CIS3003 - Section Quizzes Pt2 ?
Which of the following are characteristics of Bluetooth? (Select two)
-2.4 GHz radio wireless -Ad hoc connections1
Secondary Source
A new article about the major's speech
Which of these describes next-fit memory allocation?
Allocating to the first free space large enough
Which of these describes worst-fit memory allocation?
Allocating to the largest free space, if large enough
Files that you send along with an email message are called ____.
Attachments
In object-oriented programming, which of the following concepts is used to describe properties?
Attributes
Bill wants to use an image he found online. The license says he can use it but must credit the original creator. Which Creative Commons license was used?
Attribution
What is the difference between authentication and authorization?
Authentication is about who a user is; authorization is about what they can do
Which component gets things running until the operating system takes over?
BIOS
Which of the following is cryptocurrency?
Bitcoin
A programmer is creating an application that needs to store a value indicating if the user is logged in or not. Which of the following would be the BEST data type to accomplish this?
Boolean
A user is shopping online and has added two items to the cart. When the user clicks the Checkout button, the shopping cart programming logic checks to see if the user is logged in already. If the user is logged in, the checkout process continues, otherwise, the user is prompted to sign in. Which of the following describes the logical component being used?
Branching
You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?
Client Error
___________ computing refers to services and applications that run remotely over the Internet.
Cloud
A service that lets your store data in a remote location over the Internet is called ____________.
Cloud storage
Social media marketers need the ability to do what?
Collaborate across teams
What is the first step of the data analytics process?
Collecting raw data
Which operating system has a steeper learning curve and can potentially break the system without careful use of its operations?
Command Line Interface (CLI)
Which is on of the things that has set Siri apart from other digital assistants?
Easter Eggs
Which network type uses light pulses to transmit data?
Fiber Optic
Which of the following Internet technologies provides the FASTEST speeds?
Fiber optic
In a relational database table, columns are better known as __________.
Fields
Designations at the end of file names such as .docx and. html are called
File extensions
Which of the following makes it easier for users to enter data into their tables?
Forms
Makes website elements interactive
JavaScript
Which of the following DBMS programs is open source?
MySQL
Which of the following database objects provides a summary of data?
Reports
Social network focused on images
Primary Source
The transcript of a speech by the major
What is junk email?
Unwanted, unsolicited email
Antivirus Software
Utility Software
Which folders are on the P: drive?
-Employee Investigation -Employee Actions -Employee Reviews
Which of the following features is supplied by WPA2 on a wireless network? (Select two)
-Encryption -Authentication
Which folders are on the D: drive?
-Finances -Graphics -Software
Which of the following are considered private technologies? (select two)
-Instant Messaging -Video Conferencing
Which areas of Information System (IS) technology can lead to better communication with customers? (select two)
-Order management -Automation
The TCP/IP suite has three protocols that deal with sending and receiving email. What are these protocols? (Select Three)
-POP3 -SMTP -IMAP
After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1
10
What is the BIOS version number?
1610
What is the address of the first DNS server that the workstation will use for name resolution?
192.168.0.11
What is the IPv4 address of the workstation?
192.168.0.35
What is the gateway address?
192.168.0.5
How many years of prior experience in tech support do most MSP positions require?
2
The Employee Phone Numbers query selects records from _______ table(s).
2
What is the subnet mask?
255.255.255.0/24 or 255.255.255.0
How much memory is installed in the computer?
4096 MB
Which cellular network type was the first to have gigabit-per-second speeds?
4G
A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with each other. Which of the following frequencies or protocols would accomplish this?
5 GHz
Assume we have primary memory access time of 92 nanoseconds and that accessing the TLB is instantaneous. Compute the effective memory access time at a TLB hit rate of 0.92. Give your answer in nanoseconds using numbers only, and to two decimal places if necessary.
99.4
-Add opening and closing tags for the <head>. -Add opening and closing tags for the <body>. -Add a closing tag to the first paragraph. -Add an opening tag to the second paragraph.
<head> </head> <body> </body> </p> <p> From top to bottom, the correct draggables are: <head> </head> <body> </p> <p> </body>
Which of the following statements is true regarding a VPN?
A VPN masks a user's IP address in order to make their actions untraceable.
What is a translation lookaside buffer?
A cache for the page table
Tertiary Source
A catalog of all the mayor's speeches and news articles about them
Internet Service Provider
A company that provides access to the Internet
Which of these is a difference between a logical and physical address?
A logical address must be translated
Which of the following is the best definition for a LAN?
A network in small geographic area, like in an office.
You successfully connect your computer to a wireless network available at the local library. Although you can access some websites, you cant access several other websites that you need for your research. Which of the following is the MOST likely cause of this problem?
A proxy server is filtering access to websites.
Cloud computing
A service or software application that relies on shared resources over the Internet.
Browser
A software application that accesses web applications and websites.
Which of the following acronyms describes the traditional way to make sure data stays consistent across the entire database?
ACID
Which command is used to add, change, or remove fields on an existing table?
ALTER TABLE
Which of the following is most likely to have peer-reviewed material written by an expert in the field?
Academic journal
Which of the following processes does 3D printing use?
Additive
Which digital assistant's voice was inspired by the voice of the supercomputer on the USS Enterprise in the Star Trek series?
Alexa
Jessica, a programmer, has created specific statements, including conditional loops to accomplish a task. What has she created?
Algorithm
Which of the following should be done to protect your identity when creating a social media profile?
Always review and set privacy settings.
You are working on a program that needs to keep track of many values at the same time. Which of the following would you use?
An array
World Wide Web
An information system that connects documents to each other by hypertext links
Internet
An interconnected global public computer network
What is the main problem with cooperative multitasking?
Any process can take an indefinite amount of time
A software developer wants to add a custom Google Map to a customer's website. Which of the following would the developer use to accomplish this?
Application programming interface (API)
Which programming language type is the most basic human-readable and closest to actual machine language?
Assembly
When working with applications to generate graphical reports, which of the following chart types would you use for data that has distinct categories and independent measurements?
Bar graph
Why do we need a memory hierarchy?
Because fast memory is expensive and cheap memory is slow
Vast amounts of data are collected and stored online based on internet searches, social media posts, customer transactions, military surveillance, medical tests, and weather sensors. What is this known as?
Big Data
A software developer wants to provide a compiled executable program to a customer. Which of the following computer languages would provide this capability?
C++
Adds colors, fonts, and other design elements to website
CSS
You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. Which of the following BEST describes the next step you should perform?
Check the vendor's website for an updated driver.
Which digital assistant was named after an artificial intelligence in an Xbox video games?
Cortana
Which of the following are the four general tasks a user needs to perform for a database to function properly?
Create, Read, Update, Delete
How did the computer get its IP configuration information?
DHCP
Which of the following utilities would you use to automatically assign IP address on a network?
DHCP
Matches unique IP addresses with easy-to-read URLs
DNS
Which of the following describes the firmware in gaming consoles, TVs, and smart cars?
Embedded OS
What is the current status of the USB 3.0 controller?
Enabled
What is the status of the integrated NIC?
Enabled
What do cloud services provide to help with privacy and security concerns?
Encryption
What should a level 1 technician do when they are unable to solve an issue?
Escalate a higher level of support.
Which of the following is a wired networking method mostly commonly used today by desktop PCs and other network devices to connect to a local area network?
Ethernet
When do all modern operating systems perform address binding?
Execution Time
Which type of Information System (IS) is used to help doctors diagnose diseases?
Expert Systems
Which of the following keys is used to enter Safe Mode on a Windows computer?
F8
Which of the following should not be used as a primary key in a table?
First Name
Creates website structure and content
HTML
Transfers hypertext pages on the World Wide Web
HTTP
Encrypts and transfers hypertext pages on the World Wide Web
HTTPS
The LFU page replacement algorithm replaces the page that...
Has been recently referenced the fewest times
Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?
IMAP
Python provides programming functions that can be used by a software developer. Which of the following would be used to make the random function available?
Import Random
Which of these is a problem only with the shortest job first scheduler, and not with the priority scheduler?
Impossible to implement in the general case
Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?
Install the latest driver
Which brand of processor is installed?
Intel
Which of the following terms describes an organization that connects users to the Internet?
Internet Service Provider
Which installation method is most likely to put your computer at risk of downloading a virus?
Internet installation
Which of the following tech careers build infrastructure for networking, telephones, radio, and other communication channels?
Internet service technician
Alan, a programmer, needs to create an interactive web page. Which of the following programming language types would he MOST likely use?
Interpreted
A _________ is a private network that utilizes the same technologies as the Internet.
Intranet
What is special about a virtual address?
It can refer to memory that is on disk
Which of the following describes the declarative programming paradigm?
It uses a domain-specific language (DSL) to instruct the program what needs to be done.
A programming paradigm is a method used to program a computer that guides that solving of a problem or performing of a task. Which of the following describes the procedural, or imperative, programming paradigm?
It uses a linear, top-down approach to solving problems.
If you select a file on the desktop and press "Delete" on your keyboard, what happens to the file?
It's removed to the Recycle Bin
Which of the following terms is used to describe a cycle or version that is repeated over and over?
Iterative
What type of file system is NTFS?
Journaling
Largest social media platform in the world
Which of the following would be responsible for resetting a user's password?
Level 1 support technician
When working with an application to generate graphical reports, which of the following chart types would work BEST for data that changes over time at intervals?
Line Graph
You want to use an application and are not connected to a network. Which of the following application delivery methods should you choose?
Local Installation
Which of the following allows for access to the internet without either a Wi-Fi or a wired connection?
Mobile Data
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the single received on the coax cable to data that can be understood by a computer?
Modern
Alex, a system administrator, wants to grant NTFS permissions to user so they can view and change files but not change permissions. Which of the following permissions should be used?
Modify
Is the network link light on the back of the computer turned on?
No
What is the initial status of the network?
Not connected
Discussion board
Online forum where discussions consist of threads in response to an original post
What is the term for software that anyone can use or modify for free?
Open-source Software
Which of the following is NOT a good response to cyberbullying?
Post the bully's physical address on social media
Where would you go to cancel a print job?
Print queue
Windows stores print jobs in a temporary file on the hard drive. What is this file called?
Print queue
In most operating systems, what is a running application called?
Process
Which of the following Scrum artifacts is a central list of work that needs to be done?
Product Backlog
What is the person called on an Agile team who gets to decide what goes on the sprint backlog and whether a task is done or not?
Product Owner
_______ is a foreign key in the Products table.
ProductTypeID
A developer is working on an application that needs to be able to read, write, update, and delete database records. Which of the following database access methods should the developer use?
Programmatic Access
Andy is a very detailed-oriented person. Which of the following Information Systems careers would likely be the BEST option for him?
Project Manager
Which Information Systems (IS) career can work in other fields such as construction management and engineering?
Project Manager
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST likely the problem?
Proxy settings
What is the collective name for creations that are not the intellectual property of anybody?
Public Domain
Which medium does Wi-Fi use to send data between networks and devices?
Radio Waves
Which permission option lets a user view files but not charge them?
Read
Which of the following is the first step in verifying that a problem has been fixed?
Rebooting the system
Which of the following is a disadvantage of a VoIP system?
Relies fully on a stable internet connection
Which option should you use to respond to the sender of an email but not all the recipients?
Reply
Which option should you use to respond to every single person included on an email?
Reply All
Formatted summary of information from a database.
Report
Which of the following database features would provide a formatted, easy-to-read listing of the results of a query?
Report
Mary needs to view all records from the Clients table. Which command should she use?
SELECT * FROM Clients
Mary needs to view the records from the Clients table that pertain to Travis. Which command should she use?
SELECT * FROM Clients WHERE name = Travis
Which of the following digital communication media does NOT require a connection to the Internet?
SMS
What protocol is used to send email messages from a mail client to a mail server?
SMTP
What is the term for delivering an application over the internet called?
SaaS
Which of the following is a Digital Millennium Copyright Act (DMCA) provision that protects ISPs from being held liable for the copyright infringement others who use their systems commit?
Safe Harbor
A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the internet. Which network technology should they select to ensure network connectivity for an clinic located anywhere in the world, even remote areas?
Satellite
Which of the following flow charts concepts is depicted below? (not exactly this image, but its got some diamonds, arrows, ovals, and rectangles, and a weird rhombus i think?)
Sequence
On Windows, which application lets you add accounts, change passwords, manage power consumption , and personalize your computer environment?
Settings
Which of the following is NOT a drawback of social media?
Social media makes it difficult to keep in touch with friends and family.
Software that requires a monthly subscription fee is often called _______________.
Software as a service
Collaborative Editing
Software that allows multiple users to work on a document at the same time
The flow of goods and services from the producer to the consumer is known as which of the following?
Supply chain
What is the name of the protocol suite used on the Internet?
TCP/IP
Thrashing is...
The condition where a significant number of memory accesses result in page faults
What is a web designer responsible for?
The look and feel of a website
What is the biggest benefit to using a DHCP server in a large network?
They save time for the network administrator.
Which of the following exist to help customers know what products they're buying?
Trademarks
Which of these is a function of an interrupt?
Transferring control of the computer between user programs and the operating system
Transmits packets in a continuous stream but doesn't verify packets
UDP
After fixing the hardware issue, what is the status of the network?
Unidentified network/no internet access
Which of the following is used to identify specific hypertext resources on the World Wide Web?
Uniform Resource Locator
A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?
Use Task Manager to end task
A software developer wants to create an application that will work on Windows and Apple iOS operating systems. What can the developer do to make this task easier?
Use the APIs for each operating system.
Backup Software Printer
Utility Software
Disk Cleaner
Utility Software
Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?
Utility Software
A developer is creating a program that will store a customer's latest order number. The value will change each time a customer creates a new order. Which of the following would MOST likely be used to store the value?
Variable
Which of the following is true about virtual addresses?
Virtual addresses for the same physical memory location may differ from process to process
You need to test a version of macOS but only have a Windows computer. What technology could you use?
Virtualization
Which of the following technologies can be used to make a phone call over an Internet connection?
VoIP
Which of the following provides security for wireless networks?
WPA2
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
Which of the following terms is most often used to describe a sequential or linear process of systems analysis and design?
Waterfall
Which of the following is NOT an element of effective cost control in IT project management?
Waterfall methods
Which of the following is a disadvantage of web applications?
Web applications can carry a monthly or yearly fee.
When might it be most helpful to clear your browser's cache of temporary Internet files?
When a website is not functioning as it should
What is the term for code that keeps running as long as a certain condition is met?
While loop
All of the following formats may contain incorrect or misleading information. On which should you be MOST careful about trusting the information you come across as it may seem academically reviewed but in fact is not?
Wikis
The Optimal page replacement algorithm replaces the page that...
Will not be accessed for the longest
Which of the following operating systems require a file extension to execute a program?
Windows
Every Windows System has a database that stores setting changes such as switching the home page of your web browser. What is this called?
Windows Registry
Which application make sure your computer has the most recent versions of its system software?
Windows Update
You work for a large company as the IT administration. With the many external attacks being perpetrated in the form of security ........ Which of the following would BEST protect your computer?
Windows Updates
Which of the following components is NOT required to create a network?
Wireless adapter
The __________ is an information system that connects documents to each other by hypertext links.
World Wide Web
Which of the following terms describes a global system of interconnected hypertext documents and files that can be accessed through a browser?
World Wide Web
Is the network cable connected to the computer and plugged into the wall outlet?
Yes
Which of the following is a proper path name to a shared network printer?
\\computer_name\printer_name
Which of the following commands is used to navigate to difference folders in Command Prompt?
cd
Which of the following lines will initiate an Internet search from the address bar of a web browser?
microsoft gov
A pop-up blocker is a web browser feature that _____________.
prevents unwanted advertisements
Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this?>
ren report.txt final_report.txt
Which of the following is a valid email address?
In Windows PowerShell, which key can be used to autocomplete a command?
tab
Which of the following are advantages of cloud computing? (select two)
-Data Security -Easier Collaboration
While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select Two)
-Details -Processes
Which of the following tables are related to the Orders table?
Customers, Employees, Products
Which of the following careers requires advanced programming and analytical skills related to data mining and big data analytics?
Data Scientist
What is the technology that aggregates structured data from one or more sources called?
Data Warehousing
A consultant has implemented a computing system for a small business. Which of the following are the most important assets for the small business to protect?
Data and information
Which of the following needs to be done before Big Data can be analyzed and interpreted?
Data extraction
Which of the following describes using data analytics to inform business operations?
Data-driven business decisions
Which process exports a database into a format that can be read by another program like a spreadsheet?
Database Dump
Which of the following applications can be used for storing, modifying, extracting, and searching data?
Database Software
Which of the following careers is responsible for backing up and securing an organization's databases?
Database administrator
Which of the following careers typically requires programming expertise in languages such as Java and Python, in addition to skills in optimizing database systems?
Database developer
The Products Under $2 query uses which of the following SQL keywords?
FROM, SELECT, WHERE
A short piece of copyright music is used in a news story covering the musical artist. Which DMCA provision would MOST LIKELY allow this?
Fair Use
Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?
Fair Use
Stores raw data in a relational database
Table
Which Windows tool shows currently running programs and can be used to end a process?
Task Manager
What is the name of the narrow strip along the bottom of the Windows environment?
Taskbar
Which of the following is used to change traffic lights for emergency vehicles?
ITCS
A technician is checking a customer's wireless network performance and has determined it was using 802.11g. The technician's recommendation is for the customer to upgrade to 802.11ac. Which of the following is the BEST reason to upgrade?
Improved performance
Which of the following BEST describes the ping utility?
It sends a single packet to a specified network address and then waits for a reply.
Which of these would transition a process from waiting to ready?
Its I/O being completed
Why is the MFU page replacement algorithm rarely used?
Its performance is inferior to other available algorithms
Which of the following is used to force-close a program on an Apple computer?
Option, Command, Escape
Which method should be used to search for an exact phrase?
Put the search terms in "quotes"
What is emulation?
Running code for another kind of computer
Which of the following terms is used to describe a lightweight development process with very little overhead?
Scrum
Which service would be most useful when looking for information about your favorite TV show?
Search Engine
Some IP-enabled devices are not considered IoT devices. Which of the following is considered an IoT device?
Smart door locks
Web services that help people meet, interact, and share content with other people online are called _____________.
Social Media
Which of the following describes the strategy that defines a businesses social media goals and objectives?
Social Media Optimization (SMO)
Which of the following is the MOST important skill an internet service technician can possess?
The ability to quickly troubleshoot and fix any issues that may arise from customers
Calendaring
Software that keeps track of multiple people's schedules
Resource Management
Software that keeps track of progress and assignments for large projects.
Verifies that each packet has been transmitted and received correctly
TCP
Which of the following are features of using an Excel table to store data? (select two)
-Column Sorting -Total Row
Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions ;;for securing Joe's workstation? (Select two)
-Configure the screen lock to be applied after short period of nonuse. -Configure the screen saver to require a password.
Which of the following logic components is being used and how much is the interest if the amount is 5,000? (Select two) IF amount < 5000 THEN interest = 7%, ELSE interest = 8%
-8% -Branching
Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (select two)
-802.11g -802.11a
Which of the following features of an integrated development environment (IDE) BEST allow a programmer to code faster and with less effort? (Select two)
-An IDE can autocomplete key words. -An IDE has a library of built-in functions
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. -They use an 802.11n wireless network -The wireless network is broadcasting an SSID of Linksys -The wireless network uses WPA2 with AES security -Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (select two)
-Disable SSID broadcast -Change the SSID to something other than the default
Which of the following are considered asynchronous technologies? (Select two)
-Email -Message Boards
Rita is a network administrator at a small office supplies company. She has been asked to design and implement a major upgrade of the company's network infrastructure. Which of the following activities will best help Rita to successfully manage this project? (Choose Two)
-Perform a thorough needs assessment for the company -Make sure the project requirements are clear and comprehensive
There are many social media platforms available today. What are the top two primary ways that social media platforms generate revenue? (select two)
-Targeted ads -Selling user-generated data to other companies.
Which of the following are primary sources? (Select Two)
-The United States Constitution -Jane Austen's Pride and Prejudice
Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. This is an enterprise paper license and there is no mechanism that enforces a limit to the number of times the key can be used. You decide to update all 20 users. Which of the following are possible consequences of this decision? (Select Two)
-Your company is expose to litigation by violating the software license agreement. -You risk losing your job.
Which cellular network type was the first kind of network to use encryption?
2G
How many hard drives are installed?
3
Assume we have primary memory access time of 90 nanoseconds, and a solid state disk with which memory access time on a swap is 113 microseconds. Compute the effective memory access time at a 0.03 page fault rate. Give your answer in nanoseconds using numbers only, and to two decimal places if necessary.
3,477.3
Assume we have primary memory access time of 92 nanoseconds and a page fault rate of 0.03. Solve for the disk access time required to have an effective memory access time of 197 nanoseconds. Give your answer in nanoseconds using numbers only, and omit decimal places from it.
3,592
Gary has finished installing a wireless router for his neighbor's small business. Which wireless standard should Gary use to support up to 150 Mbps on the 5 GHz band?
802.11n
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the BEST choice for this connectivity?
Access Point
You are inadvertently using comparable wording or sentence structure. Which form of plagiarism are you engaging in?
Accidental
Which data type uses historical data to make decisions in the present?
Analytical
Which of these would transition a process from running to ready?
Being selected by the scheduler
The vast amount of data collected from Internet searches, social media posts, customer transactions, military surveillance, medical tests, weather sensors, and other data sources are collectively referred to as ______.
Big Data
Screen Sharing
Broadcasting one user's screen to other users
Which of the following keys combinations lets you open Task Manager?
CTRL, ALT, DELETE
Which network type uses a coaxial cable to receive its signal?
Cable
Web browsers save website information in their __________, which helps the site load faster on future visits.
Cache
Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer?
Change browser settings to notify before downloading
Which data model focuses on high-level concepts?
Conceptual
Frank, a technician, has finished installing a wireless router. Jessica is connected to the WiFi. However, she can only see the company intranet pages. What should Frank do to troubleshoot the problem?
Configure the browser proxy settings.
After resolving the hardware problem, what is the status of the Ethernet adapter?
Connected to CorpNet.com
Which of the following is a programming identifier that would be used to define values that don't change?
Constants
A NOT NULL _________ is a rule that prevents certain fields in a database from being left blank.
Constraint
Which of the following is a benefit of 3D printing over traditional manufacturing?
Consumes less material
A major capability of Alexa is its ability to do what?
Control smart devices
Small files that a website saves on your computer to remember your preferences are called __________.
Cookies
After fixing the software issue, what is the status of the network?
CorpNet.com/Internet access
Crowdsourcing is reaching out to a group (crowd) as a way to solve a problem. Which of the following provides a way to raise funds without a web development expenses?
Crowdsourcing platform
Which of the following is a way for programmers and others to make sense of complex business flows?
Data Modeling
Which of the following is not an example of wireless networking communications?
DSL
Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?
Data Analyst
Which of the following careers often requires that one works with sales and marketing teams to analyze and interpret performance data, create reports, and recommend ways to improve company processes?
Data Analyst
What is asking specific questions to interpret Big Data called?
Data Analytics
Which of the following describes the process of turning data points into useful information?
Data Analytics
The concern that Big Data is often obtained without the knowledge or consent of users falls under which Big Data concept?
Data Ethics
What is the general term for software that creates and manages databases?
DBMS
Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?
Defragmentation
What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?
Desktop
Printer
Device Drivers
Video Card
Device Drivers
Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
Device Drivers
As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?
Device Manager
Which of the following utilities can you use to monitor, update, and manage all your hardware devices on a Windows computer?
Device Manager
On a flowchart, which of the following represents a decision?
Diamond
Which digital communication medium consists of top-level posts with threads of response posts?
Discussion board
Which of the following is NOT an example of an information system?
Electrical system
Employees complain to the company IT division they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?
Email filtering
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
Firewall
Camera
Firmware
Games Console
Firmware
Television
Firmware
Which kind of system software is preinstalled on electric products like blenders, automobiles, and televisions?
Firmware
A developer is creating an application that requires a value to be stored with decimal precision. Which of the following data types should be used for the variables that will store values?
Float
Marty, a database administrator, has added a foreign key to table in a database. Which of the following describes the purpose of a foreign key?
For one table to reference records in another table.
Which of the following is the BEST way to handle a program that is unresponsive?
Force-close the program
A value that's used to identify a record from a linked table is called a ________.
Foreign Key
User-friendly interface for adding to or retrieving information from a database
Form
Which option should you choose to send an email you're received to a new person?
Forward
How many ping packets are sent by default in a successful ping request?
Four
In addition to good design sense, what else do web designers need to be proficient in?
Front-end coding languages
Which SQL command is used to give a user permission to a specific database object?
GRANT
Which of the following can recognize different voices that it records and tailor its responses accordingly?
Google Assistant
Which of the following charges resources used, such as bandwidth and processing power, by the second?
Google Cloud
The MFU page replacement algorithm replaces the page that...
Has been recently referenced the most times
Clickable text or images that take you to different sites on the World Wide Web are called ________.
Hyperlinks
Which of the following is NOT one of the essential components of an information system?
Hyperlinks
You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?
Hypervisor Type 1
Which Information Systems (IS) career oversees integrating different technologies and systems within an organization?
IS manager
Carol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do NEXT to be able to send print jobs to the printer?
Install the latest printer driver
Which of the following can be used by a programmer to debug code?
Integrated development environment (IDE)
Which of the following terms describes an enormous public network that connects billions of devices and networks around the world?
Internet
Divides files into packets and routes them through the Internet to their destination
Internet Protocol
Python is a general purpose programming language that is popular for creating websites and mobile applications. Python is known as a readable and user-friendly language. What does the following code do? color = input ('What is your favorite color?\n') print('Your favorite color is %s,' %color)
It gets input and produces output.
Which of the following BEST describes the ipconfig utility?
It is a utility that displays all current TCP/IP network configuration values.
Which of the following BEST describes a flowchart?
It is a visual representation of the logic in a program.
Why is the Optimal page replacement algorithm not used?
It is impossible to implement because it requires future knowledge of how processes will act
Which of the following BEST describes a customer relationship management (CRM) system?
It organizes notes, activities, and metrics into one system that works altogether.
Janice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this?
Janice has turned off her computer.
A software developer is working on a website and has been tasked with adding interactive elements to it. Which of the following programming langues would work BEST for this task?
JavaScript
What is the initial status of the Ethernet Adapter?
Network Cable Unplugged
Which of the following is NOT an example of an operating system? -Linux -Android -Microsoft -Windows
Microsoft
Diana, a developer, needs to program a logic component that will allow the user to enter a series of values. Which of the following would BEST provide that functionality?
Looping
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections based on the hardware address?
MAC address filtering
Which of the following does NOT rely on cloud technologies?
Microsoft Paint
Which of the following is NOT an example of a web browser?
Microsoft Word
Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?
Malware Infection
What is the main difference between a regular technical support specialist and a managed service provider technician?
Manged service provider's services are outsourced as a third party.
If your network does not have a DHCP server, what must you do to access the internet?
Manually change the TCP/IP properties to match your network's settings.
Where is the BEST place to obtain the latest printer driver?
Manufacturer's website
Which type of analytical data can help you make investment decisions?
Market
What is the initial status of the Ethernet adapter?
Media Disconnected
Messaging platform where messages disappear after being read
Owners of internet-enabled cars can use their phones to do which of the following?
Monitor fuel usage
John is using synonyms to replace words while keeping the meaning of the original phrase. Which form of plagiarism is he engaging in?
Mosaic
Most popular microblogging platform
Which of the following IT jobs typically do not require as much education or on-the-job experience?
Network Technician
The accounting department needs to be able to share files, such as spreadsheets, that can be accessed by everyone in the department. Which of the following would work BEST to provide a collaborative workspace?
Network share
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following is the technology being used in these phones?
NFC chips
Multiple computers configured to be able to communicate and share information with each other form a _______.
Network
You need to troubleshoot a Windows computer that isn't connecting to a network. Which utility should you use?
Network & Internet
Which of the following IT jobs includes installing and configuring network media?
Network Administrator
Which of the following IT jobs specializes in configuring communication hardware such as cabling, routers, and wireless adapters?
Network Architect
Which Creative Commons license type states that a work can be distributed as long as it is not changed?
No Derivative Works
What are non-relational databases that deal with Big Data often referred to as?
NoSQL
Diana is using an image she found online in a poster that she is selling, even though the license states she is not allowed to make money off of it. Which license type would Diana MOST LIKELY be violating?
Non-Commercial
Which of these is a function of an interrupt?
Notifying the operating system of a hardware event
Which of the following typically does NOT save a conversation after it has taken place?
Online Chat
Which of the following programming models are built from class templates that have properties, attributes, and methods?
Objects
Which of the following is a category of SaaS applications?
Office tools
Which of the following Application Architecture Model tiers describes office productivity software?
One Tier
Microsoft's cloud storage service, which is automatically installed on new versions of Windows, is called ______________.
OneDrive
One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but often requires a fee for support, training, or added functionality. What is the name of this model?
Open Source
Which of these is not maintained per thread?
Open network connections
Which category of system software provides a platform for application software to run on?
Operating Systems
In the Total Sales by Product query, the Number Sold field counts records from the ________ table.
Orders
A user read their work email from their home and when they returned to work the next day and accessed the email server, all of their email was missing. Which of the following protocols removes mail from a mail server?
POP3
When protecting your online identity, which of the following is an internet security threat you need to be aware of?
Phishing attempts
When working with an application such as Microsoft Excel to generate graphical reports, which of the following chart types would work BEST for data that has relative percentages of a whole?
Pie Chart
Which of the following commands makes an application shortcut appear on the taskbar?
Pin to taskbar
Which of the following tools would you use to check connectivity between two computers?
Ping
A database administrator is setting up a new table that will contain customer information. The fields include name, address, company, phone, email, and customer ID. The administrator is using the customer ID to uniquely identify each customer record. Which of the following BEST describes the customer ID field?
Primary Key
Which of the following is found in one or more columns of data and contains a unique identifier for the row?
Primary Key
Which component is responsible for reforming print jobs so that the printer can understand and process them?
Print Driver
What is the term for software that is exclusively controlled by a company and cannot be used or modified without permission?
Proprietary Software
Provides live video streaming
Which database object is essentially questions that we can ask the database?
Queries
Which of the following can be used to ask a database questions and receive the data we're looking for?
Queries
Edward, a database user, would like to gather some specific information from a database and then manipulate the data in a spreadsheet. Edward then wants to save that information in a file format that will be used by another application. Which of the following database features would BEST accomplish this?
Query
Retrieves specific information from a database. Can also be used to update, edit, and delete information.
Query
Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know how to write SQL commands and no forms have been created. Which of the following would be her BEST option to generate the report?
Query builder
Which of the following Microsoft Access database feature provide the BEST way to organize and summarize data for analysis?
Reports
Which of the following rights is NOT guaranteed by copyright?
Right to avoid criticism
Which of the following Artificial Intelligence (AI) concepts includes self-driving cars?
Robotics
What is the computer language that makes relational databases work?
SQL
Which of the following is used on a wireless network to identify the network name?
SSID
You live in a rural area and don't have a nearby wired network to connect to. What could you use to connect to the Internet?
Satellite
You submitted the same paper from high school for a college class. Which form of plagiarism is this?
Self
Which type of data have elements in common but do not fit into rigid rows and columns in a table?
Semi-structured
Which of the following provides services to hosts on its network?
Server
Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?
Settings > Devices > Printers & Scanners
The locations field in the Employees table is set to the __________ data type.
Short Text
Which digital assistant was one of the earliest?
Siri
What is the name of the menu in the bottom left corner of the Windows environment?
Start Menu
Kickstarter and Indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing?
Startup
Which tab in Task Manager can be used to manage programs that load with Windows?
Startup
Once raw data has been collected, which of the following are used to look for trends, patterns, and correlations?
Statistical tools and formulas
Which of the following is a methodology used by systems analysts?
System Development Life Cycle (SDLC)
Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?
System crash
Which Information Systems (IS) career would MOST LIKELY provide user training for new or modified systems?
Systems Analyst
Which Information Systems career analyzes and assesses the performance of existing systems in order to suggest how business can operate more efficiently?
Systems Analyst
An information system is made up of which of the following general components?
Technology, people, and procedures
Wikipedia is considered which of the following sources?
Tertiary
An application developer needs to store configuration data that can be retrieved each time the applciation is launched. The data must be in a format that could be easily viewed outside fo the application and edited using any editor. Which of the following would be the BEST choice?
Text-based flat file
A business wants to set up a database to store customer and order information. They have decided to use a relational database. Which of the following is the main benefit of using a relational database?
The data can be organized into separate tables that are related to each other.
Which of the following is the BEST reason to search for articles in an online academic database?
The sources are more likely to be peer reviewed
What is response time in the context of process scheduling?
The time between arrival and a process running for the first time
When you stream video, the server doesn't verify that your computer received the files correctly. It just sends a continuous stream of data. This type of transmission has advantages and disadvantages. What issue can this potentially cause?
The video may become glitchy.
Which folders are initially on the E: drive?
There are no folders
Which of these is a difference between a logical and virtual address?
There is no difference
Which of the following is considered part of a smart home?
Thermostat
Which of the following is both an advantage and disadvantage of using cryptocurrencies?
They allow for complete privacy.
Which of the following BEST describes expert systems?
They are programs designed to solve complex problems in specific domains.
Which of the following is true about physical addresses?
They are the addresses that the operating system passes to memory management hardware
Which of the following statements is true regarding a network technician?
They troubleshoot reported problems and assist users in resolving network-connection issues.
Which of the following statements is true regrading a network architect?
They typically require an industry certification in network design and implementation
What is the purpose of "dual mode" operation?
To prevent user programs from executing CPU instructions that can affect other programs
When composing an email message, why might you want to use the Bcc field?
To copy the email confidentially
Which of the following would be a reason a company would outsource their IT support?
To cut costs
What is the main purpose of agile methodologies?
To divide large IT projects into smaller, more manageable projects as part of an iterative process
Bob, a network professional, wants to find out where packets are getting stuck on the path to their destination. Which of the following utilities should he use?
Tracert
Which of the following utilities would you use to find the path between two computers?
Tracert
A business has come up with a new logo for the company and they want to protect the logo as part of their brand. Which of the following protections should they use?
Trademark