Navigation » List of Schools » Northern Virginia Community College » Information Technology » ITE 115 – Introduction to Computer Applications and Concepts » Spring 2022 » Module 6 Quiz
Below are the questions for the exam with the choices of answers:
Question #1
A Cyberbullying
B Ergonomics
C Repetitive strain
D Technology addiction
Question #2
A The computer parts quickly decay and become organic material
B Copper on circuit boards is creating fire hazards.
C Lead and mercury in computer parts are seeping into the ground and water supply.
D Data miners are digging up landfills looking for gold and platinum.
Question #3
A alarm
B uninterruptible data supply
C data backup
D private copy
Question #4
A technology addiction
B cyberstalking
C repetitive strain injury
D cyberbullying
Question #5
A social media sites
B private business sites
C online banking sites
D online shopping sites
Question #6
A Saving your personal information as an email draft
B Keeping your Social Security number hidden in a locked box in your home
C Posting your location on social media
D Throwing away old bank statements that are more than three months old
Question #7
A Use an uninterruptible power supply.
B Use a surge protector.
C Unplug the computer when it is not in use.
D Use a cable lock.
Question #8
A Technology used to verify a user’s identity
B The key to unlock information into a readable format
C A growing trend used to combine multiple types of authentication
D The process of scrambling information so that it cannot be read
Question #9
A A worm spreads through a network, whereas a Trojan hides inside another program.
B A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
C A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
D A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.
Question #10
A colorbluesky
B H@veAGr3atDaY!!
C Test1test2test3
D Welcome123
Question #11
A The current location of his phone can be pinpointed on a map through the phone’s GPS.
B He can use remote tracking to retrace the thief’s steps.
C His phone can generate an alarm even if it is on mute.
D If the thief enters an incorrect passcode three times, the phone takes a picture of the thief and emails it to Marcus.
Question #12
A Querying unfamiliar purchases found on your bank statements.
B Being cautious about what information you post on social networking sites.
C Shredding financial documents before you discard them.
D Storing financial information in an unsent email message.
Question #13
A You are registering for an event.
B You are signing a rental lease.
C You are researching a topic for an assignment.
D You are emailing a friend.
Question #14
A pretexting
B research spoofing
C cyberstalking
D phishing
Question #15
A Digital certificates
B Biometrics
C Encryption
D Two factor authentication
Question #16
A Authentication
B Automatic encoding
C Data mining
D Encryption
Question #17
A naming your router something you’ll remember, like your street address
B turning off remote management to the device
C utilizing guest access when needed and turning it off when guests leave
D creating a strong password to access the router
Question #18
A A script can retrieve and store your personal information, such as your online buying habits.
B A script can send you a fraudulent email message requesting confidential information.
C A script searches the Internet for personal information about you.
D A script can run a series of instructions to download and run malware.
Question #19
A If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.
B If the browser security setting is on a website sent from a friend, I always accept the setting.
C If the browser security setting has been mentioned on several friends’ timelines on Facebook then it must be a good one, so I should do change it on my computer too.
D I will need to review each browser security setting and use my best judgement.
Question #20
A Review financial and billing statements each month carefully.
B Do not provide personal information over the phone or through email.
C Follow up on calls regarding purchases that were not made.
D Be alert to signs that may indicate unusual activity in an account.
Question #21
A You can allow or block scripts on specific websites.
B You can accept or deny cookies.
C You must keep your accumulated web history as long as you use the browser.
D You can choose which sites run pop-ups.
Question #22
A spam
B worm
C ransomware
D Trojan
Question #23
A Create and store multiple strong passwords.
B Prevent you from using birthdays in your passwords.
C Test your memorization skills.
D Make sure you do not repeat passwords on similar accounts.
Question #24
A It scrambles the information until the key is used to unscramble it.
B It is a key that you insert into your computer to unlock your saved files.
C It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.
D It is what happens when you download attachments from your email.
Question #25
A Because these networks are rarely protected
B Because they do not allow Internet access
C Because the connection is often too slow
D Because it can weaken your own Wi-Fi wireless router