You are on page 1of 15

11/29/22, 11:52 AM Applied Educational Systems

IST Fall Final Study Guide (60 questions)

questions)

1st Pd IST 22-23

1. Boolean values are:

Yes or No

True or False

Left or Right

All of the above

2. What does a phishing email try to do?

Inform you that you have won the lottery or a large prize.

Steal your personal information such as passwords, bank account numbers and usernames.

Sell you the latest and newest technology at steep discounted prices.

None of the above

3. Free Wi-Fi is typically offered on a(n) __________ network.

unencrypted

open

private

encrypted

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 1/15
11/29/22, 11:52 AM Applied Educational Systems

4. Controlling and coordinating cognitive skills and behaviors needed for professional success is known as:

Adaptability

Perseverance

Executive function

Goal setting

5. The physical components of a computer are called what?

Software

Malware

Hardware

Spyware

6. A statement is

a control structure.

a one-word instruction that has assigned meaning.

a sentence.

all other elements of a command.

7. Is "Ih@%eC@ts!" a strong password?

No

Yes

8. Which of the following is a term used for the permanent record of activities performed on the Internet?

Trending topics

Online identity

Privacy settings

Digital footprint

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 2/15
11/29/22, 11:52 AM Applied Educational Systems

9. An event handler is

an action that occurs as a result of a user's action or another source.

a word that is open for interpretation.

a sentence the provides information.

a procedure that is used to deal with events.

10.. Decomposition is
10

a design flaw in the program.

a set of steps that follow one another in order.

a list of steps to complete a task.

breaking a problem into smaller parts.

11.. A file that is sent along with an email message is called a(n):
11

Selected file

Document

Attachment

Add-on

12.. Which of the following would be most likely to use a 4G network?


12

An office computer

A home computer

A library

A cellular phone

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 3/15
11/29/22, 11:52 AM Applied Educational Systems

13.. A public Wi-Fi risk that can be minimized by only visiting encrypted sites with an HTTPS indicator is:
13

Harmful Software Attacks

Rogue Public Wi-Fi

Junk Mail

Man-in-the-Middle Attacks

14.. When code is interpreted it


14

is converted to binary code.

is made into a smaller version.

is used to communicate with the end-user.

is read directly from the program.

15.. A group of computers that share resources are called what?


15

A router

A network

A server

A personal computer

16.. What symbol is used when assigning a value to a variable?


16

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 4/15
11/29/22, 11:52 AM Applied Educational Systems

17.. LAN and WAN stand for what?


17

Limited Access Network / Widening Access Network

Local Access Network / Wide Access Network

Local Area Network / Wide Area Network

Limited Area Network / Wide Area Network

18.. You have received an email from a friend with a file attached to it, but the email subject looks
18
suspicious. What should you do?

Ask your friend if they sent you a file before you open it.

Open the email and download the file. You can trust your friend.

Delete the email without opening it.

19.. Which definition best describes a computer?


19

A device that was invented to be smarter than man

A machine that stores and processes data

A device that collects viruses and dust

A machine with a brain and emotions

20.. What does the "G" stand for in 3G?


20

Galaxy

General

Generation

Go

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 5/15
11/29/22, 11:52 AM Applied Educational Systems

21.. Antivirus software is a computer program that _____________, prevents, and takes action to disarm or
21
remove malicious software programs.

deters

avoids

detects

approves

22.. Which of the following are reasons control structures are used?
22

To make code clear

To make code easy for others to follow

To save time

All of the above

23.. A function
23

is a selection control structure.

repeats a sequence of commands.

performs a specific task when called.

is one line of code.

24.. A digital footprint is all of the information on-line about a person posted by that person or others,
24
_______________.

intentionally or unintentionally

unintentionally or accidentally

intentionally

recklessly

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 6/15
11/29/22, 11:52 AM Applied Educational Systems

25.. Which of the following might make you suspicious of an email that you receive?
25

An email that contains an attachment

An email from your aunt you haven't heard from in a year

Subject line heading of "40% Off Sale" with a return address of sales@macy.com

Subject line heading of "You have WON $1,000,000!" with a return address of
drcashnow@shaw.ca

26.. What is a type of local network that people can use to access the Internet?
26

Router

Mobile

Computer

Private Home Network

27.. How does the computer use a selection control structure to decide which path to follow?
27

By repeating the code until a requirement is met

By guessing which requirements work best

Randomly

By determining which requirements have been met

28.. Protecting what is added to your digital footprint is important because potentially embarrassing
28
information can remain on-line ___________.

until it is forgotten

forever

up to 6 months

until removed

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 7/15
11/29/22, 11:52 AM Applied Educational Systems

29.. The official slang term for junk mail is what?


29

Scam

Junk Mail

Fake

Spam

30.. Which statement best defines what technology is?


30

Technology is any invention, including tools, machines, techniques, and sources of power

Technology is the process by which a machine a receives directions

Technology is everything that makes the world better

Technology is something that is used only in electronic devices

31.. Which of the following is the best definition of what an IP Address does?
31

It identifies the software that is being used to access the Internet

It helps a computer find other computers on the network

It tells the computer who the user is

32.. An Email message that you did not finish writing can be found in which folder?
32

Trash

Draft

Saved

Sent

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 8/15
11/29/22, 11:52 AM Applied Educational Systems

33.. What does URL stand for?


33

Uniform Resource Language

Understand Resource Language

Ultimate Resource Locator

Uniform Resource Locator

34.. What is a coverage map used for?


34

To discover owners with similar personal devices

To determine where a cellular network is available

To locate a lost phone

To find local carrier stores

35.. What is a safe practice when it comes to passwords for social media?
35

Using the same or similar passwords for different websites.

Combining lower case, upper case and special characters for your password.

Adding a birthdate or personal numbers to your password.

Keeping your written password nearby a computer or laptop.

36.. Julia receives an email from an unknown source. The subject of the email looks strange and it has an
36
attachment. What should Julia do?

Delete the email

Respond to the email

Open the attachment

Forward the email

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 9/15
11/29/22, 11:52 AM Applied Educational Systems

37.. Xavier's strengths include an ability to adapt and creatively solve problems. Which of the following
37
mental processes does this involve?

Self-regulation

Working memory

Flexible thinking

Teamwork

38.. Which of the following are skills you need to be successful in coding?
38

Problem-solving

Efficiency

Independence

All of the above

39.. What does the location in a URL identify?


39

Where to find a resource on your personal computer

The city and state where the web server is located

Where to find a resource on the protocol

Where to find a resource on the host

40.. A ________________ control structure is used to reduce the number of lines of code for an action that will
40
need to be repeated many times.

Sequential

Selection

Repetition

Differential

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 10/15
11/29/22, 11:52 AM Applied Educational Systems

41.. What does URL stand for?


41

Understand Resource Language

Uniform Resource Locator

Uniform Resource Language

Ultimate Resource Locator

42.. Which of the following does NOT describe communication between two or more parties messaging at
42
the same time?

Chat

Instant messages

Direct messages

Forum

43.. What controls a computer's basic operations?


43

Software system

Motherboard

RAM

Operating system

44.. Adrian uses the problem-solving method to solve a problem. The solution was unsuccessful. What
44
should Adrian do next?

Repeat the unsuccessful solution.

Give up and let someone else fix the problem.

Try to solve a different problem.

Evaluate the results and try a new solution.

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 11/15
11/29/22, 11:52 AM Applied Educational Systems

45.. How can people avoid pitfalls related to being distracted by electronic devices?
45

Be aware of surroundings when in public.

Check for places to charge mobile devices.

Communicate less with other people.

Respond to all phone calls when in quiet, public places.

46.. Credit checks are typically NOT necessary for pre-paid phone carriers.
46

True

False

47.. What type of identity theft occurs when a thief spends another person's money or opens a line of credit
47
in their name?

Governmental

Medical

Financial

Criminal

48.. Malware is software that has _______________.


48

malicious intent

poor behavior

positive intent

faster speed

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 12/15
11/29/22, 11:52 AM Applied Educational Systems

49.. Coding is
49

writing a program in a specific language.

a set of instructions given to a computer.

the language computers use to communicate.

the computer specifying instructions to the user.

50.. Wi-Fi is mainly used by both home and public networks to access the Internet.
50

True

False

51.. What does a file extension tell your computer?


51

Where a program is saved

Which file name to display

What type of program to open

When the file was created

52.. A social media site can help show a person's character based on the information they choose to share.
52

True

False

53.. ____________ is the act of breaking into a computer to steal information.


53

Hacking

Lifting

Identity theft

Safe-cracking

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 13/15
11/29/22, 11:52 AM Applied Educational Systems

54.. A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.
54

worm

computer virus

55.. A variable can be called or referenced before it has been defined.


55

True

False

56.. Variables are used to store information that will be referenced and manipulated in a computer program.
56

True

False

57.. Jailbreaking or unlocking a mobile device is considered an unsafe practice.


57

True

False

58.. Which mental process involves holding a limited amount of information and the ability to integrate new
58
information to plan and organize?

Teamwork

Working memory

Self-regulation

Flexible thinking

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 14/15
11/29/22, 11:52 AM Applied Educational Systems

59.. If A = 5 and B = 10, what is A * B equal to?


59

50

15

60.. What does a phishing email try to do?


60

Inform you that you have won the lottery or a large prize.

Steal your personal information such as passwords, bank account numbers and usernames.

Sell you the latest and newest technology at steep discounted prices.

None of the above

This answer key for IST Fall Final Study Guide was printed from the Applied Educational Systems, Inc. platform.

https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 15/15

You might also like