CSI 103 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of broadband Internet offers connections nearing the speed of light? Fiber-optic DSL Satellite Cable

Fiber-optic

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility. (1 point) Windows Defender Recovery File History Windows Update

File History

Which of the following is not a category of intellectual property? (1 point) Trade dress Imprint Copyright Patent

Imprint

The collection of large national and international networks used to establish the Internet is called the (1 point) T1. Internet backbone. highway system. OC.

Internet backbone.

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? (1 point) Intranet VPN WAN PAN

Intranet

Reducing the sampling rate when digitizing a file has which effect on the file? (1 point) It decreases the file size It depends on the codec used to digitize the file It increases the file size It neither increases nor decreases the file size

It decreases the file size

Which of the following describes fiber-optic broadband? (1 point) It connects via an orbiting satellite It uses strands of pure glass or plastic. Speed drops as the distance from the main signal source increases. It connects with coaxial cable.

It uses strands of pure glass or plastic.

What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network? Modem and router Switch and hub Router and switch Router hub and switch

Modem and router

The type of database that would be best to store and organize data with feature and measure attributes is which of the following? (1 point) Relational database Multidimensional database Knowledge-based database Object-oriented database

Multidimensional database

A customer information table linked to a password table in a business database reflects which type of relationship? (1 point) One-to-many Many-to-one Many-to-many One-to-one

One-to-one

Which of the following is not one of the factors used in multi-factor authentication? (1 point) Knowledge Possession Identity Inherence

Possession

What is the first step of the SDLC? (1 point) Problem identification Analysis Design Development

Problem identification

Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use? (1 point) Filter Request Query Relationship

Query

Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place? (1 point) Batch processing Input processing Real-time processing All of the above

Real-time processing

Which topology tends to provide the fairest allocation of network resources? (1 point) VPN Star Bus Ring

Ring

Which network cable type is most susceptible to signal interference? (1 point) STP Coaxial Fiber-optic UTP

UTP

Which of the following data-mining techniques is used to create charts and dashboards? (1 point) Visualization Clustering Affinity grouping Classification

Visualization

The type of network that would be necessary to connect the networks of two college campuses would be: (1 point) LAN MAN WAN PAN

WAN

Which of the following is the most secure security protocol used with routers? (1 point) WPA2 WPA WEP WEP2

WPA2

How the program should behave if the input data is invalid is part of (1 point) beta testing. scope creep. process. error handling.

error handling.

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as (1 point) a persistence of information story. a public domain tale. fake news. an urban legend.

fake news.

Sometimes groups of data packets are sent together in a package called a (1 point) bridge. frame. MAC. protocol.

frame.

The first step when using object-oriented design is to (1 point) identify all of the categories of inputs that are part of the problem. select the data types that need to be used to solve the problem. identify which control structures are needed. break down the problem to a series of high-level tasks.

identify all of the categories of inputs that are part of the problem.

When someone uses your personal information to pose as you, this is (1 point) cybersecurity. identity theft. a backdoor rootkit. white-hat hacking.

identity theft.

Which of the following would not cause interference or poor connectivity between nodes on a wireless network? (1 point) Concrete walls Some appliances Nodes that are too far apart A wireless extender

A wireless extender

Which of the following is not a digital video file format? (1 point) MPEG-4 AVI WMV PDF

AVI

Which server would a client/server network include to ensure only authorized users are logging onto the network? (1 point) Cloud Authentication Application Communications

Authentication

Which is not a key component of a typical client/server network? (1 point) Transmission media Network navigation devices Network interface card Bastion host

Bastion host

The set of instructions that define how to display the HTML elements in your site is (1 point) AJAX. CSS. XML. PHP.

CSS.

Which of the following is not considered metadata? (1 point) Field name Data type Database name Field size

Database name

Which of the following is an advantage of installing a client/server network in a business? (1 point) Centralization of network adapters Sharing of peripherals Decentralization of files and data Decentralization of peripherals

Sharing of peripherals

The database programming language SQL stands for (1 point) Selected Query Launch. Structured Question Lingo. Structured Query Language. Simple Quick Language.

Structured Query Language.

Which of the following are common to all programming languages? (1 point) SDLC and PDLC Syntax, keywords, and operators JSON and APIs Architecture neutrality

Syntax, keywords, and operators

Which of the following does not determine the quality of a digital image? (1 point) File format and compression used The number of pixels in the camera lens Resolution of the camera Image sensor size

The number of pixels in the camera lens

When is a flat database sufficient to use when organizing data? (1 point) When the data needs to be organized into two or more tables When the data is simple and can be organized in one table When more than one person needs to access the data When the data includes video and audio

When the data is simple and can be organized in one table

An applet is (1 point) a hardware device that encrypts e-mail messages. a programming language used to help create dynamic web pages. a small application located on a server computer. a program distributed by Apple Inc.

a small application located on a server computer.

IPv6 uses 128 bits to assign a(n) (1 point) memory address to the CPU. data packet to each transmission. address to every device connected to the Internet. destination Internet address to each e-mail.

address to every device connected to the Internet.

Computer viruses can be spread by (1 point) sharing flash drives. downloading and running a file attached to an email. downloading a song from a peer-to-peer sharing site. all of the above

all of the above

In selecting the most appropriate language it is useful to know (1 point) how quickly the final code must run. how much space the final code delivered can occupy. if there is a specific target environment (say, a specific operating system). all of the above

all of the above

It is important to maintain your online reputation (1 point) because of the persistence of information. because employers often review social media before hiring employees. to ensure information about you is accurate. all of the above

all of the above

Which of the following is used to access the Internet when Wi-Fi is not available? mobile hotspot 4G LTE Internet access 3G Internet access all of the above

all of the above

The process whereby users prove they have authorization to use a computer network is known as (1 point) repudiation. decentralization. authentication. proxy control.

authentication.

2) Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have? a) Client/server network b) P2P network c) Both a and b d) Neither a nor b

b) P2P network

Authentication techniques that rely on personal biological traits are called (1 point) botnets. biometrics. Trojan horses. scanners.

biometrics.

Viruses that load from USB drives left connected to computers when computers are turned on are known as (1 point) polymorphic viruses. script viruses. encryption viruses. boot-sector viruse

boot-sector viruse

1) Which of the following would NOT be a benefit of networking computers? a) Sharing printers and other peripherals b) Sharing an internet connection c) Sharing software licenses d)Sharing files

c) Sharing software licenses

Data captured as users navigate through a website is called (1 point) time-variant data. web-user data. clickstream data. staged data.

clickstream data.

Encryption is used to (1 point) code your e-mail so only one person can decipher it. make shopping on the Internet more available. shrink the amount of space it takes to store e-mail. transfer e-mail more quickly.

code your e-mail so only one person can decipher it.

You need to know how to program to (1 point) use Microsoft Word to type text and select various fonts. create unique software solutions for specialized problems. open a template file for budgeting in Microsoft Excel. create animations in PowerPoint.

create unique software solutions for specialized problems.

1) Unnecessary duplication of data in a database is referred to as (1 point) data inconsistency. validated data. normalized data. data redundancy.

data redundancy.

The steps of the program development life cycle start with (1 point) testing. algorithm development. describing the problem. coding.

describing the problem.

The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of (1 point) digital cohesion. digital combination. digital convergence. digital collusion.

digital convergence.

When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data. (1 point) upstreaming digitizing streamlining compressing

digitizing

Which of the following is an open electronic publishing format? (1 point) azw ePub PDF SMS

ePub

An IDE is a tool that has support for (1 point) flowcharting and creating the project specification. editing and debugging. releasing updates to the public. scope creep.

editing and debugging.

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called (1 point) updating. inoculation. signature. quarantine.

inoculation.

Using copyrighted works without permission of the copyright holder (1 point) is possible under the "fair use" doctrine. is only possible for photographs of public places. only applies to proprietary software. is never possible.

is possible under the "fair use" doctrine.

A packet analyzer is called a sniffer because (1 point) it detects high-speed transmissions. it filters out spam. it captures and reads data inside each packet. it starts a denial-of-service attack.

it captures and reads data inside each packet.

HTTPS is different than HTTP because (1 point) it stores data in the data warehouse. it is a combination of HTTP and the Secure Sockets Layer (SSL). of how it transforms or reformats the data. it extracts data from source databases.

it is a combination of HTTP and the Secure Sockets Layer (SSL).

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are. (1 point) packet filtering VPN port blocking network address translation (NAT)

network address translation (NAT)

A process to ensure that data in a database is organized most efficiently is called (1 point) normalization. centralization. data staging. integration.

normalization.

Java is considered to be architecture neutral because it (1 point) can run in any browser. can be recompiled to run on many CPUs. can run on many different generations of Windows. only needs to be compiled once and can run on many different CPUs.

only needs to be compiled once and can run on many different CPUs.

A ______ is a program that takes complete control of your computer without your knowledge. (1 point) VPN sniffer rootkit botnet

rootkit

A surge protector may look like just another power strip but it also can (1 point) detect viruses. help manage heat. prevent theft. save your device if a voltage spike is sent through the electrical system.

save your device if a voltage spike is sent through the electrical system.

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network (1 point) scalability. decentralization. topology. flexibility.

scalability.

SMTP is the set of rules used to (1 point) encrypt e-mail messages. send e-mail along the Internet to its destination. make shopping on the Internet more available. shrink the amount of space it takes to store e-mail.

send e-mail along the Internet to its destination.

The information in a data packet includes (1 point) different types of information depending on the type of message being sent. just the data. the data and the circuit identifier. the data and the destination.

the data and the destination.

A private key is important (1 point) to decode an encrypted message. because it enables you to use MIME. to reboot system hardware. to reset your public key if you lose a password.

to decode an encrypted message.

The Internet is primarily funded by (1 point) your state income taxes. voluntary contributions. Google. your federal income taxes.

your federal income taxes.


Conjuntos de estudio relacionados

OSHA'S Bloodborne Pathogens Standards

View Set

CCNA 1 V7 Modules 8-10: Study Set

View Set

Chapter 7: Other Criminal Defenses

View Set

Essential of Healthcare Compliance

View Set