Intro to computer tech.

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following HTML code samples inserts a hyperlink in a webpage?

:<a href="http://www.google.com">Google</a>

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?

BCC your supervisor in your response

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

_____ are tools that track the memory usage, status, and errors of currently running software.

Software development

Which of the following is a step in the email communication process?

The message travels along Internet routers to the recipient.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.

Using your photos and posts to form impressions about your character

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?

Voice over Internet Protocol (VoIP)

Which of the following is a popular, user friendly CMS often used as a blogging platform?

WordPress

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

a crash

What type of security requires something you know and something you have that no one else has?

two factor authentication

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

JavaScript

Which of the following network standards applies to cellular networks?

LTE

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.

Meeting invites

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

banner

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

Why would you want to connect your computer to a network?

to access shared resources

Why is an FTP client helpful?

It uploads files from your computer to a web server.

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

list of posts with the most recent ones at the top

Posting hostile or insulting comments in response to someone else's blog post is called _____.

flaming

In which category of software do Microsoft Office Word and Excel belong?

Productivity

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

Project manager

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?

Share the post on your news feed.

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?

Social curation sites

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

Support and security phase

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?

Web conferences

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

extranet

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

Social networking includes the following positive effects EXCEPT _________.

increasing your privacy

If a website is designed with responsive design concepts, then _____.

it appears correctly on any device regardless of screen size

When describing a client/server network, which of the following would be considered a client?

laptop

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

Devices on a _____ area network are connected via Bluetooth.

personal

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

On what type of network can you rent things such as cars, tools, and rooms?

sharing economy network

The set of activities performed to build a program is called the _____.

software development life cycle (SDLC)

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wire frames

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public domain software

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?

HTML 5 validator

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.

Installation

How would you design a webinar that would be interactive?

Add a poll

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

Why is it important to be able to export data in an XML format?

It allows data to be shared between applications.

Which software development method uses highly skilled programmers to shorten the development process while producing quality software?

Rapid Application development model

In which of the following situations is a digital certificate useful?

You are signing a rental lease.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

What is a MAC address?

A unique hardware address for your device

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files and any associated entries in the system files.

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

Businesses use webinars for the following reasons EXCEPT _____.

Group discussions

Which of the following is the strongest password?

H@veAGr3atDaY!

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?

HTML

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?

Through an online service

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

To give you finer control over the content

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

What area of software development focuses on the user's reaction to and interaction with the software product?

User experience

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying


Ensembles d'études connexes