CISB 11
To include more than one line of comments in Python code, you must start each line with which of the following symbols?
#
Which of the following is a concatenation operator?
&
The Python programming language has a small vocabulary of how many keywords?
34
Mateo is designing a technical diagram that many textbook publishers can use, and he wants to make sure he retains the rights to the diagram before selling it. At what stage does a copyright for his creative work come into effect?
As soon as the Image Exists in physical form
Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?
BANNER
______ is a measure of the capability of a network to send and receive data.
Bandwidth
Which data type would be best suited to a field that lists a product's clearance price?
CURRENCY
Some web databases are ______ databases, where users store and share media with other registered users.
Collaborative
When programmers want one thing to happen when a condition is true and something else to happen when it is false they use the ______ statement.
If... else
Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page?
In the header
Why would you include a banner on your website?
It makes the website more easily identifiable to visitors.
about the website? If the web address of a website begins with https instead of http, what do you know
It t is is secure.
instructions until a certain condition is met. The section of code that repeats is usually In a repetition control structure, the computer is directed to repeat one or more referred as aln)
Iteration
The in a problem statement is the information that is supplied to the computer to help it solve a problem.
Known information
Which of the following best defines big data?
Large-scale data sets that require advanced technologies
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?
Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
What rules should guide your behavior when you interact with friends and coworkers on social media?
Netiquette
Which of the following are criteria for evaluating a website's content?
OBJECTIVITY
Which data type sometimes is called BLOB?
Object
on a graphic design team and you are learning You have just started an internship about graphic formats used on the web. Which of the following graphic formats should you use for comic-style drawings?
PNG
The contents within a parentheses that are passed to a function are called
Parameters
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing
After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?
Publish to a webserver
What type of reference is used to identify the location of webpages or files on the current website?
Relative
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's phone onto the new device. Once her new phone has all her data, what should she do copying her photos from her old next with the old phone?
Reset the old phone to factory settings.
Which attribute refers to the images folder when specifying the location of an image to display?
SRC
In which of the following situations is a digital certificate useful?
Signing a Rental Lease
Which of the following types of websites typically provides the least security?
Social Media Sites
Which of these file types is optimized for processing calculations of numbers in a budget?
Spreadsheet
What type of Webpages includes content that changes only when a web developer updates the HTML code for each page?
Static
Which of the following tables in a database would NOT need to be encrypted?
Store_ Locations
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
Street Address
Which field could serve as the primary key for a list of students in your school?
Student ID number
If you use an asterisk (*) in a search engine query, what are you trying to do?
Substitute
The volume of Big Data generated over time is typically measured in terms of ____________.
Terabytes
Ms. Lawson, a primary school teacher, told her president is in the public domain. What does she mean by this? students that a photograph of the
The photo is free of copyrights.
Which of the statements about B2B e-commerce is correct?
The transactions involve review by a team of people before making a purchase decision.
For what purpose was the BSA formed?
To promote understanding of software piracy.
An object is anything that can be
Touched. Seen. Used. All of the above
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
compares data with a set of rules or values to determine if the data meets certain criteria.
Validation
Skype is an example of ______ software.
VoIP
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.
Volatility
Which organization provides a free, online HTML5 validator application to ensure that a webpage's HTML tags follow the rules for HTML5?
W3C
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
WORM
Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?
add a formal citation and use the farmer's explanation in his paper
Which of the following people will benefit the most from using a B2B website?
akiko who helps smaller businesses establish themselves in the market
A ________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.
algorithm
Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study?
articles published in a newspaper known to be neutral toward any political party
The major carriers of network traffic are known collectively as the Internet
backbone
Which of the following best describes e-commerce?
business transaction that occurs over an electronic network such as the Internet
The instructions that make up a computer program are sometimes referred to as
code
Which of the following websites most likely uses XML-formatted data?
compare products from different vendorsw
A(n) ______ demands payment to stop an attack.
cyberextortionist
A(n) database is a huge database used to analyze transactions.
data warehouse
You can define functions in Python using a _______ statement.
def
Which of the following is another term for "subclass"?
derived
Which of the following is NOT true about two-step verification?
does not expire
Adding comments generally makes the code ________.
easier to understand
An iris recognition system uses technology to read patterns in the user's
eye
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications
firewall
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.
high level
A result from a search engine search is called a(n) ______.
hit
What part of http://www.nps.gov/history/preserve-places.html is the protocol?
http://
A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?
https as the protocol in the url
If you copy drawing from the Internet and use it in a report, you might be violating the artist's
intellectual property rights
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
keys
Malware is short for software.
malicious
A password ______ is a service that stores all of your account information securely.
manager
Which of the following is not scripting language?
perl
What type of webpages include content that changes only when a web developer updates the HTML code for each page?
static
Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?
there are search engines available with more reliable research
What type of security requires something you know and something you have that no one else has?
two factor authentication
Why would a field that contains numbers have a text data type?
values will not be used in calculation
A national bank processes approximately 1,500 transactions per second. The fact that the bank's database must add this many Big Data records every second refers to its high _________.
velocity
Another term for botnet is ______ army.
zombie
Finding a value for a variable is referred to as ___________.
INSTANTATION
An if statement requires which of the following as punctuation?
A colon
Which of the following stories can be said to be in the public domain?
A copyrighted story whose copyright has expired.
Which of the following would most likely be a static website?
A historical facts page
Google is an example of which type of website?
A search site
JavaScript likely controls which of the following elements on a webpage
A slideshow
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
During a thunderstorm, the database server for Jason's store loses power. This is an example of failed
AVAILABILITY
What type of reference is used to identify the location of webpages or files stored on other websites?
Absolute
If HTML is used to specify the content of the web page, then what do you use CSS for?
INTERACTIVE NO
What would a password manager allow you to do?
Create and store multiple strong passwords. A Microsoft Access database, password protected, serves as a strong password manager.
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?
DRM
Randall needs to monitor rapidly changing statistics for a social media campaign for his company. Which of the following should he use to access this information?
Dashboard
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.
Deleted Logically
In Internet terminology, what is the term, google.com, called?
Domain Name
refers to the process of hiding the internal details of objects and their methods
Encapsulation
An IDE stores files and folders for your website in a directory called ___
FTP CLIENT NO
When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.
Fair use doctrine
All the pet names in a veterinarian's database are stored in a called PetName.
Field
Many programs today use ______ on a webpage as their front end.
Forms
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely resembled human languages.
Fourth
A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.
Function
Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type?
Graduated
Which of the following specifies the headings, paragraphs, images, links, and other content elements of webpages?
HTML