Computer Science > EXAM > CGS 2060 Final Exam - Questions with 100% Correct Answers (All)
CGS 2060 Final Exam - Questions with 100% Correct Answers The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system. Maintai ... ning After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ . English Which of these programs make data more readable to programmers by parsing XML files? JSON Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code. Language The coding step of the PDLC might use which of the following languages? C++ After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ . Debugging A graphic representation of a process is called a ___ . Flowchart The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test. Beta If it can be answered as either yes or no, or true or false, the question is called ___ . Binary You can change your Firefox settings to allow you to 1.approve cookie storage requests. 2.deny cookie storage requests. 3.delete stored cookies automatically when you start Firefox. Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____. Quarantine Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____. Trojan horse According to US-CERT if you receive a phishing message you should contact them using which of the following methods. 1. In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. 2. In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. 3. If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT. Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of keystrokes passwords confidential info The malicious use of computer code to modify the normal operations of a computer or network is called a Cyberattack Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a Firewall Select what's true about packet Specialized hardware or software that capture packets transmitted over a network 1. Legitimate sniffers are used for routine examination and problem detection. 2. Unauthorized sniffers are used to steal information. Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called Adware Which of the following are online nuisances? spam spyware spoofing Which transmission media has the largest bandwidth? fiber optic A request for an electronic "echo" or response from another computer or server is called a ____. Ping Broadband is measured in _____ . Mbps The volume of data that can be carried on an Internet transmission media in an amount of time is called _____. Bandwidth The BitTorrent protocol is often called ___ file sharing. peer to peer A ___ name identifies a server site on the Internet. Domain Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month. T/F True The first commercially available computer with a graphical user interface was NeXT's ___ computer. Cube Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet. Router Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ . Safari Disk Cache memory used to increase a hard drive's efficiency L3 cache memory located adjacent to the processor L1 cache memory located directly on the processor itself Clockspeed, also referred to as _________, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device. clock rate In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____. Cache Select what's true regarding all-in-one computers. 1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse. The two major factors that impact processor speed are clock speed and _____ bus width The machine cycle consists of which four steps? fetch, decode, execute, and store Megahertz is equal to one _____ cycles (or instructions) per second. Million Screen size is measured by the ___ across the monitor. Diagonal The visual image output that a computer creates is known as ____ . Graphics What type of port do most digital devices use to attach peripherals? USB port Which of the following are output? 1. a YouTube video displayed on a screen 2. an anti-lock brake system applying brakes The diagonal measure of the visible display is known as _____ . screen size A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___. Smartboard The most common printers for printing receipts are ___ printers. Thermal Most touchpads use _____ to sense when a finger has moved across the pad. Capacitance Which colors make up a typical monitor's pixels? red green blue Select the qualities that make a trait useful for biometric recognition. 1. The trait must not change over time. 2. cannot change over time 3. must be measurably different The number of pixels in a display is called the display's ___ . Resolution 3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals. T/F True To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V. CTRL + X When you drag a file into the Recycle Bin it cannot be recovered. T/F False Select the characteristics of a OneDrive account 1. Microsoft email account 2. provides free cloud storage 3. can serve as extra storage space Select the common audio file formats. .mp3 .mp4 .wav If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file. Drag The two major concerns regarding cloud storage are reliability and ___ . Security You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there. file explorer You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ . save as Which of the following file extensions is commonly used for drawings? .gif Match the extension with the type of document. webpage - .html spreadsheet - .accdb database - .xlsx presentation - .pez In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something. Field An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ . Dictionary To search a database for information, create a ___ . Query To display or distribute information from a database, programmers or database administrators create ___ . Reports When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem. Application A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database. Multidimensional The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem. data administration Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System. Management Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ . Integrity A database that stores data in different physical locations and that users access though client/server networks is called a ___ database. Distributed Select apple tablet offerings iPad pro series ipad air series iPad mini series By upgrading to its maximum capacity of 16 GB of RAM and 1 TB of storage, the ___ tablet could be an extremely powerful computer! Microsoft surface pro 4 Select the functions of a Digital Signal Processor 1. analyzes signals received from the analog-digital converter to enhance audio quality 2. reduces unwanted noise 3. moderates call volume Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ . Syncing Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007. Blackberry Select the Android operating systems. 1. Lollipop 2. marshmallow Select the anti-virus software options. 1. Mcafee 2. Norton 3. AVG One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab. microSD storage Which of these is found on iPhones and iPads? iOS Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network. mobile switching station (MSS) A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____. hacker A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ . Distributed Denial of Service Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____. Cyberbullying Specialized hardware or software that capture packets transmitted over a network are called packet _____. Sniffers Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___. white hat hackers You must individually adjust cookie settings in every browser you use. T/F True A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ . Pharming Select the statements that are true regarding Cellular Internet service. 1. uses cell phone radio waves to transmit and receive Internet signals 2. Many providers offer data packages that may place limits on uploading and downloading. 3. Many smartphones can send and receive WiFi signal, allowing them to become hotspots. Select the characteristics of a modem. 1. converts analog signals into digital signals 2. converts digital signals into analog signals 3. usually provided by the ISP Select the statements that are true regarding cable Internet service. 1. uses the same coaxial cable that brings the cable television signal 2. usually has more bandwidth than DSL lines 3. Internet service can often be bundled with television service URL stands for ___ Resource Locator. Uniform Select the statements that are true regarding Fiber Optic Internet service. 1. fastest home network option when available 2. not available in all areas 3. signal is carried by light waves so it's less subject to electromagnetic interference A URL identifies a particular __ address on the World Wide Web. File Select the statements that are true regarding IP addresses. 1. assigned to your home network by your ISP 2. means by which your network is identified by other servers and computers on the Internet 3. ISPs often have blocks of IP addresses that they assign as demanded The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view. Logical The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data? 1. What field name will the data fall under 2. What data type will be included Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ . Hierarchy Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ . Databases When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem. [Show More]
Last updated: 1 year ago
Preview 5 out of 23 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 11, 2024
Number of pages
23
Written in
All
This document has been written for:
Uploaded
Jul 11, 2024
Downloads
0
Views
73
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·