ITE Exam 3
What is a query? A question you ask a record A question you ask a database A question you ask a field A question you ask a table
A question you ask a database
How can an attacker execute malware through a script? A script can run a series of instructions to download and run malware. A script can retrieve and store your personal information, such as your online buying habits. A script can send you a fraudulent email message requesting confidential information. A script searches the Internet for personal information about you.
A script can retrieve and store your personal information, such as your online buying habits.
How is a worm different from a Trojan? A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. A worm spreads through a network, whereas a Trojan hides inside another program. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
A worm spreads through a network, whereas a Trojan hides inside another program.
What are the different views to display a table? Pivot Table & Pivot Chart View All of the above Datasheet View Design View
All of the above
Which of the following is a way to sort data? All of the above Numerically Alphabetically Chronologically
All of the above
_____ ensures that the person requesting access to a computer is not an imposter. Encryption Data mining Authentication Automatic encoding
Authentication
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? Ignore notices from the social networking site about changes to security. Be cautious about what information she posts. Allow anyone who "friends" her to view her information. Post all types of photos more often.
Be cautious about what information she posts.
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? Biometrics Encryption Two factor authentication Digital certificates
Biometrics
Queries in access can be used as a source of records for forms and reports to view, change and analyze data in different ways Both 'a' and 'b' Only 'a'
Both 'a' and 'b'
What would a password manager allow you to do? Prevent you from using birthdays in your passwords. Make sure you do not repeat passwords on similar accounts. Test your memorization skills. Create and store multiple strong passwords.
Create and store multiple strong passwords.
Which data type would be best suited to a field that lists a product's clearance price? Date/Time Currency Number AutoNumber
Currency
Which of the following is LEAST likely to be a field in a Customers table? Address LastName EmploymentDate PhoneNumber
EmploymentDate
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Ergonomics Repetitive strain Cyberbullying Technology addiction
Ergonomics
In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. File Record Table Field
Field
What are the columns in a Microsoft Access table called? Columns Rows Fields Records
Fields
Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Queries Forms Reports Tables
Forms
Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Major Graduated GPA Employer
Graduated
What does a filter do? Make more records available Slow down processing Hide records from view Add to the quantity of data
Hide records from view
Which data type would be best suited to a field that lists customer email addresses? Number Date/Time Hyperlink AutoNumber
Hyperlink
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. A worm has infected her computer and she needs to unplug her device. A hacker is trying to put a Trojan on her computer. Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
How does discarding computers in a landfill affect the environment? Copper on circuit boards is creating fire hazards. Data miners are digging up landfills looking for gold and platinum. The computer parts quickly decay and become organic material Lead and mercury in computer parts are seeping into the ground and water supply.
Lead and mercury in computer parts are seeping into the ground and water supply.
Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? ProductID Author PageCount Title
ProductID
Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? Z to A Smallest to largest A to Z Largest to smallest
Smallest to largest
What does SQL stand for? Stated question language Structured query language System query lingo Status query language
Structured query language
Which field could serve as the primary key for a list of students in your school? Student ID number Full name Birth date Phone number
Student ID number
In a database, each _________________ contains a collection of related data. Field Record Table None of the above
Table
What is a digital certificate? A growing trend used to combine multiple types of authentication The process of scrambling information so that it cannot be read Technology used to verify a user's identity The key to unlock information into a readable format
Technology used to verify a user's identity
Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is missing a primary key. The table is sorted. The table is filtered. The table has been deleted.
The table is filtered.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? ransomware worm Trojan spam
Trojan
A relationship is created between how many tables? One Two Three Any number
Two
How can you protect a computer from electrical spikes and surges? Unplug the computer when it is not in use. Use a cable lock. Use an uninterruptible power supply. Use a surge protector.
Use a surge protector
Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Inventory Employees Vendors Customers
Vendors
Which of the following is NOT a part of a database? Worksheets Fields Records Tables
Worksheets
In which of the following situations is a digital certificate useful? You are researching a topic for an assignment. You are signing a rental lease. You are emailing a friend. You are registering for an event.
You are signing a rental lease.
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. creating malware reading wireless transmissions downloading harmful content viewing or stealing computer data
creating malware
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying social engineering data mining cyberstalking
cyberbullying
Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. alarm private copy data backup uninterruptible data supply
data backup
A Trojan is a malicious program that uses a computer network to replicate.
false
Databases typically store their data in one big table. true or flase
false
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. True False
false
To prevent a laptop from being stolen, you can use a surge protector.
false
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? pretexting cyberstalking research spoofing phishing
pretexting
With more and more people using technology, what physical health diagnosis is on the rise? repetitive strain injury technology addiction cyberbullying cyberstalking
repetitive strain injury
Which of the following types of websites typically provides the least security? online banking sites social media sites online shopping sites private business sites
social media sites
Contact information for all the people taking a class at a school are stored in a ________ called Students. table field record worksheet
table
A computerized database can store millions of telephone numbers. true or false
true
A database is an organized collection of information. true or false
true
How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. If the browser security setting is on a website sent from a friend, I always accept the setting. If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one, so I should do change it on my computer too.
I will need to review each browser security setting and use my best judgement.
In terms of privacy, which of the following is a best practice? Posting your location on social media Throwing away old bank statements that are more than three months old Keeping your Social Security number hidden in a locked box in your home Saving your personal information as an email draft
Keeping your Social Security number hidden in a locked box in your home
You can monitor and protect your financial data in all of the following ways EXCEPT _____. Shredding financial documents before you discard them. Being cautious about what information you post on social networking sites. Storing financial information in an unsent email message. Querying unfamiliar purchases found on your bank statements.
Storing financial information in an unsent email message.
One disadvantage of computerized databases is that they limit your ability to arrange information. true or false
false
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
false
All the pet names in a veterinarian's database are stored in a _______ called PetName. record table field worksheet
field
Technology can lead to all of the following behavioral risks EXCEPT _____. a sedentary lifestyle social withdrawal depression and anxiety higher satisfaction with life
higher satisfaction with life
Which of the following is a characteristic of a strong password? numbers in a series personal information A short phrase letters, numbers, and symbols
letters, numbers, and symbols
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. turning off remote management to the device creating a strong password to access the router utilizing guest access when needed and turning it off when guests leave naming your router something you'll remember, like your street address
naming your router something you'll remember, like your street address
A database is a collection of related information, but a database management system is a type of software program. true or false
true
A field's data type determines what kind of information can be stored there. true or false
true
A query lets you speed up the browsing process by finding information that matches specifically to your criteria. true or false
true
What type of security requires something you know and something you have that no one else has? biometric security two part passwords data mining two factor authentication
two factor authentication