Download ITE_152V_EXAM_QUESTIONS_WITH_COMPLETE_SOLUTIO and more Exams Nursing in PDF only on Docsity!
ITE 152(V) EXAM QUESTIONS WITH COMPLETE SOLUTIONS
GUARANTEED PASS BRAND NEW 2025
Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem?
- The table is missing a primary key.
- The table is sorted.
- The table is filtered.
- The table has been deleted. - - ANSWER - >The table is filtered. Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type?
- Employer
- Graduated
- GPA
- Major - - ANSWER - >Graduated One disadvantage of computerized databases is that they limit your ability to arrange information.
False A database is a collection of related information, but a database management system is a type of software program. - True - False - - ANSWER - >True
A database is an organized collection of information.
True
- False - - ANSWER - >True What are the columns in a Microsoft Access table called?
- Rows
Fields
Records
Fields Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar?
- Inventory
- Employees
- Customers
- Vendors - - ANSWER - >Vendors What does SQL stand for? - Stated question language
- Structured query language
- System query lingo
- Status query language - - ANSWER - >Structured query language Which of the following is LEAST likely to be a field in a Customers table? - LastName
- Address
False All the pet names in a veterinarian's database are stored in a _______ called PetName.
- record
- table
- worksheet
- field - - ANSWER - >Field Malisa is designing a database for a doctor's office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records?
- Forms
- Queries
- Reports
- Tables - - ANSWER - >Forms Queries in access can be used
- Both 'a' and 'b'
- Only 'a'
- as a source of records for forms and reports
- to view, change and analyze data in different ways - - ANSWER -
Both 'a' and 'b' What does a filter do?
- Make more records available
- Hide records from view
- Slow down processing
- Add to the quantity of data - - ANSWER - >Hide records from view A field's data type determines what kind of information can be stored there.
True Which field could serve as the primary key for a list of students in your school? - Birth date - Phone number - Full name - Student ID number - - ANSWER - >Student ID number Dana is creating a table that will show books for sale on a bookstore's website. Which field in the table would best serve as its primary key?
- PageCount
Title
ProductID ProductID In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________.
- File
- Field
- Table
A query lets you speed up the browsing process by finding information that matches specifically to your criteria.
True Which data type would be best suited to a field that lists a product's clearance price?
- Currency
- Number
- AutoNumber
- Date/Time - - ANSWER - >Currency What are the different views to display a table?
- Design View
- All of the above
- Pivot Table & Pivot Chart View
- Datasheet View - - ANSWER - >All of the above Which of the following is NOT a part of a database?
- Tables
- Records
- Worksheets
- Fields - - ANSWER - >Worksheets Which is a first step to deter thieves from accessing your financial information?
- Be alert to signs that may indicate unusual activity in an account.
- Do not provide personal information over the phone or through email.
- Follow up on calls regarding purchases that were not made.
- Review financial and billing statements each month carefully. - - ANSWER - >Do not provide personal information over the phone or through email. Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
- A worm has infected her computer and she needs to unplug her device.
- A hacker is trying to put a Trojan on her computer.
- Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
- It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. -
- ANSWER - >It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer. To protect your information and help you to remember passwords, use your social media account login information to log into another site.
- True
- False - - ANSWER -
False After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances
- cyberbullying
- cyberstalking
- repetitive strain injury
- technology addiction - - ANSWER - >Repetitive strain injury _____ ensures that the person requesting access to a computer is not an imposter.
Encryption
Authentication
- Data mining
- Automatic encoding - - ANSWER -
Authentication Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? - worm
- ransomware
- spam
- Trojan - - ANSWER - >Trojan Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
- Allow anyone who "friends" her to view her information.
- Post all types of photos more often.
- Ignore notices from the social networking site about changes to security.
- Be cautious about what information she posts. - - ANSWER -
Be cautious about what information she posts In which of the following situations is a digital certificate useful?
- You are registering for an event.
- You are emailing a friend.
- You are signing a rental lease.
- You are researching a topic for an assignment. - - ANSWER -
You are signing a rental lease What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
- encryption
- dumpster diving
- identity theft
- phishing - - ANSWER - >Phishing Which of the following types of websites typically provides the least security? - social media sites
- online shopping sites
- private business sites
- online banking sites - - ANSWER - >Social media sites The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
- downloading harmful content
- viewing or stealing computer data
- reading wireless transmissions - - ANSWER - >Creating malware In terms of privacy, which of the following is a best practice?
- Saving your personal information as an email draft
- Throwing away old bank statements that are more than three months old
- Posting your location on social media
- Keeping your Social Security number hidden in a locked box in your home - - ANSWER - >Keeping your Social Security number hidden in a locked box in your home How does encryption work?
- It scrambles the information until the key is used to unscramble it.
- It is what happens when you download attachments from your email.
- It protects data on your hard drive, but once you choose to send it to someone, it is no longer protected.
- It is a key that you insert into your computer to unlock your saved files. - - ANSWER - >It scrambles the information until the key is used to unscramble it. How can you protect personal information gathered by legitimate organizations?
- Use the same password and username for all your online accounts.
- Create a separate email account for receiving information from websites.
- Sign up for many online mailing lists.
- Link your credit or debit card to your online accounts. -
- ANSWER - >Create a separate email account for receiving information from websites. How is a worm different from a Trojan?
- A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.
- A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.
- A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
- A worm spreads through a network, whereas a Trojan hides inside another program. - - ANSWER - >-A worm spreads through a network, whereas a Trojan hides inside another program. Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False What type of security requires something you know and something you have that no one else has?
- data mining
- biometric security
- two part passwords
- two factor authentication - - ANSWER - >Two factor authentication What would a password manager allow you to do?
- Test your memorization skills.
- Make sure you do not repeat passwords on similar accounts.
Which of the following statements about browser security settings is false?
- You must keep your accumulated web history as long as you use the browser.
- You can choose which sites run pop-ups.
- You can accept or deny cookies.
- You can allow or block scripts on specific websites. -
- ANSWER - >You must keep your accumulated web history as long as you use the browser. Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
False How does discarding computers in a landfill affect the environment?
- Lead and mercury in computer parts are seeping into the ground and water supply.
- Copper on circuit boards is creating fire hazards.
- The computer parts quickly decay and become organic material - Data miners are digging up landfills looking for gold and platinum.
- ANSWER - >Lead and mercury in computer parts are seeping into the ground and water supply. Which learning model allows an AI system to create its own categories of data without labeling those categories?
- Supervised learning
- Artificial learning
- Unsupervised learning
- Reinforcement learning - - ANSWER - >Unsupervised learning What technology allows Siri to understand you when you request a route to a location in a nearby city?
- Artificial intelligence (AI)
- Internet of Things (IoT)
- Natural language processing (NLP)
- Machine Learning (ML) - - ANSWER - >Natural language processing (NLP) Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?
- Smart bulb
- Smart plug
- Smart lock
- Smart security system - - ANSWER - >Smart plug Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?
- SaaS
- IaaS
- DBaaS
- PaaS - - ANSWER - >IaaS Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?
- Rapid elasticity
- More information about his needs
- More available settings for various temperatures
- More installed smart devices to work together
- More programming on how to interpret voice commands -
- ANSWER - >More information about his needs Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text? - Machine learning (ML)
- Natural language processing (NLP)
- Chatbot
- Smart speaker - - ANSWER - >Machine learning (ML) Many chatbot services provide support to employees and management rather than to customers.
True To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.
- True
- False - - ANSWER - >False Layton is retired and sells hand-crafted fishing rods as a homebased business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information.
- False
- True - - ANSWER - >False Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements? - SaaS
- IaaS
- PaaS
- FWaaS - - ANSWER - >SaaS All cloud technologies must be accessed over the Internet. False
False Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this? - B2C - C2C - B2B - B2G - - ANSWER - >B2B Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2, miles away from her current location and that carries products