BCIS EXAM 2

Ace your homework & exams now with Quizwiz!

A digital movie shows characters creating an illusion of natural motion, 360 degree rotation, and life-like and dynamic experience on the screen. This movie is most likely a(n)________ movie. 3-D animation virtual reality based 2-D animation augmented reality based

3-D animation

Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project? A presentation app to design graphics and a video editing app to insert snippets of videos A word processor app to write the text that would appear on the cover page A graphics app to design the cover page and place the desired text where needed A spreadsheet app to create graphics and text, and the inbuilt grid to arrange it

A graphics app to design the cover page and place the desired text where needed

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? A word processor app to keep a record of her expenses and make calculations A personal interest app to keep a track of all the expenses based on her personal interests A device management app to track all the expenses she makes using her credit and debit cards A spreadsheet app to keep a record of her expenses, sort data, and make calculations

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

How can you protect your information when using social media? Make sure you have your credit or debit card linked to your social media account. Use the same password and username for your social media that you use for your online banking account. Have your security information marked public on your social media account. Accept friend requests from people you want to be friends with.

Accept friend requests from people you want to be friends with.

How can you protect your information when using social media? Use the same password and username for your social media that you use for your online banking account. Accept friend requests from people you want to be friends with. Make sure you have your credit or debit card linked to your social media account. Have your security information marked public on your social media account.

Accept friend requests from people you want to be friends with.

A series of images displayed in sequence to create the illusion of movement is called ______________ . Virtual Reality Frame Animation Mixed Reality

Animation

For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? Microsoft Office G suite Apple iWork Apache OpenOffice

Apache OpenOffice

_____________ programs and features are often integrated into video editing software. Virtual reality Audio-editing Simulation Computer-aided technology

Audio-editing

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider? Because insiders lack the knowledge of computers and networks to perform this task. Because insiders change contents to make a political statement. Because insiders create threats after incidents at their places of employment. Because insiders like to cause disruption and panic among citizens.

Because insiders create threats after incidents at their places of employment.

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? Assign specific instructions in slide master formatting to make slides and objects appear and disappear as required. Use hyperlinks to go to random slides to make it look like they are appearing and disappearing. Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object. Use sound effects to create the illusion of appearance and disappearance of objects and slides.

Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? M-commerce app Banking and finance app Photo editing app Social media app

M-commerce app

Paul has opened a bespoke tailoring shop. He wants to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suites should he consider? Prezi, G suite G suite, Zoho OpenOffice, G suite Zoho, Apple iWork

OpenOffice, G suite

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Being cautious about what information you post on social networking sites. Requesting a credit report and freezing your credit. Querying unfamiliar purchases found on your bank statements. Throwing financial documents older than three months in the trash.

Requesting a credit report and freezing your credit.

Which of the following makes gaming the most realistic and interactive an experience? Joystick CAD Rendering Virtual world

Virtual world

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. creating malware downloading harmful content viewing or stealing computer data reading wireless transmissions

creating malware

A feature to identify a picture's geographical location is known as _________________. rendering geotagging in-betweening sampling

geotagging

Which of the following is a characteristic of a strong password? letters, numbers, and symbols numbers in a series personal information A short phrase

letters, numbers, and symbols

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing encryption identity theft dumpster diving

phishing

R esolution of bitmap graphics is typically measured in ___________. pixels megabytes frames kilobytes

pixels

With more and more people using technology, what physical health diagnosis is on the rise? cyberbullying repetitive strain injury cyberstalking technology addiction

repetitive strain injury

A video that is shared millions of times over social media in a short period of time is termed to be ____________ . viral original fake concurrent

viral

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A worm Spam A Trojan Ransomware

A Trojan

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed? A device management portable app A device management mobile app A productivity app that is installed on all the devices An educational app accessible through browser

A device management portable app

How is a worm different from a Trojan? A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device. A worm spreads through a network, whereas a Trojan hides inside another program. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.

A worm spreads through a network, whereas a Trojan hides inside another program.

How can an attacker execute malware through a script? An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan. An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer. An attacker can attach a script to a program that you download which then infects your computer. An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting.

An attacker can attach a script to a program that you download which then infects your computer.

Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone? Blackberry Android iOS Windows

Android

Computer-aideddesign software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this? Streaming and geotagging Artificial intelligence and machine learning MIDI technology Speech and voice recognition

Artificial intelligence and machine learning

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format? As a collection of lines As a combination of alphabets, numbers and special characters In the primary colors format of RBY As a list of the color numbers for all the pixels it contains

As a list of the color numbers for all the pixels it contains

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? Change font size, style, and color of the keywords. Define a heading style. Change page margins, size and orientation. Add hyperlinks for each keyword.

Change font size, style, and color of the keywords.

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? Sorting and filtering Run macros Conditional formatting What-if analysis

Conditional formatting

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? Continue with the old system. Create a database of company projects, customers and vendors. Convert all paper files to word documents. Transfer all financial record to spreadsheet.

Create a database of company projects, customers and vendors.

What would a password manager allow you to do? Test your memorization skills. Create and store multiple strong passwords. Make sure you do not repeat passwords on similar accounts. Prevent you from using birthdays in your passwords.

Create and store multiple strong passwords.

Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do? Create trendlines Create and run macros Move the data to a PowerPoint presentation Format the sheets containing important data

Create trendlines

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? Paint app Drawing app Photo editing app Video editing app

Drawing app

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Cyberbullying Ergonomics Repetitive strain Technology addiction

Ergonomics

What is the primary difference between HTML5 and adobe flash types of web animations? Adobe Flash incorporates HTML5 and therefore, is more efficient than HTML5. HTML5 does not need the user to download additional plug-in software, unlike adobe Flash. Adobe flash can be used to create only static graphics, however HTML5 can be used to create 3D animations as well. HTML5 needs the user to download additional plug-in software, unlike adobe Flash.

HTML5 does not need the user to download additional plug-in software, unlike adobe Flash.

Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. Which among the following options will help him achieve this ? He can use a Joystick. He can use a HoloLens headset. He can use a TV stick. He can use a computer-simulated, 3-D environment with simulators.

He can use a TV stick.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus. He can use remote wiping to retrace the thief's steps. His phone can generate an alarm even if it is on mute. The current location of his phone can be pinpointed on a map through the phone's GPS.

He can use remote wiping to retrace the thief's steps.

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? Heading style Page margin References Header and Footer

Header and Footer

How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too. If the browser security setting is on a website sent from a friend, I always accept the setting.

I will need to review each browser security setting and use my best judgement.

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent? Image 1 is not as sharp as image 2 and has a smaller file size than image 2. Image 2 is sharper than image 1 and has a higher file size than image 1. Image 2 is not as sharp as image 1 and has a larger file size than image 1. Image 1 is sharper than image 2 and has a larger file size than image 2.

Image 1 is sharper than image 2 and has a larger file size than image 2.

In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called? Sampling In-betweening Virtual reality Rendering

In-betweening

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? A hacker is trying to put a Trojan on her computer. A worm has infected her computer and she needs to unplug her device. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does encryption work? It scrambles the information until the key is used to unscramble it. It is what happens when you download attachments from your email. It is a key that you insert into your computer to unlock your saved files. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.

It scrambles the information until the key is used to unscramble it.

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images? TIFF JPEG DOC GIF

JPEG

In terms of privacy, which of the following is a best practice? Posting your location on social media Keeping your Social Security number hidden in a locked box in your home Throwing away old bank statements that are more than three months old Saving your personal information as an email draft

Keeping your Social Security number hidden in a locked box in your home

Logan is considering web app development as a career option. Which of the following languages does he not need to master? CSS JavaScript HTML5 Logo

Logo

Which technology is used to convert the electric current to digital form to store and play the synthesized music on a computer or mobile device? Computer-aided technology Read-aloud technology MIDI technology Voice recognition

MIDI technology

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office? Design a new e-mail program. Use a generic e-mail software like Gmail. Make the program available as a web app. Have a mobile app developed.

Make the program available as a web app.

An elementary school includes computer science as part of its curriculum. Which of the following software could the school introduce to these students to create an awareness and interest in drawing and image editing, such that it closely simulates the real-time water colors, pastels, and oil paints that the children use? Microsoft Paint CoreIDraw Adobe Photoshop Adobe Lightroom

Microsoft Paint

Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop? Mobile app Native app Web-based app Cloud-based app

Native app

Using which of following methods of accessing media does the user access an original file stored on the media distributor's server? On-demand content Live video/audio streaming Downloading content Traditional cable or satellite telecast

On-demand content

Rohan has to create a presentation out of his thesis summary. He expects the presentation to have at least 50 slides. Which of the following parts of the presentation should he design first? First slide Title slide Slide master Last slide

Slide master

Avery is wondering if she could replace her traditional cable and satellite television subscription with a video streaming service to watch her favorite movies and TV shows on her TV. What, other than Internet connectivity, does she need to watch her favorite shows and movies? USB slot and a drive on her normal TV Video projector Normal LED TV Smart TV or a TV stick

Smart TV or a TV stick

What technology can be used by people with a hearing disability to listen to a narration? Speech recognition Read aloud technology Computer-aided technology MIDI technology

Speech recognition

Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin? Synthesized speech Computer-aided technology Virtual Reality MIDI technology

Synthesized speech

What is a digital certificate? Technology used to verify a user's identity The process of scrambling information so that it cannot be read The key to unlock information into a readable format A growing trend used to combine multiple types of authentication

Technology used to verify a user's identity

An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make it to achieve this? Make the company website usable with both mouse and keyboard at users' convenience. Upgrade the website hosting hardware to allow scalability and quick turnaround. Change the text contents of the website to list more details and information to the user. Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

A construction firm intends to use technology to help and enhance the design and architecture. In which of the following ways can the firm do that? Use a sampling software to choose the best design among the available ones. Use an image editing software to enhance the quality of images of designs. Use a computer-aided design software to create better and more accurate designs. Use an animation software to present designs better to clients.

Use a computer-aided design software to create better and more accurate designs.

How can you protect a computer from electrical spikes and surges? Unplug the computer when it is not in use. Use an uninterruptible power supply. Use a surge protector. Use a cable lock.

Use a surge protector.

How can you check data on devices connected through IoT network? Use a desktop Use a server Use a tablet Use a network tracker

Use a tablet

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: Create a list of invitees; Design the card; and Personalize the card. How should he go about the task? Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. Use a word processor for steps 1 and 2 and a graphics software for step 3. Use mail merge for steps 1 and 2 and a word processor for step 3.

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? Develop different versions of the same app for different programs. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Feed the existing code into cross-platform tools to develop different versions of the same app. Use the same set of codes for different platforms.

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future? Use vector images because they retain their clarity even when enlarged or shrunk. Use GIFs because they are a combination of images and provide alternatives in case a portion appears blurred. Use raster images because they retain their clarity even when enlarged or shrunk. Use cropped screenshots of paused video clips because video clips are a combination of images and provide alternatives in case images appear blurred.

Use vector images because they retain their clarity even when enlarged or shrunk.

How could an online attacker use your online profile to gather information about you to steal your identity? Use your profile pictures to figure out where you are. Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information. Pose as a long lost relative to become one of your friends. Use your posts to figure out answers to possible security questions.

Use your posts to figure out answers to possible security questions.

Which of the following kinds of information can be commonly inferred from a video file format name? Video codec compatibility Resolution Sampling software compatibility Bit rate

Video codec compatibility

What facilitates bundling of video, audio, codec, and subtitles into a single package? Video container In-betweening Sampling Compression

Video container

Alice went to a movie theater where she was given special headsets with eyeglasses to watch the movie. Her experience was so immersive that she felt almost no barrier between herself and the media. Which of the following digital media could she have been experiencing? Augmented reality 2-D animation Virtual reality Digital audio

Virtual reality

Which type of gaming system has sensors to detect the users' movements, and a head-mounted display that adjusts the vision and audio thereby replacing the environment as it would appear in real world? Virtual world Simulation Augmented reality Mixed reality

Virtual world

Which of the following audio formats does not use any compression technique? MP3 WAV MP4 WMA

WAV

Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who? VLOOKUP What-if analysis Pivot table Relative referencing

What-if analysis

Which of the following devices can be used to advance slides without having to click a button on the laptop? Laser pointer Wireless remote control Smartphone Stylus

Wireless remote control

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery? With simulators using motion-sensing consoles Using headsets like HoloLens that use 3-D holograms to project organs Using a joystick to move in different directions to practice hand movements of surgery Using computer aided technology that utilizes artificial intelligence to virtualize a surgery

With simulators using motion-sensing consoles

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report? Presentation Spreadsheet Word processor Messaging

Word processor

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work? OpenOffice Writer Zoho writer Prezi app Venmo

Zoho writer

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying cyberstalking social engineering data mining

cyberbullying

Technology can lead to all of the following behavioral risks EXCEPT _____. social withdrawal higher satisfaction with life depression and anxiety a sedentary lifestyle

higher satisfaction with life

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. turning off remote management to the device utilizing guest access when needed and turning it off when guests leave naming your router something you'll remember, like your street address creating a strong password to access the router

naming your router something you'll remember, like your street address


Related study sets

Chapter 15 Study Guide, CSC Final Exam

View Set

"Powiedz to po niemiecku" - cały rok.

View Set

Prep U: Chapter 4 Health of the Individual, Family, and Community

View Set

Test 2 McGraw-Hill Microbiology Chapter 8 & 9

View Set

Assessment and Management of Patients With Diabetes

View Set

Traditional IRA, Roth IRA and 401K

View Set

ICND1 - "Do I Know This Already?"

View Set