CSCI 103 Lucas Final Exam
Which type of broadband Internet offers connections nearing the speed of light?
Fiber-optic
A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.
File history
Which of the following is not one of the factors used in multi-factor authentication?
Identity
Which of the following is not a category of intellectual property?
Imprint
The collection of large national and international networks used to establish the Internet is called the
Internet backbone.
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Reducing the sampling rate when digitizing a file has which effect on the file?
It decreases the file size
Which of the following describes fiber-optic broadband?
It uses strands of pure glass or plastic.
Which of the following should you not do to secure a wireless network?
Keep the default network name and router password.
What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?
Modem and router
The type of database that would be best to store and organize data with feature and measure attributes is which of the following?
Multidimensional database
A customer information table linked to a password table in a business database reflects which type of relationship?
One-to-one
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?
P2P network
Which of the following is not a digital video file format?
What is the first step of the SDLC?
Problem identification
Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?
Query
Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place?
Real-time processing
Which topology tends to provide the fairest allocation of network resources?
Ring
Which of the following is an advantage of installing a client/server network in a business?
Sharing of peripherals
Which network cable type is most susceptible to signal interference?
UTP
Which of the following data-mining techniques is used to create charts and dashboards?
Visualization
The type of network that would be necessary to connect the networks of two college campuses would be:
WAN
Which of the following is the most secure security protocol used with routers?
WPA2
When is a flat database sufficient to use when organizing data?
When the data is simple and can be organized in one table
Which server would a client/server network include to ensure only authorized users are logging onto the network?
authentication
The process whereby users prove they have authorization to use a computer network is known as
authentication.
How the program should behave if the input data is invalid is part of
error handling.
A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as
fake news.
Sometimes groups of data packets are sent together in a package called a
frame
The first step when using object-oriented design is to
identify all of the categories of inputs that are part of the problem.
When someone uses your personal information to pose as you, this is
identity theft.
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
inoculation.
Encryption is used to
code your e-mail so only one person can decipher it
Which of the following would not cause interference or poor connectivity between nodes on a wireless network?
A wireless extender
Which is not a key component of a typical client/server network?
Bastion host
The set of instructions that define how to display the HTML elements in your site is
CSS
Which of the following is not considered metadata?
Database name
An IDE is a tool that has support for
Editing and debugging
Which of the following would NOT be a benefit of networking computers?
Sharing software licenses
The database programming language SQL stands for
Structured Query Language.
Which of the following are common to all programming languages?
Syntax, keywords, and operators
Which of the following does not determine the quality of a digital image?
The number of pixels in the camera lens
An applet is
a small application located on a server computer
IPv6 uses 128 bits to assign a(n)
address to every device connected to the internet
Computer viruses can be spread by
all of the above
In selecting the most appropriate language it is useful to know
all of the above
It is important to maintain your online reputation
all of the above
Which of the following is used to access the Internet when Wi-Fi is not available?
all of the above
Authentication techniques that rely on personal biological traits are called
biometrics.
Viruses that load from USB drives left connected to computers when computers are turned on are known as
boot-sector viruses.
Data captured as users navigate through a website is called
clickstream data.
You need to know how to program to
create unique software solutions for specialized problems.
Unnecessary duplication of data in a database is referred to as
data redundancy
The steps of the program development life cycle start with
describing the problem.
The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of
digital convergence
When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.
digitizing
Which of the following is an open electronic publishing format?
ePub
Using copyrighted works without permission of the copyright holder
is possible under the "fair use" doctrine.
A packet analyzer is called a sniffer because
it captures and reads data inside each packet.
HTTPS is different than HTTP because
it is a combination of HTTP and the Secure Sockets Layer (SSL)
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation (NAT)
A process to ensure that data in a database is organized most efficiently is called
normalization.
Java is considered to be architecture neutral because it
only needs to be compiled once and can run on many different CPUs.
A ______ is a program that takes complete control of your computer without your knowledge.
rootkit
A surge protector may look like just another power strip but it also can
save your device if a voltage spike is sent through the electrical system.
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability.
SMTP is the set of rules used to
send e-mail along the Internet to its destination
The information in a data packet includes
the data and the destination
A private key is important
to decode an encrypted message
The Internet is primarily funded by
your federal income taxes.