















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
ITE_152_IV_EXAM_QUESTIONS_WITH_COMPLETE_SOLU
Typology: Exams
1 / 23
This page cannot be seen from the preview
Don't miss anything!
Which field could serve as the primary key for a list of students in your school? -
What is a query? - - ANSWER - >A question you ask a database What are the columns in a Microsoft Access table called? - - ANSWER - >Fields In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________. - - ANSWER - >Field Which data type would be best suited to a field that lists a product's clearance price? -
True What are the different views to display a table? - - ANSWER - >All of the above (Pivot Table & Pivot Chart View, Datasheet View, Design View) Databases typically store their data in one big table. - - ANSWER - >False
Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem? - - ANSWER - >The table is filtered. One disadvantage of computerized databases is that they limit your ability to arrange information. - - ANSWER - >False Queries in access can be used - - ANSWER - >Both 'a' and 'b' (as a source of records for forms and reports, to view, change and analyze data in different ways) A relationship is created between how many tables? - - ANSWER
Two What does a filter do? - - ANSWER - >Hide records from view A computerized database can store millions of telephone numbers. - - ANSWER - >True Which of the following is NOT a part of a database? - - ANSWER
Worksheets Which data type would be best suited to a field that lists customer email addresses? -
A database is a collection of related information, but a database management system is a type of software program. - - ANSWER -
True Contact information for all the people taking a class at a school are stored in a ________ called Students. - - ANSWER - >Table Which of the following is LEAST likely to be a field in a Customers table? -
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. -
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? -
patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? - - ANSWER -
Biometrics To prevent a laptop from being stolen, you can use a surge protector. -
A Trojan is a malicious program that uses a computer network to replicate. -
H@veAGr3atDaY!
He can remotely collaborate with teammates on projects, deadlines, and events. Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her? - - ANSWER
Mason said one of Alexa's wake words. Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home? -
Chemical supply company
Layton is retired and sells hand-crafted fishing rods as a home- based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information. - - ANSWER -
False Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home? - - ANSWER - >Broad network access Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike? -
SaaS Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he
stays on the track. What kind of learning model is Janelle's car using? - - ANSWER - >Reinforcement learning Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation? - - ANSWER - >IaaS Which kind of cloud service requires the most technical skill to use? - - ANSWER - >IaaS Many chatbot services provide support to employees and management rather than to customers. - - ANSWER - >True For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware? - - ANSWER - >Online storefront Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish? - - ANSWER - >It will make the AI system sound more human Which of the following is NOT an example of modern-day artificial intelligence (AI) application? - - ANSWER - >Asking droids for critical information during a hyper- space mission All cloud technologies must be accessed over the Internet. - - ANSWER - >False Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem? - - ANSWER - >Customer service representative How can you get the attention of a personal assistant app on your phone? - - ANSWER - >Say the wake word. Which of the following is NOT a leading provider of PaaS and IaaS services? -
How can you protect your information when using social media? -
Creating malware How does encryption work? - - ANSWER - >It scrambles the information until the key is used to unscramble it
What is a digital certificate? - - ANSWER - >Technology used to verify a user's identity You can monitor and protect your financial data in all of the following ways EXCEPT _____. - - ANSWER - >Requesting a credit report and freezing your credit. How could an online attacker use your online profile to gather information about you to steal your identity? - - ANSWER - >Use your posts to figure out answers to possible security questions. Which of the following types of websites typically provides the least security? -