Study Guide Flashcards
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
cyberbullying
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A Trojan
How can you protect a computer from electrical spikes and surges?
Use a surge protector
How does encryption work?
It scrambles the information until the key is used to unscramble it
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgement
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box in your home
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief’s steps
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
creating malware
What is a digital certificate?
Technology used to verify a user’s identity
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email
Which of the following is a characteristic of a strong password?
letters, numbers, and symbols
With more and more people using technology, what physical health diagnosis is on the rise?
repetitive strain injury
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Throwing financial documents older than three months in the trash
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work
False
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
In animation, the higher the fps, the smoother the motion appears
Yes
Web animations can be used in which of the following ways? Select all that apply.
A. to grab attention
B. to reduce storage space
C. to entertain
D. to navigate a site
A. to grab attention
C. to entertain
D. to navigate a site
Lossy compression retains the original image data and can be uncompressed.
No
A digital audio workstation requires separate hardware in addition to a computing device.
No
Speech synthesizers use _____ to determine context before outputting.
preprocessing
Software that compresses and decompresses a video stream is called a ____.
codec
NOT Comdec
Yuki placed an image in her presentation, but she may need blow it up if her team thinks the slide does not require any text. She should use a bitmap image.
False
____________ consist of shapes, curves, lines and text created by mathematical formulas that contain instructions that define objects in an image
Vector Graphics
It is a branch of Artificial Intelligence that trains machines to learn from data, identify patterns and make decisions to progressively improve their performance without much human interaction.
Machine Learning
The two-digit system of 1s and 0s that computers use is called
Binary Number System
This allows a device or software identify the words and phrases people speak and then convert them to a format the device can read.
Synthesized Speech
User interface icons typically represent _____. Select all that apply.
A. Folder
B. File
C. App
D. Dialog boxes
A. Folder
B. File
C. App
A file format describes the way ___________.
data is represented and structured
Audio-editing software allows you to ____. Select all that apply.
A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise
A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise
superimposes game objects onto the live image of your surroundings
Augmented reality
The _ is a hybrid console with a built-in display.
Nintendo Switch
Before creating a graphic, you should _____. Select all that apply.
A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
C. Save it as SVA file
D. Think about where it will appear
A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
D. Think about where it will appear
Which of the following are intended to protect a copyright holder from unauthorized use? Select all that apply.
A. filters.
B. watermark
C. downloads
D. license
B. watermark
D. license
To create a new typeface, you would probably use ……… graphics software.
vector
Streaming audio stores data as one complete file to your device
No
The minimum recommended bandwidth for streaming television shows is at least _____.
5 megabits per stream
To save storage space, digital video is _______
compressed
Which feature physically adjusts a camera lens to counteract movement?
optical image stabilization
CAD software can be used to create _____. Select all that apply.
A. floor plane
B. materials
C. 3-D drawings
D. spreadsheets
A. floor plane
B. materials
C. 3-D drawings
A flight simulating game is best played with a(n) _______.
joystick
In a client/server network, the server ____.
controls access to network resources
What is the approximate range of a personal area network?
30 feet
A ____ is a node. Select all that apply.
A. printer
B. switch
C. browser
D. router
A. printer
B. switch
D. router
Which of the following is NOT a common form of malware? Select all that apply.
A. adware
B. bloatware
C. spyware
D. ransomware
B. bloatware
A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply.
From cellular traffic that a hardware firewall prevents
when the device is not connected to the Internet
when the device is not connecting through the hardware firewall
from traffic that gets past a hardware firewall
from traffic that gets past a hardware firewall
when the device is not connecting through the hardware firewall
A private network for use by customers, vendors, and/or suppliers is called a(n) _____.
A. extranet
Throttling refers to the practice of ______.
B. reducing speeds of certain high-data users at peak hours
Jason sends an email to Tyson using his smartphone, who reads it on his tablet PC. Which of the following best explains how the email travelled from Jason’s smartphone to Tyson’s tablet PC?
A. Jason’s smartphone - network interface card - router - network interface card - Tyson’s tablet PC
Chloe works as a web content editor. She likes to work out of various cafes and uses free WiFi that they provide to access the Internet. Chloe’s company, however, is concerned about the security of these networks. Which of the following steps can ensure that Chloe’s activities on her computer remain encrypted?
C. Her firm should use virtual private network (VPN) to provide her secure access.
Both wired and wireless devices can connect to the same network.
Yes
Employers can use spyware to track program usage by employees.
Yes
Some organizations set up LANs as ______.
B:client/server networks
When using cellular service, your device transmits data via _______.
radio waves
Cellular networks that follow the GSM standard are capable of transmitting _______.
voice and data at the same time
Which technology can currently transfer data at up to 10 Gbps?
Ethernet
In a client/server network, the server ____.
controls access to network resources
When posting to a professional networking account, you should share stories and comments that _____.
. offer valuable information to your target audience
A real-time chat with an online customer service representative is an example of _____.
instant messaging
Instant messaging apps require everyone in the conversation to be online simultaneously.
No
A group of characters that expresses an emotion is called a(n) _
emoticon
When sending a business-related text message, you should _______.
double-check dates and times
be polite
An email’s subject line should be as comprehensive and detailed as possible.
No
Data travels along network pathways in ____
packets
__________ allow(s) large groups to collaboratively create and comment on content, like articles, and set up guidelines.
Wikis
What type of social media sites focus on factual knowledge building?
collaborative projects
Which of the following are examples of social networking?
Media-sharing social networking sites include which of the following? Select all that apply.
Youtube
Instagram
Crowdfunding is a type of crowdsourcing that focuses on raising _____.
money
A business should send messages over a social network in which of the following ways? Select all that apply.
respond to a customer’s complaint
post customer testimonials
promote upcoming events
Blogs are typically created using a web content ________.
management system
To increase the sense of community around your blog, you should _____.
respond positively to comments
An email client is installed on a device for reading and sending email.
Yes
To gain popularity in social circles, you should accept everyone who wants to connect with you.
No
Common uses of webinars include _____. Select all that apply.
product demonstrations
corporate training
distance learning
To receive the latest episodes of a podcast, you should subscribe using an RSS feed.
Yes
Which of the following would you use to categorize a post under “Fashion”?
#Fashion
#
If an email address contains your full name, it does not need to be unique.
No
Wikipedia’s volunteer editors ______.
must verify facts with reliable sources
You can access your email through which of the following? Select all that apply.
mobile apps
web apps
desktop apps
Which of the following can help organize your email messages? Select all that apply.
filtering out spam or newsletters
flagging actionable emails
adding folders for specific projects
A ________ is a virtual identity that includes a person’s personal or professional details.
profile
Mirabel and Haley work for a software firm. One night at a party, Mirabel takes a picture of Haley surrounded by empty beer bottles. Mirabel found it funny and wanted to share it on her Facebook page. Should she do this? Select all that apply.
No – because the picture can affect her reputation.
No – because the picture can affect Haley’s reputation.