100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CLEP EXAM WITH 100% CORRECT ANSWERS 2024

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
06-06-2024
Written in
2023/2024

File extensions such as .txt, .bmp, and .mp3 are used to identify a file's - ANSWER-Format Which of the following network technologies allows secure transmission of data over an unsecured public network link between private networks? - ANSWER-Virtual Private Network (VPN) Which of the following is a goal of green computing? (A) Reducing the potential for a computer to become infected with malware (B) Reducing the number of people experiencing computer vision syndrome (C) Reducing power consumption of computers and peripherals (D) Optimizing the human-computer interface (E) Building relationships between computer manufacturers and environmental groups - ANSWER-(D) Optimizing the human-computer interface Which of the following is true about EDI? Select all that apply. (A) The EDI documents generally contain the same information found in paper documents. (B) The EDI documents are more likely than paper documents to contain errors. (C) The speed in which the EDI documents are exchanged is much faster than that of paper documents. - ANSWER-A and C (A) The EDI documents generally contain the same information found in paper documents. (C) The speed in which the EDI documents are exchanged is much faster than that of paper documents. A spreadsheet contains the values 4 and 6 in cells C4 and D4, respectively. What value will be displayed in cell F4 if it contains the formula (C4^2+D4/4) ? - ANSWER-17.5 Which of the following would NOT be considered an input device for a computer system? (A) Image scanner (B) Webcam (C) Keyboard (D) Mouse (E) PC speaker - ANSWER-(E) PC speaker In a relational database, each column represents - ANSWER-An attribute Which of the following violates intellectual property rights? (A) Software piracy (B) Data mining of social networks (C) Launching a denial of service attack (D) Hacktivism (E) Spamming - ANSWER-(A) Software piracy Conversion of data files is part of which of the following phases of the system development process? - ANSWER-Implementation Enforcing programming standards in the software development process has which of the following impacts? Select all that apply. (A) Establishing common expectations (B) Making it easier to modify code (C) Enhancing the end-user experience - ANSWER-A and B (A) Establishing common expectations (B) Making it easier to modify code What does EDI stand for? (definition included in answer) - ANSWER-Electronic Data Interchange Definition: a process which allows one company to send information to another company electronically rather than with paper What is an input device? - ANSWER-A device that puts data and controls into the computer The ABC Charity Association, a nonprofit foundation, has a home page on the World Wide Web. Which of the following is the most likely URL for its home page? (A) (B) (C) (D) (E) ftp:// - ANSWER-(D) What is the principal function of an operating system? - ANSWER-To provide an interface between the hardware and the application software A business often identifies that its software has been trademarked by using a unique symbol or attaching the letters TM to its name. What is the purpose of the trademark? - ANSWER-To identify and differentiate the product's brand What term identifies the measure of accuracy, completeness, and currency of data? - ANSWER-Data Integrity The special formatting language used to create Web pages is called - ANSWER-HTML Which of the following best characterizes data in a data warehouse? - ANSWER-Historical Which of the following is NOT a correct characterization of batch processing? (A) It allows immediate updating of master files. (B) It provides physical batch totals to be used in control procedures. (C) It provides efficient updating of master files. (D) It is most applicable for processing routine periodic activities. (E) It allows efficient scheduling of processing. - ANSWER-(A) It allows immediate updating of master files. Which of the following best describes how GPS units function? (A) The receiver sends out regular query pulses and waits to receive responses from a GPS satellite. (B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites. (C) The receiver sends out radio signals that are reflected back by satellites and detected by the unit. (D) The receiver acts as a homing beacon that is tracked by the GPS satellites, which periodically send out position updates for each tracked receiver. (E) The receiver can detect an invisible electronic grid projected onto Earth's surface and compares the location on this grid to a stored map of Earth. - ANSWER-(B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites. Which of the following is the most likely negative consequence of participating in a social networking website? (A) Unintended disclosure of private information (B) Increase in spam (C) Infection by a virus (D) Download of a cookie containing personal preferences (E) Download of spyware - ANSWER-(A) Unintended disclosure of private information Are digital signatures encrypted? - ANSWER-Yes Do data signatures authenticate user identity? - ANSWER-Yes Do data signatures typically involve CAPTCHAs? - ANSWER-No Can data signatures replace ink-based signatures? - ANSWER-Yes Which of the following is a method of system implementation that requires both the previous system and the new system to perform identical tasks at the same time? (A) Parallel (B) Parceled (C) Phased (D) Pilot (E) Private - ANSWER-(A) Parallel Which of the following is a potential benefit of telecommuting to the employer? Select all that apply. (A) Eliminates employee commuting time (B) Facilitates recruiting a larger pool of prospective employees (C) Increases flexibility in handling of unexpected work after typical business hours (D) Reduces stress of supervisors (E) Improves communication between employees - ANSWER-(B) Facilitates recruiting a larger pool of prospective employees (C) Increases flexibility in handling of unexpected work after typical business hours What is the primary difference between an intranet Web page and an Internet Web page? - ANSWER-Restriction of access Which of the following explains why digital networks can transmit different types of data? (A) Networks can accommodate different types of computers. (B) Network connections can be made via satellites. (C) Data can be transmitted as either digital or analog signals. (D) Storage capacity is not an issue. (E) Each data type can be represented by strings of bits. - ANSWER-(E) Each data type can be represented by strings of bits. A disaster recovery plan to safeguard a company's computer system can be used for all of the following occurrences EXCEPT (A) a flood, fire, or other natural disaster (B) a massive long-term power outage (C) system upgrades and hardware maintenance (D) computer sabotage (E) a major viral infection of computer systems - ANSWER-(C) system upgrades and hardware maintenance In a company with a large and effective IT workforce, which of the following is the most likely title of the person who recommends enterprise-wide upgrades of computer hardware? (A) Chief Information Officer (B) Chief Technology Officer (C) Chief Financial Officer (D) Systems Analyst (E) Information Resources Manager - ANSWER-(B) Chief Technology Officer 28. A user has visited several websites, making purchases, initiating searches, and filling out online forms. What could the user access to revisit the websites? - ANSWER-Web browser history A network administrator is LEAST likely to recommend which of the following technologies to share large quantities of information in a knowledge management system? (A) E-mail (B) Wiki (C) Intranet (D) Discussion board (E) Shared network drive - ANSWER-(A) E-mail Which of the following is a major benefit of object-oriented programming? (A) The development of logical steps to achieve the object of the program (B) The use of subroutines that optimize the program's objective (C) The creation of objects that can be used or modified for use in future applications (D) The freedom for programmers to create objects unique to each program (E) The defining of objects as static entities that do not relate to each other - ANSWER-(C) The creation of objects that can be used or modified for use in future applications What is object-oriented programming (OPP)? - ANSWER-Object-oriented programming is about creating objects that contain both data and functions What is procedural programming? - ANSWER-Procedural programming is about writing procedures or functions that perform operations on the data Which of the following is included in the maintenance phase of the systems development process? Select all that apply. (A) Repairing a system (B) Replacing a system (C) Updating a system (D) Improving process efficiency (E) Testing system modifications - ANSWER-A,C,D, and E (A) Repairing a system (C) Updating a system (D) Improving process efficiency (E) Testing system modifications When applied to the development of computer systems, the term "ergonomics" means - ANSWER-incorporating human comfort, efficiency, and safety into the design of the human-machine interface What is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete? - ANSWER-Streaming Which of the following is (are) true about customer relationship management systems? I. They focus on the connection between suppliers, manufacturers, and customers. II. They enable employees in all departments to have a consistent view of customers. III. They focus on customer retention. - ANSWER-II and III II. They enable employees in all departments to have a consistent view of customers. III. They focus on customer retention. Which of the following best describes a worm? (A) A program that displays advertisements in pop-up windows (B) A program that is installed on a computer without the user's knowledge (C) A virus that masquerades as another active program (D) A program that traces user activity (E) A program that replicates itself repeatedly, using up system resources - ANSWER-(E) A program that replicates itself repeatedly, using up system resources Which of the following is true about open-source software? Select all that apply. (A) It always provides product support. (B) Its source code is freely available. (C) It is copyrighted. (D) It is shareware. - ANSWER-(B) Its source code is freely available. (C) It is copyrighted. Which of the following is a database whose data are scattered across several physical servers? - ANSWER-Distributed database When developing a website, which of the following activities should occur closest to the end of the process? (A) Creating the navigation structure (B) Purchasing a domain name (C) Verifying all the hyperlinks (D) Designing the style sheets (E) Finalizing the graphics - ANSWER-(C) Verifying all the hyperlinks Which of the following can support cloud-based application development and deployment? (A) Communications as a service (B) Platform as a service (C) Infrastructure as a service (D) Software as a service (E) Network as a service - ANSWER-(B) Platform as a service Knowledge management software is designed to do which of the following? (A) Identify patterns and trends in data (B) Collect and store data in a way that can be easily accessed (C) Manage day-to-day interactions with customers (D) Help analyze data and facilitate decision making (E) Facilitate organizational learning - ANSWER-(E) Facilitate organizational learning An online storefront developer should test the different versions of which of the following in order to ensure usability for all users? (A) Database management systems (B) Hypertext markup languages (C) Compilers (D) Web browsers (E) Search engines - ANSWER-(D) Web browsers Which of the following statements is true regarding client/server architecture? (A) The server computer accepts commands from a number of computers that are its clients. (B) The server computer manages a number of computers that it services. (C) The server computer is connected to a number of computers that provide it with services. (D) The client computer is connected to a number of computers that provide it with clients. (E) The client computer manages a number of computers being served by it - ANSWER-(A) The server computer accepts commands from a number of computers that are its clients. What refers to the testing of individual modules within a software system? - ANSWER-Unit testing Metadata is best described as what? - ANSWER-Data about data Which of the following is NOT an advantage of having an entire department using the same office software suite? (A) Lower cost per application than if purchased individually (B) Ease of moving data between suite applications (C) Ease of moving data between users in the same department (D) Ease of installation and maintenance (E) Optimal functionality of individual application packages - ANSWER-(E) Optimal functionality of individual application packages Which of the following problem-solving techniques allows users to start with high-level information and then select more specific, lower-level details? (A) Ad hoc analysis (B) Exception reporting (C) Drill-down analysis (D) RFM analysis (E) Cluster analysis - ANSWER-(C) Drill-down analysis The Bluetooth standard uses what transmission method for data transfer? - ANSWER-Radio waves After a consumer purchases and downloads an MP3 file, which of the following is legal? Select all that apply. (A) Copying the file for personal use (B) Copying the file and giving the copy to a friend (C) Giving the original file as a gift (D) Selling the original file (E) Uploading the file to a public website - ANSWER-A and C (A) Copying the file for personal use (C) Giving the original file as a gift In order to use cloud computing effectively, it is necessary for a large company to have which of the following? (A) a robust Internet connection (B) a large amount of centralized storage (C) computers with multiple CPUs (D) computers with a large amount of memory (E) computers with specialized operating systems - ANSWER-(A) a robust Internet connection Which of the following statements about rapid application development is true? (A) It is used during prototyping. (B) It is designed to be platform dependent. (C) It reduces dependency on object-oriented programming. (D) It begins before requirements are defined. (E) It allows programmers to preemptively determine user interfaces without the users' input. - ANSWER-(A) It is used during prototyping. Which of the following is true about user passwords? (A) They should be changed only by the administrator. (B) They must be no more than eight characters in length. (C) They are requested by CAPTCHAs. (D) They are most secure when they consist of letters, numbers, and special characters. (E) They are required to be unique. - ANSWER-(D) They are most secure when they consist of letters, numbers, and special characters. What are the small blocks of data that are created by dividing a large block of data before transmission over a network? (A) Bits (B) Bytes (C) Entities (D) Packets (E) Modules - ANSWER-(D) Packets Developers quickly create a version of a system and give it to the users for feedback. The developers then use the users' feedback to revise the system. This process repeats until the users approve the system. This method of developing a system is called - ANSWER-Prototyping Which of the following is NOT true of social networking sites? (A) It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites. (B) Any unethical activity on a social networking site could have negative consequences outside the site. (C) Some sites enable members to share material with many other members simultaneously. (D) Some sites enable members to maintain contact with other members. (E) Some sites facilitate access to commercial sites. - ANSWER-(A) It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites. What is an information technology process that is used to produce documents that are duplicate digital copies of a paper document? - ANSWER-Document Imaging Which of the following is NOT a means of secondary storage? (A) External hard drive (B) Cache memory (C) USB flash drive (D) Cloud storage (E) Secure digital card - ANSWER-(B) Cache memory The capability of computerized systems to store and duplicate information poses a potential threat to an individual's - ANSWER-Privacy Which of the following is NOT a characteristic of a decision support system as it is usually defined? (A) It can be used as an aid in solving ad hoc problems. (B) It is useful for what-if analysis. (C) It is intended to help managers make decisions. (D) It makes the one best or optimal decision. (E) It uses appropriate statistical and mathematical models. - ANSWER-(D) It makes the one best or optimal decision. Which of the following uses the Internet, as opposed to using the public switched network, to enable voice communication? (A) TCP/IP (B) VoIP (C) EFT (D) EDI (E) PBX - ANSWER-(B) VoIP Which data model uses two-dimensional tables to represent data structures? - ANSWER-Relational Which of the following types of systems development methods would be appropriate when a company does not have an expert IS department? I. Outsourcing II. Traditional SDLC III. RAD - ANSWER-I. Outsourcing Planning, scheduling, and overseeing the development of a new information system are all components of which of the following? (A) Systems analysis (B) System modeling (C) Knowledge management (D) Cost-benefit analysis (E) Project management - ANSWER-(E) Project management Which of the following is a principle of net neutrality? Select all that apply. (A) All Internet traffic will be treated equally. (B) Organizations are prohibited from charging more for faster transmission of data based on the content. (C) Access to data is not restricted based on the country the user is in. (D) The language of the Internet shall be English in order to maintain a common standard. (E) Governments are prohibited from filtering Internet content. - ANSWER-A and B (A) All Internet traffic will be treated equally. (B) Organizations are prohibited from charging more for faster transmission of data based on the content. A manager of a small business wants to use a computer to store information about clients, vendors, inventory (item, number, price), and orders. The manager needs to be able to sort and group data for various reports. Which of the following types of software packages would be best for this task? (A) Word processor (B) Spreadsheet (C) Database management system (D) Presentation software (E) System software - ANSWER-(C) Database management system What is used to transmit data from Earth to a satellite and back? - ANSWER-Microwaves Which of the following directly affects the most users? (A) Hacking (B) Phishing (C) Cyberextortion (D) Identity theft (E) Denial of service attacks - ANSWER-(E) Denial of service attacks In considering the economic feasibility of a systems development project, which of the following would a project manager be LEAST likely to consider? (A) The cost of developing the system compared with the potential benefits of using the system (B) The return on the initial investment on the system (C) When the project will break even (D) Whether the company can afford the project (E) Whether the hardware can be acquired for the project - ANSWER-(E) Whether the hardware can be acquired for the project Which of the following accesses and updates a database to keep track of the sales of tickets to an upcoming event? A) System software (B) Networking software (C) A transaction processing system (D) An operating system (E) A knowledge management system - ANSWER-(C) A transaction processing system Which of the following user-based activities would NOT be part of a website design project? (A) Users being asked what information should appear on the website (B) Users being asked what programming language they are most comfortable with (C) Users being asked about their security concerns (D) Users being asked what statistical feedback they would like to receive (E) Users being instructed to look at similar websites - ANSWER-(B) Users being asked what programming language they are most comfortable with Which of the following is an advantage of outsourcing? (A) It enables a company to focus on core competencies. (B) It decreases dependence on other organizations. (C) It decreases the risk of disclosing confidential information. (D) It improves managerial control. (E) It enhances in-house technical expertise. - ANSWER-(A) It enables a company to focus on core competencies. Which of the following is an example of data conversion? Select all that apply. (A) Moving data from one database into a new database with a different schema (B) Moving cached data over the Internet so it is closer to the requester (C) Moving data down an indexed list due to decreased use (D) Automated updating of a database with new data input stored in a separate file (E) Copying data to redundant databases to increase accessibility - ANSWER-(A) Moving data from one database into a new database with a different schema Which of the following is the most likely rationale for creating a disaster recovery plan? (A) Core enterprise-wide functions cannot operate without information technology. (B) Human capital represents a massive investment. (C) A large number of transactions are processed daily. (D) A large number of employees work off-site. (E) Telecommuting is not an option for many employees. - ANSWER-(A) Core enterprise-wide functions cannot operate without information technology. The maintenance phase of the system development process could include all of the following activities EXCEPT (A) correcting errors in the software that were detected after implementation (B) changing the heading on a report (C) updating entries in the tax table to reflect changes in the tax rates (D) adding a new function to an existing system (E) performing a complete rewrite for an existing system - ANSWER-(E) performing a complete rewrite for an existing system The type of network that would most likely be used to link a corporation's headquarters with its four branch offices located throughout a state is referred to as (A) a metropolitan area network (B) a local area network (C) an office area network (D) a wide area network (E) a broad area network - ANSWER-(D) a wide area network 76. Goals of a supply chain management system include which of the following? I. To facilitate upselling of the product II. To deliver the product to the customer more rapidly III. To reduce the cost of procurement - ANSWER-II and III II. To deliver the product to the customer more rapidly III. To reduce the cost of procurement Which of the following is a set of protocols used to link different types of computers over the Internet? (A) HTML (B) HTTP (C) ERP (D) TCP/IP (E) W3C - ANSWER-(D) TCP/IP Which of the following statements about mainframe computers is true? Select all that apply. (A) They are capable of large-scale batch jobs. (B) They are capable of massive online transaction processing. (C) They are more powerful and more expensive than supercomputers. (D) They provide superior multiuser performance compared with that of multiple workstations. - ANSWER-A,B, and D (A) They are capable of large-scale batch jobs. (B) They are capable of massive online transaction processing. (D) They provide superior multiuser performance compared with that of multiple workstations. Which of the following is the term used when a website automatically downloads data or files to a computer whenever new data are available or at scheduled intervals? (A) Web streaming (B) Push technology (C) Pipelining (D) Spamming (E) Web crawling - ANSWER-(B) Push technology A geographic information system must have which of the following characteristics? I. Records have identified geographic locations. II. The system uses global positioning satellites. III. The system provides results in a graphic format. - ANSWER-I and III I. Records have identified geographic locations. III. The system provides results in a graphic format. Managers in an organization often use spreadsheets to assist with decision making. The process of using a spreadsheet to try out alternatives is called (A) what-if analysis (B) data mining (C) flowcharting (D) querying (E) data manipulation - ANSWER-(A) what-if analysis Having multiple operating systems installed on the same personal computer enables the user to do each of the following EXCEPT (A) run a proprietary operating system and an open source operating system on the same computer (B) run different versions of the same operating system on the same computer (C) access a larger variety of software (D) create multiple IP addresses for the computer (E) create a virtual server - ANSWER-(D) create multiple IP addresses for the computer Which of the following is an asynchronous technology that a virtual team can use for communication? (A) Conference call (B) Videoconferencing (C) VoIP (D) E-mail (E) Webinar - ANSWER-(D) E-mail Which of the following is an application that can use RFID technology? Select all that apply. (A) Data transfer between smartphones (B) Toll collection on a limited-access roadway (C) Inventory management (D) Credit card use (E) Internet access (F) Animal tracking - ANSWER-B,C,D, and F The process through which a user is verified and validated to access a computer network/system is referred to as - ANSWER-Authentication What is the term that describes the storage of identical data in multiple locations? - ANSWER-Data redundancy Under which of the following conditions can a public wireless network be used to transmit confidential data most securely? (A) The local computer has been scanned for viruses. (B) The local computer has the latest operating system and updates. (C) The local computer connects to the network using VPN. (D) All files on the local computer have been backed up. (E) The network password meets all security criteria. - ANSWER-(C) The local computer connects to the network using VPN. What is an ERP system? (What it stands for along with definition) - ANSWER-Enterprise resource planning. ERP software contains applications which automates business functions like production, sales quoting, accounting, and more. What does VoIP mean? - ANSWER-Voice over Internet Protocol. Analog voice calls are converted into packets of data through the VoIP.

Show more Read less
Institution
Clep
Module
Clep











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Clep
Module
Clep

Document information

Uploaded on
June 6, 2024
Number of pages
32
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRAINSCAPE1 Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
122
Member since
1 year
Number of followers
14
Documents
11144
Last sold
1 day ago
download to pass in your exam

**Profile: Exam and Flashcards Sales**. **Introduction:** Welcome to my profile! I specialize in providing comprehensive exam and flashcard resources tailored to meet your educational needs. With a dedication to quality and effectiveness, I aim to assist students in achieving their academic goals with ease and confide**Services Offered:** 1. **Exam Materials:**- I offer a wide range of exam materials for various subjects and levels, including standardized tests such as SAT, ACT, GRE, GMAT, TOEFL, and more- These materials are meticulously crafted to cover all exam topics comprehensively, ensuring thorough preparation and confidence on test day. 2. **Flashcards:** - My collection of flashcards is designed to facilitate efficient learning and retention of key concepts. - Each set of flashcards is carefully curated to highlight essential information, making studying more manageable and effective. **Why Choose Me:** 1. **Quality Assurance:** - I prioritize quality in all my products, ensuring accuracy, relevance, and reliability. - Every exam material and flashcard set undergoes rigorous review and updating to reflect the latest changes in curriculum and exam formats. 2. **User-Friendly Resources:** - My resources are user-friendly, featuring clear formatting, concise explanations, and intuitive organization to enhance the learning experience. - Whether you're a visual learner or prefer text-based study aids, my materials cater to diverse learning preferences. 3. **Affordability:** - I believe that access to quality educational resources should not be cost-prohibitive. Thus, I offer competitive pricing without compromising on quality.

Read more Read less
4.4

19 reviews

5
12
4
4
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions