Info Tech Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which would make the best primary key in a table? A) Last name B) Student ID C) First name D) Street Address

B) Student ID

Microsoft Office is an example of a(n) ________. A) geographic information system (GIS) B) office support system (OSS) C) transaction-processing system (TPS) D) Structured Query Language (SQL)

B) office support system (OSS)

When a company pays people to hack into its own system, it calls in ________ hackers. A) green-hat B) black-hat C) gray-hat D) white-hat

D) white-hat

When you buy a textbook online from Amazon.com, you are participating in ________ e commerce. A) B2B B) C2A C) A2C D) B2C

D) B2C

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. A) To B) Cc C) Subject D) Bcc

D) Bcc

________ is an unlawful attack on computers or networks done to intimidate a government or its people. A) Cybercrime B) Computer fraud C) Cyber-stalking D) Cyber-terrorism

D) Cyber-terrorism

________ sites let users evaluate hotels, movies, games, books, and other products and services. A) Social bookmarking B) Really Simple Syndication C) Captcha D) Social review

D) Social review

The part of the web that is encrypted and hidden is known as the ________. A) deep web B) surface web C) clear web D) dark web

D) dark web

In blockchain, each block has a unique ________ that converts the data into an encrypted output of a fixed length. A) block B) chain C) code D) hash

D) hash

Which of the following is not true about Rapid Application Development? A) It begins with pre-defined requirements. B) It uses prototyping and user testing of the designs. C) Multiple prototypes are created. D) It uses object-oriented programming.

A) It begins with pre-defined requirements.

A ________ appears to be a legitimate program, but is actually something malicious. A) Trojan horse B) worm C) rootkit D) botnet

A) Trojan horse

To connect peripherals at short ranges, you would use the ________ wireless technology. A) Ultraviolet B) Bluetooth C) Infrared D) RFID

B) Bluetooth

Which of the following is not a method of cloud deployment A) Hybrid B) Co-Channeled C) New Deployment D) Lift & Shift

B) Co-Channeled

The ________ is a set of five steps that a programmer follows to create a computer program. A) Software Design Lifecycle B) Program Development Cycle C) Program Design Lifecycle D) Computer Programming Cycle

B) Program Development Cycle

________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax. A) Quasicode B) Pseudocode C) Virtual code D) Structured code

B) Pseudocode

Which of the following is not a SQL relational keyword? A) WHERE B) QUIT C) FROM D) SELECT

B) QUIT

When you set up your wireless router, you should change the ________, which is also called the wireless network name. A) WAP B) SSID C) NAT D) WEP

B) SSID

Fifth-generation programming languages are primarily used in ________ applications. A) binary B) SaaS C) artificial intelligence D) webpage

B) SaaS

________ technology is used for sending email messages. A) Forward-and-push B) Store-and-forward C) Get-and-put D) Push-and-pull

B) Store-and-forward

In a transaction-processing system, ________ insures that transactions are either completed or not begun. A) consistency B) atomicity C) isolation D) durability

B) atomicity

A ________ changes your home page and redirects you to other websites. A) zombie B) browser hijacker C) rootkit D) botnet

B) browser hijacker

An email claiming that you have won a lottery might be an example of ________. A) cyberbullying B) computer fraud C) cyber-stalking D) cyber-harassment

B) computer fraud

A data ________ defines the fields in a database and the type of data that each field contains. A) mine B) dictionary C) warehouse D) reference

B) dictionary

In a database, title, author, publication date, and ISBN are examples of ________. A) records B) fields C) tables D) queries

B) fields

A ________ can be set by an employer to prevent you from accessing eBay. A) switch B) firewall C) router D) wireless access point

B) firewall

An Excel spreadsheet is an example of a(n) ________ database. A) object-oriented B) flat C) relational D) hierarchical

B) flat

A graphic view of an algorithm is called a ________. A) structure chart B) flowchart C) Venn diagram D) Gantt chart

B) flowchart

A ________ contains the information for a single entity in the database. A) table B) record C) field D) cell

B) record

The ________ database is the most popular type used by businesses. A) hierarchical B) relational C) multidimensional D) flat

B) relational

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem. A) repeater B) router C) terminator D) switch

B) router

You should use a(n) ________ account for everyday computing on a computer running Windows. A) guest B) standard C) visitor D) administrator

B) standard

A ________ network is one that has at least one computer that provides centralized management, resources, and security. A) homegroup B) peer-to-peer C) workgroup D) client-server

D) client-server

X) The cyberbullying of one adult buy another adult, using a computer is known as ________. A) pharming B) phishing C) stalking D) cyber-harassment

D) cyber-harassment

All the information someone can find out about you by searching the web is called your ________. A) avatar B) folksonomy C) tagged information D) digital footprint

D) digital footprint

Knowledge engineers develop ________, which are programmed to make decisions in real life situations. A) fuzzy logic B) clones C) knowledge bases D) expert systems

D) expert systems

Each computer is considered equal in a ________ network. A) client-server B) wide area C) virtual private D) peer-to-peer

D) peer-to-peer

The SDLC, the traditional model for system development, is also called the ________ model. A) spiral B) whirlpool C) Gantt D) waterfall

D) waterfall

Which cybercrime is considered to be a form of harassment? A) Pharming B) Clickjacking C) Cyber-stalking D) Phishing

C) Cyber-stalking

Which of the following is not a common LAN topology? A) Star B) Bus C) Hierarchical D) Ring

C) Hierarchical

In an office acceptable use policy (AUP), which of the following might be prohibited? A) Checking work email B) Purchasing business supplies online C) Logging in to eBay D) Viewing an associate's electronic calendar

C) Logging in to eBay

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer. A) client B) guest C) administrator D) master

C) administrator

A network that covers a single geographic area is known as a ________. A) local area network (LAN) B) campus area network (CAN) C) metropolitan area network (MAN) D) wide area network (WAN)

C) metropolitan area network (MAN)

________ allows you to communicate with one or more people at a time. A) Instant messaging B) Really Simple Syndication (RSS) C) User-generated content D) Secure Sockets Layer (SSL)

A) Instant messaging

A Facebook ________ is used to promote an organization, a product, or a service. A) Page B) Account C) profile D) user

A) Page

What is not true about Twitter? A) Posts can be as long as you want. B) Posts are called Tweets. C) Twitter users have followers. D) Hashtags allow your posts to be searchable.

A) Posts can be as long as you want.

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar. A) https B) http C) shttp D) ssl

A) https

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. A) lookup B) Find feature C) master D) inference

A) lookup

The SDLC follows the development of a system from planning to the final stage, ________. A) maintenance B) implementation C) analysis D) design

A) maintenance

A(n) ________ improves over time by learning from its interactions. A) knowledge base B) cognitive computing system C) decision support system D) inference engine

B) cognitive computing system

The rules for communication between network devices are called ________. A) firewalls B) protocols C) packets D) domains

B) protocols

In a database, a ________ stores data in rows and columns. A) field B) table C) cell D) matrix

B) table

________ raises money from multiple small investors rather than a few large ones. A) Crowdresourcing B) Crowdborrowing C) Crowdfunding D) Crowdsourcing

C) Crowdfunding

Which of the following is a client-side programming technology? A) Perl B) PHP C) JavaScript D) ASP

C) JavaScript

________ is a social network that is designed for business connections. A) Facebook B) Twitter C) LinkedIn D) Yahoo!

C) LinkedIn

________ allows the user to selectively extract data from different viewpoints. A) An office support system (OSS) B) A transaction-processing system (TPS) C) Online analytical processing (OLAP) D) A decision support system (DSS)

C) Online analytical processing (OLAP)

SaaS stands for: A) Security as a Service B) Software automatic augmentation Service C) Software as a Service D) Synchronization as a Service

C) Software as a Service

Which statement about cookies is false? A) They are used by websites to identify you. B) They are small text files. C) They cannot collect information you do not want to share. D) They can be installed without your knowledge.

C) They cannot collect information you do not want to share.

________ is an example of a microblogging site that allows a limited number of characters in a post. A) The Blogosphere B) Blogger C) Twitter D) Flickr

C) Twitter

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. A) PAN B) LAN C) VPN D) WLAN

C) VPN

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices. A) PAN B) WLAN C) WAN D) MAN

C) WAN

Procedural programming involves ________. A) writing executable pseudocode B) defining objects and the actions that can be performed on them C) a step-by-step list of instructions D) drawing flowcharts to ensure that procedures are followed

C) a step-by-step list of instructions

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health? A) ARPANET B) Integrated Automated Fingerprint Identification System C) Combined DNA Index System D) Human Genome Project

D) Human Genome Project

Which is a type of data that can be stored in an object-oriented database? A) Documents and spreadsheets B) Documents C) Spreadsheets D) Images, audio, and video

D) Images, audio, and video

In what phase of the SDLC does user training take place? A) Analysis B) Planning C) Maintenance D) Implementation

D) Implementation

________ is responsible for addressing and routing packets of data to their destination. A) Internet Protocol B) FTP C) HTTP D) POP

D) POP

________ is one of the largest online video-hosting sites in the world. A) Flickr B) OneDrive C) Skype D) YouTube

D) YouTube

A router is a form of security because it ________. A) scans your email for malicious content B) implements User Account Control (UAC) C) scans webpages before displaying the content D) acts like a firewall

D) acts like a firewall

A ________ is similar to an online journal, in which you can write about anything you want to share. A) bulletin B) log C) chronicle D) blog

D) blog

The desired output from the ________ phase of the SDLC is a list of requirements for a new system. A) analysis B) maintenance C) planning D) design

D) design

A GIS can be used by local municipalities to ________. A) capture criminals B) budget for waste management facilities C) warn citizens of weather-related events D) design emergency routes

D) design emergency routes

Hacking to make a political statement is called ________. A) politicking B) sneaking C) cracking D) hacktivism

D) hacktivism

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________. A) pharming B) cyber-stalking C) cyberbullying D) phishing

D) phishing

To secure your wireless network at home, you should ________. A) back up the computers on the network B) password-protect important document files C) set the SSID to CLOSED D) use wireless encryption with a difficult passphrase

D) use wireless encryption with a difficult passphrase

In what phase of the SDLC does testing occur? A) Implementation B) Analysis C) Maintenance D) Design

A) Implementation

Which of the following is a method of synchronous online communication? A) Instant messaging B) Email C) Forum D) Newsgroup

A) Instant messaging

A data ________ rule would prevent a user from entering text in a date/time field. A) manipulation B) validation C) monitoring D) redundancy

B) validation

An email ________ is a block of text that is automatically put at the end of your messages. A) closing B) salutation C) identifier D) signature line

D) signature line

Which statement about email is false? A) Copies of your email may exist on several servers even after the recipient deletes it. B) Your employer may read your email at your work. C) It cannot be accessed by hackers. D) Email can be used for targeted marketing.

A) Copies of your email may exist on several servers even after the recipient deletes it.

Which generation of programming languages is closer to natural language but still requires some programming knowledge? A) Fourth-generation B) Third-generation C) Fifth-generation D) Second-generation

A) Fourth-generation

________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question. A) Fuzzy logic B) An expert system C) A neural network D) Neural logic

A) Fuzzy logic

Machine language is written in ________. A) binary B) C++ C) assembly language D) Java

A) binary

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________. A) crowdsourcing B) wisdom of the crowd C) crowdsampling D) crowdreferencing

A) crowdsourcing

The # symbol used by Twitter is called a(n) ________. A) hashtag B) avatar C) forum D) digital footprint

A) hashtag

Data in a ________ database are stored in data cubes. A) multidimensional B) relational C) hierarchical D) flat

A) multidimensional

To print data or display it in an easy-to-read format, a ________ can be used. A) report B) table C) record D) form

A) report

Junk email is also known as ________. A) spam B) spim C) malware D) phishing

A) spam

An expert system is a computer programmed to ________. A) use SQL statements to respond to requests B) make decisions in real-life situations C) search the web for experts D) present possible decision outcomes

B) make decisions in real-life situations

In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. A) analysis B) planning C) maintenance D) implementation

B) planning

When one business provides services for another, it is a type of e-commerce called ________. A) C2B B) C2C C) B2B D) B2C

C) B2B

________ is the process of converting an algorithm into a language the computer can understand. A) Debugging B) Flowcharting C) Coding D) Writing

C) Coding

Which is the correct order of the phases in the SDLC? A) Requirements, analysis, design, implementation and testing, maintenance B) Requirements, planning, design, implementation, testing C) Planning, analysis, design, implementation and testing, maintenance D) Planning, requirements, design, implementation, testing

C) Planning, analysis, design, implementation and testing, maintenance

Quantum Computers utilize ________ instead of conventional binary switches A) Rubrics B) Quantum switches C) Qubits D) RAM

C) Qubits

Which of the following IS NOT a reason to adopt the cloud A) Reduction of operating costs B) Reduction of capital expenditures C) Quicker development D) Greater technical stability

C) Quicker development

A doctor may use a(n) ________ to help diagnose an illness. A) knowledge base B) neural network C) expert system D) clone

C) expert system

A database is a collection of ________ that has been organized in a meaningful way. A) spreadsheets B) files C) information D) documents

C) information

A ________ error is an error in programming design that results in an unexpected outcome. A) syntax B) grammatical C) logic D) runtime

C) logic

A ________ could be used to retrieve all the phone numbers from a student database. A) table B) record C) query D) form

C) query

If you misspell a command word in a computer program, you have created a ________ error. A) runtime B) semantic C) syntax D) logic

C) syntax

C++ is an example of a ________-generation language. A) fourth B) fifth C) third D) second

C) third

Which of the following is not a type of programming error? A) Syntax B) Runtime C) Logic D) Grammatical

D) Grammatical

Cloud governance includes: A) Monitoring, Security Patching, Funding B) Installation, Monitoring & Deployment C) System Tuning, Database Administration, User Experience D) Monitoring, Management, Security, Finance E) All are part of governance

E) All are part of governance


Conjuntos de estudio relacionados

NASM CH 23 Chronic health conditions

View Set

Sx Exam 2 Chapters 3, 4, 5, 6 COPY (CORRECTED FORMAT FOR MULTIPLE CHOICE Q'S)

View Set

IRB The Federal Regulations - SBE

View Set

Solving Quadratic Equations by Factoring, Quadratic equations, Factoring and Solving Quadratics, Solving Quadratic Equations by Graphing, Solving Quadratic Equations and the Quadratic Formula

View Set

Chapter 14: Health, Illness, and the Body

View Set

AP Psychology Part A (All Quizzes)

View Set

Patho Chapter 33: Alterations in Female and Male Reproductive System

View Set

Ch.17 - Accounting for Income Taxes

View Set