TestOut IT Fundamentals Pro Chapter 5: Section Quizzes 5.2.8 -> 5.5.8
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? (5.3.14) A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. Port triggering is redirecting traffic to the wrong IP address. The router has not been configured to perform port forwarding.
A proxy server is filtering access to websites.
Match each term on the left to its definition on the right. (5.2.8) A service or software application that relies on shared resources over the Internet A software application that accesses web applications and websites A company that provides access to the Internet Internet Service Provider An interconnected global public computer network An information system that connects documents to each other by hypertext links ====== Cloud computing Internet Service Provider World Wide Web Internet Browser
A service or software application that relies on shared resources over the Internet (Cloud computing) A software application that accesses web applications and websites (Browser) A company that provides access to the Internet (Internet Service Provider) An interconnected global public computer network (Internet) An information system that connects documents to each other by hypertext links (World Wide Web)
Which of the following should be done to protect your identity when creating a social media profile? (5.5.8) Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.
Always review and set privacy settings.
Web browsers save website information in their _________, which helps the site load faster on future visits. (5.3.14) Memory Cache Storage Repository
Cache
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? (5.3.14) Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to block third-party cookies.
Change browser settings to notify before downloading.
_____________ computing refers to services and applications that run remotely over the Internet. (5.4.9) Remote Global Cloud Virtual
Cloud
A service that lets you store data in a remote location over the Internet is called _____________. (5.4.9) Database Online repository Internet backup Cloud storage
Cloud storage
Microsoft OneDrive is a cloud solution that is designed to provide which of the following? (5.4.9) Resource pooling Cloud storage Cloud hosting Cloud computing
Cloud storage
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? (5.3.14) Configure the browser proxy settings. Disable the pop-up blocker. Apply a firmware update. Clear the browser cache.
Configure the browser proxy settings.
Small files that a website saves on your computer to remember your preferences are called ______________. (5.3.14) Reminders Malware Fingerprints Cookies
Cookies
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? (5.5.8) Crowdsourcing media Crowdsourcing platform Crowdsourcing campaign Crowdsourcing website
Crowdsourcing platform
Which of the following are advantages of cloud computing? (Select two.) (5.4.9) Lower speeds Local software Data security Easier collaboration Greater costs
Data security Easier collaboration
Which digital communication medium consists of top-level posts with threads of response posts? (5.4.9) Email client Discussion board Social network Chat room
Discussion board
Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) (5.4.9) Adobe Photoshop Adobe Acrobat Reader Dropbox Google Drive Microsoft Word
Dropbox Google Drive
Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) (5.5.8) Like, share, and comment on the bullying posts. Post the bully's physical address on social media. Create a public group on social media (such a Facebook group) to confront the bully. Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.
Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.
What do cloud services provide to help with privacy and security concerns? (5.4.9) Backups Encryption Accessibility Collaboration
Encryption
Which of the following charges resources used, such as bandwidth and processing power, by the second? (5.4.9) OneDrive Microsoft Azure Amazon Web Services (AWS) Google Cloud
Google Cloud
Clickable text or images that take you to different sites on the World Wide Web are called __________. (5.3.14) Shortcuts Navigation buttons Hyperlinks Attachments
Hyperlinks
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? (5.2.8) Local Area Network Internet of Things Intranet Internet
Internet
Which of the following terms describes an organization that connects users to the Internet? (5.2.8) Network Server Web Server Internet Service Provider Data Center
Internet Service Provider
A _________ is a private network that utilizes the same technologies as the Internet. (5.2.8) World Wide Web Wide Area Network Local Area Network Intranet
Intranet
Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all. (5.5.8) Largest social media platform in the world Most popular microblogging platform Messaging platform that includes built-in photo editing tools Social network focused on images Provides live video streaming ===== Facebook Twitter Instagram
Largest social media platform in the world (Facebook) Most popular microblogging platform (Twitter) Messaging platform that includes built-in photo editing tools (Instagram) Social network focused on images (Instagram) Provides live video streaming (Facebook)
Which of the following is a category of SaaS applications? (5.4.9) Web hosting Disaster recovery Office tools Virtual machines
Office tools
Which of the following are common risks of using social media? (Select two.) (5.5.8) You can be added to a group without your permission. Personal information can be used without your permission Privacy settings are virtually non-existent. Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.
Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.
When protecting your online identity, which of the following is an internet security threat you need to be aware of? (5.5.8) USB keyloggers Using personal information Using a different password for each social media platform Phishing attempts
Phishing attempts
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? (5.3.14) Proxy settings Private browsing Invalid certificate Browser cache
Proxy settings
Which medium does Wi-Fi use to send data between networks and devices? (5.2.8) Radio waves Ultraviolet light Cellular signals Bluetooth
Radio waves
What is the term for delivering an application over the internet called? (5.4.9) FaaS IaaS SaaS PaaS
SaaS
Web services that help people meet, interact, and share content with other people online are called ____________. (5.5.8) Social Media Web Servers Internetworks Facebooks
Social Media
Which of the following describes the strategy that defines a businesses social media goals and objectives? (5.5.8) Social channels Social media marketing Search Engine Optimization (SEO) Social Media Optimization (SMO)
Social Media Optimization (SMO)
Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? (5.5.8) Idea Brainstorming Startup Financial hardship
Startup
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) (5.5.8) Membership fees Targeted ads Content Usage fees Selling user-generated data to other companies
Targeted ads Selling user-generated data to other companies
Which of the following is used to identify specific hypertext resources on the World Wide Web? (5.2.8) Hyperlink Transmission Control Protocol Uniform Resource Locator Internet Protocol
Uniform Resource Locator
Which of the following technologies can be used to make a phone call over an Internet connection? (5.2.8) UDP VoIP TCP IoT
VoIP
Which of the following is a disadvantage of web applications? (5.2.8) Web applications can require a significant amount of disk space. Web applications can carry a monthly or yearly fee. Web applications can be limited by the hardware they run on. Web applications can connect people in different locations.
Web applications can carry a monthly or yearly fee.
When might it be MOST helpful to clear your browser's cache of temporary Internet files? (5.3.14) When a website is not functioning as it should After every Internet search Immediately after opening a new Microsoft Office document When you switch to a different web browser
When a website is not functioning as it should
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? (5.2.8) Blogs RSS feeds Podcasts Wikis
Wikis
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? (5.2.8) Wide Area Network Internet Intranet World Wide Web
World Wide Web
Which of the following lines will initiate an Internet search from the address bar of a web browser? (5.3.14) testout.com microsoft gov microsoft.com microsoft.org
microsoft gov
A pop-up blocker is a web browser feature that _________________. (5.3.14) keeps the window in a minimized state prevents unwanted advertisements censors Internet searches prevents color images from being displayed
prevents unwanted advertisements