ITE Exam 2 Modules 6,8,9, and 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Ruby and SQL are examples of what type of language?

4GL

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

Which of these tags is not specified in the <body> section of a webpage?

<title>

A modem can also function as what other piece of hardware?

A router

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

Agile development

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

Antispyware

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Code to modify the background color of text or a webpage probably is an example of ________.

CSS

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

In OOP, a(n) ______ defines the format of an object and the actions the object can perform.

Class

File transfer programs belong in what software category?

Communications

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Which of the following is not a safety precaution for securing a wireless network?

Disable WPA2.

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

_____ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."

Encryption

When you upload webpage files from your computer to a web server, you should use a(n) ________.

FTP client

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.

False

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.

False

Encryption converts unrecognizable data into recognizable data.

False

HTML has remained the same ever since it was developed, which is why there is only one version.

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

On a desktop or laptop computer, you should uninstall a program or app by using your system's file management program to delete the folder containing the program's files.

False

Programs only are considered restricted by copyright laws if the author has applied for legal protections.

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

False

The waterfall method is an example of agile development.

False Its part of the Predictive Development

Which government agency is responsible for releasing the rules surrounding Internet access?

Federal Communications Commission (FCC)

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

Which of the following types of software creates a personal security zone around your computer or device?

Firewall

______ refers to a program that is copyrighted and provided at no cost, but the developer retains all rights to the product.

Freeware

Code to specify webpage elements such as paragraphs, lists, links, audio or video files, is an example of ________.

HTML

Which of the following is not a web browser setting for managing cookies?

Have all cookies automatically expire after 45 days.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Why is it important to be able to export data in an XML format?

It allows data to be shared between applications.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Why would you include a banner on your website?

It makes the website more easily identifiable to visitor

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Which of the following is an example of an object-oriented programming language?

Java

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

JavaScript

When you can click a button on a website to run code to change the font size, the code that changes the font size dynamically probably is an example of ________.

JavaScript

When describing a client/server network, which of the following would be considered a client?

Laptop

When creating a strong password _____ is the most important element.

Length

Which of the following statements is true about public networks?

Many public networks are not secure.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

Older HTML tags that have been replaced with newer ways to accomplish the same task are called ________.

Older HTML tags that have been replaced with newer ways to accomplish the same task are called ________.

Which of the following is an advisable practice for securing data stored on a network?

Only grant access to data to those with a legitimate need.

A(n) ______ is an upgrade that addresses a single issue.

Patch

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

Project manager

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

Publish to a web server

Which software development method uses highly skilled programmers to shorten the development process while producing quality software?

Rapid Application development model

Which of the following troubleshooting tools would you use if you made an update that seems to have caused issues?

Restorer

_____ are attackers who want to attack computers but lack the knowledge needed to do so.

Script kiddies

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

_____ is the process of creating programs and apps from the idea stage to distribution to users.

Software development

A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.

Spike

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is a digital certificate?

Technology used to verify a user's identity

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

True

A copyright is an originator's exclusive legal right to reproduce, publish, or sell intellectual property.

True

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.

True

A worm is a malicious program that uses a computer network to replicate.

True

After designing a website, you transfer the website files from your local computer to a remote web server.

True

An EULA grants permission for one installation.

True

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load.

True

In order to run a program's source code, it must be translated into machine language.

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.

True

Networks allow computers to share resources, such as hardware, software, data, and information.

True

Preinstalled programs and apps may be included as part of a marketing agreement between the device's manufacturer and a software development company.

True

The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.

True

Two types of firewalls include hardware firewalls and software firewalls.

True

UX refers to the focus on the user's reaction and interaction to a product, including its efficiency, effectiveness, and ease of use.

True

Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.

True

You have the right to see your credit information.

True

_____ are new releases of an app and may require an additional fee before you can install them.

Upgrades

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

Visit the manufacturer's website and install the latest updates for the app.

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer.

In which of the following situations is a digital certificate useful?

You are signing a rental lease.

Which of these statements is true about XML?

You can export data from a database into XML to share with other applications

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

a crash

Which of these is most likely an example of a static website?

a website for learning about a local barbershop's hours and services

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

a. Querying unfamiliar purchases found on your bank statements. b. Being cautious about what information you post on social networking sites. c. Shredding financial documents before you discard them. d. Storing financial information in an unsent email message. (D)

Which of the following is not a common network topology?

a. bus network b. star network c. mesh network d. client/server network (D)

Which of these is a use for JavaScript on a webpage?

a. displaying an image as the background of a webpage b. displaying a slideshow of images c. creating a hyperlink d. centering text on a page (B)

Technology can lead to all of the following behavioral risks EXCEPT

a. social withdrawal b. a sedentary lifestyle c. higher satisfaction with life d. depression and anxiety (C)

If your webpage contains a link to an external website and its web address changes, ________.

a. the link on your website will no longer work

Which of the following websites most likely uses XML-formatted data?

an ecommerce site that lets you compare products from different vendors

During which phase of the SDLC does the feasibility study take place?

analysis

CSS lets you change the of ________ a website.

appearance

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?

autoplay

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

banner

Which of these should you NOT do when including a video from YouTube on your website?

c. use the <video> tag to access the video in your webpage's HTML file

Which of the following tools translates the source code of a procedural program into binary code?

compiler

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Which of the following describes a normal-looking, yet fraudulent Wi-Fi network?

evil twin

Adware tracks and transmits personal information from your computer or device without your knowledge.

false

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?

how visitors are using the site

Which of the following is a private network used by organizations to communicate internally?

intranet

Each of the following is a factor that causes repetitive strain injury (RSI) except _____.

lack of restful sleep

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

To access the Internet, a router must be connected to a _____.

modem

Which of these usually is NOT collected by a website analytics tool?

names of website visitors

Which of the following does a software license usually specify?

number of people authorized to use the software

What type of program would have a class named Student with objects called fullTime and partTime?

object-oriented program

When coding a hyperlink to a webpage that is external to your website, an accepted behavior is to ________.

open the page in a new browser tab

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?

relative reference

A web host's uptime is a measure of ________.

reliability, so visitors can access your site without concerns that the web server is unavailable

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

When coding an image, HTML 5 requires you to ________.

specify descriptive alternative information using the alt attribute

What do you call the rules each programming language has for writing instructions?

syntax

When you write HTML code, you use ________ to describe the structure of information on a webpage.

tags

What is the goal of a DevOps methodology?

to produce programs quickly and then offer continuous updates

What type of security requires something you know and something you have that no one else has?

two factor authentication

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

If you want to make a personal website and do not have any coding skills, you should probably use ________.

website builder

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.

will allow user interaction

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com


Ensembles d'études connexes

Intro to Ethics Unit 2: Divine Command, Conventionalism and Egoism

View Set

NSG 330 Ch 34- Management Hematologic Neoplasms

View Set

Micro Econ (dr. Yaber) module 10, 11

View Set

APES Chapter 19: Risk, Toxicology, and Human Health

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

accounting 200- chapter 4 multiple choice

View Set