Which of the following statements about macOS is true?
a. macOS has a reputation for being reliable but difficult to use.
b. More viruses are designed to target macOS than Windows.
c. The OS kernel of macOS is based on UNIX.
d. macOS’s security foundation was inherited from Linux.
c. The OS kernel of macOS is based on UNIX.
Which type of exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites?
a. malware
b. rootkit
c. spear phishing
d. keylogger
c. spear phishing
Cassandra is organizing her application launch icons by category. Which icon or set of icons does not belong in the productivity software category?
a. Microsoft Office
b. LibreOffice
c. iWork
d. Parallels Desktop
d. Parallels Desktop
The iOS operating system is found on which device?
a. Android tablet
b. iPhone
c. Macbook Pro
d. Macbook Air
b. iPhone
Like books and movies, software is a type of intellectual property.
a. True
b. False
a. True
Microsoft Windows is used exclusively on desktop systems.
a. True
b. False
b. False
33. Spoofing an address to redirect LAN traffic through a secondary, malicious device by altering the LAN’s routing table is known as _____ address spoofing.
a. IP
b. email
c. ARP
d. DNS
c. ARP
In a word processor application, whether your text flows from line to line by automatically moving words down to the next line as you reach the right margin is determined by a feature called _____.
a. search and replace
b. word wrap
c. a readability formula
d. document formatting
b. word wrap
Lynn’s smartphone is in Airplane mode during a long flight. Lynn attempts to use a restaurant search app, but it doesn’t operate properly—she can’t view any restaurant information. However, when she opens her e-book app, she is able to resume reading the novel she started in the terminal with no problems. This suggests that _____.
a. the restaurant search app is a hybrid app, whereas the e-book app is a mobile app
b. the restaurant search app is a mobile app, whereas the e-book app is a Web app
c. the restaurant search app is a Web app, whereas the e-book app is a hybrid app
d. the restaurant search app has been downloaded, whereas the e-book app runs in a browser
a. the restaurant search app is a hybrid app, whereas the e-book app is a mobile app
Harold, a Java programmer, downloads an open-source timesheet application under the General Public License (GPL). He modifies the app’s source code to add some new features that he finds especially handy. He would like to make his enhanced version of the app available to other users. Harold _____.
a. can legally market the modified timesheet app for under a commercial software license
b. must distribute the modified timesheet app as either public domain software or freeware
c. must distribute the modified timesheet app under the General Public License
d. cannot share his modified timesheet app because of the GPL’s distribution restrictions
c. must distribute the modified timesheet app under the General Public License
Which of the following tasks is part of the process for installing software on a PC?
a. Scan the hard drive for registry errors.
b. Defragment the hard drive.
c. Add the device to the network.
d. Allow the setup program to run.
d. Allow the setup program to run.
Which type of attack can be used to flood a Web site with so much traffic that it can no longer provide its intended service?
a. DDoS
b. AES service
c. floodping
d. on-access scan
a. DDoS
To name files following cross-platform best practices, you should _____.
a. include symbols
b. restrict file name length to 20 characters
c. replace spaces with underscores
d. avoid using reserved words such as Aux or Nul
d. avoid using reserved words such as Aux or Nul
Janelle would like to install the free BBC News mobile app on her iPhone. What should she do?
a. She does not need to install it because she will access it with a browser.
b. She should visit the Google Play Store and search for the app.
c. She should select the app at the app store and touch the Download button.
d. She should jailbreak her iPhone since the app is available from the official app store.
c. She should select the app at the app store and touch the Download button.
Facebook’s stylized “f” and Twitter’s little blue bird, which are used to distinguish these companies and their goods from those of other companies, are examples of _____.
Trademarks.
In a device with multi-core processors or multiple processors, an operating system supports a division of labor among all the processing units with its _____ capability.
a. multithreading
b. multiprocessing
c. multitasking
d. buffering
b. multiprocessing
Antivirus software can detect malware by analyzing the characteristics and behavior of suspicious files using techniques called _____.
a. heuristic analysis
b. virus signatures
c. side-loading
d. port scans
a. heuristic analysis
Romanius conducts a photo shoot late in the afternoon for a client. When he examines the photographs on his laptop later, he discovers that the sunlight has made the foreground objects appear too dark in some of them. Romanius can remediate this problem by _____.
a. adjusting the image using noise reduction software
b. inpainting the darkened areas of the image in his image editor
c. sliding the levels bar in his image editor’s histogram tool
d. performing alpha blending to lighten the foreground areas
c. sliding the levels bar in his image editor’s histogram tool
When you use a password manager to store passwords locally, this means that _____.
a. you must plug in a USB device to access or modify your passwords
b. a thief who steals your laptop can find no trace of the stored passwords
c. your passwords are more attractive to hackers than when they are stored in the cloud
d. your passwords will be tied to the device on which they are created
d. your passwords will be tied to the device on which they are created
Among the common pricing models used for software, the free and freemium pricing plans allow long-term use of the software at no charge, whereas the one-time payment, subscription, and trial plans require payment for long-term use.
a. True
b. False
a. True
The feature of a spreadsheet worksheet that works behind the scenes to tell the microprocessor how to use the contents of cells in calculations is a _____.
a. record
b. label
c. value
d. formula
d. formula
Roy works for law enforcement and is investigating a criminal organization. What technology can he use to monitor text messages and data streams sent from mobile devices in a specific area?
a. IMSI catcher
b. rootkit
c. botnet
d. port scanner
a. IMSI (international mobile subscriber identity) catcher
When you empty the Recycle Bin on your computer, what happens?
a. Data in the sectors where deleted files were stored is removed.
b. The sectors that held the deleted files are overwritten with zeros.
c. The index file marks the sectors as available for storing new data.
d. The data is shredded so it can never be recovered.
c. The index file marks the sectors as available for storing new data.
Chrome OS is considered a thin client because _____.
a. it depends substantially on processing and storage provided by a remote computer
b. its kernel is based on an open source operating system
c. it is distributed under a forked open source software license
d. it provides security equivalent to that provided by a browser or a cloud storage service
a. it depends substantially on processing and storage provided by a remote computer
Can you legally market modified GPL software under a commercial license?
No, it must remain GPL-compliant.