Comp Final
Which search operator would you use to locate webpages, containing the exact phrase augmented reality, with the words in the same order?
"augmented reality"
Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?
"the quick brown fox"
What type of software do engineers and scientists use to create wireframe drawings of objects, which they can rotate to view from many angles?
3D CAD software
Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making?
3D animation
Ruby and SQL are examples of what type of language?
4GL
Which of these tags is not specified in the <body> section of a webpage?
<title>
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?
Add a formal citation and use the farmer's explanation in his paper.
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following?
Adjust the settings for the mouse through the Settings dialog box.
How do you know if a device is an input device or an output device?
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files and any associated entries in the system files.
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
Which company was the first to develop a computer meant for personal use?
Apple
How will technology help people with disabilities become more transportation independent?
Automated vehicles will be developed.
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Which of these is an optical medium of storage?
Blu-ray discs
What can you do to make sure you are not contributing to software piracy?
Buy software only from legitimate resellers or directly from the manufacturer.
A construction firm intends to use technology to enhance their architectural designs architecture. Which of the following technologies should they use?
CAD software
What do engineers use to create highly detailed and technically accurate drawings?
CAD software
Code to modify the background color of text or a webpage probably is an example of __.
CSS
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?
CSS
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
Create a database of company projects, customers and vendors.
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
When you upload webpage files from your computer to a web server, you should use a(n) __.
FTP client
Which government agency is responsible for releasing the rules surrounding Internet access?
Federal Communications Commission (FCC)
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
Which of the following is a web app?
Google Docs
Which of the following is the strongest password?
H@veAGr3atDaY!
Code to specify webpage elements such as paragraphs, lists, links, audio or video files, is an example of __.
HTML
Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?
HTML
Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?
HTML 5 validator
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?
He should have periodic anti-virus scanning and software upgraded on all computers.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices.
A(n)__ file uses lossy compression, which discards some of the original file data during compression.
JPG
When you take a photo with a digital camera, most likely it is saved in __ format.
JPG
When you can click a button on a website to run code to change the font size, the code that changes the font size dynamically probably is an example of __.
JavaScript
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
A company's computers monitor assembly lines and equipment using __ communications.
M2M
Which of the following is a technology designed for use in manufacturing?
M2M communications
Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device?
MIDI technology
Which of the following is NOT an image format to store photos?
MP3
If you delete a shortcut from your desktop, have you also deleted the original file?
No, because a shortcut does not place the actual file, folder, or app on the desktop.
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project?
One friend has an unreliable, slow Internet connection
Which of the following best defines responsive design?
Pages automatically adjust the size of their content relative to the size of the screen.
Which of the following is an example of green computing?
Purchase and use products with an ENERGY STAR label
If several programs or apps are running simultaneously, your computer or device might use up its available _____.
RAM
What is the most common type of volatile memory?
RAM
Which of the following is NOT true about RAM?
RAM is nonvolatile memory
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?
Require users to identify themselves using biometrics or passwords.
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
In the web address www.microsoft.com, the ".com" is the __ meaning __.
TLD; commercial enterprise
What is a digital certificate?
Technology used to verify a user's identity
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.
Which of the following is NOT true about mobile health?
The need for visits to the doctor's office is increased
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure
How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products?
They use a GPS to avoid traffic delays.
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
All of the following are pointing devices except
Touchpointer
What is the most common type of storage device for transferring files from one computer to another?
USB flash drive
How is streaming a video different from downloading it?
Unlike streamed content, downloaded content is stored on the computer.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
Use his webcam and speakers so that he and his mother can both see and hear each other.
Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?
Use sleep modes and other power management features for computers and devices.
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
Use vector images because they retain their clarity even when enlarged or shrunk.
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?
Visit the manufacturer's website and install the latest updates for the app.
Which of the following would be considered a strong password?
Wbcm2!4!820!
Andy is writing an article and wants to verify a few facts. Which of the following websites is designed to provide answers to factual questions?
Wolfram Alpha
Which of the following is an example of specialty search engine?
Wolfram Alpha
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?
Yes; it is a business transaction on a consumer-to-consumer website
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer.
Which of the following is not an advantage of e-commerce for consumers?
You have little risk of having your credit card number intercepted.
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
a desktop computer
What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer?
a faulty port
Which of the following is NOT likely to be found on a webpage?
a formatting toolbar
Which of the following would most likely be a static website?
a historical facts page
Who or what creates the index for a web directory?
a human editor
Simone just received a letter from her health care provider telling her she can create an account online that will give her access to all her health records. How would you describe what her provider is encouraging his patients to engage with?
a mobile health app (mHealth)
What is the binary system?
a number system with two digits, 0 and 1
Google is an example of which type of website?
a search site
Cloud storage refers to the storage of data on ______.
a server on the Internet
JavaScript likely controls which of the following elements on a webpage
a slide show
What is an ISP?
a telecommunications company that sells internet access
If you want to make a personal website and do not have any coding skills, you should probably use __.
a website builder
Which of these is most likely an example of a static website?
a website for learning about a local barbershops hours and services
Which of the following describes a domain registrar?
a website where you can go to purchase a name for your website
the __ window is the window you are currently using, which appears in front of any other open windows.
active
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
active window
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
adobe premiere clip
__ text is descriptive text added to an object.
alternative
During which phase of the SDLC does the feasibility study take place?
analysis
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
analysis phase
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
android
Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?
animated GIF
A series of images displayed in sequence to create the illusion of movement is called ______________ .
animation
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
antispyware
CSS lets you change the __ of a website.
appearance
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence
Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?
artificial intelligence and machine intelligence
Mobile games were the first to popularize __, which uses an image of an actual place or thing and adds digital information to it.
augmented reality
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?
augmented reality
_____ ensures that the person requesting access to a computer is not an imposter.
authentication
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?
autoplay
Why is it not safe to connect to public Wi-Fi networks?
because these networks are rarely protected
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
biometrics
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
bluetooth
What determines the speed at which data travels?
bus width
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
change font size, style, and color of the keywords
If you are experiencing display problems on your computer, which of the following troubleshooting techniques might you attempt first?
check to see that all cables are properly connected
In OOP, a(n) ______ defines the format of an object and the actions the object can perform.
class
Which of the following is not a common network topology?
client/server network
Which of the following factors can affect processor performance of a CPU?
clock speed
In a web app, where is data usually stored?
cloud storage
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?
cloud storage
Which of the following storage devices requires an Internet connection?
cloud storage
File transfer programs belong in what software category?
communications
You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?
computer aided manufacturing
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
conditional formatting
A __ website gathers, organizes, and then distributes web content.
content aggregator
Ronald maintains a website that focuses on travel-related information. He gathers adventure posts from various travel blogs and shares them to his site. What type of a website does Ronald maintain?
content aggregator site
A business-to-consumer (B2C) website tracks the items you place in a shopping cart using __.
cookies
What does a B2C website use to track the items you select on the website?
cookies
What does a DSL modem use to send and receive digital data?
copper telephone wiring
Which of these is not an option for formatting text?
copying a region of text
_____ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work.
creative commons
Checking a website author's credentials is one way to establish a site's __?
credibility
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?
date modified
Older HTML tags that have been replaced with newer ways to accomplish the same task are called __.
deprecated
Which of the following is NOT a factor search engines consider when ranking search results?
design quality of the webpage
In which of the following types of computers is the system unit in separate housing from the monitor?
desktop computer
Which of the following devices is the easiest to upgrade, such as by adding RAM?
desktop computers
Mobile first design is important because __.
developers must provide simplified user experience for apps that run on small screens
BYOD stands for Bring Your Own __
device
Which of the following tells your computer how to connect to devices you might connect?
device driver
__ are smart devices that respond to a user's verbal commands by using search technology to provide an answer to a question or perform a task.
digital assistants
_____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
digital divide
If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?
digital forensics
A __ is an image you can see, store, and manipulate on a digital device.
digital graphic
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
digital rights management
Which of the following is not a safety precaution for securing a wireless network?
disable WPA2
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
Which of these is a use for JavaScript on a webpage?
displaying a slideshow of images
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
drawing app
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
drop box
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
encrypt the data in the report
Which of the following does a secure website use to safeguard transmitted information?
encryption
__ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key".
encryption
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
ergonomics
Which of the following describes a normal looking, yet fraudulent Wi-Fi network?
evil twin
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
Which of the following lets you use a sentence or paragraph of text without permission if you include a citation to its source?
fair use doctrine
4G and 5G networks provide slower data transmission speeds than 3G networks.
false
A Trojan is a malicious program that uses a computer network to replicate.
false
A data file contains the instruction your computer or device needs to run programs and apps.
false
A router is a system of two or more devices linked by wires or cables.
false
A shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device.
false
A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer
false
Adware tracks and transmits personal information from your computer or device without your knowledge.
false
After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.
false
All-in-one computers are easier to service and upgrade but occupy more space than desktop computers.
false
An e-commerce website offers fewer models, colors, and sizes than a physical store
false
Automated vehicles decrease independent transportation options for people with disabilities.
false
Before you can open and edit a compressed file, you need to zip it.
false
CAPS LOCK is a sticky key.
false
Computers with AI use human intelligence to make decisions.
false
Embedded computers are standalone products that have many functions.
false
Encryption converts unrecognizable data into recognizable data.
false
File properties are the same no matter what type of file.
false
Flash memory is a type of volatile memory.
false
HTML coding does not allow for lists using bullets. All lists have to be numbered.
false
HTML has remained the same ever since it was developed, which is why there is only one version.
false
Jorge saw a computer named Watson on the game show Jeopardy and was surprised at how many answers Watson was able to get correct, especially because the math problems involved solving equations. Watson was using augmented reality to solve the problems.
false
Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations.
false
Non-volatile memory is temporary and loses its contents when the power is turned off.
false
Of all types of digital media, digital video files are the smallest and download faster than the other types.
false
Of the two types of digital animation, 2-D animation is considered superior to 3-D animation.
false
On a desktop or laptop computer, you should uninstall a program or app by using your system's file management program to delete the folder containing the program's files.
false
Plotters are small, lightweight printers that easily can be connected to mobile devices.
false
Programs only are considered restricted by copyright laws if the author has applied for legal protections.
false
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
false
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
false
The Internet Engineering Task Force (ITEF) sets standards for webpage design
false
The direction in which text is printed on a page is called style.
false
The first generation of computers used microprocessors.
false
The mobile health (mHealth) trend refers to doctors and nurses using smartphones or tablets to access health records stored on mobile devices.
false
The operating system is not part of the system software.
false
The waterfall method is an example of agile development.
false
To prevent a laptop from being stolen, you can use a surge protector.
false
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
false
Uninterruptable power supplies and surge suppressors will help protect your computer from power outages.
false
When accessed, an e-commerce website that sells carpentry tools displays a lock icon somewhere in the window of the browser. The address bar in the Chrome browser would identify this website as "insecure."
false
When looking for a job, you should use humorous or informal names for your account profiles, blog, or domain name to make yourself stand out.
false
When you move a file to the Recycle Bin or Trash, it is permanently deleted.
false
When you perform a search, a general search engine searches the entire Internet.
false
When you stream digital media, you must transfer the entire video or audio file to your computer.
false
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
Which of the following types of software creates a personal security zone around your computer or device?
firewall
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?
fotor
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
freeware
____ refers to a program that is copyrighted and provided at no cost, but the developer retains all rights to the product.
freeware
Nadia is shopping for a phone that can take photos and identify their geographical location. What feature should she look for when comparing phones?
geotagging
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
GUI stands for __ user interface.
graphical
What does an operating system provide so you can interact with a device?
graphical user interface
You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?
graphics and media
Which of these hardware components can you use to store videos?
hard drive
Which of the following is not a web browser setting for managing cookies?
have all the cookies automatically expire after 45 days
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
header and footer
Which of the following components on a webpage is created using HTML?
heading
A __ combines speakers and a microphone into one device.
headset
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?
how visitors are using the site
Which of the following indicates a secure website connection?
https in the URL
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
image 1 is sharper and has a larger file size than image 2
Carlos is creating an animation by drawing one image in a frame, followed by another image in a slightly different pose, and so on until the motion is complete. What is this technique called?
in betweening
If you have __, you can evaluate whether information is misleading, biased, or out of date.
information literacy
Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?
information security
__ is any data and instructions entered into the memory.
input
_____ is data and instructions entered into the memory of a device.
input
What is the recommended solution if a computer performs slowly?
install additional RAM
To run a productivity app with most complete and advanced capabilities, you would most likely ___.
install and run the software on your desktop or laptop
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
installation
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.
intellectual property
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____
intellectual property rights
Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described?
intelligent classroom
Where on a computer is the operating system generally stored?
internal hard drive
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
intranet
Which of the following is a private network used by organizations to communicate internally?
intranet
If a website is designed with responsive design concepts, then _____.
it appears correctly on any device regardless of screen size
Which of the following is not a step an operating system performs when printing a document?
it creates the document to be printed
What happens when you delete a folder?
it goes to the recycle bin or trash folder
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?
it is using virtual reality
Why would you include a banner on your website?
it makes the website more easily identifiable to visitors
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
it places the document in a buffer
Why is an FTP client helpful?
it uploads files from your computer to a web server
The quality of an audio file is determined by _____.
its bit rate
What is a popular language for writing scripts that run in your browser to control a webpage's behavior?
javascript
When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?
javascript
Each of the following is a factor that causes repetitive strain injury (RSI) except __.
lack of restful sleep
When describing a client/server network, which of the following would be considered a client?
laptop
How does discarding computers in a landfill affect the environment?
lead and mercury in computer parts are seeping into the ground and water supply
Colleges use __ management systems (LMSs) to set up web-based training sites where students can check their progress in a course, take practice tests, and exchange messages with the instructor or other students.
learning
The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) ______.
learning management systems (LMS)
When creating a strong password __ is the most important element.
length
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?
license filter
With a search engine, you can use a __ to search for pictures that you can use, share, or modify for personal or commercial use.
license filter
Which of the following would be considered a professional networking website?
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
m-commerce app
Which of the following statements is true about public networks?
many public networks are not secure
which of the following units measure millions of bytes of data?
megabytes
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
To access the Internet, a router must be connected to a _____.
modem
What are "hits" that search engines list on the first page?
most relevant results
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
my Verizon VPN
Which of these usually is NOT collected by a website analytics tool?
names of website visitors
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
What internal device does a computer use to connect to a wired or a wireless network?
network interface card
Which of the following does a software license usually specify?
number of people authorized to use the software
For _____, the original media file is stored on the media distributor's server, so you can watch the content more than once.
on demand content
Which of the following is an advisable practice for securing data stored on a network?
only grant access to data to those with a legitimate need
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?
open source
When coding a hyperlink to a webpage that is external to your website, an accepted behavior is to __.
open the page in a new browser
A company's __ department oversees the centralized computer equipment and administers the network.
operations
A(n) ______ is an upgrade that addresses a single issue.
patch
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
patch finders
A network administrator is usually not required on a _____ network.
peer to peer
Devices on a _____ area network are connected via Bluetooth.
personal
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
Peter used a digital camera to take photos while hiking in Yellowstone National Park, but many photos turned out blurry. What software can he use to improve the quality of the photos?
photo-editing software such as Photoshop
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
piracy
Resolution of bitmap graphics is typically measured in ___________.
pixels
An operating system is also called a(n) _____.
platform
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
plotter
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
plug and play devices
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?
price comparisons from different vendors
Which of the following describes business-to-business (B2B) e-commerce purchase?
pricing can vary for each customer
Which of these is not an input device?
printer
In which category of software do Microsoft Office Word and Excel belong?
productivity
What concerns are there about open source programs?
programmers will add malicious code to damage a user's system
Which is the most suitable device to use in a classroom or a conference room to deliver presentations?
projector
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
public domain software
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?
publish to a web server
What type of software accepts text as input and produces speech as output?
read aloud software
When a value in a worksheet changes, the spreadsheet program will __.
recalculate any cells whose formulas depend on the value that changed
In a relational database, data is organized into rows of data called __.
records
Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?
relative reference
A web host's uptime is a measure of __.
reliability, so visitors can access your site without concerns that the web server is unavailable
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
What types of activities are ideal for a robot to perform?
repetitive tasks
Which of the following properties affects the quality of digital images?
resolution
__ refers to the clarity or sharpness of an image.
resolution
Which of the following troubleshooting tools would you use if you made an update that seems to have caused issues?
restorer
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
restorers
Which of the following is the science that combines technology and engineering?
robotics
What hardware is essential to creating a home Wi-Fi network?
router
A process called __ converts analog sound waves into digital sound.
sampling
A process called _____ converts analog sound waves into digital sound.
sampling
Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate?
scanner
Under which of the following circumstances might you be most likely to contact a professional to repair your computer or mobile device?
screen is broken
__ are attackers who want to attack computers but lack the knowledge to do so.
script kiddies
A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network.
sensors
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
shareware
Charley likes to have everything organized and she is bothered by the long list of documents on her flash drive. She wants to create folders by semester, then by course. How can you help her?
show her how to use File Manager
On a webpage, a __ provides supplemental material such as social networking feeds and ads.
sidebar
A __ is a sophisticated computer animation useful for training and teaching in many fields.
simulation
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
site license
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
slide master
Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. Besides Internet connectivity, what does she need to watch the shows on a TV?
smart TV or a TV stick
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
social engineering
Which of the following types of websites typically provides the least security?
social media sites
What type of hard drive has no moving parts, making it fast and durable?
solid state drive
When coding an image, HTML 5 requires you to __.
specify descriptive alternative information using the alt attribute
What technology can be used by people with a hearing disability to listen to a narration?
speech recognition
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?
spiders
A __ is a very short duration of a voltage increase that can be absorbed by a surge protector.
spike
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
star
A _____ is a named collection of formats you apply to text in a word processing document.
style
Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What technology does the smartphone use to make the assistant respond to Edwin?
synthesized speechq
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
tablet
When you write HTML code, you use __ to describe the structure of information on a webpage.
tags
Which of the following indicates a website is NOT secure?
the URL of the website begins with http
What is the temporary Windows storage area that holds items you copy or cut called?
the clipboard
Which of the following is a disadvantage of using cloud computing to share files?
the inability to access your files if you lose your internet connection
The basic premise of __ is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.
the internet of things
____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
the internet of things
If your webpage contains a link to an external website and its web address changes, __.
the link on your website will no longer work
What is uptime?
the measure of a web hosts reliability
Ms. Lawson, a primary school teacher, told her students that a photograph of the president is in the public domain. What does she mean by this?
the photo is free of copyrights
What does a file format refer to?
theorganizationandlayoutofdatainthefile
Why would you want to connect your computer to a network?
to access shared resources
Why do companies use online collaborative productivity software?
to allow employees to share, edit, and comment on documents
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?
to give you finer control over the content
Where can you pin frequently used apps for easy access?
to the taskbar
To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?
transfer contents to an external storage device
When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of an __.
transition
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
trojan
A DSL modem uses existing standard copper telephone wiring to send and receive digital data.
true
A copyright is an originator's exclusive legal right to reproduce, publish, or sell intellectual property.
true
A digital citizen uses technology to be productive and efficient.
true
A digital coupon provides a promotional code you enter when you check out and pay for online purchases.
true
A kiosk is a freestanding booth usually placed in a public area that can contain a display device used to show information to the public or event attendees.
true
A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.
true
A microprocessor is the brains of a computer.
true
A scanner converts a printed document into a bitmap file by dividing the image into a grid of tiny cells and assigning colors to each cell.
true
A worm is a malicious program that uses a computer network to replicate.
true
After designing a website, you transfer the website files from your local computer to a remote web server.
true
An EULA grants permission for one installation.
true
An intelligent classroom is one in which technology is used to facilitate learning and communication.
true
Before you name your website, you need to search for other sites using that name and then purchase a domain name.
true
Digital audio can be created by recording sound on a smartphone.
true
E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.
true
Each slide in a presentation has a layout that includes placeholders for certain types of content.
true
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.
true
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
true
If you have information literacy, you can select the right tool to find the information you need.
true
In an 8-bit coding schemes, 8 bits can represent one character.
true
In general, a high powered processor is not necessary for a computer that will be used primarily to check email and browse the web.
true
In order to run a program's source code, it must be translated into machine language.
true
Local applications can be accessed only on the computers on which they are installed.
true
Lossy compression discards some original content to create smaller files.
true
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.
true
Most video editing software shows the video as a timeline with separate tracks for video and sound.
true
Moving or copying a folder affects all of the contents of the folder.
true
Networks allow computers to share resources, such as hardware, software, data, and information.
true
New cars use embedded computers to make driving safer.
true
Output methods include speakers, headphones, and interactive whiteboards.
true
Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.
true
Preinstalled programs and apps may be included as part of a marketing agreement between the device's manufacturer and a software development company.
true
Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.
true
The Energy Star program encourages manufacturers to reduce the amount of electricity used by computers and related devices.
true
The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.
true
The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.
true
The kernel is the core of an operating system.
true
The operating system manages interaction between hardware and software.
true
The speed at which data travels on a bus is referred to as the world size.
true
To work with a web app, you use your browser on a computer or mobile device.
true
Two types of firewalls include hardware firewalls and software firewalls.
true
UX refers to the focus on the user's reaction and interaction to a product, including its efficiency, effectiveness, and ease of use.
true
When you create an app, you are protected under copyright laws, even before you apply for a copyright.
true
When you open the file manager you have access to frequently or recently opened the files and folders, favorite files and folders, and the main folders on your computer or device.
true
When you work on a file using a web app, changes are saved as you make them.
true
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmission and limits who can access the Wi-Fi network.
true
Wikipedia is a collaborative website where a team of people can publish or modify content on a webpage.
true
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
true
You have the right to see your credit card information.
true
You must be online to use web apps.
true
You use CSS to specify the appearance of content on a webpage
true
an operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it.
true
volatile memory loses its contents when power is removed.
true
What is the first step to performing hardware maintenance?
turn off the computer and remove its power source
What type of security requires something you know and something you have that no one else has?
two factor authentication
Each webpage is assigned a __, an address that identifies the location of the page on the Internet.
uniform resource locator (URL)
Which of the following is assigned to each webpage to identify its location on the Internet?
uniform resource locator (URL)
What should you do if a headset plugged into your computer is not working properly?
update the device driver
_____ are new releases of an app and may require an additional fee before you can install them.
upgrades
How can you protect a computer from electrical spikes and surges?
use a surge protector
How can you check data on devices connected through an IoT network?
use a tablet
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
use animations
Which of these should you NOT do when including a video from YouTube on your website?
use the <video> tag to access the video in your webpages HTML file
Jazmyn cannot find the paper that she wrote last night. She is in a panic and you want to help her. What advice would you give her?
use the search tool to locate the file by file name, content, or date
What area of software development focuses on the user's reaction to and interaction with the software product?
user experience
Which of the following is a necessary step in maintaining computer hardware?
using a UPS or a surge suppressor
A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?
using a motion sensing game console
Plagiarism is best defined as __?
using another's work and claiming it as your own
The hardware a digital device needs to play videos includes a screen, speakers, and a _____.
video card
Most __ shows media on a timeline with separate tracks for video and sound.
video editing software
A business would use a website analytics tool for all of the following EXCEPT _____.
viewing why someone visited your webpage
A video that is shared millions of times over social media in a short period of time is termed to be ____________ .
viral
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
virtual reality
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
web apps
Which type of app would most likely NOT be found included in a productivity suite?
web browser
Which of the following is classified as input device?
webcam
A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.
webpage
What can a company learn by studying website analytics for its website?
when it needs to increase its bandwidth
At what point are you responsible for following the terms in a software license agreement?
when you click or take another action to accept the terms
Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.
will allow user interaction
What type of network sends signals through airwaves and usually does not require cables?
wireless network
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
with responsive design
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
word processor
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?
wordsmithing.com
Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use?
www.weareone.org
Which of the following is not an advantage of saving documents in the cloud?
you can access the documents when you are not connected to the internet
Which of these statements is true about XML?
you can export data from into XML to share with other applications
Which of the following is an advantage to saving a file to a flash drive?
you can take it with you and then work on it on another computer
Compressing a file is also called _____ the file.
zipping