TestOut IT Fundamentals Pro Chapter 5: All Section Quizzes
Match each source on the left to its source type on the right. (5.8.8) A catalog of all the mayor's speeches and news articles about them The transcript of a speech by the mayor A news article about the mayor's speech ============ Primary source Secondary source Tertiary source
A catalog of all the mayor's speeches and news articles about them (Tertiary source) The transcript of a speech by the mayor (Primary source) A news article about the mayor's speech (Secondary source)
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? (5.3.14) A firewall is blocking ports 80 and 443. A proxy server is filtering access to websites. Port triggering is redirecting traffic to the wrong IP address. The router has not been configured to perform port forwarding.
A proxy server is filtering access to websites.
Which of the following is most likely to have peer-reviewed material written by an expert in the field? (5.8.8) Library book Academic journal Cable news channel Newspaper
Academic journal
You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in? (5.8.8) Accidental Mosaic Self Direct
Accidental
Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series? (5.7.6) Cortana Alexa Google Assistant Siri
Alexa
Which of the following should be done to protect your identity when creating a social media profile? (5.5.8) Always use a fake name and fake personal information. Always review and set privacy settings. Use the default privacy settings for the account. Always include your physical address and set privacy to Friends of Friends.
Always review and set privacy settings.
Files that you send along with an email message are called __________. (5.6.10) Attachments MMS E-files Extras
Attachments
Web browsers save website information in their _________, which helps the site load faster on future visits. (5.3.14) Memory Cache Storage Repository
Cache
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? (5.3.14) Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Change browser settings to notify before downloading. Change browser settings to block third-party cookies.
Change browser settings to notify before downloading.
_____________ computing refers to services and applications that run remotely over the Internet. (5.4.9) Remote Global Cloud Virtual
Cloud
A service that lets you store data in a remote location over the Internet is called _____________. (5.4.9) Database Online repository Internet backup Cloud storage
Cloud storage
Which of the following are advantages of cloud computing? (Select two.) (5.4.9) Lower speeds Local software Data security Easier collaboration Greater costs
Data security Easier collaboration
Which digital communication medium consists of top-level posts with threads of response posts? (5.4.9) Email client Discussion board Social network Chat room
Discussion board
Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) (5.4.9) Adobe Photoshop Adobe Acrobat Reader Dropbox Google Drive Microsoft Word
Dropbox Google Drive
What is one of the things that has set Siri apart from other digital assistants? (5.7.6) Easter eggs Playing music Reminders Voice command
Easter eggs
Which of the following are considered asynchronous technologies? (Select two.) (5.6.10) Video conferencing Voice over Internet Protocol (VoIP) Email Message boards Live streaming
Email Message boards
Samantha is being cyber-bullied by someone who is spreading lies about her involvement in a failed business. Which of the following are recommended actions that Samantha should take to help diffuse the situation? (Select two.) (5.5.8) Like, share, and comment on the bullying posts. Post the bully's physical address on social media. Create a public group on social media (such a Facebook group) to confront the bully. Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.
Encourage friends and relatives to ignore the bullying. Respond to the bully in a calm, clear, and constructive manner.
What do cloud services provide to help with privacy and security concerns? (5.4.9) Backups Encryption Accessibility Collaboration
Encryption
Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet? (5.8.8) Enter a package tracking number to find out a package status. Enter a MAC address to find out which device it is assigned to. Enter the filename of a file on your local hard drive to view the file. Enter one or more search terms for a topic.
Enter one or more search terms for a topic.
Which option should you choose to send an email you've received to a new person? (5.6.10) Forward CC Reply All Reply
Forward
In addition to good design sense, what else do web designers need to be proficient in? (5.9.4) Search Engine Optimization (SEO) Editing content for social media platforms Front-end coding languages Communication skills
Front-end coding languages
Clickable text or images that take you to different sites on the World Wide Web are called __________. (5.3.14) Shortcuts Navigation buttons Hyperlinks Attachments
Hyperlinks
Which of the following is used to change traffic lights for emergency vehicles? (5.7.6) ITCS IoT car IoT sensor Smart car
ITCS
Which of the following are considered private technologies? (Select two.) (5.6.10) Social media posts Instant messaging Video conferencing Live streaming Chat rooms
Instant messaging Video conferencing
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world? (5.2.8) Local Area Network Internet of Things Intranet Internet
Internet
Which of the following terms describes an organization that connects users to the Internet? (5.2.8) Network Server Web Server Internet Service Provider Data Center
Internet Service Provider
Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels? (5.9.4) Customer service representative Social media marketer Internet service technician Web designer
Internet service technician
A _________ is a private network that utilizes the same technologies as the Internet. (5.2.8) World Wide Web Wide Area Network Local Area Network Intranet
Intranet
Match the social media platform on the left with the description on the right. Some items can be used more than once or not at all. (5.5.8) Largest social media platform in the world Most popular microblogging platform Messaging platform that includes built-in photo editing tools Social network focused on images Provides live video streaming ===== Facebook Twitter Instagram
Largest social media platform in the world (Facebook) Most popular microblogging platform (Twitter) Messaging platform that includes built-in photo editing tools (Instagram) Social network focused on images (Instagram) Provides live video streaming (Facebook)
Owners of internet-enabled cars can use their phones to do which of the following? (5.7.6) Monitor fuel usage Change traffic lights Adjust tire pressure Control their speed
Monitor fuel usage
John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in? (5.8.8) Mosaic Self Accidental Direct
Mosaic
Which of the following is a category of SaaS applications? (5.4.9) Web hosting Disaster recovery Office tools Virtual machines
Office tools
Which of the following typically does NOT save a conversation after it has taken place? (5.6.10) Online chat Email Message board SMS/MMS
Online chat
Which of the following are common risks of using social media? (Select two.) (5.5.8) You can be added to a group without your permission. Personal information can be used without your permission Privacy settings are virtually non-existent. Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.
Online information that you post is difficult to remove. Anonymity can lead some people to post harmful comments.
When protecting your online identity, which of the following is an internet security threat you need to be aware of? (5.5.8) USB keyloggers Using personal information Using a different password for each social media platform Phishing attempts
Phishing attempts
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? (5.3.14) Proxy settings Private browsing Invalid certificate Browser cache
Proxy settings
Which method should be used to search for an exact phrase? (5.8.8) Put the search terms in [brackets] Put the search terms in (parentheses) Put the search terms in <angle brackets> Put the search terms in "quotes"
Put the search terms in "quotes"
Which medium does Wi-Fi use to send data between networks and devices? (5.2.8) Radio waves Ultraviolet light Cellular signals Bluetooth
Radio waves
Which of the following is a disadvantage of a VoIP system? (5.6.10) The costs associated with the initial setup Users communicate using VoIP from PC to PC Relies fully on a stable internet connection One account for internet and phone
Relies fully on a stable internet connection
Which option should you use to respond to the sender of an email but not all the recipients? (5.6.10) Reply All CC Forward Reply
Reply
You submitted the same paper from high school for a college class. Which form of plagiarism is this? (5.8.8) Direct Self Accidental Mosaic
Self
Which digital assistant is native on Apple devices like the iPad or Mac computers? (5.7.6) Siri Google Assistant Cortana Alexa
Siri
Which digital assistant was one of the earliest? (5.7.6) Cortana Alexa Siri Google Assistant
Siri
Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device? (5.7.6) Smartphone TV Smart door lock Siri
Smart door lock
Web services that help people meet, interact, and share content with other people online are called ____________. (5.5.8) Social Media Web Servers Internetworks Facebooks
Social Media
Which of the following describes the strategy that defines a businesses social media goals and objectives? (5.5.8) Social channels Social media marketing Search Engine Optimization (SEO) Social Media Optimization (SMO)
Social Media Optimization (SMO)
Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing? (5.5.8) Idea Brainstorming Startup Financial hardship
Startup
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (Select two.) (5.5.8) Membership fees Targeted ads Content Usage fees Selling user-generated data to other companies
Targeted ads Selling user-generated data to other companies
Wikipedia is considered which of the following sources? (5.8.8) Tertiary Academic Primary Consumer-level
Tertiary
Which of the following are primary sources? (Select two.) (5.8.8) Encyclopedia entry on wolves Documentary about the Great Depression Newspaper article about new legislation The United States Constitution Jane Austen's Pride and Prejudice
The United States Constitution Jane Austen's Pride and Prejudice
What is a web designer responsible for? (5.9.4) The look and feel of a website The content on social media The latest trends in design Web traffic metrics
The look and feel of a website
Which of the following is the BEST reason to search for articles in an online academic database? (5.8.8) The sources are more likely to be peer reviewed The sources generally provide better background information on topics The sources are more likely to include streaming video content The sources contain a wider range of practical knowledge
The sources are more likely to be peer reviewed
Which of the following is considered part of a smart home? (5.7.6) Telephone Laptop Thermostat TV
Thermostat
Which of the following is used to identify specific hypertext resources on the World Wide Web? (5.2.8) Hyperlink Transmission Control Protocol Uniform Resource Locator Internet Protocol
Uniform Resource Locator
Which of the following technologies can be used to make a phone call over an Internet connection? (5.2.8) UDP VoIP TCP IoT
VoIP
Which of the following is a disadvantage of web applications? (5.2.8) Web applications can require a significant amount of disk space. Web applications can carry a monthly or yearly fee. Web applications can be limited by the hardware they run on. Web applications can connect people in different locations.
Web applications can carry a monthly or yearly fee.
When might it be MOST helpful to clear your browser's cache of temporary Internet files? (5.3.14) When a website is not functioning as it should After every Internet search Immediately after opening a new Microsoft Office document When you switch to a different web browser
When a website is not functioning as it should
Which of the following lines will initiate an Internet search from the address bar of a web browser? (5.3.14) testout.com microsoft gov microsoft.com microsoft.org
microsoft gov
Which of the following is a valid email address? (5.6.10) [email protected] support#testout.com support@testout support#testout
Microsoft OneDrive is a cloud solution that is designed to provide which of the following? (5.4.9) Resource pooling Cloud storage Cloud hosting Cloud computing
Cloud storage
Social media marketers need the ability to do what? (5.9.4) Code in JavaScript Make a website useful Collaborate across teams Communicate with customers
Collaborate across teams
A major capability of Alexa is its ability to do what? (5.7.6) Set alarms Control smart devices Speak a variety of languages Play audio books
Control smart devices
Small files that a website saves on your computer to remember your preferences are called ______________. (5.3.14) Reminders Malware Fingerprints Cookies
Cookies
Which digital assistant was named after an artificial intelligence in an Xbox video game? (5.7.6) Google Assistant Siri Cortana Alexa
Cortana
Which of the following charges resources used, such as bandwidth and processing power, by the second? (5.4.9) OneDrive Microsoft Azure Amazon Web Services (AWS) Google Cloud
Google Cloud
Which of the following is the MOST important skill an internet service technician can possess? (5.9.4) The ability to quickly troubleshoot and fix any issues that may arise from customers Proficiency in front-end coding languages like HTML, CSS, and JavaScript A well-developed sense of color, font, layout, and images Excellent communication skills and the ability to collaborate across teams
The ability to quickly troubleshoot and fix any issues that may arise from customers
Match each term on the left to its definition on the right. (5.2.8) A service or software application that relies on shared resources over the Internet A software application that accesses web applications and websites A company that provides access to the Internet Internet Service Provider An interconnected global public computer network An information system that connects documents to each other by hypertext links ====== Cloud computing Internet Service Provider World Wide Web Internet Browser
A service or software application that relies on shared resources over the Internet (Cloud computing) A software application that accesses web applications and websites (Browser) A company that provides access to the Internet (Internet Service Provider) An interconnected global public computer network (Internet) An information system that connects documents to each other by hypertext links (World Wide Web)
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem? (5.3.14) Configure the browser proxy settings. Disable the pop-up blocker. Apply a firmware update. Clear the browser cache.
Configure the browser proxy settings.
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses? (5.5.8) Crowdsourcing media Crowdsourcing platform Crowdsourcing campaign Crowdsourcing website
Crowdsourcing platform
Which option should you use to respond to every single person included on an email? (5.6.10) CC Reply All Forward Reply
Reply All
What is the term for delivering an application over the internet called? (5.4.9) FaaS IaaS SaaS PaaS
SaaS
When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause? (5.6.10) The video must be constantly restarted. The video may become glitchy. The video may cause your system to crash. A copy of the video file must first be saved to your computer.
The video may become glitchy.
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not? (5.2.8) Blogs RSS feeds Podcasts Wikis
Wikis
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser? (5.2.8) Wide Area Network Internet Intranet World Wide Web
World Wide Web
A pop-up blocker is a web browser feature that _________________. (5.3.14) keeps the window in a minimized state prevents unwanted advertisements censors Internet searches prevents color images from being displayed
prevents unwanted advertisements