Computer concepts final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What technology can a call center technician use to find information about a product a customer is interested in purchasing? a. RPA b. Data analytics c. IoT d. Chatbot

a. RPA

Which of the following is NOT a consequence of Moore's Law? a. The same computer configuration will get cheaper over time. b. Transistors will get smaller over time. c. Transistors will become twice as energy-efficient every 18 month d. Computers will get physically smaller and faster over time.

a. The same computer configuration will get cheaper over time.

What technologies can be used to connect an IoT device to a local network? Choose two. a. Wi-Fi b. IrDA c. Bluetooth d. Smart plug

a. Wi-Fi and c. Bluetooth

Your manager asks you to add information about a new limited-time product to your organization's site. Which content type should you use for this information? a. a new post b. a new page c. a new media element d. a new site, since it is temporary

a. a new post

What is the binary number system? a. a number system based on two numbers, 0 and 1 b. a number system based on ten numbers, 0-9 c. a computer coding system d. the way we work numbers in two step operations

a. a number system based on two numbers, 0 and 1

How are you able to set up and manipulate WordPress without needing an internet connection, and without the site being live on the Internet? a. install the application on your computer b. use the wordpress.com site c. use the wordpress.org site d. install the application and use shared hosting

a. install the application on your computer

When creating a strong password is the most important element? a. length b. complexity c. repetitiveness d. ability to memorize

a. length

Which of these is not a peripheral, in computer terms? a. motherboard b. keyboard c. mouse d. monitor

a. motherboard

A ______ is a collaborative website where users can publish and modify content on a webpage. a. wiki b. wireframe c. blog d. chat room

a. wiki

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. a. 4, 5, 2, 3, 1 b. 5, 4, 2, 3, 1 c. 4, 2, 5, 3, 1 d. 5, 4, 3, 2, 1

b. 5, 4, 2, 3, 1

Encrypted data is called _____________. a. Plaintext b. Ciphertext c. Maskedtext d. Pseudotext

b. Ciphertext

is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key." a. Decryption b. Encryption c. Digital signing d. Certification

b. Encryption

What AI technology does a computer use to get better at playing chess? a. NLP b. ML c. Chatbot d. IoT

b. ML

What type of app runs in a browser? a. Mobile app b. Web app c. Desktop app d. Portal app

b. Web app

What is the difference between WordPress and WordPress.com? a. WordPress is the software you buy from WordPress.com b. WordPress is the free open source application. WordPress.com is a Software as a Service (SaaS) offering of WordPress. c. WordPress and WordPress.com are the same thing. d. WordPress is the software built by WordPress.com.

b. WordPress is the free open source application. WordPress.com is a Software as a Service (SaaS) offering of WordPress.

WordPress was long considered a blogging platform. Is this still true? a. No, WordPress is a Content Management System. b. Yes, WordPress is a blogging platform, but it is also a Content Management System (CMS). c. Yes, WordPress is a blogging platform. d. No, WordPress is a Software as a Service (SaaS) application.

b. Yes, WordPress is a blogging platform, but it is also a Content Management System (CMS).

Mobile games were the first to popularize _______, which uses an image of an actual place or thing and adds digital information to it. a. virtual reality (VR) b. augmented reality (AR) c. mixed reality (MR) d. computer-aided design (CAD)

b. augmented reality (AR)

Which of the following storage devices requires an Internet connection? a. internal hard drive b. cloud storage c. solid state drive d. flash memory

b. cloud storage

GUI stands for _____________ user interface. a. Google b. graphical c. government d. general

b. graphical

Where does WordPress store its data? a. In a json table b. in a database c. on WordPress.com d. in files on a server

b. in a database

Technology that helps companies change business by allowing them to use new digital methods is called: a. data processing b. information technology c. information systems d. virtualization

b. information technology

Which of the following units measure millions of bytes of data? a. kilobytes b. megabytes c. gigabytes d. terabytes

b. megabytes

Each webpage is assigned a(n)___ , an address that identifies the location of the page on the Internet. a. Internet Protocol (IP) b. uniform resource locator (URL) c. top-level domain (TLD) d. Hypertext Transfer Protocol (HTTP)

b. uniform resource locator (URL)

The real meaning behind Moore's law often gets confused and is sometimes overlooked. What did the law originally state about microprocessors? a. Every two years the overall performance would increase b. Every two years the clock speeds would double c. Every two years the number of transistors would double d. Every two years the voltage needed would decrease

c. Every two years the number of transistors would double

With _________ technology, for successful communications, the devices either touch or are within an inch or two of each other. a. Wi-Fi b. RFID c. NFC d. DBMS

c. NFC

Do you need any special software to publish content with WordPress? a. Yes, you need to install a web server on your computer. b. Only if you want to publish images. c. No, WordPress is self-contained. All you need is a web browser and access to the internet. d. Yes, you need to have WordPress installed on your computer.

c. No, WordPress is self-contained. All you need is a web browser and access to the internet.

One GHz equals ____________ ticks of the system clock per second. a. One hundred thousand b. One million c. One billion d. One trillion

c. One billion

Which of the following is NOT true about RAM? a. Every program and app requires RAM. b. The system can assign virtual memory to function as RAM. c. RAM is nonvolatile memory. d. RAM stores open apps and document data while a computer or device is on.

c. RAM is nonvolatile memory.

The basic premise of ____ is that objects can be tagged, tracked, and monitored through a local network, or across the Internet. a. intelligent workspaces b. the digital divide c. the Internet of Things d. artificial intelligence

c. the Internet of Things

_____________are smart devices that respond to a user's verbal commands by using search technology to provide an answer to a question or perform a task. a. ATMs b. Green computers c. Integrated circuits d. Digital assistants

d. Digital assistants

Your website development team is setting up a new website for your company, and you've decided to host this website in a cloud service. However, in the interest of improving the website's performance, you don't want to have to manage underlying servers. What kind of cloud service will best meet your needs? a. SaaS b. FWaaS c. IaaS d. PaaS

d. PaaS

_______ refers to the clarity or sharpness of an image. a. Compression b. Bit rate c. Tweening d. Resolution

d. Resolution

How can your smartphone's virtual assistant determine if you're giving it a command or if someone else is talking instead? a. You pause before asking your question. b. You use the correct wake word. c. You include details in your request. d. You complete the voice training process.

d. You complete the voice training process.

What happens if you open your web browser and go to the URL of your site with /wp-admin added to the URL? a. You go to the access portal to view access logs for the site. b. You go to the admin page, where you specify roles and permissions for users of the site. d. You go to the admin panel or are prompted to log in to the admin panel.

d. You go to the admin panel or are prompted to log in to the admin panel.

A business-to-consumer (B2C) website tracks the items you place in a shopping cart using . a. an electronic wallet b. the Transport Layer Security (TLS) protocol c. crawlers d. cookies

d. cookies

How is the binary system useful in computers? a. computer code only reads the numbers 0 and 1 b. computers have ten keys c. computers were made to read real numbers d. electronic components have two states - on or off

d. electronic components have two states - on or off

On a webpage, a ____ provides supplemental material such as social networking feeds and ads. a. navigation bar b. header c. footer d. sidebar

d. sidebar

What is the temporary Windows storage area that holds items you copy or cut called? a. the cloud b. the buffer c. the Library d. the Clipboard

d. the Clipboard

An AI system can use ________ learning processes to identify a previously unknown cause of heart disease. a. reinforcement b. supervised c. personalized d. unsupervised

d. unsupervised

How can you control an IoT-connected smart device? a. A game controller b. An associated app c. A transistor d. A connected keyboard and mouse

b. An associated app

Search engines use programs called_______________ to index the web. a. Filters b. Spiders c. Linkers d. Rankers

b. Spiders

The amount of data, instructions, and information that can travel over a communication channel is called the _______________. a. Capacity b. Mashup c. Bandwidth d. Carrier size

c. Bandwidth

How can smartphones without Wi-Fi access connect to the Internet? a. Using near field communication (NFC) b. Using a Bluetooth connection c. Using a cellular network d. Using an Ethernet connection

c. Using a cellular network

Misty is playing with an app on her phone that shows star constellations on her screen as she pans her phone across the sky at night. Which of the following is the most accurate term for this kind of technology? a. Virtual Reality (VR) b. Hologram c. Virtual world d. Augmented Reality (AR)

d. Augmented Reality (AR)

What technology could you use to display an image of a street overlaid with markers indicating restaurant locations? a. Robotics b. Internet of Things (IoT) c. Digital assistant d. Augmented reality (AR)

d. Augmented reality (AR)

Which of the following is not a common type of malware? a. Ransomeware b. Rootkit c. Trojan horse d. Browser cookies

d. Browser cookies

What kind of software do you need to create a blog? a. FTP b. ISP c. VoIP d. CMS

d. CMS

Which of the following is hardware? a. Monitor b. program c. operating system d. Microsoft Office

a. Monitor

Dmitri is trying to choose a URL for his new website selling custom sports products. He wants to use the .net TLD because they are on sale on. Why is this a bad idea? a. The .net TLD is used for Internet administrative organizations. b. The .net TLD is reserved for political or not-for-profit groups. c. The .biz TLD is the only one small businesses are allowed to use. d. The .mobi TLD would ensure the website is optimized for mobile devices.

a. The .net TLD is used for Internet administrative organizations.

After developing your website, tweaking it so it looks exactly the way you want, and testing it to ensure everything works as expected, how can you make it available for other people to access it? a. Upload the website files to a host's web server. b. Reserve a domain name from a registrar. c. Convert the website files to HTML. d. Add a third-party plugin.

a. Upload the website files to a host's web server.

Nira is about to purchase her first house and needs to find a good mortgage company. First, she wants to understand how mortgages work. Which of the following queries will yield the best results for her needs? a. how do mortgages work b. best mortgage company and explanation of process c. mortgages on first homes d. mortgages

a. how do mortgages work

The _______ controls access to the resources on a network. a. Bus b. Client c. Server d. Workstation

b. Client

What technology would a bank's website use to scramble information as it is transmitted over the Internet. a. Digital certificate b. Encryption c. Password d. HTTPS

b. Encryption

Pacific Electronics has a website that sells electronic parts to phone manufacturers. Which type of e-commerce website does Pacific Electronics have? a. Business to consumers (B2C) b. Business to manufacture (B2M) c. Business to business (B2B) d. Supplier to business (S2B)

c. Business to business (B2B)

Which part of a webpage provides a list of links to other parts of the website. a. Logo b. Sidebar c. Navigation Bar d. Body

c. Navigation Bar

Ginny is about to rent a movie online and is trying to decide which resolution will give her the best viewing experience. She plans to watch the video on her laptop, which offers a display resolution of up to 1920 x 1080. Which video resolution should Ginny select? a. HD b. SD c. 4K d. 8K

d. 8K

When you enter a query in a search engine, where does the search engine look to collect its results? a. Websites on the Internet b. Spider or crawler software c. A government-run web server d. A database index

d. A database index

Technology in daily life can increase productivity, convenience, safety, and security. Which of the following uses of technology is most often used to address security concerns? a. A smart car that manages speed b. A navigation app with current traffic information c. A virtual assistant using voice recognition d. A doorbell with a motion-detection camera

d. A doorbell with a motion-detection camera

A _________ is not an example of an output device. a. Printer b. Display c. Firewall d. Speaker

c. Firewall

Alex is writing a research paper and needs to cite academic sources. As he begins searching on Google, he finds he must dig through a lot of results showing blog posts and news articles. Which specialty search engine might better focus his search results? a. Google Finance b. Google News c. Google Scholar d. Google Shopping

c. Google Scholar

Rygel is shopping for t-shirts online for an upcoming school trip. Instead of prices, a "Get a Quote" button appears next to each t-shirt. What type of e-commerce website is he most likely visiting? a. Business to business (B2B) b. Business to consumer (B2C) c. Consumer to Consumer (C2C) d. Consumer to business (C2B)

a. Business to business (B2B)

What can you use as a protective barrier on a network to keep out unauthorized traffic? a. Firewall b. Network attached storage (NAS) c. Encryption d. Biometric devices

a. Firewall

Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet? a. IP address b. Username and password c. Email address d. Network Security Key

a. IP address

What information do you need to decrypt an encrypted message? a. Key b. Password c. Digital certificate d. A code on your smartphone

a. Key

What kind of technology can traffic engineers use to determine the best timing for red light cycles at an intersection of two major highways? a. Machine learning b. Real-time animation c. 3-D CAD software d. Augmented reality

a. Machine learning

Which of the following actions is NOT consistent with green computing standards? a. Printing email receipts b. Watching an online broadcast of an industry conference c. Sending an email d. Donating an old computer to a local school

a. Printing email receipts

Alison has just finished creating her website to display her graphic design artwork. Now she wants to make sure her website will show up in search engine results. What kinds of changes should she consider to accomplish her goal? a. SEO b. Certification c. M2M d. Virus detection

a. SEO

When searching with Google, the results page includes_________ that provides descriptions of or excerpts from the pages. a. Snippets b. Knowledge panels c. Abstracts d. Related searches

a. Snippets

Nancy receives a call from someone claiming to work for the local Sheriff's Department. The caller says Nancy hasn't paid her speeding ticket, and she's about to be arrested unless she pays the fine with a credit card over the phone. What kind of attack is this? a. Social engineering b. Denial of service c. Phishing d. Trojan

a. Social engineering

Moshe is running late for a meeting and needs to let his coworkers know when he expects to arrive. However, Moshe lives in a state that does not allow people to hold their phones while driving. What technology can Moshe use to compose the text safely and legally? a. Speech recognition b. Synthesized speech c. Voice recognition d. Text-to-speech software

a. Speech recognition

Marina needs some information about how a carburetor works in an aircraft. She used Google to search for information on the web and now wants to refine the results to show videos only. Which of the following tools on the search engine results page (SERP) would you recommend to Marina? a. Subject filter b. Knowledge graph c. Questions from other users d. Related searches

a. Subject filter

A last section of the domain name is called _____________ a. top-level domain b. Bottom-level domain c. Protocol name d. Access name

a. top-level domain

Which of the following searches would return the best results on pandas in their natural habitat? a. wild panda b. "wild panda" -zoo c. *panda d. "wild panda"

b. "wild panda" -zoo

What is the minimum password length recommended by most security experts? a. 15-20 characters b. 8 characters c. 12-15 characters d. 30-40 characters

b. 8 characters

Teagan is fixing a leak under the sink and asks her phone to display a video about making the repair. What technology is Teagan using to complete her plumbing task? a. AR b. AI c. IoT d. NFC

b. AI

A(n) _____________ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network. a. Botnet b. Back door c. Encryptor d. Script kiddie

b. Back door

A _______ is a small text file that a web server stores on your computer. a. Cypher b. Cookie c. Spoof d. Phish

b. Cookie

Tristan just downloaded a new game he wants to play on his computer. What kind of file should he open in order to install and run the game? a. Desktop file b. Executable file c. Text file d. Data file

b. Executable file

Jin is planning a get-together for several friends from work. He's looking for a digital deal he can use at the restaurant. Which website would work best for this purpose? a. NexTag b. Groupon c. BizRate d. PriceGrabber

b. Groupon

Elliott is taking a graphic design class and wants to convert his physical images to digital files. What hardware should Elliott use to complete this task? a. Digital camera b. Media player c. Graphics tablet d. Scanner

b. Media player

What type of software manages the complete operation of a computer or mobile device? a. Web app b. Operating system c. Utility d. Settings software

b. Operating system

Vanessa recently developed an interest in cloud computing. She dug into a cloud service and taught herself several skills while using the provider's built-in training to challenge herself even more. She's now thinking she might be able to get a promotion and a raise because of all she's learned. What's the fastest way for her to effectively prove to her employer how much she now knows about cloud computing? a. Update her resumé b. Pass a certification exam c. Apply for a job at another company d. Go back to school and get a new degree

b. Pass a certification exam

Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company credit card number so she can pay for a business meal for her new clients. What kind of email is this? a. Spam b. Phishing c. Ransomware d. Hoax

b. Phishing

Kristy's advocacy blog isn't getting much traffic. What can she use to attract more attention to her website? a. CMS b. SEO c. Plugin d. Website builder

b. SEO

Which of the following types of copyrighted software is distributed at no cost for a trial period? a. public-domain software b. Shareware c. Freeware d. Open source software

b. Shareware

When Mason navigates to an e-commerce site in his browser, the webpage asks for permission to store cookies on his computer. If he refuses, what feature of the website might not work correctly? a. Search box b. Shopping cart c. Coupon codes d. Product pictures

b. Shopping cart

______________ is a techniques intruders use to make their network or Internet transmission appear legitimate. a. Phishing b. Spoofing c. A DDOS attack d. A back door

b. Spoofing

Which of the following IT specialty areas does not require strong people skills? a. Technology sales b. System development c. Technology education d. IT support

b. System development

Which of the following technologies can professionals use to perform their jobs more efficiently? a. Electronic waste b. Telecommuting c. Digital divide d. Chip-and-pin technology

b. Telecommuting

Which of the following should not be used to evaluate a web page for credibility? a. The source's author b. The intended audience c. The source's ranking d. The currency of the source

b. The intended audience

For which of the following school assignments would information literacy be most relevant? a. Translating a story from a foreign language b. Writing a research paper c. Conducting a science experiment d. Writing a book report

b. Writing a research paper

Luis follows a lot of news sources in his industry. He subscribes to several blogs written by industry experts, and updates are sent to his Feedly account. The Feedly website collects updates like this from thousands of sources so readers can access them all from one place. What kind of website is Feedly? a. Blog b. Media sharing c. Content aggregator d. Mass media

c. Content aggregator

Rishon is building a website for his new business and needs to add photos to make the website more interesting. He's taken a few photos himself and he's received permission from a friend to include some of her photos. Where else can he acquire photos without violating copyright laws? a. Copy photos from a competitor's website b. Download photos from friends on social media c. Copy photos from a public domain website d. Take screenshots of photos on a stock photo website

c. Copy photos from a public domain website

When you access a secure website, what information does your browser use to verify that web server's identity and encryption information? a. Password b. Encryption key c. Digital certificate d. TIN (tax identification number)

c. Digital certificate

____ means having a current knowledge and understanding of computers, mobile devices, the web, and related technologies. a. Digital divide b. Artificial intelligence c. Digital literacy d. Smart computing

c. Digital literacy

__________________ should be incorporated into the design of the workplace to reduce disorders of the muscles, nerves, tendons, ligaments, and joints. a. Centronics b. Biometrics c. Ergonomics d. Physiometrics

c. Ergonomics

14. Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call? a. Operations b. Information security c. Help desk d. Management

c. Help desk

What is ISP and what is their functions? a. Internal Service Provider. A company which provide internet connection for a fee. b. Internet Service Provider. A company which provide internal transferring data service to an organization. c. Internet Service Provider. A company which provide internet connection to other people for a fee. d. Internal Service Provider. A company provide internal connection to transfer data between two company.

c. Internet Service Provider. A company which provide internet connection to other people for a fee.

Which of the following operators should be added to your Google query to make sure that a certain word appears on every page in your search results? a. include: b. onpage: c. Intext: d. Inresult:

c. Intext:

Kevin is a hotel manager and has noticed long lines of impatient customers at the front desk. What IoT technology can Kevin use to help solve this problem? a. ATMs b. Webcams c. Kiosks d. Sensors

c. Kiosks

Eric just signed up for his first college class after being out of school for nearly a decade. He goes to the bookstore the week before class starts to get his book, and he's surprised to learn that he only needs an access card. How will Eric be accessing the course material for his college class? a. Bring your own device (BYOD) b. Telecommuting c. Learning Management System (LMS) d. Social networking

c. Learning Management System (LMS)

What kind of digital media is an online broadcast of a major league baseball game as it happens? a. Live audio feed b. On-demand content c. Live video streaming d. Downloaded video

c. Live video streaming

Kira works for a software company that currently plans to purchase iPad tablets for every child in a nearby rural school's fourth grade classes. The students will be allowed to take their iPads home so their parents can also get some exposure to the technology. Kira is concerned, however, that buying iPads might further widen the digital divide. What key factor might reduce the positive impact this plan could have for making technology more accessible to these families? a. The school might put passwords on all the iPads. b. iPads aren't powerful enough devices. c. Many rural families don't have Internet access at home. d. Businesses in the area prefer kids learn how to use computers instead of tablets.

c. Many rural families don't have Internet access at home.

When David posts his photos to a Facebook album, the Facebook site automatically places David's photos in chronological order by when they were taken and suggests places David might want to tag in the photos. How does Facebook know this information? a. Tags b. Filenames c. Metadata d. Comments

c. Metadata

Each time you add ___________ to your search, you are expanding the search to include more webpages. a. AND b. NOT c. OR d. +

c. OR

12. Which technology helps create an intelligent classroom environment? a. Bring your own device (BYOD) policy b. Social networking tools c. Online productivity software d. Modern, communal seating arrangements

c. Online productivity software

Zayn is ready to pay for a cart full of groceries in the self-checkout lane, including a carton of ice cream that will soon begin to melt if he doesn't hurry. He reaches for his credit card to scan in the reader, and realizes he left his wallet in the car. How can Zayn solve this problem quickly? a. Apply for a store credit card b. Write a check c. Pay with an app on his smartphone d. Use his PayPal account

c. Pay with an app on his smartphone

____________ is used to search for 2 or more words together on a web page, one right after another. a. Morphing b. Truncating c. Phrase searching d. Union searching

c. Phrase searching

What kind of output does a 3-D printer create? a. Visual b. Logical c. Physical d. Audio

c. Physical

Lyle is working online when a message appears warning that his personal files have been encrypted so he cannot access them. He has 72 hours to pay hundreds of dollars to receive a key to decrypt the files. What type of malware is infecting Lyle's computer? a. Trojan b. Address spoofer c. Ransomware d. Social engineering

c. Ransomware

______________ is the process of transferring data, instructions, and information from a storage medium into memory. a. Output b. Writing c. Reading d. Both A and B

c. Reading

When you save a file to the cloud, where is it stored? a. Flash drive b. Internal storage c. Remote server d. External storage

c. Remote server

When you visit your school's website on your smartphone, some of the links and resources are positioned differently on the page, making them more convenient. What feature of the website allows this variation? a. Server-side script b. Dynamic content c. Responsive design d. Site banner

c. Responsive design

Which of the following describes the relationship between the World Wide Web and the Internet? a. The web is separate from the Internet. b. The Internet is part of the web. c. The web is part of the Internet. d. The Internet and the web are the same.

c. The web is part of the Internet.

Mario is looking for an official website where he can find information about how to file his federal income taxes. Four URLs in his search results seem interesting, though each has a different three-letter extension. Which of these TLDs most likely indicates the best website for Mario's needs? a. .pro b. .edu c. .org d. .gov

d. .gov

How many bits make a byte? a. 4 b. 10 c. 16 d. 8

d. 8

Marquis has a CMS-hosted website for his consulting business, and has been told by several customers that it would be easier to pay for his services if he could accept credit card payments online. What tool will help Marquis add this functionality to his website? a. SEO b. A different theme c. A new domain name d. A plugin

d. A plugin

A firewall _________________________ a. Is hardware and/or software b. Protects network resources from outsiders c. Restricts employees' access to sensitive data d. All of the above

d. All of the above

In Google, images can be filtered by _____________ a. Color b. Size c. Type d. All of the above

d. All of the above

Tools (utilities) are programs that are used to _______________ a. Manage files on the computer b. Protect a computer from unauthorized intrusions c. Compress the size of files d. All of the above

d. All of the above

Which of the following communications technologies are used for IoT communications? a. Bluetooth b. NFC c. RFID d. All of these

d. All of these

What technology allows Alexa and Siri personal assistants to respond to questions and follow verbal instructions to perform tasks? a. Machine learning b. Real-time animation c. Live video streaming d. Artificial intelligence

d. Artificial intelligence

Dmitri is formatting the citations for his research paper. In what section of the research paper should he include this information? a. Index b. Glossary c. Preface d. Bibliography

d. Bibliography

How can you identify the format of a file? a. Check what program opens the file b. Check what program created the file c. Check the file size d. Check the file name extension

d. Check the file name extension

Kenny is about to sign into his bank's website when he notices the layout looks different from the last time he was on this site. The URL begins with HTTPS, but Kenny is still not convinced this site is safe. Knowing that anyone can create a secure website that uses HTTPS, how can Kenny find the digital certificate to check that his bank actually owns this website? a. Look for the lock icon in the address bar b. Email the bank for a copy of the digital certificate c. Sign in with his password and then use the site's search tool d. Click the name of the organization next to the address bar

d. Click the name of the organization next to the address bar

In http://www.example.com/articles/contact.html, what do we call the "example.com" part of the URL? a. Pathname b. Webpage file name c. Server address d. Domain name

d. Domain name

Which of the following is the most secure password? a. $t@rw@r$ b. Passw%rd12345 c. Qwertyuiop[] d. Elephantstarburstrubikseattle

d. Elephantstarburstrubikseattle

When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with? a. Internet router b. Outgoing mail server c. Sender's computer d. Incoming mail server

d. Incoming mail server

Sami is about to graduate with her IT degree and needs to post her resumé online to help with her job search. Which website should she use to post her qualifications? a. Instagram b. Google c. Amazon d. LinkedIn

d. LinkedIn

Shipping services often add tags to shipped packages that can be scanned and monitored through wireless communication. Which network protocol is the best fit for this purpose? a. Ethernet b. Wi-Fi c. Cellular d. RFID

d. RFID

Linda, who is nearly blind, writes a blog post each week advocating for workplace accommodations that maximize employment potential for people with disabilities. To keep up with current news in her field, she follows many other bloggers. What technology can Linda use so she can listen to the text written by other authors? a. Speech recognition programs b. Audio books c. Graphic organizer d. Screen reader

d. Screen reader

Sandy is researching a new car she plans to purchase after graduation, and has narrowed her choices to three car models from three manufacturers. One article she's reading online favors one model over the other two. Which of the following factors could indicate this source is not reasonable? a. The author has worked in the auto industry for over two decades. b. The author test drove all three vehicles and reported similar statistics for all three. c. The article was last updated three months ago. d. The author works for a company that sells one of the cars.

d. The author works for a company that sells one of the cars.

Jamie recently downloaded a photo editing app that some of her friends said had some exciting features. Two days later, she found out her email account had been hacked. What kind of malware infected Jamie's computer? a. Virus b. Ransomware c. Worm d. Trojan

d. Trojan

What characteristic makes the following password insecure? riv#MICYIP$qwerty a. Too short b. Uses dictionary words c. Uses names d. Uses characters in sequence

d. Uses characters in sequence

Crissie is organizing a group of volunteers to help contribute ideas for a fundraiser event. Because the volunteers are spread across the country, she wants to set up a site where group members can contribute and modify notes, links, and other information. Which type of site would work best for this purpose? a. Blog b. Search site c. Media sharing d. Wiki

d. Wiki

Which of the following is not one of the early "protocols," or ways to use the Internet? a. Telnet b. dialup c. FTP d. blogging

d. blogging

Information given to a computer for processing is called as ______. a. output b. result c. content d. input

d. input


संबंधित स्टडी सेट्स

Chapter 1,2,3,5 test Marketing 3007

View Set

Plan and Manage Budget and Resources

View Set

Leading and Managing in Nursing exam 1

View Set

World Civilizations Study Guide 4

View Set

The Iroquois Constitution, ela11, English 3: Introduction to Early American Literature, English Language Arts 11th grade, Writing Workshop: test

View Set