Post Test: Technology Knowledge and Skills
Ashton works as an engineer on a construction site. He needs to be in constant communication with his team members. Which telecommunication device should he use? Ashton must use a _______. This telecommunication device requires a ______ to activate the _______.
1. Two-way radio 2. Push-to-talk button 3. Transmitter
What is the best method for modern businesses to authorize the use of workplace resources to its employees? A. Assign them a user authentication and password. B. Maintain a log to record their use of workplace resources. C. Monitor their activities using security cameras. D. Restrict them to use resources only during specific hours. E. Allow them to use certain resources only during lunch time.
A. Assign them a user authentication and password.
Which telecommunications service allows Internet and telephone services to work over the same phone line? A. digital cable B. DSL C. mobile network D. webmail E. data card
B. DSL
Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with marketing agencies B. sharing statutory personal information of its employees with law agencies C. sharing Internet browsing details of an employee with other employees D. blaming human errors on technology bugs E. allowing employees to make errors
B. Sharing statutory personal information of its employees with law agencies
Which practice will help prevent data loss in case of a computer malfunction? A. encrypting data B. executing regular data backup C. installing a firewall D. using an antivirus E. keeping a screen saver
B. executing regular data backup
Which of these technologies helps to improve employee efficiency? A. augmented reality B. personal information management C. real-time analytics D. robotics E. automated locomotives
B. personal information management
Andrea is working at an off-site development center. She needs to access information from her organization. Which Internet service will help her to access information securely from her organization's network? A. chat B. email C. VPN D. WWW E. subscribed service
C. VPN
Which type of computer application is Apple Keynote? A. word processor B. spreadsheet C. presentation D. database E. multimedia
C. presentation
Which web-based application helps businesses save money and time that would otherwise be spent on travel? A. webmail B. social media C. web conferencing D. wiki E. Twitter
C. web conferencing
Each component of a spreadsheet is identified in a specific way. Which spreadsheet component is identified using letters of the alphabet? In a spreadsheet application, a ______ is identified using letters of the alphabet.
Colum
There are many potential risks associated with the Internet. What do we call the distribution and access of illegal copies of digital books? We refer to the distribution and access of illegal copies of digital books as ____.
Copyright infringement
Which sentence in the following paragraph correctly describes mobile technology? [Mobile devices have become the main source of communication for many people around the world.] However, [businesses are still to capitalize on the wide reach mobile communication.] [Social media is being increasingly used in marketing research.] [Customized advertising can be integrated based on specific users' location.] Smartphones do not have videoconferencing capabilities that is becoming a major business tool.
Customized advertising can be integrated based on specific users' location.
Which computer application is an example of a DBMS? A. Apache OpenOffice Calc B. Apple Numbers C. Corel Quattro Pro D. Microsoft Access E. Dot Net
D. Microsoft Access
What is the purpose of the BCC option in an email? A. to send a backup copy of the message to all email addresses in the address book without concealing the entire list of recipients B. to send a backup copy of the message to all email addresses in the address book without revealing the entire list of recipients C. to send a copy of the message to multiple recipients without concealing the entire list of recipients D. to send a copy of the message to multiple recipients without revealing the entire list of recipients E. to send a message to only one recipient
D. to send a copy of the message to multiple recipients without revealing the entire list of recipients
Which telecommunications device is widely used in industries that require closed communication? A. fixed-line telephones B. mobile phones C. satphones D. walkie-talkies E. small phones
D. walkie-talkies
Which Internet technology allows businesses to make presentations and share visual aids such as charts and graphs? A. social networking sites B. VoIP C. VPN D. web conferencing E. chatting
D. web conferencing
Personal digital assistants are handheld devices that serve as personal information managers. What is another term used to refer to these devices? We also refer to personal digital assistants as _________ computers.
I got this wrong I'm sorry 😔
A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain the growing amount of work in a capable manner. Which technology will help the business meet its goals? __________will help the business meet its goals.
Not 🙅♀️ Robotics Not 🙅♀️ Real-time analytics
Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watching his friend type in the ATM pin. What should Lance's friend do? The person watching lance's friend typing the ATM pin is an example of_______. Lance's friend should_______.
Shoulder browsing Change the ATM pin
On Sarah's first day at work she is provided with a range of information technology tools that she can use to write, edit or create documents and accounting sheets, store information, make presentations, and so on. Match these software their definitions. word-processing software electronic mail presentation software spreadsheet software database software helps to inform or demonstrate an idea in the form of a slide show using images or presentation graphics are digital versions of the paper-based accounting sheets used to store, organize, and manipulate data are digital versions of the manual typewriter and can be used to write, edit, print, and perform various modifications to a document helps to exchange messages and share pictures, data files, and audio and video clips are tools that store large quantities of related data and information
helps to inform or demonstrate an idea in the form of a slide show using images or presentation graphics (presentation software) are digital versions of the paper-based accounting sheets used to store, organize, and manipulate data (spreadsheet software) are digital versions of the manual typewriter and can be used to write, edit, print, and perform various modifications to a document (word-processing software) helps to exchange messages and share pictures, data files, and audio and video clips (electronic mail) are tools that store large quantities of related data and information (database software)