Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 1. Questions Attempted: 85/85 ________ is the maximum speed at which data can be transferred between two nodes. a. Through speed b. Bandwidth c. Broadband d. Throughput Grade: User Responses: 1 b.Bandwidth Feedback: 2. A network that spans a large physical distance is called a ________. a. MAN b. PAN c. WAN d. LAN Grade: User Responses: 1 c.WAN Feedback: 3. Submission No: 1/1 Normal telephone cable is a type of ________. a. Ethernet cable b. twisted-pair cable c. coaxial cable d. fiber-optic cable Grade: User Responses: 1 b. twisted-pair cable Feedback: 1 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 4. Questions Attempted: 85/85 Submission No: 1/1 For the nodes on a network to communicate with each other and access the network, each node needs a ________. a. hub b. DSL modem c. router d. network adapter Grade: User Responses: 1 d.network adapter Feedback: 5. On a network, a(n) ________ helps prevent data packets from colliding with each other. a. switch b. hub c. adapter d. access point Grade: User Responses: 1 a.switch Feedback: 6. Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? a. USB ports b. Routers and switches c. Firmware d. Firewalls Grade: User Responses: 1 b.Routers and switches Feedback: 2 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 7. Questions Attempted: 85/85 Submission No: 1/1 To transfer data packets between two or more networks, a ________ is used. a. router b. switch c. firewall d. hub Grade: User Responses: 1 a.router Feedback: 8. Data are sent through a network in bundles called ________. a. packets b. packages c. pouches d. nodes Grade: User Responses: 1 a.packets Feedback: 9. Using a network without the network owner's permission is known as ________. a. phishing b. spamming c. piggybacking d. hijacking Grade: User Responses: 1 c.piggybacking Feedback: 3 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 10. Questions Attempted: 85/85 Submission No: 1/1 The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. a. MAC b. IP c. network d. SSID Grade: User Responses: 1 a.MAC Feedback: 11. The operating system of a cell phone is stored in ________. a. an SD card b. ROM c. RAM d. the CPU Grade: User Responses: 1 b.ROM Feedback: 12. A(n) ________ chip converts sound waves from a voice into digital signal. a. analog-to-digital converter b. digital signal processor c. telephony d. digital convergence Grade: User Responses: 1 a.analog-to-digital converter Feedback: 4 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 13. Questions Attempted: 85/85 Submission No: 1/1 A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone. a. modem b. compression utility c. analog-to-digital converter d. digital signal processor chip Grade: User Responses: 1 d.digital signal processor chip Feedback: 14. A ________ is a geographical area with a base transceiver station at its center. a. hot-spot b. cell c. wave d. port Grade: User Responses: 1 b.cell Feedback: 15. Which is true of SMS messages? a. They are used in web page development. b. They can contain pictures and videos. c. They are no longer used. d. They can only contain a limited number of characters. Grade: User Responses: 1 d.They can only contain a limited number of characters. Feedback: 5 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 16. Questions Attempted: 85/85 Submission No: 1/1 You can send messages that include photos and videos between mobile devices using ________ technology. a. multimedia message service (MMS) b. short message service (SMS) c. multimedia delivery service (MDS) d. delivery multimedia service (DMS) Grade: User Responses: 1 a.multimedia message service (MMS) Feedback: 17. The distance between two near field communication (NFC) devices is limited to about ________. a. 10 meters b. 1.5 inches c. 1.5 meters d. 1.5 feet Grade: User Responses: 1 b.1.5 inches Feedback: 18. ________ allows only limited use of media that have been legally purchased. a. Synchronizing b. Copyleft c. Digital rights management d. Copyright Grade: User Responses: 1 c.Digital rights management Feedback: 6 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 19. Questions Attempted: 85/85 Submission No: 1/1 Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? a. Converting rate b. Sampling rate c. Conversion rate d. Simplifying rate Grade: User Responses: 1 b.Sampling rate Feedback: 20. Which of the following digital image formats compresses the image file? a. WAV b. JPEG c. PDF d. MPEG Grade: User Responses: 1 b.JPEG Feedback: 21. The Internet Crime Complaint Center (IC3) is a partnership between the ________. a. FBI and National Defense Department b. FBI and local police departments c. FBI and National White Collar Crime Center d. National White Collar Crime Center and U.S. Department of Defense Grade: User Responses: 1 c.FBI and National White Collar Crime Center Feedback: 7 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 22. Questions Attempted: 85/85 Submission No: 1/1 ________ viruses are often transmitted by a flash drive left in a USB port. a. Boot-sector b. Time bomb c. Macro d. Logic bomb Grade: User Responses: 1 a.Boot-sector Feedback: 23. A(n) ________ takes advantage of file transport methods to spread on its own. a. macro virus b. worm c. script virus d. encryption virus Grade: User Responses: 1 b.worm Feedback: 24. A ________ is a virus that is attached to documents such as Word or Excel files. a. macro virus b. script virus c. Trojan horse d. polymorphic virus Grade: User Responses: 1 a.macro virus Feedback: 8 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 25. Questions Attempted: 85/85 Submission No: 1/1 Which of the following classifications of viruses can change its own code to avoid detection? a. Worm b. Multipartite c. Stealth d. Polymorphic Grade: User Responses: 1 d.Polymorphic Feedback: 26. A(n) ________ is the portion of virus code that is unique to a particular computer virus. a. compression code b. virus pattern c. virus signature d. encryption code Grade: User Responses: 1 c.virus signature Feedback: 27. ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. a. Gray-hat b. Black-hat c. Green-hat d. White-hat Grade: User Responses: 1 d.White-hat Feedback: 9 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 28. Questions Attempted: 85/85 Submission No: 1/1 A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. a. zombie b. logic bomb c. denial of service (DoS) d. rootkit Grade: User Responses: 1 d.rootkit Feedback: 29. Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. a. static addressing b. packet filtering c. logical port blocking d. packet switching Grade: User Responses: 1 c.logical port blocking Feedback: 30. CAPTCHA is ________. a. password method b. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website c. a rootkit virus d. antivirus software Grade: User Responses: 1 b.the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website Feedback: 10 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 31. Questions Attempted: 85/85 Submission No: 1/1 Adware and spyware are referred to collectively as ________. a. viruses b. grayware c. alertware d. firmware Grade: User Responses: 1 b.grayware Feedback: 32. Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. a. theft b. pharming c. engineering d. pretexting Grade: User Responses: 1 c.engineering Feedback: 33. When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. a. pretexting b. pharming c. aphishing d. polymorphing Grade: User Responses: 1 b.pharming Feedback: 11 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 34. Questions Attempted: 85/85 Submission No: 1/1 What is the first step of the system development life cycle (SDLC)? a. Analysis b. Development and documentation c. Problem and Opportunity Identification d. Design Grade: User Responses: 1 c.Problem and Opportunity Identification Feedback: 35. The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________. a. algorithm b. flowchart c. structure chart d. pseudocode Grade: User Responses: 1 a.algorithm Feedback: 36. The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. a. flowcharts b. operators c. pseudocode d. control structures Grade: User Responses: 1 d.control structures Feedback: 12 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 37. Questions Attempted: 85/85 Submission No: 1/1 A loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________. a. operator b. test condition c. class d. testing plan Grade: User Responses: 1 b.test condition Feedback: 38. ________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. a. Top-down design b. Bottom-up design c. Inheritance d. Object-oriented analysis Grade: User Responses: 1 a.Top-down design Feedback: 39. Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them. a. blocks b. classes c. units d. fields Grade: User Responses: 1 b.classes Feedback: 13 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 40. Questions Attempted: 85/85 Submission No: 1/1 An example of a first-generation language is ________. a. machine language b. BASIC c. COBOL d. assembly language Grade: User Responses: 1 a.machine language Feedback: 41. The capability of moving a completed programming solution easily from one type of computer to another is known as ________. a. scalability b. transferability c. inheritance d. portability Grade: User Responses: 1 d.portability Feedback: 42. The process that converts program code into machine language is called ________. a. execution b. compilation c. variable declaration d. documentation Grade: User Responses: 1 b.compilation Feedback: 14 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 43. Questions Attempted: 85/85 Submission No: 1/1 ________ is the set of instructions that programmers have written in a higher-level language. a. Compiled code b. Base code c. Executable code d. Source code Grade: User Responses: 1 d.Source code Feedback: 44. Division by zero is a ________ error that is caught when the program executes. a. syntax b. runtime c. logical d. compiler Grade: User Responses: 1 b.runtime Feedback: 45. A small Java-based program is called a ________. a. Java class b. JavaScript c. Java applet d. JSP Grade: User Responses: 1 c.Java applet Feedback: 15 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 46. Questions Attempted: 85/85 Submission No: 1/1 Special symbols called tags are used in which of the following languages? a. C# b. Java c. C++ d. HTML/XHTML Grade: User Responses: 1 d.HTML/XHTML Feedback: 47. If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________. a. integrity b. completeness c. redundancy d. normalization Grade: User Responses: 1 c.redundancy Feedback: 48. In a database, the term ________ is synonymous with a category of information. a. row b. record c. table d. field Grade: User Responses: 1 d.field Feedback: 16 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 49. Questions Attempted: 85/85 Submission No: 1/1 In a database, a group of related records is referred to as a(n) ________. a. object b. memo c. field d. table Grade: User Responses: 1 d.table Feedback: 50. In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field. a. object b. text c. short text d. long text Grade: User Responses: 1 d.long text Feedback: 51. You can set a ________, which is automatically displayed in a field unless the user enters something different. a. relation b. field type c. numeric check d. default value Grade: User Responses: 1 d.default value Feedback: 17 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 52. Questions Attempted: 85/85 Submission No: 1/1 ________ is used to ensure that data is organized most efficiently. a. Range checking b. Consistency checking c. Normalization d. Validation Grade: User Responses: 1 c.Normalization Feedback: 53. ________ databases are the most commonly used electronic databases. a. Flat-file b. Object-oriented c. Multidimensional d. Relational Grade: User Responses: 1 d.Relational Feedback: 54. ________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. a. Database consistency b. Record integrity c. Normalization d. Referential integrity Grade: User Responses: 1 d.Referential integrity Feedback: 18 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 55. Questions Attempted: 85/85 Submission No: 1/1 A(n) ________ check determines whether a required field such as LastName was filled in. a. range b. consistency c. alphabetic d. completeness Grade: User Responses: 1 d.completeness Feedback: 56. A ________ displays a subset of data from a table (or tables) based on the specified criteria. a. join query b. table query c. select query d. criteria query Grade: User Responses: 1 c.select query Feedback: 57. ________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize. a. Extracting b. Enhancing c. Exporting d. Importing Grade: User Responses: 1 c.Exporting Feedback: 19 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 58. Questions Attempted: 85/85 Submission No: 1/1 Big data analytics is usually associated with ________ services. a. management information b. decision support c. data warehouse d. office support Grade: User Responses: 1 c.data warehouse Feedback: 59. In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing. a. direct b. real-time c. immediate d. batch Grade: User Responses: 1 b.real-time Feedback: 60. In a ________ network, each node connected to the network communicates directly with every other node. a. client/server b. peer-to-peer c. router d. bridge Grade: User Responses: 1 b.peer-to-peer Feedback: 20 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 61. Questions Attempted: 85/85 Submission No: 1/1 A ________ uses the Internet communications infrastructure to build a secure and private network. a. WAN b. HAN c. PAN d. VPN Grade: User Responses: 1 d.VPN Feedback: 62. A(n) ________ server is a server that stores and manages files for network users. a. database b. print c. file d. e-mail Grade: User Responses: 1 c.file Feedback: 63. A print server uses a print ________ as a software holding area for jobs waiting to be printed. a. heap b. spooler c. logger d. stack Grade: User Responses: 1 b.spooler Feedback: 21 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 64. Questions Attempted: 85/85 Submission No: 1/1 Which of the following is the most commonly used client/server network topology? a. Hierarchical b. Star c. Cluster d. Ring Grade: User Responses: 1 b. Star Feedback: 65. In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. a. crash b. jam c. stop d. hit Grade: User Responses: 1 b.jam Feedback: 66. ________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time. a. Infusion b. Scalability c. Data capacity d. Bandwidth Grade: User Responses: 1 d.Bandwidth Feedback: 22 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 67. Questions Attempted: 85/85 Submission No: 1/1 ________ is the standard communications protocol used on most client/server networks. a. VPN b. Ethernet c. NOS d. TCP/IP Grade: User Responses: 1 b.Ethernet Feedback: 68. The physical address assigned each network adapter is called its ________. a. network access control (NAC) b. network physical address (NPA) c. physical address control (PAC) d. media access control (MAC) Grade: User Responses: 1 d.media access control (MAC) Feedback: 69. A(n) ________ address is the address that external entities use when communicating with your network. a. WAP b. ALU c. MAC d. IP Grade: User Responses: 1 d.IP Feedback: 23 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 70. Questions Attempted: 85/85 Submission No: 1/1 A ________ sends data from one collision domain to another. a. router b. link c. bridge d. switch Grade: User Responses: 1 c.bridge Feedback: 71. A ________ sends data between two networks. a. switch b. router c. repeater d. hub Grade: User Responses: 1 b.router Feedback: 72. Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. a. worm b. brute force attack c. spammer d. Trojan horse Grade: User Responses: 1 b.brute force attack Feedback: 24 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 73. Questions Attempted: 85/85 The main path of the Internet along which data travels the fastest is known as the Internet ________. a. protocol b. highway c. backbone d. cache Grade: User Responses: 1 c.backbone Feedback: 74. High-speed ________ communication lines use fiber-optics. a. IP b. cable c. DSL d. OC Grade: User Responses: 1 d.OC Feedback: 75. Submission No: 1/1 The main suite of protocols used on the Internet is ________. a. TCP/IP b. SMTP c. POP d. FTP Grade: User Responses: 1 a.TCP/IP Feedback: 25 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 76. Questions Attempted: 85/85 Submission No: 1/1 < b > is an example of an HTML ________. a. marker b. key c. tag d. indicator Grade: User Responses: 1 c.tag Feedback: 77. ________ defines the content in terms of the data that is being described rather than how it is to be displayed. a. HTML b. CGI c. JavaScript d. XML Grade: User Responses: 1 d.XML Feedback: 78. ________ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user. a. ACK b. OC c. UDP d. CGI Grade: User Responses: 1 d.CGI Feedback: 26 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 79. Questions Attempted: 85/85 Submission No: 1/1 A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer. a. app b. applet c. CGI script d. JavaScript Grade: User Responses: 1 b.applet Feedback: 80. The ________ defines items on a web page such as graphics, tables, and headers as objects. a. DOM b. MIME c. JSON d. SSL Grade: User Responses: 1 a.DOM Feedback: 81. Which protocol is used when sending files as attachments by e-mail? a. Multipurpose Internet Mail Extensions (MIME) b. Simple Mail Transfer Protocol (SMTP) c. User Datagram Protocol (UDP) d. Post Office Protocol (POP) Grade: User Responses: 1 a.Multipurpose Internet Mail Extensions (MIME) Feedback: 27 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 82. Questions Attempted: 85/85 Submission No: 1/1 In public-key encryption, the two keys—one for coding and one for decoding—are known as ________. a. code keys b. a key pair c. key tags d. linked keys Grade: User Responses: 1 b.a key pair Feedback: 83. Which of the following is an example of an instant messaging service? a. Yahoo Messenger b. LinkedIn c. Monster d. Flickr Grade: User Responses: 1 a.Yahoo Messenger Feedback: 84. ________ permits two or more people to communicate over the Internet in real time. a. Flickr b. Email c. Snapfish d. Instant messaging Grade: User Responses: 1 d.Instant messaging Feedback: 28 Final Concepts review CIS 111 CRN 23311 S19 Woolridge CC Cartagena,Orfa Submitted :5/16/2019 Gradebook Grade: 97.6% 7:13:52 PM 85. Questions Attempted: 85/85 Strong encryption now requires ________-bit keys. a. 40 b. 128 c. 256 d. 512 Grade: User Responses: 1 c.256 Feedback: 29 Submission No: 1/1