Multiple Choice Flashcards

1
Q
Unicode uses\_\_\_\_\_\_\_\_ bits and provides codes for 65,000 characters.
A. seven
B. eight
C. ten
D. sixteen
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
The \_\_\_\_\_\_\_ number system allows digital devices to represent virtually any number simply by using 0s and 1s.
A. digital
B. text
C. numeric
D. binary
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Most music for portable media players is stored in \_\_\_\_\_\_\_ audio file formats.
A. uncompressed
B. compressed
C. lossless
D. zipped
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is the technique for adding light and shadows to a 3D image?
A. Rendering
B. Ray tracing
C. Wireframe
D. Rasterize
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Compressed files often have \_\_\_\_\_\_ at the end of the file name.
A. .exe
B. .zip
C. .txt
D. none of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Most graphics software uses a process called pixel \_\_\_\_\_\_\_\_\_ to create new pixels by averaging the colors of nearby pixels.
A. polarization
B. interpolation
C. compression
D. resolution
Upgrade to remove ads
Only $1/month
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following tools would be found in 3D graphics software?
A. Rendering tools
B. Ray tracing tools
C. Surface texture tools
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following projections captures a 360-degree image on a horizontal plane?
A. Rectilinear
B. Cylindrical
C. Spherical
D. Anaglyphic
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following options are well suited for using vector graphics?
A. Line art
B. Logos
C. Diagrams
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A live stream is also called a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. download
B. Webcast
C. on-demand stream
D. digital audio extraction
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
\_\_\_\_\_\_\_\_ is the number of bits that are processed during a specific unit of time, usually during one second.
A. Bit rate
B. Bit depth
C. Color depth
D. None of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Digital audio is stored in a variety of file formats, including \_\_\_\_\_\_\_\_\_\_\_.
A. WMA (Windows Media Audio)
B. WAV
C. MP3
D. all of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A(n) \_\_\_\_\_\_\_ is the software that compresses a video stream when a video is stored and decompresses the file when the video is played.
A. compression
B. codec
C. bitmap
D. resolution
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Transmission speeds are expressed in \_\_\_\_\_\_\_, whereas storage space is expressed in \_\_\_\_\_\_\_.
A. bits, bytes
B. bytes, bits
C. binary, numeric
D. none of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is a graphic that uses red and blue overlays to create a stereoscopic effect.
A. stereo pair
B. anaglyph
C. VOB
D. JPEG
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 \_\_\_\_\_\_\_\_\_\_.
A. resolution
B. aspect ratio
C. frame rate
D. all of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following file extensions is NOT a vector graphic?
A. .svg
B. .eps
C. .tif
D. .ai
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
What is another term for vector graphics software?
A. Drawing software
B. Photo editing software
C. Digital compositing
D. All of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__________is music, speech, and other sounds represented in binary format for use in digital devices.
A. MIDI (Musical Instrument Digital Interface)
B. Speech recognition
C. Speech synthesis
D. Digital audio

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Sampling \_\_\_\_\_\_\_ refers to the number of times per second that a sound is measured during the recording process.
A. rate
B. compression
C. depth
D. sound
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
American Standard Code for Information Interchange (ASCII) requires \_\_\_\_\_\_\_\_\_\_ bits for each character.
A. two
B. six
C. seven
D. ten
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following is NOT a type of digital video container file?
A. MP4
B. AVI
C. VOB (Video Object)
D. PNG
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called \_\_\_\_\_\_\_\_\_\_\_.
A. binary
B. digitization
C. representation
D. none of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Digital video is a core technology for which of the following?
A. Digital television
B. Videoconferencing systems
C. Video messaging
D. All of the above
Upgrade to remove ads
Only $1/month
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
A group of eight bits is called a \_\_\_\_\_\_\_.
A. byte
B. megabit
C. binary
D. numeric data
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
The number of frames that are displayed per second is measured in \_\_\_\_\_\_\_.
A. compression
B. fps
C. color depth
D. bps
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
The number of colors available in a graphic is referred to as color \_\_\_\_\_\_\_\_\_.
A. depth
B. range
C. RGB
D. PNG
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
Which of the following is NOT a format that is used for digital audio?
A. MP3
B. DOC
C. WAV
D. Ogg
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ adds computer-generated vector objects to a view of the real world.
A. Augmented reality
B. Cylindrical projection
C. Virtual reality
D. Stereoscopy
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Manipulating two-dimensional images to produce the illusion of three-dimensional depth is called \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. pairing
B. stitching
C. stereoscopy
D. dimensionization
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Today's color display devices represent color using the \_\_\_\_\_\_ color model.
A. RGB
B. PNG
C. BMP
D. none of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
\_\_\_\_\_\_\_\_ data consists of numbers that can be used in arithmetic operations.
A. Text
B. Digital
C. Numeric
D. Binary
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area?
A. Inpainting
B. Cloning
C. Noise reduction
D. Image enhancement
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Many of the graphic sequences in video games require \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ to produce a series of bitmap images while the game takes place.
A. real-time rendering
B. delayed buffering
C. spherical projection
D. motion cropping
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Digital data can be \_\_\_\_\_\_\_\_\_\_ that have been converted into discrete digits such as 0s and 1s.
A. text
B. numbers
C. graphics, sound, and video
D. all of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following is NOT a type of bitmap format?
A. TIFF (Tagged Image File Format)
B. RAW
C. PNG (Portable Network Graphics)
D. ZIP
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
When vector animations are used for special effects in movies, the animation sequences are \_\_\_\_\_\_\_\_\_\_\_\_\_.
A. scanned into PNG format
B. pre-rendered into digital video clips
C. compressed into anaglyphs
D. rendered real time
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Image\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ creates a panoramic image by combining two or more photographs that have overlapping edges.
A. stitching
B. compression
C. cropping
D. compositing
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Pokemon Go is a game that's based on \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ technology.
A. virtual reality
B. 360 projection
C. augmented reality
D. lossless compression
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ stream sends media to a local device where it is stored temporarily, or "buffered," until there is enough data to begin playback.
A. download
B. live
C. on-demand
D. delayed
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
3D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?
A. A bitmap graphic
B. A zipped file
C. A wireframe
D. All of the above
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
\_\_\_\_\_\_\_\_\_ enables people to control software with spoken commands, as well as dictate text into a word processing document.
A. MIDI
B. Speech synthesis
C. Speech recognition
D. Phoneme
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
What is the term used to describe altering the pixel colors where the edges of the object and the background meet, so that the object appears to merge with the background?
A. Alpha blending
B. Clipping path
C. Cloning
D. Inpainting
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following is NOT a factor in the quality of digital video?
A. Frame rate and resolution
B. Color and bit depth
C. Compression technique
D. Memory technology in your camera
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
At its time of construction, one of the fastest computers in the world is referred to as a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. mainframe
B. supercomputer
C. minicomputer
D. all of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
Many touchscreens have a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ coating designed to repel the oils deposited by fingers that tap and swipe the screen.
A. gorilla
B. granular
C. semiconductive
D. oleophobic
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

_________ is a temporary holding area for data and programs.
A. CISC (complex instruction set computer)
B. RAM
C. ROM
D. RISC (reduced instruction set computer)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
Which of the following sensors would best help an autonomous vehicle calculate the distance to an object?
A. Lidar
B. Magnetometer
C. INS
D. GPS
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_\_contains a collection of instructions for actions that the circuitry in a microprocessor can perform.
A. ALU (Arithmetic Logic Unit)
B. ARM
C. PCS (Processor Command Set)
D. instruction set
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
What type of computer should you consider purchasing if you want a portable system that is good for students and on-the-go professionals who want to create content and be productive, in addition to consuming content?
A. Desktop
B. Laptop
C. Tablet
D. Smartphone
Upgrade to remove ads
Only $1/month
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, and video editors?
A. Laptop
B. Desktop
C. Tablet
D. Smartphone
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
Which optical storage technology stores data permanently on a disc, which cannot be subsequently added to or changed?
A. Read-only
B. Recordable
C. Rewritable
D. None of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
In a microprocessor, the \_\_\_\_\_\_\_\_\_\_ fetches instructions.
A. ALU
B. register
C. CPU
D. control unit
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
\_\_\_\_\_\_\_\_\_ is the amount of data a storage device can move per second from the storage medium to RAM.
A. Access time
B. Data transfer rate
C. Bit rate
D. RPM
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
The part of the data bus that runs between the microprocessor and RAM is called the \_\_\_\_\_\_\_ bus.
A. local
B. expansion
C. USB
D. network
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
The electronic components of most digital devices are mounted on a circuit board called a \_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. system board
B. motherboard
C. main board
D. all of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
A \_\_\_\_\_\_\_\_\_\_ is software that helps a peripheral device establish communication with its host device.
A. device hub
B. device driver
C. hot-plug
D. data bus
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
Which of the following is NOT an example of an expansion port?
A. Thunderbolt
B. USB 3.0
C. HDMI
D. RAM
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
Which of the following is an example of a computer that is a small, lightweight personal computer that is designed like a clam shell?
A. Desktop computer
B. Laptop computer
C. Server
Tablet
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following is an example of why hard disk drives are so popular?
A. They are not susceptible to a head crash.
B. They have relatively low cost for lots of storage.
C. They are volatile.
D. All of the above.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
The advantages of liquid crystal display (LCD) screens include \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. display clarity
B. low radiation emission
C. portability
D. all of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
Which of the following is an example of an operating system that is used by smartphones?
A. iOS
B. Android
C. Windows Mobile
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
The main circuits on the system board that carry data are called the \_\_\_\_\_\_\_\_\_.
A. ROM
B. RAM
C. expansion bus
D. data bus
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
Which of the following is NOT drawback of using cloud storage?
A. Increased security risk
B. High price of storage
C. Possible service outage
Discontinuation of service
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
Which of the following is an important consideration when evaluating storage options for digital devices?
A. Durability
B. Dependability
C. Capacity
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
Processors that execute one instruction at a time are considered to be \_\_\_\_\_\_\_\_ processors.
A. serial
B. parallel
C. pipeline
none of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
Most computers have temporary holding areas called \_\_\_\_\_\_\_\_\_\_.
A. output
B. microprocessor
C. CPU
D. RAM
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
The most popular battery type used in today's electronic devices is \_\_\_\_\_\_\_\_\_\_.
A. nickel-cadmium
B. alkaline
C. lithium ion
D. none of the above
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
The term \_\_\_\_\_\_\_\_ refers to the part of a digital device that holds the system board.
A. form factor
B. CPU
C. peripheral
D. system unit
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
Originally called microcomputers, \_\_\_\_\_\_\_\_\_ are designed to meet the computing needs of individuals.
A. mainframes
B. personal computers
C. microcomputers
D. servers
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
Which of the following sensors would be most useful for helping a drone remain level as it flies?
A. Accelerometer
B. Magnetometer
C. Gyro sensor
D. Aero
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called \_\_\_\_\_\_\_\_\_\_\_\_ that combine sensors with processing circuitry.
A. microcontrollers
B. microcomputers
C. servers
D. microdevices
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q
Microprocessors can't directly understand programming languages, so programs have to be converted into \_\_\_\_\_\_\_\_\_\_\_\_\_ that corresponds to the microprocessor's instruction set.
A. application
B. machine language
C. microprocessor
D. ARM
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
\_\_\_\_\_\_ is data that is entered into a computer. \_\_\_\_\_\_ is the result produced by a computer.
A. Output, Input
B. Input, Output
C. Information, Binary data
D. None of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as books, music, and videos but not so great for creating content or multitasking?
A. Tablet
B. Smartphone
C. Desktop
D. Laptop
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
Which of the following is NOT a type of digital video container file?
A. MP4
B. AVI (Audio Video Interleave)
C. VOB (Video Object)
D. PNG (Portable Network Graphics)
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
The primary purpose of \_\_\_\_\_\_\_\_ software is to help the computer system monitor itself in order to function efficiently.
A. system
B. application
C. input
D. memory
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
An INS would most likely be found in a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. supercomputer
B. laptop
C. smart appliance
D. autonomous vehicle
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
Self-driving vehicles use a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ algorithm to gather data, analyze it, and then carry out required actions.
A. sense-plan-act
B. autonomous
C. Boolean
RPG
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
Which file-sharing protocol distributes the role of a file server across a collection of dispersed computers? 
A. FTP 
B. UDP 
C. Dropbox 
D. BitTorrent
Upgrade to remove ads
Only $1/month
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
When network protocols clean a corrupted signal, the process is called \_\_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. error correction 
B. UDP 
C. handshaking 
D. packet switching
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
DSL is an example of what type of Internet access? 
A. Mobile 
B. Portable 
C. Fixed 
D. Wireless
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
Which of the following is an advantage of wired connections? 
A. More secure 
B. More dependable 
C. Faster speeds 
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q
The bandwidth of a channel that carries digital data is usually measured in \_\_\_\_\_\_\_\_\_\_\_. 
A. bytes per second 
B. bits per second 
C. GHz 
D. microwaves
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q
Networks that form the Internet are maintained by \_\_\_\_\_\_\_\_\_\_\_\_. 
A. ISPs 
B. IXPs 
C. ICANN 
D. All of the above
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q
Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet? 
A. FTP 
B. UDP 
C. TCP 
D. PAN
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q
On a network, any device that stores or generates data is considered to be a(n) \_\_\_\_\_\_\_\_\_. 
A. router 
B. DTE (data terminal equipment) 
C. DCE (data communications equipment) 
D. ATP (advanced threat protection)
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q
Which type of network covers a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies? 
A. PAN 
B. LAN 
C. WAN 
D. VPN
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
\_\_\_\_\_\_\_\_\_\_ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers. 
A. Internet 
B. Ethernet 
C. Wireless 
D. Mobile
Upgrade to remove ads
Only $1/month
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
Which type of broadband Internet access involves using cellular data networks? 
A. Fixed 
B. Portable 
C. Mobile 
D. Dial-up
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications? 
A. Category 6 cables 
B. Fiber-optic cables 
C. Coaxial cables 
D. All of the above
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q
A modem is required for \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Internet access. 
A. dial-up 
B. cable 
C. DSL 
D. all of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q
Which type of network topology connects a peripheral device to a host device? 
A. Mesh 
B. Star 
C. Bus 
D. Point-to-point
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
\_\_\_\_\_\_\_ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school. 
A. WANs 
B. PANs 
C. LANs 
D. BANs
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices? 
A. Mesh 
B. Star 
C. Bus 
D. Point-to-Point
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q
\_\_\_\_\_\_\_\_\_ technology divides a message into several packets that can be routed independently to their destination. 
A. Handshaking 
B. Packet switching 
C. Packet sniffing 
D. Circuit switching
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What organization is the top-level authority for supervising domain name requests?
A. DNS
B. HTTP
C. ISPs (Internet service providers)
D. ICANN (Internet Corporation for Assigned Names and Numbers)

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q
Which type of network topology connects multiple devices to a central device? 
A. Mesh 
B. Star 
C. Bus 
D. Point-to-point
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q
Which type of communication protocol converts data into standard formats that can be used by applications? 
A. Physical 
B. Transport 
C. Arrival 
D. None of the above
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q
Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables?
A. PAN (personal area network) 
B. LAN (local area network) 
C. WAN (wide area network) 
D. VPN (virtual private network)
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q
When you connect to a Wi-Fi hotspot, your digital device is classified as a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. server 
B. DCE 
C. DTE 
D. router
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q
Which network tier forms the Internet backbone? 
A. Tier 1 
B. Tier 2 
C. Tier 3 
D. Tier 4
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
What type of Internet connection do you have when upload speed differs from download speed? 
A. Dynamic 
B. Asymmetric 
C. Broadband 
D. Symmetric
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
Which of the following is an example of a DCE? 
A. Router 
B. Modem 
C. Hub 
D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
Which DCE would you use if you wanted to extend a wired network by adding more ports? 
A. Hub 
B. Switch 
C. Bridge 
D. Repeater
A

A

106
Q
Internet addresses are controlled by which one of the following protocols? 
A. TCP 
B. IP 
C. UDP 
D. HTTP (Hypertext Transfer Protocol)
A

B

107
Q
Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps? 
A. TCP 
B. ICANN 
C. 3G 
D. 4G
A

D

108
Q
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? 
A. UDP 
B. IP 
C. TCP 
D. FTP (File Transfer Protocol)
A

C

109
Q
Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want? 
A. Dynamic 
B. Static 
C. TCP 
D. Broadband
A

B

110
Q
In a browser, \_\_\_\_\_\_\_\_\_\_ link to pages that you use frequently.
A. bookmarks
B. favorites
C. both A and B
D. none of the above
A

C

111
Q
A Web \_\_\_\_\_\_\_\_\_ is an Internet-based computer that stores Web site content and accepts requests from browsers.
A. site
B. server
C. store
D. browser
A

B

112
Q
All of the following are search operators EXCEPT \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. AND
B. GET
C. OR
D. NOT
A

B

113
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_ is a company that provides space on a server to house Web pages.
A. HTML editor
B. CSS
C. ISP (Internet service provider)
D. Web hosting service
A

D

114
Q
If you wanted to turn bold off for the remainder of the text in an HTML document, what tag would you use?
A. <i>
B. <b> 
C.  
D. </b>

</i>

A

D

115
Q
If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser?
A. HTTP
B. HTML
C. SSL (Secure Sockets Layer)
D. HTTPS
A

D

116
Q
A link contains the \_\_\_\_\_\_\_\_ that links to another Web page.
A. hypertext
B. URL
C. domain name
D. CSS
A

B

117
Q
Which of the following is NOT an HTTP method?
A. GET
B. SEND
C. OPTIONS
D. PUT
A

B

118
Q
Which early browser was the first to run on multiple computer platforms including Windows?
A. Mosaic
B. Internet Explorer
C. Safari
D. None of the above
A

A

119
Q
What does the HTML tag <p> designate in an HTML document?
A. New paragraph
B. Personal data
C. Print command
D. Show photos

</p>

A

A

120
Q
Which of the following would NOT be considered an essential element of a browser?
A. Navigation buttons
B. Refresh button
C. Address box
D. Bookmark toolbar
A

D

121
Q
Which of the following is a component of a search engine?
A. Web crawler
B. Indexer
C. Query processor
D. All of the above
A

D

122
Q
A browser \_\_\_\_\_\_\_\_\_\_ adds features to a browser.
A. plugin
B. extension
C. executable
D. OS
A

B

123
Q
What is the term used for when a link leads to a Web page that no longer exists?
A. 911 error
B. Linkrot
C. URL error
D. Short URL
A

B

124
Q
The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called \_\_\_\_\_.
A. HTTP
B. HTML
C. FTP (file transfer protocol)
D. IP
A

A

125
Q
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
A. WWW
B. Internet
C. Cascading style sheets (CSS)
D. Hypertext
A

D

126
Q
Every Web page has a unique address called a(n) \_\_\_\_\_\_\_\_\_\_\_.
A. HTML
B. CSS
C. HTTP
D. URL
A

D

127
Q
A(n) \_\_\_\_\_\_\_\_\_\_ cookie is set by a site other than the one you connected to.
A. session
B. third-party
C. persistent
D. first-party
A

B

128
Q
If you wanted to set the text in a section of your HTML document to italics, what tag would you use?
A.  
B. <i> 
C.  
D. None of the above

</i>

A

B

129
Q
If your device will not display a PDF in your browser, you may need to install a browser \_\_\_\_\_\_\_\_.
A. cache
B. extension
C. executable
D. plugin
A

D

130
Q

Which of the following is a markup language?
A. XML (Extensible Markup Language)
B. XHTML (Extensible HTML)
C. SGML (Standard Generalized Markup Language)
D. All of the above

A

D

131
Q

Which of the following is data that would NOT be found in a cookie?
A. Information it reads from your hard drive
B. Access date
C. Customer number
D. Shopping cart number

A

A

132
Q
HTTP is considered to be a(n) \_\_\_\_\_\_\_\_\_\_\_ protocol.
A. cookie
B. FTP
C. persistent
D. stateless
A

D

133
Q
Which of the following is the technique for improving the ranking and visibility of a Web site?
A. Search engine indexer
B. Query processor
C. Search engine optimization
D. Link popularity
A

C

134
Q
When were the original HTML specifications developed by Tim Berners-Lee?
A. 1970s
B. 1980s
C. 1990s
D. 2000s
A

C

135
Q

Which of the following is a function of the browser cache?
A. Any elements that it stores do not have to be downloaded again.
B. Your passwords are securely stored.
C. Your cookies are downloaded.
D. All of the above.

A

A

136
Q
Which of the following is NOT used to create or edit HTML documents?
A. HTML conversion utility
B. Filezilla FTP client
C. Word processing software
D. Online HTML editor
A

B

137
Q
Which HTTP method does a browser use when you upload files to a specific Web address?
A. POST
B. GET
C. PUT
D. SEND
A

C

138
Q

Which of the following is a common use of server-side scripting?
A. Online shopping
B. Changing the appearance of a graphical object displayed on a Web page
C. Caching Web pages for quick loading
D. All of the above

A

A

139
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_ is a program designed to help people locate information on the Web by formulating simple queries.
A. predictive service
B. search engine
C. Web crawler
D. indexer
A

B

140
Q

The ____________ is a collection of HTML (hypertext markup language) documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP (hypertext transfer protocol).
A. The Internet
B. WWW (World Wide Web)
C. ARPANET (Advanced Research Projects Agency Network)
D. HTML

A

B

141
Q
Which of the following file extensions indicates the file is an HTML document?
A. .html
B. .htm
C. .doc
D. Both A and B
A

D

142
Q
Which HTML tag designates links to other Web pages?
A. <h1> 
B. <img> 
C.  
D. <a href="">

</a></h1>

A

D

143
Q
A message \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ contains the sender and recipient addresses date and subject line.
A. SMTP
B. IMAP
C. header
D. DOCTYPE
Upgrade to remove ads
Only $1/month
A

C

144
Q
The telecommunications technique used by local email is sometimes referred to as \_\_\_\_\_\_\_\_\_\_.
A. store-and-forward
B. private asynchronous
C. open source
D. private synchronous
A

A

145
Q
Instant messaging is a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_, real-time technology for two or more people to type messages back and forth while online.
A. synchronous private
B. asynchronous private
C. asynchronous public
D. synchronous public
A

A

146
Q
\_\_\_\_\_\_\_\_\_-party apps are external programs that interact with social networking services.
A. First
B. Second
C. Third
D. All of the above
A

C

147
Q
A(n) \_\_\_\_\_\_\_\_\_ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.
A. wiki
B. tweet
C. blog
D. microblog
A

A

148
Q
\_\_\_\_\_\_ is an example of a content community.
A. LinkedIn
B. Twitter
C. Wikipedia
D. Yelp
A

C

149
Q
A(n) \_\_\_\_\_\_\_\_\_\_ work modifies a copyrighted work but does not substantially change its content or purpose.
A. transformative
B. Creative Commons
C. copyrighted
D. derivative
A

D

150
Q
Which of the following terms is NOT part of an email system?
A. Server
B. Synchronous
C. Mailbox
D. Message
A

B

151
Q
Critics of copyrights often advocate \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. copyleft
B. NPOV
C. trademarks
D. none of the above
A

A

152
Q

The protocols POP3 (Post Office Protocol version 3) and __________ can be used to manage your incoming mail.
A. SMTP
B. IMAP (Internet Message Access Protocol)
C. NPOV
D. RSS
Upgrade to remove ads
Only $1/month

A

B

153
Q
Which term is used to describe an online, personal journal in the form of a Web page that contains posts on one or more topics that are usually displayed in reverse chronological order?
A. Wiki
B. Content community
C. Chat
D. Blog
A

D

154
Q
Which popular social media category is best for sharing media and information?
A. Social networking
B. Geosocial networking
C. Content community
D. Online communication
A

C

155
Q
Which of the following is NOT a type of location service?
A. Sociogram
B. Cell tower triangulation
C. GPS trilateration
D. Hotspot triangulation
A

A

156
Q

Which of the following would be found on a standard Wikipedia page?
A. RSS feed
B. Community edit: Requests for improvements
C. Original research
D. None of the above

A

B

157
Q
Online \_\_\_\_\_\_\_\_\_\_ is/are two or more online personas with the same name or user name.
A. sockpuppets
B. doppelgangers
C. impersonation
D. cyberbullying
A

B

158
Q
Which one of the following is NOT a Wikipedia content standard?
A. NPOV
B. NOR
C. RSS
D. V
A

C

159
Q
The concept of \_\_\_\_\_\_\_\_\_ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.
A. fair use
B. open source
C. public domain
D. Creative Commons
A

A

160
Q
What provides a visual model for classifying and comparing various social media services?
A. Social media honeycomb
B. Social media services
C. Geosocial services
D. Content communities
A

A

161
Q
Which one of the following is a microblogging service?
A. Facebook
B. Twitter
C. LinkedIn
D. RSS
Upgrade to remove ads
Only $1/month
A

B

162
Q
Which of the following is NOT considered to be intellectual property?
A. Trademark
B. Copyright
C. Patents
D. Public domain
A

D

163
Q
A person's presence on a social media is referred to as a(n) \_\_\_\_\_\_\_\_\_.
A. online identity
B. persona
C. avatar
D. all of the above
A

D

164
Q

Commonly held expectations of privacy include which of the following?
A. Freedom from intrusive surveillance
B. The expectation that individuals can control their own personally identifiable information
C. Both of the above
D. Neither of the above

A

C

165
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
A. transformative
B. Creative Commons
C. copyrighted
D. derivative
A

A

166
Q
\_\_\_\_\_\_\_\_\_ tags make it possible to search for photos or videos using keywords.
A. Media
B. Metadata
C. BBS
D. HTML
A

B

167
Q
What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?
A. RSS reader
B. Blog aggregator
C. Neither of the above
D. Both A and B
A

D

168
Q
A basic social media profile generally includes which of the following?
A. A user name
B. An email address
C. A phone number
D. All of the above
A

A

169
Q
To find detailed information about the origin of an email message, look at the \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. SMTP
B. IMAP
C. header
D. HTML
A

C

170
Q
The bulletin board systems of the 1970s are considered to be the forerunners of \_\_\_\_\_\_\_\_\_\_\_\_\_.
A. Content communities
B. Geosocial networking
C. Sociograms
D. Email
A

A

171
Q
\_\_\_\_\_\_\_\_\_\_\_ networking provides a platform for users to carry out interactions based on their current locations.
A. Social
B. Communication
C. Honeycomb
D. Geosocial
A

D

172
Q
Which of the following is a VoIP service?
A. FaceTime
B. Snapchat
C. Google Talk
D. All of the above
A

D

173
Q
\_\_\_\_\_\_\_\_\_\_ is/are online service(s) that facilitate communication and interaction among people who want to share information.
A. Email
B. Social media
C. Crowdsourcing
D. Geolocation
A

B

174
Q
Which of the following is the least important characteristic of content communities?
A. Reputation
B. Identity
C. Conversations
D. Sharing
A

B

175
Q

Which of the following elements would NOT be found on a blog page?
A. Comments from readers
B. An archive of older articles
C. SMTP (Simple Mail Transfer Protocol) services
D. A way for readers to add the blog to their favorites list

A

C

176
Q
On a communication matrix, where would blogs be found?
A. Public synchronous
B. Public asynchronous
C. Private synchronous
D. Private asynchronous
A

B

177
Q
Along with a profile image, which of the following would also be included in a user profile?
A. Sockpuppet
B. Anonymity
C. Tagline
D. Tweet
A

C

178
Q

If a Creative Commons license contains ND, what does that indicate?
A. When the work is used, the copyright holder must be given credit for the work in a citation or another appropriate manner.
B. New works based on the original must be distributed under the same license as the original work.
C. The work must not be changed when it is redistributed or shared.
D. The work may not be used for commercial purposes.

A

C

179
Q
Communicating false statements that damages the reputation of another individual is referred to as \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
A. defamation
B. cyberbullying
C. impersonation
D. fake news
A

A

180
Q
In the words of Justice Brandeis, what is the "right to be let alone"?
A. Anonymity
B. Social discovery
C. Privacy
D. Impersonation
A

C

181
Q
A nonprofit organization called \_\_\_\_\_\_\_\_\_\_\_\_ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.
A. Creative Commons
B. public domain
C. Share Alike
D. none of the above
A

A

182
Q
Which of the following file extensions would you expect to find on a file containing an Excel spreadsheet? 
A. .docx 
B. .xlsx 
C. .accdb 
D. .excel
A

B

183
Q
In a spreadsheet worksheet, a(n) \_\_\_\_\_\_\_\_\_\_\_ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations. 
A. record 
B. label 
C. value 
D. formula
A

D

184
Q
The software application associated with a specific file type is called a(n) \_\_\_\_\_\_\_\_\_\_ application. 
A. derivative 
B. transformative 
C. default 
D. root
A

C

185
Q

Which of the following is part of the process for installing software on a PC?
A. Scan the hard drive for registry errors
B. Defragment the hard drive
C. Add the device to the network
D. None of the above

A

D

186
Q
Operating systems provide file organization tools called \_\_\_\_\_\_\_\_\_\_\_. 
A. Disk Management 
B. file management utilities 
C. Disk Utility 
D. file-naming conventions
A

B

187
Q

Two of the most common open source and free software licenses are ___________.
A. BSD (Berkeley Software Distribution) and GPL (General Public License)
B. EULA (end-user license agreement) and VoIP
C. EULA and GPL
D. None of the above

A

A

188
Q
Which type of software must include the source code, which allows programmers to modify and improve the software? 
A. Shareware 
B. Freeware 
C. Open source 
D. Public domain
Upgrade to remove ads
Only $1/month
A

C

189
Q
An operating system's \_\_\_\_\_\_\_\_\_\_\_\_ capability supports a division of labor among all the processing units. 
A. multithreading 
B. multiprocessing 
C. multitasking 
D. all of the above
A

B

190
Q
The main directory on a storage device is referred to as the \_\_\_\_\_\_\_\_ directory. 
A. root 
B. boot 
C. partition 
D. DOS
A

A

191
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_ is generally priced at a flat rate and allows software to be used on all computers at a specific location. 
A. site license 
B. single-user license 
C. multiple-user license 
D. copyright
A

A

192
Q
Which of the following is a file management utility? 
A. Finder 
B. File Explorer 
C. Neither of the above 
D. Both A and B
A

D

193
Q
\_\_\_\_\_\_\_\_\_\_ software may be freely copied, distributed, and even resold. 
A. Proprietary 
B. Public domain 
C. Commercial 
D. Freeware
A

B

194
Q
Which of the following would not be considered an operating system resource? 
A. RAM 
B. CPU (central processing unit) 
C. Storage 
D. URL (Uniform Resource Locator)
A

D

195
Q
Which of the following features is unique to macOS? 
A. User interface 
B. Multitasking 
C. Resource forks 
D. GUI (graphical user interface)
A

C

196
Q
In spreadsheet software, the\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet. 
A. what-if analysis 
B. automatic recalculation 
C. relative reference 
D. absolute reference
A

B

197
Q
A new version or edition of a software product is referred to as a software \_\_\_\_\_\_\_\_\_\_\_. 
A. upgrade 
B. update 
C. service pack 
D. software patch
Upgrade to remove ads
Only $1/month
A

A

198
Q

Which of the following would be considered essential software for both laptop computers and tablet computers?
A. Word processor
B. VoIP (Voice over Internet Protocol) client
C. Office suite
D. Browser

A

D

199
Q
Which one of the following types of operating systems would most likely be found on a laptop computer? 
A. Desktop operating system 
B. Mobile operating system 
C. Server operating system 
D. Multitasking operating system
A

A

200
Q
Which OS is installed on more than 80% of the world's personal computers? 
A. Microsoft Windows 
B. Linux 
C. iOS 
D. macOS
A

A

201
Q
A \_\_\_\_\_\_\_\_\_\_\_ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player. 
A. local 
B. Web 
C. portable 
D. mobile
A

D

202
Q
Which of the following would be classified as productivity software? 
A. Microsoft Office 
B. Google Docs 
C. iWork 
D. All of the above
A

D

203
Q

When you empty the trash on your computer what happens?
A. Data in the sectors where deleted files were stored is removed.
B. The sectors that held the deleted files are overwritten with zeros.
C. The index marks the sectors as available for storing new data.
D. The data is shredded so it can never be recovered.

A

C

204
Q
The iOS operating system is found on which device? 
A. Android tablet 
B. iPhone 
C. Mac laptop 
D. None of the above
A

B

205
Q
Which category of software would programming languages fall into? 
A. System software 
B. Development software 
C. Application software 
D. All of the above
A

B

206
Q

The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.
A. arrives only when you use the app, downloaded and installed
B. is downloaded and installed, retrieved from the cloud
C. is downloaded and installed, retrieved only when you use the app
D. none of the above

A

A

207
Q
Magnetic and optical media are divided into circular \_\_\_\_\_\_ and then further divided into pie-shaped \_\_\_\_\_\_\_\_. 
A. cells, records 
B. sectors, tracks 
C. tracks, sectors 
D. clusters, cells
A

C

208
Q
Which of the following operating systems is found on Macintosh desktop and laptop computers? 
A. iOS 
B. Linux 
C. Android 
D. macOS
A

D

209
Q

Word processing software is likely to include which of the following features?
A. Search and Replace and readability formula
B. What-if analysis and worksheet
C. Cell references and functions
D. All of the above

A

A

210
Q
Chrome OS is an example of a(n) \_\_\_\_\_\_\_\_\_ because it depends substantially on processing and storage provided by cloud-based servers. 
A. thin client 
B. forked license 
C. ARM 
D. Linux
A

A

211
Q
What are the main software categories? 
A. System, open source, and development 
B. Application, shareware, and system 
C. System, development, and application 
D. Demoware, system, development
A

C

212
Q
Which of the following is not a file-naming convention? 
A. Avoid using symbols. 
B. Maximum length is 256 characters. 
C. Do not use reserved words. 
D. Spaces are not allowed.
A

D

213
Q
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. 
A. disk partition 
B. file path 
C. file-naming conventions 
D. root directory
A

C

214
Q
Activities called \_\_\_\_\_\_\_\_\_\_\_ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices. 
A. kernels 
B. processes 
C. forks 
D. scanners
A

B

215
Q
Software for PCs contains a(n) \_\_\_\_\_\_\_\_\_ program that guides you through the installation process. 
A. install 
B. EXE 
C. DMG 
D. setup
A

D

216
Q
A feature called \_\_\_\_\_\_\_\_\_\_\_ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. 
A. Search and Replace 
B. word wrap 
C. readability formula 
D. document formatting
A

B

217
Q
Which operating system is open source and available as distros, such as Ubuntu and Mint? 
A. Linux 
B. Windows Mobile 
C. Microsoft Windows 
D. iOS
A

A

218
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
A. address spoofing exploit
B. online intrusion
C. brute force attack
D. rogue antivirus
A

B

219
Q
Trojans depend on \_\_\_\_\_\_\_\_ to spread.
A. self-replication
B. social engineering
C. rootkits
D. code injection
A

B

220
Q
The best defense against malware is \_\_\_\_\_\_\_\_\_\_\_\_\_.
A. encryption
B. entropy
C. antivirus software
D. all of the above
A

C

221
Q

Which of the following sequence of events best describes an online intrusion?
A. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
B. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
D. None of the above.

A

A

222
Q
A cryptographic \_\_\_\_\_\_\_\_\_\_ is a procedure for encryption or decryption.
A. firewall
B. ciphertext
C. key
D. algorithm
Upgrade to remove ads
Only $1/month
A

D

223
Q
Which of the following is not a type of spam filter?
A. Content
B. Permission
C. Blacklist
D. Entropy
A

D

224
Q
\_\_\_\_\_\_\_ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
A. DDoS
B. An AES service attack
C. A Floodping attack
D. All of the above
A

A

225
Q
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
A. RAT
B. PUP
C. Evil Twin
D. Adware
A

B

226
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.
A. Malware
B. Rootkit
C. Spear phishing
D. Keylogger
A

C

227
Q
MITM (man-in-the-middle) attacks include which of the following?
A. Address spoofing
B. IMSI catchers
C. Evil Twins
D. All of the above
A

D

228
Q
To establish a(n) \_\_\_\_\_\_\_\_, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.
A. keylogger
B. Evil Twin
C. botnet
D. none of the above
A

B

229
Q

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
A. Network router
B. Personal firewall
C. Hardware that uses NAT (network address translation)
D. All of the above

A

D

230
Q
A(n) \_\_\_\_\_\_\_\_\_\_ pings a packet of data to a port in order to see if that port is open or not.
A. rootkit
B. port scan
C. virus signature
D. heuristic analysis
A

B

231
Q
A social engineering scam called \_\_\_\_\_\_\_\_\_\_\_ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.
A. advance fee fraud
B. pharming
C. address spoofing
D. Evil Twin
Upgrade to remove ads
Only $1/month
A

A

232
Q
A password manager can store passwords in an encrypted file located at which of the following storage locations?
A. Local storage
B. Cloud storage
C. USB storage
D. All of the above
A

D

233
Q
Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?
A. Entropy
B. Massive
C. Dictionary
D. Brute force
A

D

234
Q
The current method of encrypting communication between a client and a server depends on a security protocol called \_\_\_\_\_\_\_.
A. RAT
B. TLS
C. PUP
D. AES
A

B

235
Q
Which of the following is not an example of user authentication?
A. Password
B. PINs
C. Fingerprint scanner
D. URLs (Uniform Resource Locators)
A

D

236
Q
A(n) \_\_\_\_\_\_\_\_\_\_ is a device or software that is designed to block unauthorized access while allowing authorized communications.
A. Netstat
B. firewall
C. Evil Twin
D. digital certificate
A

B

237
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
A. Evil Twin
B. Address spoofing
C. Social engineering
D. None of the above
A

C

238
Q

There are various encryption methods, but __________ is the encryption standard currently used worldwide.
A. AES (Advanced Encryption Standard)
B. DDoS (distributed denial of service attacks)
C. IMSI (International Mobile Subscriber Identity)
D. TLS (Transport Layer Security)

A

A

239
Q
What is the process called when an app from a source other than an official app store is installed on a device?
A. Side-loading
B. Rootkit
C. Code injection
D. Dropper
A

A

240
Q
\_\_\_\_\_\_\_\_\_\_\_\_ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
A. Personal firewall
B. Safe Browsing
C. Heuristic analysis
D. SmartScreen Filter
A

B

241
Q
Antivirus software can use techniques called\_\_\_\_\_\_\_\_\_\_ to detect malware by analyzing the characteristics and behavior of suspicious files.
A. heuristic analysis
B. virus signature
C. side-loading
D. port scan
A

A

242
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
A. DDoS
B. TLS
C. PUP
D. RAT
A

D

243
Q

When antivirus software detects malware, which of the following would not be a course of action you could take?
A. Conduct a heuristic analysis.
B. Repair the infection.
C. Put the infected file into quarantine.
D. Delete the infected file.

A

A

244
Q
\_\_\_\_\_\_\_\_\_\_\_\_ is a term for a person who devises and carries out a scam in order to accomplish a goal.
A. Man-in-the-middle
B. RAT
C. Internet worm
D. None of the above
A

D

245
Q

Which of the following is not a characteristic of a computer worm?
A. Self-replicating
B. Usually standalone executable programs
C. Self-distributing
D. Spread through a process called side-loading

A

D

246
Q
A virus \_\_\_\_\_\_\_\_\_\_ usually arrives as an email message that contains warnings about a fake virus.
A. payload
B. signature
C. hoax
D. dropper
A

C

247
Q

Which of the following is not a characteristic of a weak password?
A. Eight characters in length and include one or more uppercase letters, numbers, and symbols
B. Uses default passwords such as password, admin, system, and guest
C. Any sequence that includes a user name
D. Use of a word from a dictionary

A

A

248
Q
Spam accounts for approximately \_\_\_\_\_\_ of all email.
A. 40%
B. 50%
C. 60%
D. 70%
A

D

249
Q

If you use a password manager, what do you as the user need to remember?
A. Your passwords for individual sites
B. The master password
C. Form data including credit card numbers
D. All of the above

A

B

250
Q
A computer \_\_\_\_\_\_\_\_\_ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
A. trojan
B. virus
C. worm
D. all of the above
A

B

251
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_ software shields certain applications against behaviors commonly exhibited by intrusions.
A. Malware
B. Rootkit
C. Antivirus
D. Virus signature
A

C

252
Q
A \_\_\_\_\_\_\_\_\_\_\_\_\_\_ exploit usually begins with a virus warning and an offer to disinfect the infected device.
A. rogue antivirus
B. virus hoax
C. RAT
D. backdoor
A

A

253
Q
If you suspect that your computer might be infected by a zero-day exploit, launching a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ with a product such as Malwarebytes might identify the infection.
A. on-demand scan
B. rootkit
C. botnet
D. DDoS
A

A

254
Q
Which of the following would be considered spyware?
A. A keylogger
B. Firewall software
C. Antivirus software
D. All of the above
A

A

255
Q
\_\_\_\_\_\_\_\_\_\_ changes an originating address or a destination address to redirect the flow of data between two parties.
A. Social engineering
B. IMSI catching
C. Address spoofing
D. All of the above
A

C

256
Q
This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
A. Authentication
B. Encryption
C. Ciphertext
D. Decryption
A

B

257
Q
A(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
A. zero-day
B. rootkit
C. brute force
D. dictionary
A

A

258
Q
If you feel more secure with a totally random and unique password for each of your logins, then a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is an excellent option.
A. keylogger
B. encryption key
C. password manager
D. personal firewall
A

C

259
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ increases security by verifying identity based on more than just a password or PIN.
A. RAT
B. A hash value
C. Two-factor authentication
D. HTTPS
A

C

260
Q
\_\_\_\_\_\_\_\_\_\_ is the process of modifying an executable file or data stream by adding additional commands.
A. Keylogging
B. Pharming
C. Brute force attack
D. Code injection
A

D