Business

Which of the following is NOT part of a software suite? A) word proce

QUESTION Which of the following is NOT part of a software suite? A) word processing software B) spreadsheet software C) system software D) e-mail software E) presentation software   ANSWER Answer: C Explanation: C) Software suites are packages of integrated application software. System software helps application software interact with the computer.

Read full post

Date: September 3rd, 2020

Tina sends an e-mail on the company intranet to her supervisor Jonah a

QUESTION Tina sends an e-mail on the company intranet to her supervisor Jonah across the hall. What does the e-mail pass through before Jonah reads it? A) mainframe B) microcontroller C) server D) flash drive E) client   ANSWER Answer: C Explanation: C) A server is a central computer that holds data and programs for […]

Read full post

Date: September 3rd, 2020

Networks reflect five basic technologies. Which of the following is NO

QUESTION Networks reflect five basic technologies. Which of the following is NOT an accurate depiction of these technologies? A) size > WAN and LAN B) arrangement > client/server and P2P C) private uses > extranet and VPN D) bandwidth > secure and insecure E) connections > wired and wireless   ANSWER Answer: D Explanation: D) […]

Read full post

Date: September 3rd, 2020

Petra works at a leading biotech company, where she runs DNA samples a

QUESTION Petra works at a leading biotech company, where she runs DNA samples and chemical formulas to discover molecule pairs that might cure genetic diseases. What type of computer does Petra use in her job? A) supercomputer B) microcontroller C) laptop D) tablet E) workstation   ANSWER Answer: E Explanation: E) Petra deals with highly […]

Read full post

Date: September 3rd, 2020

Malware makes repeated requests of a computer network, overloading it

QUESTION Malware makes repeated requests of a computer network, overloading it and denying access to legitimate users. Indicate whether the statement is true or false.   ANSWER Answer: FALSE Explanation: Making repeated requests of a computer system or network to deny access by legitimate users is a denial-of-service (DoS) attack.

Read full post

Date: September 3rd, 2020

Vonetta works at a big company with several buildings in a campus-like

QUESTION Vonetta works at a big company with several buildings in a campus-like setting. She regularly communicates with coworkers across the company via computer. Which of the following statements can NOT be true? A) Vonetta is on a WAN. B) Vonetta is on a extranet. C) Vonetta is on a P2P network. D) Vonetta is […]

Read full post

Date: September 3rd, 2020

Given that Lighthouse is a nonprofit organization of modest size, whic

QUESTION Given that Lighthouse is a nonprofit organization of modest size, which of the following is the least feasible option for the employer? A) an onsite wellness healthcare clinic B) a major medical benefits program with a larger deductible C) a healthcare program using a point-of-service system D) using an external source to administer healthcare […]

Read full post

Date: September 3rd, 2020

All of the following weaken the claim that PMI charges accurately refl

QUESTION All of the following weaken the claim that PMI charges accurately reflect the risk of loan default EXCEPT: A) The cost of private mortgage insurance goes up as the size of a mortgage increases. B) Well-informed buyers can avoid paying PMI if they are aware of loan products that divide up their mortgages into […]

Read full post

Date: September 3rd, 2020

Which of the following best supports the claim that charging PMI is fa

QUESTION Which of the following best supports the claim that charging PMI is fair to homebuyers? A) In some circumstances, PMI charges can be tax-deductible. B) Homebuyers who are charged PMI and are at risk of defaulting could typically pay for PMI by spending less on entertainment or luxury items. C) The risks of loan […]

Read full post

Date: September 3rd, 2020