BCIS 2610 EXAM 270 QUESTIONS & CORRECT
ANSWERS LATEST 2025
When Florence joins her father's construction business, she realizes all the
transactions are still done and maintained on paper. What should she do to
establish a system where any data can be looked up immediately and transparency
can be maintained? - ANSWER-Create a database of company projects, customers
and vendors.
Debra launched her start-up in 2016. After 2 continuous years of losses, she needs
to now downsize. She has salary details of all employees in a spreadsheet report.
Which of the following features should she use to decide how many people to
layoff, and who? - ANSWER-What-if analysis
Pierre has entered marks obtained by the students in all the classes he teaches in a
spreadsheet. Now he wants to highlight some data according to his specifications.
Which spreadsheet feature should he use? - ANSWER-Conditional formatting
Samantha plans to self-publish her book on her website. She had asked a friend to
design the cover of her book but he backed out at the last moment. Samantha now
needs to design it herself. Which of the following apps should she use to complete
this project? - ANSWER-A graphics app to design the cover page and place the
desired text where needed
Aaron has started a food blog on which he wants to post his recipes. He wants to
place a good quality image that corresponds to each cooking step. Which file
format should he use so that users do not experience a lag in loading of the website
because of high-quality images? - ANSWER-JPEG
,Logan is considering web app development as a career option. Which of the
following languages does he not need to master? - ANSWER-Logo
Martha has been appointed as the Data Security Manager of her organization. The
company wants her to have a customized app created that can be used to remove
viruses from the infected systems without connecting to the network. What type of
app should she focus on getting developed? - ANSWER-A device management
portable app
Lauren is preparing a presentation for her class. She wants to make the slides and
their objects appear and disappear to make it more interesting. What should she
do? - ANSWER-Choose specific transition effects and animations to allocate the
kind of transition and time to each slide and object.
Patricia has started a new interior designing business. Her top five tasks are
creating designs, sharing them with her team and potential clients, making
presentations for potential clients, sending and receiving payments, and carrying
out marketing on social media. Which of the following sets of apps should she use?
- ANSWER-Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook
Andrew's company uses a special email program for communicating within the
organization. What should the company do to ensure that its employees are able to
access the inbox even when they are away from office? - ANSWER-Make the
program available as a web app.
Simone frequently downloads mobile apps from Amazon Appstore. What
operating system does she have on her smartphone? - ANSWER-Android
,Fiona is responsible for presenting data at the monthly team meeting so that it can
be understood at a glance and is visually appealing way. The data is available in
spreadsheet. Which of the following can Fiona do? - ANSWER-Create trendlines
Anusha wants to use her computer, rather than handwriting the information on her
notepad, to analyze her monthly expenses to make the job easier. Which of the
following apps should she use? - ANSWER-A spreadsheet app to keep a record of
her expenses, sort data, and make calculations
Paul has opened a bespoke tailoring shop. He wants to keep a database of all his
customers, send e-mails when garments are ready, create designs, and maintain
financial records using software. Which productivity suites should he consider? -
ANSWER-OpenOffice, G suite
Which is a first step to deter thieves from accessing your financial information? -
ANSWER-Do not provide personal information over the phone or through email.
Which term refers to the science that specifies the design and arrangement of items
you use so you interact with the items efficiently and safely? - ANSWER-
Ergonomics
In which of the following real-life situations would it be useful to use a digital
certificate? - ANSWER-If you were signing a rent lease
With more and more people using technology, what physical health diagnosis is on
the rise? - ANSWER-repetitive strain injury
There are various risks from attacks on Wi-Fi networks. These include all of the
following EXCEPT _____. - ANSWER-Creating malware
, You are watching the news and learn that there has been a security breach of credit
card information at a large department store. The news report also states that the
same company has had recent layoffs. The report says that the company is looking
into whether or not the breach was done by an insider. Why would the company
investigate the possibility of the breach being from an insider? - ANSWER-
Because insiders create threats after incidents at their places of employment.
How can an attacker execute malware through a script? - ANSWER-An attacker
can attach a script to a program that you download which then infects your
computer.
Which of the following is a characteristic of a strong password? - ANSWER-
Letters, numbers, and symbols
After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while
they were dating. He even lied about their breakup, creating rumors about her
behavior. Penny started getting inappropriate looks and advances from the team
whenever she was at practice and felt completely humiliated. Penny is a victim of
________. - ANSWER-Cyberbullying
Emma downloaded a new game from an unfamiliar website. A few days later,
Emma realized her system had been hacked and her credit card numbers were
stolen. Without Emma knowing, what type of malware might she have downloaded
to her computer? - ANSWER-A trojan
How is a worm different from a Trojan? - ANSWER-A worm spreads through a
network, whereas a Trojan hides inside another program.
How is the environment impacted by computers being thrown away in landfills? -
ANSWER-The lead and mercury is seeping into the ground and water supply.
ANSWERS LATEST 2025
When Florence joins her father's construction business, she realizes all the
transactions are still done and maintained on paper. What should she do to
establish a system where any data can be looked up immediately and transparency
can be maintained? - ANSWER-Create a database of company projects, customers
and vendors.
Debra launched her start-up in 2016. After 2 continuous years of losses, she needs
to now downsize. She has salary details of all employees in a spreadsheet report.
Which of the following features should she use to decide how many people to
layoff, and who? - ANSWER-What-if analysis
Pierre has entered marks obtained by the students in all the classes he teaches in a
spreadsheet. Now he wants to highlight some data according to his specifications.
Which spreadsheet feature should he use? - ANSWER-Conditional formatting
Samantha plans to self-publish her book on her website. She had asked a friend to
design the cover of her book but he backed out at the last moment. Samantha now
needs to design it herself. Which of the following apps should she use to complete
this project? - ANSWER-A graphics app to design the cover page and place the
desired text where needed
Aaron has started a food blog on which he wants to post his recipes. He wants to
place a good quality image that corresponds to each cooking step. Which file
format should he use so that users do not experience a lag in loading of the website
because of high-quality images? - ANSWER-JPEG
,Logan is considering web app development as a career option. Which of the
following languages does he not need to master? - ANSWER-Logo
Martha has been appointed as the Data Security Manager of her organization. The
company wants her to have a customized app created that can be used to remove
viruses from the infected systems without connecting to the network. What type of
app should she focus on getting developed? - ANSWER-A device management
portable app
Lauren is preparing a presentation for her class. She wants to make the slides and
their objects appear and disappear to make it more interesting. What should she
do? - ANSWER-Choose specific transition effects and animations to allocate the
kind of transition and time to each slide and object.
Patricia has started a new interior designing business. Her top five tasks are
creating designs, sharing them with her team and potential clients, making
presentations for potential clients, sending and receiving payments, and carrying
out marketing on social media. Which of the following sets of apps should she use?
- ANSWER-Canva, Dropbox, PayPal, GoogleDocs, Instagram, Facebook
Andrew's company uses a special email program for communicating within the
organization. What should the company do to ensure that its employees are able to
access the inbox even when they are away from office? - ANSWER-Make the
program available as a web app.
Simone frequently downloads mobile apps from Amazon Appstore. What
operating system does she have on her smartphone? - ANSWER-Android
,Fiona is responsible for presenting data at the monthly team meeting so that it can
be understood at a glance and is visually appealing way. The data is available in
spreadsheet. Which of the following can Fiona do? - ANSWER-Create trendlines
Anusha wants to use her computer, rather than handwriting the information on her
notepad, to analyze her monthly expenses to make the job easier. Which of the
following apps should she use? - ANSWER-A spreadsheet app to keep a record of
her expenses, sort data, and make calculations
Paul has opened a bespoke tailoring shop. He wants to keep a database of all his
customers, send e-mails when garments are ready, create designs, and maintain
financial records using software. Which productivity suites should he consider? -
ANSWER-OpenOffice, G suite
Which is a first step to deter thieves from accessing your financial information? -
ANSWER-Do not provide personal information over the phone or through email.
Which term refers to the science that specifies the design and arrangement of items
you use so you interact with the items efficiently and safely? - ANSWER-
Ergonomics
In which of the following real-life situations would it be useful to use a digital
certificate? - ANSWER-If you were signing a rent lease
With more and more people using technology, what physical health diagnosis is on
the rise? - ANSWER-repetitive strain injury
There are various risks from attacks on Wi-Fi networks. These include all of the
following EXCEPT _____. - ANSWER-Creating malware
, You are watching the news and learn that there has been a security breach of credit
card information at a large department store. The news report also states that the
same company has had recent layoffs. The report says that the company is looking
into whether or not the breach was done by an insider. Why would the company
investigate the possibility of the breach being from an insider? - ANSWER-
Because insiders create threats after incidents at their places of employment.
How can an attacker execute malware through a script? - ANSWER-An attacker
can attach a script to a program that you download which then infects your
computer.
Which of the following is a characteristic of a strong password? - ANSWER-
Letters, numbers, and symbols
After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while
they were dating. He even lied about their breakup, creating rumors about her
behavior. Penny started getting inappropriate looks and advances from the team
whenever she was at practice and felt completely humiliated. Penny is a victim of
________. - ANSWER-Cyberbullying
Emma downloaded a new game from an unfamiliar website. A few days later,
Emma realized her system had been hacked and her credit card numbers were
stolen. Without Emma knowing, what type of malware might she have downloaded
to her computer? - ANSWER-A trojan
How is a worm different from a Trojan? - ANSWER-A worm spreads through a
network, whereas a Trojan hides inside another program.
How is the environment impacted by computers being thrown away in landfills? -
ANSWER-The lead and mercury is seeping into the ground and water supply.