Filters
Question type

Study Flashcards

For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.

A) True
B) False

Correct Answer

verifed

verified

What type of window do you open to display a list of files?


A) Program window
B) Data file window
C) Start window
D) Folder window

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) _____ is a small picture that represents a program, file, or hardware device.


A) pic
B) icon
C) pointer
D) shortcut

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What determines the speed at which data travels?


A) Bus width
B) Clock speed
C) Instructions per cycle (IPC)
D) RAM capacity

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Ricky's social media account was recently hacked. His bank accounts and email accounts use the same password as his social media account, and within a week, they were also hacked. What could Ricky have used to prevent the original attack from affecting so many accounts?


A) Strong password
B) Password manager
C) Remote lockout
D) Encryption

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Branston is shopping for a laptop he can coordinate with his iPhone. Which laptop operating system should he choose?


A) iOS
B) Linux
C) macOS
D) Android

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is NOT a leading provider of PaaS and IaaS services?


A) Google
B) Microsoft
C) Amazon
D) Walmart

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?


A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Technology in daily life can increase productivity, convenience, safety, and security. Which of the following uses of technology is most often used to address security concerns?


A) A smart car that manages speed
B) A navigation app with current traffic information
C) A virtual assistant using voice recognition
D) A doorbell with a motion-detection camera

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?


A) encryption
B) dumpster diving
C) phishing
D) identity theft

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Hayne is starting his own business as a psychotherapist and needs to post a website advertising his services, contact information, and some tips on what clients can expect in therapy. What kind of website would best suit Hayne's needs?


A) Static website
B) E-commerce website
C) Dynamic website
D) Scripted website

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?


A) RFID
B) NFC
C) Bluetooth
D) IrDA

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Mario is looking for an official website where he can find information about how to file his federal income taxes. Four URLs in his search results seem interesting, though each has a different three-letter extension. Which of these TLDs most likely indicates the best website for Mario's needs?


A) .pro
B) .edu
C) .org
D) .gov

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

What rules should guide your behavior when you interact with friends and coworkers on social media?


A) Netiquette
B) Code of conduct
C) Acceptable use policy (AUP)
D) Digital inclusion

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Lauren is proofing an HTML file before publishing the webpage to her website. She sees the following code: Visit Facebook What content appears in the browser?


A) http://facebook.com
B) Visit Facebook
C) Visit Facebook.
D) "_blank"

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Folder names should _____.


A) be as short as possible
B) identify the content and purpose of the folder
C) include an extension that indicates its contents
D) contain more than 255 characters

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?


A) Process managers
B) Auditing tools
C) Patch finders
D) Restorers

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Jodi is travelling to San Francisco for a conference. She has stored her PowerPoint slides on Microsoft's web app. What could be of concern to her while presenting her slides?


A) Storage space on her external hard drive
B) Access to the latest version of the web app
C) A poor internet connection
D) Storage space on her laptop

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Digital media content like animations, video, and audio are stored as bits and bytes.

A) True
B) False

Correct Answer

verifed

verified

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.

A) True
B) False

Correct Answer

verifed

verified

Showing 561 - 580 of 1042

Related Exams

Show Answer