CISB 11

Ace your homework & exams now with Quizwiz!

To include more than one line of comments in Python code, you must start each line with which of the following symbols?

#

Which of the following is a concatenation operator?

&

The Python programming language has a small vocabulary of how many keywords?

34

Mateo is designing a technical diagram that many textbook publishers can use, and he wants to make sure he retains the rights to the diagram before selling it. At what stage does a copyright for his creative work come into effect?

As soon as the Image Exists in physical form

Tramon is creating a website and wants to include a striking graphic to identify the website. What type of graphic should he include?

BANNER

______ is a measure of the capability of a network to send and receive data.

Bandwidth

Which data type would be best suited to a field that lists a product's clearance price?

CURRENCY

Some web databases are ______ databases, where users store and share media with other registered users.

Collaborative

​When programmers want one thing to happen when a condition is true and something else to happen when it is false they use the ______ statement.

If... else

Victoria wants to add a new logo to her landscape management website. Where would be the most appropriate location for her to place it on the home page?

In the header

Why would you include a banner on your website?

It makes the website more easily identifiable to visitors.

about the website? If the web address of a website begins with https instead of http, what do you know

It t is is secure.

instructions until a certain condition is met. The section of code that repeats is usually In a repetition control structure, the computer is directed to repeat one or more referred as aln)

Iteration

The in a problem statement is the information that is supplied to the computer to help it solve a problem.

Known information

Which of the following best defines big data?

Large-scale data sets that require advanced technologies

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette

Which of the following are criteria for evaluating a website's content?

OBJECTIVITY

Which data type sometimes is called BLOB?

Object

on a graphic design team and you are learning You have just started an internship about graphic formats used on the web. Which of the following graphic formats should you use for comic-style drawings?

PNG

The contents within a parentheses that are passed to a function are called

Parameters

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

Phishing

After creating a webpage with HTML code, what do you need to do so that others can access it on the Internet?

Publish to a webserver

What type of reference is used to identify the location of webpages or files on the current website?

Relative

Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's phone onto the new device. Once her new phone has all her data, what should she do copying her photos from her old next with the old phone?

Reset the old phone to factory settings.

Which attribute refers to the images folder when specifying the location of an image to display?

SRC

In which of the following situations is a digital certificate useful?

Signing a Rental Lease

Which of the following types of websites typically provides the least security?

Social Media Sites

Which of these file types is optimized for processing calculations of numbers in a budget?

Spreadsheet

What type of Webpages includes content that changes only when a web developer updates the HTML code for each page?

Static

Which of the following tables in a database would NOT need to be encrypted?

Store_ Locations

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

Street Address

Which field could serve as the primary key for a list of students in your school?

Student ID number

If you use an asterisk (*) in a search engine query, what are you trying to do?

Substitute

The volume of Big Data generated over time is typically measured in terms of ____________.

Terabytes

Ms. Lawson, a primary school teacher, told her president is in the public domain. What does she mean by this? students that a photograph of the

The photo is free of copyrights.

Which of the statements about B2B e-commerce is correct?

The transactions involve review by a team of people before making a purchase decision.

For what purpose was the BSA formed?

To promote understanding of software piracy.

An object is anything that can be

Touched. Seen. Used. All of the above

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

compares data with a set of rules or values to determine if the data meets certain criteria.

Validation

Skype is an example of ______ software.

VoIP

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.

Volatility

Which organization provides a free, online HTML5 validator application to ensure that a webpage's HTML tags follow the rules for HTML5?

W3C

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

WORM

Benny is writing a research paper on a specific method of farming. He really admires the methods used by one farmer, who is also a published author, and wants to use his explanations in his research paper. How can Benny ensure he doesn't plagiarize?

add a formal citation and use the farmer's explanation in his paper

Which of the following people will benefit the most from using a B2B website?

akiko who helps smaller businesses establish themselves in the market

A ________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.

algorithm

Patricia intends to study analyses of the last five Presidential elections. Which of the following is an authentic source for the study?

articles published in a newspaper known to be neutral toward any political party

The major carriers of network traffic are known collectively as the Internet

backbone

Which of the following best describes e-commerce?

business transaction that occurs over an electronic network such as the Internet

The instructions that make up a computer program are sometimes referred to as

code

Which of the following websites most likely uses XML-formatted data?

compare products from different vendorsw

A(n) ______ demands payment to stop an attack.

cyberextortionist

A(n) database is a huge database used to analyze transactions.

data warehouse

You can define functions in Python using a _______ statement.

def

​Which of the following is another term for "subclass"?

derived

Which of the following is NOT true about two-step verification?

does not expire

Adding comments generally makes the code ________.

easier to understand

An iris recognition system uses technology to read patterns in the user's

eye

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications

firewall

_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.

high level

A result from a search engine search is called a(n) ______.

hit

What part of http://www.nps.gov/history/preserve-places.html is the protocol?

http://

A friend of Muna's suggested a website that she can use to download music. How should she check if the website is secure?

https as the protocol in the url

If you copy drawing from the Internet and use it in a report, you might be violating the artist's

intellectual property rights

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

keys

Malware is short for software.

malicious

A password ______ is a service that stores all of your account information securely.

manager

Which of the following is not scripting language?

perl

What type of webpages include content that changes only when a web developer updates the HTML code for each page?

static

Why is it advisable to look beyond search engines like Google and Bing while conducting online research for assignments and projects?

there are search engines available with more reliable research

What type of security requires something you know and something you have that no one else has?

two factor authentication

Why would a field that contains numbers have a text data type?

values will not be used in calculation

A national bank processes approximately 1,500 transactions per second. The fact that the bank's database must add this many Big Data records every second refers to its high _________.

velocity

Another term for botnet is ______ army.

zombie

Finding a value for a variable is referred to as ___________.​

INSTANTATION

An if statement requires which of the following as punctuation?

A colon

Which of the following stories can be said to be in the public domain?

A copyrighted story whose copyright has expired.

Which of the following would most likely be a static website?

A historical facts page

Google is an example of which type of website?

A search site

JavaScript likely controls which of the following elements on a webpage

A slideshow

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

During a thunderstorm, the database server for Jason's store loses power. This is an example of failed

AVAILABILITY

What type of reference is used to identify the location of webpages or files stored on other websites?

Absolute

If HTML is used to specify the content of the web page, then what do you use CSS for?

INTERACTIVE NO

What would a password manager allow you to do?

Create and store multiple strong passwords. A Microsoft Access database, password protected, serves as a strong password manager.

Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

DRM

Randall needs to monitor rapidly changing statistics for a social media campaign for his company. Which of the following should he use to access this information?

Dashboard

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.

Deleted Logically

In Internet terminology, what is the term, google.com, called?

Domain Name

refers to the process of hiding the internal details of objects and their methods

Encapsulation

An IDE stores files and folders for your website in a directory called ___

FTP CLIENT NO

When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.

Fair use doctrine

All the pet names in a veterinarian's database are stored in a called PetName.

Field

Many programs today use ______ on a webpage as their front end.

Forms

In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely resembled human languages.

Fourth

A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.​

Function

Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type?

Graduated

Which of the following specifies the headings, paragraphs, images, links, and other content elements of webpages?

HTML


Related study sets

Batson et al. (1981): Empathy-altruism theory

View Set

Introduction to Minitab for SixSigma

View Set

Chapter 21 - Accounting Changes & Error Analysis

View Set

Prep U Ch. 26 Management of Patients With Dysrhythmias and Conduction Problems

View Set