bcis exam 2 (my cards)
Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do? a) Create trendlines b) Create and run macros c) Format the sheets containing important data d) Move the data to a PowerPoint presentation
a) Create trendlines
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? a) M-commerce app b) Banking and finance app c) Photo editing app d) Social media app
a) M-commerce app
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. a) naming your router something you'll remember, like your street address b) turning off remote management to the device c) creating a strong password to access the router d) utilizing guest access when needed and turning it off when guests leave
a) naming your router something you'll remember, like your street address
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? a) His phone can generate an alarm even if it is on mute. b) He can use remote wiping to retrace the thief's steps. c) The current location of his phone can be pinpointed on a map through the phone's GPS. d) If the thief enters an incorrect passcode thee times, then a picture of the thief will be taken and emailed to Marcus.
b) He can use remote wiping to retrace the thief's steps.
In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called? a) Virtual reality b) In-betweening c) Rendering d) Sampling
b) In-betweening
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? a) A worm has infected her computer and she needs to unplug her device. b) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. c) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. d) A hacker is trying to put a Trojan on her computer.
b) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images? a) TIFF b) JPEG c) DOC d) GIF
b) JPEG
In terms of privacy, which of the following is a best practice? a) Saving your personal information as an email draft b) Keeping your Social Security number hidden in a locked box in your home c) Posting your location on social media d) Throwing away old bank statements that are more than three months old
b) Keeping your Social Security number hidden in a locked box in your home
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop? a) Mobile app b) Native app c) Web-based app d) Cloud-based app
b) Native app
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. a) downloading harmful content b) creating malware c) reading wireless transmissions d) viewing or stealing computer data
b) creating malware
In which of the following real-life situations would it be useful to use a digital certificate? a) if you were emailing a friend b) if you were signing a rental lease c) if you were submitting a paper to your professor d) if you were registering for an event
b) if you were signing a rental lease
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? a)Develop different versions of the same app for different programs. b)Use cross-platform tools to write code that will translate the existing Android app code into different native formats. c)Feed the existing code into cross-platform tools to develop different versions of the same app. d)Use the same set of codes for different platforms.
b)Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Samantha plans to self-publish her book on her website. She had asked a friend to design the cover of her book but he backed out at the last moment. Samantha now needs to design it herself. Which of the following apps should she use to complete this project? a) A presentation app to design graphics and a video editing app to insert snippets of videos b) A word processor app to write the text that would appear on the cover page c) A graphics app to design the cover page and place the desired text where needed d) A spreadsheet app to create graphics and text, and the inbuilt grid to arrange it
c) A graphics app to design the cover page and place the desired text where needed
Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format? a) As a collection of lines b) As a combination of alphabets, numbers and special characters c) As a list of the color numbers for all the pixels it contains d) In the primary colors format of RBY
c) As a list of the color numbers for all the pixels it contains
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? a) What-if analysis b) Sorting and filtering c) Conditional formatting d) Run macros
c) Conditional formatting
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? a) Transfer all financial record to spreadsheet. b) Convert all paper files to word documents. c) Create a database of company projects, customers and vendors. d) Continue with the old system.
c) Create a database of company projects, customers and vendors.
A construction firm intends to use technology to help and enhance the design and architecture. In which of the following ways can the firm do that? a) Use an image editing software to enhance the quality of images of designs. b) Use an animation software to present designs better to clients. c) Use a computer-aided design software to create better and more accurate designs. d) Use a sampling software to choose the best design among the available ones.
c) Use a computer-aided design software to create better and more accurate designs.
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do: 1. Create a list of invitees; 2. Design the card; and 3. Personalize the card. How should he go about the task? a) Use a word processor for steps 1 and 2 and a graphics software for step 3. b) Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c) Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. d) Use mail merge for steps 1 and 2 and a word processor for step 3.
c) Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Which type of gaming system has sensors to detect the users' movements, and a head-mounted display that adjusts the vision and audio thereby replacing the environment as it would appear in real world? a) Mixed reality b) Simulation c) Virtual world d) Augmented reality
c) Virtual world
R esolution of bitmap graphics is typically measured in ___________. a) frames b) megabytes c) pixels d) kilobytes
c) pixels
We need a(n) _____________ to play certain types of audio files, like MP3, on a desktop or laptop. a) sound recorder software b) sound card c) stand-alone player d) audio-input device
c) stand-alone player
Which is a first step to deter thieves from accessing your financial information? a) Be alert to signs that may indicate unusual activity in an account. b) Review financial and billing statements each month carefully. c) Follow up on calls regarding purchases that were not made. d) Do not provide personal information over the phone or through email.
d) Do not provide personal information over the phone or through email.
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? a) Photo editing app b) Paint app c) Video editing app d) Drawing app
d) Drawing app
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? a) Cyberbullying b) Technology addiction c) Repetitive strain d) Ergonomics
d) Ergonomics
A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent? a) Image 1 is not as sharp as image 2 and has a smaller file size than image 2. b) Image 2 is sharper than image 1 and has a higher file size than image 1. c) Image 2 is not as sharp as image 1 and has a larger file size than image 1. d) Image 1 is sharper than image 2 and has a larger file size than image 2.
d) Image 1 is sharper than image 2 and has a larger file size than image 2.
Logan is considering web app development as a career option. Which of the following languages does he not need to master? a) CSS b) JavaScript c) HTML5 d) Logo
d) Logo
An elementary school includes computer science as part of its curriculum. Which of the following software could the school introduce to these students to create an awareness and interest in drawing and image editing, such that it closely simulates the real-time water colors, pastels, and oil paints that the children use? a) Adobe Photoshop b) Adobe Lightroom c) CoreIDraw d) Microsoft Paint
d) Microsoft Paint
How can you check data on devices connected through IoT network? a) Use a network tracker b) Use a server c)Use a desktop d) Use a tablet
d) Use a tablet
Technology can lead to all of the following behavioral risks EXCEPT _____. a) social withdrawal b) depression and anxiety c) a sedentary lifestyle d) higher satisfaction with life
d) higher satisfaction with life
Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed? a) A device management portable app b) A device management mobile app c) A productivity app that is installed on all the devices d) An educational app accessible through browser
a) A device management portable app
_____________ programs and features are often integrated into video editing software. a) Audio-editing b)Computer-aided technology c) Virtual reality d) Simulation
a) Audio-editing
You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider? a) Because insiders create threats after incidents at their places of employment. b) Because insiders lack the knowledge of computers and networks to perform this task. c) Because insiders change contents to make a political statement. d) Because insiders like to cause disruption and panic among citizens.
a) Because insiders create threats after incidents at their places of employment.
Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using? a) Change font size, style, and color of the keywords. b) Define a heading style. c) Change page margins, size and orientation. d) Add hyperlinks for each keyword.
a) Change font size, style, and color of the keywords.
Jack does not own a smart TV, but he wants to watch programs from subscription video streaming services on his TV. Which among the following options will help him achieve this ? a) He can use a TV stick. b) He can use a Joystick. c) He can use a HoloLens headset. d) He can use a computer-simulated, 3-D environment with simulators.
a) He can use a TV stick.
How is digital audio better than analog audio in terms of quality? a) Higher sampling rate amounts to higher bit rate and hence better audio quality. b) Lower sampling rate amounts to lower bit rate and hence better audio quality. c) Higher resolution produces better audio quality. d) Lower bit rate and high resolution produce better audio quality.
a) Higher sampling rate amounts to higher bit rate and hence better audio quality.
Which of the following is NOT an image format to store photos? a) MP3 b) TIFF c) JPG d) JPEG
a) MP3
You can monitor and protect your financial data in all of the following ways EXCEPT _____. a) Requesting a credit report and freezing your credit. b) Throwing financial documents older than three months in the trash. c) Querying unfamiliar purchases found on your bank statements. d) Being cautious about what information you post on social networking sites.
a) Requesting a credit report and freezing your credit.
Avery is wondering if she could replace her traditional cable and satellite television subscription with a video streaming service to watch her favorite movies and TV shows on her TV. What, other than Internet connectivity, does she need to watch her favorite shows and movies? a) Smart TV or a TV stick b) Video projector c) Normal LED TV d) USB slot and a drive on her normal TV
a) Smart TV or a TV stick
Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin? a) Synthesized speech b) Virtual Reality c) MIDI technology d) Computer-aided technology
a) Synthesized speech
How can you protect a computer from electrical spikes and surges? a) Use a surge protector. b) Use an uninterruptible power supply. c) Use a cable lock. d) Unplug the computer when it is not in use.
a) Use a surge protector.
Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future? a) Use vector images because they retain their clarity even when enlarged or shrunk. b) Use GIFs because they are a combination of images and provide alternatives in case a portion appears blurred. c) Use raster images because they retain their clarity even when enlarged or shrunk. d) Use cropped screenshots of paused video clips because video clips are a combination of images and provide alternatives in case images appear blurred.
a) Use vector images because they retain their clarity even when enlarged or shrunk.
Which of the following audio formats does not use any compression technique? a) WAV b) MP4 c) WMA d) MP3
a) WAV
Which of the following is a characteristic of a strong password? a) letters, numbers, and symbols b) A short phrase c) personal information d) numbers in a series
a) letters, numbers, and symbols
A digital movie shows characters creating an illusion of natural motion, 360 degree rotation, and life-like and dynamic experience on the screen. This movie is most likely a(n)________ movie. a) virtual reality based b) 3-D animation c) 2-D animation d) augmented reality based
b) 3-D animation
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? a) Spam b) A Trojan c) A worm d) Ransomware
b) A Trojan
Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this? a) MIDI technology b) Artificial intelligence and machine learning c) Speech and voice recognition d) Streaming and geotagging
b) Artificial intelligence and machine learning
Patricia has started a new interior designing business. Her top five tasks are creating designs, sharing them with her team and potential clients, making presentations for potential clients, sending and receiving payments, and carrying out marketing on social media. Which of the following sets of apps should she use? a) Fotor, Amazon, PowerPoint, Priceline, Chrome b) Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook c) Google Calendar, OneDrive, Yelp, Venmo, Twitter d) Microsoft Word, Microsoft PowerPoint, Microsoft Excel, Facebook, Venmo
b) Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook
What would a password manager allow you to do? a) Prevent you from using birthdays in your passwords. b) Create and store multiple strong passwords. c) Test your memorization skills. d) Make sure you do not repeat passwords on similar accounts.
b) Create and store multiple strong passwords.
What is the primary difference between HTML5 and adobe flash types of web animations? a) HTML5 needs the user to download additional plug-in software, unlike adobe Flash. b) HTML5 does not need the user to download additional plug-in software, unlike adobe Flash. c) Adobe Flash incorporates HTML5 and therefore, is more efficient than HTML5. d) Adobe flash can be used to create only static graphics, however HTML5 can be used to create 3D animations as well.
b) HTML5 does not need the user to download additional plug-in software, unlike adobe Flash.
How will you decide which browser security settings to allow and which ones to block? a) If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. b) I will need to review each browser security setting and use my best judgement. c) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too. d) If the browser security setting is on a website sent from a friend, I always accept the setting.
b) I will need to review each browser security setting and use my best judgement.
What technology can be used by people with a hearing disability to listen to a narration? a) Computer-aided technology b) Speech recognition c) Read aloud technology d) MIDI technology
b) Speech recognition
How is the environment impacted by computers being thrown away in landfills? a) Data miners are digging up landfills looking for gold and platinum. b) The lead and mercury is seeping into the ground and water supply. c) The copper is creating fire dangers and explosive possibilities. d) The e-waste is increasing because more people are choosing to recycle.
b) The lead and mercury is seeping into the ground and water supply.
Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who? a) VLOOKUP b) What-if analysis c) Pivot table d) Relative referencing
b) What-if analysis
Which of the following devices can be used to advance slides without having to click a button on the laptop? a) Smartphone b) Wireless remote control c) Stylus d) Laser pointer
b) Wireless remote control
Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work? a) OpenOffice Writer b) Zoho writer c) Prezi app d) Venmo
b) Zoho writer
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. a) social engineering b) cyberbullying c) cyberstalking d) data mining
b) cyberbullying
Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone? a) Blackberry b) Android c) iOS d) Windows
b)Android
How is a worm different from a Trojan? a) A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. b) A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. c) A worm spreads through a network, whereas a Trojan hides inside another program. d) A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
c) A worm spreads through a network, whereas a Trojan hides inside another program.
How can an attacker execute malware through a script? a) An attacker can attach to a plug-in and when you allow the plug-in to run, it infects the website you were visiting. b) An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan. c) An attacker can attach a script to a program that you download which then infects your computer. d) An attacker can steal a cookie and impersonate you in a script, thereby infecting someone else's computer.
c) An attacker can attach a script to a program that you download which then infects your computer.
For an interview, Sean needs to familiarize himself with database software but cannot afford to purchase any software. Which of these app suites should he download? a) Microsoft Office b) G suite c) Apache OpenOffice d) Apple iWork
c) Apache OpenOffice
Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do? a) Assign specific instructions in slide master formatting to make slides and objects appear and disappear as required. b) Use hyperlinks to go to random slides to make it look like they are appearing and disappearing. c) Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object. d) Use sound effects to create the illusion of appearance and disappearance of objects and slides.
c) Choose specific transition effects and animations to allocate the kind of transition and time to each slide and object.
An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other? a) Fotor b) OpenOffice c) G Suite d) Canva
c) G Suite
How does encryption work? a) It is a key that you insert into your computer to unlock your saved files. b) It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. c) It scrambles the information until the key is used to unscramble it. d) It is what happens when you download attachments from your email.
c) It scrambles the information until the key is used to unscramble it.
Which technology is used to convert the electric current to digital form to store and play the synthesized music on a computer or mobile device? a) Read-aloud technology b) Voice recognition c) MIDI technology d) Computer-aided technology
c) MIDI technology
Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office? a) Have a mobile app developed. b) Use a generic e-mail software like Gmail. c) Make the program available as a web app. d) Design a new e-mail program.
c) Make the program available as a web app.
Using which of following methods of accessing media does the user access an original file stored on the media distributor's server? a) Traditional cable or satellite telecast b) Downloading content c) On-demand content d) Live video/audio streaming
c) On-demand content
Paul has opened a bespoke tailoring shop. He wants to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suites should he consider? a) Prezi, G suite b) G suite, Zoho c) OpenOffice, G suite d) Zoho, Apple iWork
c) OpenOffice, G suite
Rohan has to create a presentation out of his thesis summary. He expects the presentation to have at least 50 slides. Which of the following parts of the presentation should he design first? a) First slide b) Title slide c) Slide master d) Last slide
c) Slide master
How could an online attacker use your online profile to gather information about you to steal your identity? a) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information. b) Use your profile pictures to figure out where you are. c) Use your posts to figure out answers to possible security questions. d) Pose as a long lost relative to become one of your friends.
c) Use your posts to figure out answers to possible security questions.
What facilitates bundling of video, audio, codec, and subtitles into a single package? a) In-betweening b) Compression c) Video container d) Sampling
c) Video container
A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery? a) Using a joystick to move in different directions to practice hand movements of surgery b) Using computer aided technology that utilizes artificial intelligence to virtualize a surgery c) With simulators using motion-sensing consoles d) Using headsets like HoloLens that use 3-D holograms to project organs
c) With simulators using motion-sensing consoles
Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report? a) Presentation b) Spreadsheet c) Word processor d) Messaging
c) Word processor
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? a) encryption b) identity theft c) phishing d) dumpster diving
c) phishing
A video that is shared millions of times over social media in a short period of time is termed to be ____________ . a) fake b) original c) viral d) concurrent
c) viral
How can you protect your information when using social media? a) Make sure you have your credit or debit card linked to your social media account. b) Use the same password and username for your social media that you use for your online banking account. c) Have your security information marked public on your social media account. d) Accept friend requests from people you want to be friends with.
d) Accept friend requests from people you want to be friends with.
The quality of an audio file is determined by ___________. a) how pixelated it is b) the number of megabytes c) the number of frames per second d) its bit rate
d) its bit rate
With more and more people using technology, what physical health diagnosis is on the rise? a) technology addiction b) cyberbullying c) cyberstalking d) repetitive strain injury
d) repetitive strain injury
Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page? a)Heading style b)Page margin c)References d)Header and Footer
d)Header and Footer