Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ITE 152 EXAM 3 ACTUAL EXAM 2024 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+, Exams of Computer Applications

ITE 152 EXAM 3 ACTUAL EXAM 2024 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ | LATEST EXAM

Typology: Exams

2023/2024

Available from 02/29/2024

essay-writers
essay-writers 🇺🇸

3.9

(70)

1.1K documents

1 / 45

Toggle sidebar

Related documents


Partial preview of the text

Download ITE 152 EXAM 3 ACTUAL EXAM 2024 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ and more Exams Computer Applications in PDF only on Docsity! ITE 152 EXAM 3 ACTUAL EXAM 2024 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ | LATEST EXAM Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? -The table is missing a primary key. -The table is sorted. -The table is filtered. -The table has been deleted. -----CORRECT ANSWER---------------The table is filtered. Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? -Employer -Graduated -GPA -Major -----CORRECT ANSWER---------------Graduated One disadvantage of computerized databases is that they limit your ability to arrange information. -True -False -----CORRECT ANSWER---------------False A database is a collection of related information, but a database management system is a type of software program. -True -False -----CORRECT ANSWER---------------True A database is an organized collection of information. -True -False -----CORRECT ANSWER---------------True What are the columns in a Microsoft Access table called? -Rows -Fields -Records -Columns -----CORRECT ANSWER---------------Fields Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? -Inventory -Employees -Customers -Vendors -----CORRECT ANSWER---------------Vendors What does SQL stand for? -Stated question language -Structured query language -System query lingo -Status query language -----CORRECT ANSWER---------------Structured query language Which of the following is LEAST likely to be a field in a Customers table? -LastName -Address -EmploymentDate -PhoneNumber -----CORRECT ANSWER---------------EmploymentDate A relationship is created between how many tables? -Two -Any number -Three -One -----CORRECT ANSWER---------------Two What is a query? -A question you ask a table In a database, each _________________ contains a collection of related data. -Table -Field -Record -None of the above -----CORRECT ANSWER---------------Table Which of the following is a way to sort data? -Numerically -Alphabetically -All of the above -Chronologically -----CORRECT ANSWER---------------All of the above Contact information for all the people taking a class at a school are stored in a ________ called Students. -record -worksheet -field -table -----CORRECT ANSWER---------------Table Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? -Z to A -A to Z -Largest to smallest -Smallest to largest -----CORRECT ANSWER---------------Smallest to largest A query lets you speed up the browsing process by finding information that matches specifically to your criteria. -True -False -----CORRECT ANSWER---------------True Which data type would be best suited to a field that lists a product's clearance price? -Currency -Number -AutoNumber -Date/Time -----CORRECT ANSWER---------------Currency What are the different views to display a table? -Design View -All of the above -Pivot Table & Pivot Chart View -Datasheet View -----CORRECT ANSWER---------------All of the above Which of the following is NOT a part of a database? -Tables -Records -Worksheets -Fields -----CORRECT ANSWER---------------Worksheets Which is a first step to deter thieves from accessing your financial information? -Be alert to signs that may indicate unusual activity in an account. -Do not provide personal information over the phone or through email. -Follow up on calls regarding purchases that were not made. -Review financial and billing statements each month carefully. -----CORRECT ANSWER---------------Do not provide personal information over the phone or through email. Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? -A worm has infected her computer and she needs to unplug her device. -A hacker is trying to put a Trojan on her computer. -Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. -It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. -----CORRECT ANSWER---------------It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. To protect your information and help you to remember passwords, use your social media account login information to log into another site. -True -False -----CORRECT ANSWER---------------False After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. -cyberbullying -cyberstalking -data mining -social engineering -----CORRECT ANSWER---------------Cyberbullying Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? -Ergonomics -Technology addiction -Repetitive strain -Cyberbullying -----CORRECT ANSWER---------------Ergonomics Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? -Two factor authentication -Digital certificates -Encryption -Biometrics -----CORRECT ANSWER---------------Biometrics With more and more people using technology, what physical health diagnosis is on the rise? -cyberbullying -If the browser security setting is from my favorite online retailers, I will accept it because the retailer knows what I like. -----CORRECT ANSWER---------------I will need to review each browser security setting and use my best judgement. There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. -creating malware -downloading harmful content -viewing or stealing computer data -reading wireless transmissions -----CORRECT ANSWER---------------Creating malware In terms of privacy, which of the following is a best practice? -Saving your personal information as an email draft -Throwing away old bank statements that are more than three months old -Posting your location on social media -Keeping your Social Security number hidden in a locked box in your home ----- CORRECT ANSWER---------------Keeping your Social Security number hidden in a locked box in your home How does encryption work? -It scrambles the information until the key is used to unscramble it. -It is what happens when you download attachments from your email. -It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected. -It is a key that you insert into your computer to unlock your saved files. -----CORRECT ANSWER---------------It scrambles the information until the key is used to unscramble it. How can you protect personal information gathered by legitimate organizations? -Use the same password and username for all your online accounts. -Create a separate email account for receiving information from websites. -Sign up for many online mailing lists. -Link your credit or debit card to your online accounts. -----CORRECT ANSWER---------- -----Create a separate email account for receiving information from websites. How is a worm different from a Trojan? -A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device. -A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network. -A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. -A worm spreads through a network, whereas a Trojan hides inside another program. --- --CORRECT ANSWER----------------A worm spreads through a network, whereas a Trojan hides inside another program. Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. -True -False -----CORRECT ANSWER---------------False What type of security requires something you know and something you have that no one else has? -data mining -biometric security -two part passwords -two factor authentication -----CORRECT ANSWER---------------Two factor authentication What would a password manager allow you to do? -Test your memorization skills. -Make sure you do not repeat passwords on similar accounts. -Create and store multiple strong passwords. -Prevent you from using birthdays in your passwords. -----CORRECT ANSWER----------- ----Create and store multiple strong passwords. You can monitor and protect your financial data in all of the following ways EXCEPT _____. -Being cautious about what information you post on social networking sites. -Shredding financial documents before you discard them. -Querying unfamiliar purchases found on your bank statements. -Storing financial information in an unsent email message. -----CORRECT ANSWER----- ----------Storing financial information in an unsent email message. Technology can lead to all of the following behavioral risks EXCEPT _____. -higher satisfaction with life -social withdrawal -a sedentary lifestyle -depression and anxiety -----CORRECT ANSWER---------------higher satisfaction with life Which of the following is the strongest password? -Test1test2test3 -Welcome123 -H@veAGr3atDaY! -colorbluesky -----CORRECT ANSWER---------------H@veAGr3atDaY! Which of the following statements about browser security settings is false? -You must keep your accumulated web history as long as you use the browser. -You can choose which sites run pop-ups. -You can accept or deny cookies. -You can allow or block scripts on specific websites. -----CORRECT ANSWER------------- --You must keep your accumulated web history as long as you use the browser. Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work. -True -False -----CORRECT ANSWER---------------False How does discarding computers in a landfill affect the environment? -Lead and mercury in computer parts are seeping into the ground and water supply. -Copper on circuit boards is creating fire hazards. -The computer parts quickly decay and become organic material -Data miners are digging up landfills looking for gold and platinum. -----CORRECT ANSWER---------------Lead and mercury in computer parts are seeping into the ground and water supply. Which learning model allows an AI system to create its own categories of data without labeling those categories? -Supervised learning -Chatbot -Smart speaker -----CORRECT ANSWER---------------Machine learning (ML) Many chatbot services provide support to employees and management rather than to customers. -True -False -----CORRECT ANSWER---------------True To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects. -True -False -----CORRECT ANSWER---------------False Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. -False -True -----CORRECT ANSWER---------------False Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements? -SaaS -IaaS -PaaS -FWaaS -----CORRECT ANSWER---------------SaaS All cloud technologies must be accessed over the Internet. -False -True -----CORRECT ANSWER---------------False Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this? -B2C -C2C -B2B -B2G -----CORRECT ANSWER---------------B2B Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud? -Natural language processing (NLP) -Robotic process automation -Data analytics -Chatbot -----CORRECT ANSWER---------------Data analytics Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment? -Measured service -Broad network access -On-demand self-service -Rapid elasticity -----CORRECT ANSWER---------------Rapid elasticity Which learning model allows an AI system to develop its own strategies for solving problems or completing tasks? -Unsupervised learning -Reinforcement learning -Supervised learning -Artificial learning -----CORRECT ANSWER---------------Reinforcement learning Who enforces PCI compliance for merchants who accept credit card payments from customers? -Cardholders -Merchants -Credit card companies -The Department of Defense -----CORRECT ANSWER---------------Credit card companies Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? -Physical storefront -Online storefront -Online marketplace -Social media -----CORRECT ANSWER---------------Online storefront Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers? -Desktop as a Service -Cloud storage -Video conferencing application -Cloud-hosted training modules -----CORRECT ANSWER---------------Video conferencing application Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work? -Robotic process automation (RPA) -Internet of Things (IoT)- -Data analytics -Chatbot -----CORRECT ANSWER---------------Robotic process automation (RPA) How can you get the attention of a personal assistant app on your phone? -Say the wake word. -Complete the voice training process. -Reduce background noise. -Pause briefly before stating the command. -----CORRECT ANSWER---------------Say the wake word. Which of these e-commerce job roles could most likely be performed remotely from home or even from another country? In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. -----CORRECT ANSWER--------------Field Which data type would be best suited to a field that lists a product's clearance price? ---- -CORRECT ANSWER--------------Currency A query lets you speed up the browsing process by finding information that matches specifically to your criteria. -----CORRECT ANSWER--------------True What are the different views to display a table? -----CORRECT ANSWER--------------All of the above (Pivot Table & Pivot Chart View, Datasheet View, Design View) Databases typically store their data in one big table. -----CORRECT ANSWER------------- -False Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? -----CORRECT ANSWER--------- -----Smallest to largest In a database, each _________________ contains a collection of related data. ----- CORRECT ANSWER--------------Table (?) A database is an organized collection of information. -----CORRECT ANSWER------------ --True Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? ----- CORRECT ANSWER--------------Vendors Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? -----CORRECT ANSWER--------------Graduated Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? -----CORRECT ANSWER--------------The table is filtered. One disadvantage of computerized databases is that they limit your ability to arrange information. -----CORRECT ANSWER--------------False Queries in access can be used -----CORRECT ANSWER--------------Both 'a' and 'b' (as a source of records for forms and reports, to view, change and analyze data in different ways) A relationship is created between how many tables? -----CORRECT ANSWER------------- -Two What does a filter do? -----CORRECT ANSWER--------------Hide records from view A computerized database can store millions of telephone numbers. -----CORRECT ANSWER--------------True Which of the following is NOT a part of a database? -----CORRECT ANSWER------------- -Worksheets Which data type would be best suited to a field that lists customer email addresses? ---- -CORRECT ANSWER--------------Hyperlink A database is a collection of related information, but a database management system is a type of software program. -----CORRECT ANSWER--------------True Contact information for all the people taking a class at a school are stored in a ________ called Students. -----CORRECT ANSWER--------------Table Which of the following is LEAST likely to be a field in a Customers table? ----- CORRECT ANSWER--------------EmploymentDate Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? -----CORRECT ANSWER--------------Forms How does discarding computers in a landfill affect the environment? -----CORRECT ANSWER--------------Lead and mercury in computer parts are seeping into the ground and water supply. What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank? -----CORRECT ANSWER--------------Phishing You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____. -----CORRECT ANSWER--------------naming your router something you'll remember, like your street address You can monitor and protect your financial data in all of the following ways EXCEPT _____. -----CORRECT ANSWER--------------Storing financial information in an unsent email message. Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? -----CORRECT ANSWER--------------Biometrics To prevent a laptop from being stolen, you can use a surge protector. -----CORRECT ANSWER--------------False How can you protect personal information gathered by legitimate organizations? ----- CORRECT ANSWER--------------Create a separate email account for receiving information from websites. How can an attacker execute malware through a script? -----CORRECT ANSWER-------- ------A script can run a series of instructions to download and run malware. How is a worm different from a Trojan? -----CORRECT ANSWER--------------A worm spreads through a network, whereas a Trojan hides inside another program. In which of the following situations is a digital certificate useful? -----CORRECT ANSWER--------------You are signing a rental lease. A Trojan is a malicious program that uses a computer network to replicate. ----- CORRECT ANSWER--------------False Which of the following is a characteristic of a strong password? -----CORRECT ANSWER--------------Letters, numbers, and symbols Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? -----CORRECT ANSWER--------------He can use remote tracking to retrace the thief's steps. What type of security requires something you know and something you have that no one else has? -----CORRECT ANSWER--------------Two factor authentication Which of the following statements about browser security settings is false? ----- CORRECT ANSWER--------------You must keep your accumulated web history as long as you use the browser. Which of the following is the strongest password? -----CORRECT ANSWER-------------- H@veAGr3atDaY! Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? -----CORRECT ANSWER--------------Receiving clerk Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration? -----CORRECT ANSWER--------------HIPAA Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment? -----CORRECT ANSWER--------------Rapid elasticity Cloud computing and the Internet are two different technologies. -----CORRECT ANSWER--------------True Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation? -----CORRECT ANSWER--------------He can remotely collaborate with teammates on projects, deadlines, and events. Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her? ----- CORRECT ANSWER--------------Mason said one of Alexa's wake words. Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? -----CORRECT ANSWER--------------Bluetooth connection To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects. -- ---CORRECT ANSWER--------------False Which company most likely relies almost solely on B2B transactions in their course of business? -----CORRECT ANSWER--------------Chemical supply company Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. -----CORRECT ANSWER--------------False Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? -----CORRECT ANSWER--------------Broad network access All cloud technologies must be accessed over the Internet. -----CORRECT ANSWER---- ----------False Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? -----CORRECT ANSWER------- -------Customer service representative How can you get the attention of a personal assistant app on your phone? ----- CORRECT ANSWER--------------Say the wake word. Which of the following is NOT a leading provider of PaaS and IaaS services? ----- CORRECT ANSWER--------------Walmart Which field could serve as the primary key for a list of students in your school? ---- CORRECT ANSWER--------------Student ID number A field's data type determines what kind of information can be stored there. ---- CORRECT ANSWER--------------True Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? ----CORRECT ANSWER------------- -ProductID All the pet names in a veterinarian's database are stored in a _______ called PetName. ----CORRECT ANSWER--------------Field Which of the following is a way to sort data? ----CORRECT ANSWER--------------All of the above (Alphabetically, Numerically, Chronologically) What does SQL stand for? ----CORRECT ANSWER--------------Structured Query Language What is a query? ----CORRECT ANSWER--------------A question you ask a database What are the columns in a Microsoft Access table called? ----CORRECT ANSWER------- -------Fields In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. ----CORRECT ANSWER--------------Field Which data type would be best suited to a field that lists a product's clearance price? ---- CORRECT ANSWER--------------Currency A query lets you speed up the browsing process by finding information that matches specifically to your criteria. ----CORRECT ANSWER--------------True What are the different views to display a table? ----CORRECT ANSWER--------------All of the above (Pivot Table & Pivot Chart View, Datasheet View, Design View) Databases typically store their data in one big table. ----CORRECT ANSWER-------------- False Kian needs to sort a list of patients by birthdate to show the oldest patients first. What sort order on the birthdate field will give him this result? ----CORRECT ANSWER---------- ----Smallest to largest In a database, each _________________ contains a collection of related data. ---- CORRECT ANSWER--------------Table (?) A database is an organized collection of information. ----CORRECT ANSWER------------- -A database is an organized collection of integrated files True Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar? ---- CORRECT ANSWER--------------Vendors Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type? ----CORRECT ANSWER--------------Graduated Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? ----CORRECT ANSWER--------------The table is filtered. One disadvantage of computerized databases is that they limit your ability to arrange information. ----CORRECT ANSWER--------------False Queries in access can be used ----CORRECT ANSWER--------------Both 'a' and 'b' (as a source of records for forms and reports, to view, change and analyze data in different ways) A relationship is created between how many tables? ----CORRECT ANSWER-------------- Two Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? ----CORRECT ANSWER--------- -----Ergonomics Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? ----CORRECT ANSWER--------------Pretexting Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? --- -CORRECT ANSWER--------------Trojan Which is a first step to deter thieves from accessing your financial information? ---- CORRECT ANSWER--------------Do not provide personal information over the phone or through email. The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? ----CORRECT ANSWER-------------- Because insiders sometimes create threats after incidents at their places of employment To protect your information and help you to remember passwords, use your social media account login information to log into another site. ----CORRECT ANSWER--------- -----False Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. ----CORRECT ANSWER--------------data backup Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely? ----CORRECT ANSWER--------------Be cautious about what information she posts. Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening? ----CORRECT ANSWER--------------It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? ----CORRECT ANSWER--------------Biometrics To prevent a laptop from being stolen, you can use a surge protector. ----CORRECT ANSWER--------------False How can you protect personal information gathered by legitimate organizations? ---- CORRECT ANSWER--------------Create a separate email account for receiving information from websites. How can an attacker execute malware through a script? ----CORRECT ANSWER--------- -----A script can run a series of instructions to download and run malware. How is a worm different from a Trojan? ----CORRECT ANSWER--------------A worm spreads through a network, whereas a Trojan hides inside another program. In which of the following situations is a digital certificate useful? ----CORRECT ANSWER--------------You are signing a rental lease. A Trojan is a malicious program that uses a computer network to replicate. ---- CORRECT ANSWER--------------False Which of the following is a characteristic of a strong password? ----CORRECT ANSWER--------------Letters, numbers, and symbols Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? ----CORRECT ANSWER- -------------He can use remote tracking to retrace the thief's steps. What type of security requires something you know and something you have that no one else has? ----CORRECT ANSWER--------------Two factor authentication Which of the following statements about browser security settings is false? ---- CORRECT ANSWER--------------You must keep your accumulated web history as long as you use the browser. Which of the following is the strongest password? ----CORRECT ANSWER-------------- H@veAGr3atDaY! Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role? ----CORRECT ANSWER--------------Receiving clerk solve this problem so customers know better what to expect when they buy items from his website? ----CORRECT ANSWER--------------High-quality product photos Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers? ----CORRECT ANSWER--------------Video conferencing application Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using? ----CORRECT ANSWER--------------Reinforcement learning Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? ----CORRECT ANSWER--------------IaaS Which kind of cloud service requires the most technical skill to use? ----CORRECT ANSWER--------------IaaS Many chatbot services provide support to employees and management rather than to customers. ----CORRECT ANSWER--------------True For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from? ----CORRECT ANSWER--------------Omnichannel strategy Which of the following requests to Alexa is most likely to get the desired result? ---- CORRECT ANSWER--------------Alexa, play Journey songs on Pandora. Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? ----CORRECT ANSWER-------------- Online storefront Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish? ----CORRECT ANSWER--------------It will make the AI system sound more human Which of the following is NOT an example of modern-day artificial intelligence (AI) application? ----CORRECT ANSWER--------------Asking droids for critical information during a hyper-space mission All cloud technologies must be accessed over the Internet. ----CORRECT ANSWER----- ---------False Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? ----CORRECT ANSWER-------- ------Customer service representative How can you get the attention of a personal assistant app on your phone? ---- CORRECT ANSWER--------------Say the wake word. Which of the following is NOT a leading provider of PaaS and IaaS services? ---- CORRECT ANSWER--------------Walmart What is the purpose of Expression Builder in Access? ----CORRECT ANSWER------------ --helps you create expressions by supplying you with fields, operators, and functions you need to create them Which of the following is the easiest way add data to a table. ----CORRECT ANSWER--- -----------form Databases are useful only if they are ----CORRECT ANSWER--------------accurate This key uniquely identifies each record. ----CORRECT ANSWER--------------primary key Contact information for all the people taking a class at a school are stored in a ________ called Students. ----CORRECT ANSWER--------------table In a database, a _____________ is a unit of information about one individual or item. --- -CORRECT ANSWER--------------field How is the environment impacted by computers being thrown away in landfills? ---- CORRECT ANSWER--------------The lead and mercury is seeping into the ground and water supply. How can you protect your information when using social media? ----CORRECT ANSWER--------------Accept friend requests from people you want to be friends with. Technology can lead to all of the following behavioral risks EXCEPT ----CORRECT ANSWER--------------higher satisfaction with life To prevent a laptop from being stolen, you can use a timelock device. ----CORRECT ANSWER--------------False In terms of privacy, which of the following is a best practice? ----CORRECT ANSWER--- -----------Keeping your Social Security number hidden in a locked box in your home