ITE Exam 2 Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

A data file contains the instructions your computer or device needs to run programs and apps.

False

A shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device.

False

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

Publish to a web server

_____ are attackers who want to attack computers but lack the knowledge needed to do so.

Script kiddies

When you open the file manager you have access to frequently or recently opened files and folders, favorite files and folders, and the main folders on your computer or device.

True

When you work on a file using a web app, changes are saved as you make them.

True

_____ are new releases of an app and may require an additional fee before you can install them.

Upgrades

Which of the following websites most likely uses XML-formatted data?

an ecommerce site that lets you compare products from different vendors

Which of these is not an option for formatting text?

copying a region of text

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

To run a productivity app with most complete and advanced capabilities, you would most likely ______

install and run the software on your desktop or laptop computer

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

integrated development environment (IDE)

If a website is designed with responsive design concepts, then _____.

it appears correctly on any device regardless of screen size

Each of the following is a factor that causes repetitive strain injury (RSI) except _____.

lack of restful sleep

When creating a strong password _____ is the most important element.

length

Which of the following types of websites typically provides the least security?

social media sites

A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.

spike

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.

will allow user interaction

File properties are the same no matter what type of file.

False

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.

Which of the following would most likely be a static website?

A historical facts page

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files and any associated entries in the system files.

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

Analysis phase

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?

App Store for iOS

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

File transfer programs belong in what software category?

Communications

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital Rights Management

_____ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."

Encryption

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

CAPS LOCK is a sticky key.

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.

False

When you move a file to the Recycle Bin or Trash, it is permanently deleted.

False

Which of the following is not a web browser setting for managing cookies?

Have all cookies automatically expire after 45 days.

Which of the following components on a webpage is created using HTML?

Heading

Which of the following is NOT a feature of an Integrated Development Environment (IDE)?

Hosts webpages

______ is any data and instructions entered into the memory.

Input

When you take a photo with a digital camera, most likely it is saved in ______ format.

JPG

What is a popular language for writing scripts that run in your browser to control a webpage's behavior?

JavaScript

Which of the following programming languages adds interactivity to websites?

JavaScript

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public domain software

Which of the following is not a general guideline for developers?

Start programming before creating a proposal.

What is a digital certificate?

Technology used to verify a user's identity

What is uptime?

The measure of a web host's reliability

A worm is a malicious program that uses a computer network to replicate.

True

After designing a website, you transfer the website files from your local computer to a remote web server.

True

An operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it.

True

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

True

Moving or copying a folder affects all of the contents of the folder

True

The kernel is the core of an operating system.

True

The operating system manages interactions between hardware and software.

True

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

With responsive design

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

a crash

The ______ window is the window you are currently using, which appears in front of any other open windows.

active

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Mobile first design is important because ______.

developers must provide simplified user experiences for apps that run on small screens

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

firewall

GUI stands for ______ user interface.

government

You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?

graphics and media

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

Which of the following units measure millions of bytes of data?

megabytes

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

When a value in a worksheet changes, the spreadsheet program will ______.

recalculate any cells whose formulas depend on the value that changed

In a relational database, data is organized into rows of data called ______.

records

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

waterfall method

Which of the following best defines responsive design?

Pages automatically adjust the size of their content relative to the size of the screen.

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders

You have the right to see your credit information.

True

You use CSS to to specify the appearance of content on a webpage.

True

What is the temporary Windows storage area that holds items you copy or cut called?

the Clipboard

When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ______.

transition

What type of security requires something you know and something you have that no one else has?

two factor authentication

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

Agile development

HTML coding does not allow for lists using bullets. All lists have to be numbered.

False

HTML has remained the same ever since it was developed, which is why there is only one version.

False

Programmers use compilers to test code to find errors and provide suggestions to fix them.

False

Which of the following is NOT true about RAM?

RAM is nonvolatile memory.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

True

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

Which type of app would most likely NOT be found included in a productivity suite?

web browser


Kaugnay na mga set ng pag-aaral

Week 16 - Palliative Care & End of Life

View Set

BIOLOGY - UNIT 6: MICROBIOLOGY ARCHAEA

View Set

Compensation/Benefits Administration Ch. 8, 9, 10, & 11

View Set

Biology Concepts and Investigations: Chapter 1

View Set

AP Physics Chapter 7 & 8 practice quizzes

View Set

18. Unit 6: Lesson 2: LS Assignment 3

View Set

Pg. 341 Larry Examples and Exercise #5

View Set