WITH SOLUTIONS GRADED A+
◉ MeeReader is an e-reading application that allows users to download
and read books and articles on a device. Each user creates a profile with
the following personal preferences.
Screen brightness and contrast
Choice of typeface and font size
Amount of spacing between lines of text
Activation of a text-to-speech feature that reads the text out loud
When the user launches the application, the application scans the user's
face and uses facial recognition software to determine the user's identity.
Once the user has been identified, the user's personal preferences are
applied to whatever book or article the user chooses to read.
The application stores all user information in a database, including
personal preferences and a record of previously read books and articles.
Which of the following is most likely to be a beneficial effect of using
MeeReader? Answer: The developers can analyze the data to make
improvements to the application based on user behavior.
◉ A software development company has created an application called
FileCleanUp. When the application is run on a user device, it searches
for all files (including pictures, videos, and documents) that have not
been accessed in the past month, stores them on the company's Web
server, and deletes them from the user device. The application runs once
, each day. Users have the ability to manually retrieve files from the
server if they are needed.
Which of the following is most likely to be a harmful effect of using
FileCleanUp? Answer: It prevents users from accessing infrequently
used files when there is no Internet connectivity.
◉ Which of the following best exemplifies the use of multifactor
authentication? Answer: A Web site requires a user to enter a password
as well as a numeric code received via text message before the user can
log in to an account.
◉ A mobile application is used to display local traffic conditions. Which
of the following features of the application best exemplifies the use of
crowdsourcing? Answer: Users can submit updates on local traffic
conditions in real time.
◉ An individual receives an e-mail that appears to be from an insurance
company. The message offers a low insurance rate, and prompts the
recipient to click a link to learn more. Which of the following is most
indicative that the e-mail is part of a phishing attempt? Answer: After
clicking the link, a Web page opens that prompts the recipient for
personal information.
◉ A user unintentionally installs keylogging software on a computer.
Which of the following is an example of how the keylogging software
can be used by an unauthorized individual to gain access to computing
resources? Answer: The software records all user input on the computer.