Computer Concepts Final Exam Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following tools translates the source code of a procedural program into binary code? debugger compiler source code editor code repository

compiler

____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. intellectual property copyright digital rights management shareware

digital rights management

All the pet names in a veterinarian's database are stored in a _______ called PetName. table record field worksheet

field

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. ethernet firewall protocol rootkit

firewall

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity? antispyware ransomware firewall disk cleaner

firewall

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program? public domain software freeware Software as a Service (SaaS) custom software

freeware

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you? if visitors dislike the company brand or product if customers are buying products somewhere else if your webpage appears first in search engine results how visitors are using the site

how visitors are using the site

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason? missing prototype incomplete documentation unfinished system proposal inadequate feasibility study

incomplete documentation

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select? integrated development environment (IDE) code repository 4GL development tool cloud development

integrated development environment (IDE)

If a website is designed with responsive design concepts, then _____. it appears correctly on any device regardless of screen size it requires users to scroll from left to right on a device with a small screen it displays small text on all screens it does not allow users to resize graphics

it appears correctly on any device regardless of screen size

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? mobile hotspot Bluetooth connection virtual private network cell phone hotspot

mobile hotspot

To access the Internet, a router must be connected to a _____. network hub switch modem

modem

Which of the following does a software license usually specify? number of people authorized to use the software amount of RAM required to run the software geographic locations where users can run the software steps for installing and uninstalling the software

number of people authorized to use the software

What type of program would have a class named Student with objects called fullTime and partTime? machine language program object-oriented program markup language program procedural language program

object-oriented program

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? freeware open source Software as a Service (SaaS) commercial software

open source

A network administrator is usually not required on a _____ network. peer-to-peer client/server intranet metropolitan area

peer-to-peer

Devices on a _____ area network are connected via Bluetooth. local wide metropolitan personal

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information. standard protocol syntax topology

protocol

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert? absolute reference relative reference targeted reference blank reference

relative reference

Which of the following is an example of a personal area network? computers connected within a city computers connected within a home smartwatch and phone connected via Bluetooth phone and computer connected via Wi-Fi

smartwatch and phone connected via Bluetooth

The set of activities performed to build a program is called the _____. integrated development environment (IDE) software development life cycle (SDLC) object-oriented programming loop prototyping

software development life cycle (SDLC)

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. topologies architectures standards protocols

standards

What do you call the rules each programming language has for writing instructions? source code interpreter syntax grammar

syntax

Contact information for all the people taking a class at a school are stored in a ________ called Students. field record worksheet table

table

The volume of Big Data generated over time is typically measured in terms of ____________. kilobytes characters terabytes records

terabytes

Why would you want to connect your computer to a network? to keep up with computing trends for added security to access shared resources to use the network's operating system

to access shared resources

What is the goal of a DevOps methodology? to follow a linear and structured development cycle. to condense development and create a quality product. to produce programs quickly and then offer continuous updates to create a final, functional product in one development cycle

to produce programs quickly and then offer continuous updates

A national bank processes approximately 1,500 transactions per second. The fact that the bank's database must add this many Big Data records every second refers to its high _________. velocity value variety veracity

velocity

What characteristic of Big Data indicates how closely that data matches reality? velocity veracity volume variety

veracity

A business would use a website analytics tool for all of the following EXCEPT _____. viewing the number of pages a person visited viewing the number of new and returning visitors viewing why someone visited your webpage deciding when to increase bandwidth

viewing why someone visited your webpage

What can a company learn by studying website analytics for its website? the number of headings and images on the website when it needs to increase its bandwidth whether a new corporate logo has increased market value the amount of sales per customer

when it needs to increase its bandwidth

At what point are you responsible for following the terms in a software license agreement? when you purchase the software when you give the software to someone else when you click or take another action to accept the terms when you register the software

when you click or take another action to accept the terms

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ______. will allow user interaction is meant for infrequent updates is cheaper to maintain requires less storage space on a server

will allow user interaction

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another. code DevOps wireframes documentation

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice? premierskills.com wordsmithing.com jin-102887.com R2D2editing.com

wordsmithing.com

Which of the following HTML code samples inserts a hyperlink in a webpage? <img src="http://www.google.com" alt="Google"> <a href="http://www.google.com">Google</a> <link="http://www.google.com">Google</link> <href="http://www.google.com">Google</href>

<a href="http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use? <h1> </h1> <title> </title> <h4> </h4> <main> </main>

<h1> </h1>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work? A CMS does not allow multiple contributors to use it at the same time. A CMS is just another name for a drag-and-drop procedure that anyone can perform without any restrictions. A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role. A CMS just adds capabilities to a website so it does not matter who is working on the website or when.

A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.

Jenson needs to update his home address in his health insurance company's database. Which of the following applications can he open on his computer so he can make these changes? A browser A spreadsheet application An RDBMS A DBMS

A browser

Which of the following would most likely be a static website? A news site A blog A historical facts page An online shopping site

A historical facts page

Which of the following describes an evil twin? A device infected with malware that an attacker uses to control the device remotely. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A modem can also function as what other piece of hardware? A hub A switch A router A network interface card

A router

JavaScript likely controls which of the following elements on a webpage A navigation bar A slide show A copyright notice A hyperlink to another website

A slide show

What is an ISP? A telecommunications company that sells Internet access. A communications device that connects to a communications channel. A central point for cables in a network for data sharing, A system of two or more devices linked by wires, cables, or a telecommunications system.

A telecommunications company that sells Internet access.

What is a MAC address? A unique hardware address for your device The connection needed to access to a cellular network An IP address unique to Apple's MAC computers An alternate name Internet Protocol version 6

A unique hardware address for your device

Which of the following describes a domain registrar? A place that manages web servers and disk space. An administrator who oversees a system's uptime and runs reliability checks. A method for determining the amount of bandwidth needed for a specific website. A website where you can go to purchase a name for your website.

A website where you can go to purchase a name for your website.

Which of these tasks is a non-technical user most likely to have the right to perform in a database? Delete a record. Add new data. Name a field in a table. Create a relationship between two tables.

Add new data.

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted? Waterfall model Agile development Rapid application development Predictive development

Agile development

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device? It can be difficult to find the folder containing the program files. An uninstaller removes the program files and any associated entries in the system files. An uninstaller moves the program files to the Recycle Bin for safety, but deleting a folder permanently removes them. An uninstaller makes a backup before removing the program files.

An uninstaller removes the program files and any associated entries in the system files.

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing? Planning phase Analysis phase Design phase Implementation phase

Analysis phase

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent? Antivirus Antispyware Antispam Firewall

Antispyware

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app? Website called FreeAppleApps App Store for iOS Flash drive containing apps her friend copied Email message containing download link

App Store for iOS

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? RFID NFC Bluetooth IrDA

Bluetooth

Which of the following is true about broadband connections? Broadband connections turn off after a specified amount of idle time. Broadband connections are "always-on" connections. Only a few of today's Internet connections are broadband connections. Broadband connections require a wireless router to increase their speed.

Broadband connections are "always-on" connections.

What can you do to make sure you are not contributing to software piracy? Read and accept all software license agreements. Uninstall apps you are no longer using. Do not use freeware or shareware. Buy software only from legitimate resellers or directly from the manufacturer.

Buy software only from legitimate resellers or directly from the manufacturer.

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem? C++ HTML JavaScript CSS

CSS

File transfer programs belong in what software category? Productivity (business and personal) Communications Security File, disk, and system management

Communications

What does a DSL modem use to send and receive digital data? Copper telephone wiring Cable TV connections A wireless router A network interface card

Copper telephone wiring

Which of the following would most likely be the key paired with a value of "Canada" in a nonrelational customer database? Name Product Affiliation Country

Country

Which data type would be best suited to a field that lists a product's clearance price? AutoNumber Date/Time Currency Number

Currency

Which of the following fields would be most important to encrypt in a customer table? Customer's city Customer's sales representative Customer's status Customer's credit card number

Customer's credit card number

Which of the following could indicate a DoS attack on your company server? Customers are required to enter personal information as they complete an order form. Customers are receiving too many emails about special offers. Customers cannot view the website on their device because the page will not load. Customers cannot download the most recent newsletter.

Customers cannot view the website on their device

Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other? Customers, Orders Customers, Ingredients Products, Orders Products, Ingredients

Customers, Ingredients

What does XML use to describe data? A plugin Code editor Script-language Customized tags

Customized tags

Morgan needs to hire someone to help implement a business intelligence system for her company. What type of professional would be the best fit for this job? Database administrator CEO Data analyst Retailer

Data analyst

Which type of data storage allows for the most variety of data types? Data warehouse Key-value database DBMS Data lake

Data lake

Which data repository type is most likely to include database tables and primary keys in its internal data structure? Data lake Data dashboard Data warehouse Data mart

Data warehouse

Which of the following job roles would most likely need permission to delete records in a Customers table? Accountant Customer service representative Receptionist Database administrator

Database administrator

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution? Access controls Intellectual Property rights Digital Rights Management License Agreement

Digital Rights Management

Which of the following is LEAST likely to be a field in a Customers table? EmploymentDate PhoneNumber LastName Address

EmploymentDate

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? Store the report on a flash drive that you have password-protected with the president's name. Encrypt the data in the report. Send the email without attaching the report and ask the president to call you. Transfer the report to the cloud.

Encrypt the data in the report.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? VPN Extranet Wi-Fi Intranet

Extranet

Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should the FROM phrase say in her query? FROM Students FROM Birthdate FROM Name FROM Schools

FROM Students

Raphael is working with a table in Access. He needs to see all the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table? Filter Query Sort Report

Filter

Which of the following is an authentication method to keep your data safe? Fingerprint scanner Body area network Encryption Software firewall

Fingerprint scanner

Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Forms Queries Tables Reports

Forms

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code? Machine language Assembly language Procedural language Fourth generation language

Fourth generation language

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Major Employer Graduated GPA

Graduated

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link? CSS JavaScript HTML C++

HTML

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes? HTML5 debugger HTML 5 validator HTML 5 code editor HTML CMS

HTML 5 validator

Which of the following components on a webpage is created using HTML? Heading Background Color Slide show Layout

Heading

Which of the following is NOT a feature of an Integrated Development Environment (IDE)? Automatically indents code Hosts webpages Displays tags in a different color Ensures code follows HTML specifications

Hosts webpages

Which data type would be best suited to a field that lists customer email addresses? AutoNumber Date/Time Number Hyperlink

Hyperlink

Which of the following statements do opponents of net neutrality agree with? Access to websites should not be restricted based on content. All Internet traffic should be treated equally. The same level of service should be provided to all websites, regardless of purpose. ISPs should charge more for high-bandwidth connections.

ISPs should charge more for high-bandwidth connections.

Which of the following is NOT a risk to a company or its employees as a result of a data breach? Loss of trust with customers Increased database efficiency Negative media exposure Jailtime

Increased database efficiency

__ is the process of setting up a program or app to work with your computer, mobile device, and other hardware. Activation Registration Installation Upgrading

Installation

Students who complete an online test are not allowed to change their test grades. What aspect of the CIA triad is at work here? Availability Integrity Scalability Confidentiality

Integrity

__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Copyright Intellectual property License agreement Digital Rights Management

Intellectual property

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement? Compilers Debuggers Interpreters Eclipse

Interpreters

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? Wired network Intranet Extranet Virtual private network

Intranet

Why is it important to be able to export data in an XML format? It converts code into HTML for a website. It controls the appearance of a webpage. It is needed to assign attributes. It allows data to be shared between applications.

It allows data to be shared between applications.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? It did not include a promotional offer. It was written in an overly formal tone. The signature was consistent with other emails from his bank. It contained typos and other grammatical errors.

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall? It is a physical device that acts as a protective barrier. It is also called software firewall. It is often built into a company's operating system. It inspects data being transmitted to or from a network.

It is also called software firewall.

Why would you include a banner on your website? It describes your ownership to the general public. It makes the website more easily identifiable to visitors. It identifies the resources you plan to use in your business. It creates a site map for the visitor of your website.

It makes the website more easily identifiable to visitors.

Which of the following is true about XML? It describes content and how to present it in a browser. It stores layout information in a text format for a browser to interpret. It provides a way to classify data and share it between applications. It contains predefined tags to describe placement of content on a webpage.

It provides a way to classify data and share it between applications.

Why is a cable modem classified as a digital model? It only sends digital data over a digital line. It sends and receives digital data over a digital line. It only receives digital data over a digital line. It uses copper wires to enable efficient digital data transfers.

It sends and receives digital data over a digital line.

Why is an FTP client helpful? It previews the webpages before you publish them. It uploads files from your computer to a web server. It creates the domain name for use on the web server. It searches through code to find errors and suggest replacements.

It uploads files from your computer to a web server.

Which of the following is an example of an object-oriented programming language? Fortran Java HTML DevOps

Java

What is a popular language for writing scripts that run in your browser to control a webpage's behavior? HTML CSS JavaScript Python

JavaScript

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed? JavaScript HTML CSS Python

JavaScript

Which of the following programming languages adds interactivity to websites? HTML JavaScript Ruby C++

JavaScript

Which of the following network standards applies to cellular networks? Wi-Fi LTE Phoneline Ethernet

LTE

When describing a client/server network, which of the following would be considered a client? External hard drive Modem Laptop Printer

Laptop

Which of the following statements is true about public networks? Many public networks are not secure. All public networks are free. Your home network is a public network. Hackers cannot intercept data transmitted over public networks.

Many public networks are not secure.

What defines the behavior of an object in object-oriented programming ? Object by itself Class Method Device or platform on which the program runs

Method

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? My Verizon VPN Starbucks Wi-Fi Jenn's iPhone xfinitywifi

My Verizon VPN

What internal device does a computer use to connect to a wired or a wireless network? Motherboard Hub Switch Network interface card

Network interface card

What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database? Relational database Big Data database Backup database Nonrelational database

Nonrelational database

Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using? Relational Proprietary DBaaS Open source

Open source

Which of the following is NOT an RDBMS? MySQL PostgreSQL Microsoft SQL Server Oracle NoSQL Database

Oracle NoSQL Database

Which of the following best defines responsive design? Pages are coded using a series of commands to generate the content. Pages automatically adjust the size of their content relative to the size of the screen. Pages use scripts to provide interactivity. Pages interact with content stored in a database on a web server

Pages automatically adjust the size of their content relative to the size of the screen.

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue? Restorers Auditing tools Process managers Patch finders

Patch finders

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials? Piracy License agreement Digital rights management Access control

Piracy

Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements? Microsoft SQL Server PostgreSQL MongoDB Oracle Database

PostgreSQL

_____ are tools that track the memory usage, status, and errors of currently running software. System information lists Auditing instruments Patch finders Process managers

Process managers

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? Author PageCount Title ProductID

ProductID

In which category of software do Microsoft Office Word and Excel belong? Productivity Graphics and media Personal interest Security

Productivity

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? IT department Designer Project manager Programmer

Project manager

What kind of software products can you download from the Internet without being subjected to copyright restrictions? Public domain software Freeware Open source software Shareware

Public domain software

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet? Specify the format Publish to a web server Convert to a read-only file Compress pages and multimedia content

Publish to a web server

Which software development method uses highly skilled programmers to shorten the development process while producing quality software? Rapid Application development model Predictive development model Agile development methodology Waterfall model

Rapid Application development model

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? Require users to identify themselves using biometrics or passwords. Require users to install antivirus software on their devices. Create a strict license agreement for the app. Display a stern warning on the welcome screen.

Require users to identify themselves using biometrics or passwords.

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario? Process managers Auditing tools Patch finders Restorers

Restorers

When it comes to secure data storage on a network, which of the following statements is true? You cannot save encrypted files on a network attached storage device. Wireless network keys are the safest method for protecting files on a network. Roles can be granted to individuals to view files and make changes to files on a network. Files stored on a network are accessible to all who can access that network.

Roles can be granted to individuals to view files and make

What hardware is essential to creating a home Wi-Fi network? Printer Router Monitor Ethernet cable

Router

Rafael needs to run a query that will show the name and city of all his clients. Which of the following phrases will determine which fields are returned in the query? FROM Name, City SELECT Name, City VALUES Name, City WHERE Name, City

SELECT Name, City

Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage? HTML JavaScript SQL CSS

SQL

What programming language supports relational databases? HTML NoSQL SQL CSS

SQL

Which commonly used programming language is used to manage, access, and search for database content? Java C++ SQL HTML

SQL

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? Service pack Patch Upgrade Restorer

Service pack

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? Shareware Public domain Open source Freeware

Shareware

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? She uses a hub at her home that she connects to through the app. She has installed switches that interact with the installed app on her phone. She has a home network with smart home devices. She dialed into her home modem through the app and sent a command through the router.

She has a home network with smart home devices

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase? Single user license agreement End user license agreement Site license Multiple user license agreement

Site license

Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? A to Z Smallest to largest Z to A Largest to smallest

Smallest to largest

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering A zombie attack An evil twin Spyware

Social engineering

____ is the process of creating programs and apps from the idea stage to distribution to users. Software development Cloud computing System auditing Object-oriented programming

Software development

Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose? Spreadsheet Presentation Database Document

Spreadsheet

Which of these file types is optimized for processing calculations of numbers in a budget? Database Presentation Document Spreadsheet

Spreadsheet

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. Bus Ring Star Mesh

Star

Which of the following is not a general guideline for developers? Group programming activities into phases. Involve users for whom the program is being developed. Define the standards, or sets of rules and procedures, for creating the product. Start programming before creating a proposal.

Start programming before creating a proposal.

Which of the following tables in a database would NOT need to be encrypted? Patient_Records Customer_Payments Employee_Passwords Store_Locations

Store_Locations

Which field could serve as the primary key for a list of students in your school? Phone number Full name Student ID number Birth date

Student ID number

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? Implementation phase Support and security phase Design phase Analysis phase

Support and security phase

The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for? Designer Programmer Tester IT member

Tester

Which of the following is a disadvantage of using cloud computing to share files? The amount of space that files will take up on your computer. The inability to access your files if you lose your Internet connection. The files you will lose if your computer crashes. How long it will take to access a backup of files.

The inability to access your files if you lose your Internet connection

What is uptime? The speed at which data transfer takes place The amount of time you will need to create your website The measure of a web host's reliability The measure of how much time people spend on your website

The measure of a web host's reliability

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? He can use the network only for a limited time. The network connection is probably not secure. He cannot connect to the Internet from the network. The network most likely uses a firewall for protection.

The network connection is probably not secure.

How does a wireless network key work with an encrypted wireless network? The wireless key is the encryption code needed by the receiver to decode the file. The sending and receiving devices must know the wireless network key to communicate. The wireless network needs the key to decode the data before sending. The wireless network key is your password for logging onto an Internet email system to receive files.

The sending and receiving devices must know the wireless network key to communicate.

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is sorted. The table is missing a primary key. The table has been deleted. The table is filtered.

The table is filtered.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? They use adware to fill your screen with unwanted advertisements until you click one. They overload the server with network traffic so webpages will not load. They disguise the network as an evil twin. They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another? They are interchangeable terms for the same hardware. They provide a central point for cables in a network. They transfer data to all devices. They can only connect to a single device.

They provide a central point for cables in a network.

If HTML is used to specify the content of the webpage, then what do you use CSS for? To make the webpage interactive To define the page layout To include multimedia content To connect to other pages with hyperlinks

To define the page layout

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages? To generate a similar look and feel To give you finer control over the content To have the website blend in with others To reflect a common brand

To give you finer control over the content

What is the U.S. Federal Communication Commission's role in regard to Internet access? To rate Internet sites similar to movie ratings To restrict Internet access by location and population To regulate the bandwidth each website can have To release rules surrounding Internet access

To release rules surrounding Internet access

One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task? DELETE INSERT SELECT UPDATE

UPDATE

_____ are new releases of an app and may require an additional fee before you can install them. Service Packs Patches Upgrades Restorers

Upgrades

What area of software development focuses on the user's reaction to and interaction with the software product? Technical feasibility User experience System documentation Quality assurance

User experience

Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Customers Inventory Vendors Employees

Vendors

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? Extranet Intranet Wireless network Virtual private network

Virtual private network

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? Visit the manufacturer's website and install the latest updates for the app. Restart the app and close the error message whenever it opens. Use system software to update the operating system. Uninstall the app and then reinstall it.

Visit the manufacturer's website and install the latest updates for the app.

Kim is writing a SQL query that will pull a list of customers with outstanding orders and the sales rep for each order. What should the WHERE phrase say in her query? WHERE Customer = SalesRep WHERE OrderStatus = Pending WHERE CustomerStatus = Active WHERE SalesRep = Kim

WHERE OrderStatus = Pending

Which of the following would be considered a strong password? Password123 Abc123456789 CatCatCatCat Wbcm2!4!820!

Wbcm2!4!820!

What type of network sends signals through airwaves and usually does not require cables? Wired network Intranet Wireless network Virtual private network

Wireless network

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website? With no graphics, only text With all content on one page With responsive design With a static layout

With responsive design

Which of the following is a popular, user friendly CMS often used as a blogging platform? WordPress Drupal Google Sites Dreamweaver

WordPress

Is it advisable to enable automatic updates on security software? Yes; this helps to catch and quarantine new malware before it harms the computer. No; automatic updates can cause create problems in security software. No; automatic updates require excessive storage space and slow the computer. Yes, though you must pay an additional fee for automatic updates

Yes; this helps to catch and quarantine new malware before it harms the computer.

When using encryption from your home computer, how would you configure the router? You can use the wireless router to set the encryption key and type of encryption. You can use the wireless router to intercept encrypted information and block it from entering the network. You can use the wireless router to verify the security certificate of the encrypted data being sent. You can use the wireless router to encrypt and then decode the encryption on information sent and received.

You can use the wireless router to set the encryption key and type of encryption.

Which of the following would most likely be a key in a key-value database of investment properties owned by a company? Residential ZoneType EnrollmentStatus Active

ZoneType

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app? a crash an activation a patch piracy

a crash

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____. a project an FTP client an absolute reference a consortium

a project

During which phase of the SDLC is software tested to make sure each function works as intended? all phases design analysis implementation

all phases

Which of the following websites most likely uses XML-formatted data? an ecommerce site that lets you compare products from different vendors an ecommerce site that lets you keep a wish list a news site that displays up-to-date headlines an entertainment site that plays videos

an ecommerce site that lets you compare products from different vendors

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag? controls loop autoplay play

autoplay

During a thunderstorm, the database server for Jason's store loses power. This is an example of failed _________. integrity encryption availability confidentiality

availability

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include? dashboard sidebar icon banner

banner


Set pelajaran terkait

Goodbye Class of 2017 (closed to editing)

View Set

BUS 346 midterm review questions (ch9)

View Set

Chapter 5 - Searching and Algorithms

View Set

Life Insurance Exam Practice Questions

View Set

BIOLOGY - Unit 1 ( DNA and Cell Structure )

View Set

Bio: exam 3 review launchpad questions

View Set

Geography 107 Exam 2 HW Questions

View Set