TestOut IT Fundamentals Pro Chapter 5: Section Quizzes 5.2.8 -> 5.5.8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? (5.3.14) A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. Port triggering is redirecting traffic to the wrong IP address. The router has not been configured to perform port forwarding.

A proxy server is filtering access to websites.

Match each term on the left to its definition on the right. (5.2.8) A service or software application that relies on shared resources over the Internet A software application that accesses web applications and websites A company that provides access to the Internet Internet Service Provider An interconnected global public computer network An information system that connects documents to each other by hypertext links ====== Cloud computing Internet Service Provider World Wide Web Internet Browser

A service or software application that relies on shared resources over the Internet (Cloud computing) A software application that accesses web applications and websites (Browser) A company that provides access to the Internet (Internet Service Provider) An interconnected global public computer network (Internet) An information system that connects documents to each other by hypertext links (World Wide Web)

Which of the following should be done to protect your identity when creating a social media profile? (5.5.8) Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.

Always review and set privacy settings.

Web browsers save website information in their _________, which helps the site load faster on future visits. (5.3.14) Memory Cache Storage Repository

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? (5.3.14) Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to block third-party cookies.

Change browser settings to notify before downloading.

_____________ computing refers to services and applications that run remotely over the Internet. (5.4.9) Remote Global Cloud Virtual

Cloud

A service that lets you store data in a remote location over the Internet is called _____________. (5.4.9) Database Online repository Internet backup Cloud storage

Cloud storage

Microsoft OneDrive is a cloud solution that is designed to provide which of the following? (5.4.9) Resource pooling Cloud storage Cloud hosting Cloud computing

Cloud storage

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? (5.3.14) Configure the browser proxy settings. Disable the pop-up blocker. Apply a firmware update. Clear the browser cache.

Configure the browser proxy settings.

Small files that a website saves on your computer to remember your preferences are called ______________. (5.3.14) Reminders Malware Fingerprints Cookies

Cookies

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? (5.5.8) Crowdsourcing media Crowdsourcing platform Crowdsourcing campaign Crowdsourcing website

Crowdsourcing platform

Which of the following are advantages of cloud computing? (Select two.) (5.4.9) Lower speeds Local software Data security Easier collaboration Greater costs

Data security Easier collaboration

Which digital communication medium consists of top-level posts with threads of response posts? (5.4.9) Email client Discussion board Social network Chat room

Discussion board

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) (5.4.9) Adobe Photoshop Adobe Acrobat Reader Dropbox Google Drive Microsoft Word

Dropbox Google Drive

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) (5.5.8) Like, share, and comment on the bullying posts. Post the bully's physical address on social media. Create a public group on social media (such a Facebook group) to confront the bully. Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

What do cloud services provide to help with privacy and security concerns? (5.4.9) Backups Encryption Accessibility Collaboration

Encryption

Which of the following charges resources used, such as bandwidth and processing power, by the second? (5.4.9) OneDrive Microsoft Azure Amazon Web Services (AWS) Google Cloud

Google Cloud

Clickable text or images that take you to different sites on the World Wide Web are called __________. (5.3.14) Shortcuts Navigation buttons Hyperlinks Attachments

Hyperlinks

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? (5.2.8) Local Area Network Internet of Things Intranet Internet

Internet

Which of the following terms describes an organization that connects users to the Internet? (5.2.8) Network Server Web Server Internet Service Provider Data Center

Internet Service Provider

A _________ is a private network that utilizes the same technologies as the Internet. (5.2.8) World Wide Web Wide Area Network Local Area Network Intranet

Intranet

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all. (5.5.8) Largest social media platform in the world Most popular microblogging platform Messaging platform that includes built-in photo editing tools Social network focused on images Provides live video streaming ===== Facebook Twitter Instagram

Largest social media platform in the world (Facebook) Most popular microblogging platform (Twitter) Messaging platform that includes built-in photo editing tools (Instagram) Social network focused on images (Instagram) Provides live video streaming (Facebook)

Which of the following is a category of SaaS applications? (5.4.9) Web hosting Disaster recovery Office tools Virtual machines

Office tools

Which of the following are common risks of using social media? (Select two.) (5.5.8) You can be added to a group without your permission. Personal information can be used without your permission Privacy settings are virtually non-existent. Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

When protecting your online identity, which of the following is an internet security threat you need to be aware of? (5.5.8) USB keyloggers Using personal information Using a different password for each social media platform Phishing attempts

Phishing attempts

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? (5.3.14) Proxy settings Private browsing Invalid certificate Browser cache

Proxy settings

Which medium does Wi-Fi use to send data between networks and devices? (5.2.8) Radio waves Ultraviolet light Cellular signals Bluetooth

Radio waves

What is the term for delivering an application over the internet called? (5.4.9) FaaS IaaS SaaS PaaS

SaaS

Web services that help people meet, interact, and share content with other people online are called ____________. (5.5.8) Social Media Web Servers Internetworks Facebooks

Social Media

Which of the following describes the strategy that defines a businesses social media goals and objectives? (5.5.8) Social channels Social media marketing Search Engine Optimization (SEO) Social Media Optimization (SMO)

Social Media Optimization (SMO)

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? (5.5.8) Idea Brainstorming Startup Financial hardship

Startup

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) (5.5.8) Membership fees Targeted ads Content Usage fees Selling user-generated data to other companies

Targeted ads Selling user-generated data to other companies

Which of the following is used to identify specific hypertext resources on the World Wide Web? (5.2.8) Hyperlink Transmission Control Protocol Uniform Resource Locator Internet Protocol

Uniform Resource Locator

Which of the following technologies can be used to make a phone call over an Internet connection? (5.2.8) UDP VoIP TCP IoT

VoIP

Which of the following is a disadvantage of web applications? (5.2.8) Web applications can require a significant amount of disk space. Web applications can carry a monthly or yearly fee. Web applications can be limited by the hardware they run on. Web applications can connect people in different locations.

Web applications can carry a monthly or yearly fee.

When might it be MOST helpful to clear your browser's cache of temporary Internet files? (5.3.14) When a website is not functioning as it should After every Internet search Immediately after opening a new Microsoft Office document When you switch to a different web browser

When a website is not functioning as it should

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? (5.2.8) Blogs RSS feeds Podcasts Wikis

Wikis

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? (5.2.8) Wide Area Network Internet Intranet World Wide Web

World Wide Web

Which of the following lines will initiate an Internet search from the address bar of a web browser? (5.3.14) testout.com microsoft gov microsoft.com microsoft.org

microsoft gov

A pop-up blocker is a web browser feature that _________________. (5.3.14) keeps the window in a minimized state prevents unwanted advertisements censors Internet searches prevents color images from being displayed

prevents unwanted advertisements


संबंधित स्टडी सेट्स

Naming ionic and molecular compounds

View Set

Homework - BA 388: Globalization and Business Environment

View Set

LFÓ0104 - Æfingaspurningar Kafli 1

View Set