B.3.3 FC0-U61 Domain 3: Applications and Software

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following BEST describes the file "/Users/Hannah/Rivers.js"?

"Rivers.js" is best described as an executable file in the "/Users/Hannah/" subdirectory.

Sally is trying to name a folder "Student Grades/1st Period". She keeps getting an error message that reads "The file name cannot contain these characters.". What is wrong with her folder name choice?

/ is a reserved character, which cannot be used in a folder name. The list of reserved characters differs depending on the file system. NTFS has the longest list of reserved characters, and ext4 has the shortest (only one the / character.)

Which of the following is composed of a file's name; the date it was created; its size; whether the file is read-only, hidden, a system file, or an archive file; and who is allowed to see, edit, compress, and encrypt the file?

A file has many attributes beside its name. Modern operating systems and file systems add attributes like date and time created; files size; who can open, modify, and execute the file; and attributes users can modify through markers.

Henry has started his own business. He wants to track daily and monthly sales. Which software could he use to efficiently manage data and perform formula calculations?A good choice for Henry is to use spreadsheet software. With it, he can organize his data in cells and apply formulas for calculations.

A good choice for Henry is to use spreadsheet software. With it, he can organize his data in cells and apply formulas for calculations.

Modern smartphones are amazing devices. They have more computing power than the computers that put a man on the moon in 1969. Which type of operating system do they run?

A mobile OS is designed for a specific phone manufacturer, such as Android OS for an Android phone or Apple's iOS for an iPhone. They cannot be interchanged.

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server can be configured to block Internet access based on website or URL. Many schools and public networks use proxy servers to prevent access to websites with objectionable content. Ports 80 and 443 are used by HTTP to retrieve all Web content. If a firewall were blocking these ports, access would be denied to all websites. Port forwarding directs incoming connections to a host on the private network. Port triggering dynamically opens firewall ports based on applications that initiate contact from the private network.

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

A proxy server is a device that stands as an intermediary between an application such as a web browser and the Internet. It intercepts all requests and uses filter rules to allow or deny Internet traffic. In a scenario where a user cannot access specific websites, proxy settings may very well be the problem.

Diane has been asked to install an operating system on a computer that's going to host a website and store community files for many users. Which type of operating system should Diane install on this computer?

A server OS is designed to provide network services to clients. These include web services, file services, DHCP services, DNS services, and many more.

Processes are programs that run automatically in the background. Which type of process (program) is Windows Task Scheduler?

A service is a program that performs functions like indexing files, backing up files, and scheduling processes. Windows Task Scheduler falls into this category.

You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?

A special type of software called a hypervisor can be used to run multiple operating systems on the same hardware in a process called virtualization.

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder?

A user must have the Full Control permission to set NTFS security permissions.

Julie, a marketing researcher, uses her browser frequently to gather data from a variety of websites. Because many of these websites include pop-windows that can be annoying, Julie has set her pop-up blocker to block all pop-up windows. However, there are pop-up windows for a critical marketing research website that Julie needs to have displayed. What is the BEST solution to make sure the marketing research website pop-up windows are not blocked?

Adding a pop-up blocker exception for the marketing research website is the best solution. The pop-up windows for the website will still be available, while all other pop-up windows will be blocked.

Which of the following software types would be considered collaboration software?

An email client, such as Outlook, Groupwise, or a web-based email client like Gmail or Yahoo! Mail, are examples of collaboration software. Even though the cost of building a network and maintaining it can be high, the ability to collaborate outweighs those costs by creating a collaborative work environment.

Frank has purchased a new smart TV. The new TV has the capability of streaming content over the internet. This is possible because Frank's new TV has which type of operating system?

An embedded operating system is one that has been designed for a specific device and cannot be changed.

Which of the following describes an entity that issues digital certificates to certify the ownership of a public key?

Another way to prove that you are communicating with a trusted source is to use a certificate authority. A CA is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key.

Files that you send along with an email message are called __________.

Attachments are files sent along with an email message. Since attachments can contain malware, only open attachments from sources you trust.

When composing an email message, why might you want to use the Bcc field?

Bcc (Blind carbon copy) hides the contact information of people included on an email sent to multiple parties.

You are vacationing at a friend's cabin on the lake and using the office computer to complete some work-related tasks using a web browser. The browser keeps slowing down after a few minutes of use. You check for extensions (add-ons) and notice that there are several listed. Knowing that extensions can slow down a browser, what should you do to speed up the web browser processing time?

Because extensions can be temporarily disabled, you can disable several of the extensions and then enable them before you leave.

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

Because software companies can't add updates to CDs or DVDs that have already been created, installing an application from these media often requires the user to check the company website for updates.

Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees. Which of the following types of business software could easily provide Hannah with the report she needs?

Business accounting software makes it easier to process payroll, reconcile accounts, and track expenses. This software could quickly generate the report that Hannah needs.

Robert is looking for software that will help him organize tasks and deadlines for his marketing team projects. Which of the following software types will MOST effectively provide the tools that Robert needs?

Business software is designed for advanced or specialized business functions, such as database management, project management, and accounting. Project management software is what Robert needs to organize his marketing team projects.

Caitlin has saved a bluehill.jpg file in a Vacation subfolder on the internal C: hard drive of her Windows 10 laptop. Which of the following is a valid path to the subfolder and file?

C:\Caitlin\photos\Vacation\bluehill.jpg provides a valid path using backslashes to indicate subfolders (\Caitlin\photos\Vacation) and a final path to the file (\bluehill.jpg).

Which installation method is most likely to put your computer at risk of downloading a virus?

CD, app store, and subscription installations usually come from reputable companies. Internet installations, on the other hand, are often from unverified sources.

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions at the same time. What is another name for the instructions?

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions, or processes, at the same time.

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies are small files that a website saves on your computer to remember your preferences. Cookies are also small sweet cakes that are typically round and can be eaten with milk.

If you select a file on your desktop and delete it, what happens to the file?

Deleted files are sent to the Recycle bin. From there, they can either be restored to their original location or permanently removed from the computer.

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Device drivers help computers to communicate with hardware peripherals from different manufacturers.

While editing a report in Google Docs, April receives a web browser error message that there's a conflict with a Google add-on that she frequently uses. Which of the following is the BEST solution for April to resolve the error message issue and continue editing the report?

Disabling an add-on temporarily stops the add-on from functioning, but it can then be easily enabled or turned back on. April could then continue editing the report and enable the add-on again after finishing the editing.

Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files?

Encryption is another security mechanism used to secure files from prying eyes.

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?

Entering one or more search terms in the web browser address bar forwards them to the default search engine and returns information and URLs about the search terms, which you can use to continue exploring the internet.

.exe, .msi, .app, .bat, .cmd, .vbs, .js, and .ps1 extensions are examples of what kind of files?

Executable files contain code that can make changes to the computer system. Make sure you know each type of executable file extension. To run an executable file, you must have administrator-level user rights.

Ben wants to format his flash drive so it can be read on many types of devices, such as game consoles and different desktop computers running different operating systems. Which file system should he format his flash drive to so it can be used this way?

FAT32 is the best choice because it provides the best compatibility between different types of devices.

Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of the following tools should he use?

File Explorer, formerly known as Windows Explorer, is a file management application that comes with Windows. File Explorer's main purpose is to let you view, open, copy, move, and otherwise manage your files and folders.

Cynthia is part of a team that uses a cloud-based collaboration solution. She is editing a shared spreadsheet when she notices that other people's work is not appearing on her copy. What is the problem in this scenario?

File synchronization ensures that multiple locations have the same up-to-date files. If a file is changed, the synchronization process makes sure the corresponding file at other locations is edited. Cloud-based solutions make it easier to sync, save, and secure information.

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?

Firmware functions as a rudimentary operating system for electronic devices that wouldn't normally be considered "computers."

Pat has purchased a new piece of design software. After installing the software, she realizes that it's not performing as expected. After an internet search, she finds out that her video card's graphics microchip needs to be updated. What is the software embedded in a microchip called?

Firmware is the software programed into a microchip. A good example of firmware is a computer's BIOS system. Through a firmware update, a device's program can be updated to include new instructions or tools.

Which of the following provides the ability to control which websites can run client-side scripting in your web browser?

For greater control over the websites that can run client-side scripts in your web browser, you can install a script blocker add-on for the browser.

Tom has a 7-gigabyte file he wants to put on a 16-gigabyte flash drive. To be able place this large file on the flash drive, what must Tom do to this flash drive first?

Formatting the flash drive to NTFS will allow file sizes larger than 4 gigabytes.

Which option should you choose to send an email you've received to a new person?

Forward is used to redirect an email to someone other than the original author.

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.)

Google Drive is a cloud-based file storage and synchronization service developed by Google that runs from the cloud. Dropbox is a file hosting service that is cloud-based and offers cloud storage, file synchronization, personal cloud, and client software.

Henry has an older MAC computer running Mac OS 8.1. He needs to format a hard drive to put in this older computer. Which file system would work BEST for this older computer?

HFS+ is the best choice. It is compatible with both older MacOS versions and newer Mac OS X versions.

You have just purchased a new keyboard and mouse combo and need to configure them. Where in Windows 10 would you go to do this?

In Windows 10, the Settings App customizes how the computer looks and functions. The Settings App lets you make most configuration changes. To configure a mouse and keyboard, you would go to the Devices section under the Settings App.

What is the name of the menu in the bottom left corner of the Windows environment?

In older versions of Windows, the Start button says the word "Start" directly on it. In newer versions, the Start menu is stylized with the Windows icon.

In your Pictures folder, you have a file named "BlueSkies:Pacific-3.png". Which file system are you using?

In the ext4 file system, the only reserved character is the / character, which is not used in the picture file name. All the other file naming systems reserve the ":" character, which means the file name could not be created by a user in the file system.

What is junk email?

Junkmail is a term for unwanted, unsolicited email. Ads, hoaxes, and scams can all be considered junkmail.

Jacob, a system manager, is performing tasks in a command line interface and wants to access the "/usr/local/share/blueskies.bmp" file. Which file system and file type is he trying to access?

Linux uses the forward slash (/) as a directory (folder) delimiter. Windows uses the back slash (\). A .bmp file is an image file format. This means that Jacob is using a Linux operating system, and blueskies.bmp is an image file.

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local Installation is the traditional method for delivering applications by installing them on individual desktop or laptop computer systems. This delivery method does not require a network or internet connection.

Shelley is a marketing representative for an import/export business. Every time she meets with a customer, she uses a custom application installed on her laptop to update the customer account. The updated information is then sent to a company database server that's located in the corporate office. Which of the following is the application architecture model that Shelley is using to update customer information?

Locally installed business applications that store and retrieve data from a central data repository represent a two-tier architecture model. In this case, Shelley is using a custom application installed locally on her laptop to access and edit information from a central database (located in the corporate office).

Which of the following describes the firmware in gaming consoles, TVs, and smart cars?

Many devices, such as gaming consoles, televisions, and smart cars, have embedded operating systems called firmware.

Christopher is surfing the web and sees an amazing offer for a product he's interested in. He clicks the link and begins the process of purchasing the item. While he is proceeding with the purchase, he notices that the address bar is a maroon color. Should he proceed with putting in private information and purchasing the item from this site?

Maroon is an indicator of an invalid certificate. You should be careful in this situation. Your browser will ask you if you want to continue even though this is a potential security risk.

Which of the following is NOT an example of an operating system?

Microsoft is a company. Windows, Linux, and Android are all operating systems.

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?

Modify provides the ability to view and change a file and file properties. Additionally, this includes the ability to add or delete files from a folder.

Frank has worked for an insurance company for many years. The applications Frank uses are kept on local servers in the office building. Frank's company wants to save on costs and wants to have employees work from home.Which solution can Frank's company use to allow its employees to access the applications they need from anywhere and save on costs?

Most companies are taking advantage of cloud-hosted models to allow remote access to applications. The drawback is that the client and cloud service must have reliable internet connections.

Which of the following are web browsers? (Select two.)

Mozilla Firefox is a web browser created by Mozilla Corporation but purchased by Microsoft. Google Chrome is a web browser provided by Google.

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive?

On Windows 7 systems, you must first download and install the OneDrive client software from Microsoft's website. Windows 8 and later systems have the OneDrive client software installed by default.

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment?

On a Windows operating system, the Settings app allows you to customize many aspects of your computer's performance.

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier is an application architecture model where programs run as standalone applications on a single computer.

Which category of system software provides a platform for application software to run on?

Operating systems provide a platform that other applications can run on.

Which of the following divides a single physical disk into multiple logical drives called volumes?

Partitioning is the process of dividing a single physical disk into multiple logical drives called volumes.

Which of the following commands makes an application shortcut appear on the taskbar?

Pin to taskbar is used to make icons stay on the taskbar.

Lorraine, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken. Which of the following installation types does this BEST describe?

Plug-and-play driver installation means that when the device is plugged in, Windows automatically detects the device and installs the driver. Because Lorraine was able to plug in the mouse and no further interaction was needed, this scenario describes a plug-and-play driver installation.

A pop-up blocker is a web browser feature that _________________.

Pop-up blockers prevent some unwanted advertisements from appearing. However, they can also block helpful programs, such as the labs in this course. Because of this, pop-up blockers should be disabled on sites that use pop-ups for legitimate purposes.

While using Microsoft PowerPoint to create a company presentation, Jared notices that PowerPoint starts slowing down. Eventually none of the features become accessible and the program will not close. He decides to use Task Manager to stop the program from running. Which operating system management role is Jared using?

Process management is a role of the operating system that manages the application code running in memory. Task Manager is process management tool that lets you shut down processes that are not responding in a computer's interface.

Which permission option lets a user view files but not change them?

Read/Write, Administrator, and Owner roles all have permission to change files. Read or Read Only roles let users view the data but not change it.

Which option should you use to respond to every single person included on an email?

Reply All sends a message to the original author of an email, as well as all other recipients.

Match each collaboration tool on the left to its description on the right.

Resource management software keeps track of progress and assignments for large tasks. Collaborative editing software allows multiple users to work on a document at the same time. Discussion boards are online forums where discussions consist of threads of comments responding to an original post. Calendaring software keeps track of people's schedules, making it easier to know when people are free or busy. Screen sharing software broadcasts one user's screen to other users.

The Windows operating system provides several default system folders, including Windows, Program Files, and Users. Which of the following BEST describes why a Windows application would store its user-created files in a Users folder instead of its application folder (under Program Files)?

Security access controls allow operating systems to separate application files from user data files to prevent users from modifying the application files.

After working for a large corporate company for years, Tom has decided to start his own consulting company. He has hired a few people and has a list of loyal customers. He realizes he's going to need some software tools to help him run his new company efficiently. He needs software that can process orders, do business accounting, and run his payroll. He also needs software to organize sales leads and contacts. Which category of software should he look for?

Software that falls in the accounting and commercial area is used for purposes like accounting, order processing, and payroll. It is also used for what we call CRM, or customer relationship management. This type of software tracks sales leads and assists in marketing.

Which of the following applications can be used for storing, modifying, extracting, and searching data?

Software that is designed for creating databases and managing the information stored in them is referred to as database software.

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC?

Task Manager has many uses. One of which is being able to see performance information for your CPU, memory, hard drive, and other PC components. Another good idea to keep from running low on memory is to add more physical memory.

On a Linux system which directory contains applications and files used by users?

The /usr contains applications and files used by users.

A graphic designer is backing up some video files from a Windows desktop to a new 128-gigabytes flash drive. An error message appears indicating that a 6-gigabyte video file cannot be copied due to file size limitations. The graphic designer contacts the company help desk for a solution to the problem. Which of the following would be a solution that the help desk could offer?

The NTFS system is a Windows file system that supports a maximum file size of 16 exabytes, much more than the 6 gigabytes the video file needs.

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)

The Processes tab lets you switch to, start, or end an application. You could also use the Details tab to kill the process associated with the Internet Explorer application. Use either tab to stop a program that is not responding.

Which of the following operating systems require a file extension to execute a program?

The Windows operating system requires executables to have a file extension such as .com or .exe in order to execute a program.

Clickable text or images that take you to different sites on the World Wide Web are called __________.

The World Wide Web is a vast number of hypertext documents connected to each other through the Internet. Clickable text or images that direct you to another hypertext document are called hyperlinks.

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?

The background area of the Windows environment is referred to as the Desktop. Many users set pictures or patterns as their desktop background.

Web browsers save website information in their _________, which helps the site load faster on future visits.

The browser cache is a repository of temporary files which help websites load faster once they've already been visited.

When might it be MOST helpful to clear your browser's cache of temporary Internet files?

The browser cache stores temporary files that help previously-visited websites load faster. However, if these files become corrupted, they can make websites work incorrectly. Clearing the cache is a good troubleshooting step when trying to get a website or web app to work.

You are replacing your graphics card and want to uninstall the current driver. Which of the following would be the BEST method to uninstall the driver?

The easiest and most effective method to uninstall a device driver is to uninstall the software package that was originally installed with the device. This should remove all software and drivers associated with the device.

What of the following is a reserved character in the ext4 file system?

The ext4 file system allows all character except / to be used in a filename.

Christian has logged onto his bank's website. He wants to pay some bills electronically and transfer funds to his savings account. He checks to see if the padlock icon is visible in the address bar. The padlock is there, and it is green. What does that indicate?

The green padlock means the certificate for this site is highly trusted. To get a high assurance certificate, the website owner must go through a more rigorous validation procedure.

An IT manager wants to limit the rights of employees whose job is to simply create and modify new database records. What is an access control principle that would help them accomplish this?

The principle of least privilege is an access control principle that states that a user should only be given the permissions or rights they need to do their job and no more. It could be used by an IT manager to limit employee access to database functionality.

The idea that users should only have computer permissions sufficient to perform their job role and no more is called what?

The principle of least privilege is the idea of only giving users enough permissions to do their job and no more. Giving a person more permissions than they need is considered a security risk.

Email and instant messaging (IM) seem to be very similar. What is the major difference between the two communication systems?

The reason IM is considered instantaneous communication is because the two recipients are logged into the same IM server and use the same IM client software.

Sam has installed a new software game onto his computer. He reads on the internet that if he updates his video card driver software, the game will perform better. He installs the latest driver for his video card, but after installing the driver, it causes other problems on his computer. What is the simplest way Sam can fix this issue?

The simplest way to fix this issue is to roll back the driver to the original driver. This will get his computer back to its original state. Then he can find alternative ways to make the game perform better.

What is the name of the narrow strip along the bottom of the Windows environment?

The taskbar is at the bottom of the screen by default but can be relocated to the sides or top of the screen.

A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?

The user has already waited for the application and therefore the best option is to use Task Manager to kill (or end) the task.

Designations at the end of file names such as .docx and .html are called _____________.

They are called file extensions. File extensions tell the operating system how it should treat the file and which application should be used to open it.

Alice is an architect for a large design company. She spends most of her day working in a software program called AutoCAD. What do we call this type of software program?

This type of software falls under the business software umbrella, but it has a specific industry use. Not all businesses use it, unlike databases or project management tools, which can be used by all kinds of industries.

What do you call the software that can communicate with a computer's hardware, provides a user interface to accept commands, maintains a filing system, and has built-in security features?

To be considered an operating system, software must provide four main features: a way to communicate to hardware through drivers, a user interface so a user can issue commands (graphical or command line), a filing system, and system security features.

Which of the following indicates that a website is using a valid digital certificate to secure the website and encrypt data?

To determine whether a website is using a certificate for security and data encryption, look for the padlock symbol in the address bar (sometimes green, but mostly gray).

Tom has started the Task Manager tool and sees a process he would like to stop. He has tried many times to stop the process, but the computer keeps asking him to log in as an administrator. What is the problem in this scenario?

To stop or start a process, a user must be logged in as an administrator. This is an important security feature; it can keep malware from disabling the virus software.

Which of the following lines will initiate an Internet search from the address bar of a web browser?

Typing anything that isn't a valid website into the URL bar of a modern web browser will run an Internet search on the browser's default search engine.

Which of the following file extensions indicates a compressed file?

Unix and Linux use a .tar extension for archiving. It does not compress unless it has the .gz extension added, as in file.tar.gz.

Which option should you use to respond to the sender of an email but not all the recipients?

Using the Reply option sends an email to the author of an email but excludes other people included on the original message.

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?

Utility software analyzes, configures, optimizes, or maintains a computer system.

Katy has uninstalled a photo editing application, but an icon still appears on her web browser for the application. Which of the following is the BEST solution for getting rid of the icon?

When installing an application, the installation program might also install an add-on to the default web browser to extend its functionality. However, uninstalling the application might not remove the add-on. The best solution is for Katy to simply remove the add-on from the web browser to complete the uninstall process.

Which of the following is the BEST example of using an application that is locally installed without network access?

When using PowerPoint locally on a device, you do not need access to the network to create a presentation.

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?

Windows typically has a driver for most printers. But if Windows 10 happens to not have a driver for your printer, visit the website of the printer's manufacturer, download the correct driver, and then install it.

Which of the following file system features uses a change log to track file changes in the file system?

With journaling, every time a file changes, the file system makes a note in its change log to help prevent data loss.


Set pelajaran terkait

COBA Core Econ 2010, Acct 2050 test bank questions, COBA Core MKTG 2400, COBA Core MGT 3680 Review, FIN 343, COBA Core Acct 2060, COBA Core Econ 2020, BUS 3265 Test Bank Questions

View Set

Social Cognition Quiz- Social Psychology Chapter 3

View Set

Module 5 - Lecture 5 (Mature Oceans)

View Set

CH 4 RELATIONSHIPS, DUTIES, AND DISCLOSURE

View Set

Leading marines study guide 2: promotion system

View Set

Brunner Chapter 54 Test Bank: Management of Patients with Kidney Disorders

View Set