CSIT pt. 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose 2.

-Switch to a standing desk. -Take frequent breaks.

Jenson needs to update his home address in his health insurance company's database. Which of the following applications can he open on his computer so he can make these changes?

A browser.

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of_________.

A hoax.

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware

What is an ISP?

A telecommunications company that sells Internet access

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

Acceptable use policy (AUP).

How would you design a webinar that would be interactive?

Add a poll.

A business can use a wiki in the following ways EXCEPT_______.

Aggregating content.

What technology can collect information to make decisions, reach conclusions, and combine information in new ways?

Artificial intelligence (AI).

You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there is an app on your phone that will use your location and show you that information. What is the app using?

Augmented reality.

How will technology help people with disabilities become more transportation independent?

Automated vehicles will be developed.

You received an unpleasant email from a coworker and you want to discretely notify your supervisor. Which of the following features could you use to do this?

BCC your supervisor in your response.

The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?

Because insiders sometimes create threats after incidents at their places of employment

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 ft/9meters?

Bluetooth

Angeline is deaf. To adhere with the Americans with Disabilities Act (ADA) how can technology help her compete in a hearing world?

Captioning software can be used to transcribe what is being said.

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman". Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even know if it's a real customer. This is an example of______.

Catfishing.

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?

Computer-aided manufacturing.

Which of the following would most likely be the key paired with a value of "Canada" in a nonrelational customer database?

Country.

What would a password manager allow you to do?

Create and store multiple strong passwords

Which of the following fields would be most important to encrypt in a customer table?

Customer's credit card number.

Melody is building a database for a restaurant. Which pair of tables is least likely to need a direct relationship with each other?

Customers, Ingredients.

Which of the following problematic behaviors relies on the use of digital technology?

Cyberbullying.

Morgan needs to hire someone to help implement a business intelligence system for her company. What type of professional would be the best fit for this job?

Data analyst.

Creating a(n)_____ means copying files from a computer's hard drive and storing them in a remote location.

Data backup

Which data repository type is most likely to include database tables and primary keys in its internal data structure?

Data warehouse.

Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ___________.

Digital citizenship.

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a _____________.

Digital detox.

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own_____.

Digital footprint.

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports_______.

Digital inclusion.

Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

Digital rights management (DRM).

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely

Ergonomics

Mindy needs to run a SQL query that will pull the names and birthdates of all her students. What should be the FROM phrase say in her query?

FROM students.

Raphael is working with a table in Access. He needs to see al the records for customers in Chattanooga so he can check the zip codes in that city. Which database tool will show only these records in the table?

Filter.

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

To protect a computer or a server, a(n)_________ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

Firewall

Posting hostile or insulting comments in response to someone else's blog post is called_______.

Flaming.

Businesses use webinars for the following reasons EXCEPT_______.

Group discussions.

Which of the following is the strongest password?

H@veAGr3atDaY!

Marcus recently has his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps

Emma tried to explain to her mother that computers are everywhere. Her mother does not believe her, and challenges Emma to find a computer in their home, as she knows she does not own a computer. Which of the following examples do you think Emma would show her mother as example of computer?

Her coffeemaker that she has set to turn on and make coffee every morning at the same time.

Technology can lead to all of the following behavioral risks EXCEPT______

Higher satisfaction with life

Which data type would be best suited to a field that lists customer email addresses?

Hyperlink.

Social networking includes the following positive effects EXCEPT______.

Increasing your privacy.

Students who complete an online test are not allowed to change their test grades. What aspect of the CIA triad is at work here?

Integrity.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomeware because it is telling her she has to verify payment information to unlock her computer

How would you describe an intelligent workplace?

It uses technology to enable workers to connect and communicate.

How does discarding computers in a landfill affect the environment?

Lead and mercury in computer parts are seeping into the ground and water supply

The local community college wants to increase its online offerings. To do so, the college will most likely need to purchase a(n)_________.

Learning management system(LMS).

Which of the following is a characteristic of a strong password?

Letters, numbers and symbols

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

List of posts with the most recent ones at the top.

Which of the following statements is true about public networks?

Many public networks are not secure

To observe professional messaging guidelines, you should avoid using the following EXCEPT________.

Meeting invites.

How is a microprocessor different from an integrated circuit?

Microprocessors are faster, smaller and less expensive than integrated circuits.

To access the Internet, a router must be connected to a_________.

Modem

You can configure your wireless router to protect you devices in all of the following ways EXCEPT_______

Naming your router something you'll remember, like you street address

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette.

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

What kind of database is needed to hold and organize diverse data types, such as X-ray images and doctors' notes, in a medical database?

Nonrelational database

Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business. What kind of DBMS is she using?

Open source.

Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

People with color blindness.

Devices on a_________ area network are connected via Bluetooth.

Personal

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

Casey is looking for a free, open-source RDBMS for his company. Which of the following best meets these requirements?

PostgreSQL.

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

Pretexting

Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key?

ProductID.

Computers communicating on a network must follow a______, a common set of rules for exchanging information.

Protocol

Which of the following is typical content for a podcast?

Radio shows.

Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Remove the battery and throw it in the trash.

With more and more people using technology, what physical health diagnosis is on the rise?

Repetitive strain injury

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury.

What types of activities are ideal for a robot to perform?

Repetitive tasks.

Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

Reset the old phone to factory settings.

What hardware is essential to creating a home Wi-Fi network?

Router

Kiera is building a front-end user interface for the database her new website will use. Which of the following languages is NOT used to build a webpage?

SQL.

What programming language supports relational databases?

SQL.

Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

Screen reader.

Which of the following technologies assists users that have a visual disability?

Screen readers.

A smart refrigerator can use_______ to detect when you are running low on milk, and then send a reminder to you on a wireless network.

Sensors.

You are using a social network and want to let others know that you are interested in their posts. Which if the following could you use to alert them to your interest?

Share the post on your news feed.

On what type of network can you rent things such as cars, tools, and rooms?

Sharing economy network.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices

Kian needs to sort a list of patients by birthdate to show the oldest patents first. What sort order on the birthdate field will give him this result?

Smallest to largest.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

Akira has a mobility impairment that makes it difficult to type on a keyboard. What technology can she use to create written documents without using a keyboard?

Speech recognition software.

Scarlet needs to create a file to hold a list of expenses for an upcoming project, and she needs to do some basic calculations with the numbers in the budget. Which kind of file is the best fit for this purpose?

Spreadsheet.

In a_______ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

Sofie has strong people skills, listens well, and communicates effectively. Which technology career may be a good fit for her?

Technology sales.

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT________.

The HTML coding.

Daniella mailed a package to her brother three days ago. She wants to see if it has arrived yet. What technology will enable her to track her package?

The code on the package that is scanned at each leg of the journey.

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of________.

The digital divide.

______ is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

The digital divide.

When Hafsa writes research paper for her psychology class, __________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.

The fair use doctrine.

In a connected network, how are hubs and switches similar to one another?

The provide a central point for cables in a network

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin

How are delivery drivers able to meet the delivery timelines selected by customers when purchasing products?

They use a GPS to avoid traffic delays.

How might a business use a blog?

To communicate with customers.

What type of security requires something you know and something you have that no one else has?

Two factor authentication

One of Eden's customers has closed his account and moved to a different state. She needs to change his status to Inactive. What SQL command will accomplish this task?

UPDATE.

How do you create an email message?

Use an app or software to compose and send information.

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goal?

Use sleep modes and other power management features for computers and devices.

Social networking can leave you exposed to criminal activity in the following way EXCEPT_______.

Using your photos and posts tp form impressions about your character.

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

What characteristic of Big Data indicates how closely that data matches reality?

Veracity.

Edward shares a blog post on social media that says the Center for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

Verify the content with an authoritative source.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

Margot and Tomas have heard how beautiful the Swiss Alps are, but they are afraid to fly. What technology could they use to see and experience the Alps without flying there?

Virtual reality (VR).

_______ is the use of computers to stimulate a real or imagined environment that appears as a three-dimensional space.

Virtual reality (VR).

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?

Voice over Internet Protocol (VoIP)

Which of the following would be considered a strong password?

Wbcm2!4!820!

Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

Wikis can be heavily biased.

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser

How would you describe the social networking site YouTube?

YouTube is a media-sharing network.


संबंधित स्टडी सेट्स

Cushing's Syndrome/Addison's Disease

View Set

Orgin, Insertion, Action of Muscles

View Set

ACC 330 True/False Final Exam Practice

View Set

PHOTO Test 1 Exposure, Shutter Speed, Bracketing, Equivalent Exposure

View Set

Chapter 7 Quiz Organizational Behavior

View Set