True or False: Authorization is what the user is allowed to see or do.
True
True or False: Permissions can be set on a folder, but not individual files.
False
True or False: An incremental backup backs up all data on your computer.
False
True or False: A 32-bit operating system can usually be run on a 64-bit processor but the reverse is not true.
True
Which is a disadvantage of Mac operating systems?
Poor security features.
Not much memory.
Too many different active versions.
Computers that run Mac OS can be expensive.
Computers that run Mac OS can be expensive.
Which is a privilege typically reserved for admin accounts only?
Install programs.
Create user accounts.
Create a private folder.
Change the theme and desktop background.
Create user accounts.
Which of the following will not increase your browsing speed?
storing and using cache
enabling client-side scripting
using proxy settings
using private browsing mode
using private browsing mode
Which of the following is a task for the processor?
Schedules backups and updates.
Translates between the operating system and the hardware.
Manages the antivirus software.
Determines how memory is used.
Determines how memory is used.
Which feature of a file system is responsible for keeping track of changes in the system?
Compression
Encryption
Permissions
Journaling
Journaling
Which OS is currently the most popular for desktops and laptops?
Microsoft Windows
Apple Macintosh
Linux
Penguin
Microsoft Windows
Which MacOS terminal shell command will display all of the processes that are currently running on your computer?
ps
sudo
cp
mv
ps
If you would like to ensure that your site history is not recorded, you can:
clear your cache.
open a window in private browsing mode.
enable client-side scripting.
change your proxy settings.
open a window in private browsing mode.
From the following choices, which would be the most important update to download?
Microsoft Word Update
Chrome Browser Update
Windows OS Update
Skype Application Update
Windows OS Update
Linux is an open source operating system. What does “open source” mean?
It means that it is free.
It means that anyone can view, copy and then change the source code.
It means that there are over 600 versions available.
It means that it comes with unlimited support.
It means that anyone can view, copy and then change the source code.
Which type of operating system is permanently programmed into a hardware device?
Embedded OS
Firmware
Mobile OS
Hypervisor
Firmware
You friend types pwd into the CLI and the following is displayed:
/Users/friend/Cyber
What can your friend type to switch into the pictures folder?
cd ..
cd pictures
cd karel/pictures
cd tracy/pictures
cd karel/pictures
Max pays a quarterly fee for a cloud storage account. Which describes this type of software?
Open-source, subscription
Open-source, one-time purchase
Proprietary, subscription
Proprietary, one-time purchase
Proprietary, subscription
Which type of software license allows a predetermined number of people to use the account at the same time?
Single use license
Group license
Site license
Concurrent license
Concurrent license
Which of the following is most commonly considered a mobile OS?
Apple Macintosh
Android
Microsoft Windows
Linux
Android
Which of the following is a task that the operating system is NOT responsible for?
Manages hardware such as a mouse.
Keeps track of files and folders.
Supplies power to peripherals such as a printer.
Secures the computer with user accounts and passwords.
Supplies power to peripherals such as a printer.
Which application delivery method is considered to be in a two-tier pattern in which the presentation is stored on your computer and the code and data are stored on a server?
Local Installation
Local Network Hosted
Cloud Hosted
n-tier
Local Network Hosted
Which of the following is a disadvantage of a single-platform application?
The performance of the application is not optimized for the platform.
There are more bugs and issues with the application.
There may be compatibility issues when a file is shared on the same platform.
Exposure of the application is limited.
Exposure of the application is limited.
Which instances are considered illegal hacking?
A. White hat hacking
B. Hacktivism
C. Penetration testing
D. Bug bounty program
E. Hacking just for fun
All choices shown are illegal.
B, C, D, and E
B and E
C, D, and E
B and E
Which website citation can be most trusted as a reliable and credible source?
Patel, Jonathan. Why HTML Frameworks are Not Good. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.com. Accessed 10 May 2020.
Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2003, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
Patel, Jonathan. HTML Frameworks are Amazing! Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
Anne Smith is creating a screen name for her video game account. To ensure personal safety, which is the best screen name choice of the following?
Her information is as follows:
Name: Anne Smith
Birthday: 12/13/2001
Address: 465 Marbury Lane, Chicago, IL 60603
ASmith2001
AnnieSGamer121301
AnneS60603
ASGamer12
ASChicago01
ASGamer12