ITE 152 Final Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How is a worm different from a Trojan? -A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device. -A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. -A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. -A worm spreads through a network, whereas a Trojan hides inside another program.

-A worm spreads through a network, whereas a Trojan hides inside another program.

What is a query? -A question you ask a table -A question you ask a record -A question you ask a database -A question you ask a field

A question you ask a database

Which of the following requests to Alexa is most likely to get the desired result? -Alexa, play Journey songs on Pandora. -Play Journey. -Alexa, play Pandora music and include a lot of Journey songs. -Alexa, I like the Journey albums. Play some of those and make sure you use Pandora.

Alexa, play Journey songs on Pandora.

What are the different views to display a table? -Design View -All of the above -Pivot Table & Pivot Chart View -Datasheet View

All of the above

Which of the following is a way to sort data? -Numerically -Alphabetically -All of the above -Chronologically

All of the above

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time? -Machine learning (ML) -Internet of Things (IoT) -Artificial intelligence (AI) -Natural language processing (NLP)

Artificially intelligence (AI)

Which of the following is NOT an example of modern-day artificial intelligence (AI) application? -Powering voice-based interactions between a human and a computer -Operating machinery without direct human oversight or intervention -Providing novel insights from data analysis -Asking droids for critical information during a hyper-space mission

Asking droids for critical information during a hyper-space mission

_____ ensures that the person requesting access to a computer is not an imposter. -Encryption -Authentication -Data mining -Automatic encoding

Authentication

Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this? -B2C -C2C -B2B -B2G

B2B

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? -Allow anyone who "friends" her to view her information. -Post all types of photos more often. -Ignore notices from the social networking site about changes to security. -Be cautious about what information she posts.

Be cautious about what information she posts

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? -Because insiders like to breach security to make a political statement -Because insiders need practice breaking into networks -Because insiders often like to cause disruption and panic among citizens -Because insiders sometimes create threats after incidents at their places of employment

Because insiders sometimes create threats after incidents at their places of employment

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? -Two factor authentication -Digital certificates -Encryption -Biometrics

Biometrics

Queries in access can be used -Both 'a' and 'b' -Only 'a' -as a source of records for forms and reports -to view, change and analyze data in different ways

Both 'a' and 'b'

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? -Rapid elasticity -Resource pooling -Measured service -Broad network access

Broad network access

Which company most likely relies almost solely on B2B transactions in their course of business? -Cleaning services company -Retail company -Shipping company -Chemical supply company

Chemical supply company

How can you protect personal information gathered by legitimate organizations? -Use the same password and username for all your online accounts. -Create a separate email account for receiving information from websites. -Sign up for many online mailing lists. -Link your credit or debit card to your online accounts.

Create a separate email account for receiving information from websites.

What would a password manager allow you to do? -Test your memorization skills. -Make sure you do not repeat passwords on similar accounts. -Create and store multiple strong passwords. -Prevent you from using birthdays in your passwords.

Create and store multiple strong passwords.

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. -creating malware -downloading harmful content -viewing or stealing computer data -reading wireless transmissions

Creating malware

Who enforces PCI compliance for merchants who accept credit card payments from customers? -Cardholders -Merchants -Credit card companies -The Department of Defense

Credit card companies

Which data type would be best suited to a field that lists a product's clearance price? -Currency -Number -AutoNumber -Date/Time

Currency

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. -cyberbullying -cyberstalking -data mining -social engineering

Cyberbullying

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud? -Natural language processing (NLP) -Robotic process automation -Data analytics -Chatbot

Data analytics

Which is a first step to deter thieves from accessing your financial information? -Be alert to signs that may indicate unusual activity in an account. -Do not provide personal information over the phone or through email. -Follow up on calls regarding purchases that were not made. -Review financial and billing statements each month carefully.

Do not provide personal information over the phone or through email.

Which of the following is LEAST likely to be a field in a Customers table? -LastName -Address -EmploymentDate -PhoneNumber

EmploymentDate

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? -Ergonomics -Technology addiction -Repetitive strain -Cyberbullying

Ergonomics

All cloud technologies must be accessed over the Internet. -False -True

False

Databases typically store their data in one big table. -True -False

False

Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. -False -True

False

One disadvantage of computerized databases is that they limit your ability to arrange information. -True -False

False

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. -True -False

False

To protect your information and help you to remember passwords, use your social media account login information to log into another site. -True -False

False

To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects. -True -False

False

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. -True -False

False

All the pet names in a veterinarian's database are stored in a _______ called PetName. -record -table -worksheet -field

Field

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. -File -Field -Table -Record

Field

What are the columns in a Microsoft Access table called? -Rows -Fields -Records -Columns

Fields

Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? -Forms -Queries -Reports -Tables

Forms

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? -Employer -Graduated -GPA -Major

Graduated

Which of the following is the strongest password? -Test1test2test3 -Welcome123 -H@veAGr3atDaY! -colorbluesky

H@veAGr3atDaY!

Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation? -He can make changes to his tax withholdings online. -He can complete on-the-job training customized to his job role. -He can remotely collaborate with teammates on projects, deadlines, and events. -He can back up data at data centers around the world.

He can remotely collaborate with teammates on projects, deadlines, and events.

What does a filter do? -Make more records available -Hide records from view -Slow down processing -Add to the quantity of data

Hide records from view

Which data type would be best suited to a field that lists customer email addresses? -Hyperlink -AutoNumber -Date/Time -Number

Hyperlink

How will you decide which browser security settings to allow and which ones to block? -If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too. -I will need to review each browser security setting and use my best judgement. -If the browser security setting is on a website sent from a friend, I always accept the setting. -If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like.

I will need to review each browser security setting and use my best judgement.

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? -SaaS -IaaS -DBaaS -PaaS

IaaS

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? -A worm has infected her computer and she needs to unplug her device. -A hacker is trying to put a Trojan on her computer. -Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. -It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does encryption work? -It scrambles the information until the key is used to unscramble it. -It is what happens when you download attachments from your email. -It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. -It is a key that you insert into your computer to unlock your saved files.

It scrambles the information until the key is used to unscramble it.

Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish? -It will help the AI system think more clearly. -It will make the AI system sound more human. -It will make the AI system cheaper to purchase and use. -It will increase the accuracy of the AI system's responses.

It will make the AI system sound more human.

In terms of privacy, which of the following is a best practice? -Saving your personal information as an email draft -Throwing away old bank statements that are more than three months old -Posting your location on social media -Keeping your Social Security number hidden in a locked box in your home

Keeping your Social Security number hidden in a locked box in your home

How does discarding computers in a landfill affect the environment? -Lead and mercury in computer parts are seeping into the ground and water supply. -Copper on circuit boards is creating fire hazards. -The computer parts quickly decay and become organic material -Data miners are digging up landfills looking for gold and platinum.

Lead and mercury in computer parts are seeping into the ground and water supply.

Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text? -Machine learning (ML) -Natural language processing (NLP) -Chatbot -Smart speaker

Machine learning (ML)

Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future? -More information about his needs -More available settings for various temperatures -More installed smart devices to work together -More programming on how to interpret voice commands

More information about his needs

What technology allows Siri to understand you when you request a route to a location in a nearby city? -Artificial intelligence (AI) -Internet of Things (IoT) -Natural language processing (NLP) -Machine Learning (ML)

Natural language processing (NLP)

Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? -Physical storefront -Online storefront -Online marketplace -Social media

Online storefront

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? -encryption -dumpster diving -identity theft -phishing

Phishing

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? -PageCount -Title -ProductID -Author

ProductID

Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment? -Measured service -Broad network access -On-demand self-service -Rapid elasticity

Rapid elasticity

Which learning model allows an AI system to develop its own strategies for solving problems or completing tasks? -Unsupervised learning -Reinforcement learning -Supervised learning -Artificial learning

Reinforcement learning

With more and more people using technology, what physical health diagnosis is on the rise? -cyberbullying -cyberstalking -repetitive strain injury -technology addiction

Repetitive strain injury

Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work? -Robotic process automation (RPA) -Internet of Things (IoT)- -Data analytics -Chatbot

Robotic process automation (RPA)

Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements? -SaaS -IaaS -PaaS -FWaaS

SaaS

How can you get the attention of a personal assistant app on your phone? -Say the wake word. -Complete the voice training process. -Reduce background noise. -Pause briefly before stating the command.

Say the wake word.

Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? -Z to A -A to Z -Largest to smallest -Smallest to largest

Smallest to largest

Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling? -Smart bulb -Smart plug -Smart lock -Smart security system

Smart plug

Which of the following types of websites typically provides the least security? -social media sites -online shopping sites -private business sites -online banking sites

Social media sites

You can monitor and protect your financial data in all of the following ways EXCEPT _____. -Being cautious about what information you post on social networking sites. -Shredding financial documents before you discard them. -Querying unfamiliar purchases found on your bank statements. -Storing financial information in an unsent email message.

Storing financial information in an unsent email message.

What does SQL stand for? -Stated question language -Structured query language -System query lingo -Status query language

Structured query language

Contact information for all the people taking a class at a school are stored in a ________ called Students. -record -worksheet -field -table

Table

In a database, each _________________ contains a collection of related data. -Table -Field -Record -None of the above

Table

What is a digital certificate? -A growing trend used to combine multiple types of authentication -The process of scrambling information so that it cannot be read -Technology used to verify a user's identity -The key to unlock information into a readable format

Technology used to verify a user's identity

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? -The table is missing a primary key. -The table is sorted. -The table is filtered. -The table has been deleted.

The table is filtered.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? -worm -ransomware -spam -Trojan

Trojan

A computerized database can store millions of telephone numbers. -True -False

True

A database is a collection of related information, but a database management system is a type of software program. -True -False

True

A database is an organized collection of information. -True -False

True

A query lets you speed up the browsing process by finding information that matches specifically to your criteria. -True -False

True

Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved. -True -False

True

Cloud computing and the Internet are two different technologies. -True -False

True

Many chatbot services provide support to employees and management rather than to customers. -True -False

True

A relationship is created between how many tables? -Two -Any number -Three -One

Two

What type of security requires something you know and something you have that no one else has? -data mining -biometric security -two part passwords -two factor authentication

Two factor authentication

Which learning model allows an AI system to create its own categories of data without labeling those categories? -Supervised learning -Artificial learning -Unsupervised learning -Reinforcement learning

Unsupervised learning

Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? -Inventory -Employees -Customers -Vendors

Vendors

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers? -Desktop as a Service -Cloud storage -Video conferencing application -Cloud-hosted training modules

Video conferencing application

Which of these e-commerce job roles could most likely be performed remotely from home or even from another country? -Hand picker -Web developer -Operations manager -Truck driver

Web developer

Which of the following is NOT a part of a database? -Tables -Records -Worksheets -Fields

Worksheets

In which of the following situations is a digital certificate useful? -You are registering for an event. -You are emailing a friend. -You are signing a rental lease. -You are researching a topic for an assignment.

You are signing a rental lease

Which of the following statements about browser security settings is false? -You must keep your accumulated web history as long as you use the browser. -You can choose which sites run pop-ups. -You can accept or deny cookies. -You can allow or block scripts on specific websites.

You must keep your accumulated web history as long as you use the browser.

Technology can lead to all of the following behavioral risks EXCEPT _____. -higher satisfaction with life -social withdrawal -a sedentary lifestyle -depression and anxiety

higher satisfaction with life


Ensembles d'études connexes

Chapter 4 Exam: Premiums, Proceeds and Beneficiaries

View Set

Las casas y la arquitectura en España

View Set

TEST 3: Chapter 7, Management & Leadership TEXT

View Set