ITE115 Exam
50. _____ is the process of creating programs and apps from the idea stage to distribution to users.
1. Acquiring trademarks, copyrights and developing license agreements with the help of attorney is the first step before selling and marketing the products
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
A B2B transaction consists of businesses providing goods and services to other businesses
What does a DSL modem use to send and receive digital data?
A DSL modem uses existing standard copper telephone wiring to send and receive digital data
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?
A designer takes into account how the user will interact with the program to come up with a design that is appealing and easy to use
Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
A device without embedded smart technology, such as a standard radio, can be adapted to function as a smart device by plugging it into a smart plug. The radio can be left in its "on" setting while plugged in. The smart plug can then be remotely enabled or disabled to determine when the radio receives power
20. Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?
A distributor that sells to another business in B2B transactions most likely offers an online storefront for e-commerce transactions rather than using an online marketplace or social media
What defines the behavior of an object in object-oriented programming ?
A method defines the behavior of an object
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it
A modem can also function as what other piece of hardware?
A router
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?
A service pack is a collection of updates combined in one package
Which of the following would be considered a strong password?
A strong password is a long combination of letters, numbers, and/or symbols that unlocks access to protected electronic data. A longer password is always more secure than a shorter password, regardless of the complexity
What is a MAC address?
A unique hardware address for your device
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
A video conferencing application is communication software that allows people to attend virtual meetings over the Internet instead of needing to meet in person at a physical location
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.
A well-known retailer or manufacturer generally offers guarantees for a program or app's reliability and safety
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?
Agile development, also called adaptive development, incorporates flexibility in the goals and scope of the project. Agile projects may evolve in phases, releasing components as they are finalized, and adding functionality as it is needed or requested by users
During which phase of the SDLC is software tested to make sure each function works as intended?
All phases
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?
An interpreter translates and executes one statement at a time. Interpreters do not produce or store object code. Each time the source program runs, the interpreter translates instructions statement by statement
For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
An omnichannel marketing strategy uses multiple types of contact with a potential customer, such as targeted ads on social media, paid results on search engines, or contacts by email or phone to track a potential customer's interest in products. A store might offer the customer different coupons in the hope of providing effective incentive for the customer to make a purchase
1. Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files and any associated entries in the system files
In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?
Artificial intelligence (AI)
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?
Bluetooth connection
File transfer programs belong in what software category?
Both email and file transfer tools belong to the communications category
Which of the following is true about broadband connections?
Broadband connections are "always-on" connections
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?
Cloud consumers most commonly interact with Software as a Service (SaaS), which is software that is distributed online. Zoom, an online conference call app, is a popular SaaS.
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
Cloud services are available from anywhere on the Internet and can be configured using almost any kind of device, such as a laptop, tablet, or smartphone. This essential characteristic of cloud computing is called broad network access
Which of the following tools translates the source code of a procedural program into binary code?
Compilers and interpreters help in translation of source code into machine language
What would a password manager allow you to do?
Create and store multiple strong passwords
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.
Customer relationship management (CRM) services help companies customize their interactions with customers. A cloud-based CRM service can be accessed through the Internet as salespeople travel to meet with customers.
1. Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer service representative
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?
Data analytics
What is the goal of a DevOps methodology?
DevOps ensures frequent releases of fixes and enhancements
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email
What can you do to make sure you are not contributing to software piracy?
Do not use freeware or shareware
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?
Fourth generation language
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
Freeware, shareware, and public domain programs and apps are available at little or no cost to you. Public domain programs and apps do not have restrictions on use, distribution, or modification. Lack of a patent, copyright, or trademark does not mean a program is public domain
Which of the following is the strongest password?
H@veAGr3atDaY!
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief's steps
Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?
High-quality product photos
25. How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections
Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
IaaS (Infrastructure as a Service) is a type of cloud service that allows customers to configure cloud-based networking infrastructure the way they want, such as routing, servers, operating systems, storage spaces, and security settings. To run a Windows server in a public cloud, you would need to use an IaaS service.
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
Installation
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors
How does encryption work?
It scrambles the information until the key is used to unscramble it
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line
Which of the following is an example of an object-oriented programming language?
Java
Which of the following programming languages adds interactivity to websites?
JavaScript
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client?
Laptop
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply
Which of the following statements is true about public networks?
Many public networks are not secure
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
My Verizon VPN
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP)
40. What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
Patch finders
Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?
Piracy is common in software, where the code and files are digital; it is illegal
_____ are tools that track the memory usage, status, and errors of currently running software.
Process managers
In which category of software do Microsoft Office Word and Excel belong?
Productivity
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?
Project manager
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
Public domain software
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?
Receiving clerk
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?
Reinforcement learning
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?
Require users to identify themselves using biometrics or passwords
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
Restorers
What hardware is essential to creating a home Wi-Fi network?
Router
Which commonly used programming language is used to manage, access, and search for database content?
SQL
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?
Security and functionality defects are addressed in Support and security phase
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware creators distribute programs and apps for little or no cost, or for a brief trial period. Shareware creators intend to make a profit, either by charging to purchase or subscribe to the product, or by including advertisements
An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?
Site licenses are best suited for organizations to provide access to multiple users, in different ways
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
Smart home devices such as thermostats, light switches, smart speakers, and personal assistants can connect to the Internet and apps on your smartphone
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
Which of the following statements is NOT true about a local firewall?
Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
Spyware tries to collect personal information or change computer settings without users' consent. Antispyware programs prevent spyware from installing itself on the computer and remove any existing spyware
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
Which of the following is not a general guideline for developers?
Start programming before creating a proposal
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message
What is a digital certificate?
Technology used to verify a user's identity
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection
Which of the following is an authentication method to keep your data safe?
The most common form of authentication is providing a user name and password. However, additional forms of authentication exist such as using biometric devices to scan physical characteristics. Windows Hello is a feature in Windows that authenticates users by scanning a user's fingerprint, face, or iris
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
_____ are new releases of an app and may require an additional fee before you can install them.
Upgrades
1. How can you protect a computer from electrical spikes and surges?
Use a surge protector
What area of software development focuses on the user's reaction to and interaction with the software product?
User experience
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?
Visit the manufacturer's website and install the latest updates for the app
Which of the following is NOT a leading provider of PaaS and IaaS services?
Walmart
What type of network sends signals through airwaves and usually does not require cables?
Wireless network
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer
In which of the following situations is a digital certificate useful?
You are signing a rental lease
When using encryption from your home computer, how would you configure the router?
You can use the wireless router to set the encryption key and type of encryption
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
a crash
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
incomplete documentation
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
To access the Internet, a router must be connected to a _____.
modem
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
naming your router something you'll remember, like your street address
Which of the following does a software license usually specify?
number of people authorized to use the software
What type of program would have a class named Student with objects called fullTime and partTime?
object-oriented program
Devices on a _____ area network are connected via Bluetooth.
personal
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
pretexting
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
Which of the following is an example of a personal area network?
smartwatch and phone connected via Bluetooth
Which of the following types of websites typically provides the least security?
social media sites
The set of activities performed to build a program is called the _____.
software development life cycle (SDLC)
What do you call the rules each programming language has for writing instructions?
syntax
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?
waterfall method
At what point are you responsible for following the terms in a software license agreement?
when you click or take another action to accept the terms
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.
wireframes