Comp4

330 Questions | Attempts: 117
Please wait...
Question 1 / 201
🏆 Rank #--
Score 0/100

1.
  1. Copying software from a friend is always okay.

Submit
Please wait...
About This Quiz
Rapper Quizzes & Trivia

Comp4

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. 15. The most important source of specifications for database development is obtained from which of the following?

Submit

3.
  1. The device driver for your printer will need to be updated when you do a major upgrade of your operating system.

Submit

4. 21.  System users are the only stakeholders for an information system.

Submit

5. 19. The data model is best described as which of the following?

Submit

6. 18.  Software and/or hardware that blocks unauthorized communications on a computer is referred to as a(n) _____.

Submit

7. 23.  Project teams do not require management.

Submit

8. ____  19.   Home networks usually connect to the Internet through the use of the services provided by a(n) ____.

Submit

9. 4.         Windows Server 2008 is an example of _______.

Submit

10. 19._____ protect(s) a computer by locating and stopping programs attempting to harm computer operation.

Submit

11. ____  20.   A typical home network connecting to the Internet uses ____ IP addressing.

Submit

12. 25.  Web-based applications have less complex security issues than traditional applications.

Submit

13. 9.         An Applet is an example of a _______ language.

Submit

14. 4.         Today's computers connect the mouse and keyboard via a(n) ____ slot.

Submit

15.
  1. A dishwasher has an embedded computer.

Submit

16.
  1. Speakers are an example of a computer output device.

Submit

17. 22.  A simple step to secure data from those who do not have permission view it is to _____.

Submit

18. 23.  A complex password contains at least 6 characters, made up of at least: 1-upper case, 1-lower case, 1-number, and 1- _____ character.

Submit

19. ____  24.   How does a search engine provide you with a result set?

Submit

20. 15.       The requirements analysis phase of the SDLC can involve all but the following.

Submit

21. ____  26.   Examples of Boolean operators include the terms ____.

Submit

22. 27. The U. S. Government would like to implement electronic health records for most Americans by the year _____.

Submit

23. ____    4.   The ____ is a collection of interconnected documents and other resources, linked by hyperlinks and URLs.

Submit

24. ____    5.   From the list provided below, select a valid URL.

Submit

25. ____    6.   The WWW was created in ____ by Dr. Tim Berners-Lee and others with the introduction of the Web browser and Web page coding.

Submit

26. 27.  Maintenance requests are formalized processes to document and fix problems.

Submit

27. 28. Natural keys have the advantage over surrogate keys of which of the following?

Submit

28. ____    7.   A(n) ____ is a software program that lets a user use Web server resources over the Internet.

Submit

29. 28. Health information is stored as a(n) _____ in an EHR.

Submit

30. 29.  Software testers perform actions that may cause software to malfunction.

Submit

31. 31. An example of a many-to-many relationship is which of the following?

Submit

32. 29.       HIPAA requires that health care providers, insurance companies, and employers abide by _____ standards.

Submit

33. 13.       What is an MRI?

Submit

34. ____    9.   A Web server sends ____ back to the browser, which translates it for display on a monitor.

Submit

35. ____  10.   HTML is a(n) ____.

Submit

36. ____  31.   Antivirus software works by recognizing ____ and stopping those things from causing harm to your computer.

Submit

37. 14.       A binary digit value of one (1) indicates that electricity is ____.

Submit

38. ____  11.   HTTP is a(n) ____.

Submit

39. 15.       In the binary number "01011010", the rightmost value of "0" is a placeholder for ____.

Submit

40. 36. SQL commonly produces or projects which of the following?

Submit

41. ____  12.   The Internet is owned by ____.

Submit

42. ____  13.   What is required for a device to communicate over the Internet?

Submit

43. ____  15.   The Domain Naming System maps a(n) ____ to a domain name.

Submit

44. 26.       A thorough testing phase will catch ___________.

Submit

45. 27.       The consequences of an error in a health care application _____________.

Submit

46. ____  34.   Some experts recommend ____ first party, ____ third party, and ____ session cookies.

Submit

47. 33.         When users enter data on Web forms, the data should be _____ before it is saved to the database.

Submit

48. ____  17.   The slowest type of Internet connection is the ____ connection type.

Submit

49. ____  18.   The global standard governing wireless technologies is the ____ standard.

Submit

50. ____  39.   Macro viruses are usually associated with ____ files.

Submit

51. 38. Which of the following is involved in data modeling?

Submit

52. 15. A _____ topology describes how a network is actually designed and laid out across a campus.

Submit

53.
  1. Which of the following is NOT a form of software that is free?

Submit

54. 1. A neighbor becomes aware of a medical condition you have been privately battling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of _____.

Submit

55.
  1. Which of the following is NOT an example of word processing software?

Submit

56. ____  46.   One difference between PHRs and EHRs is that PHRs are ____.

Submit

57.
  1. Select all of the following that are examples of communications software.

Submit

58. ____  48.   Patient medical records should be send electronically in a(n) ____ format.

Submit

59. 34.       The kind of data stored in memory is described to the computer as a  ________.

Submit

60. 36.       The character set of 0-9 is contained in what data type?

Submit

61. 44. Which normal form is commonly considered to be all that is necessary for most database situations?

Submit

62. 48. SQL is used to create a database (True or False).

Submit

63.
  1. When would you need a new device driver?  Select all of the following that are reasons you'd need a new driver.

Submit

64.
  1.   _________ is a way that OS give the illusion of a large memory.

Submit

65. 51. The SQL statement used to retrieve data from a database is which of the following?

Submit

66.
  1.   What is the latest version of Microsoft Windows OS?

Submit

67. ____  49.   According to HIPAA rules, who can view your medical information without a signed release?

Submit

68. 1. From the choices below, select the best definition of a network.

Submit

69. 2. A(n) _____ connection requires the services of an ISP.

Submit

70. 10. Significant healthcare security breaches

Submit

71. 1.         The main function of a computer is to ____.

Submit

72. 6. A _____ IP address can change when you reboot your ISP device.

Submit

73. 10. Network security revolves around the setup and use of _____ to control who and how objects are utilized.

Submit

74. 7. Private IP addresses _____.

Submit

75.
  1.  The file _______ identifies the file type.

Submit

76. 21. A(n) _____ protects a device from spikes in power usually originating with the power company.

Submit

77. 11.  An authenticated object is an object that _____.

Submit

78. 12.  An example of authentication is when a user _____.

Submit

79. 1.  What is an information system?

Submit

80. 2.  What is the goal of an information system?

Submit

81. 7.  A(n) _________ is an abstraction of a problem.

Submit

82. 42.       Most (if not all) scientific, business, industry, health care and personal use computer problems can be solved with just the three following logic constructs.

Submit

83. 10.   Systems Implementation includes

Submit

84. 11.  The __________ is a centralized resource staffed by IT professionals who provide user support.

Submit

85. 14.  ________ testing focuses on the system as a whole.

Submit

86.
  1. Files that are stored in non-contiguous clusters are called __________ files.

Submit

87. 12. A foreign key is . . .

Submit

88. 15.   Select all of the following that are part of a test plan.

Submit

89. 17.  Total cost of ownership includes

Submit

90.
  1. The most important software on your computer is the operating system.

Submit

91. 14. What language is used to store and retrieve data from a database?

Submit

92.
  1. Which part of the computer is its "brain"?

Submit

93.
  1. Where are programs stored when they are running?

Submit

94.
  1. What is the most important software that runs on your computer?

Submit

95.
  1. Which of the following are example(s) of personal computers?  Select all that apply.

Submit

96.
  1. Which of the following is an input device for a personal computer?

Submit

97.
  1. When was the World Wide Web first developed?

Submit

98.
  1.  What was the first use of electronic medical records?

Submit

99.
  1. Where can you find up to date information about current computing systems?  Select all that apply.

Submit

100. 20. _____ are hardware and/or software that monitor network traffic for malicious activity.

Submit

101.
  1.  What was the first personal computer?

Submit

102. 21. Encryption is a process whereby communication is made unreadable to _____.

Submit

103.
  1. Personal computers were first developed in the 1970s.

Submit

104. ____    1.   The ____ is a global system of computer networks that communicate using TCP/IP and is a large network made up of many smaller networks.

Submit

105. 26.  You were asked to configure wireless authentication. Which protocol should you select?

Submit

106. ____    2.   The Internet began because ____.

Submit

107. 30.       Privacy is to _____ as confidentiality is to _____.

Submit

108. 31.       The law of _____ regulates the type of information which may be collected and how this information may be used and stored.

Submit

109. 6. Macro viruses usually infect Microsoft Office files and _____.

Submit

110. 8. You receive an email that appears to be from eBay asking you to login to verify a transaction.  This is an example of (a) ________ attack.

Submit

111. 9. A _____ is a free protocol analyzer software tool that can display unencrypted network traffic on a monitor screen.

Submit

112. 16. Your company decides that it should back up computer files every four hours during the week and at the end of the day on weekends. This process needs to be recorded in the company's _____.

Submit

113.
  1.  A computer is:

Submit

114.
  1. Which of the following are important factors to consider when selecting a computer?  Select all that apply.

Submit

115.
  1. What technology was used in the first general purpose electronic computers?

Submit

116. 20.  Preventative maintenance involves work  that is done _______ a potential problem affects the information system.

Submit

117. 17. Primary keys can be selected from a list of . . .

Submit

118. 22.  System designers develop the database, software and interface designs.

Submit

119. 20. Testing of the database can be accomplished by which of the following?

Submit

120. 3.         iPhone OS is an example of _______.

Submit

121. 22. Attributes must depend on the ____of the entity to which they belong.

Submit

122. 24.  The main objective of the systems analysis phase is to build a logical model of the information system.

Submit

123. 5.         Mac OS is an example of _______.

Submit

124. 54.       A logic error that executes code repetitively and limitlessly?

Submit

125. 6.         Machine code is a _______ language.

Submit

126. 11. The IEEE 802.3 standard governs ____ technologies.

Submit

127. 8.         COBOL is a _______ language.

Submit

128. 10.       SQL is a _______ language.

Submit

129. 57.       A statement that jumps to another module without any strings attached as to what to do when the machine is finished executing the invoked module illustrates what kind of branching?

Submit

130. 3.         The motherboard contains ____ slots, into which device expansion cards are inserted.

Submit

131. 59.       Which form of branching is conducive to structured design?

Submit

132. 60.       Another name for  unconditional branching is ____________.

Submit

133. 12. The IEEE 802.11 standard governs ____ technologies.

Submit

134. 6.         A(n) ____ jack is used to connect a network cable to a network interface card.

Submit

135. 8.         Hard disk storage is known as ____ storage.

Submit

136. 9.         RAM is installed ____.

Submit

137. 10.       The operating system is stored ____.

Submit

138. ____  23.   A(n) ____ is a set of instructions set out logically to solve a problem.

Submit

139. ____  25.   A(n) ____ is also known as a query.

Submit

140. 13. In Windows peer-to-peer networking, a workgroup is simply a _____.

Submit

141. ____  27.   You search the Web using the term health and informatics not education. What result below best matches your search?

Submit

142. ____  28.   What does it mean when a Web site is at the top of a search results list?

Submit

143. 16.       The half-life of software has the most effect on what phase of a program's life cycle.

Submit

144. 14. A _____ is a network with a small geographical area of coverage.

Submit

145. 27. It is best if primary keys . . .

Submit

146. 18.       Pseudocode is an example of a(n) ____________ design tool.

Submit

147. 29. An example of a one-to-one relationship is which of the following?

Submit

148. 28.  Absolute system security is always possible.

Submit

149. ____    8.   A browser uses ____ to communicate with Web servers.

Submit

150. 11.       What is a CT scan?

Submit

151. 12.       What is a PET scan?

Submit

152. 22.       Which of the following is a translation process that translates an entire program and creates an executable module?

Submit

153. 33. In a super to subtype relationship attributes of the super type are which of the following?

Submit

154. ____  29.   A router is a device that ____.

Submit

155. 23.       Which type of error may require a programmer to redo their pseudocode solution?

Submit

156. ____  30.   Installing ____ updates is important to securing your operating system from attack.

Submit

157. ____  32.   What is the preferred method to use when closing a suspicious Web site popup window?

Submit

158. 63.       A class can contain which of the following?

Submit

159. 35. SQL cannot do which of the following?

Submit

160. ____  33.   ____ permit(s) or deny a computer the ability to connect to another computer.

Submit

161. 16.       1024 bytes x 1024 x 1024 = ____.

Submit

162. 37. The first phase in database development is which of the following?

Submit

163. 25.       A syntax error is most like a ___________.

Submit

164. ____  14.   Select a valid IP address and subnet mask from below:

Submit

165. 65.       The things that an object can do are referred to as ________.

Submit

166. ____  35.   A complex password should include at least ____ characters.

Submit

167. 29.       A value that cannot be changed while a program is running is called a ________.

Submit

168. 35.       Application security should include provisions to ensure _____, which means that a user cannot deny having made changes to data in an electronic medical file.

Submit

169. 39. The Referential Integrity Constraint is which of the following?

Submit

170. 19.       Roughly how much storage does a chest x-ray require?

Submit

171. 40. An attribute is said to be functionally dependent on another attribute if . . .

Submit

172. 41. Constraints are which of the following?

Submit

173.
  1.  There are two types of software:  application and _________ software.

Submit

174.
  1. Which of the following is an example of business software?

Submit

175. ____  45.   HIPAA requires that health care providers, insurance companies, and employers ____.

Submit

176. 2.  _____ is software designed to infiltrate a computer system without the owner's informed consent.

Submit

177.
  1. Select all of the following that are examples of healthcare software.

Submit

178. 3. A Trojan horse usually _____.

Submit

179. 31.       Data that can be derived is called  ________ data.

Submit

180. 42. First normal form of the Normalization process involves which of the following?

Submit

181. 35.       The character set of A-Z is contained in what data type?

Submit

182. 37.       Which data type is used more often in programming for A-Z?

Submit

183. 17. Protocols such as _____ allow any browser to talk to any Web server.

Submit

184. 38.       The number of minutes in a day (24 hour period) is a good candidate for being declared as a _______?

Submit

185. 43. Second normal form of the Normalization process involves which of the following?

Submit

186. 46. In the final design which element of the ER-diagram a name for a piece of data in the database?

Submit

187.
  1. Which of the following is NOT true about an operating system?

Submit

188. 47. SQL is used to create tables (True or False).

Submit

189. 1.  _____ describes the trend that the number of components on a circuit doubles every two years.

Submit

190.
  1. A ________ interface is one where the user types in all the commands.

Submit

191. 49. SQL is used to create relationships (True or False).

Submit

192.
  1.   A(n) ________ is a way of organizing files and their data.

Submit

193. 53. "Count" is which of the following?

Submit

194. 55. Which of the following best describes a subquery?

Submit

195. 4. E-mail was initially limited to

Submit

196. 56. In transaction processing changes to the database can be retracted before the end of the transaction is reached (true or false).

Submit

197. 6. _____ permits virtual access to health care services.

Submit

198. 7. Though less commonly used than in the past, _____ are still used today.

Submit

199. 3. A wired network connection requires the use of:

Submit

200. 9. SMS is used for

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Copying software from a friend is always okay.
15. The most important source of specifications for database...
The device driver for your printer will need to be updated when you do...
21.  System users are the only stakeholders for an information...
19. The data model is best described as which of the following?
18.  Software and/or hardware that blocks unauthorized...
23.  Project teams do not require management.
____  19.   Home networks usually connect to the...
4.         Windows Server 2008...
19._____ protect(s) a computer by locating and stopping programs...
____  20.   A typical home network connecting to the...
25.  Web-based applications have less complex security issues...
9.         An Applet is an...
4.         Today's computers...
A dishwasher has an embedded computer.
Speakers are an example of a computer output device.
22.  A simple step to secure data from those who do not have...
23.  A complex password contains at least 6 characters, made up...
____  24.   How does a search engine provide you with a...
15.       The requirements analysis...
____  26.   Examples of Boolean operators include the...
27. The U. S. Government would like to implement electronic health...
____    4.   The ____ is a collection of...
____    5.   From the list provided below,...
____    6.   The WWW was created in ____ by...
27.  Maintenance requests are formalized processes to document...
28. Natural keys have the advantage over surrogate keys of which of...
____    7.   A(n) ____ is a software program...
28. Health information is stored as a(n) _____ in an EHR.
29.  Software testers perform actions that may cause software to...
31. An example of a many-to-many relationship is which of the...
29.       HIPAA requires that health care...
13.       What is an MRI?
____    9.   A Web server sends ____ back to...
____  10.   HTML is a(n) ____.
____  31.   Antivirus software works by recognizing...
14.       A binary digit value of one...
____  11.   HTTP is a(n) ____.
15.       In the binary number...
36. SQL commonly produces or projects which of the following?
____  12.   The Internet is owned by ____.
____  13.   What is required for a device to...
____  15.   The Domain Naming System maps a(n) ____ to...
26.       A thorough testing phase will...
27.       The consequences of an error...
____  34.   Some experts recommend ____ first party,...
33.         When users enter data...
____  17.   The slowest type of Internet connection is...
____  18.   The global standard governing wireless...
____  39.   Macro viruses are usually associated with...
38. Which of the following is involved in data modeling?
15. A _____ topology describes how a network is actually designed and...
Which of the following is NOT a form of software that is free?
1. A neighbor becomes aware of a medical condition you have been...
Which of the following is NOT an example of word processing software?
____  46.   One difference between PHRs and EHRs is...
Select all of the following that are examples of communications...
____  48.   Patient medical records should be send...
34.       The kind of data stored in...
36.       The character set of 0-9 is...
44. Which normal form is commonly considered to be all that is...
48. SQL is used to create a database (True or False).
When would you need a new device driver?  Select all of the...
  _________ is a way that OS give the illusion of a large...
51. The SQL statement used to retrieve data from a database is which...
  What is the latest version of Microsoft Windows OS?
____  49.   According to HIPAA rules, who can view your...
1. From the choices below, select the best definition of a network.
2. A(n) _____ connection requires the services of an ISP.
10. Significant healthcare security breaches
1.         The main function...
6. A _____ IP address can change when you reboot your ISP device.
10. Network security revolves around the setup and use of _____ to...
7. Private IP addresses _____.
 The file _______ identifies the file type.
21. A(n) _____ protects a device from spikes in power usually...
11.  An authenticated object is an object that _____.
12.  An example of authentication is when a user _____.
1.  What is an information system?
2.  What is the goal of an information system?
7.  A(n) _________ is an abstraction of a problem.
42.       Most (if not all) scientific,...
10.   Systems Implementation includes
11.  The __________ is a centralized resource staffed by IT...
14.  ________ testing focuses on the system as a whole.
Files that are stored in non-contiguous clusters are called __________...
12. A foreign key is . . .
15.   Select all of the following that are part of a test...
17.  Total cost of ownership includes
The most important software on your computer is the operating system.
14. What language is used to store and retrieve data from a database?
Which part of the computer is its "brain"?
Where are programs stored when they are running?
What is the most important software that runs on your computer?
Which of the following are example(s) of personal computers? ...
Which of the following is an input device for a personal computer?
When was the World Wide Web first developed?
 What was the first use of electronic medical records?
Where can you find up to date information about current computing...
20. _____ are hardware and/or software that monitor network traffic...
 What was the first personal computer?
21. Encryption is a process whereby communication is made unreadable...
Personal computers were first developed in the 1970s.
____    1.   The ____ is a global system of...
26.  You were asked to configure wireless authentication. Which...
____    2.   The Internet began because ____.
30.       Privacy is to _____ as...
31.       The law of _____ regulates the type...
6. Macro viruses usually infect Microsoft Office files and _____.
8. You receive an email that appears to be from eBay asking you to...
9. A _____ is a free protocol analyzer software tool that can display...
16. Your company decides that it should back up computer files every...
 A computer is:
Which of the following are important factors to consider when...
What technology was used in the first general purpose electronic...
20.  Preventative maintenance involves work  that is done...
17. Primary keys can be selected from a list of . . .
22.  System designers develop the database, software and...
20. Testing of the database can be accomplished by which of the...
3.         iPhone OS is an...
22. Attributes must depend on the ____of the entity to which they...
24.  The main objective of the systems analysis phase is to build...
5.         Mac OS is an...
54.       A logic error that executes...
6.         Machine code is a...
11. The IEEE 802.3 standard governs ____ technologies.
8.         COBOL is a _______...
10.       SQL is a _______ language.
57.       A statement that jumps to...
3.         The motherboard...
59.       Which form of branching is...
60.       Another name for ...
12. The IEEE 802.11 standard governs ____ technologies.
6.         A(n) ____ jack is...
8.         Hard disk storage...
9.         RAM is installed...
10.       The operating system is stored...
____  23.   A(n) ____ is a set of instructions set out...
____  25.   A(n) ____ is also known as a query.
13. In Windows peer-to-peer networking, a workgroup is simply a _____.
____  27.   You search the Web using the term health...
____  28.   What does it mean when a Web site is at the...
16.       The half-life of software has...
14. A _____ is a network with a small geographical area of coverage.
27. It is best if primary keys . . .
18.       Pseudocode is an example of...
29. An example of a one-to-one relationship is which of the following?
28.  Absolute system security is always possible.
____    8.   A browser uses ____ to...
11.       What is a CT scan?
12.       What is a PET scan?
22.       Which of the following is a...
33. In a super to subtype relationship attributes of the super type...
____  29.   A router is a device that ____.
23.       Which type of error may...
____  30.   Installing ____ updates is important to...
____  32.   What is the preferred method to use when...
63.       A class can contain which of...
35. SQL cannot do which of the following?
____  33.   ____ permit(s) or deny a computer the...
16.       1024 bytes x 1024 x 1024 =...
37. The first phase in database development is which of the following?
25.       A syntax error is most like a...
____  14.   Select a valid IP address and subnet mask...
65.       The things that an object can...
____  35.   A complex password should include at least...
29.       A value that cannot be changed...
35.       Application security should include...
39. The Referential Integrity Constraint is which of the following?
19.       Roughly how much storage does...
40. An attribute is said to be functionally dependent on another...
41. Constraints are which of the following?
 There are two types of software:  application and _________...
Which of the following is an example of business software?
____  45.   HIPAA requires that health care providers,...
2.  _____ is software designed to infiltrate a computer system...
Select all of the following that are examples of healthcare software.
3. A Trojan horse usually _____.
31.       Data that can be derived is...
42. First normal form of the Normalization process involves which of...
35.       The character set of A-Z is...
37.       Which data type is used more...
17. Protocols such as _____ allow any browser to talk to any Web...
38.       The number of minutes in a day...
43. Second normal form of the Normalization process involves which of...
46. In the final design which element of the ER-diagram a name for a...
Which of the following is NOT true about an operating system?
47. SQL is used to create tables (True or False).
1.  _____ describes the trend that the number of components on a...
A ________ interface is one where the user types in all the commands.
49. SQL is used to create relationships (True or False).
  A(n) ________ is a way of organizing files and their data.
53. "Count" is which of the following?
55. Which of the following best describes a subquery?
4. E-mail was initially limited to
56. In transaction processing changes to the database can be retracted...
6. _____ permits virtual access to health care services.
7. Though less commonly used than in the past, _____ are still used...
3. A wired network connection requires the use of:
9. SMS is used for
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!