BCIS 2610 exam 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer? a) An open source program b) A freeware program c) A Software as a Service (SaaS) program d) A retail program

An open source program

In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing? a) Analysis phase b) Implementation phase c) Planning phase d) Design phase

Analysis phase

Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue? a) Patches b) Restorers c) Service pack d) Upgrades

Service pack

Which of the following programs are distributed for little or no cost, or for a brief trial period? a) Freeware b) Public domain c) Open source d) Shareware

Shareware

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a) She uses a hub at her home that she connects to through the app. b) She has installed switches that interact with the installed app on her phone. c) She has a home network with smart home devices. d) She dialed into her home modem through the app and sent a command through the router.

She has a home network with smart home devices.

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work? a) A CMS does not allow multiple contributors to use it at the same time. b) A CMS is just another name for a drag-and-drop procedure that anyone can perform without any restrictions. c) A CMS allows you to set roles for each person granting responsibility for certain webpages. d) A CMS just adds capabilities to a website so it does not matter who is working on the website or when.

A CMS allows you to set roles for each person granting responsibility for certain webpages.

Simon established a startup. He wanted to secure a domain name and have a website to market and sell his products. In this regard, which of the following should be the first step? a) Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements. b) Develop an impressive digital graphical user interface to market the products on the website. c) Market the products using advertisements and build a brand name. d) Provide contact information and good product catalogs.

Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements.

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as and when components are finished. Which type of project development methodology should be adopted? a) Waterfall model b) Agile development c) Rapid application development d) Predictive development

Agile development

A company received a proposal for the development of a new software. While analyzing the specifications, it was found that there was no clear goal and the scope of the project could evolve. Which methodology should the company adopt to execute this project? a) Waterfall model b) Predictive development model c) Agile development methodology d) Rapid Application development model

Agile development methodology

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? a) A system's program to delete is tougher to access and requires more steps. b) An uninstaller removes the program files, as well as any associated entries in the system files. c) An uninstaller takes up less time and storage than system's program to delete. d) Deleting using system's program could introduce malware in the device; therefore, uninstaller is preferred.

An uninstaller removes the program files, as well as any associated entries in the system files.

What tool is used to understand how people use your website? a) Analytics b) Uptime c) FTP client d) Hyperlink

Analytics

Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent? a) Antispam b) Antispyware c) Firewall d) Antivirus

Antispyware

Which of the following could indicate a DoS attack on your company server? a) Customers are required to enter personal information as they complete an order form. b) Customers are receiving too many emails about special offers. c) Customers cannot view the website on their device because the page will not load. d) Customers cannot download the most recent newsletter.

Customers cannot view the website on their device because the page will not load.

What does XML use to describe data? a) A plugin b) Code editor c) Script-language d) Customized tags

Customized tags

Which of the following is a general guideline for developers? a) Involve users for whom the program is being developed. b) Group the activities into phases. c) Create a system proposal, interact with customer and ensure the project kick off. d) Define the standards, or sets of rules and procedures, to create a standard product.

Define the standards, or sets of rules and procedures, to create a standard product.

Archie wants to use a newly launched web browser on his computer. What steps should he ideally follow to get it on his system? a) Download the setup program from the manufacturer's website and use it directly without installation. b) Copy the program from a friend onto a USB flash drive and install it on his own computer. c) Open the link that is advertised in the pop up and install it on his computer. d) Download the program from the manufacturer's website and install it on his computer.

Download the program from the manufacturer's website and install it on his computer.

_________ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity. a) Antivirus b) Antispam c) Antispyware d) Firewall

Firewall

Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link? a) CSS b) JavaScript c) HTML d) C++

HTML

Which of the following is NOT a feature of an Integrated Development Environment (IDE)? a) Automatically indents code b) Hosts webpages c) Displays tags in a different color d) Ensures code follows HTML specifications

Hosts webpages

While starting a software application, Ian encountered an error that the version was no longer supported. Which of the following options can resolve the issue? a) Ian could visit the company website and install the latest version or updates on his computer. b) Ian should restart the application again and check if the problem is resolved. c) Ian could troubleshoot by replacing the operating system as a standard procedure whenever an application crashes. d) Ian should immediately delete the program from the system file management and never attempt to use it again.

Ian could visit the company website and install the latest version or updates on his computer.

____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware. a) Activation b) Registration c) Installation d) Upgrading

Installation

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. a) Intellectual property b) Digital Rights Management c) Copyright d) License agreement

Intellectual property

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a) Wired network b) Intranet c) Extranet d) Virtual private network

Intranet

Which of the following statements is NOT true about a local firewall? a) It is a physical device that acts as a protective barrier. b) It is also called software firewall. c) It is often built into a company's operating system. d) It inspects data being transmitted to or from a network.

It is also called software firewall.

Why would you include a banner on your website? a) It describes your ownership to the general public. b) It makes the website more easily identifiable to visitors. c) It identifies the resources you plan to use in your business. d) It creates a site map for the visitor of your website.

It makes the website more easily identifiable to visitors.

Which of the following is true about XML? a) It describes content and how to present it in a browser. b) It stores layout information in a text format for a browser to interpret. c) It provides a way to classify data and share it between applications. d) It contains predefined tags to describe placement of content on a webpage.

It provides a way to classify data and share it between applications.

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important? a) It will let you know if visitors dislike the company brand or product. b) It will let you know if customers are buying products somewhere else. c) It will let you know if your web page appears first when used in a search engine. d) It will let you know how the visitors are using the site and where there might be problems.

It will let you know how the visitors are using the site and where there might be problems.

What is a popular language for writing client-side scripts or scripts that run in your browser to control a webpage's behavior? a) HTML b) CSS c) JavaScript d) Python

JavaScript

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed? a) JavaScript b) HTML c) CSS d) Python

JavaScript

Which of the following statements is true about public networks? a) Many public networks are not secure. b) All public networks are free. c) Your home network is a public network. c) Hackers cannot intercept data transmitted over public networks.

Many public networks are not secure.

What internal device does a computer use to connect to a wired or a wireless network? a) Motherboard b) Hub c) Switch d) Network interface card

Network interface card

Which of the following best defines responsive design? a) Pages are coded using a series of commands to generate the content. b) Pages automatically adjust the size of their content to display appropriately relative to the size of the screen. c) Pages are able to index and find your website regardless of browser. d) Pages interact with website content stored in a database on a web server.

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? a) Process managers b) Auditing tools c) Patch finders d) Restorers

Patch finders

Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials. a) Access control b) Digital rights management c) Piracy d) License agreement

Piracy

__________ are types of tools that track the memory usage, status, and errors of currently running software. a) Process managers b) System information lists c) Patch finders d) Auditing instruments

Process managers

In which category of software do Microsoft Office Word and Excel belong? a) Graphics and media b) Productivity c) Security d) Personal interest

Productivity

What kind of products are accessible from the Internet without requiring permission to use them, thereby free from being subjected to copyright violations? a) Open source b) Public domain products c) Freeware d) Shareware

Public domain products

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet? a) Specify the format b) Publish to a web server c) Convert to a read-only file d) Compress pages and multimedia content

Publish to a web server

When it comes to secure data storage on a network, which of the following statements is true? a) Encrypted files are not able to be saved on a network attached storage device. b) Passwords are the safest method for protecting files on a network. c) Roles can be granted to individuals to view files and make changes to files on a network. d) Files stored on a network are accessible to all who can access that network.

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network? a) Printer b) Router c) Monitor d) Ethernet cord

Router

Which commonly used programming language is used to manage, access, and search for database content? a) Java b) C++ c) HTML d) SQL

SQL

An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase? a) Single user license agreement b) End user license agreement c) Site license d) Multiple user license agreement

Site license

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a) Social engineering b) A zombie attack c) An evil twin c) Spyware

Social engineering

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a) Bus b) Ring c) Star d) Mesh

Star

During which phase does the program or app receive necessary maintenance, such as fixing errors or improving its functionality, performance monitoring to ensure the efficiency of the program or app? a) Implementation phase b) Analysis phase c) Support and security phase d) Design phase

Support and security phase

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? a) The company would have to use RFID transmitted through radio signals. b) The company would have to use an IrDA network protocol within close proximity. c) The company would have to use NFC to facilitate close-range communication. d) The company would have to use a high-speed data transmission with access to high bandwidth.

The company would have to use an IrDA network protocol within close proximity.

What is uptime? a) The speed at which data transfer takes place b) The amount of time you will need to create your website c) The measure of a web host's reliability d) The measure of how much time people spend on your website

The measure of a web host's reliability

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. a) ethernet b) firewall c) protocol d) rootkit

firewall

In order for your router to access Internet connections, it must be connected to a _____. a) network b) hub c) switch d) modem

modem

Devices on a _____ area network are connected via Bluetooth. a) local b) wide c) metropolitan d) personal

personal

A modem can also function as what other piece of hardware? a) A hub b) A switch c) A router d) A network interface card

router

A business would use an analytic tool for all of the following EXCEPT _____. a) viewing the number of pages a person visited b) viewing the number of new and returning visitors c) viewing why someone visited your webpage d) deciding when to increase bandwidth

viewing why someone visited your webpage

Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. a) will allow user interaction b) is meant for infrequent updates c) is cheaper to maintain d) requires less storage space on a server

will allow user interaction

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. a) code b) computer hardware c) wireframes d) Microsoft office

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice? a) premiereditorialskills.com b) wordsmithing.com c) jin-102887.com d) R2D2editing.com

wordsmithing.com

Marly was trying to finish some work on the train during her commute home, but the webpage was not displaying with the proper layout or formatting on her smartphone. Which of the following was likely coded incorrectly to cause the error? a) C++ b) HTML c) JavaScript d) CSS

CSS

Which of the following specifies the format and appearance of page content on webpages? a) URL b) HTML c) JavaScript d) CSS

CSS

It is often required to transfer huge files across locations within businesses and corporate offices. Email usually cannot handle such large files which is why file transfer tools are available to perform such tasks. Which of the following categories of programs and apps do these tools belong to? a) Productivity (business and personal) b) Communications c) Security d) File, disk, and system management

Communications

What does a DSL modem use to send and receive digital data? a) Copper telephone wiring b) Cable TV connections c) A wireless router d) A network interface card

Copper telephone wiring

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____. a) a project b) anFTP client c) an absolute reference d) a consortium

a project

During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken, would be a bad one? a) A designer writes code or uses a product development app to create the program's specifications. As he creates the product, a designer is necessary. b) A designer reviews every aspect and functionality of a program to ensure it works as intended. As he ensures a working product, a designer is necessary. c) A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary. d) A designer interacts with customers and users of the product to assist them with any issues that arise. As he assists the customers, a designer is necessary.

A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary.

What is an ISP? a) A telecommunications company that sells Internet access. b) A communications device that connects to a communications channel. c) A central point for cables in a network for data sharing, d) A system of two or more devices linked by wires, cables, or a telecommunications system.

A telecommunications company that sells Internet access.

W hich of the following describes a domain registrar? a) A place that manages web servers and disk space. b) An administrator who oversees a system's uptime and runs reliability checks. c) A method for determining the amount of bandwidth needed for a specific website. d) A website where you can go to purchase a name for your website.

A website where you can go to purchase a name for your website.

Why does net neutrality affect Internet connections? a) Because it is a global resource, Internet services can be restricted by content or bandwidth. b) Because it selects websites by content, Internet services can be restricted by bandwidth. c) Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth. d) Because it selects websites by amount of bandwidth needed, Internet services can be restricted by content.

Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened? a) Because of net neutrality, your ISP provider has reduced its bandwidth to cut costs, slowing the Internet for you. b) Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth. c) Because of FCC rules, content that requires more bandwidth is given preference over content that does not require as much bandwidth. d) Because of FCC rules, ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.

Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

Which of the following is true about broadband connections? a) Broadband connections turn off after lack of activity for a period of time, similar to when computers go to sleep. b) Broadband connections are "always-on" with devices connected to them. c) Broadband connections are difficult to find as there are few of them around today. d) Broadband connections require a wireless router in order to increase their speed.

Broadband connections are "always-on" with devices connected to them.

How do the HTML tags assist a web server in locating a web address? a) They create webpages that are compatible with all web browsers. b) They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader. c) They tell the reader how many times a page has been searched with the same criteria, leading the reader to assume this page is a correct match.T d) hey do not help a web server complete a search, they are only used in coding and server-side scripting.

They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? a) They use adware filling your screen with unwanted advertisements until you click on one. b) They overload the server with network traffic so webpages will not load. c) They disguise the network as an evil twin. d) They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another? a) They are interchangeable terms for the same hardware. b) They provide a central point for cables in a network. c) They transfer data to all devices. d) They can only connect to a single device.

They provide a central point for cables in a network.

If HTML is used to specify the content of the webpage, then what do you use CSS for? a) To make the webpage interactive b) To define the page layout c) To include multimedia content d) To connect to other pages with hyperlinks

To define the page layout

___________ might include additional features not available in the version you currently are running. They are new releases of the program or app, and may require an additional fee to enable the program to install. a) Service Packs b) Restorers c) Upgrades d) Patches

Upgrades

Mario is trying to finalize an equipment order before work. He is using his smartphone while riding the train to the office, but for some reason not all the content is appearing. Mario tries turning the phone in his hand to see if landscape orientation would help with the layout problems, but it does not. What have the developers failed to do correctly so that Mario can interact the webpage on his smartphone? a) Code the site using HTML tags. b) Include all the server-side scripts for searchability. c) Enable search engine optimization. d) Use responsive design.

Use responsive design.

Which of the following would be considered a strong password? a) Password123 b) Abc123456789 c) CatCatCatCat d) Wbcm2!4!820!

Wbcm2!4!820!

What type of network sends signals through airwaves and usually does not require cables? a) Wired network b) Intranet c) Wireless network d) Virtual private network

Wireless network

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website? a) With no graphics, only text b) With all content on one page c) With responsive design d) With a static layout

With responsive design

Which of the following is an implementation of OOP concepts? a) Writing one program with all functionality, behavior, data and actions b) Producing each functionality in a structured approach c) Creating methods to define data format of object and create class to define the behavior of an object d) Writing objects and creating instances based on functional need

Writing objects and creating instances based on functional need

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it? a) You could send a flash drive with the report on it that you have password protected with the president's name. b) You could encrypt the data in the report that only you can decode. c) You could send the email and then forget to attach the report causing the president to call and ask you about it. d) You could encrypt the data and then use the company NAS device and assign permissions only to the president.

You could encrypt the data in the report that only you can decode.


Kaugnay na mga set ng pag-aaral

Chapter 8 Skeletal System: Appendicular Skeleton

View Set

Reproductive pharm MISSING ch 95

View Set

Muscles of Inspiration and Expiration

View Set

Consumer Behavior 11e Chapters 5-9

View Set

NUR2101 Test #3 QUESTIONS GI and Endocrine

View Set

Neurobiology of learning and memory final

View Set