SOLUTIONS RATED A+
✔✔How can an attacker execute malware through a script? - ✔✔An attacker can attach
a script to a program that you download which then infects your computer.
✔✔Which of the following is a characteristic of a strong password? - ✔✔Letters,
numbers, and symbols
✔✔After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while they
were dating. He even lied about their breakup, creating rumors about her behavior.
Penny started getting inappropriate looks and advances from the team whenever she
was at practice and felt completely humiliated. Penny is a victim of ________. -
✔✔Cyberbullying
✔✔Emma downloaded a new game from an unfamiliar website. A few days later, Emma
realized her system had been hacked and her credit card numbers were stolen. Without
Emma knowing, what type of malware might she have downloaded to her computer? -
✔✔A trojan
✔✔How is a worm different from a Trojan? - ✔✔A worm spreads through a network,
whereas a Trojan hides inside another program.
✔✔How is the environment impacted by computers being thrown away in landfills? -
✔✔The lead and mercury is seeping into the ground and water supply.
✔✔Marcus recently had his cell phone stolen. All of the following are security features
that should help him locate his stolen phone EXCEPT which one? - ✔✔He can use
remote wiping to retrace the thief's steps.
✔✔In terms of privacy, which of the following is a best practice? - ✔✔Keeping your
Social Security number hidden in a locked box in your home
✔✔Isabel received a message on her computer that appeared to be from the FBI. It
informed her that her computer has been locked and she would need to pay a fee to
retrieve her data. How would you describe what is happening? - ✔✔It is most likely
ransomware because it is telling her she has to verify payment information to unlock her
computer.
✔✔How could an online attacker use your profile to gather information about you to
steal your identity? - ✔✔Use your posts to figure out answers to possible security
questions.
, ✔✔Rob is planning his housewarming party. He wants to design an invitation and
personalize it for each invitee. These are the things he needs to do:
Create a list of invitees;
Design the card; and
Personalize the card.
How should he go about the task? - ✔✔Use a word processor for step 1, graphics
software for step 2, and a mail merge for step 3.
✔✔Sammy created a new logo for his client to be used on the company website as well
as office stationary. However, it became an almost invisible blur when it was enlarged to
use on a billboard ad. Now Sammy needs to redo the logo. What should he do to avoid
this in future? - ✔✔Use vector images because they retain their clarity even when
enlarged or shrunk.
✔✔How can you check data on devices connected through IoT network? - ✔✔Use a
tablet
✔✔Lauren wants to be a blogger but uses a Chromebook for writing posts and
uploading them to the website. If she has an Internet connection, what software can
help her do her work? - ✔✔Zoho writer
✔✔An organization has its employees working from home. Which of the following
productivity apps should the employees use so they are able to collaborate easily with
each other? - ✔✔G Suite
✔✔Rohan has to create a presentation out of his thesis summary. He expects the
presentation to have at least 50 slides. Which of the following parts of the presentation
should he design first? - ✔✔slide master
✔✔Sophia is putting together a training manual for her new batch of employees. Which
of the following features can she use to add a document title at the top of each page? -
✔✔Header and footer
✔✔Jamie plans to sell his pottery designs through his website. If he also wants to
launch a mobile app to reach more people, which type of app should he launch? -
✔✔M-commerce app
✔✔Which of the following devices can be used to advance slides without having to click
a button on the laptop? - ✔✔Wireless remote control
✔✔Shania has started a new job as an app developer. Her first task was to make an old
app designed for Android available on other platforms. Which of the following would