What is a dead link?
"what is"
a hyperlink when clicked sends website visitor to a page or resource that does not exist on the server
What is TCP/IP?
"what is"
Protocol software used to communicate with the internet.
What is "lossy compression?"
"what is"
Some information when decompressing files can be permanently deleted.
What is true about copyleft license?
Software that is distributed with a copyleft license is in public domain meaning you can modify the software as desired specifically to meet your company's needs.
Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?
"what is"
Hash encryption
Why should you avoid typing email messages in all Capital letters?
"what is
"Because using all capital letters in a letter connotes shouting or anger.
What is ISP?
"What is"
Internet Service Provider
What is lossless Compression?
"what is"
All original data can be recovered when the file is decompressed.
What is an open source license?
"What is"
They enable users to modify and redistribute software source code without restrictions.
Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?
"what is"
Before starting a project, an IT project manager will be required to justify the project's benefits relative to its costs.
What protocol is required for text messaging?
"What is
"SMS-Short Message Services
What improves the speed of your browser b/c it allows you to view previously accessed webpages w/o having requested them from the server again.
"what is"
The Browser Cache
What is the purpose of a boolean operators?
"what is"
To narrow search results by including or excluding words or phrases.
Employers can monitor there employees' email messages sent to and from the company network because:
"what is"
all information carried by the company's communication system is company property. Which means it's there network and they make the rules.
Brea opened an email attachment and it launches a virus. Even after running anti-virus software, the damage is extensive and she will have to reformat her hard drive. Which step, if she had taken it prior to being attacked, would have reduced the impact to her productivity?
"what is"
Performing regularly scheduled backups so that she can reload all files if lost or damaged
What are some activities conducted by a PC repairman?
"what are"
Install, modify and repair personal computer software components and install software programs.
Your mom sent you a message with a link to a college information page that you find useful. You want to be able to find this same page in the future from you desktop computer, or from your mobile device when you are not at your desk. Which is the best way to do this?
"what is"
Add the link to a cloud based book mark service such as google bookmarks.Which is the most important reason you should properly cite information that you obtain for an internet search?
"What is"
To avoid plagiarizing someone else's work.
What is a software patent? And give
an example
"what is"
A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention
A software patent is a set of exclusive rights granted to an individual or company that claims to have invented a unique procedure or feature, and then seeks to protect that invention. Once the uniqueness of the invention is proven to a particular patent office, the idea can be used only under license from the patent holder. Generally, if an individual or company wants to use a patented technology, that party will have to pay a royalty to the patent holder.
medical records database
Which term is used to describe the process that converts data into an unreadable form of text?
"what is"
Encryption
What activities would most likely be conducted by a help desk technician?
"what are"
Diagnose and resolve technical hardware and software problems.
Bob opened an email attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?
"what is"
Turn off his computer and reboot from a clean system disk because if a virus is active in memory and you cannot run antivirus, the next step is to turn off your computer and reboot from a known, clean system disk.
You are hosting a lunch meeting at a local restaurant for 15 of your roving salespeople. An hour before meeting time, the restaurant calls to tell you that the party room will not be available for at least an hour later than scheduled. You call another restaurant in the area, which can make its party room available in one hour for your lunch meeting. You make a reservation with the new restaurant for the same time and cancel the other. What is the best way to alert each salesperson about the new restaurant location?
"what is"
Send a text message with the new restaurant location to the mobile phones of all the salespeople.
Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. What is her best course of action?
She should send a brief text message to the customer requesting that he send his complaints via email, so that further inappropriate communication will be well documented.
Monty has been searching online for a rare wine vintage. He finally finds it on the Rare Vintage Website, which he has recently heard about from friends. The site is well designed and offers some good deals on hard-to-find wines. As Monty navigates through the site and eventually gets to the checkout process, he reaches a checkout page with an URL of http://vintagewines.payment requesting his payment and credit card information as well as mailing information:
Why wouldn't he enter his credit card information at checkout?
"what is"
Because the URL does not use SSL/TLS encryption and therefore any information Monty enters would not be secure.