ITE 115 Exam 2 Flashcards
99 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

Which of the following is a disadvantage of using cloud computing to share files?

  • Improved accessibility
  • Enhanced security features
  • Easier collaboration
  • The inability to access your files if you lose your Internet connection (correct)
  • Which of the following statements do opponents of net neutrality agree with?

  • ISPs should charge more for high-bandwidth connections (correct)
  • All Internet traffic should be treated equally
  • The Internet should remain a free service
  • Government regulation is necessary
  • To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

    <p>VPN</p> Signup and view all the answers

    As chief financial officer, how can you send the fourth quarter profit/loss spreadsheets to the president of the company without worrying about someone else accessing it?

    <p>Encrypt the data in the report.</p> Signup and view all the answers

    What internal device does a computer use to connect to a wired or a wireless network?

    <p>Network interface card.</p> Signup and view all the answers

    If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

    <p>Intranet.</p> Signup and view all the answers

    Which of the following describes an evil twin?

    <p>A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.</p> Signup and view all the answers

    Which of the following statements is true about public networks?

    <p>Many public networks are not secure</p> Signup and view all the answers

    What would a password manager allow you to do?

    <p>Create and store multiple strong passwords.</p> Signup and view all the answers

    Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

    <p>Enabling airplane mode</p> Signup and view all the answers

    Why is it not safe to connect to public Wi-Fi networks?

    <p>Because these networks are rarely protected.</p> Signup and view all the answers

    Which of the following types of websites typically provides the least security?

    <p>Social Media Sites</p> Signup and view all the answers

    Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

    <p>Pretexting</p> Signup and view all the answers

    How does discarding computers in a landfill affect the environment?

    <p>Lead and mercury in computer parts are seeping into the ground and water supply.</p> Signup and view all the answers

    You must keep your accumulated web history as long as you use the browser.

    <p>False</p> Signup and view all the answers

    How will you decide which browser security settings to allow and which ones to block?

    <p>I will need to review each browser security setting and use my best judgement.</p> Signup and view all the answers

    Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

    <p>data backup</p> Signup and view all the answers

    Without Emma knowing, what type of malware might she have downloaded to her computer?

    <p>Trojan</p> Signup and view all the answers

    _____ ensures that the person requesting access to a computer is not an imposter.

    <p>Authentication</p> Signup and view all the answers

    What is a first step to deter thieves from accessing your financial information?

    <p>Do not provide personal information over the phone or through email.</p> Signup and view all the answers

    How can an attacker execute malware through a script?

    <p>A script can run a series of instructions to download and run malware.</p> Signup and view all the answers

    You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

    <p>Naming your router something you'll remember, like your street address</p> Signup and view all the answers

    With more and more people using technology, what physical health diagnosis is on the rise?

    <p>repetitive strain injury</p> Signup and view all the answers

    You can monitor and protect your financial data in all of the following ways EXCEPT _____.

    <p>Storing financial information in an unsent email message</p> Signup and view all the answers

    How is a worm different from a Trojan?

    <p>A worm spreads through a network, whereas a Trojan hides inside another program.</p> Signup and view all the answers

    What is a digital certificate?

    <p>Technology used to verify a user's identity</p> Signup and view all the answers

    Based on Cassidy's actions, what systems do you think the hospital has in place to protect the patient medical records?

    <p>biometric</p> Signup and view all the answers

    Which of the following is the strongest password?

    <p>H@veAGr3atDaY!</p> Signup and view all the answers

    How does encryption work?

    <p>It scrambles the information until the key is used to unscramble it.</p> Signup and view all the answers

    Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

    <p>Ergonomics</p> Signup and view all the answers

    In which of the following situations is a digital certificate useful?

    <p>You are signing a rental lease.</p> Signup and view all the answers

    In terms of privacy, which of the following is a best practice?

    <p>One privacy best practice is to not carry your social security number in your wallet or write it on a check.</p> Signup and view all the answers

    How can you protect a computer from electrical spikes and surges?

    <p>Use a surge protector.</p> Signup and view all the answers

    The set of activities performed to build a program is called the _____.

    <p>software development life cycle (SDLC)</p> Signup and view all the answers

    Start programming before creating a proposal.

    <p>False</p> Signup and view all the answers

    In which category of software do Microsoft Office Word and Excel belong?

    <p>Productivity</p> Signup and view all the answers

    What type of program would have a class named Student with objects called fullTime and partTime?

    <p>object-oriented program</p> Signup and view all the answers

    Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

    <p>An uninstaller removes the program files and any associated entries in the system files.</p> Signup and view all the answers

    While starting an app, Ian received an error message indicating that the version was no longer supported. How can Ian resolve the issue?

    <p>Visit the manufacturer's website and install the latest updates for the app.</p> Signup and view all the answers

    What type of project development methodology should be adopted if the client's goals are evolving and they need to test the product as components are finished?

    <p>Agile development</p> Signup and view all the answers

    What laws or strategy are designed to prevent illegal distribution of movies, music, and other digital content?

    <p>Digital Rights Management</p> Signup and view all the answers

    What type of software should Ned select if he wants a programming tool that includes a source code editor, debugger, and compiler?

    <p>integrated development environment (IDE)</p> Signup and view all the answers

    What position should the project manager of a software development team advertise for someone to review every part of the software to ensure it works as intended?

    <p>Tester</p> Signup and view all the answers

    During which phase of the SDLC is software tested to make sure each function works as intended?

    <p>all phases</p> Signup and view all the answers

    What area of software development focuses on the user's reaction to and interaction with the software product?

    <p>User experience</p> Signup and view all the answers

    What tools could Russ use to troubleshoot the issue of incompatibility with a website?

    <p>Patch finders</p> Signup and view all the answers

    What type of security software prevents, detects, and removes malware that tries to collect personal information or change computer settings without your consent?

    <p>Antispyware</p> Signup and view all the answers

    What is the goal of a DevOps methodology?

    <p>DevOps ensures frequent releases of fixes and enhancements</p> Signup and view all the answers

    At what point are you responsible for following the terms in a software license agreement?

    <p>when you click or take another action to accept the terms</p> Signup and view all the answers

    Which of the following is an example of an object-oriented programming language?

    <p>Java</p> Signup and view all the answers

    What could be the reason a software development team has trouble understanding the program code and how it works?

    <p>incomplete documentation</p> Signup and view all the answers

    Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

    <p>wireframes</p> Signup and view all the answers

    Which software development method uses a linear, structured development cycle that completes each step before continuing to the next phase?

    <p>waterfall method</p> Signup and view all the answers

    Is it advisable to enable automatic updates on security software?

    <p>True</p> Signup and view all the answers

    What happened to the app when Meredith was using a spreadsheet app and it stopped responding suddenly?

    <p>a crash</p> Signup and view all the answers

    _____ is the process of creating programs and apps from the idea stage to distribution to users.

    <p>Acquiring trademarks, copyrights and developing license agreements with the help of attorney is the first step before selling and marketing the products.</p> Signup and view all the answers

    _____ is the process of setting up a program or app to work with your computer, mobile device, and other hardware.

    <p>Installation</p> Signup and view all the answers

    What do you call the rules each programming language has for writing instructions?

    <p>syntax</p> Signup and view all the answers

    What techniques could be used to define who can use a banking app and what actions they can perform?

    <p>Require users to identify themselves using biometrics or passwords.</p> Signup and view all the answers

    Which of the following sources is typically safe for purchasing a note-taking app for her iPhone?

    <p>App Store for iOS</p> Signup and view all the answers

    Which of the following is a common copyright infringement that involves illegally copying software, movies, music, and other digital materials?

    <p>Piracy</p> Signup and view all the answers

    Which type of software is copyrighted and provided at no cost, though the developer retains all rights to the program?

    <p>Freeware</p> Signup and view all the answers

    _____ are new releases of an app and may require an additional fee before you can install them.

    <p>Upgrades</p> Signup and view all the answers

    Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?

    <p>Interpreters</p> Signup and view all the answers

    File transfer programs belong in what software category?

    <p>Both email and file transfer tools belong to the communications category.</p> Signup and view all the answers

    Which type of software is copyrighted and distributed for free for a trial period, and then requires you to send payment to continue using the program?

    <p>Shareware</p> Signup and view all the answers

    Which of the following programming languages adds interactivity to websites?

    <p>JavaScript</p> Signup and view all the answers

    _____ are tools that track the memory usage, status, and errors of currently running software.

    <p>Process managers</p> Signup and view all the answers

    An growing organization needs to provide software to all of its current and future employees. Which of the following should the organization purchase?

    <p>Site licenses are best suited for organizations to provide access to multiple users, in different ways.</p> Signup and view all the answers

    What kind of software products can you download from the Internet without being subjected to copyright restrictions?

    <p>Public domain software</p> Signup and view all the answers

    What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?

    <p>Firewall</p> Signup and view all the answers

    Which of the following tools translates the source code of a procedural program into binary code?

    <p>compiler</p> Signup and view all the answers

    Che contracted with a software development team to create a program for his company. He wants to review the budget and schedule for the project every week. Which project team member should he contact for this information?

    <p>project manager</p> Signup and view all the answers

    Which of the following does a software license usually specify?

    <p>number of people authorized to use the software</p> Signup and view all the answers

    Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results. Which of the following types of tools could help her in this scenario?

    <p>Restorers</p> Signup and view all the answers

    What defines the behavior of an object in object-oriented programming?

    <p>Method</p> Signup and view all the answers

    Which commonly used programming language is used to manage, access, and search for database content?

    <p>SQL</p> Signup and view all the answers

    Users of a new chat app reported many errors and bugs. What should the app developers release to solve the problems?

    <p>Service pack</p> Signup and view all the answers

    _____ is designed to prevent illegal distribution of movies, music, and other digital content, including programs and apps.

    <p>digital rights management</p> Signup and view all the answers

    What can you do to make sure you are not contributing to software piracy?

    <p>Buy software only from legitimate resellers or directly from the manufacturer.</p> Signup and view all the answers

    During which phase of the SDLC does an app receive necessary maintenance, such as fixing errors or monitoring performance?

    <p>Support and security phase</p> Signup and view all the answers

    Which type of programming language provides a graphical environment where the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code?

    <p>Fourth generation language</p> Signup and view all the answers

    In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

    <p>Analysis phase</p> Signup and view all the answers

    While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. Which of the following networks should Georgia connect to?

    <p>My Verizon VPN</p> Signup and view all the answers

    To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

    <p>firewall</p> Signup and view all the answers

    Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

    <p>mobile hotspot</p> Signup and view all the answers

    What would indicate that an email from what appeared to be his bank was actually a phishing attempt?

    <p>It contained typos and other grammatical errors.</p> Signup and view all the answers

    When using encryption from your home computer, how would you configure the router?

    <p>You can specify the type of encryption, as well as the desired wireless network key, through the wireless router's configuration utility that is often accessible using a web browser.</p> Signup and view all the answers

    Devices on a _____ area network are connected via Bluetooth.

    <p>personal</p> Signup and view all the answers

    What type of network sends signals through airwaves and usually does not require cables?

    <p>Wireless network</p> Signup and view all the answers

    As the new manager at your local grocery store, what type of network should you use to allow outside vendors and suppliers to review current inventory records and adjust recurring shipment orders?

    <p>Extranet</p> Signup and view all the answers

    Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

    <p>protocol</p> Signup and view all the answers

    You are dropping your friend back home after a night at the movies. How is your friend able to turn on the indoor lights in her home from the car using an app on her phone?

    <p>She has a home network with smart home devices.</p> Signup and view all the answers

    Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

    <p>Bluetooth</p> Signup and view all the answers

    Which of the following network standards applies to cellular networks?

    <p>LTE</p> Signup and view all the answers

    What hardware is essential to creating a home Wi-Fi network?

    <p>Router</p> Signup and view all the answers

    Which of the following could indicate a DoS attack on your company server?

    <p>Customers cannot view the website on their device because the page will not load.</p> Signup and view all the answers

    What does a DSL modem use to send and receive digital data?

    <p>Telephone lines</p> Signup and view all the answers

    Study Notes

    Password Managers and Security

    • Password managers help create and store multiple strong passwords for different accounts.
    • A common feature of stolen phone recovery includes taking a photo of the thief after failed passcode attempts.
    • Public Wi-Fi networks are usually unprotected and can expose personal data to security risks.

    Identity Theft and Digital Threats

    • Social media sites generally provide the least security compared to other types of websites.
    • Some forms of identity theft involve legitimate-seeming requests for personal information, which are not classified as phishing.
    • Discarded computers can harm the environment by leaking toxic substances like lead and mercury.

    Browser and Data Security

    • It is false that users must keep web history while continuously using a browser; they can manage or delete it.
    • Users need to assess browser security settings to determine what permissions to allow or block.
    • A data backup is defined as the process of copying files from a hard drive to a remote location.

    Malware and Cybersecurity

    • Trojans often disguise themselves as legitimate software to infiltrate systems without user knowledge.
    • Authentication processes confirm a user's identity before granting access to systems.
    • To deter thieves, personal information should not be shared via phone or email.

    Software Development and Programming

    • The software development life cycle (SDLC) encompasses all phases from design to distribution, with testing happening throughout.
    • Agile development is suited for projects where flexibility and frequent testing are key requirements.
    • Object-oriented programming focuses on objects, with the behavior defined by methods.

    Digital Certificates and Privacy

    • Digital certificates verify a user's identity, enhancing online security.
    • Best practices for privacy include avoiding carrying sensitive information, such as social security numbers, in readily accessible formats.

    Financial and Health Data Protection

    • Safeguarding financial data involves more than just secure storage; strategies include rejecting unencrypted emails for sensitive information.
    • Repetitive strain injuries are becoming more common due to increased technology use.

    Network Security and Management

    • Wireless networks transmit signals without cables, but unsecure connections can put data at risk.
    • Firewalls act as barriers to protect computers from unauthorized access and network attacks.
    • VPNs (Virtual Private Networks) offer enhanced security when accessing public networks.
    • Digital rights management prevents unauthorized distribution of digital content, including software, music, and movies.
    • Software licenses define usage rights, including the number of users allowed access and conditions for use.

    Network Types and Configuration

    • Personal area networks (PAN) use Bluetooth for short-range connections while intranets are suitable for internal communication within organizations.
    • Routers are essential for establishing home Wi-Fi networks, enabling multiple devices to connect to the Internet.

    Updates and Maintenance

    • Automatic updates for software, particularly security applications, are crucial for preventing malware threats.
    • Service packs and patches can fix bugs and improve performance in software applications.

    General Security Awareness

    • Phishing attempts often have telltale signs like typos or odd grammar.
    • Knowing how to recognize an "evil twin" network—fraudulent Wi-Fi designed to capture personal information—helps ensure safer online browsing.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards for ITE 115 Exam 2. Covering essential topics like password management and security features for mobile devices, these cards will help reinforce your understanding of key concepts. Perfect for exam preparation or review sessions.

    More Like This

    Use Quizgecko on...
    Browser
    Browser