100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CSIT FINAL EXAM QUESTIONS AND ANSWERS 100% PASS

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
12-12-2023
Escrito en
2023/2024

CSIT FINAL EXAM QUESTIONS AND ANSWERS 100% PASS Describe a *Star* network topology? for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch What is malware? software that is intended to damage or disable computers and computer systems. List 4 types of malware? Trojans, Worms, Spyware, Virus Describe the importance of data integrity accuracy of data, data validation, database locking Describe the importance of data security protects data against destruction and unauthorized access Describe the importance of data privacy vast amounts of personal data stored in databases List at least five strategies for virus prevention install anti-virus/malware software, instal firewall, use strong passwords, instal anti-spyware software, check security setting What are the phases involved in program development? problem analysis, program design, program coding, program debugging and testing, program implementation and maintenance Some monitoring systems in use today use the RFID tags and RFID readers to monitor the status of objects (such as check shipping boxes, livestock, or expensive equipment) to which the RFID tags are attached. true The trend toward online collaboration is usually called workgroup computing. true A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data is sent false TCP/IP is the protocol used for transferring data over the Internet. true A(n) computer network is a collection of computers and other hardware devices connected together so that network users can share hardware, software, and data, as well as communicate with each other electronically. true With a(n) peer-to-peer (P2P) network, a central server is not used true Direct Internet connections are much slower than dial-up connections false Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more. false The use of cookies provides no benefits to consumers. false Tim Berners-Lee proposed the idea of the World Wide Web. true Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement. false System failure can occur because of a hardware problem, a software problem, or computer sabotage. true Security software protects devices against malware and other threats. true A government database is a collection of data about people that is collected and maintained by private industry. false A(n) _____ is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. trademark Structured programming embodies a top-down design philosophy. true is the use of networking technology to provide medical information and services. telemedicine is a network designed to service an urban area, typically a city or county. metropolitan area network (MAN) In ____, data is sent when it is ready but all data must be delivered at the time that it is needed. isochronous transmission The technique used for data sent over the Internet is ____. packet switching was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. coaxial cable A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network. network interface card (NIC) A(n) ____________________ is a private network, such as a company LAN, that is designed to be used by an organization's employees and is set up like the Internet. Intranet __________ programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. Firewall _______ cable is the newest and fastest wired transmission medium. fiber-optic cable Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences. cookies ___________________ is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection. spyware The term ____ refers to the rights of individuals and companies to control how information about them is collected and used. information privacy A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. firewall ____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information. pharming Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used. privacy policy One common way to deal with spam that makes it to your computer is to use a(n) ____. email filter ________ are most often used to add dynamic content to a Web page or to integrate a Web page with a database. markup languages Two of the most significant approaches to programming are procedural programming and ____. object oriented programming ____takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies. aspect oriented programming In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program. algorithm A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. syntax error Define the six categories into which computers are generally classified. embedded, mobile devices, personal computers, servers, mainframe computers, super computers What does remote storage refer to? a data management service used to migrate infrequently accessed files from local storage to remote storage field a single characteristic of data that appears in a table as a column table an arrangement of data made up of horizontal rows and vertical columns. describe the functionality of an operating system mange the computers resources, establish a user interface, provide service

Mostrar más Leer menos
Institución
CSIT
Grado
CSIT









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CSIT
Grado
CSIT

Información del documento

Subido en
12 de diciembre de 2023
Número de páginas
8
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
StellarScores Western Governers University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1913
Miembro desde
2 año
Número de seguidores
866
Documentos
21200
Última venta
4 días hace
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Lee mas Leer menos
4.0

448 reseñas

5
244
4
80
3
61
2
24
1
39

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes