BCIS Exam 2 review

Ace your homework & exams now with Quizwiz!

A digital movie shows characters creating an illusion of natural motion, 360 degree rotation, and life-like and dynamic experience on the screen. This movie is most likely a(n)________ movie.

3-D animation

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A Trojan

Martha has been appointed as the Data Security Manager of her organization. The company wants her to have a customized app created that can be used to remove viruses from the infected systems without connecting to the network. What type of app should she focus on getting developed?

A device management portable app

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

How can you protect your information when using social media?

Accept friend requests from people you want to be friends with.

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer.

Computer-aideddesign software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this?

Artificial intelligence and machine learning

Raina is putting finishing touches on her Ph.D. thesis report. She feels she should emphasize the keywords throughout the thesis. How can she do this in the word processor she is using?

Change font size, style, and color of the keywords.

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? !!!!

Create a database of company projects, customers and vendors.

What would a password manager allow you to do?

Create and store multiple strong passwords.

A graphics designer created the company's logo so the company can resize it to multiple dimensions based on the need without the use of any photo editors. Which of the following image file formats is most likely to have been used to make this happen?

EPS

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

An organization has its employees working from home. Which of the following productivity apps should the employees use so they are able to collaborate easily with each other?

G Suite

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps.

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?

Image 1 is sharper than image 2 and has a larger file size than image 2.

Using which of following methods of accessing media does the user access an original file stored on the media distributor's server?

On-demand content

An online marketing company wants to improve its sales by taking advantage of HTML5 features. Which of the following changes can it make it to achieve this?

Use 2-D videos, images, graphical buttons, and icons to trigger actions such as displaying a menu or navigating to a new page on the website.

What facilitates bundling of video, audio, codec, and subtitles into a single package?

Video container

Which of the following audio formats does not use any compression technique?

WAV

Which of the following devices can be used to advance slides without having to click a button on the laptop?

Wireless remote control

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

In which of the following real-life situations would it be useful to use a digital certificate?

if you were signing a rental lease

How does encryption work?

it scrambles the information until the key is used to unscramble it.

Which of the following is not an analog device?

laptop

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

We need a(n) _____________ to play certain types of audio files, like MP3, on a desktop or laptop.

stand-alone player

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

Talis shoots a photo with his 20 megapixel digital camera. How is the image stored in the digital media format?

As a list of the color numbers for all the pixels it contains

You are watching the news and learn that there has been a security breach of credit card information at a large department store. The news report also states that the same company has had recent layoffs. The report says that the company is looking into whether or not the breach was done by an insider. Why would the company investigate the possibility of the breach being from an insider?

Because insiders create threats after incidents at their places of employment.

In an animation video, one image in a frame is made to follow by another one in a slightly different pose, and so on until the motion is complete. What is this technique called?

In-betweening

Aaron has started a food blog on which he wants to post his recipes. He wants to place a good quality image that corresponds to each cooking step. Which file format should he use so that users do not experience a lag in loading of the website because of high-quality images?

JPEG

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Logan is considering web app development as a career option. Which of the following languages does he not need to master? !!!!

Logan is considering web app development as a career option. Which of the following languages does he not need to master?

Lauren wants to be a blogger but uses a Chromebook for writing posts and uploading them to the website. If she has an Internet connection, what software can help her do her work? !!!!

OpenOffice Writer

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

What technology can be used by people with a hearing disability to listen to a narration?

Speech recognition

What is a digital certificate?

Technology used to verify a user's identity

How is the environment impacted by computers being thrown away in landfills?

The lead and mercury is seeping into the ground and water supply.

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Sammy created a new logo for his client to be used on the company website as well as office stationary. However, it became an almost invisible blur when it was enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid this in future?

Use vector images because they retain their clarity even when enlarged or shrunk.

How could an online attacker use your online profile to gather information about you to steal your identity?

Use your posts to figure out answers to possible security questions.

Debra launched her start-up in 2016. After 2 continuous years of losses, she needs to now downsize. She has salary details of all employees in a spreadsheet report. Which of the following features should she use to decide how many people to layoff, and who?

What-if analysis

A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?

With simulators using motion-sensing consoles

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?

Word processor


Related study sets

CSCI Ch 5 Review (Conditionals and Loops)

View Set

Financial Accounting Final Review

View Set

Chapter 12: Case Study Question #3

View Set

D'Antoni Case Studies- Lower Limb

View Set

Policy riders for disability protection

View Set

12 Venture John the Baptist 12/6/20 Gr 6

View Set