ITE Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is an authentication method to keep your data safe? 1. Fingerprint scanner 2. Body area network 3. Encryption 4. Software firewall

1. Fingerprint scanner

During which phase of the SDLC is software tested to make sure each function works as intended? 1. all phases 2. design 3. analysis 4. implementation

1. all phases

Which of the following statements about browser security settings is false? 1. You can choose which sites run pop-ups. 2. You must keep your accumulated web history as long as you use the browser. 3. You can accept or deny cookies. 4. You can allow or block scripts on specific websites.

2. You must keep your accumulated web history as long as you use the browser.

Which of the following is NOT a leading provider of PaaS and IaaS services? 1. Google 2. Microsoft 3. Amazon 4. Walmart

4. Walmart

In which of the following situations is a digital certificate useful? 1. You are researching a topic for an assignment. 2. You are registering for an event. 3. You are emailing a friend. 4. You are signing a rental lease.

4. You are signing a rental lease.

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

What is a MAC address?

A unique hardware address for your device

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

Agile development

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files and any associated entries in the system files.

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

Analysis Phase

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?

App store for iOS

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?

Artificial Intelligence (AI)

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Why is it not safe to connect to public Wi-Fi networks?

Because the networks are rarely protected.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?

Bluetooth Connection

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

What can you do to make sure you are not contributing to software piracy?

Buy software from legitimate resellers or directly from the manufacturers.

File transfer programs belong in what software category?

Communications

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?

Data Analytics

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital Rights Management

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.

Digital Rights Management

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through e-mail.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

Firewall

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?

Infrastructure as a Service (IaaS)

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.

Instillation

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors, promotional codes, or try get your financial information.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Which of the following network standards applies to cellular networks?

LTE

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

What defines the behavior of an object in object-oriented programming ?

Method

What internal device does a computer use to connect to a wired or a wireless network?

Network Interface Card (NIC)

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

Omnichannel Strategy

Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?

Online Storefront

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders

Devices on a _____ area network are connected via Bluetooth.

Personal

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

Piracy

_____ are tools that track the memory usage, status, and errors of currently running software.

Process Managers

In which category of software do Microsoft Office Word and Excel belong?

Productivity

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

Project Manager

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?

Receiving Clerk

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?

Reinforcement Learning

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

A modem can also function as what other piece of hardware?

Router

Which commonly used programming language is used to manage, access, and search for database content?

SQL

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?

Service Pack

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

Shareware

Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?

Smart Plug

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social Engineering

_____ is the process of creating programs and apps from the idea stage to distribution to users.

Software Development

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?

Software as a Service (SaaS)

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

Support and Security phase

What do you call the rules each programming language has for writing instructions?

Syntax

What is a digital certificate?

Technology used to verify a user's identity

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?

Tester

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

How can you protect a computer from electrical spikes and surges?

Use a surge protector

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

Video conferencing application

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

Virtual Private Network

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual Private Network

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

Visit the manufacturer's website and install the latest updates for the app

What type of network sends signals through airwaves and usually does not require cables?

Wireless Network

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer.

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

a crash

What would a password manager allow you to do?

create and store multiple strong passwords

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

firewall

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

integrated development environment (IDE)

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

What technology allows Siri to understand you when you request a route to a location in a nearby city?

natural language processing (NLP)

What type of program would have a class named Student with objects called fullTime and partTime?

object-oriented program

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

The set of activities performed to build a program is called the _____.

software development life cycle (SDLC)

What is the goal of a DevOps methodology?

to produce programs quickly and then offer continuous updates

_____ are new releases of an app and may require an additional fee before you can install them.

upgrades

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

waterfall method

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wireframes

Which of the following describes an evil twin? 1. A device infected with malware that an attacker uses to control the device remotely. 2. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. 3. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. 4. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

2. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? 1. His phone can generate an alarm even if it is on mute. 2. He can use remote tracking to retrace the thief's steps. 3. The current location of his phone can be pinpointed on a map through the phone's GPS. 4. If the thief enters an incorrect passcode three times, the phone takes a picture of the thief and emails it to Marcus.

2. He can use remote tracking to retrace the thief's steps.

Which of the following is an example of an object-oriented programming language? 1. Fortran 2. Java 3. HTML 4. DevOps

2. Java

In terms of privacy, which of the following is a best practice? 1. Saving your personal information as an email draft 2. Keeping your Social Security number hidden in a locked box in your home 3. Posting your location on social media 4. Throwing away old bank statements that are more than three months old

2. Keeping your Social Security number hidden in a locked box in your home

You can monitor and protect your financial data in all of the following ways EXCEPT _____. 1. Being cautious about what information you post on social networking sites. 2. Storing financial information in an unsent email message. 3. Querying unfamiliar purchases found on your bank statements. 4. Shredding financial documents before you discard them.

2. Storing financial information in an unsent email message.

Which of the following does a software license usually specify? 1. number of people authorized to use the software 2. amount of RAM required to run the software 3. geographic locations where users can run the software 4. steps for installing and uninstalling the software

2. amount of RAM required to run the software

Which of the following tools translates the source code of a procedural program into binary code? 1. debugger 2. compiler 3. source code editor 4. code repository

2. complier

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. 1. creating a strong password to access the router 2. naming your router something you'll remember, like your street address 3. turning off remote management to the device 4. utilizing guest access when needed and turning it off when guests leave

2. naming your router something you'll remember, like your street address

Which of the following could indicate a DoS attack on your company server? 1. Customers are required to enter personal information as they complete an order form. 2. Customers are receiving too many emails about special offers. 3. Customers cannot view the website on their device because the page will not load. 4. Customers cannot download the most recent newsletter.

3. Customers cannot view the website on their device because the page will not load.

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? 1. Compilers 2. Debuggers 3. Interpreters 4. Eclipse

3. Interpreters

When describing a client/server network, which of the following would be considered a client? 1. External hard drive 2. Modem 3. Laptop 4. Printer

3. Laptop

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? 1. Single user license agreement 2. End user license agreement 3. Site license 4. Multiple user license agreement

3. Site license

Which of the following statements do opponents of net neutrality agree with? 1. Access to websites should not be restricted based on content. 2. All Internet traffic should be treated equally. 3. The same level of service should be provided to all websites, regardless of purpose. 4. ISPs should charge more for high-bandwidth connections.

3. The same level of service should be provided to all websites, regardless of purpose

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? 1. They use adware to fill your screen with unwanted advertisements until you click one. 2. They overload the server with network traffic so webpages will not load. 3. They disguise the network as an evil twin. 4. They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

3. They disguise the network as an evil twin.

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? 1. phishing 2. cyberstalking 3. pretexting 4. research spoofing

3. pretexting

Which of the following is an example of a personal area network? 1. computers connected within a city 2. computers connected within a home 3. smartwatch and phone connected via Bluetooth 4. phone and computer connected via Wi-Fi

3. smartwatch and phone connected via Bluetooth

Which of the following types of websites typically provides the least security? 1. online banking sites 2. online shopping sites 3. social media sites 4. private business sites

3. social media sites

Which of the following statements is NOT true about a local firewall? 1. It is a physical device that acts as a protective barrier. 2. It is also called software firewall. 3. It is often built into a company's operating system. 4. It inspects data being transmitted to or from a network.

4. It inspects data being transmitted to or from a network.

Which of the following is not a general guideline for developers? 1. Group programming activities into phases. 2. Involve users for whom the program is being developed. 3. Define the standards, or sets of rules and procedures, for creating the product. 4. Start programming before creating a proposal.

4. Start programming before creating a proposal

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

Antispyware

What special technology allows computers to perform the intense processing needed to perform machine learning?

Artificial Neutral Networks (ANN)

Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?

B2B (Business 2 Business)

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?

Broad Network Access

Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.

Customer relationship management (CRM)

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

Fourth generation language (4GLs)

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

Freeware

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public Domain Software

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

To access the Internet, a router must be connected to a _____.

modem


Kaugnay na mga set ng pag-aaral

Ch 20 Preserving and Protecting Your Environment

View Set

Lección 10 10.4/Repaso Florence

View Set

PSYCHOLOGY 235 FINAL CAPONE TESTS

View Set

Ch.10 lesson 3: The Transfer Of Heat

View Set

match the organism with the disease it may cause

View Set

Linux Academy LPIC Exam 1 Study Guide

View Set

Additive Inverse and Identity, Multiplicative Inverse, Identity, and property of zero

View Set