Final Exam Study Guide
Junk email is also known as ________. A) Spam B) Spim C) Malware D) Phishing
A) Spam
The desired output from the ________ phase of the SDLC is a list of requirements for a new system. A) analysis B) maintenance C) planning D) design
Analysis
To connect peripherals at short ranges, you would use the ________ wireless technology. A) Ultraviolet B) Bluetooth C) Infrared D) RFID
B) Bluetooth
The rules for communication between network devices are called ________. A) firewalls B) protocols C) packets D) domains
B) protocols
To secure your wireless network at home, you should ________. A) Back up the computers on the network B) Password-protect important document files C) set the SSID to CLOSED D) use wireless encryption with a difficult paraphrase
D) Use wireless encryption with a difficult passphrase
When a company pays people to hack into its own system, it calls in _______ hackers. A) Green-hat B) Black-hat C) gray-hat D) White-hat
D) White-hat
When using Windows to make changes, install hardware, or configure settings, you need to use _______ account on your computer. A) client B) guest C) Administrator D) Master
C) Administrator
Which cybercrime is considered to be a form of harassment? A) Pharming B) Click-jacking C) Cyber-Stalking D) Phishing
C) Cyber-stalking
Which of the following is NOT a common LAN topology? A) Star B) Bus C) Hierarchical D) Ring
C) Hierarchical
A network that covers a single geographic area is known as a ________. A) local area network (LAN) B) campus area network (CAN) C) metropolitan area network (MAN) D) wide area network (WAN)
C) Metropolitan area network (MAN)
Each computer is considered equal in a _________ network. A) client-server B) wide area C) virtual private D) peer-to-peer
D) peer-to-peer
Which of the following is not a method of cloud deployment? A) Hybrid B) Co-Channeled C) New Deployment D) Lift & Shift
Co-Channeled
Chapter 8
Communicating and Sharing the Social Web
A GIS can be used by local municipalities to _______. A) capture criminals B) budget for waste management facilities C) warn citizens of weather-related events D) design emergency routes
design emergency routes
In a database, title, author, publication date, and ISBN are all examples of _________. A) records B) fields C) tables D) queries
fields
All the information someone can find out about you by searching the web is called your ________. A) avatar B) folksonomy C) tagged information D) digital footprint
Digital Footprint
Chapter 9
Importance of Computer Networks
Which of the following is a method of synchronous online communication? A) Instant messaging B) Email C) Forum D) Newsgroup
Instant Messaging
A graphic view of an algorithm is called a ________. A) structure chart B) flowchart C) Venn diagram D) Gantt chart
Flowchart
The cyberbullying of one adult by another adult, using a computer is known as ______. A) Pharming B) Phishing C) Stalking D) Cyber-Harassment
D) Cyber-Harassment
An email is supposedly from your bank asking for your password so that it can troubleshoot your account is a form of_________. A) Pharming B) Cyber-stalking C) Cyberbullying D) Phishing
D) Phishing
Which statement about email is false? A) Copies of your email may exist on several servers even after the recipient deletes it. B) Your employer may read your email at your work. C) It cannot be accessed by hackers. D) Email can be used for targeted marketing.
It cannot be accessed by hackers.
A Facebook ________ is used to promote an organization, a product, or a service. A) Page B) Account C) profile D) user
Page
In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. A) analysis B) planning C) maintenance D) implementation
Planning
Which is the correct order of the phases in the SDLC? A) Requirements, analysis, design, implementation and testing, maintenance B) Requirements, planning, design, implementation, testing C) Planning, analysis, design, implementation and testing, maintenance D) Planning, requirements, design, implementation, testing
Planning, analysis, design, implementation and testing, maintenance
________ is an example of a microblogging site that allows a limited number of characters in a post. A) The Blogosphere B) Blogger C) Twitter D) Flickr
The SDLC, the traditional model for system development, is also called the ________ model. A) spiral B) whirlpool C) Gantt D) waterfall
Waterfall
An email claiming that you have won a lottery might be an example of ________. A) Cyberbullying B) Computer Fraud C) Cyber-stalking D) Cyber-harassment
B) Computer fraud
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. A) To B) Cc C) Subject D) Bcc
Bcc
In an office acceptable use policy (AUP), which of the following might be prohibited? A) Checking work email B) Purchasing business supplies online C) Logging into eBay D) Viewing an associate's calendar
C) Logging into eBay
A(n) ___________ improves over time by learning from its interactions. A) knowledge base B) cognitive computing system C) decision support system D) inference engine
cognitive computing system
An Excel spreadsheet is an example of a(n) ________ database. A) object-oriented B) flat C) relational D) hierarchical
flat
A _________ could be used to retrieve all the phone numbers from a student database. A) table B) record C) query D) form
query
Hacking to make a political statement is called ________. A) Politicking B) Sneaking C) Cracking D) Hacktivism
D) Hacktivism
A ________ contains the information for a single entity in the database. A) table B) record C) field D cell
Record
A _______ appears to be a legitimate program, but is actually something malicious. A) Trojan Horse B) Worm C) rootkit D) Botnet
A) Trojan horse
When you set up your wireless router, you should change the ______, which is also called the wireless network name. A) WAP B) SSID C) NAT D) WEP
B) SSID
You should use a(n) _______ account for everyday computing on a computer running Windows. A) Guest B) Standard C) Visitor D) Administrator
B) Standard
A company with offices in Buffalo and Seattle would use dedicated _______ lines to connect the two offices. A) PAN B) WLAN C) WAN D) MAN
C) WAN (wide area network)
Chapter 10
Security and Privacy
An email ________ is a block of text that is automatically put at the end of your messages. A) closing B) salutation C) identifier D) signature line
Signature Line
Fifth-generation programming languages are primarily used in ______ applications. A) binary B) SaaS C) artificial intelligence D) webpage
artificial intelligence
A data ________ defines the fields in a database and the type of data that each field contains. A) mine B) dictionary C) warehouse D) reference
dictionary
A doctor may use a(n) ________ to help diagnose an illness. A) knowledge base B) neural network C) expert system D) clone
expert system
Cloud Contraction enables the cloud tenant to: A) avoid costs associated with hardware upgrades B) lower the cost of their products when demand increases C) reduces resources when demand slows
reduce resources when demand slows
A data _______ rule would prevent a user from entering text in a date/time field. A) manipulation B) validation C) monitoring D) redundancy
validation
A database is a collection of _______ that has been organized in a meaningful way. A) spreadsheets B) files C) information D) documents
information
To ensure that a person does not misspell Wednesday in a field, a(n) _________ list can be used. A) lookup B) Find feature C) master D) inference
lookup
An expert system is a computer system programmed to __________. A) use SQL statements to respond to requests B) make decisions in real-life situations C) search the web for experts D) present possible decision outcomes
make decisions in real-life situations
Data in a ________ database are stored in data cubes. A) multidimensional B) relational C) hierarchical D) flat
multidimensional
Microsoft Office is an example of a(n) ________. A) geographical information system (GIS) B) office support system (OSS) C) transaction-processing system (TPS) D) Structured Query Language (SQL)
office support system (OSS)
To print data or display it in an easy-to-read format, a _______ can be used. A) report B) table C) record D) form
report
________ is a social network that is designed for business connections. A) Facebook B) Twitter C) LinkedIn D) Yahoo!
________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax. X) Quasicode B) Pseudocode C) Virtual code D) Structured code
Pseudocode
Quantum Computers utilize _______ instead of conventional binary switches. A) Rubrics B) Quantum switches C) Qubits D) RAM
Qubits
SaaS stands for: A) Security as a Service B) Software automatic augmentation Service C) Software as a Service D) Synchronization as a Service
Software as a Service
If you misspell a command word in a computer program, you have created a _______ error. A) runtime B) semantic C) syntax D) logic
Syntax
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. A) crowdresourcing B) wisdom of the crowd C) crowdsampling D) crowdreferencing
Wisdom of the crowd
The ________ database is the most popular type used by businesses. A) hierarchical B) relational C) multidimensional D) flat
relational
Knowledge engineers develop _______, which are programmed to make decisions in real life situations. A) fuzzy logic B) clones C) knowledge bases D) expert systems
Expert systems
What project was coordinated by the U.S. Department of Energy and National Institutes of Health? A) ARPANET B) Integrated Automated Fingerprint Identification System C) Combined DNA Index System D) Human Genome Project
Human Genome Project
In what phase of the SDLC does testing occur? A) Implementation B) Analysis C) Maintenance D) Design
Implementation
In what phase of the SDLC does user training take place? A) Analysis B) Planning C) Maintenance D) Implementation
Implementation
________ allows you to communicate with one or more people at a time. A) Instant messaging B) Really Simple Syndication (RSS) C) User-generated content D) Secure Sockets Layer (SSL)
Instant Messaging
Which of the following is a client-side programming technology? A) Perl B) PHP C) JavaScript D) ASP
JavaScript
A _________ error is an error in programming design that results in an unexpected outcome. A) syntax B) grammatical C) logic D) runtime
Logic
The SDLC follows the development of a system from planning to the final stage, ________. A) maintenance B) implementation C) analysis D) design
Maintenance
________ allows the user to selectively extract data from different viewpoints. A) An office support system (OSS) B) A transaction-processing system (TPS) C) Online analytical processing (OLAP) D) A decision support system (DSS)
Online analytical processing (OLAP)
Which of the following is NOT a SQL relational keyword? A) WHERE B) QUIT C) FROM D) SELECT
QUIT
________ sites let users evaluate hotels, movies, games, books, and other products and services. A) Social bookmarking B) Really Simple Syndication C) Captcha D) Social review
Social review
______ technology is used for sending email messages. A) Forward-and-push B) Store-and-forward C) Get-and-put D) Push-and-pull
Store-and-Forward
Which would make the best primary key in a table? A) Last name B) Student ID C) First name D) Street Address
Student ID
Which of the following IS NOT a reason to adopt the cloud? A) Reduction of operating costs B) Reduction of capital expenditures C) Quicker development D) Greater technical stability
*Greater technical stability
Which of the following is NOT true about Rapid Application Development? A) It begins with pre-defined requirements. B) It uses prototyping and user testing of the designs. C) Multiple prototypes are created. D) It uses object-oriented programming.
*It begins with pre-defined requirements.
When you enter your credit card information in a website, you know the website is encrypted when you see ______ in the address bar. A) https B) http C) shttp D) ssl
A) https
A _______ changes your home page and redirects you to other websites. A) Zombie B) Browser hijacker C) Rootkit D) Botnet
B) Browser hijacker
A ________ can be set by an employer to prevent you from accessing eBay. A) switch B) firewall C) router D) wireless access point
B) firewall
If you want to connect your home network to the Internet, you will need a _________ in addition to a modem. A) repeater B) router C) terminator D) switch
B) router
When one business provides services for another, it is a type of e-commerce called ________. A) C2B B) C2C C) B2B D) B2C
B2B
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. A) B2B B) C2A C) A2C D) B2C
B2C
Machine language is written in _______. A) binary B) C++ C) assembly language D) Java
Binary
A ________ is similar to an online journal, in which you can write about anything you want. A) bulletin B) log C) chronicle D) blog
Blog
Which statement about cookies is false? A) They are used by websites to identify you B) They are small text files C) They cannot collect information you do not want to share D) They can be installed without your knowledge
C) They cannot collect information you do not want to share
Employees who are travelling can connect securely to their office network through the Internet when a __________ has been established. A) PAN B) LAN C) VPN D) WLAN
C) VPN
_________ is the process of converting an algorithm into a language the computer can understand. A) Debugging B) Flowchart C) Coding D) Writing
Coding
The ________ is a set of five steps that a programmer follows to create a computer program. A) Software Design Lifecycle B) Program Development Cycle C) Program Design Lifecycle D) Computer Programming Cycle
Computer Programming Cycle
________ raises money from multiple small investors rather than a few large ones. A) Crowdresourcing B) Crowdborrowing C) Crowdfunding D) Crowdsourcing
Crowdfunding
Cloud governance includes: A) Monitoring, Security, Patching, Funding B) Installation, Monitoring & Deployment C) System Tuning, Database Administration, User Experience D) Monitoring, Management, Security, Finance E) All are part of governance
D) Monitoring, Management, Security, Finance
The part of the web that is encrypted and hidden is known as the ________. A) Deep web B) Surface web C) Clear web D) Dark web
Deepweb
In a transaction-processing system, ________ insures that transactions are either completed of not begun. A) consistency B) atomicity C) isolation D) durability
Durability
Which generation of programming language is closer to natural language but still requires some programming knowledge? A) Fourth-generation B) Third-generation C) Fifth-generation D) Second-generation
Fourth-generation
_________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question. A) Fuzzy logic B) An expert system C) A neural network D) Neural logic
Fuzzy logic
Which of the following is NOT a type of programming error? A) Syntax B) Runtime C) Logic D) Grammatical
Grammatical
In a blockchain, each block has a unique ________ that converts the data into an encrypted output of a fixed length. A) block B) chain C) code D) hash
Hash
The # symbol used by Twitter is called a(n) ________. A) hashtag B) avatar C) forum D) digital footprint
Hashtag
Which is a type of data that can be stored in an object-oriented database? A) Documents and spreadsheets B) Documents C) Spreadsheets D) Images, audio, and video
Images, audio, and video
In a database, a ________ stores data in rows and columns. A) field B) table C) cell D) matrix
table
C++ is an example of a ________ generation language. A) fourth B) fifth C) third D) second
third
__________ is responsible for addressing and routing packets of data to their destination. A) Internet Protocol B) FTP C) HTTP D) POP
A) Internet Protocol
What is not true about Twitter? A) Posts can be as long as you want. B) Posts are called Tweets. C) Twitter users have followers. D) Hashtags allow your posts to be searchable.
A) Posts can be as long as you want
Chapter 12
Program Development
Procedural programming involves _________. A) writing executable pseudocode B) defining objects and the actions that can be performed on them C) a step-by-step list of instructions D) drawing flowcharts to ensure that procedures are followed
A step-by-step list of instructions
A router is a form of security because it ________. A) Scans your email for malicious intent B) implements User Account Control (UAC) C) Scans webpages before displaying the content D) Acts like a firewall
D) Acts like a firewall
A _________ network is one that has at least one computer that provides centralized management, resources, and security. A) homegroup B) peer-to-peer C) workgroup D) client-server
D) Client-server
__________ is an unlawful attack on computers or networks done to intimidate a government A) Cybercrime B) Computer Fraud C) Cyber-Stalking D) Cyber-terrorism
D) Cyber-terrorism
________ is one of the largest online video-hosting sites in the world. A) Flickr B) OneDrive C) Skype D) YouTube
YouTube