Exam 2
Which of the following HTML code samples inserts a hyperlink in a webpage?
<a href="http://www.google.com">Google</a>
To insert a heading for a main topic on a webpage, which of the following tags should you use?
<h1> </h1>
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?
A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.
Which of the following would most likely be a static website?
A historical facts page
____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Why is it not safe to connect to public wifi networks ?
Because these networks are rarely protected
What can you do to make sure you are not contributing to software privacy?
Buy software only from legitimate resellers or directly from the manufacturers.
Fire transfer programs belong in what software category?
Communications
Which of the following tools translate the source code of a procedural program into binary code?
Compiler
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
How can you protect personal information gathered by legitimate organizations?
Create a separate email account for receiving information from websites.
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
4G and 5G networks provide slower data transmission speeds than 3G networks. True or false
False
A Trojan is a malicious program that uses a computer network to replicate.
False
Bandwidth is a term that describes the number of devices connected to a network. True or False
False
Programmers use compilers to test code to find errors and provide suggestions to fix them. T or F
False
To prevent a laptop from being stolen, you can use a surge protector.
False
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code.
Fourth generation language
Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link?
HTML
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important?
How visitors are using the site
Why is it important to be able to export data in an XML format?
It allows data to be shared between applications
Which of the following statements is NOT true about a local firewall?
It is a physical device that acts as a protective barrier.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Why would you include a banner on your website?
It makes the website more easily identifiable to visitors.
What is a popular language for writing scripts that run in your browser to control a webpages behavior?
JavaScript
When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?
JavaScript
In terms of privacy, which of the following is a best practice?
Keep your social security number hidden in a locked box in your home.
Which of the following network standards applies to cellular networks?
LTE
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
My Verizon VPN
What internal device does a computer use to connect to a wired or a wireless network?
Network Interface Card
Scott seeking a position in an information Technology (IT) department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interview referring to?
Open source
___ are tools that track the memory usage, status, and errors of currently running software.
Process managers
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?
Require users to identify themselves using biometrics or passwords.
When it comes to secure data storage on a network, which of the following statements is true?
Roles can be granted to individuals to view files and make changes to files on a network.
Users of a news chat app reported many errors and bugs. What should the app developers release to solve the problems?
Service pack
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
Am growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
Site license
JavaScript likely controls which of the following elements on a webpage?
Slide Show
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?
Support and security phase
Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?
To give you finer control over the content
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
A class is a type of object that defines the format of the object and the actions it can perform.
True
After designing a website, you transfer the website files from your local computer to a remote web server. True or False
True
Before you name your website, you need to search for other sites using that name and then purchase a domain name. True or False
True
Many new cars use embedded software to control motion sensors, backup camera, or a navigation system.
True
You use CSS to to specify the appearance of content on a webpage. True or False
True
What type of security requires something you know and something you have that no one else has?
Two-factor authentication
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
Which of the following would be considered a strong password?
Wbcm2!4!820!
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
With responsive design
Which of the following is a popular, user friendly CMS often used as a blogging platform?
WordPress
When using encryption from your home computer, how would you configure the router?
You can use the wireless router to set the encryption key and type of encryption.
On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?
autoplay
There are various risks from attacks on WiFi networks. These include all of the following except___.
creating malware
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
When describing a client/server network, which of the following would be considered a client?
laptop
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
What defines the behavior of an object in object-oriented programming ?
method
Which of the following does a software license usually specify?
number of people authorized to use the software
What type of program would have a class named student with objects called fullTime and partTime?
object-oriented program
A network administrator is usually not required on a __ network.
peer-to-peer
Devices on a _____ area network are connected via Bluetooth.
personal
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
A modem can also function as what other piece of hardware?
router
Which of the following types of websites typically provides the least security?
social media sites
_ is the process of creating programs and apps from the idea stage to distribution to users.
software development
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
star
What do you call the rules each programming language has for writing instructions?
syntax
Why would you want to connect your computer to a network?
to access shared resources
_____ are new releases of an app and may require an additional fee before you can install them.
upgrades
What can a company learn by studying website analytics for its website?
when it needs to increase its bandwidth
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.
wireframes
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?
wordsmithing.com