Exam 2 BCIS 2610 UNT

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? A word processor app to keep a record of her expenses and make calculations A personal interest app to keep a track of all the expenses based on her personal interests A device management app to track all the expenses she makes using her credit and debit cards A spreadsheet app to keep a record of her expenses, sort data, and make calculations

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

How is a worm different from a Trojan? A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm spreads through a network, whereas a Trojan hides inside another program. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

A worm spreads through a network, whereas a Trojan hides inside another program.

How can you protect your information when using social media? Accept friend requests from people you want to be friends with. Have your security information marked public on your social media account. Make sure you have your credit or debit card linked to your social media account. Use the same password and username for your social media that you use for your online banking account.

Accept friend requests from people you want to be friends with.

Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone? Blackberry Android iOS Windows

Android

A series of images displayed in sequence to create the illusion of movement is called ______________ . Animation Frame Mixed Reality Virtual Reality

Animation

_____________ programs and features are often integrated into video editing software. Virtual reality Simulation Audio-editing Computer-aided technology

Audio-editing

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider? Because insiders change contents to make a political statement. Because insiders lack the knowledge of computers and networks to perform this task. Because insiders like to cause disruption and panic among citizens. Because insiders create threats after incidents at their places of employment.

Because insiders create threats after incidents at their places of employment.

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider? Because insiders like to cause disruption and panic among citizens. Because insiders create threats after incidents at their places of employment. Because insiders change contents to make a political statement. Because insiders lack the knowledge of computers and networks to perform this task.

Because insiders create threats after incidents at their places of employment.

Patricia has started a new interior designing business. Her top five tasks are creating designs, sharing them with her team and potential clients, making presentations for potential clients, sending and receiving payments, and carrying out marketing on social media. Which of the following sets of apps should she use? Fotor, Amazon, PowerPoint, Priceline, Chrome Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook Google Calendar, OneDrive, Yelp, Venmo, Twitter Microsoft Word, Microsoft PowerPoint, Microsoft Excel, Facebook, Venmo

Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? Change font size, style, and color of the keywords. Define a heading style. Change page margins, size and orientation. Add hyperlinks for each keyword.

Change font size, style, and color of the keywords.

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? Assign specific instructions in slide master formatting to make slides and objects appear and disappear as required. Use hyperlinks to go to random slides to make it look like they are appearing and disappearing. Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object. Use sound effects to create the illusion of appearance and disappearance of objects and slides.

Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? Sorting and filtering Run macros Conditional formatting What-if analysis

Conditional formatting

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? Transfer all financial record to spreadsheet. Convert all paper files to word documents. Create a database of company projects, customers and vendors. Continue with the old system.

Create a database of company projects, customers and vendors.

What would a password manager allow you to do? Create and store multiple strong passwords. Test your memorization skills. Make sure you do not repeat passwords on similar accounts. Prevent you from using birthdays in your passwords.

Create and store multiple strong passwords.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. Cyberstalking Cyberbullying Social engineering Data mining

Cyberbullying

Which is a first step to deter thieves from accessing your financial information? Follow up on calls regarding purchases that were not made. Review financial and billing statements each month carefully. Be alert to signs that may indicate unusual activity in an account. Do not provide personal information over the phone or through email.

Do not provide personal information over the phone or through email.

A graphics designer created the company's logo so the company can resize it to multiple dimensions based on the need without the use of any photo editors. Which of the following image file formats is most likely to have been used to make this happen? JPEG TIFF EPS GIF

EPS

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Repetitive strain Ergonomics Cyberbullying Technology addiction

Ergonomics

An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other? Fotor OpenOffice G Suite Canva

G Suite

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? His phone can generate an alarm even if it is on mute. He can use remote wiping to retrace the thief's steps. The current location of his phone can be pinpointed on a map through the phone's GPS. If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.

He can use remote wiping to retrace the thief's steps.

How is digital audio better than analog audio in terms of quality? Higher resolution produces better audio quality. Higher sampling rate amounts to higher bit rate and hence better audio quality. Lower sampling rate amounts to lower bit rate and hence better audio quality. Lower bit rate and high resolution produce better audio quality.

Higher sampling rate amounts to higher bit rate and hence better audio quality.

Technology can lead to all of the following behavioral risks EXCEPT _____. Depression and anxiety A sedentary lifestyle Social withdrawal Higher satisfaction with life

Higher satisfaction with life

How will you decide which browser security settings to allow and which ones to block? If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. I will need to review each browser security setting and use my best judgement. If the browser security setting is on a website sent from a friend, I always accept the setting. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.

I will need to review each browser security setting and use my best judgement.

Which of the following is not an analog device? Video projector Tape recorder Laptop Musical Instrument

Laptop

Logan is considering web app development as a career option. Which of the following languages does he not need to master? CSS JavaScript HTML5 Logo

Logo

With more and more people using technology, what physical health diagnosis is on the rise? Cyberstalking Cyberbullying Repetitive strain injury Technology addiction

Repetitive strain injury

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Being cautious about what information you post on social networking sites. Requesting a credit report and freezing your credit. Querying unfamiliar purchases found on your bank statements. Throwing financial documents older than three months in the trash.

Requesting a credit report and freezing your credit.

How is the environment impacted by computers being thrown away in landfills? The e-waste is increasing because more people are choosing to recycle. The lead and mercury is seeping into the ground and water supply. The copper is creating fire dangers and explosive possibilities. Data miners are digging up landfills looking for gold and platinum.

The lead and mercury is seeping into the ground and water supply

How is streaming of video or audio different from downloading it? Unlike downloading, streaming works only on smart TVs. Unlike downloading, streaming requires installation of a support software. Unlike streamed content, downloaded content cannot be stored on the computer. Unlike streamed content, downloaded content is stored on the computer.

Unlike streamed content, downloaded content is stored on the computer.

An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make it to achieve this? Change the text contents of the website to list more details and information to the user. Upgrade the website hosting hardware to allow scalability and quick turnaround. Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website. Make the company website usable with both mouse and keyboard at users' convenience.

Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

How can you protect a computer from electrical spikes and surges? Use an uninterruptible power supply. Unplug the computer when it is not in use. Use a surge protector. Use a cable lock.

Use a surge protector.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? Develop different versions of the same app for different programs. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Feed the existing code into cross-platform tools to develop different versions of the same app. Use the same set of codes for different platforms.

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Which of the following makes gaming the most realistic and interactive an experience? Joystick CAD Virtual world Rendering

Virtual world

Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who? VLOOKUP What-if analysis Pivot table Relative referencing

What-if analysis

Which of the following devices can be used to advance slides without having to click a button on the laptop? Laser pointer Wireless remote control Smartphone Stylus

Wireless remote control

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report? Presentation Spreadsheet Word processor Messaging

Word processor

A feature to identify a picture's geographical location is known as _________________. sampling in-betweening rendering geotagging

geotagging

The quality of an audio file is determined by ___________. the number of megabytes its bit rate the number of frames per second how pixelated it is

its bit rate


Set pelajaran terkait

American Government Exercise quizzes

View Set

RHIT EXAM: PART 10 - INFORMATICS AND INFORMATION SYSTEMS

View Set

Reproductive and genitourinary system, Pharm made easy

View Set

Nursing Concepts 2 Questions Midterm

View Set

Chapter 51: Caring for Clients with Diabetes Mellitus

View Set

HESI Maternity- Practice Questions

View Set

Living With Art- Chapter 2 (What is Art?)

View Set

Global History of the Great Recession

View Set

radiography test 1-history, BW, paralleling, bisecting, safety

View Set

NURS 212 -- Chapter 2 PrepU Review

View Set

Chapter 1: Relational Databases and SQL

View Set