best suited?
database app
Search engines are getting better at doing "_____" searching of more types of data, such as images and videos.
deeper
_____ scrambles plaintext into a cyphertext so that a packet transmitted through the network is not readable along the route.
encrytion
A presenter wishes to have the audience see only a first text item, and wants to press return to make a second item also appear, and press return again to have a third item also appear. Which animation feature is most appropriate?
fade in
Arial, Times New Roman, and Courier New are types of _____.
fonts
A person's digital _____ consists of the information about him / her that can be found on the Internet.
footprint
A word processor is primarily intended for enabling a user to create _____.
formatted text
In a spreadsheet, a(n) _____ like AVERAGE is a pre-built set of instructions for performing a calculation.
functions
The amount of information on the internet is _____ .
growing
#puppies is an example of a(n) _____.
hashtag
Which of the following is NOT a common kind of text formatting?
image
JPEG is a common compression technique for _____.
image files
Data _____ refers to the accuracy of the data in a database.
integrety
On demand audio streaming allows users to _____.
listen to specific songs or albums specifically selected by the user
_____ compression means that some data can be "thrown away" during the compression process.
lossy
Modern email systems keep messages _____ to enable users to access email from a variety of devices.
on a server
PDF stands for _____ Document Format.
portable
Unencrypted electronic communication over the Internet is like sending a _____ by physical mail.
postcard
A _____ is an article, image, or other regularly added content to a blog, which is typically added in reverse chronological order.
posts
A presentation app's core functionality typically supports both creating a presentation as well as _____ the presentation
presenting
Each row of a database consists of an employee's id number, name, hire date, and salary. The entire row is known as a _____.
record
LinkedIn revenues are mostly from _____ .
recruitment service fees from companies paying to access potential job candidates
A vacation message is a form of an email filter that automatically _____ .
replies to any incoming email with a user-specified message
A user's laptop is running unusually slowly. After not finding any obvious reasons like a runaway application, the most reasonable next attempted fix by the user would be _____ .
restart the laptop
_____ searching is a technique that infers the context of a term from other items in a search to better understand the user's intended query.
semantic
An email _____ is text automatically added to the end of every email you send.
signature
Which are the two key benefits of compressing an image file?
smaller files faster transfer
A _____ site connects people via the Internet with other users who share common interests and backgrounds. Users are able to add connections to other users, post information, share photos, and more.
social networking
_____ refers to playing videos or music directly from the Internet in a web browser or other app.
streaming
A thread is a group of emails having the same _____ .
subject
An MMS-based text message can be composed of _____.
text, images, pictures, video, and audio
What types of items can a search engine extract data from?
text, images, video, audio
A good two-step troubleshooting process starts with predicting a problem, then testing to confirm or deny the prediction (repeating as needed). A smartphone user wearing a headset doesn't hear a youtube video's audio. Which is a prediction of the problem?
the headset may not be plugged in all the way
Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel.
themes
A user decides against posting an embarrassing photo of a friend on their personal webpage. Which of the following strategies did the user employ to minimize negative consequences of online behavior?
think before posting
An email replier can select reply all (or group reply) to ensure all recipients on the _____ list, and only those recipients, receive the reply.
to and cc
Which of the following social-media activities is most likely to NEGATIVELY impact a hiring decision for a potential employee?
unprofessional screen name
YouTube is a widely-used _____ sharing website.
video
MPEG is a common compression technique for _____.
video files
name 3 of the 5 malwear types
virus, worm, trojan, bot, and adware