BUS 1305 exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?

A learning management system

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Which company was the first to develop a computer meant for personal use

Apple

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?

Captioning software can be used to transcribe what is being said.

Businesses use webinars for the following reasons EXCEPT

Group discussions

Which of the following is the strongest password?

H@veAGr3atDaY!

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Which of the following would be considered a professional networking website?

LinkedIn

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette-Netiquette refers to the rules of Internet etiquette that guide online behavior.

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury-Genevieve is helping to prevent or reduce repetitive strain injuries (RSI) that impact muscles, nerves, tendons, and ligaments in joints while playing video games by taking frequent breaks. She can also change position regularly during playtime, keep a good posture, and get regular exercise.

___ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks.

The Internet of Things

is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

The digital divide

Cloud storage refers to the storage of data on ______.

a server on the Internet

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

artificial intelligence (AI)

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a

digital detox

Technology can lead to all of the following behavioral risks EXCEPT

higher satisfaction with life

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing-Phishing is when an attacker convinces his or her victim to enter personal information at an imposter website after receiving a fictious email from a bank.

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

speech recognition software

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?

It is using virtual reality.

What is a digital certificate?

Technology used to verify a user's identity

Which of the following is a step in the email communication process?

The message travels along Internet routers to the recipient.

How do advertisers use data to know which products would most likely appeal to you?

They track your Facebook and Instagram posts and "likes."

How might a business use a blog?

To communicate with customers

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.

True

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

How do you create an email message?

Use an app or software to compose and send information.

Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

Verify the content with an authoritative source.-

____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Virtual reality (VR)

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?

Web conferences

How would you describe the social networking site YouTube?

YouTube is a media-sharing network.

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of

a hoax-A hoax is the deliberate posting of content intended to cause harm or mislead people by tricking them into believing something that is false. The Mars hoax first began in 2002 and has resurfaced periodically since then.

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing-Creating a fake profile for the purpose of misleading others or to leave malicious comments on a website is called catfishing.

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ____

digital footprint-All the information about an individual that exists online, including personal accounts, social media posts, communications, online searches, activities, app usage, and even comments and photos posted by other people about the person contribute to that person's digital footprint.

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supportsdigital inclusion

digital inclusion-Digital inclusion is the movement to ensure that all users, regardless of economic or geographic constraints, have access to the devices, data, and infrastructure to receive high-speed, accurate, reliable information. The goal of digital inclusion is to ensure that everyone has access to online resources related to educational, civic, and employment opportunities, healthcare, and communication.

Social networking includes the following positive effects EXCEPT

increasing your privacy

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.

intellectual property rights

The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) _

learning management system (LMS)

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of

the digital divide-The digital divide is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not. By providing free Internet access during the crisis, the Internet service provider enabled more people were able to access Internet-based resources that they needed.

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?

virtual reality (VR)


Set pelajaran terkait

Operating Systems Chapter 1 and 2

View Set

Fathers of physics and equations

View Set

Abnormal Psychology - Anxiety Disorders

View Set

Ch. 18 - Community as Client: Assessment and Analysis

View Set

Basic Livestock Surgical Procedures

View Set

Ch 22: Endocrine Clinical Assessment and Diagnostic Procedures jk

View Set

NUR 412: Nursing Concepts for Pediatric Patients Exam 2

View Set

Peds - Chapter 04: Growth and Development of the Toddler

View Set