CIS
Which of the following would not cause interference or poor connectivity between nodes on a wireless network?
A wireless extender
Which of the following actions would NOT help to identify your personal ethics?
Conduct a genealogic study of your extended family.
A special processing chip found on video cards is the
GPU
The collection of large national and international networks used to establish the Internet is called the
Internet backbone.
Which of the following describes fiber-optic broadband?
It uses strands of pure glass or plastic.
Which of the following should you not do to secure a wireless network?
Keep the default network name and router password.
Crowdfunding sites include
Kickstarter and GoFundMe.
Which of the following would not impact the digital divide?
Less sharing of the work we produce
An example of an open source OS is
Linux
If you want to use your computer for recording your band, you would benefit most from a(n)
MIDI interface
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?
P2P network
Which of the following is not a digital video file format?
is a set of strategies for using more than one drive in a system.
RAID
Which statement is not true about the web?
The web was based on a protocol developed by Tim Berners-Lee. *****
Which network cable type is most susceptible to signal interference?
UTP
Which of the following statements is FALSE?
Unethical behavior is always illegal.
The type of network that would be necessary to connect the networks of two college campuses would be:
WAN
Which of the following is the most secure security protocol used with routers?
WPA2
When is a flat database sufficient to use when organizing data?
When the data is simple and can be organized in one table
An applet is
a small application located on a server computer.
Bike sharing programs like Citi Bike are an example of
a subscription-style business model made possible by technology. Correct Answer
IPv6 uses 128 bits to assign a(n)
address to every device connected to the Internet.
Being computer literate includes being able to
all of the above
Which of the following describes an IP address?
all of the above
Intellectual property
all of the above.
The process whereby users prove they have authorization to use a computer network is known as
authentication
Which server would a client/server network include to ensure only authorized users are logging onto the network?
authentication
Which is not a key component of a typical client/server network?
bastion host
It is important to maintain your online reputation
because of the persistence of information. because employers often review social media before hiring employees. to ensure information about you is accurate.
Ensuring that website content is not slanted in its point of view is checking for:
bias
Authentication techniques that rely on personal biological traits are called
biometrics
Viruses that load from USB drives left connected to computers when computers are turned on are known as
boot-sector viruses
Encrypting data is not an appropriate measure for mobile devices such as smartphones.
false
If you use an Internet cache, then the information displayed in your browser is automatically refreshed.
false
Instant messaging is secure because of the type of encryption used.
false
Modern desktop operating systems are considered single-user multitasking operating systems.
false
Moore's Law describes the pace at which RAM modules improve.
false
Once files are placed in the Recycle Bin they cannot be recovered.
false
P2P networks require specialized network operating system software.
false
Podcasts can only be created by professional organizations.
false
Routers are used to send data on a specific route through an internal network.
false
The move toward access instead of ownership is a sign of cognitive surplus.
false
The term dotted quad means you have four dots in a row in your Java source code.
false
There is no limit to how much RAM you can add to modern computers.
false
Web-based databases cannot be used to help investigators solve criminal cases.
false
When the binary code is retrieved from RAM and moved to the CPU, this stage is known as
fetch
Which of the following is not a category of intellectual property?
imprint
Sophisticated modeling software is helping international researchers
increase the pace of research in finding and producing vaccines.
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
inoculations
Which of the following devices would use a real-time operating system
roomba vaccum
The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the
root directory
Which of the following is not a component of a search engine?
search assistant
Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights?
search tools
A GUI user interface is special because
there is a set of icons that represent the OS tasks`
A private key is important
to decode an encrypted message.
A filter is used to create a temporary subset of data from a database.
true
A primary key is used to uniquely identify records.
true
Analog signals are continuous.
true
Google Docs is an example of a wiki.
true
Hactivism is different from cyberterrorism.
true
In Windows, if you experience unreliable behavior, try a System Restore before doing a Windows Reset.
true
Intellectual property can be legally protected even though it is not a physical object.
true
Network adapters perform specific tasks to enable nodes to communicate on a network.
true
Star topologies are the most widely used topology.
true
A good way to assess your CPU usage is to
check the Performance tab of the Task Manager.
Data captured as users navigate through a website is called
clickstream data
Encryption is used to
code your e-mail so only one person can decipher it. Correct Answer
Unnecessary duplication of data in a database is referred to as
data redundancy
Which of the following is not considered metadata?
database name
The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of
digital convergence
When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.
digitizing
Which of the following is an open electronic publishing format?
epub
A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as
fake news
A 32-character password is an example of using biometrics.
false
A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.
false
A small slice of a data warehouse is called a data mine.
false
Actual data throughput is usually higher on wireless networks than on wired networks.
false
An authentication server is used to host websites on a client/server network.
false
Artificial intelligence systems think exactly like human beings do.
false
Catfishing is posting inflammatory remarks online to generate negative responses.
false
Conventional hard drives are preferable to SSD drives because they transfer data more quickly.
false
Copying a music CD and giving it to a friend is "fair use."
false
Copyright lasts for only 50 years in the United States.
false
Data warehouses capture data only from one time period.
false
System restore points can only be created by Windows automatically on a regular schedule.
false
Which type of broadband Internet offers connections nearing the speed of light?
fiber-optic
A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.
file history
Sometimes groups of data packets are sent together in a package called a
frame
Which of the following is not one of the factors used in multi-factor authentication?
identity
When someone uses your personal information to pose as you, this is
identity theft
When a printer receives a command, it generates a unique signal to the OS, which is called a(n)
interrupt
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
intranet
Using copyrighted works without permission of the copyright holder
is possible under the "fair use" doctrine
A packet analyzer is called a sniffer because
it captures and reads data inside each packet.
Reducing the sampling rate when digitizing a file has which effect on the file?
it decreases the file size
HTTPS is different than HTTP because
it is a combination of HTTP and the Secure Sockets Layer (SSL). Correct Answer
Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce?
mobile commerce
What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?
modern and router
The type of database that would be best to store and organize data with feature and measure attributes is which of the following?
multidimensional database
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation (NAT)
A process to ensure that data in a database is organized most efficiently is called
normalization
Device drivers are
often bundled with the operating system.
A customer information table linked to a password table in a business database reflects which type of relationship?
one to one
Moore's Law refers to the
pace at which CPUs improve
When an OS processes tasks in a priority order, it is known as
preemptive multitasking. Correct
What web browser feature would be particularly useful when using public computers?
privacy browsing
Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?
query
Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place?
real-time processing
Data can be retrieved fastest from
registers
Which of the following does not describe mobile broadband?
required a wireless ISP
Before donating your Windows computer, you should perform a Windows
reset
Windows creates "restore points" so that you can
return your system to the way it was before you installed new software.
Which topology tends to provide the fairest allocation of network resources?
ring
A ______ is a program that takes complete control of your computer without your knowledge.
rootkit
A surge protector may look like just another power strip but it also can
save your device if a voltage strike is sent through the electrical system
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability
SMTP is the set of rules used to
send e-mail along the Internet to its destination.
Computer viruses can be spread by
sharing flash drives. downloading and running a file attached to an email downloading a song from a peer-to-peer sharing site.
Which of the following is an advantage of installing a client/server network in a business?
sharing of peripherals
Which of the following would NOT be a benefit of networking computers?
sharing software licenses
The crisis-mapping tool Ushahidi
shows that a free software product can have great value.
Which of the following is not considered an accessibility utility?
system restore
Which of the following would you NOT see on a Windows 10 Start menu?
task view
The information in a data packet includes
the data and the destination.
Which of the following does not determine the quality of a digital image?
the number of pixels in the camera lens
Cat 5e and Cat 6 are types of twisted-pair cable
true
Desktop systems are invariably a better value than lighter, more mobile computers.
true
Different versions of Linux are known as distros.
true
Digital rights management (DRM) is a system of access control that allows only limited use of the material.
true
MIME is the protocol that supports sending files as e-mail attachments.
true
Most modern operating systems include some type of NOS functionality.
true
Plagiarism is technically not illegal in the United States.
true
Sending e-mails to lure people into revealing personal information is a technique known as phishing.
true
The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website.
true
The power-on self-test ensures all peripheral devices are attached and operational.
true
Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.
true
You can attach more than four wired devices to a network by using a switch.
true
Your Internet service provider has a default DNS server to translate a URL into an IP address.
true
Your location can be captured from your mobile device even if app location tracking is turned off.
true
Your social security number should never be shared on a website, in an email, or through messaging.
true
A network-attached storage device is like a network-connected hard drive.
ttrue
All of the following are current focuses of AI research EXCEPT
cognitive surplus.
You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results?
"Captain America: Civil War"
Which of the following is a good precaution to take when making online purchases?
use a private browser when purchasing items from a public computer ****
A feature in Windows 10 that is used to organize open windows into task-specific groups is called
virtual desktops
Which of the following data-mining techniques is used to create charts and dashboards?
visualization
RAM is
volatile memory
The Internet is primarily funded by
your federal income taxes.
In the URL http://www.whitehouse.gov/blog, which part is considered the top-level domain name?
.gov
The set of instructions that define how to display the HTML elements in your site is
CSS