CSCI 103 final

Ace your homework & exams now with Quizwiz!

67)Encryption is used to.

Copy your email so only one person can decipher it

33)You need to know how to program to. Create unique software solutions for specialized problems.Create unique software solutions for specialized problems.

Create unique software solutions for specialized problems.

43)Unnecessary duplication of data in a database is referred to as.

Data redundancy

9)Which of the following is not considered metadata? Database name

Database name

71)A private key is important.

Decode an encrypted message

37)The steps of the program development life cycle start with.

Describing the problem

19)The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of.

Digital convergence

17) When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.

Digitizing

35)An IDE is a tool that has support for.

Editing and bugging

36)How the program should behave if the input data is invalid is part of.

Error handling

13) A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as.

FAKE NEWS

7)Which type of broadband Internet offers connections nearing the speed of light? Fiber opticFiber opFiber optictic

Fiber optic

27)A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

File history

56)Sometimes groups of data packets are sent together in a package called a.

Frame

61)Which of the following is not one of the factors used in multi-factor authentication?

Identity

28)When someone uses your personal information to pose as you, this is.

Identity theft

22)Which of the following is not a category of intellectual property? Imprint (trade dress, copyright, and patent ARE a category

Imprint (trade dress, copyright, and patent ARE a category)

31)Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

Network Address Translation (NAT)

46)A process to ensure that data in a database is organized most efficiently is called.

Normalization

16) Which of the following does not determine the quality of a digital image?

Number of pixels in the camera lens

50)A customer information table linked to a password table in a business database reflects which type of relationship?

One-to-one (not one-to-many?)

Java is considered to be architecture neutral because it.

Only needs to be compiled once and can run on several different CPUs

60)Which network cable type is most susceptible to signal interference?

UTP (unshielded twisted pair)

38)The first step when using object-oriented design is to.

identify all the categories of inputs that are part of the problem

29)Computer viruses can be spread by

sharing flash drives downloading and running a file attached to an email Downloading a song from a peer-to-peer sharing site

57)Which of the following is an advantage of installing a client/server network in a business?

sharing of peripherals

14) Which of the following is an open electronic publishing format?

ePub

48)Data captured as users navigate through a website is called.

Clickstream data

42)In selecting the most appropriate language it is useful to know.

ALL OF THE ABOVE. How quickly the final code must run, how much space the final code delivered can occupy. If there is a specific target enviroment (say, a specific operating system)

70IPv6 uses 128 bits to assign a(n).

Address every device connected to the internet

Which of the following is used to access the Internet when Wi-Fi is not available?

All of the above (mobile hotspot, 3g internet acecess,4g internet access

53)The process whereby users prove they have authorization to use a computer network is known as. Authentication

Authentication

58)Which server would a client/server network include to ensure only authorized users are logging onto the network?

Authentication

55)Which is not a key component of a typical client/server network?

Bastion host

32)Authentication techniques that rely on personal biological traits are called.

Biometrics

26)Viruses that load from USB drives left connected to computers when computers are turned on are known as.

Boot-sector viruses

65)The set of instructions that define how to display the HTML elements in your site is. CSS

CSS

24)Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called.

Inoculation

62)The collection of large national and international networks used to establish the Internet is called the.

Internet backbone

59)Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

18)Using copyrighted works without permission of the copyright holder.

Is possible under the "fair use" doctrine

23)A packet analyzer is called a sniffer because

It captures and reads data inside each packet

21)Reducing the sampling rate when digitizing a file has which effect on the file?

It decreases the file size

64)HTTPS is different than HTTP because.

It is a combination of http and secure sockets later (SSL)

Which of the following should you not do to secure a wireless network?

Keep the default network name and router password.

4)What two devices are often combined into one device to connect the network to the Internet and to share the connection between devices on the network?

Modem and router

47)The type of database that would be best to store and organize data with feature and measure attributes is which of the following? Multidimensional database

Multidimensional database

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?

P2p network

15) Which of the following is not a digital video file format?

PDF (AVI, WMV, MPEG4 are digital format)

34)What is the first step of the SDLC?

Problem identification

45)Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?

Query (not filter?)

49)Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place?

Real-time processing

25)A ______ is a program that takes complete control of your computer without your knowledge.

Rootkit

A surge protector may look like just another power strip but it also can.

Save your device if a voltage spike is sent through the electrical system

54)The first step when using object-oriented design is to.

Select the data types that need to be used to solve the problem

66)SMTP is the set of rules used to.

Send email along the internet to its destination

Which of the following would NOT be a benefit of networking computers?Sharing software licenses

Sharing software licenses

41)The database programming language SQL stands for. Structured query language

Structured query language

39)Which of the following are common to all programming languages?

Syntax, keywords, and operators

63)The information in a data packet includes.

The data and the destination

52)On client/server networks, more users can be added without affecting the performance of other nodes.

This is known as network. Scalability

12)Which of the following describes fiber-optic broadband?

Uses glass/plastic cables

51)Which of the following data-mining techniques is used to create charts and dashboards?

Visualization

11)The type of network that would be necessary to connect the networks of two college campuses would be:

WAN

8)Which of the following is the most secure security protocol used with routers? WPA2

WPA2

44)When is a flat database sufficient to use when organizing data?

When the data is simple and can be organized in one table

10)Which of the following would not cause interference or poor connectivity between nodes on a wireless network?

Wireless extender (some appliances, concrete walls, or nodes that are too far apart would cause interference)

69)The Internet is primarily funded by.

Your federal income taxes

68)An applet is.

a small application located on a sever computer

20)It is important to maintain your online reputation.

because of the persistence of information.,because employers often review social media before hiring employees.o ensure information about you is accurate. (ALL OF THE ABOVE)


Related study sets

chapter 3 life policy provisions, riders and options

View Set

chapter 21 ap euro online assignment

View Set

дієслово як частина мови

View Set

Individual diff Emotional intelligence

View Set

Unit 7: Social Media and Marketing Part 2

View Set