100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Final Exam for ITE 152 Questions and Answers Rated A+

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
26-12-2023
Written in
2023/2024

Final Exam for ITE 152 Questions and Answers Rated A+ Which field could serve as the primary key for a list of students in your school? Student ID number Databases typically store their data in one big table. False What is a query? A question you ask a database One disadvantage of computerized databases is that they limit your ability to arrange information. False What does a filter do? Hide records from view A database is an organized collection of information. True A query lets you speed up the browsing process by finding information that matches specifically to your criteria. True Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? ProductID Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? The table is filtered. What does SQL stand for? Structured query language Contact information for all the people taking a class at a school are stored in a ________ called Students. table A relationship is created between how many tables? Two A field's data type determines what kind of information can be stored there. True Which of the following is a way to sort data? All of the above What are the different views to display a table? All of the above Which data type would be best suited to a field that lists customer email addresses? Hyperlink Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? Vendors Which of the following is NOT a part of a database? Worksheets What are the columns in a Microsoft Access table called? Fields All the pet names in a veterinarian's database are stored in a _______ called PetName. field A computerized database can store millions of telephone numbers. True In a database, each _________________ contains a collection of related data. Table Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? Graduated Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? Smallest to largest Queries in access can be used Both 'a' and 'b' Which of the following is LEAST likely to be a field in a Customers table? EmploymentDate Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? Forms In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. Field A database is a collection of related information, but a database management system is a type of software program. True Which data type would be best suited to a field that lists a product's clearance price? Currency What type of security requires something you know and something you have that no one else has? two factor authentication Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? Trojan With more and more people using technology, what physical health diagnosis is on the rise? repetitive strain injury What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? phishing In terms of privacy, which of the following is a best practice? Keeping your Social Security number hidden in a locked box in your home What would a password manager allow you to do? Create and store multiple strong passwords. Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? pretexting You can monitor and protect your financial data in all of the following ways EXCEPT _____. Storing financial information in an unsent email message How is a worm different from a Trojan? A worm spreads through a network, whereas a Trojan hides inside another program. Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? Biometrics A Trojan is a malicious program that uses a computer network to replicate. False How does discarding computers in a landfill affect the environment? Lead and mercury in computer parts are seeping into the ground and water supply Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Ergonomics There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. creating malware Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. False Which of the following types of websites typically provides the least security? social media sites Which of the following statements about browser security settings is false? You must keep your accumulated web history as long as you use the browser After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying In which of the following situations is a digital certificate useful? You are signing a rental lease. How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. What is a digital certificate? Technology used to verify a user's identity Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer Which is a first step to deter thieves from accessing your financial information? Do not provide personal information over the phone or through email. Which of the following is the strongest password? H@veAGr3atDaY! How can you protect personal information gathered by legitimate organizations? Create a separate email account for receiving information from websites. Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? He can use remote tracking to retrace the thief's steps. How can you protect a computer from electrical spikes and surges? Use a surge protector. Which of the following is a characteristic of a strong password? letters, numbers, and symbols How does encryption work? It scrambles the information until the key is used to unscramble it. Who enforces PCI compliance for merchants who accept credit card payments from customers? Credit card companies To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects. False Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike? C2C Cloud computing and the Internet are two different technologies. True Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future? More information about his needs Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her? Mason said one of Alexa's wake words. Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this? B2B Which of the following is NOT an example of modern-day artificial intelligence (AI) application? Asking droids for critical information during a hyper-space mission Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements? SaaS Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud? Data analytics Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration? HIPAA Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? Receiving clerk Which of the following is NOT a leading provider of PaaS and IaaS services? Walmart Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? IaaS How can you get the attention of a personal assistant app on your phone? Say the wake word. Conducting a staff meeting online so employees from around the globe can join the discussion is an example of _____________. e-business Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment? Rapid elasticity Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish? It will make the AI system sound more human. As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time? Artificial intelligence (AI) Which of these e-commerce job roles requires special training and a license to qualify for the position? Choose two. Forklift operator and Truck driver What technology allows Siri to understand you when you request a route to a location in a nearby city? Natural language processing (NLP) Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using? SaaS Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling? Smart plug Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using? Reinforcement learning What special technology allows computers to perform the intense processing needed to perform machine learning? ANN Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work? Robotic process automation (RPA) Brian needs to use an expensive application that his work provides on his computer at the office. However, he's traveling with his laptop and won't be back in his office for another week. Then Brian remembers his employer also makes the application available to employees through the cloud. What does Brian need to do next to use this application? Access the application through his laptop's browser. Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels. CRM Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. False During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name? You'll access this service over the Internet.

Show more Read less
Institution
ITE 152
Course
ITE 152









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITE 152
Course
ITE 152

Document information

Uploaded on
December 26, 2023
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1909
Member since
2 year
Number of followers
865
Documents
21100
Last sold
13 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

442 reviews

5
240
4
79
3
61
2
24
1
38

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions