Csci 103 final study guide

Ace your homework & exams now with Quizwiz!

the steps of the program development life cycle start with A. describing the problem B. algorithm development C. testing D. coding

A. describing the problem

which of the following is not a digital video file format A. PDF B. WMV C. MPEG-4 D. AVI

A. PDF

which of the following would not cause interference or poor connectivity between nodes on a wireless network? A. a wireless extender B. some appliances C. nodes that are too far apart D. concrete walls

A. a wireless extender

unnecessary duplication of data in a database is referred to as A. data redundancy B. data inconsistency C. normalized data D. validated data

A. data redundancy

an IDE is a tool that has support for A. editing and debugging B. flowcharting and creating the project specification C. scope creep D. releasing updates to the public

A. editing and debugging

sometimes groups of data packets are sent together in a package called a A. frame B. bridge C. MAC D. protocol

A. frame

which of the following is not one of the factors used in multi-factor authentication A. identity B. inherence C. knowledge D. possession

A. identity

when someone uses your personal information to pose as you, this is A. identity theft B. a backdoor rootkit C. while-hat hacking D. cybersecurity

A. identity theft

antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called A. inoculation B. signature C. quarantine D. updating

A. inoculation

which of the following is a private network set up by a business that is used exclusively by a select group of employees A. intranet B. PAN C. VPN D. WAN

A. intranet

using copyrighted works without permission of the copyright holder A. is possible under the "fair use" doctrine B. only applies to property software C. is only possible for photographs of public places D. is never possible

A. is possible under the "fair use" doctrine

the type of database that would be best to store and organize data with feature and measure attributes is which of the following A. multidimensional database B. knowledge-based database C. object-oriented database D. relational database

A. multidimensional database

which topology tends to provide A. ring B. bus C. VPN D. star

A. ring

which of the following are common to all programming languages A. syntax, keywords, and operators B. architecture neutrality C. JSON and APIs D. SDLC and PDLC

A. syntax, keywords, and operators

which of the following data mining techniques is used to create charts and dashboards A. visualization B. classification C. clustering D. affinity grouping

A. visualization

when is a flat database sufficient to use when organizing data A. when the data is simple and can be organized in one table B. when more than one person needs to access the data C. when the data needs to be organized into two or more tables D. when the data includes video and audio

A. when the data is simple and can be organized in one table

the set of instructions that define how to display the HTML elements in your site is A. AJAX B. CSS C. PHP D. XML

B. CSS

Bethany is watching a video, her brother is playing FIFA, and her dad is checking stocks. What kind of network does this family most likely have? A. client/server B. P2P network C. both a and b D. neither a or b

B. P2P network

which network cable type is most susceptible to signal interference A. fiber-optic B. UTP C. STP D. coaxial

B. UTP

IPv6 uses 128 bits to assing a(n) A. memory address to the CPU B. address to every device connected to the internet C. destination internet address to each e-mail D. data packet to each transmission

B. address to every device connected to the internet

data captured as user navigate through a website is called A. web-user data B. clickstream data C. staged data D. time-variant data

B. clickstream data

encryption is used to A. transfer email more quickly B. code your email so only one person can decipher it C. make shopping on the internet more available D. shrink the amount of space it takes to store e-mails

B. code your emails so only one person can decipher it

the combination of media, internet, entertainment, and phone services into a single device illustrates the principle of A. digital cohesion B. digital convergence C. digital collusion D. digital combination

B. digital convergence

when analog data is measured and converted to a stream of numerical values, this is referred to as _____ the data A. upstreaming B. digitzing C. compressing D. streamlining

B. digitizing

a type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as A. an urban legend B. fake news C. a persistence of information story D. a public domain tale

B. fake news

which type of broadband internet offers connections nearing the speed of light A. DSL B. fiber-optic C. cable D. satellite

B. fiber-optic

a backup of all the data files on your computer can be managed easily using the windows 10 ____ utility A. windows defender B. file history C. recovery D. windows update

B. file history

which of the following is not a category of intellectual property A. patent B. imprint C. copyright D. trade dress

B. imprint

the collection of large national and international networks used to establish the internet is called the A. T1 B. internet backbone C. OC D. highway system

B. internet backbone

what two devices are often combined into one device to connect to the internet and to share the connection between devices on the network A. switch and hub B. modem and router C. router hub and switch D. router and switch

B. modem and router

a process to ensure that data in a database is organized most efficiently is called A. integration B. normalization C. data staging D. centralization

B. normalization

what is the first step of the SDLC A. analysis B. problem identification C. design D. development

B. problem identification

the internet is primarily funded by A. your state income tax B. your federal income tax C. google D. voluntary contribution

B. your federal income tax

which server would a client/server network include to ensure only authorized users are logging onto the network A. communication B. cloud C. authentication D. application

C. authentication

which of the following is an open electronic publishing format A. SMS B. PDF C. ePub D. azw

C. ePub

the first step when using object-oriented design is to A. select the data types that need to be used to solve the problems B. identify which control structures are needed C. identify all of the categories of inputs that are part of the problem D. break down the problem to a series of high-level tasks

C. identify all of the categories of inputs that are part of the problem

a packet analyzer is called a sniffer because A. it starts a denial-of-service attack B. it detects high-speed transmissions C. it captures and reads data inside each packet D. it filters out spam

C. it captures and reads data inside of each packet

which of the following describes fiber-optic broadband? A. speed drops as the distance from the main signal source increases B. it connects with coaxial cable C. it uses strands of pure glass or plastic D. it connects via an orbiting satellite

C. it uses strands of pure glass or plastic

which of the following should you not do to secure a wireless network A. disable SSID broadcasting B. create a security encryption passphrase C. keep the default network name and router password D. implement media access control

C. keep the default network name and router password

firewalls use a process of ____ to assign IP addresses to the devices internal to the network so hackers will not know what they are A. VPN B. port blocking C. network address translation (NAT) D. packet filtering

C. network address translation (NAT)

a customer information table linked to a password table in a business database reflects which type of relationship A. one-to-many B. many-to-one C. one-to-one D. many-to-many

C. one-to-one

java is considered to be architecture neutral because it A. can run on many different generations of windows B. can be recompiled to run on many CPUs C. only needs to be compiled once and can run on many different CPUs D. can run in any browser

C. only needs to be compiled once and can run on many different CPUs

which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use A. relationship B. filter C. query D. request

C. query

which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place A. batch processing B. input processing C. real-time processing D. all of the above

C. real-time processing

A ___ is a program that takes complete control of your computer without your knowledge A. sniffer B. VPN C. rootkit D. botnet

C. rootkit

a surge protector may look like just another power strip but it also can A. detect viruses B. prevent theft C. save your device if a voltage spike is sent through the electrical system D. help manage head

C. save your device is a voltage spike is sent through the electrical system

on client/server networks more users can be added without affecting the performance of other nodes. this is known as A. decentralization B. flexibility C. scalability D. topology

C. scalability

SMTP is the set of rules used to A. make shopping on the internet more available B. encrypt e-mail messages C. send e-mail along the internet to its destination D. shrink the amount of space it takes to store an email

C. send email along the internet to its destination

which of the following is an advantage of installing a client/server network in a business A. centralization of network adapters B. decentralization of files and data C. sharing of peripherals D. decentralization of peripherals

C. sharing of peripherals

the database programming language SQL stands for A. selected query launch B. structured question lingo C. structured query language D. simple quick language

C. structured query language

which of the following does not determine the quality of a digital image A. file format and compression used B. resolution of the camera C. the number of pixels in the camera lens D. image sensor site

C. the number of pixels in the camera lens

a private key is important A. to reboot your hardware B. to reset your public key if you lose a password C. to decode an encrypted message D. because it enables you to use MIME

C. to decode an encrypted message

the type of network that would be necessary to connect the networks of two college campuses would be: A. PAN B. LAN C. MAN D. WAN

D. WAN

which of the following is the most secure security protocol used with routers? A. WPA B. WEP2 C. WEP D. WPA2

D. WPA2

an applet is A. a hardware device that encrypts email messages B. a program distributed by Apple inc C. a programming language used to help create dynamic web pages D. a small application located on a server computer

D. a small application located on a server computer

computer viruses can be spread by A. sharing flash drives B. downloading and running a file attached to an email C. downloading a song from a peer-to-peer sharing site D. all of the above

D. all of the above

in selecting the most appropriate language it is useful to know A. how quickly the final code must run B. how much space the final code delivered can occupy C. if there is a specific target environment D. all of the above

D. all of the above

it is important to maintain your online reputation A. because of the persistence of information B. because employers often review social media before hiring employees C. to ensure information about you is accurate D. all of the above

D. all of the above

which of the following is used to access the internet when WIFI is not available? A. mobile hotspot B. 4G LTE internet access C. 3G internet access D. all of the above

D. all of the above

the process whereby users prove they have authorization to use a computer network is known as A. proxy control B. repudiation C. decentralization D. authentication

D. authentication

which is not a key component of a typical client/server network A. network navigation devices B. transmission media C. network interface card D. bastion host

D. bastion host

authentication techniques that rely on personal biological traits are called A. botnets B. trojan horses C. scanners D. biometrics

D. biometrics

viruses that load from USB drives left connected to computers when computers are on are known as A. polymorphic viruses B. script viruses C. encryption viruses D. boot-sector viruses

D. boot sector viruses

you need to know how to program to A. open a template file for budgeting in microsoft excel B. create an animation in powerpoint C. use microsoft word to type and text and select various fonts D. create unique software solutions for specialized problems

D. create unique software solutions for specialized problems

which of the following is not considered metadata A. field name B. field size C. data type D. database name

D. database name

how the program should behave if the input data is invalid is part of A. beta testing B. scope creep C. process D. error handling

D. error handling

reducing the sampling rate when digitizing a file has which effect on the file A. it increases the file size B. it neither increases or decreases the file size C. it depends on the codec used to digitize the file D. it decreases the file size

D. it decreases the file size

HTTPS is different from HTTP because A. of how it transforms or reformats the data B. it extracts data from source databases C. it stores data in the data warehouse D. it is a combination of HTTP and the Secure Sockets Layer (SSL)

D. it is a combination of HTTP and the Secure Sockets Layer (SSL)

which of the following would NOT be a benefit of networking computers A. sharing printers and other peripherals B. sharing an internet connection C. sharing files D. sharing software licenses

D. sharing software licenses

the information in a data packet includes A. different types of information depending on the type of message being sent B. just the data C. the data and the circuit identifier D. the data and the destination

D. the data and the destination


Related study sets

IM EOR: Infectious Disease - Diptheria, EBV, HSV, Parasites, Pertussis, Rock Mt Fever, Varicella, Botulism

View Set

2 Testing of Materials & 3 properties ect

View Set

Unit 14 and 15 Real Estate Financing Principles and Practices

View Set

Unit 1: Echoes from the Past, Lesson 3: The Odyssey, Part II

View Set

Hypomania, acute mania, delirious mania

View Set

Chapter 18 learning objectives (test 2)

View Set