IT Practice Exam Questions

46 Questions | Total Attempts: 71

SettingsSettingsSettings
Database Quizzes & Trivia

This question is to help test your knownledge on content from Chapter 6 System Analysis to Chapter 14 Future of Computing in the textbook: Fundamental to Computing Third Edition by Kendell/Hunt.


Questions and Answers
  • 1. 
    A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station.
    • A. 

      True

    • B. 

      False

  • 2. 
    A map of a database is called a__________.
    • A. 

      List

    • B. 

      Data flow diagram

    • C. 

      Topology

    • D. 

      Schema

  • 3. 
    A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. 
    • A. 

      Computer virus

    • B. 

      Trojan horse

    • C. 

      Worm

    • D. 

      All of the above

  • 4. 
    A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.
    • A. 

      Quarantine

    • B. 

      Firewall

    • C. 

      Payload

    • D. 

      Honeypot

  • 5. 
    An example of query criteria is:
    • A. 

      Changing an integer field to a 0 decimal.

    • B. 

      All records in which the valure in the score field is above 75.

    • C. 

      Linking the Employee and Department tables.

    • D. 

      All of the above are examples of query criteria.

  • 6. 
    All tags in XHTML are lower case.
    • A. 

      True

    • B. 

      False

  • 7. 
    Encryption is a technique for scrambling documents so that they are unreadable if intercepted during transit.
    • A. 

      True

    • B. 

      False

  • 8. 
    Computers small enough that several hundred of them could fit inside the space of a human cell are known as _____________.
    • A. 

      Optical computers

    • B. 

      Nanocomputers

    • C. 

      Quantum computers

    • D. 

      Molecular computers

  • 9. 
    E-commerce enables many travelers to get travel information and purchase tickets without the services of travel agents. This is an example of a trend described as:
    • A. 

      Hub hopping

    • B. 

      Reintermediation

    • C. 

      E-fallout

    • D. 

      Disintermediation

  • 10. 
    Good user habits can help prevent physical injuries and discomfort due to the use of computers.
    • A. 

      True

    • B. 

      False

  • 11. 
    HTML has a stricter syntax than XHTML.
    • A. 

      True

    • B. 

      False

  • 12. 
    If a company needs to store data about its customers, employees, products, and orders in a way that will enable it to quickly process orders, answer questions about orders, and prepare reports, it should use a(n): 
    • A. 

      File management system.

    • B. 

      Database management system.

    • C. 

      Expert system.

    • D. 

      Neural network.

  • 13. 
    If you make a copy of a proprietary program and give it to a friend you are committing: 
    • A. 

      Hacking

    • B. 

      Salami shaving

    • C. 

      Spoofing

    • D. 

      Software piracy

  • 14. 
    In XHTML, the <img> element is an empty element that must include a space and a slash before its closing bracket in order to be well formed.
    • A. 

      True

    • B. 

      False

  • 15. 
    15. Many e-commerce sites use _____ to determine customer preferences.
    • A. 

      Data checking

    • B. 

      Data mining

    • C. 

      Data sorting

    • D. 

      Data serving

  • 16. 
    Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program. 
    • A. 

      Macros

    • B. 

      Cookies

    • C. 

      Logs

    • D. 

      Spikes

  • 17. 
    The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
    • A. 

      Electronic Communications Privacy Act (ECPA)

    • B. 

      Fair Credit Reporting Act

    • C. 

      Computer Fraud and Abuse Act

    • D. 

      Computer Matching and Priavcy Proctection Act

  • 18. 
    The diamond shape in a program flow chart is used to represent a(n): 
    • A. 

      Decision

    • B. 

      Action to be taken

    • C. 

      Beginging or end of a module

    • D. 

      Input and output of data

    • E. 

      Meeting point for several paths

  • 19. 
    The nature of relationships can be examined further and quantified. This quantification is called _____________. 
    • A. 

      Normalization

    • B. 

      Cardinality

    • C. 

      Batching

    • D. 

      Warehousing

  • 20. 
    The purpose of ergonomic keyboards is to:
    • A. 

      Increase the speed with which workers can enter data.

    • B. 

      Encrypt data as as it is sent from the keyboard to the CPU.

    • C. 

      Reduce the occurrence of carpal tunnel syndrome.

    • D. 

      Enter data in the languages that do not use the Roman alphabet.

  • 21. 
    The study and practice of using computing resources efficiently and with a worldly perspective is _________. 
    • A. 

      Nanotechnology

    • B. 

      Recycling

    • C. 

      Disaster recovery

    • D. 

      Green computing

  • 22. 
    This English-like language was designed to make possible the easy manipulation of data. 
    • A. 

      SQL

    • B. 

      ERC

    • C. 

      ERD

    • D. 

      DBS

  • 23. 
    Three types of XHTML DTDs are: transitional, frameset, and strict. 
    • A. 

      True

    • B. 

      False

  • 24. 
    To be able to resume operation after its computer system is damaged or destroyed, a company should:
    • A. 

      Prepare a system requirements document.

    • B. 

      Create a disaster-recovery plan.

    • C. 

      Encrypt all transmitted data.

    • D. 

      Require passwords for all employees.

  • 25. 
    To ensure that an e-mail message or file came from the designated individual and was not tampered during transmission; you should use which of the following? 
    • A. 

      Firewall

    • B. 

      Digital signature

    • C. 

      Antivirus program

    • D. 

      Encryprion

Related Topics
Back to Top Back to top