CIS3003 Applications and Software

Ace your homework & exams now with Quizwiz!

Executable files

.exe, .msi, .app, .bat, .cmd, .vbs, .js, and .ps1 extensions are examples of what kind of files? Video files Music files Executable files Text files

Reformat the flash drive to use an NTFS file system.

A graphic designer is backing up some video files from a Windows desktop to a new 128-gigabytes flash drive. An error message appears indicating that a 6-gigabyte video file cannot be copied due to file size limitations. The graphic designer contacts the company help desk for a solution to the problem. Which of the following would be a solution that the help desk could offer? Reformat the flash drive to use an NTFS file system. Reformat the flash drive to use the FAT32 file system. Reformat the flash drive to use a MacOS file system. Reformat the flash drive to use the ext4 file system.

prevents unwanted advertisements

A pop-up blocker is a web browser feature that _________________. keeps the window in a minimized state prevents color images from being displayed prevents unwanted advertisements censors Internet searches

Use Task Manager to end task

A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take? Use Task Manager to end task Reinstall the application Continue to wait Repair the application

Proxy settings

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem? Browser cache Invalid certificate Proxy settings Private browsing

Accounting and commercial software

After working for a large corporate company for years, Tom has decided to start his own consulting company. He has hired a few people and has a list of loyal customers. He realizes he's going to need some software tools to help him run his new company efficiently. He needs software that can process orders, do business accounting, and run his payroll. He also needs software to organize sales leads and contacts. Which category of software should he look for? Accounting and commercial software Publishing software Project management software Database software

Modify

Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used? Read Full Control Modify Read & Execute

Business-specific application

Alice is an architect for a large design company. She spends most of her day working in a software program called AutoCAD. What do we call this type of software program? Productivity application Business-specific application Cloud-based solution Collaboration software

Principle of least privilege

An IT manager wants to limit the rights of employees whose job is to simply create and modify new database records. What is an access control principle that would help them accomplish this? Type 1 authentication Non-repudiation Principle of least privilege Single sign-on

FAT32

Ben wants to format his flash drive so it can be read on many types of devices, such as game consoles and different desktop computers running different operating systems. Which file system should he format his flash drive to so it can be used this way? FAT32 NTFS Ext4 exFAT

Enter one or more search terms for a topic.

Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet? Enter a MAC address to find out which device it is assigned to. Enter a package tracking number to find out a package status. Enter one or more search terms for a topic. Enter the filename of a file on your local hard drive to view the file.

C:\Caitlin\photos\Vacation\bluehill.jpg

Caitlin has saved a bluehill.jpg file in a Vacation subfolder on the internal C: hard drive of her Windows 10 laptop. Which of the following is a valid path to the subfolder and file? C:\Caitlin\photos\Vacation\bluehill.jpg C:/photos/Vacation/bluehill.jpg C:\photos\Vacation/bluehill.jpg C:Caitlin\photos\Vacation\bluehill.jpg

A highly trusted certificate.

Christian has logged onto his bank's website. He wants to pay some bills electronically and transfer funds to his savings account. He checks to see if the padlock icon is visible in the address bar. The padlock is there, and it is green. What does that indicate? The green color has no meaning. A highly trusted certificate. The certificate is pending, but you should trust it anyway. You should not trust a green padlock.

No, the maroon color indicates an invalid certificate.

Christopher is surfing the web and sees an amazing offer for a product he's interested in. He clicks the link and begins the process of purchasing the item. While he is proceeding with the purchase, he notices that the address bar is a maroon color. Should he proceed with putting in private information and purchasing the item from this site? Yes, maroon is a trusted certificate. Yes, maroon means a pending certificate. No, he needs to create a user account first. No, the maroon color indicates an invalid certificate.

Hyperlinks

Clickable text or images that take you to different sites on the World Wide Web are called __________. Attachments: Hyperlinks Navigation buttons Shortcuts

Processes

Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions at the same time. What is another name for the instructions? Services Processes Modules Tasks

File synchronization

Cynthia is part of a team that uses a cloud-based collaboration solution. She is editing a shared spreadsheet when she notices that other people's work is not appearing on her copy. What is the problem in this scenario? File synchronization File permissions Upload maximums File encryption

File extensions

Designations at the end of file names such as .docx and .html are called _____________. File extensions File domains File properties File permissions

Encryption

Diane has a few files on her computer that she does not want anyone to read. She has placed strict file permissions on them, which will help accomplish this goal. Which other security feature could she use to guarantee no one else can read these files? Zip Encryption Hide Compression

Server OS

Diane has been asked to install an operating system on a computer that's going to host a website and store community files for many users. Which type of operating system should Diane install on this computer? Server OS Mobile OS Embedded OS Workstation OS

Utility Software

Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software? Firmware Utility Software Device Drivers Operating System

OneDrive is installed by default on Windows systems (after Windows 7).

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive? Dropbox is installed by default on Windows systems (starting with Windows 10). OneDrive is a cloud-based storage solution. Dropbox is available as an Android application and an iPhone application. OneDrive is installed by default on Windows systems (after Windows 7).

With instant messaging, you and the message recipient are logged into the same sever.

Email and instant messaging (IM) seem to be very similar. What is the major difference between the two communication systems? Email is much faster. With email, you and the message recipient are logged into the same server. With instant messaging, you and the message recipient are logged into different servers. With instant messaging, you and the message recipient are logged into the same sever.

Attachments

Files that you send along with an email message are called __________. E-files Attachments Extras MMS

Embedded OS

Frank has purchased a new smart TV. The new TV has the capability of streaming content over the internet. This is possible because Frank's new TV has which type of operating system? Workstation OS Server OS Embedded OS Mobile OS

Move the applications to a cloud-hosted model.

Frank has worked for an insurance company for many years. The applications Frank uses are kept on local servers in the office building. Frank's company wants to save on costs and wants to have employees work from home.Which solution can Frank's company use to allow its employees to access the applications they need from anywhere and save on costs? There is no solution that accomplishes both. Put the applications on laptops and send the employees home with them. Move the applications to a cloud-hosted model. Pay a software company to redesign all their apps and host them for Frank's company.

Business accounting software

Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees. Which of the following types of business software could easily provide Hannah with the report she needs? Database software Spreadsheet software Project management software Business accounting software

HFS+

Henry has an older MAC computer running Mac OS 8.1. He needs to format a hard drive to put in this older computer. Which file system would work BEST for this older computer? HFS+ FAT32 APFS NTFS

Spreadsheet software

Henry has started his own business. He wants to track daily and monthly sales. Which software could he use to efficiently manage data and perform formula calculations? Database software Text editing software Spreadsheet software Imaging software

Full Control

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folder? Read Write Full Control Execute

It is moved to the Recycle bin.

If you select a file on your desktop and delete it, what happens to the file? It is moved to the Recycle bin. It is immediately deleted and removed from the storage media. Its filename is removed and it is deleted later. It is moved to the Recycle bin and deleted later.

Ext4

In your Pictures folder, you have a file named "BlueSkies:Pacific-3.png". Which file system are you using? FAT32 Ext4 NTFS HFS+

Jacob is using a Linux operating system; the file type is an image file.

Jacob, a system manager, is performing tasks in a command line interface and wants to access the "/usr/local/share/blueskies.bmp" file. Which file system and file type is he trying to access? Jacob is using a Windows operating system; the file type is an audio file. Jacob is using a Linux operating system; the file type is an image file. Jacob is using a Linux operating system; the file type is an audio file. Jacob is using a Windows operating system; the file type is an image file.

Install the latest driver

Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do? Reset the USB cable Restart Windows Power cycle the printer Install the latest driver

Add a pop-up blocker exception for the marketing research website.

Julie, a marketing researcher, uses her browser frequently to gather data from a variety of websites. Because many of these websites include pop-windows that can be annoying, Julie has set her pop-up blocker to block all pop-up windows. However, there are pop-up windows for a critical marketing research website that Julie needs to have displayed. What is the BEST solution to make sure the marketing research website pop-up windows are not blocked? Install another web browser and only use it for the marketing research website. Deselect the Block Pop-Up Windows option in the web browser. Add a pop-up blocker exception for the marketing research website. Use another marketing research website that does not have pop-up windows.

Remove the application add-on in the web browser.

Katy has uninstalled a photo editing application, but an icon still appears on her web browser for the application. Which of the following is the BEST solution for getting rid of the icon? Remove the application add-on in the web browser. Disable the application add-on in the web browser. Re-install and then uninstall the application. Clear browsing data and launch a new instance of the browser.

Plug-and-play

Lorraine, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken. Which of the following installation types does this BEST describe? Web based Plug-and-play Hot-swappable Manual

Mobile OS

Modern smartphones are amazing devices. They have more computing power than the computers that put a man on the moon in 1969. Which type of operating system do they run? Server OS Mobile OS Workstation OS Embedded OS

Settings

On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment? Control Center Start Menu Finder Settings

/usr

On a Linux system which directory contains applications and files used by users? /bin /usr /etc /home

Firmware

Pat has purchased a new piece of design software. After installing the software, she realizes that it's not performing as expected. After an internet search, she finds out that her video card's graphics microchip needs to be updated. What is the software embedded in a microchip called? Ladder logic Firmware GUI Software

Service

Processes are programs that run automatically in the background. Which type of process (program) is Windows Task Scheduler? Device manager Service Application Cron job

Business software

Robert is looking for software that will help him organize tasks and deadlines for his marketing team projects. Which of the following software types will MOST effectively provide the tools that Robert needs? Networking software Collaboration software Productivity software Business software

/ is a reserved character.

Sally is trying to name a folder "Student Grades/1st Period". She keeps getting an error message that reads "The file name cannot contain these characters.". What is wrong with her folder name choice? / is a reserved character. The name must be in lowercase characters. The space between "Student" and "Grades" is not allowed. The number 1 is not allowed; it must be changed to an alpha character.

Use the Roll Back Driver button in his video cards properties.

Sam has installed a new software game onto his computer. He reads on the internet that if he updates his video card driver software, the game will perform better. He installs the latest driver for his video card, but after installing the driver, it causes other problems on his computer. What is the simplest way Sam can fix this issue? Perform a firmware update to his video card. Use the Roll Back Driver button in his video cards properties. Uninstall the driver manually. Delete the new game.

Two-tier

Shelley is a marketing representative for an import/export business. Every time she meets with a customer, she uses a custom application installed on her laptop to update the customer account. The updated information is then sent to a company database server that's located in the corporate office. Which of the following is the application architecture model that Shelley is using to update customer information? n-Tier Three-tier One-tier Two-tier

Cookies

Small files that a website saves on your computer to remember your preferences are called ______________. Reminders Malware Fingerprints Cookies

To keep users from accessing and modifying its application files.

The Windows operating system provides several default system folders, including Windows, Program Files, and Users. Which of the following BEST describes why a Windows application would store its user-created files in a Users folder instead of its application folder (under Program Files)? To make sure that file names and file paths attributes are consistent. To allow executable application files to have a file extension such as .com or .exe. To keep users from accessing and modifying its application files. To make sure that file names and file paths are kept secure.

Principle of least privilege

The idea that users should only have computer permissions sufficient to perform their job role and no more is called what? Access control Elevated privileges Principle of least privilege Authorization

File Explorer

Timothy is using a computer that's running a Windows OS. He wants to rename a file on his local hard drive. Which of the following tools should he use? File Explorer Windows Settings Device Manager Task Manager

Format the flash drive to NTFS.

Tom has a 7-gigabyte file he wants to put on a 16-gigabyte flash drive. To be able place this large file on the flash drive, what must Tom do to this flash drive first? Re-partition the flash drive. Format the flash drive to NTFS. Format the flash drive to FAT16. Format the flash drive to FAT32.

Tom needs to elevate his computer rights.

Tom has started the Task Manager tool and sees a process he would like to stop. He has tried many times to stop the process, but the computer keeps asking him to log in as an administrator. What is the problem in this scenario? Tom needs to elevate his computer rights. The process is memory-resident. The process cannot be stopped. This is not Tom's computer.

Cache

Web browsers save website information in their _________, which helps the site load faster on future visits. Repository Storage Cache Memory

Operating system

What do you call the software that can communicate with a computer's hardware, provides a user interface to accept commands, maintains a filing system, and has built-in security features? Database Intrusion prevention system Virus software Operating system

Unwanted, unsolicited email

What is junk email? Poorly worded email drafts Another name for webmail applications Unwanted, unsolicited email Email applications that don't function well

Desktop

What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications? Background Desktop Home Screen Window

Start Menu

What is the name of the menu in the bottom left corner of the Windows environment? Windows Menu Command Prompt Main Menu Start Menu

Taskbar

What is the name of the narrow strip along the bottom of the Windows environment? Taskbar Navigation bar Shortcuts menu Toolbar

/

What of the following is a reserved character in the ext4 file system? : ? / |

To copy the email confidentially

When composing an email message, why might you want to use the Bcc field? To include extra-long email addresses To copy the email confidentially To include email addresses of newly hired employees To clarify the overall purpose of the message

When a website is not functioning as it should

When might it be MOST helpful to clear your browser's cache of temporary Internet files? Immediately after opening a new Microsoft Office document When a website is not functioning as it should After every Internet search When you switch to a different web browser

Operating System

Which category of system software provides a platform for application software to run on? Firmware Operating System Device Drivers Utility Software

Internet installation

Which installation method is most likely to put your computer at risk of downloading a virus? Software subscription App store installation Internet installation CD or DVD installation

CD or DVD installation

Which installation method often requires you to immediately install updates from the Internet after installation is complete? CD or DVD installation App Store installation Software subscription Internet installation

Firmware

Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions? Operating System Firmware Utility Software Device Drivers

Device drivers

Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner? Utility software Device drivers Firmware Operating System

One Tier

Which of the following Application Architecture Model tiers describes office productivity software? One Tier n-Tier Three Tier Two Tier

"Rivers.js" is an executable file in the "/Users/Hannah/" subfolder.

Which of the following BEST describes the file "/Users/Hannah/Rivers.js"? "Rivers.js" is an executable file with a "/Users/Hannah/Rivers.js" filename. "Rivers.js" is an executable file in the "/Users/Hannah/" subfolder. "Rivers.js" is an image file in the "/Users/Hannah/" subfolder. It's an image file with a "/Users/Hannah/Rivers.js" filename.

Database software

Which of the following applications can be used for storing, modifying, extracting, and searching data? Presentation software Word processing software Conferencing software Database software

Mozilla Firefox Google Chrome

Which of the following are web browsers? (Select two.) Mozilla Firefox Google Chrome Microsoft Visio Google Bing

Pin to taskbar

Which of the following commands makes an application shortcut appear on the taskbar? Stick to taskbar Show on taskbar Keep on taskbar Pin to taskbar

Certificate Authority (CA)

Which of the following describes an entity that issues digital certificates to certify the ownership of a public key? Certificate Authority (CA) Data Encryption Standard (DES) Public Key Infrastructure (PKI) Root certificate

Embedded OS

Which of the following describes the firmware in gaming consoles, TVs, and smart cars? Graphical User Interface Device management Access control Embedded OS

Partitioning

Which of the following divides a single physical disk into multiple logical drives called volumes? Fragmentation Defragmentation Partitioning Journaling

.tar

Which of the following file extensions indicates a compressed file? .wma .tar .js .run

Journaling

Which of the following file system features uses a change log to track file changes in the file system? Permissions Encryption Journaling Compression

A padlock symbol is displayed to the left of the URL in the address bar.

Which of the following indicates that a website is using a valid digital certificate to secure the website and encrypt data? The URL starts with "https" instead of "http". A padlock symbol is displayed to the left of the URL in the address bar. The web browser is updated to the latest version. There are no pop-up windows that appear when you access the website.

Microsoft

Which of the following is NOT an example of an operating system? Android Microsoft Linux Windows

File attributes and permissions

Which of the following is composed of a file's name; the date it was created; its size; whether the file is read-only, hidden, a system file, or an archive file; and who is allowed to see, edit, compress, and encrypt the file? File system File attributes and permissions Partition system Access control

Creating a PowerPoint presentation for a team meeting.

Which of the following is the BEST example of using an application that is locally installed without network access? Creating a PowerPoint presentation for a team meeting. Writing a letter using the Google Docs application. Viewing the latest email in your Outlook Inbox. Accessing a company folder through a VPN application.

microsoft gov

Which of the following lines will initiate an Internet search from the address bar of a web browser? microsoft.com microsoft gov microsoft.org testout.com

Windows

Which of the following operating systems require a file extension to execute a program? Linux MAC OS Windows Android

Script blocker add-on

Which of the following provides the ability to control which websites can run client-side scripting in your web browser? Web browser cache Web browser script deactivation Network proxy server Script blocker add-on

Google Drive Dropbox

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.) Adobe Acrobat Reader Google Drive Dropbox Adobe Photoshop Microsoft Word

Email client software

Which of the following software types would be considered collaboration software? Database software Project management software Word processing software Email client software

Forward

Which option should you choose to send an email you've received to a new person? Forward CC Reply Reply All

Reply All

Which option should you use to respond to every single person included on an email? Reply All Reply CC Forward

Reply

Which option should you use to respond to the sender of an email but not all the recipients? Forward Reply All CC Reply

Read

Which permission option lets a user view files but not change them? Read/Write Read Owner Administrator

Task Manager

Which tool can be used to view memory usage and the amount of memory different processes are currently using on your PC? Task Manager Device Manager Apps and Features Disk Management

Application software

Which type of software is the Microsoft Edge web browser? System software Command line interface Application software Operating system

Processes Details

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.) Performance Processes Services Details Startup

Disable the add-on while editing the report.

While editing a report in Google Docs, April receives a web browser error message that there's a conflict with a Google add-on that she frequently uses. Which of the following is the BEST solution for April to resolve the error message issue and continue editing the report? Switch to another web browser. Remove the add-on and then continue editing. Open the report in another web browser instance using a bookmark. Disable the add-on while editing the report.

Process management

While using Microsoft PowerPoint to create a company presentation, Jared notices that PowerPoint starts slowing down. Eventually none of the features become accessible and the program will not close. He decides to use Task Manager to stop the program from running. Which operating system management role is Jared using? Device management Service management Process management Disk management

Uninstall the software package.

You are replacing your graphics card and want to uninstall the current driver. Which of the following would be the BEST method to uninstall the driver? Uninstall the software package. Delete the software folder. Remove the device from Control Panel. Remove the device from Device Manager.

Hypervisor Type 1

You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using? An Embedded OS Hypervisor Type 1 Network Attached Storage Solid State Drive

Disable several of the extensions.

You are vacationing at a friend's cabin on the lake and using the office computer to complete some work-related tasks using a web browser. The browser keeps slowing down after a few minutes of use. You check for extensions (add-ons) and notice that there are several listed. Knowing that extensions can slow down a browser, what should you do to speed up the web browser processing time? Uninstall several of the extensions. Remove several of the extensions. Uninstall the web browser and re-install it. Disable several of the extensions.

Settings > Devices

You have just purchased a new keyboard and mouse combo and need to configure them. Where in Windows 10 would you go to do this? System > Devices System > Personalization Settings > Personalization Settings > Devices

A proxy server is filtering access to websites.

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem? The router has not been configured to perform port forwarding. Port triggering is redirecting traffic to the wrong IP address. A proxy server is filtering access to websites. A firewall is blocking ports 80 and 443.

Local installation

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose? Network hosting Local installation Cloud hosting n-tier application


Related study sets

Chapter 12 Introduction to Business Test Review

View Set

Human Development Chapter 6 Study Guide

View Set

intro into micro, CHAPTER 8: MIS, MIT exam 1 Ch 3 Flashcards, Econ 101 - Final Practice Test, Microeconomics chp18, Micro Final, microeconomics 20, microeconomics final, MicroEconomics, MICRO 18, chapter 5 econ pt. 2

View Set

Manifest Destiny, Louisiana Purchase, and Lewis and Clark

View Set

Chapter 28: Head and Spine Injuries

View Set

DRIVER'ED MODULE TEN Sharing the road with otherso

View Set

CH 4 Payroll Accounting and Taxation

View Set