Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ITE_152_IV_EXAM_QUESTIONS_WITH_COMPLETE_SOLU, Exams of Nursing

ITE_152_IV_EXAM_QUESTIONS_WITH_COMPLETE_SOLU

Typology: Exams

2024/2025

Available from 06/17/2025

SmartPapersPro
SmartPapersPro 🇺🇸

1.5K documents

1 / 23

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17

Partial preview of the text

Download ITE_152_IV_EXAM_QUESTIONS_WITH_COMPLETE_SOLU and more Exams Nursing in PDF only on Docsity!

ITE 152 (IV) EXAM QUESTIONS WITH COMPLETE SOLUTIONS

GUARANTEED PASS BRAND NEW 2025

Which field could serve as the primary key for a list of students in your school? -

  • ANSWER - >Student ID number A field's data type determines what kind of information can be stored there. -
  • ANSWER - >True Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key? - - ANSWER - >ProductID All the pet names in a veterinarian's database are stored in a _______ called PetName. - - ANSWER - >Field Which of the following is a way to sort data? - - ANSWER - >All of the above (Alphabetically, Numerically, Chronologically) What does SQL stand for? - - ANSWER - >Structured Query Language

What is a query? - - ANSWER - >A question you ask a database What are the columns in a Microsoft Access table called? - - ANSWER - >Fields In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. - - ANSWER - >Field Which data type would be best suited to a field that lists a product's clearance price? -

  • ANSWER - >Currency A query lets you speed up the browsing process by finding information that matches specifically to your criteria. - - ANSWER
    • True What are the different views to display a table? - - ANSWER - >All of the above (Pivot Table & Pivot Chart View, Datasheet View, Design View) Databases typically store their data in one big table. - - ANSWER - >False

Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? - - ANSWER - >The table is filtered. One disadvantage of computerized databases is that they limit your ability to arrange information. - - ANSWER - >False Queries in access can be used - - ANSWER - >Both 'a' and 'b' (as a source of records for forms and reports, to view, change and analyze data in different ways) A relationship is created between how many tables? - - ANSWER

  • Two What does a filter do? - - ANSWER - >Hide records from view A computerized database can store millions of telephone numbers. - - ANSWER - >True Which of the following is NOT a part of a database? - - ANSWER

  • Worksheets Which data type would be best suited to a field that lists customer email addresses? -

  • ANSWER - >Hyperlink

A database is a collection of related information, but a database management system is a type of software program. - - ANSWER -

True Contact information for all the people taking a class at a school are stored in a ________ called Students. - - ANSWER - >Table Which of the following is LEAST likely to be a field in a Customers table? -

  • ANSWER - >EmploymentDate Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records? - - ANSWER - >Forms How does discarding computers in a landfill affect the environment? - - ANSWER - >Lead and mercury in computer parts are seeping into the ground and water supply.

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. -

  • ANSWER - >Cyberbullying How can you protect a computer from electrical spikes and surges? - - ANSWER - >Use a surge protector. Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? - - ANSWER - >Ergonomics Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information? - - ANSWER - >Pretexting

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? -

  • ANSWER - >Trojan Which is a first step to deter thieves from accessing your financial information? - - ANSWER - >Do not provide personal information over the phone or through email. The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider? - - ANSWER - >Because insiders sometimes create threats after incidents at their places of employment To protect your information and help you to remember passwords, use your social media account login information to log into another site. - - ANSWER - >False

patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? - - ANSWER -

Biometrics To prevent a laptop from being stolen, you can use a surge protector. -

  • ANSWER - >False How can you protect personal information gathered by legitimate organizations? - - ANSWER - >Create a separate email account for receiving information from websites. How can an attacker execute malware through a script? - - ANSWER - >A script can run a series of instructions to download and run malware. How is a worm different from a Trojan? - - ANSWER - >A worm spreads through a network, whereas a Trojan hides inside another program. In which of the following situations is a digital certificate useful? - - ANSWER - >You are signing a rental lease.

A Trojan is a malicious program that uses a computer network to replicate. -

  • ANSWER - >False Which of the following is a characteristic of a strong password? - - ANSWER - >Letters, numbers, and symbols Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one? - - ANSWER - >He can use remote tracking to retrace the thief's steps. What type of security requires something you know and something you have that no one else has? - - ANSWER - >Two factor authentication Which of the following statements about browser security settings is false? - - ANSWER - >You must keep your accumulated web history as long as you use the browser. Which of the following is the strongest password? - - ANSWER -

    H@veAGr3atDaY!

He can remotely collaborate with teammates on projects, deadlines, and events. Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her? - - ANSWER

  • Mason said one of Alexa's wake words. Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? -

  • ANSWER - >Bluetooth connection To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects. -
  • ANSWER - >False Which company most likely relies almost solely on B2B transactions in their course of business? - - ANSWER -

Chemical supply company

Layton is retired and sells hand-crafted fishing rods as a home- based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. - - ANSWER -

False Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? - - ANSWER - >Broad network access Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike? -

  • ANSWER - >C2C Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using? - - ANSWER -

    SaaS Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he

stays on the track. What kind of learning model is Janelle's car using? - - ANSWER - >Reinforcement learning Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? - - ANSWER - >IaaS Which kind of cloud service requires the most technical skill to use? - - ANSWER - >IaaS Many chatbot services provide support to employees and management rather than to customers. - - ANSWER - >True For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

    • ANSWER - >Omnichannel strategy Which of the following requests to Alexa is most likely to get the desired result? - - ANSWER - >Alexa, play Journey songs on Pandora. Charlie's company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a

nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? - - ANSWER - >Online storefront Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish? - - ANSWER - >It will make the AI system sound more human Which of the following is NOT an example of modern-day artificial intelligence (AI) application? - - ANSWER - >Asking droids for critical information during a hyper- space mission All cloud technologies must be accessed over the Internet. - - ANSWER - >False Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? - - ANSWER - >Customer service representative How can you get the attention of a personal assistant app on your phone? - - ANSWER - >Say the wake word. Which of the following is NOT a leading provider of PaaS and IaaS services? -

How can you protect your information when using social media? -

  • ANSWER - >Accept friend requests from people you want to be friends with. Technology can lead to all of the following behavioral risks EXCEPT -
  • ANSWER - >higher satisfaction with life To prevent a laptop from being stolen, you can use a timelock device. -
  • ANSWER - >False In terms of privacy, which of the following is a best practice? - - ANSWER - >Keeping your Social Security number hidden in a locked box in your home There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____. - - ANSWER -

Creating malware How does encryption work? - - ANSWER - >It scrambles the information until the key is used to unscramble it

What is a digital certificate? - - ANSWER - >Technology used to verify a user's identity You can monitor and protect your financial data in all of the following ways EXCEPT _____. - - ANSWER - >Requesting a credit report and freezing your credit. How could an online attacker use your online profile to gather information about you to steal your identity? - - ANSWER - >Use your posts to figure out answers to possible security questions. Which of the following types of websites typically provides the least security? -

  • ANSWER - >social media sites Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures. - - ANSWER - >False How can an attacker execute malware through a script? - - ANSWER - >attach a script to a program that you download which then infects your computer.