BUS 1305 Final
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
"https" as the protocol in the URL The presence of "http" at the beginning of URL conclusively states that the website in not secure.
Which of the following stories can be said to be in the public domain?
A copyrighted story whose copyright has expired A story is considered in the public domain when its copyright has expired or has been explicitly released by the owner.
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse?
A desktop computer
The teachers in the Mathematics Department want to increase student retention and success rates in all the math courses. They are interested in looking for something that will allow students to check their progress, take practice tests, and message instructors with questions. What would you recommend they consider?
A learning management system
You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?
A photo of you horseback riding on the beach with friends.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?
Acceptable use policy (AUP)
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?
Android
Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study? You Answered
Articles published in a newspaper known to be neutral toward any political party An authentic source of information does not have a bias; it offers an objective point of view. It gains credibility by being cited on other websites and publications. Hence, a political commentator's website that is popularly quoted is a good information source for the study. Any other unbiased sources would also be authentic.
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Correct!
Be cautious about what information she posts.
Which of these is an optical medium of storage?
Blu-ray disc
Which of these is an optical medium of storage?
Blu-ray discs
Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?
Captioning software can be used to transcribe what is being said.
In a web app, where is data usually stored?
Cloud storage When you use a web app, the data is stored in the web app's server or in the cloud.
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which of the following problematic behaviors relies on the use of digital technology?
Cyberbullying
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. Which of the following apps should she use for cloud storage?
Drop box
Which of the following does a secure website use to safeguard transmitted information?
Encryption
An e-commerce website offers fewer models, colors, and sizes than a physical store.
False
Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components?
Gamepad
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement.
_____ is data and instructions entered into the memory of a device. Correct Answer
Input
What is one advantage of a company using an anonymous messaging app?
It allows for honest feedback without disclosing identities.
An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?
It allows the company to communicate to many users at once about an issue and release status updates.
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without life and death consequences. How would you describe the technology the flight simulator is using?
It is using virtual reality.
How does encryption work?
It scrambles the information until the key is used to unscramble it.
Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
JPEG
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.
Meeting invites
What are "hits" that search engines list on the first page?
Most relevant results
Jim wants to develop an app for a specific purpose that would run even when his computer is not connected to the Internet. What type of app should he develop?
Native app
Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?
Other search engines provide more reliable research. There are search engines like Google Scholar that are specifically designed for online research, and hence more suited for it.
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints?
Plotter
What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?
Plug-and-play devices
Which is the most suitable device to use in a classroom or a conference room to deliver presentations?
Projector
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?
Remove the battery and throw it in the trash.
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?
Repetitive strain injury
In the email communication process, what is the role of the email server?
Routing email messages through the Internet or a private network
You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?
Share the post on your news feed.
In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?
Social curation sites
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called?
Spiders The other name for spiders is crawlers. They comb the web to gather information about the webpages they visit.
What is a digital certificate?
Technology used to verify a user's identity
_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks. Correct Answer
The Internet of Things
Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?
The author uses emotional language to express a single point of view.
____ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.
The digital divide
A specialty search engine lets you search online information sources that general search engines do not always access.
True
How is an executable file different from a data file?
Unlike a data file, you cannot open and read executable files.
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
How do you create an email message?
Use an app or software to compose and send information.
Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?
Use the web directories created by health research institutions.
Which of the following is an example of someone who is NOT practicing good netiquette?
Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.
Virtual reality (VR)
Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?
Web conferences
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce?
Yes; it is a business transaction on a consumer-to-consumer website.
In which of the following situations is a digital certificate useful?
You are signing a rental lease.
Which of the following statements about browser security settings is false?
You must keep your accumulated web history as long as you use the browser.
How would you describe the social networking site YouTube?
YouTube is a media-sharing network.
What does a B2C website use to track the items you select on the website?
cookies
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.
data backup
A(n) _____ contains the instructions your computer or device needs to run programs and apps.
executable file
You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated.
false
ocial networking includes the following positive effects EXCEPT _________.
increasing your privacy
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____.
intellectual property rights
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
Which of the following would be considered a professional networking website?
Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?
list of posts with the most recent ones at the top
What rules should guide your behavior when you interact with friends and coworkers on social media?
netiquette
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
phishing
An operating system is also called a(n) _____.
platform
Which of the following is typical content for a podcast?
radio shows
Which of the following types of websites typically provides the least security?
social media sites
Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?
speech recognition software
What is the main purpose of an operating system?
to coordinate the resources and activities on a computer
What type of security requires something you know and something you have that no one else has?
two factor authentication
Which of the following is assigned to each webpage to identify its location on the Internet?
uniform resource locator (URL)
A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.
webpage not website
Google is an example of which type of website?
A search site
Where can you find the information about using an image that you obtained in a search result?
A usage rights filter shows information about using an image.
Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?
Add a formal citation and use the farmer's explanation in his paper.
Which of the following people will benefit the most from using a B2B website?
Akiko, who helps smaller businesses establish themselves in the market
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?
BCC your supervisor in your response
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce website will Blackbaud have?
Business to business Business-to-business (B2B) e-commerce involves transferring goods, services or information between businesses. B2B services include technical support such as the one offered by Blackbaud to nonprofit organizations.
Which of the statements about B2B e-commerce is correct?
Examples of B2B services are advertising, technical support, and training.
Kyle likes to keep in touch with his friends and family using the Internet. He enjoys sharing pictures, music, and ideas. He also enjoys playing games with others online. Which of the following online platforms should he use to do all of this?
Facebook, because it is an online social network that allows game play
Which of the following is a web app?
Google Docs
usinesses use webinars for the following reasons EXCEPT _____.
Group discussions
Which of the following is the strongest password?
H@veAGr3atDaY!
Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?
He should have periodic anti-virus scanning and software upgraded on all computers
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Rogelio wants to buy appliances for his newly leased apartment. He looks for information on PriceGrabber, a comparison shopping website. Which of the following advantages do sites such as this offer?
Price comparisons from different vendors
Which of these is not an input device?
Printer Printer prints out information stored in the memory of a computer - hence is an output device.
Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?
Processor core - some applications, especially games, have greater processor requirements
laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?
Reset the old phone to factory settings.Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?
Which of the following is a step in the email communication process?
The message travels along Internet routers to the recipient.
How do advertisers use data to know which products would most likely appeal to you?
They track your Facebook and Instagram posts and "likes."
How might a business use a blog?
To communicate with customers
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
A digital citizen is familiar with how to use technology to become an educated and productive member of the digital world.
True
What is the binary system?
a number system with two digits, 0 and 1
Cloud storage refers to the storage of data on ______.
a server on the Internet
Which company was the first to develop a computer meant for personal use
apple
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
What technology can collect information to make decisions, reach conclusions, and combine information in new ways?
artificial intelligence (AI)
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.
catfishing
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.
digital citizenship
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.
digital detox
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.
digital footprint
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
Samantha has a file named vacation.jpg. What type of file is it?
graphics file
Which of the following is not an input device?
headphone
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n) ______.
learning management system (LMS)
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
When you want to add information to a document, what role does your operating system play?
saves your unsaved work to temporary storage
Alex needs to email his graduation certificate to a prospective employer. He has only physical copies of the certificate. What device could he use to create an electronic copy of the certificate? Correct!
scanner
On what type of network can you rent things such as cars, tools, and rooms?
sharing economy network
Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.
sing your photos and posts to form impressions about your character
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.
the digital divide
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?
virtual reality (VR)