Computer Concepts Final Exam Study Guide
Which of the following tools translates the source code of a procedural program into binary code? debugger compiler source code editor code repository
compiler
____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. intellectual property copyright digital rights management shareware
digital rights management
All the pet names in a veterinarian's database are stored in a _______ called PetName. table record field worksheet
field
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. ethernet firewall protocol rootkit
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? antispyware ransomware firewall disk cleaner
firewall
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? public domain software freeware Software as a Service (SaaS) custom software
freeware
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you? if visitors dislike the company brand or product if customers are buying products somewhere else if your webpage appears first in search engine results how visitors are using the site
how visitors are using the site
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? missing prototype incomplete documentation unfinished system proposal inadequate feasibility study
incomplete documentation
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? integrated development environment (IDE) code repository 4GL development tool cloud development
integrated development environment (IDE)
If a website is designed with responsive design concepts, then _____. it appears correctly on any device regardless of screen size it requires users to scroll from left to right on a device with a small screen it displays small text on all screens it does not allow users to resize graphics
it appears correctly on any device regardless of screen size
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? mobile hotspot Bluetooth connection virtual private network cell phone hotspot
mobile hotspot
To access the Internet, a router must be connected to a _____. network hub switch modem
modem
Which of the following does a software license usually specify? number of people authorized to use the software amount of RAM required to run the software geographic locations where users can run the software steps for installing and uninstalling the software
number of people authorized to use the software
What type of program would have a class named Student with objects called fullTime and partTime? machine language program object-oriented program markup language program procedural language program
object-oriented program
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? freeware open source Software as a Service (SaaS) commercial software
open source
A network administrator is usually not required on a _____ network. peer-to-peer client/server intranet metropolitan area
peer-to-peer
Devices on a _____ area network are connected via Bluetooth. local wide metropolitan personal
personal
Computers communicating on a network must follow a _____, a common set of rules for exchanging information. standard protocol syntax topology
protocol
Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert? absolute reference relative reference targeted reference blank reference
relative reference
Which of the following is an example of a personal area network? computers connected within a city computers connected within a home smartwatch and phone connected via Bluetooth phone and computer connected via Wi-Fi
smartwatch and phone connected via Bluetooth
The set of activities performed to build a program is called the _____. integrated development environment (IDE) software development life cycle (SDLC) object-oriented programming loop prototyping
software development life cycle (SDLC)
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. topologies architectures standards protocols
standards
What do you call the rules each programming language has for writing instructions? source code interpreter syntax grammar
syntax
Contact information for all the people taking a class at a school are stored in a ________ called Students. field record worksheet table
table
The volume of Big Data generated over time is typically measured in terms of ____________. kilobytes characters terabytes records
terabytes
Why would you want to connect your computer to a network? to keep up with computing trends for added security to access shared resources to use the network's operating system
to access shared resources
What is the goal of a DevOps methodology? to follow a linear and structured development cycle. to condense development and create a quality product. to produce programs quickly and then offer continuous updates to create a final, functional product in one development cycle
to produce programs quickly and then offer continuous updates
A national bank processes approximately 1,500 transactions per second. The fact that the bank's database must add this many Big Data records every second refers to its high _________. velocity value variety veracity
velocity
What characteristic of Big Data indicates how closely that data matches reality? velocity veracity volume variety
veracity
A business would use a website analytics tool for all of the following EXCEPT _____. viewing the number of pages a person visited viewing the number of new and returning visitors viewing why someone visited your webpage deciding when to increase bandwidth
viewing why someone visited your webpage
What can a company learn by studying website analytics for its website? the number of headings and images on the website when it needs to increase its bandwidth whether a new corporate logo has increased market value the amount of sales per customer
when it needs to increase its bandwidth
At what point are you responsible for following the terms in a software license agreement? when you purchase the software when you give the software to someone else when you click or take another action to accept the terms when you register the software
when you click or take another action to accept the terms
Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. will allow user interaction is meant for infrequent updates is cheaper to maintain requires less storage space on a server
will allow user interaction
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. code DevOps wireframes documentation
wireframes
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice? premierskills.com wordsmithing.com jin-102887.com R2D2editing.com
wordsmithing.com
Which of the following HTML code samples inserts a hyperlink in a webpage? <img src="http://www.google.com" alt="Google"> <a href="http://www.google.com">Google</a> <link="http://www.google.com">Google</link> <href="http://www.google.com">Google</href>
<a href="http://www.google.com">Google</a>
To insert a heading for a main topic on a webpage, which of the following tags should you use? <h1> </h1> <title> </title> <h4> </h4> <main> </main>
<h1> </h1>
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work? A CMS does not allow multiple contributors to use it at the same time. A CMS is just another name for a drag-and-drop procedure that anyone can perform without any restrictions. A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role. A CMS just adds capabilities to a website so it does not matter who is working on the website or when.
A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.
Jenson needs to update his home address in his health insurance company's database. Which of the following applications can he open on his computer so he can make these changes? A browser A spreadsheet application An RDBMS A DBMS
A browser
Which of the following would most likely be a static website? A news site A blog A historical facts page An online shopping site
A historical facts page
Which of the following describes an evil twin? A device infected with malware that an attacker uses to control the device remotely. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
A modem can also function as what other piece of hardware? A hub A switch A router A network interface card
A router
JavaScript likely controls which of the following elements on a webpage A navigation bar A slide show A copyright notice A hyperlink to another website
A slide show
What is an ISP? A telecommunications company that sells Internet access. A communications device that connects to a communications channel. A central point for cables in a network for data sharing, A system of two or more devices linked by wires, cables, or a telecommunications system.
A telecommunications company that sells Internet access.
What is a MAC address? A unique hardware address for your device The connection needed to access to a cellular network An IP address unique to Apple's MAC computers An alternate name Internet Protocol version 6
A unique hardware address for your device
Which of the following describes a domain registrar? A place that manages web servers and disk space. An administrator who oversees a system's uptime and runs reliability checks. A method for determining the amount of bandwidth needed for a specific website. A website where you can go to purchase a name for your website.
A website where you can go to purchase a name for your website.
Which of these tasks is a non-technical user most likely to have the right to perform in a database? Delete a record. Add new data. Name a field in a table. Create a relationship between two tables.
Add new data.
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? Waterfall model Agile development Rapid application development Predictive development
Agile development
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? It can be difficult to find the folder containing the program files. An uninstaller removes the program files and any associated entries in the system files. An uninstaller moves the program files to the Recycle Bin for safety, but deleting a folder permanently removes them. An uninstaller makes a backup before removing the program files.
An uninstaller removes the program files and any associated entries in the system files.
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? Planning phase Analysis phase Design phase Implementation phase
Analysis phase
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? Antivirus Antispyware Antispam Firewall
Antispyware
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? Website called FreeAppleApps App Store for iOS Flash drive containing apps her friend copied Email message containing download link
App Store for iOS
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? RFID NFC Bluetooth IrDA
Bluetooth
Which of the following is true about broadband connections? Broadband connections turn off after a specified amount of idle time. Broadband connections are "always-on" connections. Only a few of today's Internet connections are broadband connections. Broadband connections require a wireless router to increase their speed.
Broadband connections are "always-on" connections.
What can you do to make sure you are not contributing to software piracy? Read and accept all software license agreements. Uninstall apps you are no longer using. Do not use freeware or shareware. Buy software only from legitimate resellers or directly from the manufacturer.
Buy software only from legitimate resellers or directly from the manufacturer.
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem? C++ HTML JavaScript CSS
CSS
File transfer programs belong in what software category? Productivity (business and personal) Communications Security File, disk, and system management
Communications
What does a DSL modem use to send and receive digital data? Copper telephone wiring Cable TV connections A wireless router A network interface card
Copper telephone wiring
Which of the following would most likely be the key paired with a value of "Canada" in a nonrelational customer database? Name Product Affiliation Country
Country
Which data type would be best suited to a field that lists a product's clearance price? AutoNumber Date/Time Currency Number
Currency
Which of the following fields would be most important to encrypt in a customer table? Customer's city Customer's sales representative Customer's status Customer's credit card number
Customer's credit card number
Which of the following could indicate a DoS attack on your company server? Customers are required to enter personal information as they complete an order form. Customers are receiving too many emails about special offers. Customers cannot view the website on their device because the page will not load. Customers cannot download the most recent newsletter.
Customers cannot view the website on their device
Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other? Customers, Orders Customers, Ingredients Products, Orders Products, Ingredients
Customers, Ingredients
What does XML use to describe data? A plugin Code editor Script-language Customized tags
Customized tags
Morgan needs to hire someone to help implement a business intelligence system for her company. What type of professional would be the best fit for this job? Database administrator CEO Data analyst Retailer
Data analyst
Which type of data storage allows for the most variety of data types? Data warehouse Key-value database DBMS Data lake
Data lake
Which data repository type is most likely to include database tables and primary keys in its internal data structure? Data lake Data dashboard Data warehouse Data mart
Data warehouse
Which of the following job roles would most likely need permission to delete records in a Customers table? Accountant Customer service representative Receptionist Database administrator
Database administrator
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? Access controls Intellectual Property rights Digital Rights Management License Agreement
Digital Rights Management
Which of the following is LEAST likely to be a field in a Customers table? EmploymentDate PhoneNumber LastName Address
EmploymentDate
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? Store the report on a flash drive that you have password-protected with the president's name. Encrypt the data in the report. Send the email without attaching the report and ask the president to call you. Transfer the report to the cloud.
Encrypt the data in the report.
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? VPN Extranet Wi-Fi Intranet
Extranet
Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should the FROM phrase say in her query? FROM Students FROM Birthdate FROM Name FROM Schools
FROM Students
Raphael is working with a table in Access. He needs to see all the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table? Filter Query Sort Report
Filter
Which of the following is an authentication method to keep your data safe? Fingerprint scanner Body area network Encryption Software firewall
Fingerprint scanner
Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Forms Queries Tables Reports
Forms
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? Machine language Assembly language Procedural language Fourth generation language
Fourth generation language
Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Major Employer Graduated GPA
Graduated
Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link? CSS JavaScript HTML C++
HTML
Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes? HTML5 debugger HTML 5 validator HTML 5 code editor HTML CMS
HTML 5 validator
Which of the following components on a webpage is created using HTML? Heading Background Color Slide show Layout
Heading
Which of the following is NOT a feature of an Integrated Development Environment (IDE)? Automatically indents code Hosts webpages Displays tags in a different color Ensures code follows HTML specifications
Hosts webpages
Which data type would be best suited to a field that lists customer email addresses? AutoNumber Date/Time Number Hyperlink
Hyperlink
Which of the following statements do opponents of net neutrality agree with? Access to websites should not be restricted based on content. All Internet traffic should be treated equally. The same level of service should be provided to all websites, regardless of purpose. ISPs should charge more for high-bandwidth connections.
ISPs should charge more for high-bandwidth connections.
Which of the following is NOT a risk to a company or its employees as a result of a data breach? Loss of trust with customers Increased database efficiency Negative media exposure Jailtime
Increased database efficiency
__ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. Activation Registration Installation Upgrading
Installation
Students who complete an online test are not allowed to change their test grades. What aspect of the CIA triad is at work here? Availability Integrity Scalability Confidentiality
Integrity
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Copyright Intellectual property License agreement Digital Rights Management
Intellectual property
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? Compilers Debuggers Interpreters Eclipse
Interpreters
If you want to share information with individuals who are internal to your organization, which type of network would you want to use? Wired network Intranet Extranet Virtual private network
Intranet
Why is it important to be able to export data in an XML format? It converts code into HTML for a website. It controls the appearance of a webpage. It is needed to assign attributes. It allows data to be shared between applications.
It allows data to be shared between applications.
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? It did not include a promotional offer. It was written in an overly formal tone. The signature was consistent with other emails from his bank. It contained typos and other grammatical errors.
It contained typos and other grammatical errors.
Which of the following statements is NOT true about a local firewall? It is a physical device that acts as a protective barrier. It is also called software firewall. It is often built into a company's operating system. It inspects data being transmitted to or from a network.
It is also called software firewall.
Why would you include a banner on your website? It describes your ownership to the general public. It makes the website more easily identifiable to visitors. It identifies the resources you plan to use in your business. It creates a site map for the visitor of your website.
It makes the website more easily identifiable to visitors.
Which of the following is true about XML? It describes content and how to present it in a browser. It stores layout information in a text format for a browser to interpret. It provides a way to classify data and share it between applications. It contains predefined tags to describe placement of content on a webpage.
It provides a way to classify data and share it between applications.
Why is a cable modem classified as a digital model? It only sends digital data over a digital line. It sends and receives digital data over a digital line. It only receives digital data over a digital line. It uses copper wires to enable efficient digital data transfers.
It sends and receives digital data over a digital line.
Why is an FTP client helpful? It previews the webpages before you publish them. It uploads files from your computer to a web server. It creates the domain name for use on the web server. It searches through code to find errors and suggest replacements.
It uploads files from your computer to a web server.
Which of the following is an example of an object-oriented programming language? Fortran Java HTML DevOps
Java
What is a popular language for writing scripts that run in your browser to control a webpage's behavior? HTML CSS JavaScript Python
JavaScript
When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed? JavaScript HTML CSS Python
JavaScript
Which of the following programming languages adds interactivity to websites? HTML JavaScript Ruby C++
JavaScript
Which of the following network standards applies to cellular networks? Wi-Fi LTE Phoneline Ethernet
LTE
When describing a client/server network, which of the following would be considered a client? External hard drive Modem Laptop Printer
Laptop
Which of the following statements is true about public networks? Many public networks are not secure. All public networks are free. Your home network is a public network. Hackers cannot intercept data transmitted over public networks.
Many public networks are not secure.
What defines the behavior of an object in object-oriented programming ? Object by itself Class Method Device or platform on which the program runs
Method
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? My Verizon VPN Starbucks Wi-Fi Jenn's iPhone xfinitywifi
My Verizon VPN
What internal device does a computer use to connect to a wired or a wireless network? Motherboard Hub Switch Network interface card
Network interface card
What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database? Relational database Big Data database Backup database Nonrelational database
Nonrelational database
Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using? Relational Proprietary DBaaS Open source
Open source
Which of the following is NOT an RDBMS? MySQL PostgreSQL Microsoft SQL Server Oracle NoSQL Database
Oracle NoSQL Database
Which of the following best defines responsive design? Pages are coded using a series of commands to generate the content. Pages automatically adjust the size of their content relative to the size of the screen. Pages use scripts to provide interactivity. Pages interact with content stored in a database on a web server
Pages automatically adjust the size of their content relative to the size of the screen.
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? Restorers Auditing tools Process managers Patch finders
Patch finders
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? Piracy License agreement Digital rights management Access control
Piracy
Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements? Microsoft SQL Server PostgreSQL MongoDB Oracle Database
PostgreSQL
_____ are tools that track the memory usage, status, and errors of currently running software. System information lists Auditing instruments Patch finders Process managers
Process managers
Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? Author PageCount Title ProductID
ProductID
In which category of software do Microsoft Office Word and Excel belong? Productivity Graphics and media Personal interest Security
Productivity
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? IT department Designer Project manager Programmer
Project manager
What kind of software products can you download from the Internet without being subjected to copyright restrictions? Public domain software Freeware Open source software Shareware
Public domain software
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet? Specify the format Publish to a web server Convert to a read-only file Compress pages and multimedia content
Publish to a web server
Which software development method uses highly skilled programmers to shorten the development process while producing quality software? Rapid Application development model Predictive development model Agile development methodology Waterfall model
Rapid Application development model
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? Require users to identify themselves using biometrics or passwords. Require users to install antivirus software on their devices. Create a strict license agreement for the app. Display a stern warning on the welcome screen.
Require users to identify themselves using biometrics or passwords.
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? Process managers Auditing tools Patch finders Restorers
Restorers
When it comes to secure data storage on a network, which of the following statements is true? You cannot save encrypted files on a network attached storage device. Wireless network keys are the safest method for protecting files on a network. Roles can be granted to individuals to view files and make changes to files on a network. Files stored on a network are accessible to all who can access that network.
Roles can be granted to individuals to view files and make
What hardware is essential to creating a home Wi-Fi network? Printer Router Monitor Ethernet cable
Router
Rafael needs to run a query that will show the name and city of all his clients. Which of the following phrases will determine which fields are returned in the query? FROM Name, City SELECT Name, City VALUES Name, City WHERE Name, City
SELECT Name, City
Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage? HTML JavaScript SQL CSS
SQL
What programming language supports relational databases? HTML NoSQL SQL CSS
SQL
Which commonly used programming language is used to manage, access, and search for database content? Java C++ SQL HTML
SQL
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? Service pack Patch Upgrade Restorer
Service pack
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? Shareware Public domain Open source Freeware
Shareware
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? She uses a hub at her home that she connects to through the app. She has installed switches that interact with the installed app on her phone. She has a home network with smart home devices. She dialed into her home modem through the app and sent a command through the router.
She has a home network with smart home devices
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? Single user license agreement End user license agreement Site license Multiple user license agreement
Site license
Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? A to Z Smallest to largest Z to A Largest to smallest
Smallest to largest
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering A zombie attack An evil twin Spyware
Social engineering
____ is the process of creating programs and apps from the idea stage to distribution to users. Software development Cloud computing System auditing Object-oriented programming
Software development
Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose? Spreadsheet Presentation Database Document
Spreadsheet
Which of these file types is optimized for processing calculations of numbers in a budget? Database Presentation Document Spreadsheet
Spreadsheet
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. Bus Ring Star Mesh
Star
Which of the following is not a general guideline for developers? Group programming activities into phases. Involve users for whom the program is being developed. Define the standards, or sets of rules and procedures, for creating the product. Start programming before creating a proposal.
Start programming before creating a proposal.
Which of the following tables in a database would NOT need to be encrypted? Patient_Records Customer_Payments Employee_Passwords Store_Locations
Store_Locations
Which field could serve as the primary key for a list of students in your school? Phone number Full name Student ID number Birth date
Student ID number
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? Implementation phase Support and security phase Design phase Analysis phase
Support and security phase
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? Designer Programmer Tester IT member
Tester
Which of the following is a disadvantage of using cloud computing to share files? The amount of space that files will take up on your computer. The inability to access your files if you lose your Internet connection. The files you will lose if your computer crashes. How long it will take to access a backup of files.
The inability to access your files if you lose your Internet connection
What is uptime? The speed at which data transfer takes place The amount of time you will need to create your website The measure of a web host's reliability The measure of how much time people spend on your website
The measure of a web host's reliability
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? He can use the network only for a limited time. The network connection is probably not secure. He cannot connect to the Internet from the network. The network most likely uses a firewall for protection.
The network connection is probably not secure.
How does a wireless network key work with an encrypted wireless network? The wireless key is the encryption code needed by the receiver to decode the file. The sending and receiving devices must know the wireless network key to communicate. The wireless network needs the key to decode the data before sending. The wireless network key is your password for logging onto an Internet email system to receive files.
The sending and receiving devices must know the wireless network key to communicate.
Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is sorted. The table is missing a primary key. The table has been deleted. The table is filtered.
The table is filtered.
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? They use adware to fill your screen with unwanted advertisements until you click one. They overload the server with network traffic so webpages will not load. They disguise the network as an evil twin. They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
They disguise the network as an evil twin.
In a connected network, how are hubs and switches similar to one another? They are interchangeable terms for the same hardware. They provide a central point for cables in a network. They transfer data to all devices. They can only connect to a single device.
They provide a central point for cables in a network.
If HTML is used to specify the content of the webpage, then what do you use CSS for? To make the webpage interactive To define the page layout To include multimedia content To connect to other pages with hyperlinks
To define the page layout
Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages? To generate a similar look and feel To give you finer control over the content To have the website blend in with others To reflect a common brand
To give you finer control over the content
What is the U.S. Federal Communication Commission's role in regard to Internet access? To rate Internet sites similar to movie ratings To restrict Internet access by location and population To regulate the bandwidth each website can have To release rules surrounding Internet access
To release rules surrounding Internet access
One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task? DELETE INSERT SELECT UPDATE
UPDATE
_____ are new releases of an app and may require an additional fee before you can install them. Service Packs Patches Upgrades Restorers
Upgrades
What area of software development focuses on the user's reaction to and interaction with the software product? Technical feasibility User experience System documentation Quality assurance
User experience
Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Customers Inventory Vendors Employees
Vendors
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? Extranet Intranet Wireless network Virtual private network
Virtual private network
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? Visit the manufacturer's website and install the latest updates for the app. Restart the app and close the error message whenever it opens. Use system software to update the operating system. Uninstall the app and then reinstall it.
Visit the manufacturer's website and install the latest updates for the app.
Kim is writing a SQL query that will pull a list of customers with outstanding orders and the sales rep for each order. What should the WHERE phrase say in her query? WHERE Customer = SalesRep WHERE OrderStatus = Pending WHERE CustomerStatus = Active WHERE SalesRep = Kim
WHERE OrderStatus = Pending
Which of the following would be considered a strong password? Password123 Abc123456789 CatCatCatCat Wbcm2!4!820!
Wbcm2!4!820!
What type of network sends signals through airwaves and usually does not require cables? Wired network Intranet Wireless network Virtual private network
Wireless network
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website? With no graphics, only text With all content on one page With responsive design With a static layout
With responsive design
Which of the following is a popular, user friendly CMS often used as a blogging platform? WordPress Drupal Google Sites Dreamweaver
WordPress
Is it advisable to enable automatic updates on security software? Yes; this helps to catch and quarantine new malware before it harms the computer. No; automatic updates can cause create problems in security software. No; automatic updates require excessive storage space and slow the computer. Yes, though you must pay an additional fee for automatic updates
Yes; this helps to catch and quarantine new malware before it harms the computer.
When using encryption from your home computer, how would you configure the router? You can use the wireless router to set the encryption key and type of encryption. You can use the wireless router to intercept encrypted information and block it from entering the network. You can use the wireless router to verify the security certificate of the encrypted data being sent. You can use the wireless router to encrypt and then decode the encryption on information sent and received.
You can use the wireless router to set the encryption key and type of encryption.
Which of the following would most likely be a key in a key-value database of investment properties owned by a company? Residential ZoneType EnrollmentStatus Active
ZoneType
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? a crash an activation a patch piracy
a crash
An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____. a project an FTP client an absolute reference a consortium
a project
During which phase of the SDLC is software tested to make sure each function works as intended? all phases design analysis implementation
all phases
Which of the following websites most likely uses XML-formatted data? an ecommerce site that lets you compare products from different vendors an ecommerce site that lets you keep a wish list a news site that displays up-to-date headlines an entertainment site that plays videos
an ecommerce site that lets you compare products from different vendors
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag? controls loop autoplay play
autoplay
During a thunderstorm, the database server for Jason's store loses power. This is an example of failed _________. integrity encryption availability confidentiality
availability
Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include? dashboard sidebar icon banner
banner