Exam 2
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure.
If HTML is used to specify the content of the webpage, then what do you use CSS for?
To define the page layout
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
Is it advisable to enable automatic updates on security software?
Yes; this helps to catch and quarantine new malware before it harms the computer.
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?
An uninstaller removes the program files and any associated entries in the system files.
The news report a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment.
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
What would a password manager allow you to do?
Create and store multiple strong passwords.
Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?
Freeware
Daria created a webpage and wants to make sure her code meets the latest HTML 5 standards. What can she use to check for errors such as deprecated tags and missing attributes?
HTML5 validator
Which of the following components on a webpage is created using HTML?
Heading
Which of the following is NOT a feature of an integrated development environment (IDE)?
Hosts webpages
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x 350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
Image 1 is sharper and has a larger file size than image 2.
Which of the following programming languages adds interactivity to websites?
JavaScript
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Which of the following network standards applies to cellular networks?
LTE
How does discarding computers in a landfill affect the environment?
Lead and mercury in computer parts are seeping into the ground and water supply.
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
My Verizon VPN
Scott is seeking a position in a information technology (IT) department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What type of programs is the interviewer referring to?
Open source
Which of the following best defines responsive design?
Pages automatically adjust the size of their content to display appropriately relative to the size of the screen.
Which of the following is a common copyright infringement that involves illegally copying softwares, movies, music, and other digital materials?
Piracy
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?
Require users to identify themselves using biometrics or passwords.
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
She has a home network with smart home devices.
What is it called when someone attempts to befriends you online for the purpose of stealing confidential or sensitive information?
Social engineering
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection.
Which of the following is a step in the email communication process?
The message travels along Internet routers to the recipient.
How might a business use a blog?
To communicate with customers
How do you create an email message?
Use an app or software to compose and send information.
A video that's shared millions of times over social media in a short period of time is termed to be _____
Viral
Which of the following audio formats does not use any compression technique?
WAV
Edward is a composer and needs to listen to the most accurate music files to create his compositions. What audio file type should he use to record his music?
WMA
What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?
antispyware
If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.
archive
Posting hostile or insulting comments in response to someone else's blog post is called _____.
flaming
Technology can lead to all of the following behavioral risks EXCEPT _____.
higher satisfaction with life
The quality of an audio file is determined by ___________.
its bit rate
Vivian is using a search engine to find photos for a school project. What search engine tool should she use to find photos she can legally copy and share?
license filter
To access the internet, a router must be connected to a____
modem
What kind of software products can you download from the internet without being subjected to copyright restrictions?
public domain software
A process called _______ converts analog sound waves into digital sound.
sampling
Which of the following types of websites typically provides the least security?
social media sites
You need a(n) _____ to play an MP3 audio file on a desktop or laptop computer.
stand-alone player
What do you call the rules each programming language has for writing instructions?
syntax
Why would you want to connect your computer to a network?
to access shared resources
The hardware a digital device needs to play videos includes a screen, speakers, and a ______
video card
Software simulating a real or imagined environment that appears as 3-D space is also called a _____.
virtual world