IT 104 FINAL PRACTICE 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials. Additive manufacturing Remote printing Mainstream manufacturing Prototyping

Additive manufacturing

A separation alarm consists of two small devices; you attach one to your computer and place the other somewhere close to you. If the two devices are separated, what will happen? An alarm will sound. You will get an email alert. The computer will be disabled. The protection lock will engage.

An alarm will sound.

_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN. C++ C C# BASIC

BASIC

Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies? FORTRAN RPG BASIC COBOL

COBOL

_____ is a risk mostly when working inside a computer and directly touching the circuit boards. Electrostatic discharge (ESD) Power conditioning (PC) Static conditioning (SC) Surge discharge (SD)

Electrostatic discharge (ESD)

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

False

True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.

False

True or False: Query tools are used to design and test data tables in a database.

False

A disaster recovery plan typically does not answer which of these questions? What storage-level appliances or drives will be used? Where will data backups be stored? What data backup procedures will be followed? How will users' identities be confirmed?

How will users' identities be confirmed?

Which of the following statements does not describe pseudocode? It's a useful tool for organizing the way a programmer thinks about a solution. It involves envisioning a project in its entirety to identify the larger elements that must be handled first. It's a formally styled natural language, not a programming language. It's used to write algorithms.

It involves envisioning a project in its entirety to identify the larger elements that must be handled first.

Which of these statements defines the term modularity? It's a measurement of how well the source code is divided into individual modules. It's a technique that prevents data from being altered during program execution. It's a way of breaking a large problem into smaller, more manageable pieces. It's a fixed, well-defined segment of a program.

It's a measurement of how well the source code is divided into individual modules.

_____ merges augmented aspects of real and virtual worlds. Augmented reality Virtual reality Mixed reality Limited reality

Mixed reality

In _____, the user builds the query by selecting one or more tables to query, adding the fields to display in the results in a query grid, and then entering the entry to match or other criteria in applicable fields. Access Query by Example (QBE) SELECT Structured Query Language (SQL)

Query by Example (QBE)

Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces. Exchange Exchange Online SharePoint Office 365

SharePoint

The term _____ refers to software that's delivered on demand from the cloud (the internet) via a web browser. Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Email as a Service (EaaS) Software as a Service (SaaS)

Software as a Service (SaaS)

What does the abbreviation SQL stand for? Selected Query Links Systematic Query Language Specific Query Location Structured Query Language

Structured Query Language

For a database that stores students' grades, which of the following fields could be designated as a primary key? StudentName StudentID StudentGPA StudentAddress

StudentID

_____ processing occurs when the database updates immediately for each input. Immediate Batch Transactional Input

Transactional

True or False: A report presents output from a data table or query in an easy-to-read format.

True

_____ software can create multiple distinct operating servers that run simultaneously on a single physical server machine, effectively turning that one server into two or more. Server update Virtualization Syncing Upload

Virtualization

Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm

a Trojan horse

What is a smart card? a plastic card that has all of a person's user names and passwords recorded on it a plastic card that's used to make purchases by drawing funds from a bank account a plastic card that contains a computer chip with stored information a plastic card that's used to purchase items on credit

a plastic card that contains a computer chip with stored information

Third-party cookies are created by which of the following? the site you are visiting an ad on a site your marketing profile your browser's settings

an ad on a site

Which of the following is not an example of a database object? a form a report an attribute a data filter

an attribute

What is an online predator? an individual who posts dangerous information online an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth an individual who lacks the judgment to leave or avoid offensive websites an individual who texts and sends harassing email messages and posts embarrassing photos

an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth

People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities. visual perception audio perception stereoscopic mental interface

audio perception

Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees

authorized users; sender and receiver

Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees

authorized users; sender and receiver

You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files. restore system update system external storage system backup system

backup system

Which of the following types of data processing takes place at a scheduled time or at a critical point in a process? up-to-date processing transaction processing scheduled processing batch processing

batch processing

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. testing harness alpha product gold release beta version

beta version

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. smart card biometric identifier tracking system user name and password

biometric identifier

The abbreviation B2C stands for which type of e-commerce? buyer-to-company business-to-consumer business-to-client bidder-to-closer

business-to-consumer

In this screenshot of the Slack collaboration platform, officebot is an example of a(n) robot. expert system. digital interface. chatbot.

chatbot.

When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. restore reserve replace check out

check out

A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. cloud management supplementation cloud bursting cloud transitioning

cloud bursting

Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? completeness check range check consistency check alphanumeric check

completeness check

A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. consumer database e-commerce report consumer profile marketing strategy

consumer profile

Java has _____, which means it can run on nearly any operating system. nonprocedural language communication facilitation scripting language cross-platform compatibility

cross-platform compatibility

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council hate speech cyberbullying social media engagement pornography

cyberbullying

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent data corruption. data redundancy. data updates. data integrity.

data corruption.

A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios. connectivity data modeling Gantt charts telematics

data modeling

Which of the following terms refers to the activities performed with a database? data designing data specialization data management data processing

data processing

This screen shot illustrates a customers _____, which was created in Microsoft Access. data table report transaction record

data table

Using which of the following techniques ensures that users enter correct and complete data into the system? data contamination data integrity data validation data normalization

data validation

Unlike an operational database, a(n) _____ doesn't change or delete the information it stores on an ongoing basis. data warehouse information system inventory database distributed database

data warehouse

A _____ is a collection of data organized in one or more tables stored on a computer. database presentation spreadsheet document

database

Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database editing database monitoring database operations database administration

database administration

Many divisions of the US government make _____ available for free online, including through the portal Data.gov. field names metadata datasets data filters

datasets

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times. authentication deduplication archive restoration

deduplication

Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). testing implementation design proposal and planning

design

Hand-eye coordination, which is related to tactile perception, is called balance. mobility. navigation. dexterity

dexterity

Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM). program copying prevention (PCP). new-age copyright management (NACM). Sony BMG.

digital rights management (DRM).

A password is considered strong if it's a common word, such as Password. easy to remember but hard to guess. easy to remember because it's obvious, such as a pet's name. hard to remember and easy to guess.

easy to remember but hard to guess.

In a store or restaurant, the cash register system and supporting information system (IS) software and systems are commonly referred to as the distribution management system. electronic control system. product logistics system. electronic point of sale system.

electronic point of sale system.

To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted. verification corruption transmission encryption

encryption

The principles a person uses to determine right and wrong and to guide his or her choices and actions are called traditions. laws. ethics. guidelines.

ethics.

True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.

false

A _____ cookie is created by the actual website a user visits. first-party global second-party third-party

first-party

A _____ cookie is created by the actual website a user visits. first-party global second-party third-party

first-party

Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. hacking decoding compiling debugging

hacking

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. software robot genetic algorithm knowledge engineer inference engine

inference engine

A business's decisions and actions often depend on the decisions and actions of others; this fundamental business characteristic is termed interdependence. internal dependence. intrabusiness. independence.

interdependence

The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. data centers; your local computer internet-based resources; your local computer your local computer; internet-based resources your local computer; data centers

internet-based resources; your local computer

This graphic illustrates the _____ process, which matches data from fields in the specified data tables. exchanging connecting joining data browsing

joining

A(n) _____ is the amount of energy required to sustain one watt for one second. joule amp ohm megawatt

joule

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction

key

An alphanumeric check allows only _____ to be entered. letters of the alphabet and digits symbols such as dollar signs numeric data such as birth dates credit card numbers

letters of the alphabet and digits

A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. multidimensional; cube hybrid; model object-oriented; object multidimensional; block

multidimensional; cube

Random variations of algorithms are called inferences. mutations. data masses. crossovers.

mutations.

A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it. nonprocedural assembly markup legacy programming

nonprocedural

In object-oriented programming (OOP), a(n) _____ is a module. macro function routine object

object

After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. preventive perfective adaptive corrective

perfective

Which of the following is not a common type of data model? XML multimedia personal object-oriented

personal

The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. perfective corrective preventive adaptive

preventive

Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as just-in-time (JIT) manufacturing. operational streamlining. procurement. supply chain management (SCM).

procurement.

A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online. fast information (FI) quick response (QR) speedy review (SR) rapid reply (RR)

quick response (QR)

A _____ program can seize control of a computer until the user agrees to the attacker's demands hijacking boot sector ransomware multipartite

ransomware

To restore lost data, the database administrator can do a _____ using the most recent backup, which typically contains the most recent and accurate data. recovery reboot compatibility check reconciliation

recovery

Tendinitis and carpal tunnel syndrome are two common types of ergonomic distress. repetitive distress syndromes. arthritis. repetitive stress injuries

repetitive stress injuries

It may be appropriate for different assets to have different _____ levels and different types of security protection. threat authentication risk tolerance sensitivity

risk tolerance

Which of the following terms refers to a section of a program created to handle a specific group of instructions? code routine mode structure

routine

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. online shopping mall shopping agent online catalog e-tailer

shopping agent

A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. plastic tablet snap smart

smart

Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. special projects lab collaboration lab elite operations group project team

special projects lab

A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).

standard operating procedure (SOP).

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip spike protector power adapter surge suppressor

surge suppressor

A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems engineer business systems analyst software engineer information technician

systems engineer

Why does the IT staff perform corrective maintenance on an information system? to address other environment changes to enhance the software to meet new requirements to identify and fix errors to increase reliability and ease of maintenance

to identify and fix errors

True or False: A field name is a unique name assigned to a field.

true

True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.

true

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge breakage insurance plan premium support plan warranty extended protection plan

warranty

A _____ uses or teaches hacking skills in order to be helpful and promote good security practices. black-hat hacker white-hat hacker terrorist programmer

white-hat hacker


संबंधित स्टडी सेट्स

Cumulative Exam Geometry TEST 90%

View Set

Chapter 10: Infection, Infectious Diseases, and Epidemiology

View Set

Chapter 12: Inventory Management

View Set

CIT: 310 Systems Architecture I @ WKU - On-Demand Study Tool

View Set

Network+ Guide to Networks 7th Edition Chapter 7

View Set

energy, flow and nutrient cycling

View Set

Embalming 1, Chapter 10: Embalming Analysis

View Set

UNIT 2 - CHAPTER 6 - UNDERSTANDING ROLE AND IMPORTANCE OF STAKEHOLDERS

View Set