100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSIT FINAL EXAM QUESTIONS AND ANSWERS 100% PASS

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
12-12-2023
Written in
2023/2024

CSIT FINAL EXAM QUESTIONS AND ANSWERS 100% PASS Describe a *Star* network topology? for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch What is malware? software that is intended to damage or disable computers and computer systems. List 4 types of malware? Trojans, Worms, Spyware, Virus Describe the importance of data integrity accuracy of data, data validation, database locking Describe the importance of data security protects data against destruction and unauthorized access Describe the importance of data privacy vast amounts of personal data stored in databases List at least five strategies for virus prevention install anti-virus/malware software, instal firewall, use strong passwords, instal anti-spyware software, check security setting What are the phases involved in program development? problem analysis, program design, program coding, program debugging and testing, program implementation and maintenance Some monitoring systems in use today use the RFID tags and RFID readers to monitor the status of objects (such as check shipping boxes, livestock, or expensive equipment) to which the RFID tags are attached. true The trend toward online collaboration is usually called workgroup computing. true A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data is sent false TCP/IP is the protocol used for transferring data over the Internet. true A(n) computer network is a collection of computers and other hardware devices connected together so that network users can share hardware, software, and data, as well as communicate with each other electronically. true With a(n) peer-to-peer (P2P) network, a central server is not used true Direct Internet connections are much slower than dial-up connections false Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more. false The use of cookies provides no benefits to consumers. false Tim Berners-Lee proposed the idea of the World Wide Web. true Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement. false System failure can occur because of a hardware problem, a software problem, or computer sabotage. true Security software protects devices against malware and other threats. true A government database is a collection of data about people that is collected and maintained by private industry. false A(n) _____ is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. trademark Structured programming embodies a top-down design philosophy. true is the use of networking technology to provide medical information and services. telemedicine is a network designed to service an urban area, typically a city or county. metropolitan area network (MAN) In ____, data is sent when it is ready but all data must be delivered at the time that it is needed. isochronous transmission The technique used for data sent over the Internet is ____. packet switching was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. coaxial cable A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network. network interface card (NIC) A(n) ____________________ is a private network, such as a company LAN, that is designed to be used by an organization's employees and is set up like the Internet. Intranet __________ programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. Firewall _______ cable is the newest and fastest wired transmission medium. fiber-optic cable Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences. cookies ___________________ is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection. spyware The term ____ refers to the rights of individuals and companies to control how information about them is collected and used. information privacy A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. firewall ____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information. pharming Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used. privacy policy One common way to deal with spam that makes it to your computer is to use a(n) ____. email filter ________ are most often used to add dynamic content to a Web page or to integrate a Web page with a database. markup languages Two of the most significant approaches to programming are procedural programming and ____. object oriented programming ____takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies. aspect oriented programming In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program. algorithm A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. syntax error Define the six categories into which computers are generally classified. embedded, mobile devices, personal computers, servers, mainframe computers, super computers What does remote storage refer to? a data management service used to migrate infrequently accessed files from local storage to remote storage field a single characteristic of data that appears in a table as a column table an arrangement of data made up of horizontal rows and vertical columns. describe the functionality of an operating system mange the computers resources, establish a user interface, provide service

Show more Read less
Institution
CSIT
Course
CSIT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIT
Course
CSIT

Document information

Uploaded on
December 12, 2023
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1913
Member since
2 year
Number of followers
866
Documents
21200
Last sold
4 days ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

448 reviews

5
244
4
80
3
61
2
24
1
39

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions