IT 104 FINAL PRACTICE 1
_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials. Additive manufacturing Remote printing Mainstream manufacturing Prototyping
Additive manufacturing
A separation alarm consists of two small devices; you attach one to your computer and place the other somewhere close to you. If the two devices are separated, what will happen? An alarm will sound. You will get an email alert. The computer will be disabled. The protection lock will engage.
An alarm will sound.
_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN. C++ C C# BASIC
BASIC
Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies? FORTRAN RPG BASIC COBOL
COBOL
_____ is a risk mostly when working inside a computer and directly touching the circuit boards. Electrostatic discharge (ESD) Power conditioning (PC) Static conditioning (SC) Surge discharge (SD)
Electrostatic discharge (ESD)
True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."
False
True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.
False
True or False: Query tools are used to design and test data tables in a database.
False
A disaster recovery plan typically does not answer which of these questions? What storage-level appliances or drives will be used? Where will data backups be stored? What data backup procedures will be followed? How will users' identities be confirmed?
How will users' identities be confirmed?
Which of the following statements does not describe pseudocode? It's a useful tool for organizing the way a programmer thinks about a solution. It involves envisioning a project in its entirety to identify the larger elements that must be handled first. It's a formally styled natural language, not a programming language. It's used to write algorithms.
It involves envisioning a project in its entirety to identify the larger elements that must be handled first.
Which of these statements defines the term modularity? It's a measurement of how well the source code is divided into individual modules. It's a technique that prevents data from being altered during program execution. It's a way of breaking a large problem into smaller, more manageable pieces. It's a fixed, well-defined segment of a program.
It's a measurement of how well the source code is divided into individual modules.
_____ merges augmented aspects of real and virtual worlds. Augmented reality Virtual reality Mixed reality Limited reality
Mixed reality
In _____, the user builds the query by selecting one or more tables to query, adding the fields to display in the results in a query grid, and then entering the entry to match or other criteria in applicable fields. Access Query by Example (QBE) SELECT Structured Query Language (SQL)
Query by Example (QBE)
Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces. Exchange Exchange Online SharePoint Office 365
SharePoint
The term _____ refers to software that's delivered on demand from the cloud (the internet) via a web browser. Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Email as a Service (EaaS) Software as a Service (SaaS)
Software as a Service (SaaS)
What does the abbreviation SQL stand for? Selected Query Links Systematic Query Language Specific Query Location Structured Query Language
Structured Query Language
For a database that stores students' grades, which of the following fields could be designated as a primary key? StudentName StudentID StudentGPA StudentAddress
StudentID
_____ processing occurs when the database updates immediately for each input. Immediate Batch Transactional Input
Transactional
True or False: A report presents output from a data table or query in an easy-to-read format.
True
_____ software can create multiple distinct operating servers that run simultaneously on a single physical server machine, effectively turning that one server into two or more. Server update Virtualization Syncing Upload
Virtualization
Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm
a Trojan horse
What is a smart card? a plastic card that has all of a person's user names and passwords recorded on it a plastic card that's used to make purchases by drawing funds from a bank account a plastic card that contains a computer chip with stored information a plastic card that's used to purchase items on credit
a plastic card that contains a computer chip with stored information
Third-party cookies are created by which of the following? the site you are visiting an ad on a site your marketing profile your browser's settings
an ad on a site
Which of the following is not an example of a database object? a form a report an attribute a data filter
an attribute
What is an online predator? an individual who posts dangerous information online an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth an individual who lacks the judgment to leave or avoid offensive websites an individual who texts and sends harassing email messages and posts embarrassing photos
an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth
People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities. visual perception audio perception stereoscopic mental interface
audio perception
Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees
authorized users; sender and receiver
Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees
authorized users; sender and receiver
You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files. restore system update system external storage system backup system
backup system
Which of the following types of data processing takes place at a scheduled time or at a critical point in a process? up-to-date processing transaction processing scheduled processing batch processing
batch processing
During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. testing harness alpha product gold release beta version
beta version
Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. smart card biometric identifier tracking system user name and password
biometric identifier
The abbreviation B2C stands for which type of e-commerce? buyer-to-company business-to-consumer business-to-client bidder-to-closer
business-to-consumer
In this screenshot of the Slack collaboration platform, officebot is an example of a(n) robot. expert system. digital interface. chatbot.
chatbot.
When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. restore reserve replace check out
check out
A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. cloud management supplementation cloud bursting cloud transitioning
cloud bursting
Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? completeness check range check consistency check alphanumeric check
completeness check
A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. consumer database e-commerce report consumer profile marketing strategy
consumer profile
Java has _____, which means it can run on nearly any operating system. nonprocedural language communication facilitation scripting language cross-platform compatibility
cross-platform compatibility
About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council hate speech cyberbullying social media engagement pornography
cyberbullying
Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent data corruption. data redundancy. data updates. data integrity.
data corruption.
A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios. connectivity data modeling Gantt charts telematics
data modeling
Which of the following terms refers to the activities performed with a database? data designing data specialization data management data processing
data processing
This screen shot illustrates a customers _____, which was created in Microsoft Access. data table report transaction record
data table
Using which of the following techniques ensures that users enter correct and complete data into the system? data contamination data integrity data validation data normalization
data validation
Unlike an operational database, a(n) _____ doesn't change or delete the information it stores on an ongoing basis. data warehouse information system inventory database distributed database
data warehouse
A _____ is a collection of data organized in one or more tables stored on a computer. database presentation spreadsheet document
database
Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database editing database monitoring database operations database administration
database administration
Many divisions of the US government make _____ available for free online, including through the portal Data.gov. field names metadata datasets data filters
datasets
The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times. authentication deduplication archive restoration
deduplication
Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). testing implementation design proposal and planning
design
Hand-eye coordination, which is related to tactile perception, is called balance. mobility. navigation. dexterity
dexterity
Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM). program copying prevention (PCP). new-age copyright management (NACM). Sony BMG.
digital rights management (DRM).
A password is considered strong if it's a common word, such as Password. easy to remember but hard to guess. easy to remember because it's obvious, such as a pet's name. hard to remember and easy to guess.
easy to remember but hard to guess.
In a store or restaurant, the cash register system and supporting information system (IS) software and systems are commonly referred to as the distribution management system. electronic control system. product logistics system. electronic point of sale system.
electronic point of sale system.
To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted. verification corruption transmission encryption
encryption
The principles a person uses to determine right and wrong and to guide his or her choices and actions are called traditions. laws. ethics. guidelines.
ethics.
True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.
false
A _____ cookie is created by the actual website a user visits. first-party global second-party third-party
first-party
A _____ cookie is created by the actual website a user visits. first-party global second-party third-party
first-party
Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. hacking decoding compiling debugging
hacking
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. software robot genetic algorithm knowledge engineer inference engine
inference engine
A business's decisions and actions often depend on the decisions and actions of others; this fundamental business characteristic is termed interdependence. internal dependence. intrabusiness. independence.
interdependence
The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. data centers; your local computer internet-based resources; your local computer your local computer; internet-based resources your local computer; data centers
internet-based resources; your local computer
This graphic illustrates the _____ process, which matches data from fields in the specified data tables. exchanging connecting joining data browsing
joining
A(n) _____ is the amount of energy required to sustain one watt for one second. joule amp ohm megawatt
joule
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction
key
An alphanumeric check allows only _____ to be entered. letters of the alphabet and digits symbols such as dollar signs numeric data such as birth dates credit card numbers
letters of the alphabet and digits
A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. multidimensional; cube hybrid; model object-oriented; object multidimensional; block
multidimensional; cube
Random variations of algorithms are called inferences. mutations. data masses. crossovers.
mutations.
A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it. nonprocedural assembly markup legacy programming
nonprocedural
In object-oriented programming (OOP), a(n) _____ is a module. macro function routine object
object
After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. preventive perfective adaptive corrective
perfective
Which of the following is not a common type of data model? XML multimedia personal object-oriented
personal
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. perfective corrective preventive adaptive
preventive
Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as just-in-time (JIT) manufacturing. operational streamlining. procurement. supply chain management (SCM).
procurement.
A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online. fast information (FI) quick response (QR) speedy review (SR) rapid reply (RR)
quick response (QR)
A _____ program can seize control of a computer until the user agrees to the attacker's demands hijacking boot sector ransomware multipartite
ransomware
To restore lost data, the database administrator can do a _____ using the most recent backup, which typically contains the most recent and accurate data. recovery reboot compatibility check reconciliation
recovery
Tendinitis and carpal tunnel syndrome are two common types of ergonomic distress. repetitive distress syndromes. arthritis. repetitive stress injuries
repetitive stress injuries
It may be appropriate for different assets to have different _____ levels and different types of security protection. threat authentication risk tolerance sensitivity
risk tolerance
Which of the following terms refers to a section of a program created to handle a specific group of instructions? code routine mode structure
routine
A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. online shopping mall shopping agent online catalog e-tailer
shopping agent
A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. plastic tablet snap smart
smart
Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. special projects lab collaboration lab elite operations group project team
special projects lab
A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).
standard operating procedure (SOP).
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip spike protector power adapter surge suppressor
surge suppressor
A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems engineer business systems analyst software engineer information technician
systems engineer
Why does the IT staff perform corrective maintenance on an information system? to address other environment changes to enhance the software to meet new requirements to identify and fix errors to increase reliability and ease of maintenance
to identify and fix errors
True or False: A field name is a unique name assigned to a field.
true
True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.
true
Most computers come with a basic one-year _____ against manufacturing defects for no additional charge breakage insurance plan premium support plan warranty extended protection plan
warranty
A _____ uses or teaches hacking skills in order to be helpful and promote good security practices. black-hat hacker white-hat hacker terrorist programmer
white-hat hacker