CSCI Final Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making?

3-D animation

Which of the following video resolutions produces the sharpest images and the largest files?

4K

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href= "http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to set roles for each person granting responsibility for certain webpages.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

JavaScript likely controls which of the following elements on a webpage?

A slide show

What is an ISP?

A telecommunications company that sells internet access.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A trojan

What is a MAC address?

A unique hardware address for your device

Which of the following describes a domain registrar?

A website where you can go to purchase a name for your website.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

How would you design a webinar that would be interactive?

Add a poll

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer.

Why should we use an uninstaller that comes with an operating system rather than the system

An uninstaller removes the program files and any associated entries in the system files.

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored as digital data?

As a list of the binary color numbers for all the pixels it contains.

______ programs and features are often integrated into video editing software.

Audio-editing

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?

BCC your supervisor in your response

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment.

Why is it not safe to connect to public WiFi networks?

Because these networks are rarely protected.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer.

Biometrics

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

What can you do to make sure you are not contributing to software piracy?

Buy software only from legitimate resellers or directly from the manufacturer.

What do engineers use to create highly detailed and technically accurate drawings.?

CAD software

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital rights management

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Norma is a graphic designer creating a logo that will be resized often. Which of the following file formats should she choose to create the logo?

EPS

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

Which of the following is the strongest password?

H@veAGr3atDaY!

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?

HTML

Daria created a webpage and wants to make sure her code meets the latest HTMl 5 standards. What can she used to check for errors such as deprecated tags and missing attributes?

HTML 5 validator

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

What is one advantage of a company using an anonymous messaging app?

It allows for honest feedback without disclosing identities.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. how is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

If a website is designed with responsive design concepts, then ______.

It appears correctly on any device regardless of screen size.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomeware because it is telling her she has to verify payment information to unlock her computer.

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

Why is a cable modern classified as a digital model?

It sends and receives digital data over a digital line.

Why is an FTP client helpful?

It uploads files from your computer to a web server.

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk next to them as required fields. code in which of the following languages can check to make sure all required fields are completed?

JavaScript

Which of the following programming languages adds interactivity to websites?

JavaScript

In terms of privacy, which of the following is a best practice?

Keeping your social security number hidden in a locked box in your home.

Which of the following network standards applies to cellular networks?

LTE

How does discarding computers in a landfill affect the enviornment?

Lead and mercury in computer parts are seeping into the ground and water supply.

Which of the following is NOT an image format to store photos?

MP3

Which of the following statements is true about public networks?

Many public networks are not secure.

What defines the behavior of an object in object-oriented programming?

NOT class

How do you create an email message?

NOT use a web service and create an account

Which of the following best defines responsive design?

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

You can monitor and protect your financial data in all of the following ways EXCEPT

Requesting a credit report and freezing your credit.

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

Which commonly used programming language is used to manage, access, and search for database content?

SQL

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?

Share the post on your news feed.

You are dropping your friend back home after a night at the movies. From the care, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

A growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

Site license

What is a digital certificate?

Technology used to verify a user's identity.

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you ose your internet connection.

What is uptime?

The measure of a web host's reliability.

Which of the following is a step in the email communication process?

The message travels along internet routers to the recipient.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?

They disguise the network as an evil twin.

If you do not want to use your internet service provider (ISP) for your email account, how can you acquire a webmail account?

Through an online service

If HTML is used to specify the content of the webpage, then what do you use CSS for?

To define the page layout

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

To give you finer control over the content

What is the U.S. Federal Communication Commission's role in regard to internet access?

To release rules surrounding internet access

How is streaming a video different from downloading it?

Unlike streamed content, downloaded content is stored on the computer.

Social networking can leave you exposed to criminal activity in the following ways EXCEPT ______.

Using your photos and posts to form impressions about your character.

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

Visit the manufacturer's website and install the latest updates for the app.

In his small business, Adrian wants to use his laptop to place a receive phone calls. What type of service should he use?

Voice over internet protocol (VoIP)

Which of the following audio formats does not use any compression technique?

WAV

Which of the following would be considered a strong password?

Wbcm2!4!820!

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?

Web conferences

Which of the following is a popular, user friendly CMS often used as blogging platform?

WordPress

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer.

In which of the following situations is a digital certificate useful?

You are singing a rental lease.

Which of the following statements about browser settings is false?

You must keep your accumulated web history as long as you use the browser.

How would you describe the social networking site YouTube?

YouTube is a media-sharing network that lets users display and view videos and then post comments.

Which of the following would most likely be a static website?

a historical facts page

An integrated development environment (IDE) stores files and folders for your website in a directory called ______.

a project

A business can use a wiki in the following ways EXCEPT ______.

aggregating content

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

agile development

During which phase of the SDLC is software tested to make sure each function works as intended?

all phases

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?

animated GIF

A movie animates the credits and the title as 3-D text sinking in the ocean. Which of the following types of software was most likely used to achieve this effect?

animation software such as after effects

If you want to remove an older email from your inbox, but not permanently delete ie, you can ______ it.

archive

Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?

artificial intelligence and machine learning

______ ensures that the person requesting access to a computer is not an imposter.

authentication

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the video tag?

autoplay

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

banner

Which type of graphics assigns a color to each pixel in an image?

bitmap graphics

Which of the following tools translates the source code of a procedural program into binary code?

compiler

What does a DSL modem use to send and receive digital data?

copper telephone wiring

There are various risks from attacks on WiFi networks. These include all of the following EXCEPT

creating malware

What does XML use to describe data?

customized tags

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of _______.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

______ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.

digital rights management

Kareem wants to include line drawings of abstract shapes on his personal website. What should he use to acquire the graphics?

drawing software

[email protected] is an appropriate email address to use for communicating with potential employers.

false

Netiquette only applies to social media and social networking, not emails and instant messaging.

false

Twitter is an example of a wiki, which allows for collaborative editing by its users.

false

What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

firewall

Posting hostile or insulting comments in response to someone else's blog post is called _____-.

flaming

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

freeware

Nadie is shopping for a phone that can take photos and identify their geographical location. What feature should she look for when comparing phones?

geotagging

Businesses use webinars for the following reasons EXCEPT _______.

group discussions

Which of the following components on a webpage is created using HTML?

heading

Which of the following is NOT a feature of an Integrated Development Environment (IDE)?

hosts webpages

Carlos is creating an animation by drawing one image in a frame, followed by another image in a slightly different pose, and so on until the motion is complete. What is this technique called?

in-betweening

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

incomplete documentation

Social networking includes the following positive effects EXCEPT

increasing your privacy

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

integrated development environment

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

The quality of an audio file is determined by ______

its bit rate

Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?

license filter

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

list of posts with the most recent ones at the top

To observe profesional messaging guidelines, you should avoid using the following EXCEPT ______.

meeting invites

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

What internal device does a computer use to connect to a wired or a wireless network?

network interface card

Which of the following does a software license usually specify?

number of people authorized to use the software

What type of program would have a class named Student with objects called fullTime and partTime?

object-oriented program

Scott is seeking a position in an information technology department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?

open source

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

patch finders

Devices on a ______ area network are connected via Bluetooth.

personal

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

piracy

Which of the following forms of identify theft involves posing as a legitimate researcher to ask for personal information?

pretexting

In which category of software do Microsoft Office Word and Excel belong?

productivity

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

After creating a webpage with HTML code, what do you need to do so that others can access it on the internet?

publish to a web server

Which of the following is typical content for a podcast?

radio shows

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?

relative reference

When you create a wireframe drawing and the apply highlights and shadows to it, the process is called ______.

rendering

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

Which of the following properties affects the quality of digital images?

resolution

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexi does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

restorers

What hardware is essential to creating a home Wi-Fi network?

router

In the email communication process, what is the role of the email server?

routing email messages through the internet or a private network

A process called _____ converts analog sound waves into digital sound.

sampling

What two factors determine the quality of digital audio?

sampling rate and bit rate

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?

service pack

On what type of network can you rent things such as cars, tools, and rooms?

sharing economy network

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?

social curation sites

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

social engineering

Danielle wants to recored a voice-over to add to a presentation. Other than a microphone, what dose Danielle need to record the audio?

sound recorder software

What technology can be used by people with a hearing disability to listen to a narration?

speech recognition

During which phrase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

support and security phase

What do you call the rules each programming language has for writing instructions?

syntax

Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What technology does the smartphone use to make the assistant respond to Edwin?

synthesized speech

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _______.

the HTMl coding

What does a file format refer to?

the organization and layout of data in the file

Why would you want to connect your computer to a network?

to access shared resources

How might a business use a blog?

to communicate with customers

What type of security requires something you know and something you have that no one else has?

two factor authentication

Which of the following kinds of information can be commonly inferred from a video file format name?

video codec compatibility

What facilitates bundling of video, audio, codec, and subtitles into a single package?

video container

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the internet at a hotel?

virtual private network

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phrase?

waterfall method

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth

At what point are you responsible for following the terms in a software license agreement?

when you click or take another action to accept the terms

Christian wants his company's blog to be informative, have a search function, and allow users to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website ________.

will allow user interaction

One way to create a solid 3-D image for 3-D animation is to apply highlights and shadows to a ______.

wireframe drawing in a process called rendering.

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

with responsive design

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

with simulators using motion-sensing consoles

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com


Set pelajaran terkait

Ch 12 - Project Procurement Management

View Set

Quiz #4 - Systems of Linear Equations

View Set

Level 1 Google Certification Questions

View Set

Chapter 1: Themes and Theories in Developmental Psychology

View Set