No student devices needed. Know more
35 questions
a collection of unprocessed items, including text, numbers, images, audio, and video
data
information
output
byte
a __ key is one that switches between two states each time a user presses the key
function
toggle
command
control
a __ key is a special key programmed to issue commands to a computer
function
toggle
command
control
a ______ keyboard has a design that reduces the chance of RSIs.
full-service
expandable
compact
ergonomic
5. A graphics tablet also is called a
digitilizer
illustration pad
art input device
illustrator
Motion input sometimes is called ______ recognition
Body
Movement
Gesture
Simulated
______ transforms one video image into another image over the course of several frames of video.
Transfiguration
Morphing
Contortion
Mutation
Original forms of data, such as time cards or order forms, are known as ______ documents
Input
Information
Scanable
Source
A(n) ______ is a light-sensing input device that reads printed text and graphics and then translates the
results into a form the computer can process
Inputter
Digitizer
Scanner
Recognizer
The banking industry almost exclusively uses ______ for check processing
QR codes
MICR
Magnetic Strips
OCR
12. PIN stands for personal identification ______.
Number
Name
Network
Note
VoIP is a type of ______ output
Audio
Video
Graphic
Text
Badges, cards, smart cards, and keys are examples of _____ objects
Wearable
Carried
Possesed
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain
action
Control
Firewall
Check
Lock
An iris recognition system uses technology to read patterns in the user's ______
Eye
Fingerprints
Signature
Face
Which of the following best describes a back door?
A file recovery method that circumvents the computer or mobile device's network
An invisible image on a website that, if accidentally clicked, downloads a virus to the user's
computer or mobile device
A hardware device that reinforces security settings on a computer or network
. A program or set of instructions that allows user to bypass security controls when accessing
a program, computer, or network
You realize your computer has been infected with malware. It seems as if someone is controlling
your computer from a remote location. What type of malware might you have?
Worm
Rootkit
Trojan Horse
Virus
You realize your computer has been infected with malware. The program has been copying itself
repeatedly, using up resources. What type of malware might you have?
worm
rootkit
trojan horse
virus
Which of the following is NOT a recommended practice for gaming safety?
Avoid games requiring passwords to be saved to an online account on a smartphone.
Look for games that use ActiveX or JavaScript, as these are always safe.
Check the developer of any software or apps to be certain it is legitimate.
Use a firewall when using multiplayer online games.
What should an AUP specify?
The acceptable use of technology by employees for personal reasons.
The guidelines for using licensed software.
A list of IP addresses known to be safe.
A user's personal authentication methods.
Which of the following is NOT true about CAPTCHAs?
A CAPTCHA is an image containing a series of distorted characters.
CAPTCHAs were developed to verify input is coming from computer programs, not
humans.
The CAPTCHA text can be read aloud for visually impaired users.
You have the option of generating a new CAPTCHA.
Which of the following is NOT true about two-step verification?
Another term for it is two-factor verification.
When a system sends an authentication code, it typically does not expire.
If you sign in from a device you use frequently, you can elect to bypass two-step
verification.
ATMs usually require a two-step verification.
If the web address of a website begins with https instead of http, what do you know about the
website?
It likely is spoofed
It is secure
It provides security services and information
It contains encrypted data
Which of the following best describes the function of a TPS?
A TPS captures and processes data from business activities.
A TPS generates information for problem solving.
A TPS organizes documents using metadata.
A TPS enables publishing of reports.
An organization creates a disaster recovery plan. Which part would include return procedures (who
can enter the facility, and what actions they are to perform)?
emergency plan
recovery plan
restoration plan
building plan
Which of the following best describes the function of an MIS?
An MIS captures and processes data from business activities.
An MIS generates information for problem solving.
An MIS organizes documents using metadata.
An MIS publishes documents to the web.
Which of the following is NOT true about DSSs?
DSS stands for decision support system
Some DSSs are available to everyone on the web
Some DSSs include their own query language
A DSS uses data only from internal sources
Which of the following best describes the users of a VPN?
Web designers and others who need to create and share web content offline
Employees who work in other locations or who telecommute
Telecommunications analysts
Digital forensic examiners
29. Which of the following is NOT true about use of unlicensed software?
Software publishers own the copyright to their products
Pirated software denies the publishers revenue
In most cases, the software owner can make as many copies as desired
Thirty-nine percent of software has been installed without proper licensing
30. Which of the following best describes the role of a CRM specialist?
Directs and implements an organization's use of Internet and social media marketing
Writes and develops web content and layouts so that they will appear at the beginning of
search results
Integrates apps and data to provide an application that manages a company's relationships
with customers
Plans and designs software and apps that consider a user's reaction to a program and its
interface
Which of the following best describes the role of an SEO specialist?
Directs and implements an organization's use of Internet and social media marketing.
Writes and develops web content and layouts so that they will appear at the beginning of
search results
Integrates apps and data to provide an application that manages a company's relationships
with customers.
Plans and designs software and apps that consider a user's reaction to a program and its
interface
Which of the following best describes the role of a UX specialist?
Directs and implements an organization's use of Internet and social media marketing
Writes and develops web content and layouts so that they will appear at the beginning of
search results
Integrates apps and data to provide an application that manages a company's relationships
with customers
Plans and designs software and apps that consider a user's reaction to a program and its
interface
Which of the following is NOT true about technology certifications?
A certification demonstrated your knowledge in a specific area to employers or potential
employers
Authorized testing centers provide most certification exams for a fee
If you do not pass an exam, you may have to pay the fee again to retake it
Most certification programs require academic coursework
Which of the following best describes jailbreaking?
When a hacker accesses a web database illegally
When a hacker identifies a network security threat and requests payment to solve it
When a user makes unauthorized modifications to a device's operating system
When a system receives a virus or hacking threat unless a fee is paid
Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs.
Specialist
Expert
Professional
Administrator
Explore all questions with a free account