Filters
Question type

Study Flashcards

A(n) _____ is an electronic document that can contain text, graphics, sound, video, and links.


A) website
B) web address
C) webpage
D) web broswer

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Melissa's wallet was stolen while she was on vacation, and a couple of fraudulent charges came through before she could notify her credit card companies.What other measure should she take to protect her identity after the theft?


A) Put a freeze on her credit information.
B) Stop carrying credit cards in her wallet.
C) Cloze all her accounts.
D) Shred incoming credit card bills.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A class is a type of object that defines the format of the object and the actions it can perform.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is NOT true about a local firewall?


A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Jamie recently downloaded a photo editing app that some of her friends said had some exciting features.Two days later, she found out her email account had been hacked.What kind of malware infected Jamie's computer?


A) Virus
B) Ransomware
C) Worm
D) Trojan

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.


A) Virtual reality (VR)
B) Internet of Things (IoT)
C) Natural language processing
D) Green computing

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

During a thunderstorm, the database server for Jason's store loses power.This is an example of failed _________.


A) integrity
B) encryption
C) availability
D) confidentiality

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Jennifer turns on her laptop and hears a series of beeps.What do they probably indicate?


A) operating system error
B) out-of-date device driver
C) internal hardware problem
D) low battery

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

There are various risks from attacks on Wi-Fi networks.These include all of the following EXCEPT _____.


A) reading wireless transmissions
B) viewing or stealing computer data
C) downloading harmful content
D) creating malware

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

On his website, Mario has a video that visitors must click to play.He wants the video to play automatically when the page loads.What attribute should Mario add to the <video> tag?


A) controls
B) loop
C) autoplay
D) play

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What information do you need to decrypt an encrypted message?


A) Key
B) Password
C) Digital certificate
D) A code on your smartphone

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media.Her cloud-based servers scale up automatically to handle the increased demand.What cloud characteristic supports this automatic adjustment?


A) Broad network access
B) Rapid elasticity
C) Measured service
D) On-demand self-service

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Output methods include speakers, headphones, and interactive whiteboards.

A) True
B) False

Correct Answer

verifed

verified

Many new cars use embedded software to control motion sensors, a backup camera, or a navigation system.

A) True
B) False

Correct Answer

verifed

verified

What kind of device is the camera on a smartphone?


A) Output
B) Memory
C) Processing
D) Input

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Everything you do online is recorded in the cloud, but you can choose to erase it, as you have control over your digital footprint.

A) True
B) False

Correct Answer

verifed

verified

Tikenya was responsible for creating the PowerPoint presentation for the group project.When it was complete, she wanted to email it to all the group members, but her email service told her the file was too large.She compressed it and was then able to send it.How were the other members able to then see the PowerPoint presentation?


A) They had to attach to another file.
B) They had to zip it on their computer.
C) They had to drag it into a folder.
D) They had to unzip or extract it.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Kason spends several hours a week generating reports on sick hours used across his company.The task eats up his available work hours and prevents him from doing other jobs he needs to do.What technology could take over this task and free up his time for more productive work?


A) Chatbot
B) Internet of Things (IoT)
C) Robotic process automation (RPA)
D) Data analytics

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

JavaScript likely controls which of the following elements on a webpage


A) A navigation bar
B) A slide show
C) A copyright notice
D) A hyperlink to another website

E) None of the above
F) All of the above

Correct Answer

verifed

verified

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?


A) Wired network
B) Intranet
C) Extranet
D) Virtual private network

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 501 - 520 of 996

Related Exams

Show Answer