BCIS Exam 3
The difference between LAN and WAN is _____
Geographical area
The reduction of electricity consumed and the environmental waste generated when using a computer is called ____
Green computing
Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link?
HTML
Collectively, the four operations of input, process, output, and storage is considered to be the _____
Information processing cycle
Any hardware component used to enter data is a(n) ____
Input device
_________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.
Installation
Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?
Interpreters
If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a- Wired network b- Virtual private network c- Extranet d- Intranet
Intranet
What is uptime?
The measure of a web host's reliability
A modem can also function as what other piece of hardware? a- A switch b- A router c- A network interface card d- A hub
A router
What is a MAC address? a- An IP address unique to Apple's MAC computers b- The connection needed to access to a cellular network c- A unique hardware address for your device d- An alternate name Internet Protocol version 6
A unique hardware address for your device
Which of the following describes a domain registrar?
A website where you can go to purchase a name for your website.
Businesses use webinars for all of the following reasons except?
Group discussions
____ conveys meaning and is useful to one or more people
Information
_____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.
Installation
____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.
Installation
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?
Patch finders
A _____ includes the file name and possibly a directory or folder name
Path
A printer that produces photo-quality pictures is considered to be a(n) ____
Photo printer
_______ are types of tools that track the memory usage, status, and errors of currently running software.
Process Manager
_____ are tools that track the memory usage, status, and errors of currently running software.
Process managers
__________ are types of tools that track the memory usage, status, and errors of currently running software.
Process managers
In which category of software do Microsoft Office Word and Excel belong?
Productivity
A ____ is a set of computer instructions that carries out a task on the computer
Program
Assembly languages are the second generation of languages that use symbolic instruction codes, such as A for add, M for multiply, and L for load.
True
Flash memory cards are solid-state media with no moving parts
True
If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.
True
Magnetic Disks use magnetic particles to store items on the disks surface
True
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.
True
Microsoft Windows 10 is compatible with office, 2010,2013, and 2016
True
When you create an app, you are protected under copyright laws, even before you apply for a copyright.
True
A flash memory storage device that plugs into a USB port is called a
USB Flash Drive
A _____ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network
Worm
Which of the following is an implementation of OOP concepts?
Writing objects and creating instances based on functional need
A business can use a wiki in all of the following ways EXCEPT for ______.
aggregating content
A business can use a wiki in all the following ways EXCEPT for _____.
aggregating content
During which phase of the SDLC is software tested to make sure each function works as intended? -all phases -design -analysis -implementation
all phases
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
If you want to remove an older email from your inbox, but not permanently delete it, you can _______ it.
archive
The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages? a- The company would have to use NFC to facilitate close-range communication. b- The company would have to use RFID transmitted through radio signals. c- The company would have to use an IrDA network protocol within close proximity. d- The company would have to use a high-speed data transmission with access to high bandwidth.
c- The company would have to use an IrDA network protocol within close proximity.
In a connected network, how are hubs and switches similar to one another? a- They transfer data to all devices. b- They are interchangeable terms for the same hardware c- They provide a central point for cables in a network. d- They can only connect to a single device.
c- They provide a central point for cables in a network.
Which of the following tools translates the source code of a procedural program into binary code?
compiler
Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?
crash
Which of the following is not a resource able to be shared in a network? a- Files b- Printers c- Software d- Motherboards
d- Motherboards
A URL consists of a ____, domain name, sometimes the path to a specific web page or location in a web page, and the web page name
protocol
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials.
piracy
What is an ISP?
A telecommunications company that sells Internet access.
Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?
App Store for iOS
A storage device is used to store data when the data is not being used in memory
True
A kilobyte represents approximately ____ memory locations
1,000
When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?
A CMS allows you to set roles for each person granting responsibility for certain webpages.
How does studying website analytics allow a company perform better?
A company will learn when it needs to increase its bandwidth.
During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken, would be a bad one?
A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary
During the planning phase of a software design project, the team members working on it were identified. While identifying a designer, the committee contemplated if an inexpensive and underqualified person could be used. Which of the following statements are valid and based on the premise that the decision, if taken would be a bad one?
A designer develops the program's user interface, including colors, fonts, and layout. As he focuses on the user experience, ease of product use and navigation of the software, a designer is necessary.
Which of the following would most likely be a static website?
A historical facts page
What is an evil twin in the computer world? a- A device infected with malware that an attacker uses to control the device remotely. b- An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence. c- A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. d- A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?
A photo of you horseback riding on the beach with friends.
Simon established a startup. He wanted to secure a domain name and have a website to market and sell his products. In this regard, which of the following should be the first step?
Acquire trademarks and copyrights in order to protect against piracy and to develop license agreements.
How would you design a webinar that would be interactive?
Add a poll
A software company is working on a new project for a mutual fund organization. The client expects the scope the project to be flexible; their goals are evolving and they needed to test the product as and when components are finished . Which type of project development methodology should be adopted?
Agile Development
A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as and when components are finished. Which type of project development methodology should be adopted?
Agile development
A company received a proposal for the development of a new software. While analyzing the specifications, it was found that there was no clear goal and the scope of the project could evolve. Which methodology should the company adopt to execute this project?
Agile development methodology/ model
Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program he could develop that, if needed, the company could use, modify and redistribute without restrictions. Which of the following would be an answer that would impress the interviewer?
An open source program
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files, as well as any associated entries in the system files.
In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
What tool is used to understand how people use your website?
Analytics
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent?
Antispyware
What type of program would have a class named Student with objects called fullTime and partTime?
B:object-oriented program
Why does net neutrality affect Internet connections?
Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.
You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a TV show, your brother is playing an online game, and your parents are both checking emails. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened? a- Because of FCC rules, ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided. b- Because of FCC rules, content that requires more bandwidth is given preference over content that does not require as much bandwidth. c- Because of net neutrality, your ISP provider has reduced its bandwidth to cut costs, slowing the Internet for you. d- Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?
Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? a- RFID b- IrDA c- Bluetooth d- NFC
Bluetooth
Which of the following is true about broadband connections? a- Broadband connections are "always-on" with devices connected to them. b- Broadband connections require a wireless router in order to increase their speed. c- Broadband connections turn off after lack of activity for a period of time, similar to when computers go to sleep. d- Broadband connections are difficult to find as there are few of them around today.
Broadband connections are "always-on" with devices connected to them.
Marly was trying to finish some work on the train during her commute home, but the webpage was not displaying with the proper layout or formatting on her smartphone. Which of the following was likely coded incorrectly to cause the error?
CSS
Which of the following specifies the format and appearance of page content on webpages?
CSS
How will cellular networks challenge cable and DSL providers in the future? a- Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services. b- Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services. c- Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services. d- Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.
Cellular providers are continuing to increase theirs speeds and bandwidth causing users to drop cable and DSL services.
______ storage is an internet service that provides hard disk storage to computer users
Cloud
_____ is an internet service that provides hard disk storage online to computer users
Cloud storage
Each ____ on a menu performs a specific action
Command
File transfer programs belong in what software category?
Communications
It is often required to transfer huge files across locations within businesses and corporate offices. Email usually cannot handle such large files which is why file transfer tools are available to perform such tasks. Which of the following categories of programs and apps do these tools belong to?
Communications
What does a DSL modem use to send and receive digital data? a- A wireless routerb- Copper telephone wiringc- Cable TV connectionsd- A network interface card
Copper telephone wiring.
File management does not include ____
Copying files
The LCD monitor uses a liquid ______ display to produce images on the screen
Crystal
Which of the following could indicate a DoS attack on your company server? a- Customers are required to enter personal information as they complete an order form. b- Customers cannot download the most recent newsletter. c- Customers cannot view the website on their device because the page will not load. d- Customers are receiving too many emails about special offers.
Customers cannot view the website on their device because the page will not load.
What does XML use to describe data?
Customized tags
______ is a collection of unprocessed items
Data
Which of the following is a general guideline for developers?
Define the standards, or sets of rules and procedures, to create a standard product.
Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?
Digital Rights Management
Screen resolution indicates the number of pixels (_____) that the computer used to display the letters, numbers, graphics, and background you see on the screen
Dots
Archie wants to use a newly launched web browser on his computer. What steps should he ideally follow to get it on his system?
Download the program from the manufacturer's website and install it on his computer.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? a- You could encrypt the data and then use the company NAS device and assign permissions only to the president. b- You could send the email and then forget to attach the report causing the president to call and ask you about it. c- You could encrypt the data in the report that only you can decode. d- You could send a flash drive with the report on it that you have password protected with the president's name.
Encrypt the data in the report
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? a- Extranet b- VPN c- Wi-Fi d- Intranet
Extranet
A dialog bar is displayed when windows 10 needs to supply information to you
False
A gigabyte represents approximately one million memory locations
False
A graphical user interface is an interface that displays graphics only
False
A root kit is a collective name for malicious software that is secretly added to a users computer that act without the users knowledge and deliberately alter the computers operations
False
A smart band is a narrow band that forms a circle on the disks surface
False
Cloud backup software periodically saves your files and settings to an external hard drive.
False
Like a virus or worm, a Trojan horse does not replicate itself to other computers
False
Programmers use compilers to test code to find errors and provide suggestions to fix them.
False
Sleep command will save all of your work and then shut the computer down
False
T/F: Some of the more commonly used system software programs are word processing, presentation, spreadsheet, database and email
False
Which of the following is an authentication method to keep your data safe?
Fingerprint scanner
_________ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.
Firewall
Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?
Fourth generation language
A ____ is a set of choices, often graphical, arranges in a grid or in a list
Gallery
Which of the following components on a webpage is created using HTML?
Heading
A scroll bar is a ____ bar that appears when the contents of an area may not be visible completely on the screen
Horizontal, vertical
______ is the communications standard used to transfer pages on the web
Hypertext transfer protocol
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use it and what actions they can perform?
Incorporate biometrics and the need for passwords to access the application
A company intends to improve the productivity of its developers so that the programming is easier and can be finished quickly with fewer syntax errors. What should the company provide to its developers to work?
Integrated development environment (IDE)
__________________ refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos.
Intellectual property
What is one advantage of a company using an anonymous messaging app?
It allows for honest feedback without disclosing identities.
An online game developer had an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email? a- The signature was consistent with other emails from your bank. b- It was written in an overly formal tone. c- It contained typos and other grammatical errors. d- It did not include a promotional offer.
It contained typos and other grammatical errors.
Which of the following statements is NOT true about a local firewall? a- It is also called software firewall. b- It is often built into a company's operating system. c- It inspects data being transmitted to or from a network. d- It is a physical device that acts as a protective barrier.
It is also called software firewall
What is the working procedure of DevOps methodology?
It produces programs quickly, and then offers continuous updates to increase the functionality of the program.
Which of the following is true about XML?
It provides a way to classify data and share it between applications.
Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important?
It will let you know how the visitors are using the site and where there might be problems
Which of the following is an example of an object-oriented programming language?
Java
A ____ is an input device on which you key in, or type, data.
Keyboard
______ are keys you press to quickly perform a task using the keyboard
Keyboard Shortcuts
Which of the following network standards applies to cellular networks?
LTE
When describing a client/server network, which of the following would be considered a client? a- Desktop b-External hard drive c- Laptop d- Printer
Laptop
_____ off the computer closes any open programs, allows users to save any unsaved documents, end the Windows 10 system, and makes the computer available for other users
Logging
A utility program will allow you to complete:
Managing disk drives, printers and other media
Which of the following statements is true about public networks? a- Your home network is a public network. b- All public networks are free. c- Hackers cannot intercept data transmitted over public networks. d-Many public networks are not secure.
Many public networks are not secure.
To maintain professional communication, you should avoid using all of the following EXCEPT _____.
Meeting invites
To maintain professional communication, you should avoid using all of the following EXCEPT ________.
Meeting invites
The main circuit board of the system unit is the _____
Motherboard
Which of the following is not a resource able to be shared in a network?
Motherboards
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? a- Jenn's iPhone b- My Verizon VPN c- xfinitywifi d- Starbucks Wi-Fi
My Verizon VPN
What internal device does a computer use to connect to a wired or a wireless network? a- Network interface card b- Motherboard c- Switch d-Hub
Network interface card
A gigabyte represents approximately ____ memory locations
One billion
A(n) ____ allows users to communicate with and control their computers
Operating System
Which of the following best defines responsive design?
Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.
A task pane can remain open while working in a document
True
At the monthly meeting, Che, Director of Development, realized that deadlines were disregarded and program codes were missed during development of the department's new interface. The product's budget and schedule were inconsistent so Che was having trouble getting a clear picture of the project and its progress. Whose role and responsibility was all of this?
Project manager
A project was successfully implemented for a banking customer. The team that worked on the project was deallocated on the closure of the project. However, the client came back after a couple of months with a few functionality changes and the company could not allocate the same set of developers back to the project. The new team of developers had a tough time understanding the existing code and functionalities. What could be the reason?
Proper documentation was missing that would have helped the new team understand the product better.
What kind of products are accessible from the Internet without requiring permission to use them, thereby free from being subjected to copyright violations?
Public domain products
What kind of software products can you download from the Internet without being subjected to copyright restrictions?
Public domain software
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?
Publish to a web server
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this?
Ransomware
Which software development method uses highly skilled programmers to shorten the development process while producing quality software?
Rapid Application development model
A software development team was asked to release a banking app by a certain date. The app is vast with high security access controls and multiple other features. The team could not meet the deadline with all of the features in it. Which of the following options is the best possible way to troubleshoot this scenario?
Release an initial stable version with important features prioritized, and then add features as upgrades.
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
Restorers
When it comes to secure data storage on a network, which of the following statements is true? a- Encrypted files are not able to be saved on a network attached storage device. b- Files stored on a network are accessible to all who can access that network. c- Passwords are the safest method for protecting files on a network. d- Roles can be granted to individuals to view files and make changes to files on a network.
Roles can be granted to individuals to view files and make changes to files on a network.
What hardware is essential to creating a home Wi-Fi network? a- Router b- Ethernet cord c- Monitor d- Printer
Router
In the email communication process, what is the role of the email server?
Routing email messages through the Internet or a private network.
Which commonly used programming language is used to manage, access, and search for database content?
SQL
Multiple issues were reported by the users over a chat application's version 1.0. Which of the below should the company release to address all these in a single issue?
Service pack
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?
Service pack
Which of the following programs are distributed for little or no cost, or for a brief trial period?
Shareware
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?
Shareware
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a- She has installed switches that interact with the installed app on her phone. b- She uses a hub at her home that she connects to through the app. c- She dialed into her home modem through the app and sent a command through the router. d- She has a home network with smart home devices.
She has a home network with smart home devices.
The ____ shows the name of every computer user on the computer
Sign-in screen
An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase?
Site license
Daniela's company has made the decision to allow employees to work from home as the company has outgrown their physical space. Knowing that not all employees may have the same device, what would be the best method of digital communication that would allow employees to see each other and participate in meetings seamlessly?
Skype
In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?
Social curation sites
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a- A zombie attack b- Spyware c- Social engineering d- An evil twin
Social engineering
______ is an online community that encourages members to shake their interests, ideas, photos, videos, etc. with other users.
Social networking
____ is the process of creating programs and apps from the idea stage to distribution to users.
Software development
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
A utility program allows a user to perform maintenance type tasks usually relates to managing a computer, it's devices or it's programs
True
In a _______ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a- Mesh b- Ring c- Star d- Bus
Star
Which of the following is not a general guideline for developers?
Start programming before creating a proposal.
During which phase does the program or app receive necessary maintenance, such as fixing errors or improving its functionality, performance monitoring to ensure the efficiency of the program or app?
Support and Security phase
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?
Support and security phase
The case that contains electronic components of the computer used to process data is a ____
System Unit
Hector wants to purchase a new laptop. Which of the following is the most important pre-installed program that he should check for on the laptop before buying it, so that he can start to use the laptop as soon as he owns it?
System software
The project manager of a software development team needs to hire someone to review every part of the software to make sure it works as intended. What position should he advertise for?
Tester
You posted new photographs from your trek to Nepal up on Shutterfly, and the site asks you to review the metadata. You would review all of the following EXCEPT _______.
The HTML coding
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure.
How does a wireless network key work with an encrypted wireless network? a- The wireless network key is your password for logging onto an Internet email system to receive files. b- The sending and receiving devices must know the wireless network key to communicate. c- The wireless key is the encryption code needed by the receiver to decode the file. d- The wireless network needs the key to decode the data before sending.
The sending and receiving devices must know the wireless network key to communicate
How do the HTML tags assist a web server in locating a web address?
They aid the web server in identifying the content on the webpage, so if a search is performed and there is a match, it is displayed to the reader.
Devices on a _____ area network are connected via Bluetooth. a- Personal b- Local c- Wide d- Metropolitan
personal
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? a- They overload the server with network traffic so webpages will not load. b- They disguise the network as an evil twin. c- They use adware filling your screen with unwanted advertisements until you click on one. d- They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
They disguise the network as an evil twin.
If you do not want to use your Internet Service Provider (ISP) for your email account, how could you acquire a webmail account?
Through an online service
How might a business use a blog?
To communicate with customers
If HTML is used to specify the content of the webpage, then what do you use CSS for?
To define the page layout
What is the U.S. Federal Communication Commission's role in regard to Internet access? a- To release rules surrounding Internet access b- To restrict Internet access by location and population c- To regulate the bandwidth each website can have d- To rate Internet sites similar to movie ratings
To release rules surrounding Internet access
A(n) ______ is a narrow record in band that forms a full circle on the surface of the disk
Track
A class is a type of object that defines the format of the object and the actions it can perform.
True
A license agreement specifies the number of devices on which you can install the product, any dates of expiration, and other restrictions.
True
_____ are new releases of an app and may require an additional fee before you can install them.
Upgrades
___________ might include additional features not available in the version you currently are running. They are new releases of the program or app, and may require an additional fee to enable the program to install.
Upgrades
How do you create an email message?
Use an app or software to compose and send information.
Mario is trying to finalize an equipment order before work. He is using his smartphone while riding the train to the office, but for some reason not all the content is appearing. Mario tries turning the phone in his hand to see if landscape orientation would help with the layout problems, but it does not. What have the developers failed to do correctly so that Mario can interact the webpage on his smartphone?
Use responsive design
A company develops a gaming application that intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this?
Use the activation technique
A company develops a gaming application that it intends to sell. One of the scenarios that the sales team is concerned about is when multiple users use the app from multiple devices for a single fee if the login credentials or security access key is shared among the members. What is the best solution to prevent this?
Use the activation technique
What area of software development focuses on the user's reaction to and interaction with the software product?
User experience
A(n) ____ is hardware and software that you use to control and communicate with your PC
User interface
Social networking can leave you exposed to criminal activity in all of the following ways except?
Using photo and posts found about you on the apps to form opinions about your ethics and character.
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in bikini on Facebook and texted them to other men in the office.
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? -Extranet -Intranet -Wireless network -Virtual private network
Virtual private network
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? a-Intrane tb- Wireless network c- Virtual private network d- Extranet
Virtual private network
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?
Visit the manufacturer's website and install the latest updates for the app.
Which of the following would be considered a strong password?
Wbcm2!4!820!
What type of network sends signals through airwaves and usually does not require cables? - Wireless Network - Wired Network - Intranet - Virtual Private Network
Wireless network
Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?
With responsive design
A surgeon has to perform a complex brain surgery on a patient. How could she practice her fine motor skills prior to the surgery?
With stimulators using motion- sensing consoles
Is it advisable to enable automatic updates on security software?
Yes; this helps in catching and quarantining any new malware before they harm the computer.
When using encryption from your home computer, how you configure the router? a- You can use the wireless router to intercept encrypted information and block it from entering the network. b- You can use the wireless router to verify the security certificate of the encrypted data being sent. c- You can use the wireless router to set the encryption key and type of encryption. d- You can use the wireless router to encrypt and then decode the encryption on information sent and received.
You can use the wireless router to set the encryption key and type of encryption.
As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?
You could encrypt the data in the report that only you can decode.
How would you describe the social networking site YouTube?
YouTube is a media-sharing network that lets users display and view videos and then post comments.
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.
digital rights management
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. a- ethernet b- firewall c- protocol d- rootkit
firewall
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
firewall
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
Posting hostile or insulting comments in response to someone else's blog post is called _______.
flaming
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
freeware
A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?
incomplete documentation
Social networking includes all of the following positive effects except ________.
increased privacy
Social networking includes all of the following positive effects except _________.
increased privacy
Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?
integrated development environment (IDE)
What is a popular language for writing client-side scripts or scripts that run in your browser to control a webpage's behavior?
javascript
What defines the behavior of an object in object-oriented programming?
method
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot
In order for your router to access Internet connections, it must be connected to a _____. a- hub b- modem c- network d- switch
modem
Which of the following does a software license usually specify?
number of people authorized to use the software
Which of the following is an example of a personal area network?
smartwatch and phone connected via Bluetooth
What do you call the rules each programming language has for writing instructions?
syntax
As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing? a- How long it will take to access a backup of files. b- The inability to access your files if you lose your Internet connection. c- The files you will lose if your computer crashes. d-The amount of space that files will take up on your computer.
the inability to access your files if you lose your Internet connection.
A business would use an analytic tool for all of the following EXCEPT _____.
viewing why someone visited your webpage
Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?
waterfall method
At what point are you responsible for following the terms in a software license agreement?
when you click or take another action to accept the terms
Christian wants his company's blog to be informative, have a search function, and allow user to leave comments. A dynamic website rather than a static website would be better for him because a dynamic website _______.
will allow user interaction
Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.
wireframes
Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?
wordsmithing.com