Filters
Question type

Study Flashcards

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?


A) Because insiders often like to cause disruption and panic among citizens
B) Because insiders sometimes create threats after incidents at their places of employment
C) Because insiders like to breach security to make a political statement
D) Because insiders need practice breaking into networks

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A modem can also function as what other piece of hardware?


A) A hub
B) A switch
C) A router
D) A network interface card

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

_____ means having a current knowledge and understanding of computers, mobile devices, the web, and related technologies.


A) Digital divide
B) Artificial intelligence
C) Digital literacy
D) Smart computing

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Eneida is ready to post her website files to her host's servers. What can she use to upload the files across the Internet?


A) HTML
B) HTTP
C) Email
D) FTP

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored?


A) Her USB flash drive
B) The library's computer
C) A remote server
D) Her smartphone

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Output methods include speakers, headphones, and interactive whiteboards.

A) True
B) False

Correct Answer

verifed

verified

Most video editing software shows the video as a timeline with separate tracks for video and sound.

A) True
B) False

Correct Answer

verifed

verified

Digital information processed into a useful form is called _____.


A) spooling
B) output
C) input
D) default

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Each slide in a presentation has a layout that includes placeholders for certain types of content.

A) True
B) False

Correct Answer

verifed

verified

Lucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for marketing purposes. Which of the following apps can she use to mix and match the clips?


A) Google photos
B) Adobe Premiere Clip
C) Audacity
D) Adobe Photoshop

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?


A) robotics
B) embedded sensors
C) virtual reality (VR)
D) GPS

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is a valid app source for Android users? Android


A) Apple App Store
B) Google Play Store
C) Microsoft Store
D) Android App Store

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Jayla has added a map feature to her website so customers can find her store more easily. However, she wants to make the map able to zoom so customers can zoom in or out as needed. What code does she need to adjust?


A) HTML
B) CSS
C) HTTP
D) JavaScript

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is NOT an example of digital media?


A) A podcast played on a smartphone
B) A video chat played on a laptop
C) An animated game played on a game console
D) A song played on an electric guitar

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

You can avoid electronic waste by replacing devices every time a new version comes out.

A) True
B) False

Correct Answer

verifed

verified

_____ ensures that the person requesting access to a computer is not an imposter.


A) Data mining
B) Authentication
C) Encryption
D) Automatic encoding

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Liam is troubleshooting the code for some text on his website. What's wrong with this line? About Our Company


A) The wrong symbols are used for the tag.
B) The closing tag is missing.
C) The wrong tag is used.
D) Nothing is wrong; the HTML code should work fine.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The volume of Big Data generated over time is typically measured in terms of ____________.


A) kilobytes
B) characters
C) terabytes
D) records

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the statements about B2B e-commerce is correct?


A) Examples of B2B services are advertising, technical support, and training.
B) The end consumer is the decision-maker in the transactions.
C) B2B websites offer fixed, consistent pricing for all purchases.
D) Shopping websites use B2B e-commerce.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Kang is a real estate broker and needs to buy software for five people in his office. What type of license agreement should he look for?


A) End user license agreement
B) Site license
C) Multiple-user license agreement
D) Public domain

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 1042

Related Exams

Show Answer