cyber security 5-9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select two.)

-Your company is exposed to litigation by violating the software license agreement. -You risk losing your job.

1. Largest social media platform in the world 2.Most popular microblogging platform 3.Messaging platform that incudes built-in photo editing tools 4.Social network focused on images 5.Provides live video streaming

1. FaceBook 2.Twitter 3.Instagram 4.Instagram 5.Facebook

Match each term on the left to its definition on the right. 1. A service or software application that relies on shared resources over the Internet 2.A software application that accesses web applications and websites 3.A company that provides access to the Internet 4.An interconnected global public computer network 5.An information system that connects documents to each other by hypertext links

1.Cloud computing 2.Browser 3.Internet Service Provider 4.Internet 5.World Wide Web

Match each language to its general purpose in a website. 1.Makes website elements interactive 2.Adds colors, fonts, and other design elements to website 3.Creates website structure and content

1.JavaScript 2.CSS 3.HTML

Match each database object on the left to its description on the right. 1.Formatted summary of information from a database. 2.User-friendly interface for adding to or retrieving information from a database. 3.Stores raw data in a relational database. 4.Retrieves specific information from a database. Can also be used to update, edit, and delete information.

1.Report 2.Form 3.Table 4Query

1.Verifies that each packet has been transmitted and received correctly 2.Encrypts and transfers hypertext pages on the World Wide Web 3.Matches unique IP addresses with easy-to-read URLs 4.Transfers hypertext pages on the World Wide Web 5.Divides files into packets and routes them through the Internet to their destination 6.Transmits packets in a continuous stream but doesn't verify packets

1.TCP 2.HTTPS 3.DNS 4.HTTP 5.Internet Protocol 6.UDP

1.A catalog of all the mayor's speeches and news articles about them 2.The transcript of a speech by the mayor 3.A news article about the mayor's speech

1.Tertiary Source 2.Primary Source 3.Secondary source

After running the following pseudocode, what will the value of VARIABLE be? Set value of VARIABLE to 5 Increase the value of VARIABLE by 3 If the value of VARIABLE is odd, increase its value by 1 If the value of VARIABLE is even, increase its value by 1 If the value of VARIABLE is odd, increase its value by 1

10

Which of the following are characteristics of Bluetooth? (Select two.)

2.4 GHz radio wireless Ad hoc connections

Which cellular network type was the first kind of network to use encryption?

2G

Which cellular network type was the first to have gigabit-per-second speeds?

4G

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?

5 GHz

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.11a 802.11g

Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?

802.11n

Which of the following statements is true regarding a VPN?

A VPN masks a user's IP address in order to make their actions untraceable.

Which of the following is the best definition for a LAN?

A network in a small geographic area, like in an office.

You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you can't access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?

ACID

Which command is used to add, change, or remove fields on an existing table?

ALTER TABLE

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?

Access point

You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in

Accidental

Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?

Alexa

Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?

Algorithm

Which of the following should be done to protect your identity when creating aa social media profile?

Always review and set privacy settings.

Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two.)

An IDE can autocomplete key words. An IDE has a library of built-in functions.

You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?

An array

Which data type uses historical data to make decisions in the present?

Analytical

A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?

Application programming interface (API)

Which programming language type is the most basic human-readable and closest to actual machine language?

Assembly

In object-oriented programming, which of the following concepts is used to describe properties?

Attributes

The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ________________.

Big Data

Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?

Big Data

A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?

Boolean

A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?

Branching

Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two.) IF amount < 5,000 THEN interest = 7%, ELSE interest = 8%.

Branching 8%

A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?

C++

Improved performance

Cable

Web browsers save website information in their _________, which helps the site load faster on future visits.

Cache

Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?

Change browser settings to notify before downloading.

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Client error

_____________ computing refers to services and applications that run remotely over the Internet.

Cloud

A service that lets you store data in a remote location over the Internet is called _____________.

Cloud Storage

Social media marketers need the ability to do what?

Collaborate across teams

Which data model focuses on high-level concepts?

Conceptual

Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?

Configure the browser proxy settings.

Which of the following is a programming identifier that would be used to define values that don't change?

Constants

A major capability of Alexa is its ability to do what?

Control smart devices

Small files that a website saves on your computer to remember your preferences are called ______________.

Cookies

Which digital assistant was named after an artificial intelligence in an Xbox video game?

Cortana

Which of the following are the four general tasks a user needs to perform for a database to function properly?

Create, Read, Update, Delete

Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without web development expenses

Crowdsourcing platform

What is the general term for software that creates and manages databases?

DBMS

Which of the following utilities would you use to automatically assign IP addresses on a network?

DHCP

Which of the following is not an example of wireless networking communications?

DSL

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?

Data analyst

Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?

Data analyst

What is asking specific questions to interpret Big Data called?

Data analytics

The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?

Data ethics

Which of the following needs to be done before Big Data can be analyzed and interpreted?

Data extraction

Which of the following is a way for programmers and others to make sense of complex business flows?

Data modeling

Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?

Data scientist

Which of the following are advantages of cloud computing? (Select two.)

Data security Easier collaboration

What is the technology that aggregates structured data from one or more sources called?

Data warehousing

Which of the following careers is responsible for backing up and securing an organization's databases?

Database administrator

Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?

Database developer

Which process exports a database into a format that can be read by another program like a spreadsheet?

Database dump

Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?

Device Manager

On a flowchart, which of the following represents a decision?

Diamond

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.)

Disable SSID broadcast. Change the SSID to something other than the default.

Which digital communication medium consists of top-level posts with threads of response posts?

Discussing Board

What does the following JavaScript code snippet do when the code is loaded in a browser?

Displays the text "My JavaScript Button" and a button labeled "Click me!"

What is one of the things that has set Siri apart from other digital assistants?

Easter eggs

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

What do cloud services provide to help with privacy and security concerns?

Encryption

Which of the following features is supplied by WPA2 on a wireless network? (Select two.)

Encryption Authentication

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Ethernet

In a relational database table, columns are better known as ________________.

Feilds

Which network type uses light pulses to transmit data?

Fiber optic

Which of the following Internet technologies provides the FASTEST speeds?

Fiber optic

Which of the following is the best device to deploy to protect your private network from an untrusted public network?

Firewall

Which of the following should not be used as a primary key in a table?

First Name

A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store these values?

Float

Marty, a database administrator, has added a foreign key to a table in a database. Which of the following describes the purpose of a foreign key?

For one table to reference records in another table.

A value that's used to identify a record from a linked table is called a ________________.

Foreign key

Which of the following makes it easier for users to enter data into their tables?

Forms

How many ping packets are sent by default in a successful ping request?

Four

In addition to good design sense, what else do web designers need to be proficient in?

Front-end coding languages

Which of the following can recognize different voices that it records and tailor its responses accordingly?

Google Assistant

Which of the following charges resources used, such as bandwidth and processing power, by the second?

Google Cloud

Which SQL command is used to give a user permission to a specific database object?

Grant

Clickable text or images that take you to different sites on the World Wide Web are called __________.

Hyperlinks

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select three.)

IMAP SMTP POP3

Which of the following is used to change traffic lights for emergency vehicles?

ITCS

A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?

Improved performance

Which of the following can be used by a programmer to debug code?

Integrated development environment (IDE)

Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?

Internet

Which of the following terms describes an organization that connects users to the Internet?

Internet Service Provider

Which installation method is most likely to put your computer at risk of downloading a

Internet installation

Which of the following tech careers builds infrastructure for networking, telephones, radio, and other communication channels?

Internet service technician

Alan, a programmer, needs to create an interactive web page. Which of the following programming languages types would he MOST likely use?

Interpreted

A _________ is a private network that utilizes the same technologies as the Internet.

Intranet

Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? color = input('What is your favorite color?\n')print('Your favorite color is %s.' % color)

It gets input and produces output.

Which of the following BEST describes the ipconfig utility?

It is a utility that displays all current TCP/IP network configuration values.

Which of the following BEST describes a flowchart?

It is a visual representation of the logic in a program.

Which of the following BEST describes the ping utility?

It sends a single packet to a specified network address and then waits for a reply.

Which of the following describes the declarative programming paradigm?

It uses a domain-specific language (DSL) to instruct the program what needs to be done.

A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?

It uses a linear, top-down approach to solving problems.

A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming languages would work BEST for this task?

JavaScript

You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?

Local installation

Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?

Looping

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?

MAC address filtering

If your network does not have a DHCP server, what must you do to access the internet?

Manually change the TCP/IP properties to match your network's settings.

Which type of analytical data can help you make investment decisions?

Market

Which of the following does NOT rely on cloud technologies?

Microsoft Paint

Which of the following allows for access to the internet without either a Wi-Fi or a wired connection? 2G

Mobile Data

Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?

Modem

Owners of internet-enabled cars can use their phones to do which of the following?

Monitor fuel usage

John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in

Mosaic

Which of the following DBMS programs is open source?

MySQL

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?

NFC chips

Multiple computers configured to be able to communicate and share information with each other form a ____________.

Network

Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?

Network Architect

Which of the following IT jobs includes installing and configuring network media?

Network administrator

Which of the following IT jobs typically do not require as much education or on-the-job experience?

Network technician

What are non-relational databases that deal with Big Data often referred to as?

NoSQL

Which of the following programming models are built from class templates that have properties, attributes, and methods?

Objects

Which of the following is a category of SaaS applications?

Office tools

Which of the following Application Architecture Model tiers describes office productivity software?

One Tier

Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called _____________.

OneDrive

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?

Open Source

What is the term for software that anyone can use or modify for free?

Open-source Software

A user read their work email from their home computer and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?

POP3

When protecting your online identity, which of the following is an internet security threat you need to be aware of

Phishing attempts

Which of the following tools would you use to check connectivity between two computers?

Ping

Which of the following is NOT a good response to cyberbullying?

Post the bully's physical address on social media

A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?

Primary key

Which of the following is found in one or more columns of data and contains a unique identifier for the row?

Primary key

A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?

Programmatic access

What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?

Proprietary Software

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?

Proxy settings

Which method should be used to search for an exact phrase

Put the search terms in "quotes"

Which database object is essentially questions that we can ask the database?

Queries

Which of the following can be used to ask a database questions and receive the data we're looking for?

Queries

Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would work BEST to accomplish this?

Query

Which medium does Wi-Fi use to send data between networks and devices?

Radio waves

Which of the following is a disadvantage of the VolP system

Relies fully on a stable internet connection

Which of the following database features would provide a formatted, easy-to-read listing of the results of a query?

Report

Which of the following database objects provides a summary of data?

Reports

Mary needs to view all records from the Clients table. Which command should she use?

SELECT * FROM Clients

Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?

SELECT * FROM Clients WHERE name = Travis

What protocol is used to send email messages from a mail client to a mail server?

SMTP

What is the computer language that makes relational databases work?

SQL

Which of the following is used on a wireless network to identify the network name?

SSID

What is the term for delivering an application over the internet called?

Saas

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should they select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satilite

You submitted the same paper from high school for a college class. Which form of plagiarism is this?

Self

Which type of data have elements in common but do not fit into rigid rows and columns in a table?

Semi-structured

Which of the following flow chart concepts is depicted below?

Sequence

Which of the following provides services to hosts on its network?

Server

Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?

Smart door locks

Web services that help people meet, interact, and share content with other people online are called

Social media

Which of the following is NOT a drawback of social media

Social media makes it difficult to keep in touch with friends and family

Which of the following describes the strategy that defines a business social media goals and objectives

Social media optimization (SMO)

Software that requires a monthly subscription fee is often called _______________.

Software as a service

Kickstarter and indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing

Startup

What is the name of the protocol suite used on the Internet?

TCP/IP

There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue?

Targeted ads, Selling user-generated data to other companies

Wikipedia is considered which of the following sources

Tertiary

An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice?

Text-based flat file

Which of the following are primary resources

The United States Constitution and Jane Austen's Pride and Prejudice

Which of the following is the MOST important skill an internet service technician can possess?

The ability to quickly troubleshoot and fix any issues that may arise from customers

A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?

The data can be organized into separate tables that are related to each other.

What is a web designer responsible for?

The look and feel of a website

BEST reason to search for articles in an online academic database

The sources are more likely to be peer reviewed

When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause

The video may become glitchy

Which of the following is considered part of a smart home?

Thermostat

What is the biggest benefit to using a DHCP server in a large network?

They save time for the network administrator.

Which of the following statements is true regarding a network technician?

They troubleshoot reported problems and assist users in resolving network-connection issues.

Which of the following statements is true regarding a network architect?

They typically require an industry certification in network design and implementation.

Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?

Tracert

Which of the following is used to identify specific hypertext resources on the World Wide Web?

Uniform Resource Locator

A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?

Use the APIs for each operating system.

A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?

Variable

Which of the following are considered private technologies?

Video conferencing, instant messaging

Which of the following technologies can be used to make a phone call over an Internet connection?

VoIP

Which of the following provides security for wireless networks?

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

Which of the following is a disadvantage of web applications?

Web applications can carry a monthly or yearly fee.

When might it be most helpful to clear your browser's cache of temporary Internet files?

When a website is not functioning as it should

What is the term for code that keeps running as long as a certain condition is met?

While loop

All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Wikis

Which application makes sure your computer has the most recent versions of its system software?

Windows Update

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

Which of the following components is NOT required to create a network?

Wireless adapter

The ______________ is an information system that connects documents to each other by hypertext links.

World Wide Web

Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?

World Wide Web

Files that you send along with an email message called

attachments

A NOT NULL __________ is a rule that prevents certain fields in a database from being left blank.

constraint

Which option should you choose to send an email you've received to a new person

forward

Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?

import random

Which of the following are considered asynchronous technologies?

message boards email

Which of the following lines will initiate an Internet search from the address bar of a web browser?

microsoft gov

You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?

network and internet

Which of the following typically does NOT save a conversation after it has taken place?

online chats

A pop-up blocker is a web browser feature that _________________.

prevents unwanted advertisements

Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?

query builder

Which option should you use to respond to the sender of an email but not all the recipients

reply

Which option should you use to respond to every single person included on an email

reply all

You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?

satillite

Which service would be most useful when looking for information about your favorite TV show

search engine

Which digital assistant was one of the earliest?

siri

Which of the following is a valid email address

[email protected]

Which of the following utilities would you use to find the path between two computers?

tracert


Kaugnay na mga set ng pag-aaral

Computing Essentials 2017 Chapters 1-13

View Set

Evaluating the Six Trigonometric Functions Quiz

View Set