Computer Concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Select three true statements about 3-D crime scene cameras.

- 3-D forensic technology replicates the entire crime scene before it is altered. - Allows law enforcement officers to verify witness testimony or evaluate plausible hypotheses. - Using 3-D scanning forensic scientists can analyze line-of-sight, blood spatter, and bullet trajectories.

Select the advantages of using a database instead of a traditional filing system.

- A database can hold larger amounts of data. - A database can provide better data integrity.

Select what's true about Digital Twin.

- A dynamic software representation of a piece of equipment or system that emulates the original materials. - Components are connected to a cloud-based system that receives and processes all the data the sensors monitor. - The digital twin will continuously learn and generate possible solutions for issues or improvements from the physical twin.

Select what's true about database fields.

- A group of related characters in a database. - Represents a characteristic of someone or something. - Primary key is a field designation. (a field is a column in a table)

Can be used to perform routine checkups and to access health records.

- A machine that can build and manipulate things precisely and whose components are at a scale of a nanometer, - Detect diseases and can repair or manipulate damaged cells - Nano robots get into a patient's body either by implantation or ingestion.

Select three true statements about Touchless Interactive Project Soli being developed by ATAP.

- ATAP envisions a future in which the human hand becomes a universal input device for interacting with technology. - Project Soli is a microchip that uses miniature radar to detect touchless gesture interactions. - The Soli chip will be embedded in wearables, phones, computers, cars and IoT devices.

Select three true statements about predictive policing.

- Advanced analytics are monitored that allows law enforcement to predict and react to crimes. - Can also help to predict conditions in the financial markets. - A type of machine learning that utilizes the power of information technology.

In Internet Explorer (Microsoft Edge), you can set which cookie settings?

- Allow cookies - Delete cookies - Block cookies

Select the three true statements regarding Brain-Computer Interface.

- Allows for the user to communicate with a computer using only their thoughts. - Uses optical imaging to scan your brain 100 times per second to detect you speaking silently in your head. - The goal is for the system to allow humans to type even faster than their physical hands.

Which of the following are examples of HTML objects?

- Anchor - Image - Link

Settings in Firefox can be changed to allow you to complete which three tasks?

- Approve cookie storage requests. - Deny cookie storage requests. - Delete stored cookies automatically when you start Firefox.

Identity what is true about script kiddies.

- Are amateur computer hackers with little programming expertise. - Illegally gain access to computer using programs (scripts) that others have written.

You should evaluate websites using which of the following criteria?

- Authentify - Objectivity - Bias

Choose what is true about computer worms.

- Automatically reproduce - Replication exhausts network bandwidths or available storage. - Often sent using e-mail attachments.

When reporting a computer ethics violation of a co-worker to your employer, it's important to _____.

- Be brief and direct. - State only what you witnessed.

Cookie settings can be adjusted in Google Chrome many different ways. They can include _____, ____, and _____.

- Blocking/allowing cookies by default - Deleting cookies - Making exceptions for cookies from specific websites or domains

Globacom is a major _____ service provider and _____ service provider in Nigeria.

- Cellular - Internet

Good password management include which three of the following?

- Chaning your password often - Using strong passwords - Never use the same password twice

What order of steps should you take to always block cookies in Safari?

- Choose Safari. - Click Preferences. - Click Privacy. - Select Block all cookies.

Select the usual tasks of a data analyst.

- Collects data. - Interprets information provided by the database. - Creates reports for senior management.

Antivirus software is a computer program used to scan files to identify and remove _____ and _____.

- Computer viruses - Other malicious programs

Cyberattacks include _____ and _____.

- DDos attacks - Identity theft

Which of the following are treated as cybercrimes?

- Data manipulation - Data corruption - Cyberbullying

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

- Decreased employee performance - Decreased network speed - Increased likelihood of security breaches

_____ and _____ laptops are the most popular in the United States accounting for over 35% market share.

- Dell - HP

Censorship is limited in Germany, but sites will be shut down if they post anything to do with _____, _____, and _____.

- Denial of the Holocaust - Impact the fairness of a court case - Child pornography

Select what is true about session cookies.

- Determine the start and end of a session. - Analyze and measure traffic on a web page - Determine the web browser being used

Common types of a computer virus include?

- Documents won't save. - Computer runs extremely slow - Programs launch on their own.

Which of these should business owners do to help protect their data.

- Establish strong firewall protection for their business's network. - Ensure antivirus software is installed and up-to-date. - Create strong password protections and protocols.

Which are the most widely-used social media sites used globally?

- Facebook - YouTube - WhatsApp - Instagram - TikTok

Select three true statements regarding vehicle license plate readers.

- Gives law enforcement officers a quick and effective way to track and find stolen vehicles. - Automates the process of manually checking and entering license plate information into a database. - License plate readers can be affixed onto police cruisers, utility poles, or on freeway overpasses.

Select the e-mail services.

- Gmail - Outlook - iCloud

Commonly used search engines

- Google - Bing - Yahoo

Organ on a chip (OOC) technology allows scientists to develop drugs without animal or human testing. Select the three companies that are developing OOC.

- Hepregen - Organovo - Nortis

Which of the following should you consider when evaluating website for research purposes?

- If you are using a website for research purposes you should research the publisher's qualifications. - Check to see the author's background, who published the author's work, and what is the relationship between the author and the publisher. - You can find most of the information about a publisher by visiting the About Us, Corporate Profile, and Background sections of the site.

According to US-CERT you should contact them using which three methods when you receive a phishing message.

- In Outlook Express you can create a new message and drag and drop the phishing e-mail into the new message. Address the message to [email protected] and send it. - In Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. - If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.

Rootkits enable a remote user to do which the following?

- Install rogue files - Create backdoor programs - Delete file.

What ways are best in preventing a computer virus and infections?

- Install the latest antivirus software and update frequently. - Avoid opening any files or message from unknown sources. - Limit your web surfing to trusted sites.

Select the usual roles of information systems (IS) technicians.

- Installing IS hardware and software. - Maintaining IS hardware and software. - Repairing and replacing IS hardware and software.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

- Instructing employees on standards. - Periodically reviewing computer-use policies. - Enforcing standards by creating firewalls, monitoring protocols, filters.

Which of these would be considered a cybercrime?

- Internet scams - Cyber espionage - Infromation theft

If you own a small business, what can you do to ensure your computers and data is kept secure?

- Keep software updated, particularly antivirus software. - Physically secure computers to minimize risk of theft. - Backup your data regularly.

Spyware collects your _____, _____, and _____ to gain information about your Internet habits and activities.

- Keystrokes - Passwords - Confidential information

What is true about packet sniffers?

- Legitimate sniffers are used for routine examination and problem detection - Unauthorized sniffers are used to steal information.

Select appropriate business e-mail etiquette practices.

- Maintain high levels of formality, especially with initial contacts. - Consider if e-mail is the appropriate means of communication.

Select three true statements regarding robotic medical checkups.

- May help to reduce health-care costs. - InTouch Health manufactures medical robots that can conduct these checkups. - Can be used to perform routine checkups and to access health records.

Select the usual tasks of database administrators (DBAs).

- Monitors the database's performance. - Develops and maintains the database itself. - Establishes user privileges for the database to help protect the data.

Common computer virus infection indicators include _____, _____, and, _____ .

- OS doesn't launch properly - Files get deleted or encrypted - Strange error messages or pop-up ads.

What is true of the malware Trojan horse.

- Often found attached to free downloads and apps. - Often using to find passwords, destroy data, or to bypass firewall. - Trojan malware is the same as a macro virus.

Information and information systems are important in all areas of business. Match the computer activity that would correspond with the business activity.

- Online advertising and social media: Marketing - Records keeping and reporting: Accounting - Decision-making software such as MIS: Operations - Providing current investment values and opportunities: Finance

For which of the following activities would a typical marketing department need a strong information system?

- Online sales - Online advertising - Updating the business's social media sites

You own a pet care center. What fields might you enter when you create a table for dogs that you care for?

- Owner's last name - Pet's name - Owner's address

Factors that can damage computer hardware include?

- Power Surges - Overheating - Humidity - Magnetic fields

You should evaluate websites using which of the following criteria?

- Reliability - Relevance - Validity

If you're reading an article and are connected that if may be biased in one way or another, what can you judge the author's objectivity.

- Remember that bias is introduced into everything, even though it may be unintentional. - When viewing a website, investigate the background and other writings of the author and the site. - Try to be aware of all sides of any issue.

Select appropriate business e-mail etiquette practices.

- Remember that potentially negative news is best given face-to-face. - Keep attachments small.

An internet filter is a software used to block a user's access to specific Internet content. This software can reside on which three of the following?

- Router or a user's computer - Network - Stand-alone filter attached to a server

Select what's true about SEO.

- Search Engine optimization (SEO) is a set of strategies, techniques, and practices used to increase the number of visitors to a specific website by getting a high-ranking placement in the search engine. - Studies show that 87% of web searches end at the first page of results, so a higher ranking page helps to get more website visitors. - SEO helps to ensure that a website is known and reachable by search engines thus increasing the likelihood of more site hits.

An internet search engine can perform which three basic tasks?

- Search the internet for information based on criteria entered by the user - Indexing of keywords that are found - Display the location of the information stored in indexes

China's "Great Firewall" is programmed to block websites, social media, e-mail services, and other online resources deemed inappropriate or offensive.

- Social media - E-mail services - Websites

Which of the following are online annoyances.

- Spam - Spyware - Spoofing

Cyberattacks include the following.

- Spyware - Pharming and phishing - Spamming and spoofing - Dos and DDos attacks.

Select what's true about object-oriented databases.

- Store instructions for how to compute the data as well as the data to be processed. - Equipped to handle unstructured data such as MP4 files, videos, images, and extremely large files. - Use Object Query Language to construct queries that extract data from the database.

Your college has a database with a Students table. Which of the following could be a primary key in the table?

- Student number - Social Security Number

Match the component of a business e-mail with its characteristics.

- Succinctly discusses the purpose of the message: Body - Professionally ends the message: Close - Sets the tone of the message: Salutation - Determines if the e-mail will be opened: From and/or Subject lines

Select the usual tasks of information systems (IS) program managers.

- Supervising IS technicians. - Working with developers and senior management to procure and implement IS processes. - Developing training plans and policies for IS.

Websites that use cookies can collect information about?

- Surfing habits - Selling your collected information to third parties. - Monitoring your web behavior.

You can minimize your risk of computer damage by using _____ or _____.

- Surge protector - UPS (Uninterruptible Power Supply)

Examples of management information systems (MIS) include _____.

- TPS - DSS - ESS

You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

- Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. - Be brief and direct.

The WeChat app lets you send _____, _____, _____, and make audio and video calls.

- Texts - Pictures - Videos

Select what's true about Search Engine Companies

- The information contained in a search engine database is determined by how each specific company records URL information. - SEC stands for Search Engine Company - It is common practice for the website owner to submit their URL and associated information to the Search Engine Company

Select what's true about using the Boolean operators "OR" and "NOT"

- Use "OR" when you are searching for documents including one or another of your search words. - You can use /^ to execute an OR search. - Use "NOT" if you want to exclude certain results from your search.

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level.

- Use IS to monitor overall business performance: Top-level management (business executives and presidents) - Use IS for record keeping and reporting purposes.: Middle managers - Use IS for scheduling daily and weekly operations: First level managers (supervisors, floor managers)

What is true about passwords?

- Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. - Regularly check your accounts to ensure they have not been tampered with.

Match the business information activity with the appropriate management level.

- Use information systems to foresee corporate opportunities and threats: Top-level management (business executives and presidents) - Use information systems for communicating policies and performance reports up and down the corporate ladder: Middle managers - Use information systems for recording line employee performance: First level managers (supervisors, floor managers).

Tencent's WeChat app incorporates features similar to Facebook, WhatsApp,_____, Tinder, _____, all in one app.

- Venmo - Amazon

Most major carriers in the United States are building the infrastructure needed to support a 5G cellular network. _____, _____, and T-Mobile have plans to make 5G available in all major markets by 2021.

- Verizon - Sprint

Common malware types include.

- Viruses - Worms - Trojan horses

Choose what is true about cookie privacy risks.

- Websites using cookies can collect your information and sell it to third parties. - Websites can track your surfing behavior and create a profile. - Corporate and government entities can track your web behavior.

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

- What field name will the data fall under - What data type will be included

Firewalls help protect against _____ and _____.

- Worms - Hackers

If you fallen victim to a phishing scam, which two should you do right away?

-Contact the institution the message was allegedly sent form. - Contact US-CERT

In each browser settings area, you should consider _____, _____, and _____

-Periodically deleting cookies - Blocking/customizing your cookie settings - Decide from which sites you want to allow cookies

In the Firefox, the best steps to clear the browser cookies is to

1. Click the Menu button, choose History, and then Clear Recent History. 2. Once you have cleared recent History you should set the time range to clear Everything. 3. Click on the arrow next to Details to expand list of History items. 4. Click on the arrow next to Details to expand list of History items.

Place the following steps in order to attach a Document from your documents folder to an e-mail in Outlook.

1. Go to Outlook (log in if necessary) and create your message. 2. Click Attach (also indicated by a paper clip symbol). 3. Select Computer. 4. Select Documents. 5. Double-click the desired file and select Attach as a copy.

Place the following steps in the correct order if you want to reply only to the sender of an Outlook message.

1. Go to Outlook (log in if necessary). 2. Click Inbox to see your messages. 3. Click the message you wish to reply to. 4. Click Reply or Reply to All. 5. Type your response and click Send.

Place the following in order if you were opening and reading a message in Outlook.

1. Go to Outlook (log in if necessary). 2. Click Inbox. 3. Click on the message you wish to open. 4. After reading the message, click X to close or Delete to remove the message from your Inbox.

In which order should you delete cookies in Internet Explorer (Microsoft Edge)?

1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings). 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.

Put the following steps in order for creating a new e-mail message in Microsoft Outlook.

1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons.

What is the best way (order of steps) to customize cookie settings?

1. Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2. Tap or click the Tools button Tools, and then tap or click Internet options. 3. On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4. When you are done making changes, tap or click OK.

Put the steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. The infection is spread to other devices or a network. 4. The payload is activated, and the virus starts its destructive actions.

Dash Replenishment Service enables Internet-connected coffee makers to order filters from _____ when supplies are running low.

Amazon

Transactions on Alibaba's online sites totaled $248 billion last year, more than those of eBay and _____.

Amazon

Using a corporation's data in real-time requires effective data management strategies for developing advanced analytics. This is a fundamental part of _____.

Business Intelligence (BI) - Business intelligence requires advanced analytics to ensure effective decision-making.

China is hiring many workers to help fill voids in the areas of _____, Internet censorship, and in artificial intelligence (AI).

Cybersecurity

Business management software that encompasses nearly all business activities in a corporation is called _____ software.

ERP (Enterprise Resource Planning)

In China, _____ makes a wide range of products including smartphones, laptops, smartwatches, and telecommunications equipment.

Huawei

While every election has its losers, one big winner in the 2016 U.S. presidential election was _____ media.

Social


Ensembles d'études connexes

Beat the GMAT Geometry Practice Questions

View Set

Chapter 8 - Motivating Employees

View Set

Ch. 7 Smart Connect Conceptual HW Questions FIN 3403 FSU

View Set

bio 2 2nd quarter exam- academic

View Set