BCIS 2610 Exam 3 Study Guide
What is an ISP?
A telecommunications company that sells Internet access.
Simon established a startup. He wanted to secure a domain name and have a website to market and sell his products. In this regard, which of the following should be the first step?
Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements.
How would you design a webinar that would be interactive?
Add a poll
It is often required to transfer huge files across locations within businesses and corporate offices. Email usually cannot handle such large files which is why file transfer tools are available to perform such tasks. Which of the following categories of programs and apps do these tools belong to?
Communications
Businesses use webinars for all of the following reasons except?
Group discussions
Which of the following statements is NOT true about a local firewall?
It is also called software firewall.
What is the working procedure of DevOps methodology?
It produces programs quickly, and then offers continuous updates to increase the functionality of the program.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
__________ are types of tools that track the memory usage, status, and errors of currently running software.
Process managers
In which category of software do Microsoft Office Word and Excel belong?
Productivity
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this?
Ransomware
In the email communication process, what is the role of the email server?
Routing email messages through the Internet or a private network
Which commonly used programming language is used to manage, access, and search for database content?
SQL
Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue?
Service pack
The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?
The company would have to use an IrDA network protocol within close proximity.
___________ might include additional features not available in the version you currently are running. They are new releases of the program or app, and may require an additional fee to enable the program to install.
Upgrades
How do you create an email message?
Use an app or software to compose and send information.
How would you describe the social networking site YouTube?
YouTube is a media-sharing network that lets users display and view videos and then post comments.
A business can use a wiki in all the following ways EXCEPT for _____.
aggregating content
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
Social networking includes all of the following positive effects except _________.
increased privacy
A company received a proposal for the development of a new software. While analyzing the specifications, it was found that there was no clear goal and the scope of the project could evolve. Which methodology should the company adopt to execute this project?
Agile development methodology
Which of the following is a general guideline for developers?
Define the standards, or sets of rules and procedures, to create a standard product.
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
Archie wants to use a newly launched web browser on his computer. What steps should he ideally follow to get it on his system?
Download the program from the manufacturer's website and install it on his computer.
While starting a software application, Ian encountered an error that the version was no longer supported. Which of the following options can resolve the issue?
Ian could visit the company website and install the latest version or updates on his computer.
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use it and what actions they can perform?
Incorporate biometrics and the need for passwords to access the application
____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.
Installation
A company intends to improve the productivity of its developers so that the programming is easier and can be finished quickly with fewer syntax errors. What should the company provide to its developers to work?
Integrated development environment (IDE)
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
What is one advantage of a company using an anonymous messaging app?
It allows for honest feedback without disclosing identities.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email?
It contained typos and other grammatical errors.
What defines the behavior of an object in object-oriented programming ?
Method
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase?
Site license
Daniela's company has made the decision to allow employees to work from home as the company has outgrown their physical space. Knowing that not all employees may have the same device, what would be the best method of digital communication that would allow employees to see each other and participate in meetings seamlessly?
Skype
Hector wants to purchase a new laptop. Which of the following is the most important pre-installed program that he should check for on the laptop before buying it, so that he can start to use the laptop as soon as he owns it?
System software
You just posted new photographs from your trek to Nepal up onto Shutterfly, and the site asks you to review the metadata. You would review all of the following EXCEPT _____.
The HTML coding
If you do not want to use your Internet Service Provider (ISP) for your email account, how could you acquire a webmail account?
Through an online service
How might a business use a blog?
To communicate with customers
Social networking can leave you exposed to criminal activity in all of the following ways except?
Using photo and posts found about you on the apps to form opinions about your ethics and character
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
What type of network sends signals through airwaves and usually does not require cables?
Wireless network
Which of the following is an implementation of OOP concepts?
Writing objects and creating instances based on functional need
Is it advisable to enable automatic updates on security software?
Yes; this helps in catching and quarantining any new malware before they harm the computer.
Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer?
An open source program
In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent?
Antispyware
Which of the following is not a resource able to be shared in a network?
Motherboards