104 final exam ATTEMPT 4
True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.
FALSE
True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."
FALSE
True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.
FALSE
A disaster recovery plan typically does not answer which of these questions? · What storage-level appliances or drives will be used? · Where will data backups be stored? · What data backup procedures will be followed? · How will users' identities be confirmed?
· How will users' identities be confirmed?
Which of the following statements does not describe pseudocode? · It's a useful tool for organizing the way a programmer thinks about a solution. · It involves envisioning a project in its entirety to identify the larger elements that must be handled first. · It's a formally styled natural language, not a programming language. · It's used to write algorithms.
· It involves envisioning a project in its entirety to identify the larger elements that must be handled first.
BLANK merges augmented aspects of real and virtual worlds. · Augmented reality. · Virtual reality. · Mixed reality. · Limited reality.
· Mixed reality.
A BLANK attempts to gain access to a system for malicious purposes without the owner's consent. · white-hat hacker. · black-hat hacker. · terrorist. · programmer.
· black-hat hacker.
In the early phases of the system development process, a BLANK defines the business problem and plans a solution. · vendor analyst. · lead project manager. · business systems analyst. · software development analyst.
· business systems analyst.
When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. · restore. · reserve. · replace. · check out.
· check out
The term BLANK refers to the ability to link with other programs and devices. · wireless area network. · connectivity. · electronic data. · online management.
· connectivity.
Retrieving data from a database and performing some type of operation on it is called · file processing. · data browsing. · data querying. ·transaction testing.
· file processing.
Graphics designed especially for online use can contain BLANK, in which different hyperlinks are assigned to different spots on the graphic. · modules · animation · placeholders · hotspots.
· hotspots.
To be able to continue to access the information stored in a(n) BLANK, the programming code must be made compatible with the newer system. · data dictionary. · database management system. · integration system. · legacy database.
· legacy database.
Using a(n) BLANK approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors. · modular. · structured. · object-oriented. · decoding.
· modular.
Using carbon BLANK might make it possible to create more compact processors, which would operate much faster and conserve power. · RAM. · nanotubes. · memristors. · memory cubes.
· nanotubes.
Like most operating systems, Windows includes BLANK features that enable you to place the computer in a low-power mode. · time interval. · startup routine. · power management. · power profile.
· power management.
In a(n) BLANK database, fields with similar data can be connected between tables in the database, making it possible to retrieve data from the related tables. · relational. · object-oriented. · flat-file. · operational.
· relational.
Tendinitis and carpal tunnel syndrome are two common types of · ergonomic distress. · repetitive distress syndromes. · arthritis. · repetitive stress injuries.
· repetitive stress injuries.
It may be appropriate for different assets to have different _____ levels and different types of security protection. · threat. · authentication. · risk tolerance. · sensitivity.
· risk tolerance.
Which of the following terms refers to a section of a program created to handle a specific group of instructions? · code. · routine. · mode. · structure.
· routine.
Typically larger and a bit more formal than a skunkworks, a(n) BLANK occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. · special projects lab. · collaboration lab. · elite operations group. · project team.
· special projects lab.
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? · power strip. · spike protector. · power adapter. · surge suppressor.
· surge suppressor
A large percentage of the human brain is dedicated to BLANK, which involves processing data coming from the eyes. · mental interface. · visual perception. · natural interface. · stereoscopic vision.
· visual perception.
Online hotel and airline reservation sites use BLANK databases to hold availability and pricing information. · relational. · XML. · web. · hybrid
· web.
Which of the following statements describes spoofing? · psychologically manipulating people into performing actions or divulging confidential information · using or teaching hacking skills in order to be helpful and promote good security practices · gaining entry to a secure computer system by finding a working user ID and password combination ·fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address.
·fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address.