CIS Exam, Questions from quizzes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results?

"Captain America: Civil War"

Which of the following describes an IP address?

- It is referred to as a dotted quad. - It identifies any computer connecting to the Internet. - It identifies a website.

Being computer literate includes being able to

- avoid spam, adware, and spyware. - use the web effectively. - diagnose and fix hardware and software problems.

Intellectual property

- is the result of someone's creative work and design. - can be protected legally by the patent system. - can include works of music, film, or engineering design.

Computer viruses can be spread by

- sharing flash drives. - downloading and running a file attached to an email. - downloading a song from a peer-to-peer sharing site.

It is important to maintain your online reputation

-because of the persistence of information. -because employers often review social media before hiring employees. -to ensure information about you is accurate.

In the URL http://www.whitehouse.gov/blog, which part is considered the top-level domain name?

.gov

A(n) ______ is a laptop computer that can convert into a tablet-like device.

2-in-1 PC

Which of the following would not cause interference or poor connectivity between nodes on a wireless network? - Concrete walls - Some appliances - A wireless extender - Nodes that are too far apart

A wireless extender

Which server would a client/server network include to ensure only authorized users are logging onto the network? - Cloud - Application - Communications - Authentication

Authentication

Which is not a key component of a typical client/server network?

Bastion host

Ensuring that website content is not slanted in its point of view is checking for:

Bias

The set of instructions that define how to display the HTML elements in your site is

CSS.

Which of the following actions would NOT help to identify your personal ethics? - Identify the influences of your work environment. - Conduct a genealogic study of your extended family. - Prepare a list of values that are most important to you. - Describe yourself.

Conduct a genealogic study of your extended family.

An IDE is a tool that has support for

Editing and debugging

A 32-character password is an example of using biometrics. T/F

F

A macro is a program released early to the public for testing and evaluation. T/F

F

A touch pad is a pointing device usually found in tablets. T/F

F

Actual data throughput is usually higher on wireless networks than on wired networks. T/F

F

App creation software includes tools like Adobe Photoshop. T/F

F

Artificial intelligence systems think exactly like human beings do. T/F

F

Catfishing is posting inflammatory remarks online to generate negative responses. T/F

F

Conventional hard drives are preferable to SSD drives because they transfer data more quickly. T/F

F

Copying a music CD and giving it to a friend is "fair use." T/F

F

Copyright lasts for only 50 years in the United States. T/F

F

Data and information are interchangeable terms. T/F

F

Encrypting data is not an appropriate measure for mobile devices such as smartphones. T/F

F

Modern desktop operating systems are considered single-user multitasking operating systems. T/F

F

Moore's Law describes the pace at which RAM modules improve. T/F

F

Once files are placed in the Recycle Bin they cannot be recovered. T/F

F

P2P networks require specialized network operating system software. T/F

F

Podcasts can only be created by professional organizations. T/F

F

RAM is non-volatile storage. T/F

F

System restore points can only be created by Windows automatically on a regular schedule. T/F

F

The move toward access instead of ownership is a sign of cognitive surplus. T/F

F

There is no limit to how much RAM you can add to modern computers. T/F

F

Web-based databases cannot be used to help investigators solve criminal cases. T/F

F

When you subscribe to software, no license is necessary. T/F

F

A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type. t/f

False

A logical error can be detected and repaired by the compiler. t/f

False

A small slice of a data warehouse is called a data mine. t/f

False

An RTM version of software is often released so users can help debug it. t/f

False

An authentication server is used to host websites on a client/server network. t/f

False

Data warehouses capture data only from one time period. t/f

False

If you use an Internet cache, then the information displayed in your browser is automatically refreshed. t/f

False

Instant messaging is secure because of the type of encryption used. t/f

False

Many programming languages are moving away from the object-oriented paradigm. t/f

False

Routers are used to send data on a specific route through an internal network. t/f

False

The term dotted quad means you have four dots in a row in your Java source code. t/f

False

When the binary code is retrieved from RAM and moved to the CPU, this stage is known as - execute. - decode. - fetch. - store.

Fetch, then it goes to execute

Which type of broadband Internet offers connections nearing the speed of light?

Fiber-optic

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

File History

Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under? - No license is necessary - Open Source License - GNU General Public License - Copyleft

GNU General Public License

A special processing chip found on video cards is the

GPU.

Which of the following is not one of the factors used in multi-factor authentication? - Identity - Inherence - Possession - Knowledge

Identity

Which of the following is not a category of intellectual property? Trade dress- Copyright- Imprint- Patent-

Imprint

______ printers work by spraying tiny drops of ink onto paper.

Inkjet

The collection of large national and international networks used to establish the Internet is called the

Internet backbone.

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? - VPN - WAN - PAN - Intranet

Intranet

Reducing the sampling rate when digitizing a file has which effect on the file?

It decreases the file size

Which of the following describes fiber-optic broadband? - Speed drops as the distance from the main signal source increases. - It connects with coaxial cable. - It uses strands of pure glass or plastic. - It connects via an orbiting satellite

It uses strands of pure glass or plastic.

Which of the following should you not do to secure a wireless network? - Implement media access control. - Create a security encryption passphrase. - Disable SSID broadcasting. - Keep the default network name and router password.

Keep the default network name and router password.

Crowdfunding sites include

Kickstarter and GoFundMe.

Which of the following would not impact the digital divide? - Legislation allowing communications companies to charge per website for access - A decline in the price of internet access - Less sharing of the work we produce - Expansion of free wifi connectivity in major cities

Less sharing of the work we produce

An example of an open source OS is

Linux

If you want to use your computer for recording your band, you would benefit most from a(n)

MIDI interface.

What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?

Modem and router

The type of database that would be best to store and organize data with feature and measure attributes is which of the following?

Multidimensional database

A customer information table linked to a password table in a business database reflects which type of relationship?

One-to-one

Calendars, tasks, and e-mail can be found in which application?

Outlook

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?

P2P network

Which of the following is not a digital video file format? PDF- AVI- WMV- MPEG-4-

PDF

Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use? - Relationship - Filter - Request - Query

Query

Which of the following is an example of financial management software?

Quicken

_______ is a set of strategies for using more than one drive in a system.

RAID

Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place? - Batch processing - Input processing - Real-time processing - All of the above

Real-time processing

Which of the following does not describe mobile broadband? - Requires a wireless ISP - 4G or 5G - A cellular service that brings Internet access to mobile devices - A wireless hotspot

Requires a wireless ISP

Before donating your Windows computer, you should perform a Windows

Reset.

Which topology tends to provide the fairest allocation of network resources?

Ring

Which of the following devices would use a real-time operating system? - iPhone - Roomba Vacuum - Microsoft Surface tablet - all of the above

Roomba Vacuum

Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights? - Favorites - Custom Search - History - Search Tools

Search Tools

Which of the following is an advantage of installing a client/server network in a business? - Decentralization of peripherals - Decentralization of files and data - Centralization of network adapters - Sharing of peripherals

Sharing of peripherals

Which of the following would NOT be a benefit of networking computers? Sharing printers and other peripherals- Sharing files- Sharing an Internet connection- Sharing software licenses

Sharing software licenses

Software that is hosted by the vendor and accessed online is called

Software as a Service (SaaS).

The database programming language SQL stands for

Structured Query Language.

Which of the following are common to all programming languages?

Syntax, keywords, and operators

Which of the following is not considered an accessibility utility? - Narrator - System Restore - Speech Recognition - Magnifier

System Restore

A network-attached storage device is like a network-connected hard drive.

T

Cat 5e and Cat 6 are types of twisted-pair cable T/F

T

Course management software creates a virtual learning experience for students and houses course materials, tests, and discussion boards. T/F

T

Desktop systems are invariably a better value than lighter, more mobile computers.T/F

T

Different versions of Linux are known as distros. T/F

T

Digital rights management (DRM) is a system of access control that allows only limited use of the material. T/F

T

Google Docs is an example of Software as a Service. T/F

T

Google Docs is an example of a wiki. T/F

T

Hactivism is different from cyberterrorism. T/F

T

In Windows, if you experience unreliable behavior, try a System Restore before doing a Windows Reset. T/F

T

Intellectual property can be legally protected even though it is not a physical object. T/F

T

Plagiarism is technically not illegal in the United States.

T

SSD drives are superior to conventional disk drives because they have no moving parts. T/F

T

Sending e-mails to lure people into revealing personal information is a technique known as phishing. T/F

T

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. T/F

T

The "brain" of the computer is the CPU. T/F

T

The power-on self-test ensures all peripheral devices are attached and operational.T/F

T

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network. T/F

T

You can attach more than four wired devices to a network by using a switch. T?V

T

Your location can be captured from your mobile device even if app location tracking is turned off. T/F

T

Your social security number should never be shared on a website, in an email, or through messaging. T/F

T

analog signals are continuous T/F

T

Which of the following would you NOT see on a Windows 10 Start menu? - Power - Task View - tiles - apps list

Task View

Which of the following does not determine the quality of a digital image? - Image sensor size - Resolution of the camera - File format and compression used - The number of pixels in the camera lens

The number of pixels in the camera lens

Which statement is not true about the web? - Special links are used to navigate from page to page on the web. - The web is a subset of the Internet. - The web was based on a protocol developed by Tim Berners-Lee. - The web is based on the WWW protocol.

The web is based on the WWW protocol.

A filter is used to create a temporary subset of data from a database. t/f

True

A primary key is used to uniquely identify records. t/f

True

AJAX allows you to create websites that can refresh without the user taking an action. t/f

True

MIME is the protocol that supports sending files as e-mail attachments. t/f

True

Most modern operating systems include some type of NOS functionality. t/f

True

Network adapters perform specific tasks to enable nodes to communicate on a network. t/f

True

Star topologies are the most widely used topology. t/f

True

Third-generation programming languages include Java, C, and FORTRAN. t/f

True

Your Internet service provider has a default DNS server to translate a URL into an IP address. t/f

True

The most common computer port is the ______ port

USB

Which network cable type is most susceptible to signal interference?

UTP

Which of the following statements is false? - Ethical decisions are usually influenced by personal ethics. - Individuals who have no sense of right or wrong exhibit amoral behavior. - Unethical behavior is always illegal. - Life experience affects an individual's personal ethics.

Unethical behavior is always illegal

A feature in Windows 10 that is used to organize open windows into task-specific groups is called

Virtual Desktops.

Which of the following data-mining techniques is used to create charts and dashboards? - Visualization - Clustering - Classification - Affinity grouping

Visualization

The type of network that would be necessary to connect the networks of two college campuses would be:

WAN

Which of the following is the most secure security protocol used with routers? - WPA2 - WEP2 - WPA - WEP

WPA2

When is a flat database sufficient to use when organizing data?

When the data is simple and can be organized in one table

Beta software is made available because

a company is making an early release to test bugs.

An applet is

a small application located on a server computer.

Bike sharing programs like Citi Bike are an example of

a subscription-style business model made possible by technology.

Which of the following is a sensor found in certain smartphones? - hygrometer - RAM - accelerometer - HDMI

accelerometer

IPv6 uses 128 bits to assign a(n)

address to every device connected to the internet

In selecting the most appropriate language it is useful to know - how quickly the final code must run. - how much space the final code delivered can occupy. - if there is a specific target environment (say, a specific operating system). - all of the above

all of the above

The process whereby users prove they have authorization to use a computer network is known as

authentication.

Authentication techniques that rely on personal biological traits are called

biometrics.

In a computer, each _____ can represent either a 0 or a 1.

bit

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses.

A good way to assess your CPU usage is to

check the Performance tab of the Task Manager.

Data captured as users navigate through a website is called

clickstream data.

Encryption is used to

code your e-mail so only one person can decipher it.

All of the following are current focuses of AI research EXCEPT

cognitive surplus.

Digital audio software can be used to

compose songs or soundtracks with virtual instruments.

You need to know how to program to

create unique software solutions for specialized problems.

Unnecessary duplication of data in a database is referred to as

data redundancy.

Which of the following is not considered metadata? - Field size - Database name - Field name - Data type

database name

The steps of the program development life cycle start with

describing the problem.

The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of

digital convergence.

When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.

digitizing

Which component of a computing device drains the battery the fastest? - display screen - hard drive - Wi-Fi adapter - Bluetooth adapter

display screen

Which of the following is an open electronic publishing format? - SMS - ePub - azw - PDF

ePub

How the program should behave if the input data is invalid is part of

error handling.

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as

fake news.

Ergonomics is an important consideration

for all computing devices.

Sometimes groups of data packets are sent together in a package called a

frame.

When you install all the most commonly used files and programs to your computer's hard drive, you have completed which kind of software installation?

full

The first step when using object-oriented design is to

identify all of the categories of inputs that are part of the problem.

When someone uses your personal information to pose as you, this is

identity theft.

Sophisticated modeling software is helping international researchers

increase the pace of research in finding and producing vaccines.

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

inoculation.

When a printer receives a command, it generates a unique signal to the OS, which is called a(n)

interrupt.

Using copyrighted works without permission of the copyright holder

is possible under the "fair use" doctrine.

A packet analyzer is called a sniffer because

it captures and reads data inside each packet.

HTTPS is different than HTTP because

it is a combination of HTTP and the Secure Sockets Layer (SSL).

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce?

mobile commerce

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

network address translation (NAT)

A process to ensure that data in a database is organized most efficiently is called

normalization.

Device drivers are

often bundled with the operating system.

Java is considered to be architecture neutral because it

only needs to be compiled once and can run on many different CPUs.

LibreOffice is an example of which type of software?

open source software

Moore's Law refers to the

pace at which CPUs improve.

When an OS processes tasks in a priority order, it is known as

preemptive multitasking.

The most common output device for hard output is a

printer.

What web browser feature would be particularly useful when using public computers?

privacy browsing

What is the first step of the SDLC?

problem identification

Which of the following functions of a computer is mostly responsible for turning data into information? - storage - output - input - processing

processing

Data can be retrieved fastest from - cache memory. - RAM. - registers. - HDMI.

registers.

Image-editing software allows you to

remove red eye

Windows creates "restore points" so that you can

return your system to the way it was before you installed new software.

The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the

root directory.

A ______ is a program that takes complete control of your computer without your knowledge.

rootkit

A surge protector may look like just another power strip but it also can

save your device if a voltage spike is sent through the electrical system.

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability.

Which of the following is not a component of a search engine? - search engine software - indexer program - spider - search assistant

search assistant

SMTP is the set of rules used to

send e-mail along the Internet to its destination

The crisis-mapping tool Ushahidi

shows that a free software product can have great value.

The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software are called

system requirements.

The information in a data packet includes

the data and the destination

A GUI user interface is special because

there is a set of icons that represent the OS tasks.

A private key is important

to decode an encrypted message

Which of the following is a good precaution to take when making online purchases?

use a private browser when purchasing items from a public computer

Touch-screen devices usually feature ______ keyboards.

virtual

RAM is

volatile memory

The Internet is primarily funded by

your federal income taxes


संबंधित स्टडी सेट्स

Accounting Exam 3 Multiple Choice

View Set

PDBIO 210 --Lesson 6 -- Appendicular Skeleton--Pelvic girdle, os coxae

View Set

MS PL-100 Individual Question Sets

View Set

Biology Exam: Polarity, hydrogen bonds, and properties of water

View Set

Chapter 2: Network Infrastructure and Documentation

View Set

ELE 3010 Midterm Exam Hope Parnell Clemson University

View Set