Filters
Question type

Study Flashcards

When you access a secure website, what information does your browser use to verify that web server's identity and encryption information?


A) Password
B) Encryption key
C) Digital certificate
D) TIN (tax identification number)

Correct Answer

verifed

verified

Kori's department is learning how to use some new software.She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later.Which type of digital media is best suited to their needs?


A) Blog
B) Email
C) Podcasts
D) Wiki

Correct Answer

verifed

verified

What type of network sends signals through airwaves and usually does not require cables?


A) Wired network
B) Intranet
C) Wireless network
D) Virtual private network

Correct Answer

verifed

verified

Tori is traveling for a business conference and needs to order a computer part so it will arrive at her hotel before her presentation at the end of the week.To do this, she'll need to enter her credit card number over the hotel's wireless network.How can Tori protect her financial information?


A) Choose a wireless network that uses the hotel's name
B) Make sure the website she orders from is secure
C) Use a VPN connection
D) Use a coffee shop's wireless network instead

Correct Answer

verifed

verified

Which of the following can you run to find and remove unnecessary files?


A) task manager
B) search tool
C) disk cleanup utility
D) file optimizer

Correct Answer

verifed

verified

What type of program would have a class named Student with objects called fullTime and partTime?


A) machine language program
B) object-oriented program
C) markup language program
D) procedural language program

Correct Answer

verifed

verified

What does the operating system do if you try to save a file with the same name into the same folder?


A) It moves the new file to a different folder.
B) It overwrites the original file unless you add a number, date, or initials to differentiate the files.
C) It rejects the new file and places a temporary version in the Recycle Bin.
D) It saves the new file on the Clipboard until you paste it in a new location.

Correct Answer

verifed

verified

Which of the following is NOT a factor search engines consider when ranking search results?


A) How often the search term appears on the webpage
B) Design quality of the webpage
C) How long the webpage has been published
D) Number of other webpages that link to the page

Correct Answer

verifed

verified

Sean works for an organization that offers SaaS to a chain of boutiques.By getting data from the database, he has to prepare a list of instances when the billing transaction failed.Which of the following tasks does he need to do to prepare the report?


A) speech recognition
B) database
C) presentation
D) desktop publishing

Correct Answer

verifed

verified

Which of the following is typical content for a podcast?


A) phone calls
B) online chats
C) interactive seminars
D) radio shows

Correct Answer

verifed

verified

Danielle wants to record a voice-over to add to a presentation.Other than a microphone, what does Danielle need to record the audio?


A) audio codec
B) sound recorder software
C) special effects software
D) audio streaming software

Correct Answer

verifed

verified

If you want to use evidence found on computers, networks, and other devices to help solve crimes, then which of the following careers is a match for you?


A) Web analytics
B) Data scientist
C) Security specialist
D) Digital forensics

Correct Answer

verifed

verified

Ned wants to use a programming tool that includes a source code editor, debugger, and compiler.What type of software should Ned select?


A) integrated development environment (IDE)
B) code repository
C) 4GL development tool
D) cloud development

Correct Answer

verifed

verified

During the boot process, what does the processor do after the computer circuits receive power?


A) It begins to run the bootstrap program.
B) It loads all startup programs.
C) It loads the operating system into RAM.
D) It turns on all connected devices.

Correct Answer

verifed

verified

The text on Miranda's new website doesn't look right to her yet.She has a lot of Level 1 Headings, and wants to sub-divide the text into some Level 2 Headings as well.What coding needs to be edited?


A) CSS
B) HTML
C) HTTP
D) JavaScript

Correct Answer

verifed

verified

Sami is about to graduate with her IT degree and needs to post her resumé online to help with her job search.Which website should she use to post her qualifications?


A) Instagram
B) Google
C) Amazon
D) LinkedIn

Correct Answer

verifed

verified

What concerns are there about open source programs?


A) Programmers will add functionality and sell their versions.
B) Programmers will enhance the code faster than the computer hardware can keep up.
C) Programmers will hide the code enabling them to control and profit from the programs.
D) Programmers will add malicious code to damage a user's system.

Correct Answer

verifed

verified

Which property is assigned to a file by the operating system?


A) Name
B) Location
C) Type
D) Artist's Name

Correct Answer

verifed

verified

Reggie is having trouble signing into his email account at work.He picks up the phone to call someone in IT, and then checks the phone list to see who to call.Which IT area should Reggie call?


A) Operations
B) Information security
C) Help desk
D) Management

Correct Answer

verifed

verified

A country's lawmakers define __________ standards of conduct.


A) moral
B) legal
C) personal
D) ethical

Correct Answer

verifed

verified

Showing 561 - 580 of 996

Related Exams

Show Answer