ITE Exam 2 Review
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
A data file contains the instructions your computer or device needs to run programs and apps.
False
A shortcut icon puts the actual file, folder, or app on the desktop, removing it from the location where it is saved on your computer or device.
False
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?
Publish to a web server
_____ are attackers who want to attack computers but lack the knowledge needed to do so.
Script kiddies
When you open the file manager you have access to frequently or recently opened files and folders, favorite files and folders, and the main folders on your computer or device.
True
When you work on a file using a web app, changes are saved as you make them.
True
_____ are new releases of an app and may require an additional fee before you can install them.
Upgrades
Which of the following websites most likely uses XML-formatted data?
an ecommerce site that lets you compare products from different vendors
Which of these is not an option for formatting text?
copying a region of text
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
To run a productivity app with most complete and advanced capabilities, you would most likely ______
install and run the software on your desktop or laptop computer
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
If a website is designed with responsive design concepts, then _____.
it appears correctly on any device regardless of screen size
Each of the following is a factor that causes repetitive strain injury (RSI) except _____.
lack of restful sleep
When creating a strong password _____ is the most important element.
length
Which of the following types of websites typically provides the least security?
social media sites
A _____ is a very short duration of a voltage increase that can be absorbed by a surge protector.
spike
Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.
will allow user interaction
File properties are the same no matter what type of file.
False
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Which of the following HTML code samples inserts a hyperlink in a webpage?
<a href="http://www.google.com">Google</a>
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?
A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.
Which of the following would most likely be a static website?
A historical facts page
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files and any associated entries in the system files.
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?
CSS
File transfer programs belong in what software category?
Communications
How can you protect personal information gathered by legitimate organizations?
Create a separate email account for receiving information from websites.
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
_____ is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key."
Encryption
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
CAPS LOCK is a sticky key.
False
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
False
When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.
False
When you move a file to the Recycle Bin or Trash, it is permanently deleted.
False
Which of the following is not a web browser setting for managing cookies?
Have all cookies automatically expire after 45 days.
Which of the following components on a webpage is created using HTML?
Heading
Which of the following is NOT a feature of an Integrated Development Environment (IDE)?
Hosts webpages
______ is any data and instructions entered into the memory.
Input
When you take a photo with a digital camera, most likely it is saved in ______ format.
JPG
What is a popular language for writing scripts that run in your browser to control a webpage's behavior?
JavaScript
Which of the following programming languages adds interactivity to websites?
JavaScript
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
Public domain software
Which of the following is not a general guideline for developers?
Start programming before creating a proposal.
What is a digital certificate?
Technology used to verify a user's identity
What is uptime?
The measure of a web host's reliability
A worm is a malicious program that uses a computer network to replicate.
True
After designing a website, you transfer the website files from your local computer to a remote web server.
True
An operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it.
True
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
True
Moving or copying a folder affects all of the contents of the folder
True
The kernel is the core of an operating system.
True
The operating system manages interactions between hardware and software.
True
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
With responsive design
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
a crash
The ______ window is the window you are currently using, which appears in front of any other open windows.
active
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
Mobile first design is important because ______.
developers must provide simplified user experiences for apps that run on small screens
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
GUI stands for ______ user interface.
government
You want to share information about an upcoming event at your school by creating a short promotional video. Which type of app might you use to create the video?
graphics and media
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
incomplete documentation
Which of the following units measure millions of bytes of data?
megabytes
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
When a value in a worksheet changes, the spreadsheet program will ______.
recalculate any cells whose formulas depend on the value that changed
In a relational database, data is organized into rows of data called ______.
records
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?
waterfall method
Which of the following best defines responsive design?
Pages automatically adjust the size of their content relative to the size of the screen.
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
Patch finders
You have the right to see your credit information.
True
You use CSS to to specify the appearance of content on a webpage.
True
What is the temporary Windows storage area that holds items you copy or cut called?
the Clipboard
When giving a presentation, pushing one slide off the right edge of the screen as another one appears is an example of a(n) ______.
transition
What type of security requires something you know and something you have that no one else has?
two factor authentication
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?
Agile development
HTML coding does not allow for lists using bullets. All lists have to be numbered.
False
HTML has remained the same ever since it was developed, which is why there is only one version.
False
Programmers use compilers to test code to find errors and provide suggestions to fix them.
False
Which of the following is NOT true about RAM?
RAM is nonvolatile memory.
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
Restorers
Wi-Fi Protected Access 2 (WPA2) Personal encrypts wireless data transmissions and limits who can access the Wi-Fi network.
True
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
A business would use a website analytics tool for all of the following EXCEPT _____.
viewing why someone visited your webpage
Which type of app would most likely NOT be found included in a productivity suite?
web browser