CIS105 Final Review
Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?
"The quick brown fox"
If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen?
'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.
Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making?
3-D animation
How does a wireless network key work with an encrypted wireless network?
:The sending and receiving devices must know the wireless network key to communicate.
Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.
:will allow user interaction
To insert a heading for a main topic on a webpage, which of the following tags should you use?
<h1> </h1>
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A Trojan
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
A desktop computer
Which of the following is NOT likely to be found on a webpage?
A formatting toolbar
Which of the following would most likely be a static website?
A historical facts page
The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?
A learning management system
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?
A photo of you horseback riding on the beach with friends.
Jodi is travelling to San Francisco for a conference. She has stored her PowerPoint slides on Microsoft's web app. What could be of concern to her while presenting her slides?
A poor internet connection
A modem can also function as what other piece of hardware?
A router
Google is an example of which type of website?
A search site
JavaScript likely controls which of the following elements on a webpage?
A slide show
Which type of website would allow Evan, an avid traveler, to share photos and videos with his friends?
A social networking website
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
What is an ISP?
A telecommunications company that sells Internet access.
What is a MAC address?
A unique hardware address for your device
What would you need to install if you have an app that is incompatible with your current operating system?
A virtual machine
Which of the following describes a domain registrar?
A website where you can go to purchase a name for your website.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
Acceptable use policy (AUP)
How would you design a webinar that would be interactive?
Add a poll
What is the primary difference between HTML 5 and Adobe Flash types of web animations?
Adobe Flash requires you to use a plug-in but HTML 5 does not.
How can an attacker execute malware through a script?
An attacker can attach a script to a program that you download which then infects your computer.
How do you know if a device is an input device or an output device?
An input device enters data and instructions into the memory of the device. An output device is how the processed information is displayed.
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device
An uninstaller removes the program files and any associated entries in the system files.
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
Aseries of images displayed in sequence to create the illusion of movement is called ______________ .
Animation
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
Antispyware
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
Which company was the first to develop a computer meant for personal use?
Apple
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?
Artificial intelligence (AI)
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
B2B
You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?
BCC your supervisor in your response
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?
Bluetooth connection
How are the ways AI learns similar to how you learn?
Both use past experiences to predict likely outcomes and responses.
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
Broad network access
What determines the speed at which data travels?
Bus width
Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce website will Blackbaud have?
Business-to-business
What can you do to make sure you are not contributing to software piracy?
Buy software only from legitimate resellers or directly from the manufacturer.
What do engineers use to create highly detailed and technically accurate drawings?
CAD software
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.
CRM
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?
CSS
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?
Captioning software can be used to transcribe what is being said.
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?
Change font size, style, and color of the keywords.
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?
Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.
In a web app, where is data usually stored?
Cloud storage
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?
Cloud storage
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?
Conditional formatting
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?
Create a database of company projects, customers and vendors.
What would a password manager allow you to do?
Create and store multiple strong passwords.
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?
Create trendlines
Who enforces PCI compliance for merchants who accept credit card payments from customers?
Credit card companies
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer service representative
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
What does XML use to describe data?
Customized tags
Which of the following problematic behaviors relies on the use of digital technology?
Cyberbullying
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?
Data analytics
Which of the following is NOT a factor search engines consider when ranking search results?
Design quality of the webpage
Which of the following devices is the easiest to upgrade, such as by adding RAM?
Desktop computers
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?
Digital rights management (DRM)
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
Drop box
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
Kyle likes to keep in touch with his friends and family using the Internet. He enjoys sharing pictures, music, and ideas. He also enjoys playing games with others online. Which of the following online platforms should he use to do all of this?
Facebook, because apart from being a regular social networking website, it also allows game play
Which of the following is a web app?
Google Docs
Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?
HIPAA
Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?
HTML
Which of these hardware components can you use to store videos?
Hard drive
Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?
He is using technology to have students work cooperatively in groups and create a presentation.
Brendon wants to volunteer at the Red Cross, a nonprofit agency. He enters redcross.com in his browser, but cannot find the right website. What mistake is he making?
He should enter redcross.org because Red Cross is a nonprofit organization.
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?
He should make sure to bring a tablet.
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?
Header and Footer
Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer?
Her coffeemaker that she has set to turn on and make coffee every morning at the same time.
Which of the following is NOT a feature of an Integrated Development Environment (IDE)?
Hosts webpages
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
IaaS
In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.
Information Technology
Juan is interested in getting a job in the technology field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?
Information security
Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?
Information that will help obtain best value for money spent
_____ is data and instructions entered into the memory of a device.
Input
What is the recommended solution if a computer performs slowly?
Install addition
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
Installation
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.
Intellectual property
Where on a computer is the operating system generally stored?
Internal hard drive
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Why is it important to be able to export data in an XML format?
It allows data to be shared between applications.
What is one advantage of a company using an anonymous messaging app?
It allows for honest feedback without disclosing identities.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
What happens when you delete a folder?
It goes the Recycle Bin or Trash folder.
Why is the date a file was modified useful?
It identifies the most recent version.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?
It places the document in a buffer.
Which of the following is true about XML?
It provides a way to classify data and share it between applications.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have?
It should have responsive design so that it is easy to use on mobile devices.
Why is an FTP client helpful?
It uploads files from your computer to a web server.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
JPEG
Which of the following is an example of an object-oriented programming language?
Java
What is a popular language for writing scripts that run in your browser to control a webpage's behavior?
JavaScript
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client?
Laptop
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
Which of the following would be considered a professional networking website?
Which of the following storage locations does NOT give you access to your files over the Internet by default?
Local hard drive
Logan is considering web app development as a career option. Which of the following languages does he not need to master?
Logo
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?
M-commerce app
Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device?
MIDI technology
Which of the following is NOT an image format to store photos?
MP3
Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?
Machine learning (ML)
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?
Make the program available as a web app.
Which of the following statements is true about public networks?
Many public networks are not secure.
To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.
Meeting invites
What defines the behavior of an object in object-oriented programming ?
Method
What are "hits" that search engines list on the first page?
Most relevant results
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
Native app
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP)
What rules should guide your behavior when you interact with friends and coworkers on social media?
Netiquette
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
If you delete a shortcut from your desktop, have you also deleted the original file?
No, because a shortcut does not place the actual file, folder, or app on the desktop.
For _____, the original media file is stored on the media distributor's server, so you can watch the content more than once.
On-demand content
How can you display the main folders on a Windows computer
Open File Manager
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?
People with color blindness
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
Piracy
At the beginning of the school year, each classroom was given one box of copy paper to make all their copies for the year. How do you think the teachers will be able to make that one box last all year long?
Place as many documents as possible online, reducing the need for paper printouts.
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
Plotter
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
Plug-and-play devices
Which of these is not an input device?
Printer
In which category of software do Microsoft Office Word and Excel belong?
Productivity
Alfred is applying for his first full-time job after finishing his college degree. Which of the following activities during his school years has left a negative digital footprint for his potential employers to find?
Profanity on social media posts
Which is the most suitable device to use in a classroom or a conference room to deliver presentations? (
Projector
Which of the following is an example of green computing?
Purchase and use products with an ENERGY STAR label.
Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatica adjustment?
Rapid elasticity
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?
Reinforcement learning
Which learning model allows an AI system to develop its own strategies for solving problems or completing tasks?
Reinforcement learning
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
Repetitive strain injury
What types of activities are ideal for a robot to perform?
Repetitive tasks
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?
Reset the old phone to factory settings.
Which of the following is the science that combines technology and engineering?
Robotics
What hardware is essential to creating a home Wi-Fi network?
Router
In the email communication process, what is the role of the email server?
Routing email messages through the Internet or a private network
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?
SaaS
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive.
If you want to share a document for others to view and edit, which of the following should you do?
Save the document to OneDrive.
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?
Screen reader
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?
Service pack
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
She should check whether the URL of the website starts with "http" or "https."
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
Site license
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first?
Slide master
Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. Besides Internet connectivity, what does she need to watch the shows on a TV?
Smart TV or a TV stick
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
Smart plug
In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?
Social curation sites
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
_____ is the process of creating programs and apps from the idea stage to distribution to users.
Software development
Which of the following is NOT an e-commerce transaction?
Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.
What technology can be used by people with a hearing disability to listen to a narration?
Speech recognition
What performance specification does 2 GHz refer to?
Speed at which the processor executes instructions
Which of the following behaviors most likely causes eye strain?
Spending too much time looking at devices
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?
Spiders
Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.
Switch to a standing desk. , Take frequent breaks.
Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What technology does the smartphone use to make the assistant respond to Edwin?
Synthesized speech
What is a digital certificate?
Technology used to verify a user's identity
_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.
The Internet of Things
Which of the following factors might indicate that content on the Internet is reliable?
The author cites resources from respected authorities.
____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
The digital divide
What is uptime?
The measure of a web host's reliability
Which of the following is a step in the email communication process?
The message travels along Internet routers to the recipient.
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? (
The network connection is probably not secure.
Which of the statements about B2B e-commerce is correct?
The transactions involve review by a team of people before making a purchase decision.
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
How do delivery companies track packages?
They use code-scanning technology.
If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?
Through an online service
How might a business use a blog?
To communicate with customers
If HTML is used to specify the content of the webpage, then what do you use CSS for?
To define the page layout
Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?
To give you finer control over the content
What is the most common type of storage device for transferring files from one computer to another?
USB flash driv
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
What should you do if a headset plugged into your computer is not working properly?
Update the device driver.
_____ are new releases of an app and may require an additional fee before you can install them.
Upgrades
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How can you check data on devices connected through an IoT network?
Use a tablet
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
How do you create an email message?
Use an app or software to compose and send information.
Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
Use his webcam and speakers so that he and his mother can both see and hear each other.
Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?
Use sleep modes and other power management features for computers and devices.
What should you avoid doing when creating your online profile for potential employers?
Using humor or informal names.
Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.
Using your photos and posts to form impressions about your character
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
Video conferencing application
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
Virtual reality (VR)
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?
Visit the manufacturer's website and install the latest updates for the app.
In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?
Voice over Internet Protocol (VoIP)
Which of the following audio formats does not use any compression technique?
WAV
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online?
Web apps
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?
Web conferences
Which of these e-commerce job roles could most likely be performed remotely from home or even from another country?
Web developer
Which of the following is classified as input device?
Webcam
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?
Wikis can be heavily biased.
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
With responsive design
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?
Word processor
Which of the following is a popular, user friendly CMS often used as a blogging platform?
WordPress
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?
Yes; it is a business transaction on a consumer-to-consumer website
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer.
Which of the following is an advantage to saving a file to a flash drive?
You can take it with you and then work on it on another computer.
During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name?
You'll access this service over the Internet.
How would you describe the social networking site YouTube?
YouTube is amedia-sharing network thatlets users display and view videos and then post comments.
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
a crash
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.
a hoax
What is the binary system?
a number system with two digits, 0 and 1
An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.
a project
On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.
active window
Which of the following is an example of an embedded computer?
adaptive cruise control system
A business can use a wiki in the following ways EXCEPT _____.
aggregating content
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the video tag?
autoplay
Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?
banner
Which type of graphics assigns a color to each pixel in an image?
bitmap graphics
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.
catfishing
You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?
computer-aided manufacturing
What does a B2C website use to track the items you select on the website?
cookies
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report?
database
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.
digital citizenship
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.
digital detox
A child who grows up without regular access to computers and the Internet will be at a disadvantage later due to the ___________.
digital divide
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.
digital footprint
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.
digital inclusion
Which of the following can you run to find and remove unnecessary files?
disk cleanup utility
Conducting a staff meeting online so employees from around the globe can join the discussion is an example of _____________.
e-business
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
freeware
What does an operating system provide so you can interact with a device?
graphical user interface
Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover?
graphics app
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
Which of the following is not an input device?
headphone
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?
how visitors are using the site
A(n) _____ is a small picture that represents a program, file, or hardware device.
icon
Folder names should _____.
identify the content and purpose of the folder
Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?
in RAM
Social networking includes the following positive effects EXCEPT _________.
increasing your privacy
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.
intellectual property rights
If a website is designed with responsive design concepts, then _____.
it appears correctly on any device regardless of screen size
The quality of an audio file is determined by _____.
its bit rate
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?
license filter
Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?
list of posts with the most recent ones at the top
A scooter manufacturer wants to increase brand awareness on its website. What type of graphic should the company include on every webpage?
logo
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
To access the Internet, a router must be connected to a _____.
modem
Which of the following top-level domains is generally used by Internet service providers?
net
Which of the following does a software license usually specify?
number of people authorized to use the software
What type of program would have a class named Student with objects called fullTime and partTime?
object-oriented program
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?
open source
Swapping items between memory and storage is called _____.
paging
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
Resolution of bitmap graphics is typically measured in ___________.
pixels
An operating system is also called a(n) _____.
platform
When considering a computer to purchase, which of the following factors involves the operating system of the computer?
platform
Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?
portable app
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app?
program window
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
Which of the following is typical content for a podcast?
radio shows
What is the most common type of volatile memory?
random access memory (RAM)
What type of software accepts text as input and produces speech as output?
read aloud software
Which type of memory is permanently installed on your computer and attached to the motherboard?
read-only memory (ROM)
Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?
relative reference
When you create a wireframe drawing and then apply highlights and shadows to it, the process is called _____.
rendering
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Which of the following properties affects the quality of digital images?
resolution
A process called _____ converts analog sound waves into digital sound.
sampling
What two factors determine the quality of digital audio?
sampling rate and bit rate
Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate?
scanner
Which of the following technologies assists users that have a visual disability?
screen readers
On what type of network can you rent things such as cars, tools, and rooms?
sharing economy network
Which of the following types of websites typically provides the least security?
social media sites
The set of activities performed to build a program is called the _____.
software development life cycle (SDLC)
What type of hard drive has no moving parts, making it fast and durable?
solid state drive
Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does Danielle need to record the audio?
sound recorder software
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standards
A _____ is a named collection of formats you apply to text in a word processing document.
style
What do you call the rules each programming language has for writing instructions? (530536)
syntax
River often feels anxious during class when he can't check his phone for new text messages or emails. This problem is an example of ______.
technology addiction
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.
the digital divide
When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.
the fair use doctrine
What does a file format refer to?
the organization and layout of data in the file
Cloud storage refers to the storage of data on ______.
the web app's server
Why do companies use online collaborative productivity software?
to allow employees to share, edit, and comment on documents
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
Where can you pin frequently used apps for easy access?
to the taskbar
Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?
transitions
What type of security requires something you know and something you have that no one else has
two factor authentication
Which of the following is assigned to each webpage to identify its location on the Internet?
uniform resource locator
A video that is shared millions of times over social media in a short period of time is termed to be ____________ .
viral
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality (VR)
A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links
webpage
What can a company learn by studying website analytics for its website?
when it needs to increase its bandwidth
When does the boot process start?
when you turn on your computer
One way to create a solid 3-D image for 3-D animation is to apply highlights and shadows to a _____.
wireframe drawing