Exam 2

Ace your homework & exams now with Quizwiz!

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.

Which of the following would most likely be a static website?

A historical facts page

____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Why is it not safe to connect to public wifi networks ?

Because these networks are rarely protected

What can you do to make sure you are not contributing to software privacy?

Buy software only from legitimate resellers or directly from the manufacturers.

Fire transfer programs belong in what software category?

Communications

Which of the following tools translate the source code of a procedural program into binary code?

Compiler

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

4G and 5G networks provide slower data transmission speeds than 3G networks. True or false

False

A Trojan is a malicious program that uses a computer network to replicate.

False

Bandwidth is a term that describes the number of devices connected to a network. True or False

False

Programmers use compilers to test code to find errors and provide suggestions to fix them. T or F

False

To prevent a laptop from being stolen, you can use a surge protector.

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

False

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code.

Fourth generation language

Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage. What coding language does he use to insert the link?

HTML

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. Why is this step important?

How visitors are using the site

Why is it important to be able to export data in an XML format?

It allows data to be shared between applications

Which of the following statements is NOT true about a local firewall?

It is a physical device that acts as a protective barrier.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Why would you include a banner on your website?

It makes the website more easily identifiable to visitors.

What is a popular language for writing scripts that run in your browser to control a webpages behavior?

JavaScript

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

JavaScript

In terms of privacy, which of the following is a best practice?

Keep your social security number hidden in a locked box in your home.

Which of the following network standards applies to cellular networks?

LTE

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What internal device does a computer use to connect to a wired or a wireless network?

Network Interface Card

Scott seeking a position in an information Technology (IT) department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interview referring to?

Open source

___ are tools that track the memory usage, status, and errors of currently running software.

Process managers

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Require users to identify themselves using biometrics or passwords.

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

Users of a news chat app reported many errors and bugs. What should the app developers release to solve the problems?

Service pack

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

Am growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

Site license

JavaScript likely controls which of the following elements on a webpage?

Slide Show

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

Support and security phase

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

To give you finer control over the content

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

A class is a type of object that defines the format of the object and the actions it can perform.

True

After designing a website, you transfer the website files from your local computer to a remote web server. True or False

True

Before you name your website, you need to search for other sites using that name and then purchase a domain name. True or False

True

Many new cars use embedded software to control motion sensors, backup camera, or a navigation system.

True

You use CSS to to specify the appearance of content on a webpage. True or False

True

What type of security requires something you know and something you have that no one else has?

Two-factor authentication

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

Which of the following would be considered a strong password?

Wbcm2!4!820!

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

With responsive design

Which of the following is a popular, user friendly CMS often used as a blogging platform?

WordPress

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?

autoplay

There are various risks from attacks on WiFi networks. These include all of the following except___.

creating malware

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

When describing a client/server network, which of the following would be considered a client?

laptop

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

What defines the behavior of an object in object-oriented programming ?

method

Which of the following does a software license usually specify?

number of people authorized to use the software

What type of program would have a class named student with objects called fullTime and partTime?

object-oriented program

A network administrator is usually not required on a __ network.

peer-to-peer

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

A modem can also function as what other piece of hardware?

router

Which of the following types of websites typically provides the least security?

social media sites

_ is the process of creating programs and apps from the idea stage to distribution to users.

software development

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

star

What do you call the rules each programming language has for writing instructions?

syntax

Why would you want to connect your computer to a network?

to access shared resources

_____ are new releases of an app and may require an additional fee before you can install them.

upgrades

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

wireframes

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com


Related study sets

M49: Anxiety Disorders, OCD, and PTSD

View Set

Security+ Network Security Fundamentals Chapter 9 and Chapter 10

View Set

Chapter 25: Cold War America (1945-63)

View Set