Study Guide Flashcards

1
Q

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

A

cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A

A Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you protect a computer from electrical spikes and surges?

A

Use a surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does encryption work?

A

It scrambles the information until the key is used to unscramble it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How will you decide which browser security settings to allow and which ones to block?

A

I will need to review each browser security setting and use my best judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In terms of privacy, which of the following is a best practice?

A

Keeping your Social Security number hidden in a locked box in your home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

A

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

A

He can use remote wiping to retrace the thief’s steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

A

creating malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital certificate?

A

Technology used to verify a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is a first step to deter thieves from accessing your financial information?

A

Do not provide personal information over the phone or through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a characteristic of a strong password?

A

letters, numbers, and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With more and more people using technology, what physical health diagnosis is on the rise?

A

repetitive strain injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

A

Throwing financial documents older than three months in the trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In animation, the higher the fps, the smoother the motion appears

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Web animations can be used in which of the following ways? Select all that apply.

A. to grab attention

B. to reduce storage space

C. to entertain

D. to navigate a site

A

A. to grab attention

C. to entertain

D. to navigate a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Lossy compression retains the original image data and can be uncompressed.

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A digital audio workstation requires separate hardware in addition to a computing device.

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Speech synthesizers use _____ to determine context before outputting.

A

preprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software that compresses and decompresses a video stream is called a ____.

A

codec

NOT Comdec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Yuki placed an image in her presentation, but she may need blow it up if her team thinks the slide does not require any text. She should use a bitmap image.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____________ consist of shapes, curves, lines and text created by mathematical formulas that contain instructions that define objects in an image

A

Vector Graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It is a branch of Artificial Intelligence that trains machines to learn from data, identify patterns and make decisions to progressively improve their performance without much human interaction.

A

Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The two-digit system of 1s and 0s that computers use is called

A

Binary Number System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This allows a device or software identify the words and phrases people speak and then convert them to a format the device can read.

A

Synthesized Speech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

User interface icons typically represent _____. Select all that apply.
A. Folder
B. File
C. App
D. Dialog boxes

A

A. Folder
B. File
C. App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A file format describes the way ___________.

A

data is represented and structured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Audio-editing software allows you to ____. Select all that apply.
A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise

A

A. record audio
b. copy and paste audio
c. change a song’s tempo
d. remove background noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

superimposes game objects onto the live image of your surroundings

A

Augmented reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The _ is a hybrid console with a built-in display.

A

Nintendo Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Before creating a graphic, you should _____. Select all that apply.
A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
C. Save it as SVA file
D. Think about where it will appear

A

A. think about the message you want it to convey
B. decide which format, vector, or bitmap best suits the image
D. Think about where it will appear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following are intended to protect a copyright holder from unauthorized use? Select all that apply.
A. filters.
B. watermark
C. downloads
D. license

A

B. watermark
D. license

35
Q

To create a new typeface, you would probably use ……… graphics software.

A

vector

36
Q

Streaming audio stores data as one complete file to your device

A

No

37
Q

The minimum recommended bandwidth for streaming television shows is at least _____.

A

5 megabits per stream

38
Q

To save storage space, digital video is _______

A

compressed

39
Q

Which feature physically adjusts a camera lens to counteract movement?

A

optical image stabilization

40
Q

CAD software can be used to create _____. Select all that apply.
A. floor plane
B. materials
C. 3-D drawings
D. spreadsheets

A

A. floor plane
B. materials
C. 3-D drawings

41
Q

A flight simulating game is best played with a(n) _______.

A

joystick

42
Q

In a client/server network, the server ____.

A

controls access to network resources

43
Q

What is the approximate range of a personal area network?

A

30 feet

44
Q

A ____ is a node. Select all that apply.
A. printer
B. switch
C. browser
D. router

A

A. printer
B. switch
D. router

45
Q

Which of the following is NOT a common form of malware? Select all that apply.
A. adware
B. bloatware
C. spyware
D. ransomware

A

B. bloatware

46
Q

A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply.

From cellular traffic that a hardware firewall prevents

when the device is not connected to the Internet

when the device is not connecting through the hardware firewall

from traffic that gets past a hardware firewall

A

from traffic that gets past a hardware firewall
when the device is not connecting through the hardware firewall

47
Q

A private network for use by customers, vendors, and/or suppliers is called a(n) _____.

A

A. extranet

48
Q

Throttling refers to the practice of ______.

A

B. reducing speeds of certain high-data users at peak hours

49
Q

Jason sends an email to Tyson using his smartphone, who reads it on his tablet PC. Which of the following best explains how the email travelled from Jason’s smartphone to Tyson’s tablet PC?

A

A. Jason’s smartphone - network interface card - router - network interface card - Tyson’s tablet PC

50
Q

Chloe works as a web content editor. She likes to work out of various cafes and uses free WiFi that they provide to access the Internet. Chloe’s company, however, is concerned about the security of these networks. Which of the following steps can ensure that Chloe’s activities on her computer remain encrypted?

A

C. Her firm should use virtual private network (VPN) to provide her secure access.

51
Q

Both wired and wireless devices can connect to the same network.

A

Yes

52
Q

Employers can use spyware to track program usage by employees.

A

Yes

53
Q

Some organizations set up LANs as ______.

A

B:client/server networks

54
Q

When using cellular service, your device transmits data via _______.

A

radio waves

55
Q

Cellular networks that follow the GSM standard are capable of transmitting _______.

A

voice and data at the same time

56
Q

Which technology can currently transfer data at up to 10 Gbps?

A

Ethernet

57
Q

In a client/server network, the server ____.

A

controls access to network resources

58
Q

When posting to a professional networking account, you should share stories and comments that _____.

A

. offer valuable information to your target audience

59
Q

A real-time chat with an online customer service representative is an example of _____.

A

instant messaging

60
Q

Instant messaging apps require everyone in the conversation to be online simultaneously.

A

No

61
Q

A group of characters that expresses an emotion is called a(n) _

A

emoticon

62
Q

When sending a business-related text message, you should _______.

A

double-check dates and times
be polite

63
Q

An email’s subject line should be as comprehensive and detailed as possible.

A

No

64
Q

Data travels along network pathways in ____

A

packets

65
Q

__________ allow(s) large groups to collaboratively create and comment on content, like articles, and set up guidelines.

A

Wikis

66
Q

What type of social media sites focus on factual knowledge building?

A

collaborative projects

67
Q

Which of the following are examples of social networking?

A

Facebook

68
Q

Media-sharing social networking sites include which of the following? Select all that apply.

A

Youtube
Instagram

69
Q

Crowdfunding is a type of crowdsourcing that focuses on raising _____.

A

money

70
Q

A business should send messages over a social network in which of the following ways? Select all that apply.

A

respond to a customer’s complaint
post customer testimonials
promote upcoming events

71
Q

Blogs are typically created using a web content ________.

A

management system

72
Q

To increase the sense of community around your blog, you should _____.

A

respond positively to comments

73
Q

An email client is installed on a device for reading and sending email.

A

Yes

74
Q

To gain popularity in social circles, you should accept everyone who wants to connect with you.

A

No

75
Q

Common uses of webinars include _____. Select all that apply.

A

product demonstrations
corporate training
distance learning

76
Q

To receive the latest episodes of a podcast, you should subscribe using an RSS feed.

A

Yes

77
Q

Which of the following would you use to categorize a post under “Fashion”?

A

#Fashion

#

78
Q

If an email address contains your full name, it does not need to be unique.

A

No

79
Q

Wikipedia’s volunteer editors ______.

A

must verify facts with reliable sources

80
Q

You can access your email through which of the following? Select all that apply.

A

mobile apps
web apps
desktop apps

81
Q

Which of the following can help organize your email messages? Select all that apply.

A

filtering out spam or newsletters
flagging actionable emails
adding folders for specific projects

82
Q

A ________ is a virtual identity that includes a person’s personal or professional details.

A

profile

83
Q

Mirabel and Haley work for a software firm. One night at a party, Mirabel takes a picture of Haley surrounded by empty beer bottles. Mirabel found it funny and wanted to share it on her Facebook page. Should she do this? Select all that apply.

A

No – because the picture can affect her reputation.
No – because the picture can affect Haley’s reputation.