IT FUNDIMENTALS
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure? A. A shield icon in the address bar B ."https" as the protocol in the URL C .the words "secure website" in the home page footer D. ".com" or ".org" as the top-level domain of the website
"https" as the protocol in the URL
If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen? The keyboard transfers the letter 'A' directly to the monitor, without passing through the CPU. The CPU stores the keystroke as the letter 'A' and displays it on the screen. 'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display. 'A' is converted to special characters, which the screen translates back to 'A' for display.
'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.
Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use? A. He should choose a navigation app with artificial intelligence that can provide information about preferred routes. B. He should choose an app with augmented reality that displays points of interest as he drives. C. He should choose a digital assistant that guesses where he wants to go based on the date. D. He should choose a product that uses natural language processing, so he can type in where he wants to go.
A. He should choose a navigation app with artificial intelligence that can provide information about preferred routes.
Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following? Adjust the sensitivity of the mouse for smoother movements. Adjust the settings for the mouse through the Settings dialog box. Move his mouse to the other side of the computer. Purchase a new computer with a touch screen so he does not have to use a mouse.
Adjust the settings for the mouse through the Settings dialog box
Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals? A. Discard old laptops and cell phones. B. Become more active on social media. C. Use sleep modes and other power management features for computers and devices. D. Print copies of email messages.
C . Use sleep modes and other power management features for computers and devices.
The fifth grade class at the local elementary school is doing a class project on recycling and wants to involve the entire community. How could they inform community members about their project using social networking? A. They could call all their neighbors. B. They could put flyers in everyone's mailbox. C. They could create a hashtag and post on social media. D .They could contact the newspaper to run an article.
C. They could create a hashtag and post on social media.
Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer? A. The sprinkler she has to turn on and off when she wants to water her plants. B. Her hot water heater that has to be manually reset every time the power goes out. C .The carpet steamer she uses to clean her rugs when they get dirty. D. Her coffeemaker that she has set to turn on and make coffee every morning at the same time.
D. Her coffeemaker that she has set to turn on and make coffee every morning at the same time.
Which option lists the computer components in order from oldest to newest? A. microprocessors, vacuum tubes, transistors, personal computers, integrated circuits B. integrated circuits, microprocessors, vacuum tubes, transistors, personal computers C. transistors, vacuum tubes, integrated circuits, personal computers, microprocessors D. vacuum tubes, transistors, integrated circuits, microprocessors, personal computers
D. vacuum tubes, transistors, integrated circuits, microprocessors, personal computers
How does encryption work? It scrambles the information until the key is used to unscramble it. It is what happens when you download attachments from your email. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. It is a key that you insert into your computer to unlock your saved files.
It scrambles the information until the key is used to unscramble it.
Which commonly used programming language is used to manage, access, and search for database content? Java SQL C++ HTML
SQL
What technology is being used when you are sent an email saying you can track your package? LMS M2M CAM Scan code
Scan code
Which of the following is not a general guideline for developers? Group programming activities into phases. Start programming before creating a proposal. Define the standards, or sets of rules and procedures, for creating the product. Involve users for whom the program is being developed
Start programming before creating a proposal.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? worm ransomware Trojan spam
Trojan
mma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? worm ransomware Trojan spam
Trojan
An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing. True False
True
E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft. True False
True
Which of the following is an advantage to saving a file to a flash drive? You know that it is backed up on a hard drive in case you forget the file name. You can be assured that it saved your changes as you made them. You can take it with you and then work on it on another computer. You can access the file from any device connected to the Intern
You can take it with you and then work on it on another computer.
Cloud backup software periodically saves your files and settings to an external hard drive. False True
false
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. True False
false
With more and more people using technology, what physical health diagnosis is on the rise? cyberstalking cyberbullying technology addiction repetitive strain injury
repetitive strain injury
Google is an example of which type of website? A search site A web portal A content aggregation site An online social network
A. A search site
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True False
False
What printer is commonly used to produce high-quality professional drawings such as architectural blueprints? Mobile printer Ink-jet printer Plotter Laser printer
Plotter
Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report? Spreadsheet Messaging Presentation Word processor
Word processor
Folder names should _____. be as short as possible identify the content and purpose of the folder contain more than 255 characters include an extension that indicates its contents
identify the content and purpose of the folder
Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use? www.weareone.comLinks to an external site. www.weareone.eduLinks to an external site. www.weareone.orgLinks to an external site. www.weareone.netLinks to an external site.
www.weareone.orgLinks to an external site
Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse? A tablet A desktop computer An all-in-one computer A laptop
A desktop computer
Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? A device management app to track all the expenses she makes using her credit and debit cards A word processor app to keep a record of her expenses and make calculations A personal interest app to keep a track of all the expenses based on her personal interests A spreadsheet app to keep a record of her expenses, sort data, and make calculations
A spreadsheet app to keep a record of her expenses, sort data, and make calculations
Which of the following people will benefit the most from using a B2B website? Rahim, who wants to sell his old furniture before he moves to a different city Akiko, who helps smaller businesses establish themselves in the market Rohan, who runs a company that sells organic cosmetics directly to consumers Mika, who sells handmade and inexpensive jewelry to college students
Akiko, who helps smaller businesses establish themselves in the market
Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone? Android Blackberry iOS Windows
Android
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using? Augmented reality Digital literacy Kiosk Chip-and-pin technology
Augmented reality
_____ ensures that the person requesting access to a computer is not an imposter. Data mining Encryption Authentication Automatic encoding
Authentication
_____ ensures that the person requesting access to a computer is not an imposter. Data mining Encryption Authentication Automatic encoding
Authentication
How will technology help people with disabilities become more transportation independent? GPS can be used to navigate traffic patterns. Scan codes can be used to track where a person is. Automated vehicles will be developed. Drones will deliver their packages.
Automated vehicles will be developed.
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Ignore notices from the social networking site about changes to security. Post all types of photos more often. Be cautious about what information she posts. Allow anyone who "friends" her to view her information.
Be cautious about what information she posts
Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Because it can weaken your own Wi-Fi wireless router Because they do not allow Internet access Because the connection is often too slow
Because these networks are rarely protected
Which of these is an optical medium of storage? Cloud storage Blu-ray disc Solid state drive Hard disk drive
Blu-ray disc
Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course? A. Give them the classroom phone extension to dial in while away. B. Speed through the content and finish before they leave. C. Use a learning management system (LMS) to put lectures and tests online. D. Mail them videotapes and tests.
C. Use a learning management system (LMS) to put lectures and tests online.
Which of the following factors can affect processor performance of a CPU? Clock speed Hard drive space Benchmark Number of peripheral devices connected
Clock speed
Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them? ROM Cloud storage Compact disk RAM
Cloud storage
File transfer programs belong in what software category? File, disk, and system management Communications Security Productivity (business and personal)
Communications
Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? What-if analysis Conditional formatting Run macros Sorting and filtering
Conditional formatting
When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? Create a database of company projects, customers and vendors. Transfer all financial record to spreadsheet. Convert all paper files to word documents. Continue with the old system
Create a database of company projects, customers and vendors.
How can you protect personal information gathered by legitimate organizations? Use the same password and username for all your online accounts. Create a separate email account for receiving information from websites. Link your credit or debit card to your online accounts. Sign up for many online mailing lists.
Create a separate email account for receiving information from websites
_____ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work. U.S. Copyright Office Fair Use Marketplace Content Licenses Creative Commons
Creative Commons
Which of the following types of RAM needs to be constantly recharged to retain the contents? Static RAM (SRAM) Flash Memory Magnetoresistive RAM (MRAM) Dynamic RAM (DRAM)
Dynamic RAM (DRAM)
An e-commerce website offers fewer models, colors, and sizes than a physical store. True False
False
The first generation of computers used microprocessors. False True
False
The operating system assigns the file its name, location, and size. False True
False
You can avoid electronic waste by replacing devices every time a new version comes out. False True
False
You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated. True False
False
Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components? Gamepad Stylus Joystick Digital Pen
Gamepad
Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page? In the header In the body On the navigation bar On the sidebar
In the header
How does encryption work? It scrambles the information until the key is used to unscramble it. It is what happens when you download attachments from your email. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. It is a key that you insert into your computer to unlock your saved files.
It scrambles the information until the key is used to unscramble it.
Which of the following programming languages adds interactivity to websites? C++ HTML Ruby JavaScript
JavaScript
Which of the following operating systems would allow a user to add functionality and sell or give away their versions? Linux UNIX macOS Windows
Linux
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? Social media app Photo editing app M-commerce app Banking and finance app
M-commerce app
Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? Project manager Designer IT department Programmer
Project manager
Which software development method uses highly skilled programmers to shorten the development process while producing quality software? Waterfall model Agile development methodology Rapid Application development model Predictive development model
Rapid Application development model
Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called? Web searchers Spiders Centipedes Query handlers
Spiders
During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? Design phase Analysis phase Support and security phase Implementation phase
Support and security phase
A device driver is a program that controls a device attached to the computer. True False
True
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? Use mail merge for steps 1 and 2 and a word processor for step 3. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. Use a word processor for steps 1 and 2 and a graphics software for step 3
Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
What area of software development focuses on the user's reaction to and interaction with the software product? User experience Quality assurance Technical feasibility System documentation
User experience
_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space. Virtual reality (VR) Green computing Natural language processing Internet of Things (IoT)
Virtual reality (VR)
While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? Uninstall the app and then reinstall it. Restart the app and close the error message whenever it opens. Use system software to update the operating system. Visit the manufacturer's website and install the latest updates for the app.
Visit the manufacturer's website and install the latest updates for the app.
An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? Device management apps Local apps Portable apps Web apps
Web apps
Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer? Relative referencing Pivot table VLOOKUP What-if analysis
What-if analysis
When should a user consider restoring the operating system? When programs or apps do not start properly When the monitor does not display anything When you can't connect to the Internet When you cannot print documents
When programs or apps do not start properly
Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce? Yes; e-commerce always refers to a sale between consumers in different cities. No; e-commerce does not include the sale of used products. No; credit cards are not an accepted mode of payment in e-commerce transactions. Yes; it is a business transaction on a consumer-to-consumer website.
Yes; it is a business transaction on a consumer-to-consumer website.
Is it advisable to enable automatic updates on security software? Yes, though you must pay an additional fee for automatic updates. No; automatic updates can cause create problems in security software. No; automatic updates require excessive storage space and slow the computer. Yes; this helps to catch and quarantine new malware before it harms the computer.
Yes; this helps to catch and quarantine new malware before it harms the computer
Which of the following statements about browser security settings is false? You can allow or block scripts on specific websites. You must keep your accumulated web history as long as you use the browser. You can choose which sites run pop-ups. You can accept or deny cookies.
You must keep your accumulated web history as long as you use the browser
Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work? Zoho writer OpenOffice Writer Prezi app Venmo
Zoho writer
What technology can collect information to make decisions, reach conclusions, and combine information in new ways? virtual reality (VR) artificial intelligence (AI) embedded computers robotics
artificial intelligence (AI)
If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____. fair use rights digital rights artistic rights intellectual property rights
artistic rights
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. reading wireless transmissions viewing or stealing computer data creating malware downloading harmful content
creating malware
Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report? presentation speech recognition desktop publishing database
database
_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. shareware intellectual property copyright digital rights management
digital rights management
Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? Photo editing app Video editing app Drawing app Paint app
drawing app
n) _____ contains the instructions your computer or device needs to run programs and apps. spreadsheet file extension data file executable file
executable file
A joystick is a pen-type input device used to draw and tap icons. True False
false
Big data is processed using relational databases. True False
false
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True False
false
Technology can lead to all of the following behavioral risks EXCEPT _____. a sedentary lifestyle depression and anxiety higher satisfaction with life social withdrawal
higher satisfaction with life
Which of the following operating systems includes a virtual assistant? Chrome OS macOS Linux UNIX
macOS
Which of the following features is a way to make a computer do what you want it to do? file extension executable file data file menu
menu
What defines the behavior of an object in object-oriented programming ? Object by itself Device or platform on which the program runs Class Method
method
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing dumpster diving identity theft encryption
phishing
An operating system is also called a(n) _____. desktop platform version utility
platform
Which of these is not an input device? Webcam Stylus Scanner Printer
printer
What is the most common type of volatile memory? random access memory (RAM) flash memory read-only memory (ROM) hard disk
random access memory (RAM)
Which type of memory is permanently installed on your computer and attached to the motherboard? processor cache read-only memory (ROM) random access memory (RAM) virtual memory
read-only memory (ROM)
With more and more people using technology, what physical health diagnosis is on the rise? cyberstalking cyberbullying technology addiction repetitive strain injury
repetitive strain injury
Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? Restorer Service pack Upgrade Patch
service pack
Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? First slide Slide master Title slide Last slide
slide master
Which of the following types of websites typically provides the least security? online banking sites private business sites social media sites online shopping sites
social media sites
What performance specification does 2 GHz refer to? Speed at which data travels Time taken to store the instructions on RAM Speed at which the processor executes instructions Time taken to fetch and decode instructions
speed at which the processor executes instructions
What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? folder window program window start window main window
start window
The bootstrap program executes which of the following? vital security protections startup apps that display the desktop stored user preferences tests that check components such as RAM and storage
tests that check components such as RAM and storage
When a CPU executes instructions as it converts input into output, it does so with _____. RAM and ROM the cache and the motherboard the hard drive and RAM the control unit and the arithmetic logic unit
the control unit and the arithmetic logic unit
A file manager is used for all of the following except ____. to reorder files within a folder to navigate between folders to change the contents of files to move files
to change the contents of files
Where can you pin frequently used apps for easy access? to the ribbon to the File menu to the taskbar to the Settings dialog box
to the taskbar
Each slide in a presentation has a layout that includes placeholders for certain types of content. False True
true
A(n) _____ protects your device against unauthorized access. user account administrative tool personalization app virtual machine
user account
When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem? built-in camera hard drive video card external storage devices
video card
Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there? robotics virtual reality (VR) GPS embedded sensors
virtual reality (VR)
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? Because insiders sometimes create threats after incidents at their places of employment Because insiders often like to cause disruption and panic among citizens Because insiders like to breach security to make a political statement Because insiders need practice breaking into networks
Because insiders sometimes create threats after incidents at their places of employment
How is a microprocessor different from an integrated circuit? A. Microprocessors are faster, smaller and less expensive than integrated circuits. B. Microprocessors include tape and disk storage whereas integrated circuits are part of an operating system. C. Microprocessors control the flow of electrons and integrated circuits control the flow of protons. D. Microprocessors are the size of your thumb and integrated circuits are the size of your hand.
Microprocessors are faster, smaller and less expensive than integrated circuits.
A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? Require users to identify themselves using biometrics or passwords. Display a stern warning on the welcome screen. Require users to install antivirus software on their devices. Create a strict license agreement for the app.
Require users to identify themselves using biometrics or passwords.
Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? Shareware Freeware Open source Public domain
Shareware
What is a digital certificate? The process of scrambling information so that it cannot be read The key to unlock information into a readable format A growing trend used to combine multiple types of authentication Technology used to verify a user's identity
Technology used to verify a user's identity
sania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? Use the same set of codes for different platforms. Develop different versions of the same app for different programs. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Feed the existing code into cross-platform tools to develop different versions of the same app.
Use cross-platform tools to write code that will translate the existing Android app code into different native formats.
Which of the following statements about browser security settings is false? You can allow or block scripts on specific websites. You must keep your accumulated web history as long as you use the browser. You can choose which sites run pop-ups. You can accept or deny cookies.
You must keep your accumulated web history as long as you use the browser.
When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy. True False
false
the Close button reduces a window so that it only appears as a button on the taskbar. False True
false
Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover? graphics app word processor video-editing app spreadsheet
graphics app
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. turning off remote management to the device creating a strong password to access the router naming your router something you'll remember, like your street address utilizing guest access when needed and turning it off when guests leave
naming your router something you'll remember, like your street address
What type of program would have a class named Student with objects called fullTime and partTime? object-oriented program machine language program markup language program procedural language program
object-oriented program
Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him? tablet high-end laptop all-in-one computer desktop computer
tablet
If you add a slideshow to play as your desktop theme, you have customized your system software. True False
true
Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. True False
true
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? Because insiders sometimes create threats after incidents at their places of employment Because insiders often like to cause disruption and panic among citizens Because insiders like to breach security to make a political statement Because insiders need practice breaking into networks
Because insiders sometimes create threats after incidents at their places of employment
Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Because it can weaken your own Wi-Fi wireless router Because they do not allow Internet access Because the connection is often too slow
Because these networks are rarely protected
Which of the following is NOT an e-commerce transaction? A. Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete. B. Andrew sells a set of 7 books on Inventory Management to Austin on eBay. C. Jezmyn books a hotel room in California for 3 days in the last week of December on Airbnb.com. D. An automobile manufacturer sells 10,000 pickup trucks to a dealer on a B2B website.
Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.
Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? freeware Software as a Service (SaaS) commercial software open source
open source