104 final exam ATTEMPT 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.

FALSE

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

FALSE

True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.

FALSE

A disaster recovery plan typically does not answer which of these questions? · What storage-level appliances or drives will be used? · Where will data backups be stored? · What data backup procedures will be followed? · How will users' identities be confirmed?

· How will users' identities be confirmed?

Which of the following statements does not describe pseudocode? · It's a useful tool for organizing the way a programmer thinks about a solution. · It involves envisioning a project in its entirety to identify the larger elements that must be handled first. · It's a formally styled natural language, not a programming language. · It's used to write algorithms.

· It involves envisioning a project in its entirety to identify the larger elements that must be handled first.

BLANK merges augmented aspects of real and virtual worlds. · Augmented reality. · Virtual reality. · Mixed reality. · Limited reality.

· Mixed reality.

A BLANK attempts to gain access to a system for malicious purposes without the owner's consent. · white-hat hacker. · black-hat hacker. · terrorist. · programmer.

· black-hat hacker.

In the early phases of the system development process, a BLANK defines the business problem and plans a solution. · vendor analyst. · lead project manager. · business systems analyst. · software development analyst.

· business systems analyst.

When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. · restore. · reserve. · replace. · check out.

· check out

The term BLANK refers to the ability to link with other programs and devices. · wireless area network. · connectivity. · electronic data. · online management.

· connectivity.

Retrieving data from a database and performing some type of operation on it is called · file processing. · data browsing. · data querying. ·transaction testing.

· file processing.

Graphics designed especially for online use can contain BLANK, in which different hyperlinks are assigned to different spots on the graphic. · modules · animation · placeholders · hotspots.

· hotspots.

To be able to continue to access the information stored in a(n) BLANK, the programming code must be made compatible with the newer system. · data dictionary. · database management system. · integration system. · legacy database.

· legacy database.

Using a(n) BLANK approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors. · modular. · structured. · object-oriented. · decoding.

· modular.

Using carbon BLANK might make it possible to create more compact processors, which would operate much faster and conserve power. · RAM. · nanotubes. · memristors. · memory cubes.

· nanotubes.

Like most operating systems, Windows includes BLANK features that enable you to place the computer in a low-power mode. · time interval. · startup routine. · power management. · power profile.

· power management.

In a(n) BLANK database, fields with similar data can be connected between tables in the database, making it possible to retrieve data from the related tables. · relational. · object-oriented. · flat-file. · operational.

· relational.

Tendinitis and carpal tunnel syndrome are two common types of · ergonomic distress. · repetitive distress syndromes. · arthritis. · repetitive stress injuries.

· repetitive stress injuries.

It may be appropriate for different assets to have different _____ levels and different types of security protection. · threat. · authentication. · risk tolerance. · sensitivity.

· risk tolerance.

Which of the following terms refers to a section of a program created to handle a specific group of instructions? · code. · routine. · mode. · structure.

· routine.

Typically larger and a bit more formal than a skunkworks, a(n) BLANK occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. · special projects lab. · collaboration lab. · elite operations group. · project team.

· special projects lab.

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? · power strip. · spike protector. · power adapter. · surge suppressor.

· surge suppressor

A large percentage of the human brain is dedicated to BLANK, which involves processing data coming from the eyes. · mental interface. · visual perception. · natural interface. · stereoscopic vision.

· visual perception.

Online hotel and airline reservation sites use BLANK databases to hold availability and pricing information. · relational. · XML. · web. · hybrid

· web.

Which of the following statements describes spoofing? · psychologically manipulating people into performing actions or divulging confidential information · using or teaching hacking skills in order to be helpful and promote good security practices · gaining entry to a secure computer system by finding a working user ID and password combination ·fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address.

·fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address.


Set pelajaran terkait

Chapter 11 for Management Test 2

View Set

2021 NC Drivers Permit Test Questions

View Set

Chp. 17 Packet: Active and Passive Voice (pg. 148)

View Set

Computer forensics - 2nd half - quiz 13, Computer forensics - 2nd half - quiz 14, computer forensics - 2nd half - chapter 15, computer forensics - 2nd half - quiz 16, CH 16 Ethics for the Expert Witness

View Set