IT Practice Exam Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By StudySmartS
S
StudySmartS
Community Contributor
Quizzes Created: 1 | Total Attempts: 87
Questions: 46 | Attempts: 87

SettingsSettingsSettings
Database Quizzes & Trivia

This question is to help test your knownledge on content from Chapter 6 System Analysis to Chapter 14 Future of Computing in the textbook: Fundamental to Computing Third Edition by Kendell/Hunt.


Questions and Answers
  • 1. 

    A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A docking station is a device that allows a notebook PC to connect to various peripherals like a keyboard, mouse, and printer. It provides a convenient way to expand the functionality of a notebook by providing additional ports and connections. By connecting the notebook to the docking station, users can easily use their notebook as a desktop computer with all the necessary peripherals connected. Therefore, the statement "A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station" is true.

    Rate this question:

  • 2. 

    A map of a database is called a__________.

    • A.

      List

    • B.

      Data flow diagram

    • C.

      Topology

    • D.

      Schema

    Correct Answer
    D. Schema
    Explanation
    A map of a database is called a schema. A schema is a visual representation of the logical structure of a database, including tables, relationships between tables, and constraints. It provides a blueprint for how the data is organized and helps in understanding the overall design of the database.

    Rate this question:

  • 3. 

    A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. 

    • A.

      Computer virus

    • B.

      Trojan horse

    • C.

      Worm

    • D.

      All of the above

    Correct Answer
    C. Worm
    Explanation
    A worm is a type of program that is designed to replicate itself and spread across a computer network or system. Unlike viruses, worms do not require a host file or program to attach themselves to. They can independently move through a network, copying themselves and consuming resources as they go. This continuous replication and consumption of resources can lead to a slowdown or even a shutdown of the affected computer or network. Therefore, a worm fits the description provided in the question.

    Rate this question:

  • 4. 

    A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.

    • A.

      Quarantine

    • B.

      Firewall

    • C.

      Payload

    • D.

      Honeypot

    Correct Answer
    A. Quarantine
    Explanation
    A quarantine is a separate area of a hard disk that holds an infected file until the infection can be removed. This allows the infected file to be isolated from the rest of the system, preventing it from spreading and causing further damage. By placing the infected file in quarantine, it can be safely analyzed and cleaned without risking the integrity of the rest of the system.

    Rate this question:

  • 5. 

    An example of query criteria is:

    • A.

      Changing an integer field to a 0 decimal.

    • B.

      All records in which the valure in the score field is above 75.

    • C.

      Linking the Employee and Department tables.

    • D.

      All of the above are examples of query criteria.

    Correct Answer
    B. All records in which the valure in the score field is above 75.
    Explanation
    The given answer is correct because it accurately identifies that "All records in which the value in the score field is above 75" is an example of query criteria. Query criteria are conditions or requirements used to filter and retrieve specific data from a database. In this case, the criteria specify that only records with a score value above 75 should be included in the query results. This helps to narrow down the data and retrieve only the relevant information that meets the specified condition.

    Rate this question:

  • 6. 

    All tags in XHTML are lower case.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In XHTML, all tags must be written in lowercase. This is because XHTML is an XML-based language, and XML is case-sensitive. Therefore, using uppercase letters for tags in XHTML would result in invalid markup. To ensure proper syntax and adherence to standards, it is necessary to write all tags in lowercase in XHTML.

    Rate this question:

  • 7. 

    Encryption is a technique for scrambling documents so that they are unreadable if intercepted during transit.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Encryption is indeed a technique used to scramble documents or data in order to make them unreadable if intercepted during transit. It ensures the confidentiality and security of the information being transmitted, as only authorized parties with the decryption key can access and understand the encrypted content. This helps protect sensitive information from unauthorized access and maintain privacy and data integrity.

    Rate this question:

  • 8. 

    Computers small enough that several hundred of them could fit inside the space of a human cell are known as _____________.

    • A.

      Optical computers

    • B.

      Nanocomputers

    • C.

      Quantum computers

    • D.

      Molecular computers

    Correct Answer
    B. Nanocomputers
    Explanation
    Nanocomputers are the correct answer because they refer to computers that are small enough to fit inside a human cell. This term specifically denotes computers that are on the nanoscale, which is a scale of measurement that is one billionth of a meter. Nanocomputers utilize nanotechnology to create extremely small and powerful computing devices. These devices have the potential to revolutionize various fields, such as medicine and electronics, due to their compact size and high computational capabilities.

    Rate this question:

  • 9. 

    E-commerce enables many travelers to get travel information and purchase tickets without the services of travel agents. This is an example of a trend described as:

    • A.

      Hub hopping

    • B.

      Reintermediation

    • C.

      E-fallout

    • D.

      Disintermediation

    Correct Answer
    D. Disintermediation
    Explanation
    Disintermediation refers to the elimination of intermediaries in a supply chain, allowing consumers to directly access products or services. In the context of e-commerce, travelers can bypass travel agents and directly obtain travel information and purchase tickets online. This trend is facilitated by the internet and advancements in technology, enabling consumers to have more control and convenience in their travel arrangements.

    Rate this question:

  • 10. 

    Good user habits can help prevent physical injuries and discomfort due to the use of computers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Good user habits, such as maintaining proper posture, taking regular breaks, and using ergonomic equipment, can help prevent physical injuries and discomfort that can arise from prolonged computer use. By practicing these habits, individuals can minimize the risk of conditions like musculoskeletal disorders, eye strain, and repetitive strain injuries. Therefore, it is true that good user habits can help prevent physical injuries and discomfort associated with computer use.

    Rate this question:

  • 11. 

    HTML has a stricter syntax than XHTML.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    HTML does not have a stricter syntax than XHTML. In fact, XHTML has a stricter syntax compared to HTML. XHTML requires well-formed and valid markup, while HTML is more forgiving and allows for looser syntax. XHTML follows the rules of XML, requiring elements to be properly nested, attributes to be quoted, and self-closing tags for empty elements. HTML, on the other hand, allows for unclosed tags, unquoted attributes, and other deviations from strict XML rules. Therefore, the correct answer is False.

    Rate this question:

  • 12. 

    If a company needs to store data about its customers, employees, products, and orders in a way that will enable it to quickly process orders, answer questions about orders, and prepare reports, it should use a(n): 

    • A.

      File management system.

    • B.

      Database management system.

    • C.

      Expert system.

    • D.

      Neural network.

    Correct Answer
    B. Database management system.
    Explanation
    A database management system (DBMS) is the most suitable choice for a company that needs to store and efficiently process data about its customers, employees, products, and orders. Unlike a file management system, a DBMS provides a structured and organized approach to storing and retrieving data, allowing for faster processing of orders, answering questions about orders, and generating reports. Expert systems and neural networks are not specifically designed for data storage and processing, making them less appropriate for this scenario.

    Rate this question:

  • 13. 

    If you make a copy of a proprietary program and give it to a friend you are committing: 

    • A.

      Hacking

    • B.

      Salami shaving

    • C.

      Spoofing

    • D.

      Software piracy

    Correct Answer
    D. Software piracy
    Explanation
    If you make a copy of a proprietary program and give it to a friend, you are committing software piracy. Software piracy refers to the unauthorized copying, distribution, or use of copyrighted software without the permission of the owner. In this scenario, by making a copy of the proprietary program and sharing it with someone else, you are infringing on the copyright holder's rights and engaging in illegal activity.

    Rate this question:

  • 14. 

    In XHTML, the <img> element is an empty element that must include a space and a slash before its closing bracket in order to be well formed.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In XHTML, the element is considered an empty element, meaning it does not require a closing tag. However, in order to be well-formed, it must include a space and a slash before its closing bracket. This is known as a self-closing tag syntax and is used to indicate that the element does not have any content between the opening and closing tags. Therefore, the statement "True" is correct.

    Rate this question:

  • 15. 

    15. Many e-commerce sites use _____ to determine customer preferences.

    • A.

      Data checking

    • B.

      Data mining

    • C.

      Data sorting

    • D.

      Data serving

    Correct Answer
    B. Data mining
    Explanation
    E-commerce sites use data mining to determine customer preferences. Data mining involves analyzing large sets of data to discover patterns, trends, and insights that can be used to understand customer behavior and preferences. By using data mining techniques, e-commerce sites can gather valuable information about customers' purchasing habits, interests, and preferences, which can then be used to personalize the shopping experience, target marketing campaigns, and make data-driven business decisions.

    Rate this question:

  • 16. 

    Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program. 

    • A.

      Macros

    • B.

      Cookies

    • C.

      Logs

    • D.

      Spikes

    Correct Answer
    A. Macros
    Explanation
    Macros are sets of instructions that are saved within an application, such as a word processing or spreadsheet program. These instructions can be used to automate tasks or perform certain actions. However, some viruses can be hidden within macros, allowing them to execute malicious code when the macro is run. Therefore, it is important to be cautious when enabling macros, especially if they are from an untrusted source, to prevent potential malware infections.

    Rate this question:

  • 17. 

    The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.

    • A.

      Electronic Communications Privacy Act (ECPA)

    • B.

      Fair Credit Reporting Act

    • C.

      Computer Fraud and Abuse Act

    • D.

      Computer Matching and Priavcy Proctection Act

    Correct Answer
    A. Electronic Communications Privacy Act (ECPA)
    Explanation
    The correct answer is the Electronic Communications Privacy Act (ECPA). This act was passed in 1986 and it provides protection for electronic communications, including voice mail, similar to the protection that covers mail and telephone communications. The ECPA sets standards for government access to electronic communications, prohibits unauthorized interception of electronic communications, and establishes privacy protections for stored electronic communications.

    Rate this question:

  • 18. 

    The diamond shape in a program flow chart is used to represent a(n): 

    • A.

      Decision

    • B.

      Action to be taken

    • C.

      Beginging or end of a module

    • D.

      Input and output of data

    • E.

      Meeting point for several paths

    Correct Answer
    A. Decision
    Explanation
    The diamond shape in a program flow chart is used to represent a decision. This means that at that point in the program, a choice needs to be made between two or more paths. The decision could be based on a condition or a comparison, and the different paths represent the different actions or outcomes that result from that decision.

    Rate this question:

  • 19. 

    The nature of relationships can be examined further and quantified. This quantification is called _____________. 

    • A.

      Normalization

    • B.

      Cardinality

    • C.

      Batching

    • D.

      Warehousing

    Correct Answer
    B. Cardinality
    Explanation
    Cardinality refers to the quantification of the nature of relationships. It helps in determining the number of instances in one entity that are associated with the number of instances in another entity. In other words, it quantifies the relationship between two entities by defining the number of occurrences or instances of one entity that can be linked to the number of occurrences or instances of another entity.

    Rate this question:

  • 20. 

    The purpose of ergonomic keyboards is to:

    • A.

      Increase the speed with which workers can enter data.

    • B.

      Encrypt data as as it is sent from the keyboard to the CPU.

    • C.

      Reduce the occurrence of carpal tunnel syndrome.

    • D.

      Enter data in the languages that do not use the Roman alphabet.

    Correct Answer
    C. Reduce the occurrence of carpal tunnel syndrome.
    Explanation
    Ergonomic keyboards are designed to reduce the occurrence of carpal tunnel syndrome. Carpal tunnel syndrome is a condition that affects the wrist and hand, causing pain, numbness, and tingling due to pressure on the median nerve. Ergonomic keyboards are specifically designed to promote a more natural and comfortable hand and wrist position while typing, reducing strain and pressure on the wrists. This can help prevent the development or worsening of carpal tunnel syndrome in individuals who spend long hours typing on a keyboard.

    Rate this question:

  • 21. 

    The study and practice of using computing resources efficiently and with a worldly perspective is _________. 

    • A.

      Nanotechnology

    • B.

      Recycling

    • C.

      Disaster recovery

    • D.

      Green computing

    Correct Answer
    D. Green computing
    Explanation
    Green computing refers to the study and practice of using computing resources efficiently and with a worldly perspective. It involves designing, manufacturing, using, and disposing of computers and other electronic devices in an environmentally friendly manner. This includes reducing energy consumption, minimizing electronic waste, and promoting the use of renewable resources. Green computing aims to minimize the negative impact of technology on the environment and promote sustainability in the IT industry.

    Rate this question:

  • 22. 

    This English-like language was designed to make possible the easy manipulation of data. 

    • A.

      SQL

    • B.

      ERC

    • C.

      ERD

    • D.

      DBS

    Correct Answer
    A. SQL
    Explanation
    SQL stands for Structured Query Language and it is a programming language designed for managing and manipulating relational databases. It allows users to easily interact with databases by writing queries to retrieve, insert, update, and delete data. SQL is specifically designed to handle data manipulation tasks efficiently and effectively. Therefore, it is the correct answer for the given question as it is a language designed for easy data manipulation.

    Rate this question:

  • 23. 

    Three types of XHTML DTDs are: transitional, frameset, and strict. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because there are indeed three types of XHTML DTDs: transitional, frameset, and strict. These DTDs define the rules and structure for different types of XHTML documents. Transitional DTD allows the use of older HTML elements and attributes, frameset DTD is used for documents with frames, and strict DTD restricts the use of deprecated elements and attributes, promoting cleaner and more modern code.

    Rate this question:

  • 24. 

    To be able to resume operation after its computer system is damaged or destroyed, a company should:

    • A.

      Prepare a system requirements document.

    • B.

      Create a disaster-recovery plan.

    • C.

      Encrypt all transmitted data.

    • D.

      Require passwords for all employees.

    Correct Answer
    B. Create a disaster-recovery plan.
    Explanation
    A disaster-recovery plan is essential for a company to resume operation after its computer system is damaged or destroyed. This plan outlines the steps and procedures to be followed in order to recover and restore the system, ensuring minimal downtime and data loss. It includes strategies for backup and restoration of critical data, alternative infrastructure arrangements, and allocation of resources to address the specific needs of the company during a disaster situation. By creating a disaster-recovery plan, the company can effectively mitigate the impact of system damage or destruction and quickly resume normal operations.

    Rate this question:

  • 25. 

    To ensure that an e-mail message or file came from the designated individual and was not tampered during transmission; you should use which of the following? 

    • A.

      Firewall

    • B.

      Digital signature

    • C.

      Antivirus program

    • D.

      Encryprion

    Correct Answer
    B. Digital signature
    Explanation
    A digital signature is used to ensure the authenticity and integrity of an email message or file. It provides a way to verify that the message or file came from the designated individual and has not been tampered with during transmission. The digital signature uses encryption techniques to create a unique identifier for the message or file, which can be verified by the recipient using the sender's public key. This ensures that any changes made to the message or file will be detected, providing assurance of its origin and integrity.

    Rate this question:

  • 26. 

    Too much web traffic can ___________ a web site or even prevent access to it.

    • A.

      Speed up

    • B.

      Slow down

    • C.

      Have no effect no

    • D.

      None of the above

    Correct Answer
    B. Slow down
    Explanation
    Too much web traffic can slow down a website or even prevent access to it. This is because an overwhelming amount of incoming requests can overload the server's capacity to handle them efficiently. As a result, the website's performance deteriorates, causing slower loading times and potentially leading to server crashes or downtime.

    Rate this question:

  • 27. 

    Using available technology to work from home or an off-site location is called telecommuting. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Telecommuting refers to the practice of using technology to work remotely or from a location other than the traditional office. It allows individuals to work from home or off-site, using tools such as computers, internet, and communication devices to stay connected and complete their tasks. Therefore, the given statement that using available technology to work from home or an off-site location is called telecommuting is true.

    Rate this question:

  • 28. 

    When programmers violate the rules of a programming language, ____ errors result. 

    • A.

      Run-time

    • B.

      Syntax

    • C.

      Logic

    • D.

      Beta

    Correct Answer
    B. Syntax
    Explanation
    When programmers violate the rules of a programming language, syntax errors result. Syntax errors occur when the code does not follow the proper structure and grammar of the programming language. This can include missing or incorrect punctuation, misspelled keywords, or using incorrect syntax for a specific programming construct. These errors are typically caught by the compiler or interpreter during the compilation or interpretation process, preventing the code from running.

    Rate this question:

  • 29. 

    When the document conforms to the rules and requirements of XHTML, it is said to be _____. 

    • A.

      Transtional

    • B.

      Deprecated

    • C.

      Well formed

    • D.

      Formatted

    Correct Answer
    C. Well formed
    Explanation
    When a document conforms to the rules and requirements of XHTML, it is said to be "well formed." This means that the document follows the syntax and structure specified by the XHTML standard, without any errors or inconsistencies. A well-formed document is valid and can be properly interpreted by web browsers and other XML parsers.

    Rate this question:

  • 30. 

    When the document conforms to the rules and requirements of XHTML, it is said to be _____. 

    • A.

      Transtional

    • B.

      Deprecated

    • C.

      Well formed

    • D.

      Formatted

    Correct Answer
    C. Well formed
    Explanation
    When the document conforms to the rules and requirements of XHTML, it is said to be "well formed". This means that the document is structurally correct and follows the syntax and guidelines specified by the XHTML standard. A well-formed document does not contain any errors or inconsistencies that would prevent it from being properly interpreted by web browsers or other XML processors.

    Rate this question:

  • 31. 

    When the records of more than one table are necessary to answer a query the tables must be __________. 

    • A.

      Projected

    • B.

      Divided

    • C.

      Closed

    • D.

      Joined

    Correct Answer
    D. Joined
    Explanation
    When the records of more than one table are necessary to answer a query, the tables must be joined. Joining tables allows the combination of data from multiple tables based on a common column or key. This enables the retrieval of relevant information from different tables and provides a comprehensive result set that satisfies the query requirements.

    Rate this question:

  • 32. 

    Which of the following is an advantage of a database management system?

    • A.

      Quick response to requests for information

    • B.

      Increased data redundance

    • C.

      Lower software cost

    • D.

      All of the above are DBMS advantages.

    Correct Answer
    A. Quick response to requests for information
    Explanation
    An advantage of a database management system is its ability to provide quick responses to requests for information. This means that users can retrieve the required data in a timely manner, increasing efficiency and productivity. This advantage is crucial in organizations where quick access to accurate information is essential for decision-making and day-to-day operations.

    Rate this question:

  • 33. 

    Which of the following is an example of assistive technology? 

    • A.

      Magnifiers

    • B.

      Screen reader software

    • C.

      Braille keyboard

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the options listed are examples of assistive technology. Magnifiers help individuals with visual impairments to enlarge and enhance the visibility of text or objects. Screen reader software assists individuals who are blind or have low vision by converting text into speech or braille output. A braille keyboard enables individuals who are blind or have low vision to input information using braille characters. Therefore, all three options mentioned are examples of assistive technology.

    Rate this question:

  • 34. 

    XHTML tags are enclosed in square brackets. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    XHTML tags are not enclosed in square brackets. The correct syntax for XHTML tags is to enclose them in angle brackets (< >). Therefore, the given statement is false.

    Rate this question:

  • 35. 

    __________ is the exploitation of vulnerability in domain name servers that allows traffic to a website to be redirected to another website. 

    • A.

      Short selling

    • B.

      Pharming

    • C.

      Back end

    • D.

      Shopping

    Correct Answer
    B. Pharming
    Explanation
    Pharming refers to the exploitation of vulnerabilities in domain name servers, which allows attackers to redirect traffic from a legitimate website to a malicious one. This can be done by tampering with the DNS cache or by poisoning the DNS server. By redirecting users to a different website, attackers can deceive them into entering sensitive information, such as login credentials or financial details, which can then be used for fraudulent purposes.

    Rate this question:

  • 36. 

    __________ software can be used for brochures, letters, web pages, faxes, memos, calendar, and academic research paper purposes. 

    • A.

      Word Processing

    • B.

      Spreadsheet

    • C.

      Database

    • D.

      Presentation

    Correct Answer
    A. Word Processing
    Explanation
    Word processing software is designed to create and edit text-based documents. It provides various formatting options, such as font styles, sizes, and colors, as well as tools for spell checking and grammar correction. With word processing software, users can easily create brochures, letters, web pages, faxes, memos, calendars, and academic research papers by typing and formatting text. This software is specifically designed for handling textual content and is widely used for various purposes in both personal and professional settings.

    Rate this question:

  • 37. 

    A(n) _____ diagram depicts a database's entities and their relationships.

    • A.

      Data flow

    • B.

      Entity-relationship

    • C.

      Flowcart

    • D.

      Process

    Correct Answer
    B. Entity-relationship
    Explanation
    An entity-relationship diagram is a graphical representation of a database's entities and their relationships. It shows how different entities are connected and interact with each other in the database. This diagram is commonly used in database design to visualize the structure and organization of the data model.

    Rate this question:

  • 38. 

    Elimination of data redundancy does not solve which problem: 

    • A.

      Wasted space

    • B.

      Slower processing

    • C.

      Data inconsistency

    • D.

      Data entry errors

    Correct Answer
    D. Data entry errors
    Explanation
    Elimination of data redundancy refers to the process of removing duplicate data from a database. While this helps in improving data consistency and reducing wasted space, it does not directly address the problem of data entry errors. Data entry errors occur when incorrect or inaccurate data is inputted into the system. This can happen due to human error or system limitations. Therefore, even if data redundancy is eliminated, data entry errors can still occur and need to be addressed separately.

    Rate this question:

  • 39. 

    The relationship among tables is facilitated by ____ and ___ keys. 

    • A.

      Natural, systematic

    • B.

      Foreign, systematic

    • C.

      Natural, primary

    • D.

      Foreign, primary

    Correct Answer
    D. Foreign, primary
    Explanation
    The relationship among tables is facilitated by foreign and primary keys. Foreign keys are used to establish a link between two tables by referencing the primary key of another table. The foreign key in one table refers to the primary key of another table, allowing for the establishment of relationships and maintaining data integrity. The primary key is a unique identifier for each record in a table, ensuring that each record is uniquely identified and can be referenced by foreign keys in other tables.

    Rate this question:

  • 40. 

    Digital signature authenticates transactions.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message, document, or transaction. It provides a way to ensure that the sender of the message is who they claim to be and that the message has not been tampered with during transmission. By using encryption and public key infrastructure, digital signatures can guarantee the integrity and non-repudiation of transactions, making them a reliable method for authentication. Therefore, the statement that digital signatures authenticate transactions is true.

    Rate this question:

  • 41. 

    Environmental responsibility involves:

    • A.

      Buying green

    • B.

      Save trees

    • C.

      Saving energy

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Environmental responsibility involves buying green products, which are environmentally friendly and sustainable. It also includes saving trees by reducing paper usage and promoting recycling. Additionally, saving energy is an important aspect of environmental responsibility as it helps reduce greenhouse gas emissions and conserve natural resources. Therefore, the correct answer is "All of the above" as all these actions contribute to being environmentally responsible.

    Rate this question:

  • 42. 

    Two popular screen readers are JAWS and ICE. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Two popular screen readers are JAWS and ICE. This statement is false. While JAWS is indeed a popular screen reader, there is no widely recognized screen reader called ICE. Therefore, the correct answer is false.

    Rate this question:

  • 43. 

    Spyware programs can harvest personal data by reading cookies and sending the data to a server. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Spyware programs are designed to collect personal data without the user's consent. One way they do this is by reading cookies, which are small files stored on a user's computer that contain information about their browsing habits. By accessing these cookies, spyware programs can gather personal data such as login credentials, browsing history, and other sensitive information. Once collected, this data is often sent to a remote server controlled by the attacker. Therefore, the statement that spyware programs can harvest personal data by reading cookies and sending the data to a server is true.

    Rate this question:

  • 44. 

    ___________ is a technique of exhaustively working through all possible combinations of letters, numbers, and special characters in order to guess a password.

    • A.

      Dictionary attack

    • B.

      Password guessing attack

    • C.

      Brute force attack

    • D.

      None of the above

    Correct Answer
    C. Brute force attack
    Explanation
    A brute force attack is a technique where an attacker systematically tries every possible combination of letters, numbers, and special characters to guess a password. This method is exhaustive and time-consuming, as it requires trying out all possible combinations until the correct password is found. It is a common method used by hackers to gain unauthorized access to systems or accounts.

    Rate this question:

  • 45. 

    To indicate that a Web page is secure, many browsers display a(n): 

    • A.

      Dollar sign with a line through it

    • B.

      Logo of the Trust-E organization

    • C.

      Digital wallet

    • D.

      Image of a lock padlock

    Correct Answer
    D. Image of a lock padlock
    Explanation
    The image of a lock padlock is commonly used by many browsers to indicate that a web page is secure. This symbol represents that the website is using a secure connection (HTTPS) to protect the data transmitted between the user's browser and the website's server. It assures the user that their information is encrypted and safe from potential threats.

    Rate this question:

  • 46. 

    Select the correct letter(s) for the angle brackets < > to create a row in a table.

    • A.

      Tr

    • B.

      Th

    • C.

      R

    • D.

      Td

    Correct Answer
    A. Tr
    Explanation
    The correct answer is "tr" because in HTML, the "tr" tag is used to create a row in a table. The "th" tag is used to create a header cell in a table, the "r" tag does not exist in HTML, and the "td" tag is used to create a data cell in a table. Therefore, "tr" is the correct choice for creating a row in a table.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 05, 2012
    Quiz Created by
    StudySmartS

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.