IT FUNDIMENTALS

Ace your homework & exams now with Quizwiz!

A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure? A. A shield icon in the address bar B ."https" as the protocol in the URL C .the words "secure website" in the home page footer D. ".com" or ".org" as the top-level domain of the website

"https" as the protocol in the URL

If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter on the screen? The keyboard transfers the letter 'A' directly to the monitor, without passing through the CPU. The CPU stores the keystroke as the letter 'A' and displays it on the screen. 'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display. 'A' is converted to special characters, which the screen translates back to 'A' for display.

'A' is converted to binary code, which the CPU processes. The computer then converts the code back 'A' for display.

Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use? A. He should choose a navigation app with artificial intelligence that can provide information about preferred routes. B. He should choose an app with augmented reality that displays points of interest as he drives. C. He should choose a digital assistant that guesses where he wants to go based on the date. D. He should choose a product that uses natural language processing, so he can type in where he wants to go.

A. He should choose a navigation app with artificial intelligence that can provide information about preferred routes.

Dominic is left-handed and frustrated with his pointing device because the default settings are for right-handed people. You can help Dominic solve his problem by telling him which of the following? Adjust the sensitivity of the mouse for smoother movements. Adjust the settings for the mouse through the Settings dialog box. Move his mouse to the other side of the computer. Purchase a new computer with a touch screen so he does not have to use a mouse.

Adjust the settings for the mouse through the Settings dialog box

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals? A. Discard old laptops and cell phones. B. Become more active on social media. C. Use sleep modes and other power management features for computers and devices. D. Print copies of email messages.

C . Use sleep modes and other power management features for computers and devices.

The fifth grade class at the local elementary school is doing a class project on recycling and wants to involve the entire community. How could they inform community members about their project using social networking? A. They could call all their neighbors. B. They could put flyers in everyone's mailbox. C. They could create a hashtag and post on social media. D .They could contact the newspaper to run an article.

C. They could create a hashtag and post on social media.

Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer? A. The sprinkler she has to turn on and off when she wants to water her plants. B. Her hot water heater that has to be manually reset every time the power goes out. C .The carpet steamer she uses to clean her rugs when they get dirty. D. Her coffeemaker that she has set to turn on and make coffee every morning at the same time.

D. Her coffeemaker that she has set to turn on and make coffee every morning at the same time.

Which option lists the computer components in order from oldest to newest? A. microprocessors, vacuum tubes, transistors, personal computers, integrated circuits B. integrated circuits, microprocessors, vacuum tubes, transistors, personal computers C. transistors, vacuum tubes, integrated circuits, personal computers, microprocessors D. vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

D. vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

How does encryption work? It scrambles the information until the key is used to unscramble it. It is what happens when you download attachments from your email. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. It is a key that you insert into your computer to unlock your saved files.

It scrambles the information until the key is used to unscramble it.

Which commonly used programming language is used to manage, access, and search for database content? Java SQL C++ HTML

SQL

What technology is being used when you are sent an email saying you can track your package? LMS M2M CAM Scan code

Scan code

Which of the following is not a general guideline for developers? Group programming activities into phases. Start programming before creating a proposal. Define the standards, or sets of rules and procedures, for creating the product. Involve users for whom the program is being developed

Start programming before creating a proposal.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? worm ransomware Trojan spam

Trojan

mma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? worm ransomware Trojan spam

Trojan

An intelligent workplace uses technology to enable workers to connect to the company's network, communicate with each other, use productivity software and apps, and meet via web conferencing. True False

True

E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft. True False

True

Which of the following is an advantage to saving a file to a flash drive? You know that it is backed up on a hard drive in case you forget the file name. You can be assured that it saved your changes as you made them. You can take it with you and then work on it on another computer. You can access the file from any device connected to the Intern

You can take it with you and then work on it on another computer.

Cloud backup software periodically saves your files and settings to an external hard drive. False True

false

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. True False

false

With more and more people using technology, what physical health diagnosis is on the rise? cyberstalking cyberbullying technology addiction repetitive strain injury

repetitive strain injury

Google is an example of which type of website? A search site A web portal A content aggregation site An online social network

A. A search site

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True False

False

What printer is commonly used to produce high-quality professional drawings such as architectural blueprints? Mobile printer Ink-jet printer Plotter Laser printer

Plotter

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report? Spreadsheet Messaging Presentation Word processor

Word processor

Folder names should _____. be as short as possible identify the content and purpose of the folder contain more than 255 characters include an extension that indicates its contents

identify the content and purpose of the folder

Jane volunteers at an orphanage called "We Are One" and is developing a website to seek financial assistance. Which server address should she use? www.weareone.comLinks to an external site. www.weareone.eduLinks to an external site. www.weareone.orgLinks to an external site. www.weareone.netLinks to an external site.

www.weareone.orgLinks to an external site

Which type of a computer can be assembled using a monitor, a keyboard, a CPU, speakers, a printer and a mouse? A tablet A desktop computer An all-in-one computer A laptop

A desktop computer

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use? A device management app to track all the expenses she makes using her credit and debit cards A word processor app to keep a record of her expenses and make calculations A personal interest app to keep a track of all the expenses based on her personal interests A spreadsheet app to keep a record of her expenses, sort data, and make calculations

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

Which of the following people will benefit the most from using a B2B website? Rahim, who wants to sell his old furniture before he moves to a different city Akiko, who helps smaller businesses establish themselves in the market Rohan, who runs a company that sells organic cosmetics directly to consumers Mika, who sells handmade and inexpensive jewelry to college students

Akiko, who helps smaller businesses establish themselves in the market

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone? Android Blackberry iOS Windows

Android

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using? Augmented reality Digital literacy Kiosk Chip-and-pin technology

Augmented reality

_____ ensures that the person requesting access to a computer is not an imposter. Data mining Encryption Authentication Automatic encoding

Authentication

_____ ensures that the person requesting access to a computer is not an imposter. Data mining Encryption Authentication Automatic encoding

Authentication

How will technology help people with disabilities become more transportation independent? GPS can be used to navigate traffic patterns. Scan codes can be used to track where a person is. Automated vehicles will be developed. Drones will deliver their packages.

Automated vehicles will be developed.

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Ignore notices from the social networking site about changes to security. Post all types of photos more often. Be cautious about what information she posts. Allow anyone who "friends" her to view her information.

Be cautious about what information she posts

Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Because it can weaken your own Wi-Fi wireless router Because they do not allow Internet access Because the connection is often too slow

Because these networks are rarely protected

Which of these is an optical medium of storage? Cloud storage Blu-ray disc Solid state drive Hard disk drive

Blu-ray disc

Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course? A. Give them the classroom phone extension to dial in while away. B. Speed through the content and finish before they leave. C. Use a learning management system (LMS) to put lectures and tests online. D. Mail them videotapes and tests.

C. Use a learning management system (LMS) to put lectures and tests online.

Which of the following factors can affect processor performance of a CPU? Clock speed Hard drive space Benchmark Number of peripheral devices connected

Clock speed

Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them? ROM Cloud storage Compact disk RAM

Cloud storage

File transfer programs belong in what software category? File, disk, and system management Communications Security Productivity (business and personal)

Communications

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use? What-if analysis Conditional formatting Run macros Sorting and filtering

Conditional formatting

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained? Create a database of company projects, customers and vendors. Transfer all financial record to spreadsheet. Convert all paper files to word documents. Continue with the old system

Create a database of company projects, customers and vendors.

How can you protect personal information gathered by legitimate organizations? Use the same password and username for all your online accounts. Create a separate email account for receiving information from websites. Link your credit or debit card to your online accounts. Sign up for many online mailing lists.

Create a separate email account for receiving information from websites

_____ is a nonprofit organization that helps content creators keep copyright to their materials while allowing others to use, copy, or distribute their work. U.S. Copyright Office Fair Use Marketplace Content Licenses Creative Commons

Creative Commons

Which of the following types of RAM needs to be constantly recharged to retain the contents? Static RAM (SRAM) Flash Memory Magnetoresistive RAM (MRAM) Dynamic RAM (DRAM)

Dynamic RAM (DRAM)

An e-commerce website offers fewer models, colors, and sizes than a physical store. True False

False

The first generation of computers used microprocessors. False True

False

The operating system assigns the file its name, location, and size. False True

False

You can avoid electronic waste by replacing devices every time a new version comes out. False True

False

You use the CARS checklist to determine whether a website is current, appealing, relevant, and sophisticated. True False

False

Which of the following is a game controller that is held with both hands and used to control movement of on-screen objects by pressing buttons and moving hardware components? Gamepad Stylus Joystick Digital Pen

Gamepad

Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page? In the header In the body On the navigation bar On the sidebar

In the header

How does encryption work? It scrambles the information until the key is used to unscramble it. It is what happens when you download attachments from your email. It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. It is a key that you insert into your computer to unlock your saved files.

It scrambles the information until the key is used to unscramble it.

Which of the following programming languages adds interactivity to websites? C++ HTML Ruby JavaScript

JavaScript

Which of the following operating systems would allow a user to add functionality and sell or give away their versions? Linux UNIX macOS Windows

Linux

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch? Social media app Photo editing app M-commerce app Banking and finance app

M-commerce app

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information? Project manager Designer IT department Programmer

Project manager

Which software development method uses highly skilled programmers to shorten the development process while producing quality software? Waterfall model Agile development methodology Rapid Application development model Predictive development model

Rapid Application development model

Search engines use software that combs the web to find webpages and add new data about them to the database. What is this software called? Web searchers Spiders Centipedes Query handlers

Spiders

During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance? Design phase Analysis phase Support and security phase Implementation phase

Support and security phase

A device driver is a program that controls a device attached to the computer. True False

True

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? Use mail merge for steps 1 and 2 and a word processor for step 3. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. Use a word processor for steps 1 and 2 and a graphics software for step 3

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

What area of software development focuses on the user's reaction to and interaction with the software product? User experience Quality assurance Technical feasibility System documentation

User experience

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space. Virtual reality (VR) Green computing Natural language processing Internet of Things (IoT)

Virtual reality (VR)

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue? Uninstall the app and then reinstall it. Restart the app and close the error message whenever it opens. Use system software to update the operating system. Visit the manufacturer's website and install the latest updates for the app.

Visit the manufacturer's website and install the latest updates for the app.

An organization has its employees working from home. Which type of software most likely includes collaboration features to help the employees work together online? Device management apps Local apps Portable apps Web apps

Web apps

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer? Relative referencing Pivot table VLOOKUP What-if analysis

What-if analysis

When should a user consider restoring the operating system? When programs or apps do not start properly When the monitor does not display anything When you can't connect to the Internet When you cannot print documents

When programs or apps do not start properly

Amelie lists her dishwasher for sale on eBay. Ryan, who lives in another city, bids for the best price and uses his credit card to pay for the dishwasher. Is this transaction an example of e-commerce? Yes; e-commerce always refers to a sale between consumers in different cities. No; e-commerce does not include the sale of used products. No; credit cards are not an accepted mode of payment in e-commerce transactions. Yes; it is a business transaction on a consumer-to-consumer website.

Yes; it is a business transaction on a consumer-to-consumer website.

Is it advisable to enable automatic updates on security software? Yes, though you must pay an additional fee for automatic updates. No; automatic updates can cause create problems in security software. No; automatic updates require excessive storage space and slow the computer. Yes; this helps to catch and quarantine new malware before it harms the computer.

Yes; this helps to catch and quarantine new malware before it harms the computer

Which of the following statements about browser security settings is false? You can allow or block scripts on specific websites. You must keep your accumulated web history as long as you use the browser. You can choose which sites run pop-ups. You can accept or deny cookies.

You must keep your accumulated web history as long as you use the browser

Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work? Zoho writer OpenOffice Writer Prezi app Venmo

Zoho writer

What technology can collect information to make decisions, reach conclusions, and combine information in new ways? virtual reality (VR) artificial intelligence (AI) embedded computers robotics

artificial intelligence (AI)

If you copy a drawing from the Internet and use it in a report, you might be violating the artist's _____. fair use rights digital rights artistic rights intellectual property rights

artistic rights

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. reading wireless transmissions viewing or stealing computer data creating malware downloading harmful content

creating malware

Sean works for an organization that offers SaaS to a chain of boutiques. By getting data from the database, he has to prepare a list of instances when the billing transaction failed. Which of the following tasks does he need to do to prepare the report? presentation speech recognition desktop publishing database

database

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps. shareware intellectual property copyright digital rights management

digital rights management

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use? Photo editing app Video editing app Drawing app Paint app

drawing app

n) _____ contains the instructions your computer or device needs to run programs and apps. spreadsheet file extension data file executable file

executable file

A joystick is a pen-type input device used to draw and tap icons. True False

false

Big data is processed using relational databases. True False

false

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True False

false

Technology can lead to all of the following behavioral risks EXCEPT _____. a sedentary lifestyle depression and anxiety higher satisfaction with life social withdrawal

higher satisfaction with life

Which of the following operating systems includes a virtual assistant? Chrome OS macOS Linux UNIX

macOS

Which of the following features is a way to make a computer do what you want it to do? file extension executable file data file menu

menu

What defines the behavior of an object in object-oriented programming ? Object by itself Device or platform on which the program runs Class Method

method

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing dumpster diving identity theft encryption

phishing

An operating system is also called a(n) _____. desktop platform version utility

platform

Which of these is not an input device? Webcam Stylus Scanner Printer

printer

What is the most common type of volatile memory? random access memory (RAM) flash memory read-only memory (ROM) hard disk

random access memory (RAM)

Which type of memory is permanently installed on your computer and attached to the motherboard? processor cache read-only memory (ROM) random access memory (RAM) virtual memory

read-only memory (ROM)

With more and more people using technology, what physical health diagnosis is on the rise? cyberstalking cyberbullying technology addiction repetitive strain injury

repetitive strain injury

Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems? Restorer Service pack Upgrade Patch

service pack

Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which of the following parts of the presentation should he design first? First slide Slide master Title slide Last slide

slide master

Which of the following types of websites typically provides the least security? online banking sites private business sites social media sites online shopping sites

social media sites

What performance specification does 2 GHz refer to? Speed at which data travels Time taken to store the instructions on RAM Speed at which the processor executes instructions Time taken to fetch and decode instructions

speed at which the processor executes instructions

What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app? folder window program window start window main window

start window

The bootstrap program executes which of the following? vital security protections startup apps that display the desktop stored user preferences tests that check components such as RAM and storage

tests that check components such as RAM and storage

When a CPU executes instructions as it converts input into output, it does so with _____. RAM and ROM the cache and the motherboard the hard drive and RAM the control unit and the arithmetic logic unit

the control unit and the arithmetic logic unit

A file manager is used for all of the following except ____. to reorder files within a folder to navigate between folders to change the contents of files to move files

to change the contents of files

Where can you pin frequently used apps for easy access? to the ribbon to the File menu to the taskbar to the Settings dialog box

to the taskbar

Each slide in a presentation has a layout that includes placeholders for certain types of content. False True

true

A(n) _____ protects your device against unauthorized access. user account administrative tool personalization app virtual machine

user account

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem? built-in camera hard drive video card external storage devices

video card

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there? robotics virtual reality (VR) GPS embedded sensors

virtual reality (VR)

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? Because insiders sometimes create threats after incidents at their places of employment Because insiders often like to cause disruption and panic among citizens Because insiders like to breach security to make a political statement Because insiders need practice breaking into networks

Because insiders sometimes create threats after incidents at their places of employment

How is a microprocessor different from an integrated circuit? A. Microprocessors are faster, smaller and less expensive than integrated circuits. B. Microprocessors include tape and disk storage whereas integrated circuits are part of an operating system. C. Microprocessors control the flow of electrons and integrated circuits control the flow of protons. D. Microprocessors are the size of your thumb and integrated circuits are the size of your hand.

Microprocessors are faster, smaller and less expensive than integrated circuits.

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform? Require users to identify themselves using biometrics or passwords. Display a stern warning on the welcome screen. Require users to install antivirus software on their devices. Create a strict license agreement for the app.

Require users to identify themselves using biometrics or passwords.

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program? Shareware Freeware Open source Public domain

Shareware

What is a digital certificate? The process of scrambling information so that it cannot be read The key to unlock information into a readable format A growing trend used to combine multiple types of authentication Technology used to verify a user's identity

Technology used to verify a user's identity

sania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest? Use the same set of codes for different platforms. Develop different versions of the same app for different programs. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Feed the existing code into cross-platform tools to develop different versions of the same app.

Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Which of the following statements about browser security settings is false? You can allow or block scripts on specific websites. You must keep your accumulated web history as long as you use the browser. You can choose which sites run pop-ups. You can accept or deny cookies.

You must keep your accumulated web history as long as you use the browser.

When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy. True False

false

the Close button reduces a window so that it only appears as a button on the taskbar. False True

false

Samantha plans to self-publish her book on her website. Which of the following apps should she use to design the cover? graphics app word processor video-editing app spreadsheet

graphics app

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. turning off remote management to the device creating a strong password to access the router naming your router something you'll remember, like your street address utilizing guest access when needed and turning it off when guests leave

naming your router something you'll remember, like your street address

What type of program would have a class named Student with objects called fullTime and partTime? object-oriented program machine language program markup language program procedural language program

object-oriented program

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him? tablet high-end laptop all-in-one computer desktop computer

tablet

If you add a slideshow to play as your desktop theme, you have customized your system software. True False

true

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system. True False

true

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? Because insiders sometimes create threats after incidents at their places of employment Because insiders often like to cause disruption and panic among citizens Because insiders like to breach security to make a political statement Because insiders need practice breaking into networks

Because insiders sometimes create threats after incidents at their places of employment

Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Because it can weaken your own Wi-Fi wireless router Because they do not allow Internet access Because the connection is often too slow

Because these networks are rarely protected

Which of the following is NOT an e-commerce transaction? A. Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete. B. Andrew sells a set of 7 books on Inventory Management to Austin on eBay. C. Jezmyn books a hotel room in California for 3 days in the last week of December on Airbnb.com. D. An automobile manufacturer sells 10,000 pickup trucks to a dealer on a B2B website.

Sophia hires a neighborhood plumber to fix a leaking faucet and pays him after the repairs are complete.

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to? freeware Software as a Service (SaaS) commercial software open source

open source


Related study sets

Fundamentals of Nursing- Quiz 2 (Exam 1 Material)

View Set

STS OR Real Estate Section 2: Agency

View Set

#1 - #10 Combo - CIS 525 - CyberSecurity - McMurtrey - Study for Final Exam

View Set

Management Final-CH13 Working in Teams

View Set

BIBLE - Genesis 37-50 / Life of Joseph

View Set

peds respiratory questions--2 different resources used

View Set