ITE 115 Quiz Questions

Ace your homework & exams now with Quizwiz!

Joel wants to find a specific webpage containing the words "The quick brown fox" in the same sequence. Which of the following search queries should he use to produce the most helpful results?

"the quick brown fox"

What search operator would you use with the word "Android" to find Android phone, Android smartphone, and Android cell phone?

* (asterisk)

Which of the following HTML code samples inserts a hyperlink in a webpage?

<a href="http://www.google.com">Google</a>

To insert a heading for a main topic on a webpage, which of the following tags should you use?

<h1> </h1>

When using a content management system (CMS), how can you allow multiple individuals to work on a website at the same time without worrying they will override or duplicate work?

A CMS allows you to grant access to capabilities such as adding or removing content based on a contributor's role.

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Google is an example of which type of website?

A search site

Anusha wants to use her computer, rather than handwriting the information on her notepad, to analyze her monthly expenses to make the job easier. Which of the following apps should she use?

A spreadsheet app to keep a record of her expenses, sort data, and make calculations

What is a MAC address?

A unique hardware address for your device

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?

Adobe Premiere Clip

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?

Augmented reality

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Which of these is an optical medium of storage?

Blu-ray disc

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?

Emperor penguin colony

News360 is a search engine because it gathers, organizes, and then distributes web content.

False

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

G suite

Which of the following is a web app?

Google Docs

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps.

Sanjay, a middle school history teacher, has assigned his class to work in groups to create a presentation on the different legal systems around the world. Each group consists of three people in the class and one person from their pen pal class in India. How would you describe Sanjay's use of technology?

He is using technology to have students work cooperatively in groups and create a presentation.

Tameka is expecting a baby and her partner wants to make sure he can get her to the hospital on the day of delivery using the fastest route possible regardless of time of day. How should he decide which technology to use?

He should choose a navigation app with artificial intelligence that can provide information about preferred routes.

Rocco runs a software firm that creates database management systems for other businesses. How can he ensure that his employees' computers remain protected from viruses and other malware?

He should have periodic anti-virus scanning and software upgraded on all computers.

In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly.

Information Technology

Which of the following is true about XML?

It provides a way to classify data and share it between applications.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment method. Sometimes those forms have an asterisk (*) next to them as required fields. Code in which of the following languages can check to make sure all required fields are completed?

JavaScript

Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which type of app should he launch?

M-commerce app

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

NOT Being cautious about what information you post on social networking sites.

Which of the following indicates a website is NOT secure?

NOT a lock icon is not displayed in the address bar

Which of the following is not an advantage of saving documents in the cloud?

NOT you can access the documents from any device connected to the internet

If you delete a shortcut from your desktop, have you also deleted the original file?

No, because a shortcut does not place the actual file, folder, or app on the desktop.

Which of the following best defines responsive design?

Pages automatically adjust the size of their content relative to the size of the screen.

At the beginning of the school year, each classroom was given one box of copy paper to make all their copies for the year. How do you think the teachers will be able to make that one box last all year long?

Place as many documents as possible online, reducing the need for paper printouts.

Daniel wants to buy a computer to use for playing games after work. He loves racing games and wants to make sure his device has all the specifications needed to run them smoothly and efficiently. Which of these factors should he consider?

Processor core - some applications, especially games, have greater processor requirements

Gertie wants to buy a smartwatch by making an electronic payment. She is not willing to divulge her financial information, and her only bank account is not linked to any online payment service. Which of the following most aligns to what Gertie feels comfortable doing?

She should use a virtual account number to make the payment.

Cathy wants to buy a new watch online, but is concerned about security when making the purchase. Which of the following increases the chance that her payment is NOT secure?

Shopping on a website that uses the HTTP protocol

Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following is a sign that the website is not a worthwhile resource?

The author uses emotional language to express a single point of view

In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac toe, and other strategy games. How would you describe the developers' goal in teaching the computer these games?

The developers were using artificial intelligence

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

What is uptime?

The measure of a web host's reliability

Which of the following is NOT true about mobile health?

The need for visits to the doctor's office is increased.

Bentley is the head of a software development team and needs to use a web app for project management. Which of the following web apps best suits his needs?

Trello

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

E-commerce sites use Transport Layer Security (TLS) to encrypt data and protect you from fraud and identity theft.

True

If you have information literacy, you can select the right tool to find the information you need.

True

Information literacy means you can evaluate whether online information is misleading, biased, or out of date.

True

Steffi needs to find the domain name of the webpage she is currently viewing. To do this, she needs to look at the address bar of the browser.

True

Alicia often shows short, engaging videos to her fifth-grade science students. She has more success using RhythmOne instead of Google to find appropriate videos. Which of the following most likely explains why?

Unlike Google, RhythmOne uses speech recognition to match the audio part of the video with the search term.

How is an executable file different from a data file?

Unlike a data file, you cannot open and read executable files.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks?

Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals?

Use sleep modes and other power management features for computers and devices.

Gregory is researching the use of certain drugs for treating anemia in women living in a developing country. Which of the following approaches is the most focused on his research?

Use the web directories created by health research institutions.

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Virtual reality (VR)

Which of the following would be considered a strong password?

Wbcm2!4!820!

Amanda is used to buying clothes from physical stores. Her friend, Stuart, prefers online shopping and wants to persuade her to shop online as well. Which of the following arguments can Stuart make to convince Amanda without painting a false picture?

You can shop online at any time of day and in any weather conditions

Cloud storage refers to the storage of data on ______.

a server on the Internet

JavaScript likely controls which of the following elements on a webpage

a slide show

What would you need to install if you have an app that is incompatible with your current operating system?

a virtual machine

On a desktop, the _____ is the window you are currently using, and it appears in front of any other open windows.

active window

A software company is working on a new project for a mutual fund organization. The client expects the scope of the project to be flexible; their goals are evolving and they needed to test the product as components are finished. Which type of project development methodology should be adopted?

agile development

During which phase of the SDLC is software tested to make sure each function works as intended?

all phases

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

analysis phase

Simone frequently downloads mobile apps from the Amazon App Store. What operating system does she have on her smartphone?

android

What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

antispyware

_____ ensures that the person requesting access to a computer is not an imposter.

authentication

On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads. What attribute should Mario add to the <video> tag?

autoplay

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

be cautious about what information she posts

Why is it not safe to connect to public Wi-Fi networks?

because these networks are rarely protected

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

bluetooth

What determines the speed at which data travels?

bus width

What can you do to make sure you are not contributing to software piracy?

buy software only from legitimate resellers or directly from the manufacturer

Which of the following factors can affect processor performance of a CPU?

clock speed

Jason takes many photographs on his smartphone while on vacation in Italy. If Jason wants to access these pictures across multiple devices, including his computer, smartphone, and tablet, where should he store them?

cloud storage

Pierre has entered marks obtained by the students in all the classes he teaches in a spreadsheet. Now he wants to highlight some data according to his specifications. Which spreadsheet feature should he use?

conditional formatting

What does a B2C website use to track the items you select on the website?

cookies

When Florence joins her father's construction business, she realizes all the transactions are still done and maintained on paper. What should she do to establish a system where any data can be looked up immediately and transparency can be maintained?

create a database of company projects, customers, and vendors

How can you protect personal information gathered by legitimate organizations?

create a separate email account for receiving information from websites

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Which of the following devices is the easiest to upgrade, such as by adding RAM?

desktop computers

If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?

digital forensics

Movies, music, and other digital content can be illegally distributed. What laws or strategy are designed to prevent this illegal distribution?

digital rights management

Remus is an art student who wants to start creating digital artwork on his computer. He wants to be able to create images that retain their quality in all sizes. Which type of app should he use?

drawing app

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

ergonomics

A router is a system of two or more devices linked by wires or cables.

false

All-in-one computers are easier to service and upgrade but occupy more space than desktop computers.

false

Bandwidth is a term that describes the number of devices connected to a network.

false

Big data is processed using relational databases.

false

HTML coding does not allow for lists using bullets. All lists have to be numbered.

false

HTML has remained the same ever since it was developed, which is why there is only one version.

false

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

false

If you want to become a digital citizen, you only have to buy a piece of technology.

false

Operating systems can run only if they are installed on a hard drive.

false

Programmers use compilers to test code to find errors and provide suggestions to fix them.

false

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

false

The Close button reduces a window so that it only appears as a button on the taskbar.

false

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

false

When you log into your email with your username and password, you are logging into a static website, since the look and feel is the same each time.

false

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

false

Surya's computer monitor display does not seem to work despite repeated attempts to fix the issue. Which of the following is most likely to be causing display problems?

faulty power or video cable

Which of the following is an authentication method to keep your data safe?

fingerprint scanner

Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

fourth generation language

Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

freeware

If you have a file that has billions of bytes of data, then it would be measured in _____.

gigabytes

Which of these hardware components can you use to store videos?

hard drive

Sophia is putting together a training manual for her new batch of employees. Which of the following features can she use to add a document title at the top of each page?

header and footer

Which of the following components on a webpage is created using HTML?

heading

Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skills; he is good at figuring out what is wrong with computers and fixing them; and he is patient and helpful when others do not know how to use computers. As his college advisor, which technology careers would you suggest he explore?

help desk support

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

Which of the following is NOT a feature of an Integrated Development Environment (IDE)?

hosts webpages

Your first project as the new web designer at Smart Design is to increase web traffic to help boost web orders. Before you begin redesigning the website, you look at the website analytics. What can they tell you?

how visitors are using the site

Nicholas updates his company's website to include a hyperlink to its event calendar on the home page. What coding language does he use to insert the link?

html

A(n) _____ is a small picture that represents a program, file, or hardware device.

icon

Manny copied a table from an MS Excel file, closed the file, and then pasted the table in an MS Word document. Where was the table stored after he copied it?

in RAM

When you save a Microsoft Office file to OneDrive, where are you saving it?

in a storage area located on the server

_____ is data and instructions entered into the memory of a device.

input

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler. What type of software should Ned select?

integrated development environment (IDE)

During the boot process, what does the processor do after the computer circuits receive power?

it begins to run the bootstrap program

You and your friend both send documents to the printer, but the printer can only print one document at a time. What does it do with the other document?

it places the documents in a buffer

Aaron has started a food blog on which he wants to post his recipes. He wants to place a high-quality image next to each cooking step. Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

jpeg

In terms of privacy, which of the following is a best practice?

keeping your social security number hidden in a locked box in your home

When describing a client/server network, which of the following would be considered a client?

laptop

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

Which of the following is a technology designed for use in manufacturing?

machine-to-machine (M2M) communications

Andrew's company uses a special email program for communicating within the organization. What should the company do to ensure that its employees are able to access the inbox even when they are away from office?

make the program available as a web app

To access the Internet, a router must be connected to a _____.

modem

Which of the following does a software license usually specify?

number of people authorized to use the software

Digital information processed into a useful form is called _____.

output

A network administrator is usually not required on a _____ network.

peer-to-peer

Devices on a _____ area network are connected via Bluetooth.

personal

Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

piracy

When considering a computer to purchase, which of the following factors involves the operating system of the computer?

platform

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing?

portable app

_____ are tools that track the memory usage, status, and errors of currently running software.

process managers

Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

project manager

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

What types of activities are ideal for a robot to perform?

repetitive tasks

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?

restorers

What hardware is essential to creating a home Wi-Fi network?

router

Which of the following technologies assists users that have a visual disability?

screen readers

An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

site license

Which of the following is an example of a personal area network?

smartwatch and phone connected via bluetooth

The set of activities performed to build a program is called the _____.

software development life cycle (SDLC)

Fiona is responsible for presenting data at the monthly team meeting so that it can be understood at a glance and is visually appealing way. The data is available in spreadsheet. Which of the following can Fiona do?

sparklines

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

Jack needs a convenient way to browse the Internet, read emails, and store basic data when he travels. Which of the following would be the best option for him?

tablet

Which of the following is a step in the boot process?

the operating system files are loaded into RAM

Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large. She compressed it and was then able to send it. How were the other members able to then see the PowerPoint presentation?

they had to unzip or extract it

Why do companies use online collaborative productivity software?

to allow employees to share, edit, and comment on documents

Where can you pin frequently used apps for easy access?

to the taskbar

Abe is creating a presentation and wants to grab the audience's attention with a visual effect when he moves from one slide to another. What should he add to the presentation?

transitions

A device driver is a program that controls a device attached to the computer.

true

After designing a website, you transfer the website files from your local computer to a remote web server.

true

Each slide in a presentation has a layout that includes placeholders for certain types of content.

true

Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices.

true

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

true

If you upload photos to a NAS device, everyone with permissions to access the photos can access them.

true

New cars use embedded computers to make driving safer.

true

Peripheral devices, like a USB flash drive, are generally connected to your computer through ports.

true

Sticky keys enable you to press keyboard shortcuts one key at a time instead of simultaneously.

true

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.

true

When you create an app, you are protected under copyright laws, even before you apply for a copyright.

true

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

true

What type of security requires something you know and something you have that no one else has?

two factor authentification

Which property is assigned to a file by the operating system?

type

What should you do if a headset plugged into your computer is not working properly?

update the device driver

_____ are new releases of an app and may require an additional fee before you can install them.

upgrades

Dave and Pietro are active in the National Guard. Halfway through the semester, they receive orders to report to duty. How can their professor use technology to allow them to complete the course?

use a learning management system (LMS) to put lectures and tests online

How can you protect a computer from electrical spikes and surges?

use a surge protector

Lauren is preparing a presentation for her class. She wants to make the slides and their objects appear and disappear to make it more interesting. What should she do?

use animations

A(n) _____ protects your device against unauthorized access.

user account

Which option lists the computer components in order from oldest to newest?

vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is most likely to have a problem?

video card

A business would use a website analytics tool for all of the following EXCEPT _____.

viewing why someone visited your webpage

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

virtual private network

What device do e-learning applications usually use to help users with visual impairment read digital content?

voice synthesizer

Which of the following is classified as input device?

webcam

Knowing that more people view webpages on their smartphones than on desktop or laptop computers, how would you design your website?

with responsive design

Rafael has to type a report about a class trip to the museum. Which of the following apps should he use to write the report?

word processor

Jin is an editor and ready to purchase the domain name for his website where he plans to market his services. He wants to be creative with the name, but you caution him about being too clever with what he chooses. What would be his best choice?

wordsmithing.com

Lauren wants to write short articles and post them online. If she has an Internet connection, what software can help her do her work?

zoho writer


Related study sets

LET Prof Ed (Part 1) - PNU, QUICE, Lorimar, Eduphil, and more

View Set

Principles of Economics 2e Chapters 6

View Set

2-4: Developing Marketing Objectives and Marketing Strategies

View Set

Two-way tables, Venn diagrams, and probability

View Set

Competency 002: Number concepts and operations

View Set

AVID Media Composer Certification - MC210

View Set

Ch 22 Managing the Firm's Assets

View Set

Henry David Thoreau - "Civil Disobedience" + EMerson

View Set

Chapter 7 Child Growth and Learning

View Set