MIS EXAM 3

Ace your homework & exams now with Quizwiz!

B

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? A.) Wired network B.) Intranet C.) Extranet D.) Virtual private network

A

In which of the following messages would the abbreviation brb (which stands for "be right back") NOT be appropriate? A.) An email to a customer B.) A private message with a friend C.) A post on an active discussion board D.) A live chat with a family member

A

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? A.) mobile hotspot B.) Bluetooth connection C.) virtual private network D.) cell phone hotspot

C

What does a DSL modem use to connect to an ISP? A.) TV cable B.) Ethernet cable C.) Telephone cable D.) Power cable

c

What does a DSL modem use to connect to an ISP? A.) TV cable B.) Ethernet cable C.) Telephone cable D.) Power cable

A

What is a MAC address? A.) A unique hardware address for your device B.) The connection needed to access to a cellular network C.) An IP address unique to Apple's MAC computers D.) An alternate name Internet Protocol version 6

A

What is an ISP? A.) A telecommunications company that sells Internet access. B.) A communications device that connects to a communications channel. C.) A central point for cables in a network for data sharing, D.) A system of two or more devices linked by wires, cables, or a telecommunications system.

B

Celeste is preparing to lead a training session during a webinar. How can she engage the audience and encourage active participation? A.) Encourage the audience to take notes B.) Incorporate polling questions C.) Wear a silly hat D.) Ask for feedback by email

False

[email protected] is an appropriate email address to use for communicating with potential employers. True/False

A

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? A.) Web conferences B.) Text messaging C.) Email messages D.) Podcasts

A

How does a wireless network key work with an encrypted wireless network? A.) The wireless key is the encryption code needed by the receiver to decode the file. B.) The sending and receiving devices must know the wireless network key to communicate. C.) The wireless network needs the key to decode the data before sending. D.) The wireless network key is your password for logging onto an Internet email system to receive files.

C

How might a business use a blog? A.) To present a demonstration B.) To host a meeting C.) To communicate with customers D.) To transmit a video

B

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account? A.) Through your employer B.) Through an online service C.) Through your school D.) Through a social network

True

If you upload photos to a NAS device, everyone on the network can access them. True/False

A

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. A.) archive B.) resend C.) recycle D.) categorize

C

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. A.) Bus B.) Ring C.) Star D.) Mesh

B

In a connected network, how are hubs and switches similar to one another? A.) They are interchangeable terms for the same hardware. B.) They provide a central point for cables in a network. C.) They transfer data to all devices. D.) They can only connect to a single device.

A

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? A.) Social curation sites B.) Social media C.) Social networks D.) Social conferencing

D

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? A.) Voice and video service (VVS) B.) Audio Internet service provider (AISP) C.) Voice-to-Text (VTT) D.) Voice over Internet Protocol (VoIP)

B

In the email communication process, what is the role of the email server? A.) Encrypting data that is sent over an unsecured network B.) Routing email messages through the Internet or a private network C.) Storing archived email messages D.) Creating messages to send

C

What can you do to make sure your online communications are civil and productive? A.) Post all of your messages anonymously. B.) Incorporate humor in your communications. C.) Follow netiquette guidelines. D.) Keep in mind that your online communications are private.

A

What device is most likely installed in your computer to connect it to a wired or wireless network? A.) Network interface card (NIC) B.) Router C.) Ethernet cable D.) Modem

A

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? A.) Social engineering B.) A zombie attack C.) An evil twin D.) Spyware

C

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? A.) They use adware to fill your screen with unwanted advertisements until you click one. B.) They overload the server with network traffic so webpages will not load. C.) They disguise the network as an evil twin. D.) They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.

D

What is the U.S. Federal Communication Commission's role in regard to Internet access? A.) To rate Internet sites similar to movie ratings B.) To restrict Internet access by location and population C.) To regulate the bandwidth each website can have D.) To release rules surrounding Internet access

C

When David posts his photos to a Facebook album, the Facebook site automatically places David's photos in chronological order by when they were taken and suggests places David might want to tag in the photos. How does Facebook know this information? A.) Tags B.) Filenames C.) Metadata D.) Comments

C

When an ISP must provide the same level of service to all websites, regardless of their content or purpose, what concept is being supported? A.) Social engineering B.) Freedom of choice C.) Net neutrality D.) Network security

C

Which of the following could indicate a DoS attack on your company server? A.) Customers are required to enter personal information as they complete an order form. B.) Customers are receiving too many emails about special offers. C.) Customers cannot view the website on their device because the page will not load. D.) Customers cannot download the most recent newsletter.

B

Which of the following describes an evil twin? A.) A device infected with malware that an attacker uses to control the device remotely. B.) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. C.) A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. D.) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

A

Which of the following devices connects a network to the Internet through an Internet Service Provider (ISP)? A.) Router B.) Modem C.) Switch D.) Hub

B

Which of the following devices connects a network to the Internet through an Internet Service Provider (ISP)? A.) Router B.) Modem C.) Switch D.) Hub

B

Which of the following email addresses would be the best fit for a business consultant? A.) [email protected] B.) [email protected] C.) [email protected] D.) jefjones^[email protected]

B

Which of the following is a disadvantage of using cloud computing to share files? A.) The amount of space that files will take up on your computer. B.) The inability to access your files if you lose your Internet connection. C.) The files you will lose if your computer crashes. D.) How long it will take to access a backup of files.

C

Which of the following is an example of someone who is NOT practicing good netiquette? A.) Tamika used the Reply All button to send an email about a meeting room change. B.) Raj tweeted about the guest speaker at the staff meeting unveiling new office technology with the hashtag #cantwaittotry. C.) Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office. D.) Margie posted pictures from her son's baseball game with the caption, "Great job, boys!"

C

Which of the following is the most secure SSID for a wireless network at a family residence? A.) Poplar drive B.) Linksys C.) GoVols D.) Thompson family Wi-Fi

B

Which of the following is true about broadband connections? A.) Broadband connections turn off after a specified amount of idle time. B.) Broadband connections are "always-on" connections. C.) Only a few of today's Internet connections are broadband connections. D.) Broadband connections require a wireless router to increase their speed.

d

Which of the following is typical content for a podcast? A.) phone calls B.) online chats C.) interactive seminars D.) radio shows

D

Which of the following items is NOT required to have a functioning network? A.) Software B.) Data C.) Hardware D.) Internet

D

Which of the following would be considered a strong password? A.) Password123 B.) Abc123456789 C.) CatCatCatCat D.) Wbcm2!4!820!

A

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? A.) My Verizon VPN B.) Starbucks Wi-Fi C.) Jenn's iPhone D.) xfinitywifi

A

Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website? A.) More control of the blog's content B.) More expensive C.) More branding consistency D.) More exposure

C

Why would you want to connect your computer to a network? A.) to keep up with computing trends B.) for added security C.) to access shared resources D.) to use the network's operating system

False

Wikis are not useful in education because students cannot use them to share notes and give feedback. True/False

C

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? A.) She uses a hub at her home that she connects to through the app. B.) She has installed switches that interact with the installed app on her phone. C.) She has a home network with smart home devices. D.) She dialed into her home modem through the app and sent a command through the router.

False

A router is a system of two or more devices linked by wires or cables. True/False

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. True/False

D

A business can use a wiki in the following ways EXCEPT _____. A.) accessing schedules and procedures B.) exchanging ideas C.) sharing policies D.) aggregating content

B

Adrian is having a problem with setting up a new printer in his office, and he can't find the answers to his questions in the owner's manual. Which of the following resources would be the best place for Adrian to ask his questions and get targeted responses? A.) Microblogging platform B.) Message board C.) Podcast subscription D.) Social shopping network

D

Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list? A.) Post frequently and share personal, private details B.) Add everyone who posts on her threads to her friends list C.) Add all of Tracey's friends to her friends list D.) Search for other people on the site she might already know and add them to her friends list

D

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? A.) It shares the company's plans with competitors, making it transparent and honest. B.) It allows the users to share their experiences with the game on a different platform while the site is down. C.) It confirms who uses the social networking platform to get status updates and follow the game. D.) It allows the company to communicate to many users at once about an issue and release status updates.

B

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time? A.) Natural language processing (NLP) B.) Artificial intelligence (AI) C.) Internet of Things (IoT) D.) Machine learning (ML)

B

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use? A.) VPN B.) Extranet C.) Wi-Fi D.) Intranet

False

Bandwidth is a term that describes the number of devices connected to a network. True/False

A

Businesses use webinars for the following reasons EXCEPT _____. A.) Group discussions B.) Education and compliance C.) Training and skill development D.) Brand promotion

D

Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing? A.) Change his password to his social media accounts B.) Stop posting C.) Make all his posts private D.) Block the person

A

Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email? A.) Check his Sent Items folder. B.) Sign into his boss's email account. C.) Archive his older messages. D.) Organize his Inbox folder.

D

Devices on a _____ area network are connected via Bluetooth. A.) local B.) wide C.) metropolitan D.) personal

A

Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals? A.) Blog B.) Email C.) Podcast D.) Wiki

B

Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet? A.) IP address B.) Username and password C.) Email address D.) Network Security Key

False

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint. True/False

B

Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem? A.) The HR director mistakenly named Felipe as the picnic organizer. B.) Most people used the Reply All button. C.) The mail server was infected with a virus. D.) Felipe signed into the wrong email account.

A

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? A.) list of posts with the most recent ones at the top B.) a photo and description of herself C.) an indicator showing the number of pageviews D.) list of webpages that link to her blog

C

Hayley is an accessibility advocate at a small college and frequently shares information with her co-workers about how to better accommodate students with learning challenges. The college president has complimented her efforts and asked her to find ways to make this information more readily available and better organized for new, incoming instructors. What kind of site might best help Hayley achieve this goal? A.) Social networking site B.) Discussion forum site C.) Social curation site D.) Social bookmarking site

D

Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? A.) Blog B.) Email C.) Podcasts D.) Wiki

C

Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview? A.) Dress nicely in a suit and tie. B.) Create a video log. C.) Prepare the background area behind his chair. D.) Email a thank you note to all the participants.

A

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using? A.) Paas B.) RaaS C.) SaaS D.) IaaS

C

Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos? A.) Metadata B.) Emojis C.) Tags D.) Reviews

False

Netiquette only applies to social media and social networking, not emails and instant messaging. True/False

C

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. A.) topologies B.) architectures C.) standards D.) protocols

D

One of Richard's duties in his new job is to be active on LinkedIn and other professional social networks. Which of the following activities should he avoid when using social media for his company? A.) Posting messages that reflect a professional image B.) Using his full name and a photo of himself in his profile C.) Offering information about his company's products D.) Inviting visitors to solve brain teasers

B

Paulo is trying to organize groups to clean a river, which has become clogged with plastic products after a recent storm. Which of the following social media tools can he use in his organizing efforts? A.) User reviews B.) Crowdsourcing C.) Weather alerts D.) Comments on social network pages

B

Posting hostile or insulting comments in response to someone else's blog post is called _____. A.) cyberstalking B.) flaming C.) doxxing D.) hashing

B

Quincy suspects that passwords and other personal information were electronically stolen from his computer. What kind of malware might be infecting his computer? A.) Worm B.) Spyware C.) Trojan D.) Ransomware

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. True/False

B

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? A.) Hand picker B.) Receiving clerk C.) Freight mover D.) Shipping clerk

B

Sandhya is installing a security camera at the entrance to her office. The camera needs power and network access, but there's no power outlet near the door. What technology can Sandhya use to get power to the security camera? A.) Wi-Fi B.) PoE C.) TCP/IP D.) LTE

D

Shipping services often add tags to shipped packages that can be scanned and monitored through wireless communication. Which network protocol is the best fit for this purpose? A.) Ethernet B.) Wi-Fi C.) Cellular D.) RFID

B

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. A.) Tracking your online activity and then selling that data without your knowledge B.) Using your photos and posts to form impressions about your character C.) Alerting others that you are not home according to location-tracking features D.) Enticing you to friend someone so that they gain access to your account

D

Sonia works from home and uses the Internet often throughout the day. When they're home, Sonia's husband and children also use her network for gaming, social media, and streaming videos or music. Which of the following best describes Sonia's network? A.) ISP network B.) Business network C.) Internet D.) Home network

C

Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work? A.) Group messages confirming meeting times B.) Messages with photo attachments showing company events C.) Text messages containing bad news D.) Text messages containing company announcements

D

To access the Internet, a router must be connected to a _____. A.) network B.) hub C.) switch D.) modem

B

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. A.) Abbreviations B.) Emojis C.) Meeting invites D.) Personal photographs

False

Twitter is an example of a wiki, which allows for collaborative editing by its users. True/False

A

When using encryption from your home computer, how would you configure the router? A.) You can use the wireless router to set the encryption key and type of encryption. B.) You can use the wireless router to intercept encrypted information and block it from entering the network. C.) You can use the wireless router to verify the security certificate of the encrypted data being sent. D.) You can use the wireless router to encrypt and then decode the encryption on information sent and received.

C

When your computer accesses a webpage, what role is your computer filling in the network architecture? A.) Peer B.) Server C.) Client D.) Administrator

D

Which network type is often used for vendor access? A.) Intranet B.) Intranet C.) Extranet D.) Wireless network

C

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? A.) A photo of you dancing on a tabletop wearing a shirt with your company logo on it. B.) A photo of you in a pool with two beers in each hand. C.) A photo of you horseback riding on the beach with friends. D.) A photo of you out to dinner, holding hands with a prospective client

C

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? A.) A photo of you dancing on a tabletop wearing a shirt with your company logo on it. B.) A photo of you in a pool with two beers in each hand. C.) A photo of you horseback riding on the beach with friends. D.) A photo of you out to dinner, holding hands with a prospective client.

D

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. A.) The date a photo was taken B.) The file size C.) The GPS location coordinates D.) The HTML coding

D

Zeke is settling in at a coffee shop for some study time before his next class. He notices the coffee shop's wireless network is secured and not open. What information does he need to ask from the barista so he can access the wireless network and get onto the Internet? A.) Username B.) Rootkit C.) Firewall password D.) Security key


Related study sets

Sec 1: General Insurance Concepts

View Set

EAQ M5 Chapter 30: Activity and Exercise (Activity and Exercise)

View Set

Honors Geometry 1-2 - Chapter 11

View Set

Chapter 17 MC, Chapter 22, Chapter 24, Chapter 22 HIS 102, AP Euro Ch. 22-24, Ch 23 Idealogies & Upheavals, HY 102 Chapter 22, Industrial Revolution 2, AP EURO CHAPTER 21 PRIMER, Chapter 22, Euro Ch 21, AP Euro Chapter 20, AP Euro Final Chapter 22, W...

View Set

18. All Regents Chemistry Curriculum Sets | Chemistry Regents Review Book

View Set