ITDE EXAM 2
When it comes to secure data storage on a network, which of the following statements is true?
Roles can be granted to individuals to view files and make changes to files on a network.
Which of the following HTML code samples inserts a hyperlink in a webpage?
<a href="http://www.google.com">Google</a>
In which of the following situations is a digital certificate useful?
A digital certificate is a technology used to verify a user's identity and key that has been "signed" by a trusted third party.
A modem can also function as what other piece of hardware?
A router
What is a MAC address?
A unique hardware address for your device
Which of the following describes a domain registrar?
A website where you can go to purchase a name for your website
Which software development method uses highly skilled programmers to shorten the development process while producing quality software?
Agile development methodology
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Which of the following is true about broadband connections?
Broadband connections are "always-on" connections.
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?
CSS
File transfer programs belong in what software category?
Communications
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
A router is a system of two or more devices linked by wires or cables.
False
After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.
False
Cloud backup software periodically saves your files and settings to an external hard drive.
False
HTML coding does not allow for lists using bullets. All lists have to be numbered.
False
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
False
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Why is it important to be able to export data in an XML format?
It allows data to be shared between applications.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Which of the following statements is NOT true about a local firewall?
It is often built into a company's operating system.
What defines the behavior of an object in object-oriented programming ?
Method
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
Piracy
In which category of software do Microsoft Office Word and Excel belong?
Productivity
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
Public domain software
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
What is uptime?
The measure of a web host's reliability
An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.
a project
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Which of the following does a software license usually specify?
number of people authorized to use the software
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
What can a company learn by studying website analytics for its website?
when it needs to increase its bandwidth