Computer Exam
Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?
"The quick brown fox"
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
"https" as the protocol in the URL
If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?
'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.
Which of the following top-level domains is generally used by Internet service providers?
.net
Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making?
3-D animation
Which of the following video resolutions produces the sharpest images and the largest files?
4K
Which of the following HTML code samples inserts a hyperlink in a webpage?
<a href="http://www.google.com">Google</a>
To insert a heading for a main topic on a webpage, which of the following tags should you use?
<h1> </h1>
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?
A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.
Jenson needs to update his home address in his health insurance company's database. Which of the following applications can he open on his computer so he can make these changes?
A browser
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
A desktop computer
What could cause an external drive, like a USB flash drive, to not be recognized when plugged into a computer?
A faulty port
Which of the following is NOT likely to be found on a webpage?
A formatting toolbar
Which of the following would most likely be a static website?
A historical facts page
You and your best friend have both created online career profiles. Within a week, your friend has had three calls for interviews and another 19 companies have viewed his profile. Your profile has had only two views. You ask your friend to review your profile and he finds a problem with it. Which of the following would be a problem for your online career profile?
A humorous profile name
Simone just received a letter from her health care provider telling her she can create an account online that will give her access to all her health records. How would you describe what her provider is encouraging his patients to engage with?
A mobile health app (mHealth)
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?
A photo of you horseback riding on the beach with friends.
A modem can also function as what other piece of hardware?
A router
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware.
Google is an example of which type of website?
A search site
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
What is an ISP?
A telecommunications company that sells Internet access.
What is a MAC address?
A unique hardware address for your device
Where can you find the information about using an image that you obtained in a search result?
A usage rights filter shows information about using an image.
Which of the following describes a domain registrar?
A website where you can go to purchase a name for your website.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
Acceptable use policy (AUP)
How would you design a webinar that would be interactive?
Add a poll
What is the primary difference between HTML 5 and Adobe Flash types of web animations?
Adobe Flash requires you to use a plug-in but HTML 5 does not.
Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?
Adobe Premiere Clip
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?
Agile development
Which of the following requests to Alexa is most likely to get the desired result?
Alexa, play Journey songs on Pandora.
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
Which company was the first to develop a computer meant for personal use?
Apple
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
Archive
Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study?
Articles published in a newspaper known to be neutral toward any political party
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?
Artificial intelligence (AI)
Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?
Artificial intelligence and machine learning
Which property is assigned to a file by the operating system?
Artist's Name
Talis shoots a photo with his 20 megapixel digital camera. How is the image stored as digital data?
As a list of the binary color numbers for all the pixels it contains
Mateo is designing a technical diagram that many textbook publishers can use, and he wants to make sure he retains the rights to the diagram before selling it. At what stage does a copyright for his creative work come into effect?
As soon as the image exists in physical form
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?
Augmented reality
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
How will technology help people with disabilities become more transportation independent?
Automated vehicles will be developed.
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?
Autoplay
Which of the following is a key aspect of database security according to the CIA triad security model? Choose two.
Availability & Integrity
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
B2B
You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?
BCC your supervisor in your response
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
Be cautious about what information she posts.
When Jack takes a class, he saves all his work for that class with the name of the course. What is most likely happening to his saved files?
Because he is using the same name, each time he saves he is overwriting his previous work.
Which of the following statements is true about the Clipboard?
Because he is using the same name, each time he saves he is overwriting his previous work.
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?
Bluetooth connection
How are the ways AI learns similar to how you learn?
Both use past experiences to predict likely outcomes and responses.
Which of the following refers to a condition in which the CPU performs well but the bus speed is slow?
Bottlenecking
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
Broad network access
Which of the following is true about broadband connections?
Broadband connections are "always-on" connections.
What determines the speed at which data travels?
Bus width
A construction firm intends to use technology to enhance their architectural designs architecture. Which of the following technologies should they use?
CAD software
What do engineers use to create highly detailed and technically accurate drawings?
CAD software
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.
CRM
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?
CSS
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.
Catfishing
Which of the following factors can affect processor performance of a CPU?
Clock speed
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?
Cloud storage
File transfer programs belong in what software category?
Communications
Which of the following would most likely be the key paired with a value of "Canada" in a non-relational customer database?
Country
How can you protect personal information gathered by legitimate organizations?
Create a separate email account for receiving information from websites.
What would a password manager allow you to do?
Create and store multiple strong passwords.
_____ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work.
Creative Commons
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer service representative
Which of the following fields would be most important to encrypt in a customer table?
Customer's credit card number
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other?
Customers, Ingredients
What does XML use to describe data?
Customized tags
Which of the following problematic behaviors relies on the use of digital technology?
Cyberbullying
Morgan needs to hire someone to help implement a business intelligence system for her company. What type of professional would be the best fit for this job?
Data analys
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?
Data analytic
Ricky unplugs his Amazon Alexa smart speaker when he's not using it. He's trying to limit unnecessary ____________.
Data collection
Which data repository type is most likely to include database tables and primary keys in its internal data structure?
Data warehouse
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
Database
Samir has saved a file named Project.docx in various locations on his hard drive and needs to work with the most recent version. What file property should he examine to find the most recent version of Project.docx?
Date Modified
Which of the following is NOT a factor search engines consider when ranking search results?
Design quality of the webpage
Which of the following devices is the easiest to upgrade, such as by adding RAM?
Desktop computers
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.
Digital detox
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.
Digital footprint
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?
Digital rights management (DRM)
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?
Drawing app
Kareem wants to include line drawings of abstract shapes on his personal website. What should he use to acquire the graphics?
Drawing software
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
Drop box
Which of the following types of RAM needs to be constantly recharged to retain the contents?
Dynamic RAM (DRAM)
Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?
Emperor penguin colony
Simon has difficulty pressing and holding more than one key at a time, such as CTRL+ALT+DEL. What setting can he change to make this task easier?
Enable sticky keys.
Which of the following does a secure website use to safeguard transmitted information?
Encryption
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
Which of the following scenarios would most likely rely on Big Data? Choose two.
Evaluating applications for disability benefits Calculating traffic delays during rush hour
Which of the statements about B2B e-commerce is correct?
Examples of B2B services are advertising, technical support, and training.
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should the FROM phrase say in her query?
FROM students
Kyle likes to keep in touch with his friends and family using the Internet. He enjoys sharing pictures, music, and ideas. He also enjoys playing games with others online. Which of the following online platforms should he use to do all of this?
Facebook, because it is an online social network that allows game play
4G and 5G networks provide slower data transmission speeds than 3G networks.
False
A Trojan is a malicious program that uses a computer network to replicate.
False
A joystick is a pen-type input device used to draw and tap icons.
False
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
False
After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.
False
All cloud technologies must be accessed over the Internet.
False
All-in-one computers are easier to service and upgrade but occupy more space than desktop computers.
False
Aron is building a website that will require a back-end database. He plans to connect the web server on his network in a way that it will be easily accessible from the Internet. He should connect his database server the same way so data in the database is readily accessible to the web server.
False
Augmented reality gaming hardware includes a headset, a controller, and motion sensors.
False
Bandwidth is a term that describes the number of devices connected to a network.
False
Cloud backup software periodically saves your files and settings to an external hard drive.
False
[email protected] is an appropriate email address to use for communicating with potential employers.
False
Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint.
False
HTML coding does not allow for lists using bullets. All lists have to be numbered.
False
Haven runs an online bridal store called Haven Bridals. Her website is encrypted and uses a digital certificate. The website address for the store is http://www.havenbridals.com.
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
False
If you want to become a digital citizen, you only have to buy a piece of technology.
False
In Windows, the only way to copy or move files is to use the Clipboard.
False
Jorge saw a computer named Watson on the game show Jeopardy and was surprised at how many answers Watson was able to get correct, especially because the math problems involved solving equations. Watson was using augmented reality to solve the problems.
False
Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information.
False
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
False
Most computers can operate normally in extreme temperatures and withstand high humidity and power fluctuations.
False
Nellie recently sold her old laptop directly to a student from different country using an e-commerce website. The website she used runs on B2B model.
False
Netiquette only applies to social media and social networking, not emails and instant messaging.
False
Operating systems can run only if they are installed on a hard drive.
False
Programmers use compilers to test code to find errors and provide suggestions to fix them.
False
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
False
The Americans with Disabilities Act (ADA) requires that public schools purchase or acquire funding for adaptive technologies.
False
The first generation of computers used microprocessors.
False
To prevent a laptop from being stolen, you can use a surge protector.
False
Twitter is an example of a wiki, which allows for collaborative editing by its users.
False
When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy.
False
When accessed, an e-commerce website that sells carpentry tools displays a lock icon somewhere in the window of the browser. The address bar in the Chrome browser would identify this website as "insecure."
False
When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.
False
Wikis are not useful in education because students cannot use them to share notes and give feedback.
False
You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated.
False
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems?
Faulty power or video cable
What is the correct sequence of processing instructions in a machine cycle?
Fetch à decode à execute à store
Raphael is working with a table in Access. He needs to see all the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table?
Filter
Which of the following is an authentication method to keep your data safe?
Fingerprint scanner
Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?
G suite
Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?
Gamepad
Nadia is shopping for a phone that can take photos and identify their geographical location. What feature should she look for when comparing phones?
Geotagging
Businesses use webinars for the following reasons EXCEPT _____.
Group discussions
Which of the following is the strongest password?
H@veAGr3atDaY!
Which of these hardware components can you use to store videos?
Hard drive
Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. Which of the following options will help him achieve this ?
He can use a TV stick
Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?
He is using technology to have students work cooperatively in groups and create a presentation.
Brendon wants to volunteer at the Red Cross, a nonprofit agency. He enters redcross.com in his browser, but cannot find the right website. What mistake is he making?
He should enter redcross.org because Red Cross is a nonprofit organization.
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
Header and footer
Which of the following components on a webpage is created using HTML?
Heading
Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer?
Her coffeemaker that she has set to turn on and make coffee every morning at the same time.
Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?
High-quality product photos
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
IaaS
A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
Image 1 is sharper and has a larger file size than image 2.
Carlos is creating an animation by drawing one image in a frame, followed by another image in a slightly different pose, and so on until the motion is complete. What is this technique called?
In-betweening
In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.
Information Technology
Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?
Information security
_____ is data and instructions entered into the memory of a device.
Input
What is the recommended solution if a computer performs slowly?
Install additional RAM.
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
Installation
Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described?
Intelligent classroom
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?
Interpreters
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
What is one advantage of a company using an anonymous messaging app?
It allows for honest feedback without disclosing identities.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors.
Which of the following is not a step an operating system performs when printing a document?
It creates the document to be printed.
What happens when you delete a folder?
It goes the Recycle Bin or Trash folder.
Why is the date a file was modified useful?
It identifies the most recent version.
Which of the following statements is NOT true about a local firewall?
It is also called software firewall.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?
It is using virtual reality.
What does the operating system do if you try to save a file with the same name into the same folder?
It overwrites the original file unless you add a number, date, or initials to differentiate the files.
Which of the following is true about XML?
It provides a way to classify data and share it between applications.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices.
Why is an FTP client helpful?
It uploads files from your computer to a web server.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
JPEG
Which of the following programming languages adds interactivity to websites?
JavaScript
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client?
Laptop
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device?
MIDI technology
Which of the following is NOT an image format to store photos?
MP3
To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.
Meeting invites
How is a microprocessor different from an integrated circuit?
Microprocessors are faster, smaller and less expensive than integrated circuits.
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
Mobile hotspot
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP)
What rules should guide your behavior when you interact with friends and coworkers on social media?
Netiquette
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database?
Non-relational database
For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
Omnichannel strategy
For _____, the original media file is stored on the media distributor's server, so you can watch the content more than once.
On-demand content
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project?
One friend has an unreliable, slow Internet connection.
Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?
Online storefront
Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using?
Open source
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?
Open source
Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?
Other search engines provide more reliable research.
Which of the following best defines responsive design?
Pages automatically adjust the size of their content relative to the size of the screen.
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
Patch finders
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?
People with color blindness
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
Piracy
At the beginning of the school year, each classroom was given one box of copy paper to make all their copies for the year. How do you think the teachers will be able to make that one box last all year long?
Place as many documents as possible online, reducing the need for paper printouts.
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
Plotter
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
Plug-and-play devices
Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements?
PostgreSQL
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
Pretexting
Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?
Price comparisons from different vendors
Which of these is not an input device?
Printer
_____ are tools that track the memory usage, status, and errors of currently running software.
Process managers
Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key?
ProductID
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
Program window
Which is the most suitable device to use in a classroom or a conference room to deliver presentations?
Projector
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
Protocol
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?
Publish a web server
Alejandro has a computer with a powerful processor on which he plays a game where he controls the characters' movements. The game produces at least 1 billion bits of information at 60 frames per second for display. Which of the following kinds of gaming is this an example of?
Real-time animation
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?
Receiving clerk
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?
Reinforcement learning
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?
Remove the battery and throw it in the trash.
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
Repetitive strain injury
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?
Reset the old phone to factory settings.
In the email communication process, what is the role of the email server?
Routing email messages through the Internet or a private network
Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage?
SQL
What programming language supports relational databases?
SQL
Which commonly used programming language is used to manage, access, and search for database content?
SQL
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?
SaaS
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive.
How can you get the attention of a personal assistant app on your phone?
Say the wake word
What technology is being used when you are sent an email saying you can track your package?
Scan code
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?
Screen reader
Your Uber driver just showed up to pick you up and when you open the car door, you notice that the human is in the passenger seat and no one is sitting in the driver's seat. You realize this is a self-driving car. You are pretty excited to experience this new technology, but also have reservations. Based on what you have researched, which of the following might be one of your reservations?
Self-driving cars contribute to accidents caused by distracted driving.
You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?
Share the post on your news feed.
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
A growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
Site license
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
Slide master
Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result?
Smallest to largest
Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. Besides Internet connectivity, what does she need to watch the shows on a TV?
Smart TV or a TV stick
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
Smart plug
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
_____ is the process of creating programs and apps from the idea stage to distribution to users.
Software development
Which of the following is NOT an e-commerce transaction?
Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.
What performance specification does 2 GHz refer to?
Speed at which the processor executes instructions
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?
Spiders
Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose?
Spreadsheet
You need a(n) _____ to play an MP3 audio file on a desktop or laptop computer.
Stand-alone player
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
Standards
Which of the following is not a general guideline for developers?
Start programming before creating a proposal.
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?
Support and security phase
Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.
Switch to a standing desk. Take frequent breaks.
What do you call the rules each programming language has for writing instructions?
Syntax
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
Tablet
River often feels anxious during class when he can't check his phone for new text messages or emails. This problem is an example of _______________.
Technology addiction
Sofie has strong people skills, listens well, and communicates effectively. Which technology career may be a good fit for her?
Technology sales
What is a digital certificate?
Technology used to verify a user's identity
You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____.
The HTML coding
_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
The Internet of Things
Kay is researching the health benefits of avocados. She finds an article on the website tracyshealthproducts.com. Which of the following can assure Kay that the content is credible?
The article's author has been a nutritionist for the last three years.
Which of the following factors might indicate that content on the Internet is reliable?
The author cites resources from respected authorities.
Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?
The author uses emotional language to express a single point of view.
Daniella mailed a package to her brother three days ago. She wants to see if it has arrived yet. What technology will enable her to track her package?
The code on the package that is scanned at each leg of the journey.
You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, including the kernel. Your friend starts to laugh because she was not aware that there were kernels in her computer. What do you tell her?
The kernel is the core of an operating system that manages memory, runs programs, and assigns resources.
What is uptime?
The measure of a web host's reliability
Which of the following is NOT true about mobile health?
The need for visits to the doctor's office is increased.
Which of the following is a step in the boot process?
The operating system files are loaded into RAM.
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
Susan is reading through a collection of webpages that contains information about a software firm. The firm manages the information on these webpages. What is Susan most likely browsing?
The website of the software firm
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
How do advertisers use data to know which products would most likely appeal to you?
They track your Facebook and Instagram posts and "likes."
How do delivery companies track packages?
They use code-scanning technology.
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?
Through an online service
How might a business use a blog?
To communicate with customers
If HTML is used to specify the content of the webpage, then what do you use CSS for?
To define the page layout
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
To resolve major computer issues, computer professionals often suggest restoring the operating system. Which of the following should happen before this step?
Transfer contents to an external storage device.
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
Transitions
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
A CPU converts the data entered through the keyboard into output displayed on the monitor.
True
A class is a type of object that defines the format of the object and the actions it can perform.
True
A database backup can include information on who made what changes and when since the previous database backup.
True
A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.
True
A digital video that uses the MPEG-4 codec is often used by online streaming services.
True
A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.
True
Action camcorders can be used to shoot sailing, surfing, or extreme sports irrespective of the weather conditions and water splash possibility.
True
After designing a website, you transfer the website files from your local computer to a remote web server.
True
An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from home.
True
Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load.
True
Before you name your website, you need to search for other sites using that name and then purchase a domain name.
True
E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.
True
Each slide in a presentation has a layout that includes placeholders for certain types of content.
True
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.
True
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
True
If you add a slideshow to play as your desktop theme, you have customized your system software.
True
If you upload photos to a NAS device, everyone on the network can access them.
True
It is advised to fully charge the battery of a laptop before using it for the first time.
True
Local applications can be accessed only on the computers on which they are installed.
True
Many chatbot services provide support to employees and management rather than to customers.
True
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.
True
Most video editing software shows the video as a timeline with separate tracks for video and sound.
True
New cars use embedded computers to make driving safer.
True
Online classified ads are an example of C2C e-commerce.
True
Output methods include speakers, headphones, and interactive whiteboards.
True
Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.
True
Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.
True
The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.
True
When you create an app, you are protected under copyright laws, even before you apply for a copyright.
True
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
True
Wolfram Alpha is an example of a search tool that can help you solve factual questions to help complete your homework.
True
A specialty search engine lets you search online information sources that general search engines do not always access.
True (google scholar)
One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task?
UPDATE
Alicia often shows short, engaging videos to her fifth-grade science students. She has more success using RhythmOne instead of Google to find appropriate videos. Which of the following most likely explains why?
Unlike Google, RhythmOne uses speech recognition to match the audio part of the video with the search term.
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
How is streaming a video different from downloading it?
Unlike streamed content, downloaded content is stored on the computer.
What should you do if a headset plugged into your computer is not working properly?
Update the device driver.
Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course?
Use a learning management system (LMS) to put lectures and tests online.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
How do you create an email message?
Use an app or software to compose and send information.
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
Use animations
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?
Use the web directories created by health research institutions.
Sammy created a new logo for his client to use on the company website and office stationery. However, the logo became a blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this problem in the future?
Use vector images because they retain their clarity even when enlarged or shrunk.
What should you avoid doing when creating your online profile for potential employers?
Using humor or informal names.
Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.
Using your photos and posts to form impressions about your character
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
What characteristic of Big Data indicates how closely that data matches reality?
Veracity
Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?
Verify the content with an authoritative source.
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
Video conferencing application
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
Visual Basic
In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?
Voice over Internet Protocol (VoIP)
What device do e-learning applications usually use to help users with visual impairment read digital content?
Voice synthesizer
Which of the following audio formats does not use any compression technique?
WAV
Edward is a composer and needs to listen to the most accurate music files to create his compositions. What audio file type should he use to record his music?
WMA
Which of the following is NOT a leading provider of PaaS and IaaS services?
Walmart
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?
Web conferences
Which of the following is classified as input device?
Webcam
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?
What-if analysis
When should a user consider restoring the operating system?
When programs or apps do not start properly
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?
Wikis can be heavily biased.
Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.
Will allow user interaction
What type of network sends signals through airwaves and usually does not require cables?
Wireless network
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
With responsive design
Andy is writing an article and wants to verify a few facts. Which of the following websites is designed to provide answers to factual questions?
Wolfram Alpha
Which of the following is a popular, user friendly CMS often used as a blogging platform?
WordPress
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?
Yes; it is a business transaction on a consumer-to-consumer website.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser.
Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work?
Zoho writer
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
a crash
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.
a hoax
An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.
a project
A business can use a wiki in the following ways EXCEPT _____.
aggregating content
Which of the following websites most likely uses XML-formatted data?
an ecommerce site that lets you compare products from different vendors
A series of images displayed in sequence to create the illusion of movement is called ______________ .
animation
A movie animates the credits and the title as 3-D text sinking in the ocean. Which of the following types of software was most likely used to achieve this effect?
animation software such as After Effects
Darren is hoping to get search results that begin with the words "art history." Which of the following search terms will help him?
art history*
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
Which of the following tools translates the source code of a procedural program into binary code?
compiler
You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?
computer-aided manufacturing
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
_____ are standard settings that control how the screen is set up and how a document looks when you first start typing.
default settings
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.
digital citizenship
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.
digital inclusion
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
If you have a file that has billions of bytes of data, then it would be measured in _____.
gigabytes
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
Which data type would be best suited to a field that lists customer email addresses?
hyperlink
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
Folder names should _____.
identify the content and purpose of the folder
Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?
in RAM
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
incomplete documentation
Social networking includes the following positive effects EXCEPT _________.
increasing your privacy
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
Students who complete an online test are not allowed to change their test grades. What aspect of the CIA triad is at work here?
integrity
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.
intellectual property rights
Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?
internal hardware problem
If a website is designed with responsive design concepts, then _____.
it appears correctly on any device regardless of screen size
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?
list of posts with the most recent ones at the top
A scooter manufacturer wants to increase brand awareness on its website. What type of graphic should the company include on every webpage?
logo
Which of the following operating systems includes a virtual assistant?
macOS
Which of the following features is a way to make a computer do what you want it to do?
menu
Ernesto is interested in playing augmented reality games. Which of the following devices should he use for game play?
mobile device
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
native app
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
Peter used a digital camera to take photos while hiking in Yellowstone National Park, but many photos turned out blurry. What software can he use to improve the quality of the photos?
photo-editing software such as Photoshop
Resolution of bitmap graphics is typically measured in ___________.
pixels
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
In which category of software do Microsoft Office Word and Excel belong?
productivity
Which of the following is typical content for a podcast?
radio shows
What is the most common type of volatile memory?
random access memory (RAM)
What type of software accepts text as input and produces speech as output?
read aloud software
Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?
relative refernce
Which of the following properties affects the quality of digital images?
resolution
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
restorers
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
Harry wants to buy a secondhand red skateboard online. Which of the following should he use as search keywords so the results include exactly what he wants?
secondhand "red skateboard"
On what type of network can you rent things such as cars, tools, and rooms?
sharing economy network
The set of activities performed to build a program is called the _____.
software development life cycle (SDLC)
Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does Danielle need to record the audio?
sound recorder software
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?
sparklines
Which of the following terms refers to the area of the hard drive used for virtual memory?
swap file
Contact information for all the people taking a class at a school are stored in a ________ called Students.
table
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?
tester
When a CPU executes instructions as it converts input into output, it does so with _____.
the control unit and the arithmetic logic unit
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.
the digital divide
When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.
the fair use doctrine
Why would you want to connect your computer to a network?
to access shared resources
Why do companies use online collaborative productivity software?
to allow employees to share, edit, and comment on documents
A file manager is used for all of the following except ____.
to change the contents of files
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
What is the goal of a DevOps methodology?
to produce programs quickly and then offer continuous updates
Where can you pin frequently used apps for easy access?
to the taskbar
What type of security requires something you know and something you have that no one else has?
two factor authentication
How can you check data on devices connected through an IoT network?
use a tablet
A(n) _____ protects your device against unauthorized access.
user account
Which option lists the computer components in order from oldest to newest?
vacuum tubes, transistors, integrated circuits, microprocessors, personal computers
What facilitates bundling of video, audio, codec, and subtitles into a single package?
video container
A business would use a website analytics tool for all of the following EXCEPT _____.
viewing why someone visited your webpage
A video that is shared millions of times over social media in a short period of time is termed to be ____________ .
viral
A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.
webpage
What can a company learn by studying website analytics for its website?
when it needs to increase its bandwidth
At what point are you responsible for following the terms in a software license agreement?
when you click or take another action to accept the terms
When does the boot process start?
when you turn on your computer
One way to create a solid 3-D image for 3-D animation is to apply highlights and shadows to a _____.
wireframe drawing
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
word processor
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?
wordsmithing.com
Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use? (professional)
www.weareone.org