100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ITE 152 Modules 9-12 Quiz Questions and Answers 100% Pass

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
26-12-2023
Written in
2023/2024

ITE 152 Modules 9-12 Quiz Questions and Answers 100% Pass Queries in access can be used to view, change and analyze data in different ways and as a source of records for forms and reports What does a filter do? Hide records from view Databases are useful only if they are accurate Dana is creating a table that will show books for sale on a bookstores website. Which field in the table would best serve as its primary key? ProductID What is a query? A question you ask a database true A field's data type determines what kind of information can be stored there. Which field could serve as the primary key for a list of students in your school? student ID number In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. field Which of the following is NOT a part of a database? worksheets Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? graduated true A database is an organized collection of information. Which of the following is the easiest way add data to a table. form In a database, a _____________ is a unit of information about one individual or item. field Which data type would be best suited to a field that lists a product's clearance price? currency What is the purpose of Expression Builder in Access? to create formulas Which of the following is LEAST likely to be a field in a Customers table? employmentdate true A computerized database can store millions of telephone numbers. In a database, each _________________ contains a collection of related data. table What does SQL stand for? structured query language Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? smallest to largest Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? the table is filtered Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? vendors This key uniquely identifies each record. primary key What are the columns in a Microsoft Access table called? fields Contact information for all the people taking a class at a school are stored in a ________ called Students. table Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? forms Which of the following is a way to sort data? numerically, alphabetically, and chronologically true Databases typically store their data in one big table. All the pet names in a veterinarian's database are stored in a _______ called PetName. field What are the different views to display a table? design view and datasheet view Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? be cautious about what info she posts How can an attacker execute malware through a script? A script can run a series of instructions to download and run malware. false Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. Which of the following statements about browser security settings is false? You must keep your accumulated web history as long as you use the browser. What is a digital certificate? Technology used to verify a user's identity false A Trojan is a malicious program that uses a computer network to replicate. false Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. How will you decide which browser security settings to allow and which ones to block? I will need to review each browser security setting and use my best judgement. Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? biometrics How can you protect a computer from electrical spikes and surges? use a surge protector Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. data backup false To protect your information and help you to remember passwords, use your social media account login information to log into another site. How does encryption work? It scrambles the information until the key is used to unscramble it. In which of the following situations is a digital certificate useful? you are signing a rental lease Which is a first step to deter thieves from accessing your financial information? Do not provide personal information over the phone or through email. How is a worm different from a Trojan? A worm spreads through a network, whereas a Trojan hides inside another program. You can monitor and protect your financial data in all of the following ways EXCEPT _____. Storing financial information in an unsent email message. Why is it not safe to connect to public Wi-Fi networks? Because these networks are rarely protected Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? He can use remote tracking to retrace the thief's steps. After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying _____ ensures that the person requesting access to a computer is not an imposter. authentication Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? trojan How can you protect personal information gathered by legitimate organizations? Create a separate email account for receiving information from websites. Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. naming your router something you'll remember, like your street address Technology can lead to all of the following behavioral risks EXCEPT _____. higher satisfaction with life false To prevent a laptop from being stolen, you can use a surge protector. Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? ergnomics How does discarding computers in a landfill affect the environment? Lead and mercury in computer parts are seeping into the ground and water supply. What would a password manager allow you to do? Create and store multiple strong passwords. Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels. CRM Which of the following is NOT a leading provider of PaaS and IaaS services? walmart Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? receiving clerk Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? online storefront true Many chatbot services provide support to employees and management rather than to customers. What technology allows Siri to understand you when you request a route to a location in a nearby city? natural language processing (NLP) Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using? SaaS Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling? smart plug Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? broad network access Which of the following requests to Alexa is most likely to get the desired result? alex, play journey songs on pandora Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers? video conferencing app For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from? omnichannel strategy false All cloud technologies must be accessed over the Internet. Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website? high quality product photos Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using? reinforcement learning Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? customer service representative false Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. What special technology allows computers to perform the intense processing needed to perform machine learning? ANN As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time? Artificial Intelligence (AI) How can you get the attention of a personal assistant app on your phone? say the wake word Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud? data analytics Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this? B2B Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? IaaS Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? Bluetooth connection Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space? Save a copy of the file on her local hard drive. Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? customer service representative true Many chatbot services provide support to employees and management rather than to customers. Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using? SaaS Which of the following is NOT a leading provider of PaaS and IaaS services? walmart Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? bluetooth connection

Show more Read less
Institution
ITE 152 Modules 9-12
Course
ITE 152 Modules 9-12









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITE 152 Modules 9-12
Course
ITE 152 Modules 9-12

Document information

Uploaded on
December 26, 2023
Number of pages
15
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1909
Member since
2 year
Number of followers
865
Documents
21100
Last sold
13 hours ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

442 reviews

5
240
4
79
3
61
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions