Module 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

Agile Development

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

Analysis Phase

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

Analysis Phase

File transfer programs belong in what software category?

Communications

What does a DSL modem use to send and receive digital data?

Copper Telephone Wiring

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

Fourth Generation Language

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

IDE

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Which of the following is an example of an object-oriented programming language?

Java

Which of the following programming languages adds interactivity to websites?

JavaScript

What defines the behavior of an object in object-oriented programming ?

Method

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What internal device does a computer use to connect to a wired or a wireless network?

Network Interface Card

What type of program would have a class named Student with objects called fullTime and partTime?

Object-Oriented Program

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch Finders

_____ are tools that track the memory usage, status, and errors of currently running software.

Process Managers

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

Project Manager

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

Protocol

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public Domain Software

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

Restorers

The set of activities performed to build a program is called the _____.

SDLC

Which commonly used programming language is used to manage, access, and search for database content?

SQL

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?

Service Pack

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

Site License

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

During which phase of the SDLC is software tested to make sure each function works as intended?

all phases

Which of the following tools translates the source code of a procedural program into binary code?

compiler

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

What do you call the rules each programming language has for writing instructions?

syntax

What is the goal of a DevOps methodology?

to produce programs quickly and then offer continuous updates

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

waterfall method

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wireframes


संबंधित स्टडी सेट्स

SIE chapter 9 Security Industry Regulations:

View Set

Computerized Accounting: Quickbooks Online 2022 (Chapter 3)

View Set

Cognitive Psych Quizzes 6,7,8,9,10, and 11

View Set

Ch. 11 & 12 Overview of Dentition and Tooth Morphology

View Set

Ch 18: Fetal Assessment During Labor

View Set

Prepositions (remember these are all followed by 'de')

View Set

Сутність маркетингу та його сучасна концепція

View Set