ITE 115 Exam 2 Review

Ace your homework & exams now with Quizwiz!

Which of the following is a characteristic of a strong password?

A strong password is a longer secret combination of letters, number, and/or symbols that unlocks access to protected electronic data. It A longer password is always more secure than a shorter password.

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?

By learning how visitors explore a website, businesses can reorganize information and website content so that the most requested information is easy to locate. Tracking site performance data such as pages visited and how long it takes them to load can help determine when to increase bandwidth or other hosting requirements.

You use CSS to to specify the appearance of content on a webpage. True or False?

By using CSS, a webpage will appear similarly on different devices, from smartphones to laptops.

How does discarding computers in a landfill affect the environment?

Computer parts contain valuable materials such as gold, palladium, platinum, and copper. However, they also contain other metals that are toxic, such as lead and mercury.

What type of security requires something you know and something you have that no one else has?

Cookies can be accepted or denied and sites can be allowed or blocked from running scripts. You can either block all pop-ups or accept all pop-ups. All of these are tracked and are now allowing these clothing websites to appear in your email and on your Facebook page.

When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time. True or False?

Dynamic websites often run server-side scripts to interact with website content stored in a database located on a server. The content of a dynamic website usually is stored in a database on a web server, making dynamic sites easily searchable, such as a username and password used to log in.

How does encryption work?

Encryption is the process of "scrambling" information in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

JavaScript is a popular language for writing client-side scripts, that is, scripts that run in your browser to control a webpage's behavior and often make it interactive.

Even though website builders have predesigned templates, why is it still helpful to have knowledge of coding languages?

Learning to code can give you finer control over how content appears on your website, reflect a unique brand, or to customize an appearance.

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

Ransomware prevents a user's device from properly and fully functioning until a fee is paid. Most likely, if she called the number, they would try to connect to her computer and then place ransomware software on her computer.

Which commonly used programming language is used to manage, access, and search for database content?

SQL is the language used to manage, access, and search for database content.

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

Site licenses are best suited for organizations to provide access to multiple users, in different ways.

Why would you include a banner on your website?

Some websites include a banner or graphic that identifies the website. Banners often appear at the top of each page, so visitors will recognize the website easily.

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

Spyware tries to collect personal information or change computer settings without users' consent. Antispyware programs prevent spyware from installing itself on the computer and remove any existing spyware.

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

There are laws to help U.S. users monitor and protect their financial information that is stored by a credit reporting agency. You can request one free credit report annually and you can also "freeze" your credit information.

Emma needs to purchase a note-taking app for her iPhone. Which of the following sources is typically safe for purchasing the app?

Unfamiliar websites, or a link in an email or popup window, may sell programs and apps that have been modified to contain elements that may endanger the system or data, or they may be selling the product illegally.

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

When choosing a domain name, select one that is descriptive of your website's purpose or reflects your business name.

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots. A mobile hotspot enables you to connect a phone, computer, or other device to the Internet through the cellular network.

When using encryption from your home computer, how would you configure the router?

You can specify the type of encryption, as well as the desired wireless network key, through the wireless router's configuration utility that is often accessible using a web browser.

Is it advisable to enable automatic updates on security software?

You should enable automatic updates to your security software to catch any new viruses or malware that have been identified.

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

4GLs provides a graphical environment in which the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code; it also increases productivity of the programmers.

A router is a system of two or more devices linked by wires or cables.

A network is a system of two or more devices linked by wires, cables, or a telecommunications system.

What hardware is essential to creating a home Wi-Fi network?

A router is a device that connects two or more networks and directs the flow of information along the networks.

_____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.

A well-known retailer or manufacturer generally offers guarantees for a program or app's reliability and safety.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

An extranet might be used if a supplier needs to check a customer's inventory levels before deciding whether to ship additional product.

While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

As the error displays that the version is no longer supported, only installing the latest version or updates will resolve the issue.

Before you name your website, you need to search for other sites using that name and then purchase a domain name. True or False?

Before you can actually name your website, you will need to select a domain name, so that visitors can locate your site easily. Your web host may provide a subdomain of their domain (such as mysite.webhost.com) that you can use for personal sites or while your site is under development; for a more professional website, you will need to purchase a domain name from a domain registrar, an organization that sells and manages domain names, such as GoDaddy.

How does a wireless network key work with an encrypted wireless network?

Both the sending and receiving device must know the key to communicate on the wireless network.

If HTML is used to specify the content of the webpage, then what do you use CSS for?

CSS separates the appearance of the page content from its layout, described by the HTML tags

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

Documentation is a collection and summary of the data, information, and deliverables specific to a project. Documentation involves adding notes to the code that explain and outline the intended function of sections or lines of code.

What do you call the rules each programming language has for writing instructions?

Firewall software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.

Which of the following could indicate a DoS attack on your company server?

If a server responsible for hosting websites is the recipient of a denial of service attack, it might be unable to display websites for visitors attempting to view them.

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

If you connect to a wireless network that does not require a wireless network key, that often means the network is unsecure, and you should avoid transmitting private information.

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

In a star network, each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.

Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

Ransomware is a type of attack that affects files and personal data. Some attacks encrypt the data and files, or otherwise restrict access, asking to pay for an access key to release them.

Which of the following is a popular, user friendly CMS often used as a blogging platform?

See Table 9-1. Both have themes available from the provider, but the CMS also uses themes from third-party designer for free or purchase. Both can have few contributors, but a CMS may also have many contributors. Both all for content to be entered in visual editor, and a CMS also allows for content to be entered in an HTML editor.

Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

Shareware creators distribute programs and apps for little or no cost, or for a brief trial period. Shareware creators intend to make a profit, either by charging to purchase or subscribe to the product, or by including advertisements.

To access the Internet, a router must be connected to a _____.

The router is typically connected with a wire or cable to a device called a modem, which provides the Internet connectivity.

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

The wireless router acts a "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet.

HTML coding does not allow for lists using bullets. All lists have to be numbered. True or False?

Two types of lists that HTML supports are unordered lists and ordered lists. Unordered lists display a collection of items in a list format, with each list item preceded by a bullet symbol. Ordered lists, by default, precede each list item with a number.

Anita is developing a website for her photography business. On the home page, she wants to include a link to another webpage in her website. What type of link should she insert?

When, in your browser's address bar, you type the web address, or URL (Uniform Resource Locator) of a web page, the browser requests the page from a web server and the web server locates the page based on its unique address. If the page contains only HTML and client-side scripts, the web server searches and sends back the page content to the reader, or display, according to the HTML tags on the page.

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. True or False?

You can choose settings to limit who can see what is posted, but beware who you friend as that can then make private information public.

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

A VPN can allow an individual to access an organization's network by using encryption and other technologies to secure the data transmitted along the path.

When describing a client/server network, which of the following would be considered a client?

A client is a computer or mobile device on the network that relies on the server for its resources. Client/server networks often are controlled by a network administrator.

Which of the following is the strongest password?

A strong password is a longer combination of letters, number, and/or symbols that unlocks access to electronic data.

How can you protect a computer from electrical spikes and surges?

A surge protector can defend computer equipment from spikes, surges, and noise. A surge protector lies between the computer and the electrical outlet and absorbs any electrical change so that it does not reach the computer equipment.

What type of network sends signals through airwaves and usually does not require cables?

A wireless network sends signals through airwaves and usually does not require cables.

A Trojan is a malicious program that uses a computer network to replicate. True or False?

A worm is a malicious program that uses a computer network to replicate.

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

Access controls are security measures that define who can use a program or app, and what actions they can do within the program or app by requiring users to verify themselves using passwords, biometrics, or other identifying techniques.

The set of activities performed to build a program is called the _____.

Adaptive or agile development methodology is more responsive to rapidly changing technologies and markets

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

After creating or modifying a webpage in HTML, you must publish the page and any multimedia content it contains to a web server so that visitors can access it on the Internet.

An Integrated Development Environment (IDE) stores files and folders for your website in a directory called _____.

An IDE stores the files and folders in your website in a folder or directory called a project.

How can an attacker execute malware through a script?

An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions. An attacker could exploit a security weakness in the add-on to download and execute malware on the user's computer.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

An evil twin is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information while users are using it. Evil twins can be impossible to identify, so it is important to treat all public networks as unsecure.

How can you protect personal information gathered by legitimate organizations?

Attackers often pose as friends you may have known in school or met and ask to be "friends" to get at your personal information. Accept requests from only those whom you want to have access to your information.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.

What type of program would have a class named Student with objects called fullTime and partTime?

Each object would contain data and operations pertaining to the individual object. One benefit of object-oriented programming (OOP) is the ability to reuse and modify existing objects.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics is an applied science that specifies the design and arrangement of items that you use, such as posture techniques, so that you and items interact efficiently and safely.

Technology can lead to all of the following behavioral risks EXCEPT _____.

In addition to technology addiction, there are other behavioral risks associated with using technology: a sedentary lifestyle; poor psychological development, including anxiety, depression, and lower life satisfaction; and poor social interactions, such as social withdrawal.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Insiders are employees, contractors, and business partners who pose a security threat especially when they are upset about being passed over for a promotion or not getting a contract.

What is a popular language for writing scripts that run in your browser to control a webpage's behavior?

JavaScript is a popular language for writing client-side scripts, that is, scripts that run in your browser to control a webpage's behavior and often make it interactive.

Which of the following does a software license usually specify?

Many programs and apps continue to have additional functionality after the initial release. This enables developers to release a stable, tested version of a product, and then continue to add new features and security functionalities and release them as they become finalized.

Which of the following statements is true about public networks?

Many public networks are not secure, making it easier for attackers to intercept the information you are transmitting.

_____ are tools that track the memory usage, status, and errors of currently running software.

Many tools exist to help troubleshooting issues with programs and apps. Process managers track the memory usage, status, and errors of currently running software.

Meredith was using a spreadsheet app when it stopped responding and closed unexpectedly. What happened to the app?

Most computers and devices come with some preinstalled programs and apps that already are on the machine. Most important is the system software such as the operating system, which allows to use the computer or device when turned on the first time.

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

Near field communication (NFC) is used in credit cards, smartphones, and tickets to facilitate close-range communication.

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

Net neutrality supports the concept that the Internet should be neutral and all traffic should be treated equally.

If you upload photos to a NAS device, everyone on the network can access them.

Network attached storage (NAS) devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks. On a home network, you might store family photos and videos so that they are accessible to all members of your family.

Why would you want to connect your computer to a network?

Networks allow computers to share resources, such as hardware, software, data, and information. A network requires a combination of hardware and software to operate.

Scott is seeking a position in an Information Technology (IT) Department. During an interview, his prospective employer asks if he is familiar with programs the company could use, modify, and redistribute without restrictions. What types of programs is the interviewer referring to?

Open source programs are provided for use, modification, and redistribution, without restrictions from the copyright holder.

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

Pages designed with responsive design automatically adjust the size of their content to display appropriately relative to the size of the screen of the device on which it is displayed. When webpages are responsive, users do not have to scroll from left to right or resize the graphics or text to read them on a mobile device with a small screen.

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

Patch finders compare the software versions you are running with the latest versions available on the developers' websites, and identify any updates, or patches, you need to install.

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Several general defenses can be used for any social-networking site. First and foremost, be cautious about what information you post. Second, be cautious about who can view your information. Consider carefully who you accept as friends. Finally, review the site's security settings.

A modem can also function as what other piece of hardware?

Some modems also function as a wired and/or wireless router.

When including an image in HTML code, you would use the <a href> tag. True or False?

The <img> tag specifies information about an image to display on a website.

Why is it not safe to connect to public Wi-Fi networks?

When using a public Wi-Fi network, there are safety concerns. First, these networks are rarely protected. Second, an attacker may have setup an evil twin to mimic an authorized device.

After designing a website, you transfer the website files from your local computer to a remote web server. True or False?

When you have finished testing the pages in your website, you are ready to publish them so that anyone can access them on a device connected to the Internet.

After you finish designing and creating your website, you need to transfer it to a folder on your computer that your browser can access. True or False?

When you have finished testing the pages in your website, you are ready to publish them so that anyone can access them on a device connected to the Internet. Websites published on a web server are accessible online for all to see.

Why is an FTP client helpful?

You can use an FTP (File Transfer Protocol) client app to upload the files from your local computer to a remote web server. FTP specifies rules for transferring files from one computer to another on the Internet.


Related study sets

Chapter 17 QUIZ - Human Resource Management

View Set

DRUGS AFFECTING THE FEMALE REPRODUCTIVE SYSTEM

View Set

Chapter 1,2,3- Chemistry (Completion)

View Set

***HURST Review Elevate Q-Cards***

View Set