BUS 1305 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?

"https" as the protocol in the URL The presence of "http" at the beginning of URL conclusively states that the website in not secure.

Which of the following stories can be said to be in the public domain?

A copyrighted story whose copyright has expired A story is considered in the public domain when its copyright has expired or has been explicitly released by the owner.

Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?

A desktop computer

The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?

A learning management system

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

Acceptable use policy (AUP)

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

Android

Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study? You Answered

Articles published in a newspaper known to be neutral toward any political party An authentic source of information does not have a bias; it offers an objective point of view. It gains credibility by being cited on other websites and publications. Hence, a political commentator's website that is popularly quoted is a good information source for the study. Any other unbiased sources would also be authentic.

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Correct!

Be cautious about what information she posts.

Which of these is an optical medium of storage?

Blu-ray disc

Which of these is an optical medium of storage?

Blu-ray discs

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?

Captioning software can be used to transcribe what is being said.

In a web app, where is data usually stored?

Cloud storage When you use a web app, the data is stored in the web app's server or in the cloud.

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which of the following problematic behaviors relies on the use of digital technology?

Cyberbullying

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?

Drop box

Which of the following does a secure website use to safeguard transmitted information?

Encryption

An e-commerce website offers fewer models, colors, and sizes than a physical store.

False

Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?

Gamepad

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

_____ is data and instructions entered into the memory of a device. Correct Answer

Input

What is one advantage of a company using an anonymous messaging app?

It allows for honest feedback without disclosing identities.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?

It is using virtual reality.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

JPEG

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.

Meeting invites

What are "hits" that search engines list on the first page?

Most relevant results

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?

Native app

Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?

Other search engines provide more reliable research. There are search engines like Google Scholar that are specifically designed for online research, and hence more suited for it.

What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?

Plotter

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?

Plug-and-play devices

Which is the most suitable device to use in a classroom or a conference room to deliver presentations?

Projector

Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Remove the battery and throw it in the trash.

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury

In the email communication process, what is the role of the email server?

Routing email messages through the Internet or a private network

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?

Share the post on your news feed.

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?

Social curation sites

Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?

Spiders The other name for spiders is crawlers. They comb the web to gather information about the webpages they visit.

What is a digital certificate?

Technology used to verify a user's identity

_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks. Correct Answer

The Internet of Things

Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?

The author uses emotional language to express a single point of view.

____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

The digital divide

A specialty search engine lets you search online information sources that general search engines do not always access.

True

How is an executable file different from a data file?

Unlike a data file, you cannot open and read executable files.

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

How do you create an email message?

Use an app or software to compose and send information.

Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?

Use the web directories created by health research institutions.

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Virtual reality (VR)

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?

Web conferences

Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?

Yes; it is a business transaction on a consumer-to-consumer website.

In which of the following situations is a digital certificate useful?

You are signing a rental lease.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

How would you describe the social networking site YouTube?

YouTube is a media-sharing network.

What does a B2C website use to track the items you select on the website?

cookies

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

A(n) _____ contains the instructions your computer or device needs to run programs and apps.

executable file

You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated.

false

ocial networking includes the following positive effects EXCEPT _________.

increasing your privacy

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.

intellectual property rights

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

Which of the following would be considered a professional networking website?

linkedin

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

list of posts with the most recent ones at the top

What rules should guide your behavior when you interact with friends and coworkers on social media?

netiquette

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

An operating system is also called a(n) _____.

platform

Which of the following is typical content for a podcast?

radio shows

Which of the following types of websites typically provides the least security?

social media sites

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

speech recognition software

What is the main purpose of an operating system?

to coordinate the resources and activities on a computer

What type of security requires something you know and something you have that no one else has?

two factor authentication

Which of the following is assigned to each webpage to identify its location on the Internet?

uniform resource locator (URL)

A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.

webpage not website

Google is an example of which type of website?

A search site

Where can you find the information about using an image that you obtained in a search result?

A usage rights filter shows information about using an image.

Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?

Add a formal citation and use the farmer's explanation in his paper.

Which of the following people will benefit the most from using a B2B website?

Akiko, who helps smaller businesses establish themselves in the market

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?

BCC your supervisor in your response

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce website will Blackbaud have?

Business to business Business-to-business (B2B) e-commerce involves transferring goods, services or information between businesses. B2B services include technical support such as the one offered by Blackbaud to nonprofit organizations.

Which of the statements about B2B e-commerce is correct?

Examples of B2B services are advertising, technical support, and training.

Kyle likes to keep in touch with his friends and family using the Internet. He enjoys sharing pictures, music, and ideas. He also enjoys playing games with others online. Which of the following online platforms should he use to do all of this?

Facebook, because it is an online social network that allows game play

Which of the following is a web app?

Google Docs

usinesses use webinars for the following reasons EXCEPT _____.

Group discussions

Which of the following is the strongest password?

H@veAGr3atDaY!

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?

He should have periodic anti-virus scanning and software upgraded on all computers

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?

Price comparisons from different vendors

Which of these is not an input device?

Printer Printer prints out information stored in the memory of a computer - hence is an output device.

Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?

Processor core - some applications, especially games, have greater processor requirements

laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

Reset the old phone to factory settings.Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Which of the following is a step in the email communication process?

The message travels along Internet routers to the recipient.

How do advertisers use data to know which products would most likely appeal to you?

They track your Facebook and Instagram posts and "likes."

How might a business use a blog?

To communicate with customers

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.

True

What is the binary system?

a number system with two digits, 0 and 1

Cloud storage refers to the storage of data on ______.

a server on the Internet

Which company was the first to develop a computer meant for personal use

apple

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

artificial intelligence (AI)

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

digital citizenship

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

digital detox

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

digital footprint

Posting hostile or insulting comments in response to someone else's blog post is called _____.

flaming

Samantha has a file named vacation.jpg. What type of file is it?

graphics file

Which of the following is not an input device?

headphone

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) ______.

learning management system (LMS)

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

When you want to add information to a document, what role does your operating system play?

saves your unsaved work to temporary storage

Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate? Correct!

scanner

On what type of network can you rent things such as cars, tools, and rooms?

sharing economy network

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.

sing your photos and posts to form impressions about your character

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

the digital divide

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?

virtual reality (VR)


Set pelajaran terkait

Programming Fundalmentals II — Test 3

View Set