ITE Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a query? A question you ask a record A question you ask a database A question you ask a field A question you ask a table

A question you ask a database

How can an attacker execute malware through a script? A script can run a series of instructions to download and run malware. A script can retrieve and store your personal information, such as your online buying habits. A script can send you a fraudulent email message requesting confidential information. A script searches the Internet for personal information about you.

A script can retrieve and store your personal information, such as your online buying habits.

How is a worm different from a Trojan? A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm spreads through a network, whereas a Trojan hides inside another program. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

A worm spreads through a network, whereas a Trojan hides inside another program.

What are the different views to display a table? Pivot Table & Pivot Chart View All of the above Datasheet View Design View

All of the above

Which of the following is a way to sort data? All of the above Numerically Alphabetically Chronologically

All of the above

_____ ensures that the person requesting access to a computer is not an imposter. Encryption Data mining Authentication Automatic encoding

Authentication

Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Ignore notices from the social networking site about changes to security. Be cautious about what information she posts. Allow anyone who "friends" her to view her information. Post all types of photos more often.

Be cautious about what information she posts.

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? Biometrics Encryption Two factor authentication Digital certificates

Biometrics

Queries in access can be used as a source of records for forms and reports to view, change and analyze data in different ways Both 'a' and 'b' Only 'a'

Both 'a' and 'b'

What would a password manager allow you to do? Prevent you from using birthdays in your passwords. Make sure you do not repeat passwords on similar accounts. Test your memorization skills. Create and store multiple strong passwords.

Create and store multiple strong passwords.

Which data type would be best suited to a field that lists a product's clearance price? Date/Time Currency Number AutoNumber

Currency

Which of the following is LEAST likely to be a field in a Customers table? Address LastName EmploymentDate PhoneNumber

EmploymentDate

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Ergonomics Repetitive strain Cyberbullying Technology addiction

Ergonomics

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. File Record Table Field

Field

What are the columns in a Microsoft Access table called? Columns Rows Fields Records

Fields

Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Queries Forms Reports Tables

Forms

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Major Graduated GPA Employer

Graduated

What does a filter do? Make more records available Slow down processing Hide records from view Add to the quantity of data

Hide records from view

Which data type would be best suited to a field that lists customer email addresses? Number Date/Time Hyperlink AutoNumber

Hyperlink

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. A worm has infected her computer and she needs to unplug her device. A hacker is trying to put a Trojan on her computer. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

How does discarding computers in a landfill affect the environment? Copper on circuit boards is creating fire hazards. Data miners are digging up landfills looking for gold and platinum. The computer parts quickly decay and become organic material Lead and mercury in computer parts are seeping into the ground and water supply.

Lead and mercury in computer parts are seeping into the ground and water supply.

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? ProductID Author PageCount Title

ProductID

Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? Z to A Smallest to largest A to Z Largest to smallest

Smallest to largest

What does SQL stand for? Stated question language Structured query language System query lingo Status query language

Structured query language

Which field could serve as the primary key for a list of students in your school? Student ID number Full name Birth date Phone number

Student ID number

In a database, each _________________ contains a collection of related data. Field Record Table None of the above

Table

What is a digital certificate? A growing trend used to combine multiple types of authentication The process of scrambling information so that it cannot be read Technology used to verify a user's identity The key to unlock information into a readable format

Technology used to verify a user's identity

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is missing a primary key. The table is sorted. The table is filtered. The table has been deleted.

The table is filtered.

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? ransomware worm Trojan spam

Trojan

A relationship is created between how many tables? One Two Three Any number

Two

How can you protect a computer from electrical spikes and surges? Unplug the computer when it is not in use. Use a cable lock. Use an uninterruptible power supply. Use a surge protector.

Use a surge protector

Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Inventory Employees Vendors Customers

Vendors

Which of the following is NOT a part of a database? Worksheets Fields Records Tables

Worksheets

In which of the following situations is a digital certificate useful? You are researching a topic for an assignment. You are signing a rental lease. You are emailing a friend. You are registering for an event.

You are signing a rental lease.

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. creating malware reading wireless transmissions downloading harmful content viewing or stealing computer data

creating malware

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying social engineering data mining cyberstalking

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. alarm private copy data backup uninterruptible data supply

data backup

A Trojan is a malicious program that uses a computer network to replicate.

false

Databases typically store their data in one big table. true or flase

false

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. True False

false

To prevent a laptop from being stolen, you can use a surge protector.

false

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? pretexting cyberstalking research spoofing phishing

pretexting

With more and more people using technology, what physical health diagnosis is on the rise? repetitive strain injury technology addiction cyberbullying cyberstalking

repetitive strain injury

Which of the following types of websites typically provides the least security? online banking sites social media sites online shopping sites private business sites

social media sites

Contact information for all the people taking a class at a school are stored in a ________ called Students. table field record worksheet

table

A computerized database can store millions of telephone numbers. true or false

true

A database is an organized collection of information. true or false

true

How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. If the browser security setting is on a website sent from a friend, I always accept the setting. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.

I will need to review each browser security setting and use my best judgement.

In terms of privacy, which of the following is a best practice? Posting your location on social media Throwing away old bank statements that are more than three months old Keeping your Social Security number hidden in a locked box in your home Saving your personal information as an email draft

Keeping your Social Security number hidden in a locked box in your home

You can monitor and protect your financial data in all of the following ways EXCEPT _____. Shredding financial documents before you discard them. Being cautious about what information you post on social networking sites. Storing financial information in an unsent email message. Querying unfamiliar purchases found on your bank statements.

Storing financial information in an unsent email message.

One disadvantage of computerized databases is that they limit your ability to arrange information. true or false

false

Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.

false

All the pet names in a veterinarian's database are stored in a _______ called PetName. record table field worksheet

field

Technology can lead to all of the following behavioral risks EXCEPT _____. a sedentary lifestyle social withdrawal depression and anxiety higher satisfaction with life

higher satisfaction with life

Which of the following is a characteristic of a strong password? numbers in a series personal information A short phrase letters, numbers, and symbols

letters, numbers, and symbols

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. turning off remote management to the device creating a strong password to access the router utilizing guest access when needed and turning it off when guests leave naming your router something you'll remember, like your street address

naming your router something you'll remember, like your street address

A database is a collection of related information, but a database management system is a type of software program. true or false

true

A field's data type determines what kind of information can be stored there. true or false

true

A query lets you speed up the browsing process by finding information that matches specifically to your criteria. true or false

true

What type of security requires something you know and something you have that no one else has? biometric security two part passwords data mining two factor authentication

two factor authentication


Ensembles d'études connexes

HIV.AIDS Optional EAQ's + Clicker Questions

View Set

IF Lec 4: Optimal Currency Areas, Chinese ER regime

View Set

Anatomy and physiology Chapter 25 ST Fluid, Electrolyte, and Acid‐Base Balance

View Set