A private IP address can be used to send data over the Internet.
a. True
b. False
a. True
To select the product that will best fit your needs when purchasing a new digital device, you should begin by _____.
a. selecting the platform for the device
b. considering how you plan to use your device
c. determining a reasonable budget
d. choosing the type of device to buy
b. considering how you plan to use your device
Emily would like to disable the added features she has installed on her Google Chrome browser temporarily, so she opens the settings menu and selects the _____ option.
a. Plugins
b. More tools
c. Bookmarks
d. Web Store
b. More tools
Marley loves her IoT thermostat, which allows her to adjust its temperature setting from an app on her smartphone. She maintains her home at a different temperature when traveling, and she realizes that would-be housebreakers could use this information to burgle her home in her absence. She should _____.
a. not worry because IoT devices are not vulnerable to security issues
b. check that her thermostat is using RFID or NFC and not Bluetooth technology
c. verify that her thermostat’s IoT network encrypts data when it is transmitted and stored
d. disable the sensors in her thermostat
c. verify that her thermostat’s IoT network encrypts data when it is transmitted and stored
When network protocols clean a corrupted signal, the process is called ______________.
a. error correction
b. UDP
c. handshaking
d. packet switching
a. error correction
A file with the .wav extension _____.
a. uses lossless compression
b. uses lossy compression
c. is supported in Web browsers without any plugins
d. will be smaller in size than files storing the same data in alternative formats
c. is supported in Web browsers without any plugins
Journee notices that her smartphone’s touchscreen is looking dirty and would like to safely clean it. She should _____.
a. remove the touchscreen’s oleophobic coating with a non-alcohol wipe
b. peel off her plastic screen protector and then wipe it gently with alcohol-based cleaner
c. have the screen replaced to avoid damage to the device
d. leave her plastic screen protector on the touchscreen and wipe it with a disinfecting wipe
d. leave her plastic screen protector on the touchscreen and wipe it with a disinfecting wipe
Which technology adds computer-generated vector objects to a view of the real world?
a. Augmented reality
b. Cylindrical projection
c. Virtual reality
d. Stereoscopy
a. Augmented reality
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?
a. mesh
b. star
c. bus
d. point-to-point
a. mesh
Arturo just spilled his bottled water all over his laptop. What would be the wisest action for Arturo to take first?
a. Take the laptop to a repair shop.
b. Towel dry the laptop.
c. Turn the laptop off.
d. Test the laptop to see if it is damaged.
c. Turn the laptop off.
Dreandrea scans the results of an Internet search, looking for links that lead to Web pages hosted by educational institutions because she feels that they are more trustworthy. Dreandrea is _____.
a. protecting herself from DNS spoofing by hackers
b. seeking Web links that end in either .com or .biz
c. checking the top-level domains for each domain name in the search results
d. comparing the domain name servers from which each search result originated
c. checking the top-level domains for each domain name in the search results
Which feature of device touchscreens is designed to repel the oils deposited by fingers that tap and swipe the screen?
a. Gorilla Glass
b. granular film
c. semiconductive inlays
d. oleophobic coating
d. oleophobic coating
Which DCE would you use if you wanted to extend a wired network by adding more ports?
a. hub
b. switch
c. bridge
d. repeater
a. hub
Riley wants to compress a group of Microsoft Word files into one unit that she can e-mail to a colleague at work from her Mac. She should begin by _____.
a. searching for files with a .zip extension
b. starting File Explorer and right-clicking the files
c. downloading compression codec software
d. opening Finder and selecting the files
d. opening Finder and selecting the files
Manipulating two-dimensional images to produce the illusion of three-dimensional depth is called ____________________.
a. pairing
b. stitching
c. stereoscopy
d. dimensionization
c. stereoscopy