BCIS Study Set for Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? Voice over Internet Protocol (VoIP) Voice-to-Text (VTT) Voice and video service (VVS) Audio Internet service provider (AISP)

A

In terms of privacy, which of the following is a best practice? Keeping your Social Security number hidden in a locked box in your home Saving your personal information as an email draft Throwing away old bank statements that are more than three months old Posting your location on social media

A

How do you create an email message? Use a web service and create an account. Use an app or software to compose and send information. Use a program that captures incoming hashtags for sharing with others. Use a content management system to publish notes to individuals.

B

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. Bus Star Mesh Ring

B

Knowing how to change text formatting on a resume document in Word is an example of ___________. social etiquette digital literacy digital citizenship social networking

B

Randall needs to monitor rapidly changing statistics for a social media campaign for his company. Which of the following should he use to access this information? Data warehouse Dashboard DBMS Data lake

B

River often feels anxious during class when he can't check his phone for new text messages or emails. This problem is an example of? eye strain technology addiction text neck digital detox

B

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. Alerting others that you are not home according to location-tracking features Using your photos and posts to form impressions about your character Enticing you to friend someone so that they gain access to your account Tracking your online activity and then selling that data without your knowledge

B

Social networking includes the following positive effects EXCEPT _________. keeping in contact with others increasing your privacy promoting small and local businesses growing professional networks

B

To access the Internet, a router must be connected to a _____. hub modem network switch

B

What is a digital certificate? The process of scrambling information so that it cannot be read Technology used to verify a user's identity A growing trend used to combine multiple types of authentication The key to unlock information into a readable format

B

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? An evil twin Social engineering A zombie attack Spyware

B

What kind of software can help a web developer check her online content for accessibility issues? Screen reader Content management system Screen magnifier Browser

B

When it comes to secure data storage on a network, which of the following statements is true? Roles can be granted to individuals to view files and make changes to files on a network. Wireless network keys are the safest method for protecting files on a network. You cannot save encrypted files on a network attached storage device. Files stored on a network are accessible to all who can access that network.

B

Which of the following factors might indicate that content on the Internet is reliable? The author is affiliated with an organization that is committed to one side of the issue. The author cites resources from respected authorities. The author is urging action that would financially benefit that author. The author is biased toward one perspective.

B

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? research spoofing pretexting cyberstalking phishing

B

Which of the following is NOT a risk to a company or its employees as a result of a data breach? Jailtime Increased database efficiency Loss of trust with customers Negative media exposure

B

Which of the following is a characteristic of a strong password? personal information letters, numbers, and symbols numbers in a series A short phrase

B

Which of the following is an example of someone who is NOT practicing good netiquette? Tamika used the Reply All button to send an email about a meeting room change. Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office. Margie posted pictures from her son's baseball game with the caption, "Great job, boys!" Raj tweeted about the guest speaker at the staff meeting unveiling new office technology with the hashtag #cantwaittotry.

B

Which of the following is the strongest password? Welcome123 H@veAGr3atDaY! colorbluesky Test1test2test3

B

Which of the following would be considered a strong password? CatCatCatCat Wbcm2!4!820! Password123 Abc123456789

B

Which of these file types is optimized for processing calculations of numbers in a budget? Presentation Spreadsheet Document Database

B

Which of these tasks can NOT be replaced with a technology-based option? Asking for directions to a restaurant Walking the dog Handwriting notes in class Paying for books at a store

B

Which of these tasks is a non-technical user most likely to have the right to perform in a database? Create a relationship between two tables. Add new data. Delete a record. Name a field in a table.

B

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Cyberbullying Ergonomics Repetitive strain Technology addiction

B

Why would you want to connect your computer to a network? to use the network's operating system to access shared resources to keep up with computing trends for added security

B

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it. archive categorize resend recycle

A

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? Social curation sites Social networks Social media Social conferencing

A

A network administrator is usually not required on a _____ network. client/server peer-to-peer metropolitan area intranet

B

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects? Podcasts Web conferences Email messages Text messaging

B

How can an attacker execute malware through a script? A script can retrieve and store your personal information, such as your online buying habits. A script can run a series of instructions to download and run malware. A script can send you a fraudulent email message requesting confidential information. A script searches the Internet for personal information about you.

B

A child who grows up without regular access to computers and the Internet will be at a disadvantage later due to the ___________. digital divide smart devices digital inclusion data breach

A

A country's lawmakers define __________ standards of conduct. legal personal ethical moral

A

All the pet names in a veterinarian's database are stored in a _______ called PetName. field worksheet record table

A

Devices on a _____ area network are connected via Bluetooth. personal wide metropolitan local

A

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? list of posts with the most recent ones at the top an indicator showing the number of pageviews list of webpages that link to her blog a photo and description of herself

A

How can you protect personal information gathered by legitimate organizations? Create a separate email account for receiving information from websites. Sign up for many online mailing lists. Use the same password and username for all your online accounts. Link your credit or debit card to your online accounts.

A

How does discarding computers in a landfill affect the environment? Lead and mercury in computer parts are seeping into the ground and water supply. Copper on circuit boards is creating fire hazards. The computer parts quickly decay and become organic material Data miners are digging up landfills looking for gold and platinum.

A

Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Vendors Customers Employees Inventory

A

Kim is writing a SQL query that will pull a list of customers with outstanding orders and the sales rep for each order. What should the WHERE phrase say in her query? WHERE OrderStatus = Pending WHERE Customer = SalesRep WHERE SalesRep = Kim WHERE CustomerStatus = Active

A

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? He can use remote tracking to retrace the thief's steps. If the thief enters an incorrect passcode three times, the phone takes a picture of the thief and emails it to Marcus. The current location of his phone can be pinpointed on a map through the phone's GPS. His phone can generate an alarm even if it is on mute.

A

Maria is writing a fictional story about a character with a nickname that is copied from a very popular book series. The nickname affectionately refers to personality features of this character that are similar to the character in the other book series. Maria is concerned about whether she might be sued for using this nickname in her own book. Who should she contact to find out if she is allowed to use the nickname in this way? An attorney The U.S. Copyright Office Her writing teacher An elected official in her local government

A

Rafael needs to run a query that will show the name and city of all his clients. Which of the following phrases will determine which fields are returned in the query? SELECT Name, City VALUES Name, City WHERE Name, City FROM Name, City

A

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is filtered. The table is missing a primary key. The table is sorted. The table has been deleted.

A

Technology can lead to all of the following behavioral risks EXCEPT _____. higher satisfaction with life social withdrawal a sedentary lifestyle depression and anxiety

A

What hardware is essential to creating a home Wi-Fi network? Router Ethernet cable Printer Monitor

A

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing dumpster diving identity theft encryption

A

What type of network sends signals through airwaves and usually does not require cables? Wireless network Wired network Virtual private network Intranet

A

Which data type would be best suited to a field that lists a product's clearance price? Currency Date/Time Number AutoNumber

A

Which of the following behaviors most likely causes eye strain? Spending too much time looking at devices Having poor posture when using devices Texting and walking at the same time Standing up while working at a desk

A

Which of the following is NOT an RDBMS? Oracle NoSQL Database PostgreSQL Microsoft SQL Server MySQL

A

Which of the following is NOT potentially a direct consequence of violating copyright? A driver could get a speeding ticket. A person could be sentenced to jail. A student could be expelled from school. An employee could get fired from their job.

A

Which type of data storage allows for the most variety of data types? Data lake DBMS Data warehouse Key-value database

A

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. naming your router something you'll remember, like your street address utilizing guest access when needed and turning it off when guests leave creating a strong password to access the router turning off remote management to the device

A

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? A photo of you out to dinner, holding hands with a prospective client. A photo of you horseback riding on the beach with friends. A photo of you in a pool with two beers in each hand. A photo of you dancing on a tabletop wearing a shirt with your company logo on it.

B

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. The file size The HTML coding The date a photo was taken The GPS location coordinates

B

A business can use a wiki in the following ways EXCEPT _____. accessing schedules and procedures sharing policies aggregating content exchanging ideas

C

After you've backed up your data to your new phone, how can you securely delete the data from your old phone before donating it to a charity for reuse? Delete each file off the old phone, one by one. Back up the old phone to the cloud. Reset the device to its factory settings. Dispose of the old battery.

C

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? It was written in an overly formal tone. The signature was consistent with other emails from his bank. It contained typos and other grammatical errors. It did not include a promotional offer.

C

Alfred is applying for his first full-time job after finishing his college degree. Which of the following activities during his school years has left a negative digital footprint for his potential employers to find? Good spelling and grammar Photos of his latest family vacation Profanity on social media posts Blog posts about developments within his industry

C

Businesses use webinars for the following reasons EXCEPT _____. Training and skill development Brand promotion Group discussions Education and compliance

C

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? Two factor authentication Encryption Biometrics Digital certificates

C

During a thunderstorm, the database server for Jason's store loses power. This is an example of failed _________. integrity confidentiality availability encryption

C

How might a business use a blog? To transmit a video To host a meeting To communicate with customers To present a demonstration

C

How would you describe the social networking site YouTube? YouTube is a discussion forum. YouTube is a social curation site. YouTube is a media-sharing network. YouTube is a microblog.

C

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? Virtual private network Wired network Intranet Extranet

C

In the email communication process, what is the role of the email server? Creating messages to send Storing archived email messages Routing email messages through the Internet or a private network Encrypting data that is sent over an unsecured network

C

Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Reports Tables Forms Queries

C

Phillip works long hours from home on his computer. While the work is challenging, he loves it and feels energized by the long, productive hours. Lately, however, he's been having trouble falling asleep. What strategy will help him get to sleep more easily? Take a break from devices throughout the day. Do more relaxing activities with technology. Do a digital detox about an hour before bedtime. Keep a log of his activity with technology.

C

The volume of Big Data generated over time is typically measured in terms of ____________. characters kilobytes terabytes records

C

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? Wireless network Intranet Virtual private network Extranet

C

What is one advantage of a company using an anonymous messaging app? It allows for data to be collected on websites you like without sharing your identity. It allows you to monitor others without them knowing so you can find out what they like. It allows for honest feedback without disclosing identities. It allows posts to other websites to encourage that site to support your view without giving up your identity.

C

Which of the following is a disadvantage of using cloud computing to share files? The files you will lose if your computer crashes. The amount of space that files will take up on your computer. The inability to access your files if you lose your Internet connection. How long it will take to access a backup of files.

C

Which of the following statements about browser security settings is false? You can choose which sites run pop-ups. You can accept or deny cookies. You must keep your accumulated web history as long as you use the browser. You can allow or block scripts on specific websites.

C

Which of the following statements is true about public networks? All public networks are free. Your home network is a public network. Many public networks are not secure. Hackers cannot intercept data transmitted over public networks.

C

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? She dialed into her home modem through the app and sent a command through the router. She uses a hub at her home that she connects to through the app. She has a home network with smart home devices. She has installed switches that interact with the installed app on her phone.

C

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Shredding financial documents before you discard them. Being cautious about what information you post on social networking sites. Storing financial information in an unsent email message. Querying unfamiliar purchases found on your bank statements.

C

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? CC your supervisor in your response Reply and add your supervisor in the To field BCC your supervisor in your response Reply All and add your supervisor in the To field

C

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberstalking social engineering data mining cyberbullying

D

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? A worm has infected her computer and she needs to unplug her device. A hacker is trying to put a Trojan on her computer. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

D

Knowing how to communicate respectfully on social media is an example of ____________. digital literacy cyberbullying plagiarism digital citizenship

D

On what type of network can you rent things such as cars, tools, and rooms? real estate network blogging network media-sharing network sharing economy network

D

Posting hostile or insulting comments in response to someone else's blog post is called _____. doxxing cyberstalking hashing flaming

D

Sami is trying to figure out why she keeps missing deadlines for her schoolwork. She enjoys playing video games during her downtime, but she doesn't think this relaxing hobby interferes with her grades. And yet, she's still losing points from missed work. How can Sami determine what effect technology has on her schoolwork? Keep a log of all her gaming activities. Take occasional breaks while gaming. Give up gaming for a few weeks and see if that helps. Keep a log of all her technology use.

D

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. downloading harmful content reading wireless transmissions viewing or stealing computer data creating malware

D

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network. rootkit ethernet protocol firewall

D

What does a DSL modem use to send and receive digital data? Cable TV connections A wireless router A network interface card Copper telephone wiring

D

What guiding principle typically discourages people from arguing with strangers on social media? Technology limitations Current law Digital footprint Netiquette

D

What internal device does a computer use to connect to a wired or a wireless network? Switch Motherboard Hub Network interface card

D

What is an ISP? A central point for cables in a network for data sharing, A communications device that connects to a communications channel. A system of two or more devices linked by wires, cables, or a telecommunications system. electedA telecommunications company that sells Internet access.

D

Which field could serve as the primary key for a list of students in your school? Birth date Full name Phone number Student ID number

D

Which of the following is LEAST likely to be a field in a Customers table? LastName Address PhoneNumber EmploymentDate

D

Which of the following is an authentication method to keep your data safe? Body area network Encryption Software firewall Fingerprint scanner

D

Which of the following is typical content for a podcast? interactive seminars online chats phone calls radio shows

D

Which of the following tables in a database would NOT need to be encrypted? Customer_Payments Patient_Records Employee_Passwords Store_Locations

D

Which of the following types of websites typically provides the least security? private business sites online shopping sites online banking sites social media sites

D

Which of the following would most likely be a key in a key-value database of investment properties owned by a company? Residential Active EnrollmentStatus ZoneType

D

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Major Employer GPA Graduated

D

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest? "Like" their post. Attach a hashtag (#) to the post. Extend your contacts to include more individuals. Share the post on your news feed.

D

_____ ensures that the person requesting access to a computer is not an imposter. Automatic encoding Data mining Encryption Authentication

D


Kaugnay na mga set ng pag-aaral

Rock and Roll Midterm Studyguide

View Set

OB Chapt 10 Fetal Development & Genetics

View Set

Delegation subtopic in Leadership/Management Evolve Adaptive Quizzing

View Set

Adding and Subtracting Polynomials - Quiz

View Set

Alcohol, Drugs, and Human Behavior Review Exam 3

View Set

Épocas y Movimientos Literarios

View Set