csit final exams

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Raphael is working with a table in Access. He needs to see all the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table? a)Report b)Sort c)Filter d)Query

c) filter

Which data type would be best suited to a field that lists customer email addresses? a)Date/Time b)Number c)Hyperlink d)AutoNumber

c) hyperlink

What would a password manager allow you to do? a)Prevent you from using birthdays in your passwords. b)Create and store multiple strong passwords. c)Make sure you do not repeat passwords on similar accounts. d)Test your memorization skills.

b) create and store multiple strong passwords

A process called _____ converts analog sound waves into digital sound. a)vectoring b)sampling c)compressing d)resolving

b) sampling

A series of images displayed in sequence to create the illusion of movement is called ______________ . a)frame b)mixed reality c)animation d)virtual reality

c) animation

What internal device does a computer use to connect to a wired or a wireless network? a)Network interface card b)Hub c)Switch d)Motherboard

a) network interface card

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a)Social engineering b)An evil twin c)A zombie attack d)Spyware

a) social engineering

What hardware is essential to creating a home Wi-Fi network? a)Printer b)Router c)Monitor d)Ethernet cable

b) router

What is a digital certificate? a)The process of scrambling information so that it cannot be read b)Technology used to verify a user's identity c)A growing trend used to combine multiple types of authentication d)The key to unlock information into a readable format

b) technology used to verify a user's identity

Which of the following is the science that combines technology and engineering? a)Natural language processing b)Digital citizenship c)Robotics d)Augmented reality

c) robotics

What do engineers use to create highly detailed and technically accurate drawings? a)CAD software b)MIDI technology c)HTML 5 d)virtual world storage

a) CAD software

What is an ISP? a)A telecommunications company that sells Internet access. b)A central point for cables in a network for data sharing, c)A communications device that connects to a communications channel. d)A system of two or more devices linked by wires, cables, or a telecommunications system.

a) a telecommunications company that sells internet access

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________. a)digital detox b)repetitive strain injury c)technology addiction d)digital footprint

a) digital detox

In a large business, the _____ Department makes sure that all the computer operations, mobile devices, and networks run smoothly. a)Information Technology b)Personal Computing c)Engineering d)Human Resources

a) information technology

For _____, the original media file is stored on the media distributor's server, so you can watch the content more than once. a)On-demand content b)Live video/audio streaming c)Downloading content d)Traditional cable or satellite telecast

a) on-demand content

What two factors determine the quality of digital audio? a)sampling rate and bit rate b)Frame rate and volume c)resolution and compression rate d)codec and container type

a) sampling rate and bit rate

On what type of network can you rent things such as cars, tools, and rooms? a)sharing economy network b)blogging network c)real estate network d)media-sharing network

a) sharing economy network

Which of the following types of websites typically provides the least security? a)social media sites b)private business sites c)online shopping sites d)online banking sites

a) social media sites

Which of the following kinds of information can be commonly inferred from a video file format name? a)Video codec compatibility b)Resolution c)Sampling software compatibility d)Bit rate

a) video codec compatibility

What type of network sends signals through airwaves and usually does not require cables? a)Wireless network b)Wired network c)Intranet d)Virtual private network

a) wireless network

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media? a)A photo of you out to dinner, holding hands with a prospective client. b)A photo of you horseback riding on the beach with friends. c)A photo of you in a pool with two beers in each hand. d)A photo of you dancing on a tabletop wearing a shirt with your company logo on it.

b) a photo of you horseback riding on the beach with friends

How are the ways AI learns similar to how you learn? a)Both use cameras to read faces and analyze voices. b)Both use past experiences to predict likely outcomes and responses. c)Both make decisions based on research only. d)Both use their senses to learn.

b) both use past experiences to predict likely outcomes and responses

What technology can collect information to make decisions, reach conclusions, and combine information in new ways? a)robotics b)embedded computers c)artificial intelligence (AI) d)virtual reality (VR)

c) artificial intelligence (ai)

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? a)identity theft b)dumpster diving c)phishing d)encryption

c) phishing

_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless networks. a)Assistive technology b)An intelligent workplace c)The Internet of Things d)Augmented reality

c) the internet of things

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question? a)Knowledge base b)Code of conduct c)Warranty d)Acceptable use policy (AUP)

d) acceptable use policy (AUP)

A business can use a wiki in the following ways EXCEPT _____. a)exchanging ideas b)accessing schedules and procedures c)sharing policies d)aggregating content

d) aggregating content

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? a)RFID b)NFC c)IrDA d)Bluetooth

d) bluetooth

Avery wants to replace her cable television subscription with a video streaming service to watch her favorite TV shows. Besides Internet connectivity, what does she need to watch the shows on a TV? a)Normal LED TV b)Video projector c)USB slot and a drive on her normal TV d)Smart TV or a TV stick

d) smart TV or a TV stick

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others? a)Social media b)Social conferencing c)Social networks d)Social curation sites

d) social curation sites

Which technology converts the electric current from a musical synthesizer to digital form so you can play the synthesized music on a mobile device? a)MIDI technology b)Computer-aided technology c)Voice recognition d)Read-aloud technology

a) MIDI technology

One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task? a)UPDATE b)DELETE c)SELECT d)INSERT

a) UPDATE

Jenson needs to update his home address in his health insurance company's database. Which of the following applications can he open on his computer so he can make these changes? a)A browser b)An RDBMS c)A spreadsheet application d)A DBMS

a) a broswer

Which company was the first to develop a computer meant for personal use? a)Apple b)Intel c)IBM d)Dell

a) apple

Computer-aided design software helps architects, engineers, and scientists to design, analyze, and manufacture products with the precision of human-level intelligence. Which of the following technologies does CAD incorporate to achieve this? a)Artificial intelligence and machine learning b)Speech and voice recognition c)MIDI technology d)Streaming and geotagging

a) artificial intelligence and machine learning

How can you protect personal information gathered by legitimate organizations? a)Create a separate email account for receiving information from websites. b)Use the same password and username for all your online accounts. c)Sign up for many online mailing lists. d)Link your credit or debit card to your online accounts.

a) create a separate email account for receiving information from websites

Kareem wants to include line drawings of abstract shapes on his personal website. What should he use to acquire the graphics? a)drawing software b)Scanner c)paint software d)digital camera

a) drawing software

Norma is a graphic designer creating a logo that will be resized often. Which of the following file formats should she choose to create the logo? a)EPS b)TIFF c)JPEG d)GIF

a) eps

Nadia is shopping for a phone that can take photos and identify their geographical location. What feature should she look for when comparing phones? a)geotagging b)augmented reality c)gyroscope d)GPS scanner

a) geotagging

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________. a)a hoax b)distracted driving c)the digital divide d)a data breach

a) hoax

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a)Intranet b)Virtual private network c)Extranet d)Wired network

a) intranet

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking? a)It allows the company to communicate to many users at once about an issue and release status updates. b)It shares the company's plans with competitors, making it transparent and honest. c)It allows the users to share their experiences with the game on a different platform while the site is down. d)It confirms who uses the social networking platform to get status updates and follow the game.

a) it allows the company to communicate to many users at once about an issue and release status updates

Which of the following is a characteristic of a strong password? a)letters, numbers, and symbols b)personal information c)numbers in a series d)A short phrase

a) letters, numbers, and symbols

What rules should guide your behavior when you interact with friends and coworkers on social media? a)Netiquette b)Acceptable use policy (AUP) c)Digital inclusion d)Code of conduct

a) netiquette

Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? a)Smallest to largest b)Largest to smallest c)A to Z d)Z to A

a) smallest to largest

Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should the FROM phrase say in her query? a)FROM Students b)FROM Schools c)FROM Birthdate d)FROM Name

a)from students

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest? a)"Like" their post. b)Attach a hashtag (#) to the post. c)Share the post on your news feed. d)Extend your contacts to include more individuals.

b) attach a hashtag (#) to the post

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using? a)Kiosk b)Augmented reality c)Digital literacy d)Chip-and-pin technology

b) augmented reality

Posting hostile or insulting comments in response to someone else's blog post is called _____. a)doxxing b)flaming c)cyberstalking d)hashing

b) flaming

Businesses use webinars for the following reasons EXCEPT _____. a)Training and skill development b)Group discussions c)Education and compliance d)Brand promotion

b) group discussions

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? a)His phone can generate an alarm even if it is on mute. b)He can use remote tracking to retrace the thief's steps. c)The current location of his phone can be pinpointed on a map through the phone's GPS. d)If the thief enters an incorrect passcode three times, the phone takes a picture of the thief and emails it to Marcus.

b) he can use remote tracking to retract the thiefs steps

Your school has just been awarded a technology grant. Each grade level team has been asked to submit a proposal for how they would could use the money. Your team puts forward an idea where students can submit work online and work collaboratively with on projects. What type of classroom have you described? a)Mobile classroom b)Intelligent classroom c)Technology classroom d)Information classroom

b) intelligent classroom

To access the Internet, a router must be connected to a _____. a)hub b)modem c)witch d)network

b) modem

What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database? a)Relational database b)Nonrelational database c)Backup database d)Big Data database

b) nonrelational database

Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements? Question options: a)MongoDB b)PostgreSQL c)Oracle Database d)Microsoft SQL Server

b) postgre SQL

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? a)Title b)ProductID c)PageCount d)Author

b) productID

Which of the following is an example of green computing? a)Keep devices turned on and ready to use, even at night. b)Purchase and use products with an ENERGY STAR label. c)Request printed receipts. d)Purchase new models of devices as soon as they are released.

b) purchase and use products with an ENERGY STAR label

What technology can be used by people with a hearing disability to listen to a narration? a)Read aloud technology b)Speech recognition c)Computer-aided technology d)MIDI technology

b) speech recognition

Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose? a)Document b)Spreadsheet c)Database d)Presentation

b) spreadsheet

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a)Mesh b)Star c)Ring d)Bus

b) star

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____. a)The date a photo was taken b)The HTML coding c)The GPS location coordinates d)The file size

b) the HTML coding

Which of the following is a disadvantage of using cloud computing to share files? a)The amount of space that files will take up on your computer. b)The inability to access your files if you lose your Internet connection. c)The files you will lose if your computer crashes. d)How long it will take to access a backup of files.

b) the inability to access your files if you lose your internet connection

Why would you want to connect your computer to a network? a)for added security b)to access shared resources c)to use the network's operating system d)to keep up with computing trends

b) to access shared resources

How might a business use a blog? a)To host a meeting b)To communicate with customers c)To transmit a video d)To present a demonstration

b) to communicate with customers

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there? a)GPS b)virtual reality (VR) c)embedded sensors d)robotics

b) virtual reality (vr)

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space. a)Green computing b)Virtual reality (VR) c)Internet of Things (IoT) d)Natural language processing

b) virtual reality (vr)

One way to create a solid 3-D image for 3-D animation is to apply highlights and shadows to a _____. a)keyframe b)wireframe drawing c)stop motion drawing d)rendering model

b) wireframe drawing

Vijay is creating a cartoon with 3-D objects that have volume and can rotate 360 degrees. What type of cartoon is Vijay making? a)augmented reality based b)2-D animation c)3-D animation d)virtual reality based

c) 3-d animation

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this? a)Reply and add your supervisor in the To field b)Reply All and add your supervisor in the To field c)BCC your supervisor in your response d)CC your supervisor in your response

c) BCC your supervisor in your response

Which of the following audio formats does not use any compression technique? a)MP3 b)WMA c)WAV d)MP4

c) WAV

Which of the following describes an evil twin? a)A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. b)An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence. c)A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. d)A device infected with malware that an attacker uses to control the device remotely.

c) a normal looking yet fraudulent wi-fi network that allows hackers to capture personal information users transmit using it.

Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other? a)Products, Ingredients b)Products, Orders c)Customers, Ingredients d)Customers, Orders

c) customers, ingredients

Which of the following problematic behaviors relies on the use of digital technology? a)Distracted driving b)Harassment c)Cyberbullying d)Repetitive strain injuries

c) cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. a)uninterruptible data supply b)alarm c)data backup d)private copy

c) data backup

Which data repository type is most likely to include database tables and primary keys in its internal data structure? a)Data lake b)Data dashboard c)Data warehouse d)Data mart

c) data warehouse

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________. a)netiquette b)data breach c)digital footprint d)public domain

c) digital footprint

How would you describe an intelligent workplace? a)It holds meetings only via web conferencing and markets itself over social media. b)Its workers all telecommute and use the cloud. c)It uses technology to enable workers to connect and communicate. d)It has a bring your own device (BYOD) policy allowing online collaboration.

c) it uses technology to enable workers to connect and communicate

When describing a client/server network, which of the following would be considered a client? a)Modem b)External hard drive c)Laptop d)Printer

c) laptop

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page? a)a photo and description of herself b)list of webpages that link to her blog c)list of posts with the most recent ones at the top d)an indicator showing the number of pageviews

c) list of posts with the most recent ones at the top

Which of the following network standards applies to cellular networks? a)Phoneline b)Ethernet c)LTE d)Wi-Fi

c) lte

Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using? a)Proprietary b)Relational c)Open source d)DBaaS

c) open source

Devices on a _____ area network are connected via Bluetooth. a)metropolitan b)local c)personal d)wide

c) personal

Resolution of bitmap graphics is typically measured in ___________. a)kilobytes b)megabytes c)pixels d)frames

c) pixels

Computers communicating on a network must follow a _____, a common set of rules for exchanging information. a)syntax b)standard c)protocol d)topology

c) protocol

Which of the following is typical content for a podcast? a)phone calls b)online chats c)radio shows d)interactive seminars

c) radio shows

With more and more people using technology, what physical health diagnosis is on the rise? a)cyberbullying b)technology addiction c)repetitive strain injury d)cyberstalking

c) repetitive strain injury

Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage? a)CSS b)JavaScript c)SQL d)HTML

c) sql

Edwin owns a smartphone with a digital assistant that recognizes words and phrases and provides appropriate answers to his questions. What technology does the smartphone use to make the assistant respond to Edwin? a)Virtual Reality b)MIDI technology c)Synthesized speech d)Computer-aided technology

c) synthesized speech

Contact information for all the people taking a class at a school are stored in a ________ called Students. a)record b)field c)table d)worksheet

c) table

What does a file format refer to? a)the resolution of the file b)the technology used to create the file c)the organization and layout of data in the file d)the number of bytes in the file

c) the organization and layout of data in the file

How can you protect a computer from electrical spikes and surges? a)Use a cable lock. b)Unplug the computer when it is not in use. c)Use a surge protector. d)Use an uninterruptible power supply.

c) use a surge protector

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____. a)Tracking your online activity and then selling that data without your knowledge b)Enticing you to friend someone so that they gain access to your account c)Using your photos and posts to form impressions about your character d)Alerting others that you are not home according to location-tracking features

c) using your photos and posts to form impressions about your character

Which option lists the computer components in order from oldest to newest? a)transistors, vacuum tubes, integrated circuits, personal computers, microprocessors b)microprocessors, vacuum tubes, transistors, personal computers, integrated circuits c)vacuum tubes, transistors, integrated circuits, microprocessors, personal computers d)integrated circuits, microprocessors, vacuum tubes, transistors, personal computers

c) vacuum tubes, transistors, integrated circuits, microprocessors, personal computers

Which of the following is an example of someone who is NOT practicing good netiquette? a)Tamika used the Reply All button to send an email about a meeting room change. b)Margie posted pictures from her son's baseball game with the caption, "Great job, boys!" c)Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office. d)Raj tweeted about the guest speaker at the staff meeting unveiling new office technology with the hashtag #cantwaittotry.

c) vance found pictures of dorie in a bikini on facebook and texted them to other men in the office

What characteristic of Big Data indicates how closely that data matches reality? a)velocity b)volume c)veracity d)variety

c) veracity

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? a)Intranet b)Wireless network c)Virtual private network d)Extranet

c) virtual private network

How would you describe the social networking site YouTube? a)YouTube is a social curation site. b)YouTube is a microblog. c)YouTube is a media-sharing network. d)YouTube is a discussion forum.

c) youtube is a media-sharing network

Simone just received a letter from her health care provider telling her she can create an account online that will give her access to all her health records. How would you describe what her provider is encouraging his patients to engage with? a)A BYOD (bring your own device) b)A learning management system (LMS) c)An intelligent workplace d)A mobile health app (mHealth)

d) a mobile health app (mHealth)

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________. a)plagiarism b)software piracy c)spamming d)catfishing

d) catfishing

What does a DSL modem use to send and receive digital data? a)Cable TV connections b)A network interface card c)A wireless router d)Copper telephone wiring

d) copper telephone wiring

Which of the following fields would be most important to encrypt in a customer table? a)Customer's city b)Customer's sales representative c)Customer's status d)Customer's credit card number

d) customer's credit card number

Andy has diabetes and he is not good about taking his medications or even checking his insulin levels. His doctor has recently started using mobile health (mHealth). How will Andy's doctor's use of mHealth help Andy get his diabetes under control? a)He will not have to visit the doctor as frequently. b)His health records will now be stored in the cloud. c)His doctor will be able to monitor him through the use of a smartphone. d)He will receive text reminders to take his medications and check his insulin.

d) he will receive text reminders to take his medications and check his insulin

Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer? a)Her hot water heater that has to be manually reset every time the power goes out. b)The carpet steamer she uses to clean her rugs when they get dirty. c)The sprinkler she has to turn on and off when she wants to water her plants. d)Her coffeemaker that she has set to turn on and make coffee every morning at the same time.

d) her coffeemaker that she has set to turn on and make coffee every morning at the same time

Social networking includes the following positive effects EXCEPT _________. a)growing professional networks b)promoting small and local businesses c)keeping in contact with others d)increasing your privacy

d) increasing your privacy

Students who complete an online test are not allowed to change their test grades. What aspect of the CIA triad is at work here? a)Availability b)Confidentiality c)Scalability d)Integrity

d) integrity

The quality of an audio file is determined by _____. a)the number of megabytes b)how pixelated it is c)the number of frames per second d)its bit rate

d) its bit rate

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____. a)Abbreviations b)Personal photographs c)Emojis d)Meeting invites

d) meeting invites

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? a)research spoofing b)cyberstalking c)phishing d)pretexting

d) pretexting

What technology is being used when you are sent an email saying you can track your package? a)M2M b)CAM c)LMS d)Scan code

d) scan code

What programming language supports relational databases? a)CSS b)HTML c)NoSQL d)SQL

d) sql

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. a)architectures b)protocols c)topologies d)standards

d) standards

You can monitor and protect your financial data in all of the following ways EXCEPT _____. a)Querying unfamiliar purchases found on your bank statements. b)Shredding financial documents before you discard them. c)Being cautious about what information you post on social networking sites. d)Storing financial information in an unsent email message.

d) storing financial information in an unsent email message

Sofie has strong people skills, listens well, and communicates effectively. Which technology career may be a good fit for her? a)Web marketing and social media b)Software and apps c)IT consulting d)Technology sales

d) technology sales

Daniella mailed a package to her brother three days ago. She wants to see if it has arrived yet. What technology will enable her to track her package? a)The phone that her brother will use when he receives the package. b)The computer that is finding the fastest route for the driver. c)The GPS that is avoiding traffic and hazardous conditions. d)The code on the package that is scanned at each leg of the journey.

d) the code on the package that is scanned at each leg of the journey

Which of the following is NOT true about mobile health? a)Physicians can monitor patients using digital devices through the use of a smartphone. b)Health records are stored in the cloud. c)Patients can receive text reminders to take medications. d)The need for visits to the doctor's office is increased.

d) the need for visits to the doctors office is increased

How do you create an email message? a)Use a content management system to publish notes to individuals. b)Use a web service and create an account. c)Use a program that captures incoming hashtags for sharing with others. d)Use an app or software to compose and send information.

d) use an app or software to compose and send information

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use? a)Audio Internet service provider (AISP) b)Voice and video service (VVS) c)Voice-to-Text (VTT) d)Voice over Internet Protocol (VoIP)

d) voice over internet protocol (VoIP)


Ensembles d'études connexes

Legal Environment brief hypotheticals

View Set

1.2 The Building Blocks of Accounting

View Set

Pediatrics Saunders: Oncological

View Set