Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

Which of the following statements is NOT true about a local firewall?

A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system

Which of the following would most likely be a static website?

A historical facts page

A modem can also function as what other piece of hardware?

A router

What is a MAC address?

A unique hardware address for your device

Which of the following describes a domain registrar?

A website where you can go to purchase a name for your website.

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? (530509)

A:Service pack

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? (530519)

B:Support and security phase

What area of software development focuses on the user's reaction to and interaction with the software product? (530529)

B:User experience

Which of the following tools translates the source code of a procedural program into binary code? (530533)

B:compiler

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

What do you call the rules each programming language has for writing instructions? (530536)

C:syntax

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? (516380)

D:Restorers

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?

HTML

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?

HTML5 validator

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Why is it important to be able to export data in an XML format?

It allows data to be shared between applications

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

JavaScript

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is a digital certificate?

Technology used to verify a user's identity

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

What is uptime?

The measure of a web host's reliability

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network

If HTML is used to specify the content of the webpage, then what do you use CSS for?

To define the page layout

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

To give you finer control over the content

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel

Virtual private network

Which of the following would be considered a strong password?

Wbcm2!4!820!

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the video tag?

autoplay

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

banner

What does XML use to describe data?

customized tags

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.

false

HTML coding does not allow for lists using bullets. All lists have to be numbered.

false

HTML has remained the same ever since it was developed, which is why there is only one version.

false

Which of the following components on a webpage is created using HTML?

heading

If a website is designed with responsive design concepts, then _____.

it appears correctly on any device regardless of screen size

To access the Internet, a router must be connected to a _____.

modem

A network administrator is usually not required on a _____ network.

peer-to-peer network

Devices on a _____ area network are connected via Bluetooth.

personal

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?

relative reference if not then absolute

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

You use CSS to to specify the appearance of content on a webpage.

true

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to set roles for each person granting responsibility for certain webpages.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A Trojan

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

What is an ISP?

A telecommunications company that sells Internet access.

In which category of software do Microsoft Office Word and Excel belong? (516403)

A:Productivity

What kind of software products can you download from the Internet without being subjected to copyright restrictions? (530488)

A:Public domain software

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

A router is a system of two or more devices linked by wires or cables.

False

Bandwidth is a term that describes the number of devices connected to a network.

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

To prevent a laptop from being stolen, you can use a surge protector.

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

When including an image in HTML code, you would use the < a href > tag.

False

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Why would you include a banner on your website?

It makes the website more easily identifiable to visitors.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line

Why is an FTP client helpful?

It uploads files from your computer to a web server.

What is a popular language for writing scripts that run in your browser to control a webpage's behavior?

JavaScript

Which of the following network standards applies to cellular networks?

LTE

When describing a client/server network, which of the following would be considered a client?

Laptop

Which of the following statements is true about public networks?

Many public networks are not secure.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

Which of the following is an authentication method to keep your data safe?

NOT encryption

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

NOT the network most likely uses a firewall for protection

Why would you want to connect your computer to a network?

Networks allow computers to share resources, such as hardware, software, data, and information

Which of the following best defines responsive design?

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

Publish to a webserver

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network?

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load. (530495)

True

Before you name your website, you need to search for other sites using that name and then purchase a domain name.

True

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only. (516371)

True

If you upload photos to a NAS device, everyone on the network can access them.

True

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. (530499)

True

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

Which of the following is a popular, user friendly CMS often used as a blogging platform?

WordPress

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.

a project

JavaScript likely controls which of the following elements on a webpage?

a slide show

Which of the following websites most likely uses XML-formatted data?

an ecommerce site that lets you compare products from different vendors

When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.

false

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

Which of the following is NOT a feature of an Integrated Development Environment (IDE)?

hosts webpages

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?

how visitors are using the site

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

Which of the following types of websites typically provides the least security?

social media sites

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

After designing a website, you transfer the website files from your local computer to a remote web server.

true

What type of security requires something you know and something you have that no one else has?

two factor authentication

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______.

will allow user interaction

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

with responsive design

Submit Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? (530490)

A:Piracy

Which software development method uses highly skilled programmers to shorten the development process while producing quality software? (530516)

A:Rapid Application development model

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? (530489)

A:Require users to identify themselves using biometrics or passwords.

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? (530503)

A:Shareware

_____ is the process of creating programs and apps from the idea stage to distribution to users. (530520)

A:Software development

Is it advisable to enable automatic updates on security software? (530527)

A:Yes; this helps to catch and quarantine new malware before it harms the computer.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

What would a password manager allow you to do?

Create and store multiple strong passwords.

_____ are tools that track the memory usage, status, and errors of currently running software. (530506)

D:Process managers

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? (530511)

A. integrated development environment (IDE)

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? (530505)

A:Visit the manufacturer's website and install the latest updates for the app.

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? (530500)

A:a crash

Which of the following does a software license usually specify? (530498)

A:number of people authorized to use the software

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

What can you do to make sure you are not contributing to software piracy? (530504)

D:Buy software only from legitimate resellers or directly from the manufacturer.

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? (530534)

D:Fourth generation language

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? (516391)

D:Patch finders

Which of the following is not a general guideline for developers? (530513)

D:Start programming before creating a proposal.

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase? (530510)

D:waterfall method

A Trojan is a malicious program that uses a computer network to replicate.

False

Cloud backup software periodically saves your files and settings to an external hard drive. (530521)

False

Programmers use compilers to test code to find errors and provide suggestions to fix them. (530537)

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

False

Which of the following is the strongest password?

H@veAGr3atDaY!

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps.

During which phase of the SDLC is software tested to make sure each function works as intended? (530517)

Incorrect - C:analysis Incorrect - D:Implementation

File transfer programs belong in what software category? (530525)

Incorrect - D:File, disk, and system management Incorrect - A:Productivity (business and personal)

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

Pretexting

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

biometric security (?)

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

In which of the following situations is a digital certificate useful?

you are signing a rental lease.

At what point are you responsible for following the terms in a software license agreement? (530501)

C:when you click or take another action to accept the terms

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. (516413)

C:wireframes

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? (530532)

C:Tester

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? (530530)

B:Agile development

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? (530496)

B:An uninstaller removes the program files and any associated entries in the system files.

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? (530528)

B:Analysis phase

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? (530524)

B:Antispyware

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? (530491)

B:App Store for iOS

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. (516383)

B:Intellectual property

Which of the following is an example of an object-oriented programming language? (530522)

B:Java

Which of the following programming languages adds interactivity to websites? (530535)

B:JavaScript

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? (530502)

B:freeware

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? (530518)

B:incomplete documentation

What type of program would have a class named Student with objects called fullTime and partTime? (530526)

B:object-oriented program

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? (530492)

B:open source

The set of activities performed to build a program is called the _____. (530514)

B:software development life cycle (SDLC)

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

_____ are new releases of an app and may require an additional fee before you can install them. (530497)

C:Upgrades

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. (530494)

C:digital rights management

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? (530523)

C:firewall

What is the goal of a DevOps methodology? (530515)

C:to produce programs quickly and then offer continuous updates.

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? (516385)

C:Digital Rights Management

_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. (530493)

C:Installation

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? (516409)

C:Interpreters

What defines the behavior of an object in object-oriented programming ? (516392)

C:Method

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? (530512)

C:Project manager

Which commonly used programming language isused to manage, access, and search for database content? (516408)

C:SQL

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? (530508)

C:Site License

A class is a type of object that defines the format of the object and the actions it can perform. (530531)

True

A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions. (516363)

True

When you create an app, you are protected under copyright laws, even before you apply for a copyright. (530507)

True


संबंधित स्टडी सेट्स

Real Estate Principles II - Unit 9 - test

View Set

The Perioperative Patient + Surgical Suite Prep

View Set

Chapter 27 - Japan and the Koreas-

View Set

American Government Ch11,14, 12, 13

View Set

EXAM 3 - CHAPTER 12 PRACTICE (50 Concepts)

View Set