TestOut IT Fundamentals Pro Chapter 5: All Section Quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match each source on the left to its source type on the right. (5.8.8) A catalog of all the mayor's speeches and news articles about them The transcript of a speech by the mayor A news article about the mayor's speech ============ Primary source Secondary source Tertiary source

A catalog of all the mayor's speeches and news articles about them (Tertiary source) The transcript of a speech by the mayor (Primary source) A news article about the mayor's speech (Secondary source)

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? (5.3.14) A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. Port triggering is redirecting traffic to the wrong IP address. The router has not been configured to perform port forwarding.

A proxy server is filtering access to websites.

Which of the following is most likely to have peer-reviewed material written by an expert in the field? (5.8.8) Library book Academic journal Cable news channel Newspaper

Academic journal

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in? (5.8.8) Accidental Mosaic Self Direct

Accidental

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series? (5.7.6) Cortana Alexa Google Assistant Siri

Alexa

Which of the following should be done to protect your identity when creating a social media profile? (5.5.8) Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.

Always review and set privacy settings.

Files that you send along with an email message are called __________. (5.6.10) Attachments MMS E-files Extras

Attachments

Web browsers save website information in their _________, which helps the site load faster on future visits. (5.3.14) Memory Cache Storage Repository

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? (5.3.14) Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to block third-party cookies.

Change browser settings to notify before downloading.

_____________ computing refers to services and applications that run remotely over the Internet. (5.4.9) Remote Global Cloud Virtual

Cloud

A service that lets you store data in a remote location over the Internet is called _____________. (5.4.9) Database Online repository Internet backup Cloud storage

Cloud storage

Which of the following are advantages of cloud computing? (Select two.) (5.4.9) Lower speeds Local software Data security Easier collaboration Greater costs

Data security Easier collaboration

Which digital communication medium consists of top-level posts with threads of response posts? (5.4.9) Email client Discussion board Social network Chat room

Discussion board

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) (5.4.9) Adobe Photoshop Adobe Acrobat Reader Dropbox Google Drive Microsoft Word

Dropbox Google Drive

What is one of the things that has set Siri apart from other digital assistants? (5.7.6) Easter eggs Playing music Reminders Voice command

Easter eggs

Which of the following are considered asynchronous technologies? (Select two.) (5.6.10) Video conferencing Voice over Internet Protocol (VoIP) Email Message boards Live streaming

Email Message boards

Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) (5.5.8) Like, share, and comment on the bullying posts. Post the bully's physical address on social media. Create a public group on social media (such a Facebook group) to confront the bully. Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.

What do cloud services provide to help with privacy and security concerns? (5.4.9) Backups Encryption Accessibility Collaboration

Encryption

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet? (5.8.8) Enter a package tracking number to find out a package status. Enter a MAC address to find out which device it is assigned to. Enter the filename of a file on your local hard drive to view the file. Enter one or more search terms for a topic.

Enter one or more search terms for a topic.

Which option should you choose to send an email you've received to a new person? (5.6.10) Forward CC Reply All Reply

Forward

In addition to good design sense, what else do web designers need to be proficient in? (5.9.4) Search Engine Optimization (SEO) Editing content for social media platforms Front-end coding languages Communication skills

Front-end coding languages

Clickable text or images that take you to different sites on the World Wide Web are called __________. (5.3.14) Shortcuts Navigation buttons Hyperlinks Attachments

Hyperlinks

Which of the following is used to change traffic lights for emergency vehicles? (5.7.6) ITCS IoT car IoT sensor Smart car

ITCS

Which of the following are considered private technologies? (Select two.) (5.6.10) Social media posts Instant messaging Video conferencing Live streaming Chat rooms

Instant messaging Video conferencing

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? (5.2.8) Local Area Network Internet of Things Intranet Internet

Internet

Which of the following terms describes an organization that connects users to the Internet? (5.2.8) Network Server Web Server Internet Service Provider Data Center

Internet Service Provider

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels? (5.9.4) Customer service representative Social media marketer Internet service technician Web designer

Internet service technician

A _________ is a private network that utilizes the same technologies as the Internet. (5.2.8) World Wide Web Wide Area Network Local Area Network Intranet

Intranet

Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all. (5.5.8) Largest social media platform in the world Most popular microblogging platform Messaging platform that includes built-in photo editing tools Social network focused on images Provides live video streaming ===== Facebook Twitter Instagram

Largest social media platform in the world (Facebook) Most popular microblogging platform (Twitter) Messaging platform that includes built-in photo editing tools (Instagram) Social network focused on images (Instagram) Provides live video streaming (Facebook)

Owners of internet-enabled cars can use their phones to do which of the following? (5.7.6) Monitor fuel usage Change traffic lights Adjust tire pressure Control their speed

Monitor fuel usage

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in? (5.8.8) Mosaic Self Accidental Direct

Mosaic

Which of the following is a category of SaaS applications? (5.4.9) Web hosting Disaster recovery Office tools Virtual machines

Office tools

Which of the following typically does NOT save a conversation after it has taken place? (5.6.10) Online chat Email Message board SMS/MMS

Online chat

Which of the following are common risks of using social media? (Select two.) (5.5.8) You can be added to a group without your permission. Personal information can be used without your permission Privacy settings are virtually non-existent. Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.

When protecting your online identity, which of the following is an internet security threat you need to be aware of? (5.5.8) USB keyloggers Using personal information Using a different password for each social media platform Phishing attempts

Phishing attempts

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? (5.3.14) Proxy settings Private browsing Invalid certificate Browser cache

Proxy settings

Which method should be used to search for an exact phrase? (5.8.8) Put the search terms in [brackets] Put the search terms in (parentheses) Put the search terms in <angle brackets> Put the search terms in "quotes"

Put the search terms in "quotes"

Which medium does Wi-Fi use to send data between networks and devices? (5.2.8) Radio waves Ultraviolet light Cellular signals Bluetooth

Radio waves

Which of the following is a disadvantage of a VoIP system? (5.6.10) The costs associated with the initial setup Users communicate using VoIP from PC to PC Relies fully on a stable internet connection One account for internet and phone

Relies fully on a stable internet connection

Which option should you use to respond to the sender of an email but not all the recipients? (5.6.10) Reply All CC Forward Reply

Reply

You submitted the same paper from high school for a college class. Which form of plagiarism is this? (5.8.8) Direct Self Accidental Mosaic

Self

Which digital assistant is native on Apple devices like the iPad or Mac computers? (5.7.6) Siri Google Assistant Cortana Alexa

Siri

Which digital assistant was one of the earliest? (5.7.6) Cortana Alexa Siri Google Assistant

Siri

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device? (5.7.6) Smartphone TV Smart door lock Siri

Smart door lock

Web services that help people meet, interact, and share content with other people online are called ____________. (5.5.8) Social Media Web Servers Internetworks Facebooks

Social Media

Which of the following describes the strategy that defines a businesses social media goals and objectives? (5.5.8) Social channels Social media marketing Search Engine Optimization (SEO) Social Media Optimization (SMO)

Social Media Optimization (SMO)

Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? (5.5.8) Idea Brainstorming Startup Financial hardship

Startup

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) (5.5.8) Membership fees Targeted ads Content Usage fees Selling user-generated data to other companies

Targeted ads Selling user-generated data to other companies

Wikipedia is considered which of the following sources? (5.8.8) Tertiary Academic Primary Consumer-level

Tertiary

Which of the following are primary sources? (Select two.) (5.8.8) Encyclopedia entry on wolves Documentary about the Great Depression Newspaper article about new legislation The United States Constitution Jane Austen's Pride and Prejudice

The United States Constitution Jane Austen's Pride and Prejudice

What is a web designer responsible for? (5.9.4) The look and feel of a website The content on social media The latest trends in design Web traffic metrics

The look and feel of a website

Which of the following is the BEST reason to search for articles in an online academic database? (5.8.8) The sources are more likely to be peer reviewed The sources generally provide better background information on topics The sources are more likely to include streaming video content The sources contain a wider range of practical knowledge

The sources are more likely to be peer reviewed

Which of the following is considered part of a smart home? (5.7.6) Telephone Laptop Thermostat TV

Thermostat

Which of the following is used to identify specific hypertext resources on the World Wide Web? (5.2.8) Hyperlink Transmission Control Protocol Uniform Resource Locator Internet Protocol

Uniform Resource Locator

Which of the following technologies can be used to make a phone call over an Internet connection? (5.2.8) UDP VoIP TCP IoT

VoIP

Which of the following is a disadvantage of web applications? (5.2.8) Web applications can require a significant amount of disk space. Web applications can carry a monthly or yearly fee. Web applications can be limited by the hardware they run on. Web applications can connect people in different locations.

Web applications can carry a monthly or yearly fee.

When might it be MOST helpful to clear your browser's cache of temporary Internet files? (5.3.14) When a website is not functioning as it should After every Internet search Immediately after opening a new Microsoft Office document When you switch to a different web browser

When a website is not functioning as it should

Which of the following lines will initiate an Internet search from the address bar of a web browser? (5.3.14) testout.com microsoft gov microsoft.com microsoft.org

microsoft gov

Which of the following is a valid email address? (5.6.10) [email protected] support#testout.com support@testout support#testout

[email protected]

Microsoft OneDrive is a cloud solution that is designed to provide which of the following? (5.4.9) Resource pooling Cloud storage Cloud hosting Cloud computing

Cloud storage

Social media marketers need the ability to do what? (5.9.4) Code in JavaScript Make a website useful Collaborate across teams Communicate with customers

Collaborate across teams

A major capability of Alexa is its ability to do what? (5.7.6) Set alarms Control smart devices Speak a variety of languages Play audio books

Control smart devices

Small files that a website saves on your computer to remember your preferences are called ______________. (5.3.14) Reminders Malware Fingerprints Cookies

Cookies

Which digital assistant was named after an artificial intelligence in an Xbox video game? (5.7.6) Google Assistant Siri Cortana Alexa

Cortana

Which of the following charges resources used, such as bandwidth and processing power, by the second? (5.4.9) OneDrive Microsoft Azure Amazon Web Services (AWS) Google Cloud

Google Cloud

Which of the following is the MOST important skill an internet service technician can possess? (5.9.4) The ability to quickly troubleshoot and fix any issues that may arise from customers Proficiency in front-end coding languages like HTML, CSS, and JavaScript A well-developed sense of color, font, layout, and images Excellent communication skills and the ability to collaborate across teams

The ability to quickly troubleshoot and fix any issues that may arise from customers

Match each term on the left to its definition on the right. (5.2.8) A service or software application that relies on shared resources over the Internet A software application that accesses web applications and websites A company that provides access to the Internet Internet Service Provider An interconnected global public computer network An information system that connects documents to each other by hypertext links ====== Cloud computing Internet Service Provider World Wide Web Internet Browser

A service or software application that relies on shared resources over the Internet (Cloud computing) A software application that accesses web applications and websites (Browser) A company that provides access to the Internet (Internet Service Provider) An interconnected global public computer network (Internet) An information system that connects documents to each other by hypertext links (World Wide Web)

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? (5.3.14) Configure the browser proxy settings. Disable the pop-up blocker. Apply a firmware update. Clear the browser cache.

Configure the browser proxy settings.

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? (5.5.8) Crowdsourcing media Crowdsourcing platform Crowdsourcing campaign Crowdsourcing website

Crowdsourcing platform

Which option should you use to respond to every single person included on an email? (5.6.10) CC Reply All Forward Reply

Reply All

What is the term for delivering an application over the internet called? (5.4.9) FaaS IaaS SaaS PaaS

SaaS

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause? (5.6.10) The video must be constantly restarted. The video may become glitchy. The video may cause your system to crash. A copy of the video file must first be saved to your computer.

The video may become glitchy.

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? (5.2.8) Blogs RSS feeds Podcasts Wikis

Wikis

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? (5.2.8) Wide Area Network Internet Intranet World Wide Web

World Wide Web

A pop-up blocker is a web browser feature that _________________. (5.3.14) keeps the window in a minimized state prevents unwanted advertisements censors Internet searches prevents color images from being displayed

prevents unwanted advertisements


Set pelajaran terkait

UWorld Fundamentals Skills and Procedures

View Set

Admin 201 Questions from exam labs - Topic 4 (300-400)

View Set