Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

If HTML is used to specify the content of the webpage, then what do you use CSS for?

To define the page layout

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

Is it advisable to enable automatic updates on security software?

Yes; this helps to catch and quarantine new malware before it harms the computer.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

An uninstaller removes the program files and any associated entries in the system files.

The news report a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment.

Why is it not safe to connect to public Wi-Fi networks?

Because these networks are rarely protected

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

Freeware

Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?

HTML5 validator

Which of the following components on a webpage is created using HTML?

Heading

Which of the following is NOT a feature of an integrated development environment (IDE)?

Hosts webpages

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?

Image 1 is sharper and has a larger file size than image 2.

Which of the following programming languages adds interactivity to websites?

JavaScript

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Which of the following network standards applies to cellular networks?

LTE

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

Scott is seeking a position in a information technology (IT) department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What type of programs is the interviewer referring to?

Open source

Which of the following best defines responsive design?

Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.

Which of the following is a common copyright infringement that involves illegally copying softwares, movies, music, and other digital materials?

Piracy

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is it called when someone attempts to befriends you online for the purpose of stealing confidential or sensitive information?

Social engineering

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message.

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Which of the following is a step in the email communication process?

The message travels along Internet routers to the recipient.

How might a business use a blog?

To communicate with customers

How do you create an email message?

Use an app or software to compose and send information.

A video that's shared millions of times over social media in a short period of time is termed to be _____

Viral

Which of the following audio formats does not use any compression technique?

WAV

Edward is a composer and needs to listen to the most accurate music files to create his compositions. What audio file type should he use to record his music?

WMA

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

antispyware

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

Posting hostile or insulting comments in response to someone else's blog post is called _____.

flaming

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

The quality of an audio file is determined by ___________.

its bit rate

Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?

license filter

To access the internet, a router must be connected to a____

modem

What kind of software products can you download from the internet without being subjected to copyright restrictions?

public domain software

A process called _______ converts analog sound waves into digital sound.

sampling

Which of the following types of websites typically provides the least security?

social media sites

You need a(n) _____ to play an MP3 audio file on a desktop or laptop computer.

stand-alone player

What do you call the rules each programming language has for writing instructions?

syntax

Why would you want to connect your computer to a network?

to access shared resources

The hardware a digital device needs to play videos includes a screen, speakers, and a ______

video card

Software simulating a real or imagined environment that appears as 3-D space is also called a _____.

virtual world


Set pelajaran terkait

chapter 24-medical asepsis-PrepU questions I got wrong, more in depth

View Set

Week 1 - PrepU Hemodynamics Questions

View Set

Civics, Executive Branch II (Structure)

View Set

Unit 3 - Speak English in the classroom!

View Set

Weeks 1 & 2 - Introduction and Survey Research, Week 3 - Attitudes, Week 3 - Job Satisfaction, Week 4 - Job Satisfaction, Week 5 - Job Satisfaction (Macro-Level), Week 5 - Happiness, Week 7 - Organizational Commitment, Week 8 - Organizational Commitm...

View Set

HIST 1320 InQuizitive Practice Exam 1

View Set

centers of triangles quiz 11/8/19

View Set

YOUR PROFESSIONAL ONLINE PRESENCE

View Set

Lesson 1 Vocabulary (Blue Group)

View Set