Copying software from a friend is always okay.
15. The most important source of specifications for database...
The device driver for your printer will need to be updated when you do...
21. System users are the only stakeholders for an information...
19. The data model is best described as which of the following?
18. Software and/or hardware that blocks unauthorized...
23. Project teams do not require management.
____ 19. Home networks usually connect to the...
4. Windows Server 2008...
19._____ protect(s) a computer by locating and stopping programs...
____ 20. A typical home network connecting to the...
25. Web-based applications have less complex security issues...
9. An Applet is an...
4. Today's computers...
A dishwasher has an embedded computer.
Speakers are an example of a computer output device.
22. A simple step to secure data from those who do not have...
23. A complex password contains at least 6 characters, made up...
____ 24. How does a search engine provide you with a...
15. The requirements analysis...
____ 26. Examples of Boolean operators include the...
27. The U. S. Government would like to implement electronic health...
____ 4. The ____ is a collection of...
____ 5. From the list provided below,...
____ 6. The WWW was created in ____ by...
27. Maintenance requests are formalized processes to document...
28. Natural keys have the advantage over surrogate keys of which of...
____ 7. A(n) ____ is a software program...
28. Health information is stored as a(n) _____ in an EHR.
29. Software testers perform actions that may cause software to...
31. An example of a many-to-many relationship is which of the...
29. HIPAA requires that health care...
13. What is an MRI?
____ 9. A Web server sends ____ back to...
____ 10. HTML is a(n) ____.
____ 31. Antivirus software works by recognizing...
14. A binary digit value of one...
____ 11. HTTP is a(n) ____.
15. In the binary number...
36. SQL commonly produces or projects which of the following?
____ 12. The Internet is owned by ____.
____ 13. What is required for a device to...
____ 15. The Domain Naming System maps a(n) ____ to...
26. A thorough testing phase will...
27. The consequences of an error...
____ 34. Some experts recommend ____ first party,...
33. When users enter data...
____ 17. The slowest type of Internet connection is...
____ 18. The global standard governing wireless...
____ 39. Macro viruses are usually associated with...
38. Which of the following is involved in data modeling?
15. A _____ topology describes how a network is actually designed and...
Which of the following is NOT a form of software that is free?
1. A neighbor becomes aware of a medical condition you have been...
Which of the following is NOT an example of word processing software?
____ 46. One difference between PHRs and EHRs is...
Select all of the following that are examples of communications...
____ 48. Patient medical records should be send...
34. The kind of data stored in...
36. The character set of 0-9 is...
44. Which normal form is commonly considered to be all that is...
48. SQL is used to create a database (True or False).
When would you need a new device driver? Select all of the...
_________ is a way that OS give the illusion of a large...
51. The SQL statement used to retrieve data from a database is which...
What is the latest version of Microsoft Windows OS?
____ 49. According to HIPAA rules, who can view your...
1. From the choices below, select the best definition of a network.
2. A(n) _____ connection requires the services of an ISP.
10. Significant healthcare security breaches
1. The main function...
6. A _____ IP address can change when you reboot your ISP device.
10. Network security revolves around the setup and use of _____ to...
7. Private IP addresses _____.
The file _______ identifies the file type.
21. A(n) _____ protects a device from spikes in power usually...
11. An authenticated object is an object that _____.
12. An example of authentication is when a user _____.
1. What is an information system?
2. What is the goal of an information system?
7. A(n) _________ is an abstraction of a problem.
42. Most (if not all) scientific,...
10. Systems Implementation includes
11. The __________ is a centralized resource staffed by IT...
14. ________ testing focuses on the system as a whole.
Files that are stored in non-contiguous clusters are called __________...
12. A foreign key is . . .
15. Select all of the following that are part of a test...
17. Total cost of ownership includes
The most important software on your computer is the operating system.
14. What language is used to store and retrieve data from a database?
Which part of the computer is its "brain"?
Where are programs stored when they are running?
What is the most important software that runs on your computer?
Which of the following are example(s) of personal computers? ...
Which of the following is an input device for a personal computer?
When was the World Wide Web first developed?
What was the first use of electronic medical records?
Where can you find up to date information about current computing...
20. _____ are hardware and/or software that monitor network traffic...
What was the first personal computer?
21. Encryption is a process whereby communication is made unreadable...
Personal computers were first developed in the 1970s.
____ 1. The ____ is a global system of...
26. You were asked to configure wireless authentication. Which...
____ 2. The Internet began because ____.
30. Privacy is to _____ as...
31. The law of _____ regulates the type...
6. Macro viruses usually infect Microsoft Office files and _____.
8. You receive an email that appears to be from eBay asking you to...
9. A _____ is a free protocol analyzer software tool that can display...
16. Your company decides that it should back up computer files every...
A computer is:
Which of the following are important factors to consider when...
What technology was used in the first general purpose electronic...
20. Preventative maintenance involves work that is done...
17. Primary keys can be selected from a list of . . .
22. System designers develop the database, software and...
20. Testing of the database can be accomplished by which of the...
3. iPhone OS is an...
22. Attributes must depend on the ____of the entity to which they...
24. The main objective of the systems analysis phase is to build...
5. Mac OS is an...
54. A logic error that executes...
6. Machine code is a...
11. The IEEE 802.3 standard governs ____ technologies.
8. COBOL is a _______...
10. SQL is a _______ language.
57. A statement that jumps to...
3. The motherboard...
59. Which form of branching is...
60. Another name for ...
12. The IEEE 802.11 standard governs ____ technologies.
6. A(n) ____ jack is...
8. Hard disk storage...
9. RAM is installed...
10. The operating system is stored...
____ 23. A(n) ____ is a set of instructions set out...
____ 25. A(n) ____ is also known as a query.
13. In Windows peer-to-peer networking, a workgroup is simply a _____.
____ 27. You search the Web using the term health...
____ 28. What does it mean when a Web site is at the...
16. The half-life of software has...
14. A _____ is a network with a small geographical area of coverage.
27. It is best if primary keys . . .
18. Pseudocode is an example of...
29. An example of a one-to-one relationship is which of the following?
28. Absolute system security is always possible.
____ 8. A browser uses ____ to...
11. What is a CT scan?
12. What is a PET scan?
22. Which of the following is a...
33. In a super to subtype relationship attributes of the super type...
____ 29. A router is a device that ____.
23. Which type of error may...
____ 30. Installing ____ updates is important to...
____ 32. What is the preferred method to use when...
63. A class can contain which of...
35. SQL cannot do which of the following?
____ 33. ____ permit(s) or deny a computer the...
16. 1024 bytes x 1024 x 1024 =...
37. The first phase in database development is which of the following?
25. A syntax error is most like a...
____ 14. Select a valid IP address and subnet mask...
65. The things that an object can...
____ 35. A complex password should include at least...
29. A value that cannot be changed...
35. Application security should include...
39. The Referential Integrity Constraint is which of the following?
19. Roughly how much storage does...
40. An attribute is said to be functionally dependent on another...
41. Constraints are which of the following?
There are two types of software: application and _________...
Which of the following is an example of business software?
____ 45. HIPAA requires that health care providers,...
2. _____ is software designed to infiltrate a computer system...
Select all of the following that are examples of healthcare software.
3. A Trojan horse usually _____.
31. Data that can be derived is...
42. First normal form of the Normalization process involves which of...
35. The character set of A-Z is...
37. Which data type is used more...
17. Protocols such as _____ allow any browser to talk to any Web...
38. The number of minutes in a day...
43. Second normal form of the Normalization process involves which of...
46. In the final design which element of the ER-diagram a name for a...
Which of the following is NOT true about an operating system?
47. SQL is used to create tables (True or False).
1. _____ describes the trend that the number of components on a...
A ________ interface is one where the user types in all the commands.
49. SQL is used to create relationships (True or False).
A(n) ________ is a way of organizing files and their data.
53. "Count" is which of the following?
55. Which of the following best describes a subquery?
4. E-mail was initially limited to
56. In transaction processing changes to the database can be retracted...
6. _____ permits virtual access to health care services.
7. Though less commonly used than in the past, _____ are still used...
3. A wired network connection requires the use of:
9. SMS is used for