ITE 152 - Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is a query?

A question you ask a database

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

Which of the following requests to Alexa is most likely to get the desired result?

Alexa, play Journey songs on Pandora.

Which of the following is a way to sort data?

All of the above (Alphabetically, Numerically, Chronologically)

What are the different views to display a table?

All of the above (Pivot Table & Pivot Chart View, Datasheet View, Design View)

Which of the following is NOT an example of modern-day artificial intelligence (AI) application?

Asking droids for critical information during a hyper-space mission

_____ ensures that the person requesting access to a computer is not an imposter.

Authentication

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?

Be cautious about what information she posts.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?

Bluetooth connection

Queries in access can be used

Both 'a' and 'b' (as a source of records for forms and reports, to view, change and analyze data in different ways)

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?

Broad network access

Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike?

C2C

Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.

CRM

Which company most likely relies almost solely on B2B transactions in their course of business?

Chemical supply company

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

Which data type would be best suited to a field that lists a product's clearance price?

Currency

Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?

Customer service representative

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

Cyberbullying

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Conducting a staff meeting online so employees from around the globe can join the discussion is an example of _____________.

E-Business

Which of the following is LEAST likely to be a field in a Customers table?

EmploymentDate

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

A Trojan is a malicious program that uses a computer network to replicate.

False

All cloud technologies must be accessed over the Internet.

False

Databases typically store their data in one big table.

False

Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information.

False

One disadvantage of computerized databases is that they limit your ability to arrange information.

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

False

To prevent a laptop from being stolen, you can use a surge protector.

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.

False

All the pet names in a veterinarian's database are stored in a _______ called PetName.

Field

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________.

Field

What are the columns in a Microsoft Access table called?

Fields

Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records?

Forms

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type?

Graduated

Which of the following is the strongest password?

H@veAGr3atDaY!

Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?

HIPAA

Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?

He can remotely collaborate with teammates on projects, deadlines, and events.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps.

What does a filter do?

Hide records from view

Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?

High-quality product photos

Which data type would be best suited to a field that lists customer email addresses?

Hyperlink

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?

IaaS

Which kind of cloud service requires the most technical skill to use?

IaaS

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?

It will make the AI system sound more human

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply.

Which of the following is a characteristic of a strong password?

Letters, numbers, and symbols

Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her?

Mason said one of Alexa's wake words.

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

Omnichannel strategy

Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?

Online storefront

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

Pretexting

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key?

ProductID

Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment?

Rapid elasticity

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?

Receiving clerk

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?

Reinforcement learning

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?

SaaS

How can you get the attention of a personal assistant app on your phone?

Say the wake word.

Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result?

Smallest to largest

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message.

What does SQL stand for?

Structured Query Language

Which field could serve as the primary key for a list of students in your school?

Student ID number

Contact information for all the people taking a class at a school are stored in a ________ called Students.

Table

In a database, each _________________ contains a collection of related data.

Table (?)

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem?

The table is filtered.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

A computerized database can store millions of telephone numbers.

True

A database is a collection of related information, but a database management system is a type of software program.

True

A database is an organized collection of information.

True

A field's data type determines what kind of information can be stored there.

True

A query lets you speed up the browsing process by finding information that matches specifically to your criteria.

True

Cloud computing and the Internet are two different technologies.

True

Many chatbot services provide support to employees and management rather than to customers.

True

A relationship is created between how many tables?

Two

What type of security requires something you know and something you have that no one else has?

Two factor authentication

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar?

Vendors

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

Video conferencing application

Which of the following is NOT a leading provider of PaaS and IaaS services?

Walmart

Which of the following is NOT a part of a database?

Worksheets

In which of the following situations is a digital certificate useful?

You are signing a rental lease.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address


Conjuntos de estudio relacionados

SECURITY + WIRELESS DEFENSES 5.12

View Set

11-Powers of Congress Flash Cards

View Set

PrepU Oxygenation Questions (In progress)

View Set

Cognitive Psychology (McBride &Cutting) Chapter 4

View Set

Psychology Chapter 14: Psychological Disorders

View Set