ITDE EXAM 2

Ace your homework & exams now with Quizwiz!

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

In which of the following situations is a digital certificate useful?

A digital certificate is a technology used to verify a user's identity and key that has been "signed" by a trusted third party.

A modem can also function as what other piece of hardware?

A router

What is a MAC address?

A unique hardware address for your device

Which of the following describes a domain registrar?

A website where you can go to purchase a name for your website

Which software development method uses highly skilled programmers to shorten the development process while producing quality software?

Agile development methodology

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

Marly is using her smartphone to review a webpage she created. The formatting and alignment of webpage elements is incorrect. What does she need to change to fix the problem?

CSS

File transfer programs belong in what software category?

Communications

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

Digital Rights Management

A router is a system of two or more devices linked by wires or cables.

False

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access.

False

Cloud backup software periodically saves your files and settings to an external hard drive.

False

HTML coding does not allow for lists using bullets. All lists have to be numbered.

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

False

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Why is it important to be able to export data in an XML format?

It allows data to be shared between applications.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Which of the following statements is NOT true about a local firewall?

It is often built into a company's operating system.

What defines the behavior of an object in object-oriented programming ?

Method

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

Piracy

In which category of software do Microsoft Office Word and Excel belong?

Productivity

What kind of software products can you download from the Internet without being subjected to copyright restrictions?

Public domain software

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

Shareware

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is uptime?

The measure of a web host's reliability

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.

a project

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

Which of the following does a software license usually specify?

number of people authorized to use the software

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

What can a company learn by studying website analytics for its website?

when it needs to increase its bandwidth


Related study sets

Compensation Administration - Chapter 8

View Set

Assignment #12 ( Chapter 14 & 15)

View Set