Test 3 On Chap 7+9+11

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Garciagisselle45
G
Garciagisselle45
Community Contributor
Quizzes Created: 2 | Total Attempts: 419
| Attempts: 231 | Questions: 107
Please wait...
Question 1 / 107
0 %
0/100
Score 0/100
1. A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.

Explanation

Advance fee fraud is a social engineering scam where the victim is promised a large sum of money in exchange for providing their bank account number. The scammer then withdraws a small advance fee from the victim's account. This type of scam preys on the victim's greed and desire for quick money, convincing them to provide their personal information and ultimately leading to financial loss.

Submit
Please wait...
About This Quiz
Test 3 On Chap 7+9+11 - Quiz

TEST 3 on chap 7+9+11 assesses knowledge on cybersecurity threats and preventive measures. It covers topics like computer viruses, anti-exploit software, authentication protocols, social engineering, and ransomware, focusing... see moreon understanding and preventing digital security breaches. see less

2. Which ecommerce classification encompasses consumers selling merchandise and services to each other?​

Explanation

C2C stands for "consumer to consumer" and refers to the classification of ecommerce where consumers sell merchandise and services directly to each other. This type of ecommerce involves individuals or small businesses acting as both buyers and sellers, using online platforms or marketplaces to facilitate transactions. It allows individuals to monetize their unused or unwanted items by selling them to other consumers. C2C platforms often provide a convenient and accessible way for individuals to connect and engage in peer-to-peer transactions.

Submit
3. A(n) __________ is available for use by any routine in the program while a(n) _______________  can be accessed only from the routine in which it is defined.​

Explanation

A public attribute is available for use by any routine in the program, meaning that it can be accessed and modified by any part of the program. On the other hand, a private attribute can only be accessed from the routine in which it is defined. This means that other routines or parts of the program cannot directly access or modify a private attribute, ensuring that it is encapsulated and protected within its defining routine.

Submit
4. The human-readable version of a program created in a high-level language by a programmer is called __________.​ 

Explanation

The human-readable version of a program created in a high-level language by a programmer is called source code. This refers to the written instructions and statements that are understandable by humans and can be written in programming languages such as Python, Java, or C++. It is the initial form of a program before it is compiled or interpreted into machine code that can be executed by a computer.

Submit
5. ​A(n) ______________  attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

Explanation

A zero-day attack refers to an attack that takes advantage of vulnerabilities in software applications, hardware, and operating system program code that are previously unknown to the software vendor or developer. This means that the attack occurs before the developer has had a chance to develop a patch or fix for the vulnerability, giving the attacker an advantage.

Submit
6. Which of the following sequence of events best describes an online intrusion?

Explanation

This answer describes the most common sequence of events in an online intrusion. First, malware enters the device, usually through a malicious download or email attachment. Once inside, the malware opens a backdoor, creating a hidden entry point for the hacker. This backdoor then establishes an open communications link on the device, which the hacker can exploit to gain unauthorized access and carry out malicious activities. This sequence accurately represents the typical steps involved in an online intrusion.

Submit
7. A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.​

Explanation

A function is a section of code that is part of a program but is not included in the main sequential execution path. Functions are used to group and organize code into reusable blocks that can be called upon when needed. They allow for modular programming and help to improve code readability and maintainability.

Submit
8. Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.

Explanation

SIMULA is believed to be the first programming language to work with objects, classes, inheritance, and methods. Computer historians credit SIMULA with introducing the concept of object-oriented programming (OOP) and providing the foundation for modern OOP languages like Java and Python. SIMULA was developed in the 1960s by Ole-Johan Dahl and Kristen Nygaard at the Norwegian Computing Center. It allowed programmers to define classes, create objects, and use inheritance to create new classes. SIMULA's influence on subsequent programming languages makes it the most likely answer to the question.

Submit
9. ​To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

Explanation

An Evil Twin is a type of cyber attack where hackers set up a fake Wi-Fi hotspot that appears to be legitimate. They make it unsecured and provide an Internet connection to lure unsuspecting users to connect to it. Once connected, the hackers can intercept and monitor the users' online activities, steal sensitive information, or carry out other malicious activities. This type of attack is often used to perform identity theft or gain unauthorized access to personal or corporate networks.

Submit
10. Which of the following is not a characteristic of a weak password?

Explanation

The given answer, "Eight characters in length and include one or more uppercase letters, numbers, and symbols," is not a characteristic of a weak password because it meets the criteria of being strong. A weak password is usually easy to guess or crack, and it often includes common words, dictionary terms, or default passwords. However, a password that is eight characters long and includes a combination of uppercase letters, numbers, and symbols is considered strong and more difficult to guess or crack.

Submit
11. Prolog allows you to ask open-ended questions by replacing constants with __________.​

Explanation

Prolog allows you to ask open-ended questions by replacing constants with variables. Variables in Prolog can be used to represent unknown values or placeholders in queries, allowing for flexible and dynamic querying of the database. By replacing constants with variables, you can ask Prolog to find all possible values that satisfy certain conditions, enabling open-ended exploration and discovery of information.

Submit
12. Which type of problem requires human intuition as the basis for finding a solution.

Explanation

Unstructured problems are those that do not have a clear set of steps or rules to follow in order to find a solution. These problems often require human intuition and creativity to come up with a solution. In contrast, structured problems have well-defined procedures and steps, while semi-structured problems have some elements of structure but also require some level of intuition. Therefore, the correct answer is unstructured, as it specifically mentions the need for human intuition as the basis for finding a solution.

Submit
13. A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.​

Explanation

A compiler is a program that converts all the statements in a program in a single batch. The resulting collection of instructions, called object code, is then placed in a new file. This object code can be directly executed by the computer's hardware.

Submit
14. A(n) _____________  changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.​

Explanation

A sequence control structure changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program. This means that instead of executing instructions in a linear, sequential manner, the sequence control structure allows for branching and looping, enabling the program to make decisions and repeat certain instructions based on specific conditions.

Submit
15. The current method of encrypting communication between a client and a server depends on a security protocol called _______

Explanation

The correct answer is TLS. TLS stands for Transport Layer Security, which is a security protocol used to encrypt communication between a client and a server. It ensures that the data transmitted between the two parties is secure and protected from unauthorized access or tampering. TLS is widely used in internet communication, such as secure web browsing (HTTPS), email transmission, and virtual private networks (VPNs). It provides authentication, confidentiality, and integrity of the data being transmitted, making it an essential component of secure communication.

Submit
16. Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?

Explanation

Corrective procedures refer to security measures that are implemented after an attack has occurred to mitigate its effects. In this case, using data backups, disaster recovery plans, and redundant hardware devices can help in restoring the systems and data affected by the attack and minimize the impact of the attack. These measures do not prevent the attack from happening but rather focus on recovering from it and reducing the damage caused.

Submit
17. ____________ encompasses a broad set of activities that include planning, coding, testing, and documenting while a related activity, __________, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability.​

Explanation

Computer programming refers to the process of writing code to create computer software. It involves activities such as planning, coding, testing, and documenting. On the other hand, software engineering is a development process that utilizes mathematical, engineering, and management techniques to make computer programs more cost-effective, less complex, and more reliable and modifiable. Therefore, the correct answer is "Computer programming, software engineering."

Submit
18. __________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications

Explanation

The given statement suggests that "Third-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications." This implies that these languages were widely utilized in both the business and scientific fields. The term "Third-generation" refers to a specific era or category of programming languages, indicating that they were developed after the earlier generations of languages. Therefore, the correct answer is "Third."

Submit
19.  ​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

Explanation

Anti-exploit software is designed to protect certain applications from common behaviors exhibited by intrusions. It specifically focuses on identifying and preventing exploits, which are techniques used by attackers to take advantage of vulnerabilities in software or systems. By proactively detecting and blocking these exploits, anti-exploit software helps to safeguard applications and prevent unauthorized access or damage caused by intrusions.

Submit
20. Three key concepts ensure good quality of service include all of the following except _______ .​

Explanation

The question asks for the concept that does not ensure good quality of service. Reliability, availability, and serviceability are all important factors in ensuring good quality of service. However, convertibility does not directly contribute to the quality of service. Convertibility refers to the ability of a system or service to be easily adapted or transformed into different forms or formats, which is not directly related to the quality of service provided.

Submit
21. ​A ___________  is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker

Explanation

A Remote Access Trojan (RAT) is a type of malware that disguises itself as legitimate software and allows hackers to gain unauthorized access to a computer system. Once installed, a RAT establishes a covert communication channel with the hacker, enabling them to remotely control the infected system and carry out various malicious activities without the user's knowledge.

Submit
22. Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols

Explanation

Brute force attack is a type of attack that uses password-cracking software to generate every possible combination of letters, numerals, and symbols. This method is time-consuming and requires a lot of computational power, but it is effective in breaking weak passwords. It systematically tries all possible combinations until the correct password is found. This attack is often used when there is no other information available about the password, and it is a common technique employed by hackers to gain unauthorized access to systems or accounts.

Submit
23. A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.​

Explanation

A supply chain refers to the entire process involved in the movement of a product or service from the supplier to the customer. It includes various organizations, people, activities, information, and resources that are necessary for the smooth flow of goods or services. This can include suppliers, manufacturers, distributors, retailers, and transportation companies, among others. The supply chain ensures that the product reaches the customer in a timely and efficient manner, taking into account factors such as sourcing, production, inventory management, and logistics.

Submit
24. Most modern transaction processing systems use ________ processing—a real-time method in which each transaction is processed as it is entered.​

Explanation

Most modern transaction processing systems use online processing, which means that each transaction is processed in real-time as it is entered. This method allows for immediate processing and response to transactions, ensuring that data is up to date and accurate. Batch processing, on the other hand, involves collecting a group of transactions and processing them together at a later time. Inline processing is not a commonly used term in transaction processing systems. Therefore, the correct answer is online.

Submit
25. Which type of security measure reduces the likelihood of a deliberate attack?​

Explanation

Deterrents are security measures that are designed to discourage potential attackers from attempting to carry out a deliberate attack. These measures can include physical barriers, warning signs, surveillance systems, or security personnel. By implementing deterrents, the likelihood of a deliberate attack is reduced because potential attackers are deterred by the visible presence of security measures and the perceived risk of getting caught or facing consequences.

Submit
26. What is the term that refers to the sequence in which a computer executes program instructions?

Explanation

Flow control refers to the sequence in which a computer executes program instructions. It determines the order in which statements and instructions are executed, allowing the program to make decisions and repeat certain actions based on specific conditions. Flow control is essential for controlling the flow of execution in a program and ensuring that instructions are executed in the desired order.

Submit
27. The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.​

Explanation

The object-oriented paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other. This means that the problem is approached by identifying the objects involved, defining their attributes and behaviors, and modeling their interactions. This paradigm allows for the encapsulation of data and methods within objects, promoting code reusability and modularity. It also emphasizes concepts such as inheritance, polymorphism, and encapsulation, which help in creating flexible and scalable solutions.

Submit
28. In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.​​

Explanation

A decision table is a tabular method commonly used in Prolog programming to visualize and specify rules based on multiple factors. It allows programmers to organize and analyze different combinations of inputs and their corresponding outputs, making it easier to understand and implement complex logical rules. By using a decision table, programmers can efficiently represent and evaluate various conditions and actions, making their code more structured and manageable.

Submit
29. A(n) __________  pings a packet of data to a port in order to see if that port is open or not.

Explanation

A port scan is a technique used to check if a specific port on a computer or network is open or closed. It involves sending a packet of data to the target port and analyzing the response. If a response is received, it indicates that the port is open and accessible. This is commonly used by network administrators to identify potential vulnerabilities in a system or to ensure that certain ports are properly configured and accessible.

Submit
30. A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.​

Explanation

An algorithm for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution. It serves as a guide or a roadmap for the program to follow in order to solve the problem at hand. Algorithms are essential in programming as they provide a systematic approach to problem-solving and help ensure that the program performs the desired tasks accurately and efficiently.

Submit
31. When antivirus software detects malware, which of the following would not be a course of action you could take?

Explanation

Conducting a heuristic analysis is not a course of action that can be taken when antivirus software detects malware. Heuristic analysis is a method used by antivirus software to identify new and unknown threats based on behavioral patterns. However, once malware is detected, the appropriate actions would be to repair the infection, put the infected file into quarantine, or delete the infected file to prevent further damage.

Submit
32. Which programming language is used for artificial intelligence applications and expert systems?

Explanation

Prolog is a programming language that is commonly used for artificial intelligence applications and expert systems. It is a logic-based language that excels in handling complex problem-solving and reasoning tasks. Prolog's built-in support for pattern matching and backtracking makes it well-suited for tasks such as natural language processing, expert systems, and rule-based decision making. Its declarative nature allows programmers to focus on describing the problem domain rather than the specific steps to solve it. This makes Prolog a popular choice for AI applications that require intelligent reasoning and inference capabilities.

Submit
33. Which of the following would be considered spyware?

Explanation

A keylogger would be considered spyware because it is a type of malicious software that records keystrokes on a computer without the user's knowledge or consent. This allows the attacker to capture sensitive information such as passwords, credit card numbers, and other personal data. Unlike firewall and antivirus software, which are designed to protect against unauthorized access and malware, a keylogger is specifically designed to secretly monitor and steal information. Therefore, it falls under the category of spyware.

Submit
34. After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.​

Explanation

After unit and integration testing are completed, system testing ensures that all hardware and software components work together. This type of testing focuses on evaluating the system as a whole, rather than individual components or modules. It aims to identify any issues or conflicts that may arise when different components interact with each other. System testing helps to ensure that the entire system functions correctly and meets the desired requirements and specifications.

Submit
35. A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.​

Explanation

A low-level language has a low level of abstraction because it includes commands specific to a particular CPU or microprocessor family. This means that the language is closely tied to the hardware and does not provide high-level concepts or abstractions that make programming easier and more efficient. Instead, programmers using low-level languages have to work with detailed instructions and directly manipulate the hardware, which can be time-consuming and error-prone.

Submit
36. A cryptographic __________ is a procedure for encryption or decryption.

Explanation

An algorithm is a procedure that is used for encryption or decryption in cryptography. It is a set of well-defined steps or rules that determine how data is transformed from its original form to a secure, encrypted form or vice versa. Algorithms play a crucial role in ensuring the confidentiality and integrity of sensitive information by providing a systematic and reliable way to encrypt and decrypt data.

Submit
37. The current standard for object-oriented documentation is referred to as ______.​

Explanation

The current standard for object-oriented documentation is UML. UML, which stands for Unified Modeling Language, is a visual modeling language used to design and document software systems. It provides a standardized way to represent the structure, behavior, and relationships of different components within a system. UML diagrams can be used to communicate complex ideas and concepts in a clear and concise manner, making it an essential tool for software developers and designers.

Submit
38. ​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Explanation

A computer virus is a type of malicious software that can replicate itself and attach to legitimate executable files on a host device without the user's knowledge or consent. Unlike trojans and worms, viruses have the ability to self-replicate and spread to other files and devices, causing harm to the system. Therefore, the correct answer is virus.

Submit
39. ​If you use a password manager, what do you as the user need to remember?

Explanation

The correct answer is the master password. When using a password manager, the user only needs to remember the master password, which grants access to all the stored passwords for individual sites and any other form data, including credit card numbers. The master password acts as the key to unlock and secure all the stored information in the password manager.

Submit
40. Which of the following is not a type of spam filter?

Explanation

Entropy is not a type of spam filter. Spam filters typically use various techniques such as permission-based filtering, blacklisting, and content analysis to identify and block spam emails. Entropy, on the other hand, is a statistical measure of randomness or disorder within a system. It is not directly related to spam filtering and does not play a role in identifying or blocking spam emails.

Submit
41. ​Trojans depend on ________ to spread.

Explanation

Trojans depend on social engineering to spread. Social engineering involves manipulating and deceiving individuals into performing certain actions, such as clicking on a malicious link or downloading an infected file. Trojans often disguise themselves as legitimate or desirable programs, tricking users into unknowingly installing them. This method of spreading relies on human interaction and psychological manipulation rather than exploiting technical vulnerabilities.

Submit
42.  _______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.​

Explanation

High-level languages, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. These languages provide a higher level of abstraction, allowing programmers to focus more on problem-solving rather than dealing with low-level details of the computer's architecture. They offer a more user-friendly syntax and often come with built-in libraries and tools that simplify common programming tasks.

Submit
43. The _____________ in a problem statement is the information that is supplied to the computer to help it solve a problem

Explanation

The known information in a problem statement refers to the data or facts that are provided to the computer to assist in solving the problem. This information serves as the initial input for the computer's algorithms and processes, allowing it to perform calculations and make decisions based on the given data. By utilizing the known information, the computer can effectively analyze the problem and generate a solution.

Submit
44. The instructions that make up a computer program are sometimes referred to as __________.​

Explanation

The instructions that make up a computer program are commonly known as code. Code consists of a set of commands or statements that tell the computer what actions to perform. It is written using a programming language and is executed by the computer to carry out specific tasks or calculations. Code is essential for the functioning of any computer program as it provides the necessary instructions for the computer to follow.

Submit
45. A(n) _____________  defines the characteristics of a set of objects.

Explanation

A class attribute is a variable that defines the characteristics of a set of objects. It is a property or data member that belongs to a class and is shared by all instances of that class. It defines the common properties or attributes that all objects of that class will have.

Submit
46. Which of the following is not a characteristic of a computer worm?

Explanation

A computer worm is a type of malicious software that can self-replicate and spread without any human intervention. It can infect other computers by exploiting vulnerabilities in the system. However, the characteristic of spreading through a process called side-loading is not associated with computer worms. Side-loading typically refers to the installation of apps from unofficial or third-party sources, which is more common in mobile devices. Computer worms usually spread through network connections or by exploiting software vulnerabilities.

Submit
47. Which type of device is the top target for ransomware?

Explanation

Smartphones are the top target for ransomware due to their widespread usage and the sensitive information they contain. Smartphones are highly connected devices that often store personal data, such as contacts, photos, and financial information. Additionally, many users do not have proper security measures in place, making them vulnerable to ransomware attacks. The popularity and prevalence of smartphones make them an attractive target for cybercriminals seeking to exploit vulnerabilities and extort money from users.

Submit
48. Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers?​

Explanation

B2C refers to business-to-consumer, which is an ecommerce classification that involves online storefronts selling merchandise and services directly to consumers. This means that the business sells its products or services directly to individual customers rather than to other businesses or organizations. B2C is commonly associated with retail websites where consumers can browse and purchase products online.

Submit
49. _______ applications provide optimal information when they encompass customer support, marketing, and sales.​

Explanation

CRM applications provide optimal information when they encompass customer support, marketing, and sales. CRM stands for Customer Relationship Management, and it is a technology that helps businesses manage interactions and relationships with their customers. By integrating customer support, marketing, and sales functions into a CRM application, businesses can have a comprehensive view of their customers and effectively manage their interactions throughout the customer journey. This allows them to provide personalized and targeted support, marketing campaigns, and sales strategies, ultimately leading to improved customer satisfaction and business performance.

Submit
50. ​Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.

Explanation

Dark data centers are an extension of lights-out management, which allows system administrators to monitor and manage servers using remote control software. Lights-out management refers to the ability to control and manage server hardware and software remotely, without the need for physical access to the servers. Dark data centers take this concept further by implementing energy-efficient practices and reducing the need for human intervention, resulting in reduced costs and improved efficiency.

Submit
51. ​Which of the following is an example of an authentication protocol?

Explanation

All of the above options are examples of authentication protocols. A password is a common method used to authenticate a user's identity by requiring them to enter a secret code. PINs (Personal Identification Numbers) serve a similar purpose, requiring the user to enter a unique numerical code to verify their identity. A fingerprint scanner is a biometric authentication protocol that uses the unique patterns on an individual's fingerprint to confirm their identity. Therefore, all three options mentioned (password, PINs, and fingerprint scanner) can be considered examples of authentication protocols.

Submit
52. Which of the following is not a core CRM system?

Explanation

A payment gateway is not considered a core CRM system because it is a separate system that handles financial transactions and the processing of payments. CRM systems, on the other hand, are focused on managing customer relationships and interactions. They typically include features such as sales management, customer support, and marketing automation. While a payment gateway may be integrated with a CRM system to facilitate payment processing, it is not a core component of CRM functionality.

Submit
53. The design phase of a SDLC includes all of the following except _________.​

Explanation

The design phase of a SDLC includes activities such as identifying potential solutions, selecting hardware and software, and developing application specifications. However, writing a requirements report is not typically part of the design phase. Instead, it is usually done during the initial planning or analysis phase of the SDLC, where the project requirements are gathered and documented.

Submit
54. Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers

Explanation

Encryption is the process of transforming a message or data file in such a way that its contents are hidden from unauthorized readers. It involves converting the original plaintext into ciphertext using an encryption algorithm and a key. The ciphertext can only be decrypted back into plaintext by authorized users who possess the correct decryption key. Encryption ensures the confidentiality and security of sensitive information by preventing unauthorized access and protecting it from being understood or intercepted by unauthorized individuals.

Submit
55. Spam accounts for approximately ______ of all email.

Explanation

Approximately 70% of all email is considered spam. This means that out of every 10 emails received, around 7 of them are likely to be spam. Spam refers to unsolicited or unwanted emails that are often sent in bulk, usually for advertising or fraudulent purposes. With such a high percentage, it highlights the significant issue of spam in the digital world and emphasizes the importance of spam filters and other measures to protect users from these unwanted messages.

Submit
56. ​A(n) ________________  takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

Explanation

An online intrusion refers to the unauthorized access of a digital device by exploiting vulnerabilities in hardware or software through an internet connection. This can occur when an individual gains access to a device without permission and uses the internet as a means to exploit weaknesses in the system. Online intrusions can lead to data breaches, theft of sensitive information, and compromise the security and privacy of the affected device or network.

Submit
57. A(n) _____________ is a group of people working together to accomplish a goal.​

Explanation

An organization is a group of people working together to accomplish a goal. It is a structured entity that brings individuals together, assigns roles and responsibilities, and establishes a framework for collaboration and coordination. Within an organization, individuals work towards a common objective, utilizing their skills and expertise to achieve desired outcomes. Whether it is a business, non-profit, government agency, or any other entity, organizations are formed to achieve specific goals and objectives through collective efforts.

Submit
58. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

Explanation

PUP stands for Potentially Unwanted Program, which is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed. These programs often come bundled with legitimate software and can include adware, browser hijackers, or other types of software that may display unwanted advertisements, track user behavior, or cause other disruptions to the user's computer.

Submit
59. Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

Explanation

All of the options mentioned can be used to block unauthorized access while allowing authorized communications on a device or network. A personal firewall is a software application that monitors and controls incoming and outgoing network traffic, blocking unauthorized access and protecting against malicious activities. Hardware that uses a NAT (Network Address Translation) can also provide security by hiding the internal IP addresses of devices on a network, making it difficult for unauthorized users to access them. A network router, on the other hand, can be configured to implement various security measures such as access control lists and virtual private networks (VPNs) to block unauthorized access and ensure authorized communications. Therefore, all of these options can effectively block unauthorized access while allowing authorized communications.

Submit
60. ​______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

Explanation

Social engineering is a deceptive practice that exploits human psychology by manipulating individuals into performing actions that may not be in their best interest. This can involve tactics such as impersonation, manipulation, or trickery to gain unauthorized access to sensitive information or systems. By exploiting human vulnerabilities, social engineering attacks can be highly effective in deceiving victims and compromising their security.

Submit
61. ​There are various encryption methods, but __________ is the encryption standard currently used worldwide.

Explanation

AES (Advanced Encryption Standard) is the encryption standard currently used worldwide. AES is a symmetric encryption algorithm that is widely adopted for securing sensitive data. It offers a high level of security and is used in various applications such as secure communication protocols, secure file transfer, and data encryption in databases. AES has become the de facto encryption standard due to its effectiveness, efficiency, and widespread support across different platforms and devices.

Submit
62. The _______________ paradigm describes aspects of a problem that lead to a solution.​​

Explanation

The declarative paradigm describes aspects of a problem that lead to a solution. In this paradigm, the focus is on specifying what needs to be achieved rather than how to achieve it. It emphasizes the use of logical statements and constraints to define the problem and let the computer figure out the solution. This approach allows for more flexibility and modularity in problem-solving, as it separates the problem description from the solution implementation. Procedural and object-oriented paradigms, on the other hand, are more concerned with the step-by-step instructions and the organization of code, respectively. Therefore, neither of them fully captures the idea of describing aspects of a problem that lead to a solution.

Submit
63. A(n) _________ is a graphical representation of the way a computer should progress from one instruction to the next when it performs a task.​

Explanation

A flowchart is a graphical representation that shows the sequential progression of instructions in a computer program or task. It uses different shapes and symbols to represent different types of instructions and decision points, allowing for a visual understanding of the logical flow of the program. By following the flowchart, one can easily trace the path from one instruction to the next, helping to ensure that the task is performed correctly and efficiently.

Submit
64. ​The best defense against malware is _____________.

Explanation

Antivirus software is the best defense against malware because it is specifically designed to detect, prevent, and remove malicious software from a computer system. Encryption and entropy can provide additional security measures, but they do not directly protect against malware. Antivirus software, on the other hand, actively scans for and eliminates malware, providing a comprehensive defense against potential threats. Therefore, choosing antivirus software as the best defense against malware is the most logical and accurate answer.

Submit
65. _________________ refers to the process of hiding the internal details of objects and their methods.​

Explanation

Encapsulation refers to the process of hiding the internal details of objects and their methods. It allows the implementation details of a class to be hidden from other classes, and only exposes a public interface through which other classes can interact with the object. This helps in achieving data hiding and protects the internal state of an object from being accessed directly by other classes. Encapsulation also provides the benefit of code modularity and allows for easier maintenance and updates to the codebase.

Submit
66. In addition to sales, CRM, and SCM, ERP modules support business activities such as _____________.​

Explanation

ERP modules support business activities such as product planning, manufacturing and purchasing, and inventory control and distribution. These modules are designed to integrate various aspects of a business, allowing for efficient management and coordination of different functions. With ERP, businesses can streamline their operations, ensure effective resource allocation, and enhance overall productivity. By encompassing all of the mentioned activities, ERP systems provide a comprehensive solution for managing and optimizing business processes.

Submit
67. Which of the following is a scripting language?

Explanation

All of the options listed (Ruby, Perl, PHP) are examples of scripting languages. Scripting languages are used to write scripts or programs that are interpreted and executed at runtime, rather than being compiled beforehand. These languages are typically used for tasks such as web development, automation, and system administration. Therefore, all of the options mentioned are correct answers as they are scripting languages.

Submit
68. The process of designing, entering, and testing the rules in an expert system is referred to as __________.​

Explanation

Knowledge engineering is the process of designing, entering, and testing the rules in an expert system. It involves gathering and organizing the knowledge from domain experts, encoding it into a knowledge base, and developing the inference engine to reason and make decisions based on that knowledge. This process ensures that the expert system is able to effectively mimic the decision-making capabilities of human experts in a specific domain.

Submit
69. A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

Explanation

A firewall is a device or software that is designed to block unauthorized access while allowing authorized communications. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Firewalls can prevent unauthorized access to a network by analyzing the source and destination of network packets and blocking any that do not meet the specified criteria. This helps to protect sensitive data and systems from malicious attacks and unauthorized access.

Submit
70. A(n) ________________ tells a computer what to do based on whether a condition is true or false

Explanation

A selection control structure is a programming construct that allows a computer to make decisions based on whether a condition is true or false. It enables the computer to choose between different paths of execution depending on the outcome of the condition. This control structure is commonly used in programming languages to implement if-else statements or switch statements, where different actions are taken based on the evaluation of a condition.

Submit
71. What is the process called when an app from a source other than an official app store is installed on a device?

Explanation

Side-loading refers to the process of installing an app on a device from a source other than an official app store. This can be done by downloading the app from a website or transferring it directly from another device. It is a common practice for Android devices, where users have the flexibility to install apps from third-party sources. Side-loading can be useful when certain apps are not available on official app stores or when users want to test beta versions of apps.

Submit
72. Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers?​

Explanation

TQM stands for Total Quality Management, which is a business practice initiated by top management to ensure quality assurance in every product and service offered to customers. It involves the participation of all employees and departments within the organization, emphasizing the importance of quality at every stage of the process. TQM aims to continuously improve and exceed customer expectations by implementing quality control measures, fostering a culture of quality, and involving all stakeholders in the pursuit of excellence.

Submit
73. ​__________ is the process of modifying an executable file or data stream by adding additional commands

Explanation

Code injection is the process of modifying an executable file or data stream by adding additional commands. This technique allows an attacker to insert malicious code into a legitimate program, which can then be executed by the system. Code injection can be used to exploit vulnerabilities in software and gain unauthorized access to a system or manipulate its behavior. It is a common method used in various types of attacks, such as SQL injection and cross-site scripting (XSS).

Submit
74. The maintenance phase of a SDLC includes all of the following except _________.​

Explanation

The maintenance phase of a SDLC includes activities such as making backups, optimizing for speed and security, and revising as necessary to meet business needs. However, converting data is not typically a part of the maintenance phase. Data conversion usually occurs during the implementation phase of the SDLC when transitioning from an old system to a new one.

Submit
75. ​____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

Explanation

Safe Browsing is a service provided by Google that verifies URLs against a database of suspicious website URLs. This service helps protect users from accessing harmful or malicious websites by warning them if a website is potentially unsafe. Safe Browsing works in the background, continuously scanning URLs and providing real-time protection to users while they browse the internet. It is an effective tool in preventing users from falling victim to phishing attacks, malware, and other online threats.

Submit
76. __________ changes an originating address or a destination address to redirect the flow of data between two parties.

Explanation

Address spoofing is the correct answer because it refers to the act of changing an originating address or a destination address to redirect the flow of data between two parties. This technique is commonly used by attackers to deceive or impersonate others, making it appear as if the data is coming from a different source or going to a different destination. By manipulating the addresses, the attacker can redirect the data to their own systems or manipulate the communication between the two parties.

Submit
77. ​A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.

Explanation

A rogue antivirus exploit typically starts with a warning about a virus and a suggestion to clean the infected device. This implies that the exploit tricks users into believing that their device is infected with a virus and offers a solution in the form of a fake antivirus program. Once the user installs the rogue antivirus, it may not only fail to protect the device but could also potentially cause harm by stealing personal information or introducing malware.

Submit
78. MITM attacks include which of the following?

Explanation

MITM attacks, or Man-in-the-Middle attacks, involve an attacker intercepting and manipulating communication between two parties without their knowledge. Address spoofing refers to forging the source IP address in a network packet to mislead the recipient. IMSI catchers are devices used to intercept mobile phone signals and gather information. Evil Twins are rogue Wi-Fi networks that mimic legitimate networks to deceive users into connecting to them. All of these techniques can be employed in MITM attacks to eavesdrop, manipulate, or steal sensitive information, making "all of the above" the correct answer.

Submit
79. A key component of an ecommerce application is an online _________.​

Explanation

An online cart is a crucial element of an ecommerce application as it allows users to select and store items they wish to purchase. It acts as a virtual shopping cart where users can add, remove, and modify their selected items before proceeding to checkout. The cart keeps track of the items, quantities, and prices, ensuring a smooth and organized shopping experience for customers. Therefore, the correct answer is "cart."

Submit
80. A password manager can store passwords in an encrypted file located at which of the following storage locations?

Explanation

A password manager can store passwords in an encrypted file located at all of the above storage locations. Local storage refers to storing the passwords on the device itself, cloud storage allows for remote storage and accessibility of passwords, and USB storage provides a portable option for storing passwords. Having the option to store passwords in multiple locations provides flexibility and convenience for users.

Submit
81. The planning phase of a SDLC includes all of the following except _________.​

Explanation

The planning phase of a SDLC includes justifying the project, assembling the project team, and producing a project development plan. These activities are essential for setting the foundation of the project and ensuring its success. However, writing a requirements report is not part of the planning phase. It typically occurs during the requirements gathering phase, where the project team collects and documents the necessary information to understand the project's scope and objectives.

Submit
82. In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.​

Explanation

In 1969, computer scientists began to develop high-level languages, called fourth-generation languages, which more closely resembled human languages. These languages were designed to be more user-friendly and intuitive, allowing programmers to write code in a way that was easier to understand and use. Fourth-generation languages typically included features such as natural language processing, graphical user interfaces, and database management capabilities, making them more accessible to a wider range of users.

Submit
83. ​_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

Explanation

The correct answer is "All of the above". DDoS (Distributed Denial of Service) attacks involve flooding a website with an overwhelming amount of traffic, making it unable to function properly. Botnets, which are networks of infected computers, can be used to carry out DDoS attacks. Additionally, the botmaster, who controls the botnet, can issue commands to launch such attacks. Therefore, all the options mentioned - DDoS, botnets, and commands from a botmaster - can be used to flood a website and disrupt its intended service.

Submit
84. Which of the following is not a step that a data breach victim should take?​

Explanation

A data breach victim should take several steps to protect themselves, including activating a fraud alert, getting informed about the breach, and changing passwords. However, purchasing a new computer or device is not necessary in response to a data breach. The breach does not necessarily mean that the victim's computer or device has been compromised, so buying a new one would not address the issue. Instead, the focus should be on securing personal information and monitoring for any suspicious activity.

Submit
85. The implementation phase of a SDLC includes all of the following except _________.​

Explanation

The implementation phase of a SDLC involves creating and testing applications, as well as purchasing or contracting for hardware and software. However, obtaining approval is not a specific task in the implementation phase. Approval is typically obtained during the planning or initiation phase of the SDLC, where the project is evaluated and approved to proceed. Therefore, obtaining approval is not included in the implementation phase.

Submit
86. Which of the following is not a programming paradigm?​

Explanation

The programming paradigms mentioned in the options are Declarative, Procedural, and Object-Oriented. These are well-known programming paradigms used in software development. However, "Predictive" is not a recognized programming paradigm. It is likely an incorrect option or a term that is not commonly used in the context of programming.

Submit
87. ​A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.

Explanation

A virus hoax usually arrives as an email message that contains warnings about a supposedly new virus. This means that the email is not actually carrying a harmful virus, but rather spreading false information and causing unnecessary panic. Hoaxes are typically created to deceive and mislead recipients, often with the intention of causing disruption or gaining attention. It is important to be cautious and verify the authenticity of such messages before taking any action.

Submit
88. Which of the following is not part of the analysis phase of a SDLC?

Explanation

The analysis phase of a SDLC involves studying the current system, determining system requirements, and writing a requirements report. These activities are focused on understanding the existing system and identifying the needs and specifications for the new system. Developing a project schedule, on the other hand, is typically part of the planning phase of the SDLC, where the project timeline and resources are determined.

Submit
89. ​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________  is an excellent option.

Explanation

A password manager is an excellent option if you prefer having unique and random passwords for each of your logins. It securely stores and manages all your passwords, allowing you to easily access them when needed. By using a password manager, you can ensure that your passwords are strong and not easily guessable, enhancing the security of your online accounts.

Submit
90. ___________ provides OO programs with easy extensibility and can help simplify program control structures.

Explanation

Polymorphism allows objects of different classes to be treated as objects of a common superclass. This enables the program to use a single interface to interact with multiple objects, regardless of their specific class. This simplifies program control structures by reducing the need for conditional statements and allowing for more flexible and extensible code. Therefore, polymorphism provides OO programs with easy extensibility and simplifies program control structures.

Submit
91. A transaction processing system is characterized by its ability to:​

Explanation

A transaction processing system is a system that is able to collect, display, modify, and store transactions. It is also capable of listing transactions. Therefore, the correct answer is "all of the above" as it encompasses all the mentioned characteristics of a transaction processing system.

Submit
92. Regarding OO programming, which of the following terms best matches with the term "method"?

Explanation

The term "method" in object-oriented programming refers to a function or subroutine that is associated with a class or object. It is used to define the behavior or actions that an object can perform. The other options listed (syntax, pseudocode, and algorithm) do not directly match with the term "method" in the context of object-oriented programming. The correct answer, "main()", represents the entry point of a program, where the execution begins.

Submit
93. ​A(n) __________ is a factor that remains the same throughout a program.

Explanation

A constant is a factor that remains the same throughout a program. Unlike variables, which can change their value, constants have a fixed value that does not change during the execution of the program. This allows programmers to define values that should not be altered, providing stability and consistency in the program's behavior.

Submit
94. The scope of an information system includes which of the following?​

Explanation

The scope of an information system includes computers, communications networks, and data because these are the technical components that make up the system. It also includes people and products because they are the users and consumers of the system. Additionally, policies and procedures are part of the scope because they dictate how the system should be used and managed. Therefore, all of the options listed are included in the scope of an information system.

Submit
95. Which of the following is not a characteristic of a management information system?​

Explanation

Collecting, displaying, and modifying transactions is a characteristic of a management information system. It allows the system to track and record various business transactions. Therefore, this option is not correct as it is a characteristic of a management information system.

Submit
96. In Prolog, the __________ describes the relationship between the _________ .​

Explanation

In Prolog, the predicate describes the relationship between the arguments. A predicate is a statement or a rule that defines a relationship between one or more arguments. It is used to represent facts or rules in Prolog programming. The arguments are the values or variables that are used as input to the predicate, and the predicate defines how these arguments are related or connected.

Submit
97. Industry standard tools for scheduling and project management include PERT, WBS, and ________.​

Explanation

Gantt charts are commonly used in project management to visually represent the schedule of tasks and their dependencies. They provide a clear overview of the project timeline, allowing project managers to allocate resources, track progress, and identify potential bottlenecks. Gantt charts are widely recognized and utilized in various industries as an effective tool for planning and managing projects.

Submit
98. Which of the following is not a characteristic for a good problem statement?

Explanation

A good problem statement should clearly specify the known information, specify when the problem has been solved, and specify any assumptions that define the scope of the problem. However, it should not contain detailed descriptions of the processes and tools that need to be developed. This is because a problem statement should focus on defining the problem itself, rather than providing specific solutions or implementation details. Detailed descriptions of processes and tools are more appropriate for a solution or implementation plan, rather than a problem statement.

Submit
99. ____________ is a term for a person who devises and carries out a scam in order to accomplish a goal.

Explanation

The term for a person who devises and carries out a scam in order to accomplish a goal is commonly known as a "scammer" or a "con artist". This refers to an individual who uses deception and fraudulent tactics to manipulate others and achieve their objectives. The options provided in the question, "Main-in-the-middle", "RAT", and "Internet worm" do not accurately describe this term.

Submit
100. ​Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

Explanation

Antivirus software can use heuristic analysis to detect malware by analyzing the characteristics and behavior of suspicious files. Heuristic analysis involves examining the code and behavior of a file to identify potential threats, even if they do not match a known virus signature. This technique allows antivirus software to detect new and unknown malware based on patterns and behaviors commonly associated with malicious software, providing an additional layer of protection against emerging threats.

Submit
101. The goal of the planning phase for an information system project is to create a(n) ____________.​

Explanation

The planning phase for an information system project aims to create a project development plan. This plan outlines the objectives, scope, deliverables, timeline, resources, and budget for the project. It serves as a roadmap for the project team, providing guidance on how the project will be executed and controlled. The project development plan helps ensure that all stakeholders are aligned and have a clear understanding of the project's goals and requirements.

Submit
102. A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code.

Explanation

VDE stands for Visual Development Environment. It is a software tool that provides programmers with a graphical interface and pre-built components to create software applications. With VDE, programmers can visually design and build substantial sections of a program by simply pointing and clicking, eliminating the need to manually type lines of code. This allows for faster and easier development, especially for those who are not proficient in coding or prefer a visual approach to programming.

Submit
103. Which programming language is an interpreted language most commonly used for client-side Web scripting, such as animating page elements and validating input on HTML forms?​

Explanation

JavaScript is an interpreted language commonly used for client-side web scripting. It is often used to animate page elements and validate input on HTML forms. JavaScript is executed by the web browser, allowing for dynamic and interactive web pages. It is different from programming languages like Prolog, Python, and Java, which are not primarily used for client-side web scripting.

Submit
104. In a problem statement, you can limit complexity by making ____________.​

Explanation

To limit complexity in a problem statement, one can make assumptions. By clearly defining the assumptions, it helps to narrow down the scope and focus of the problem. Assumptions provide a framework for understanding the problem and enable the problem solver to work within certain boundaries. This allows for a more manageable and structured approach to finding a solution. By making assumptions, unnecessary complexities and uncertainties can be eliminated, making the problem more feasible to solve.

Submit
105. In a repetition control structure, the computer is directed to repeat one or more instructions until a certain condition is met. The section of code that repeats is usually referred to as a(n) ___________.

Explanation

In a repetition control structure, the computer is directed to repeat one or more instructions until a certain condition is met. The section of code that repeats is usually referred to as an iteration.

Submit
106. Which of the following is not included in Michael Porter's Five Forces model?​

Explanation

Supply chain efficiency is not included in Michael Porter's Five Forces model. The Five Forces model focuses on analyzing the competitive forces within an industry that affect its profitability and attractiveness. These forces include the threat of new entrants, bargaining power of suppliers, bargaining power of buyers, threat of substitute products or services, and competitive rivalry. Supply chain efficiency, although important for a company's overall performance, is not specifically addressed in this model.

Submit
107. Finding a value for a variable is referred to as ___________.

Explanation

Instantiation refers to the process of creating an instance of a class or object in programming. It involves allocating memory for the object and initializing its variables. In the context of the question, finding a value for a variable involves creating an instance of the variable and assigning a specific value to it. Therefore, instantiation is the correct term to describe this process.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2016
    Quiz Created by
    Garciagisselle45
Cancel
  • All
    All (107)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A social engineering scam called ___________ is when a victim is...
Which ecommerce classification encompasses consumers selling...
A(n) __________ is available for use by any routine in the program...
The human-readable version of a program created in a high-level...
​A(n) ______________  attack exploits previously unknown...
Which of the following sequence of events best describes an online...
A(n) __________ is a section of code that is part of a program, but is...
Computer historians believe that ____________ was the first...
​To establish a(n) ________, hackers set up an unsecured Wi-Fi...
Which of the following is not a characteristic of a weak password?
Prolog allows you to ask open-ended questions by replacing constants...
Which type of problem requires human intuition as the basis for...
A(n) ___________ converts all the statements in a program in a single...
A(n) _____________  changes the order in which instructions are...
The current method of encrypting communication between a client and a...
Which type of security measure reduces the effect of an attack by...
____________ encompasses a broad set of activities that include...
__________-generation languages, such as COBOL and Fortran, were used...
 ​_____________ software shields certain applications against...
Three key concepts ensure good quality of service include all of the...
​A ___________  is malware that arrives in a trojan disguised...
Which of the following type of attack uses password-cracking software...
A(n) ___________ is the sequence of organizations, people, activities,...
Most modern transaction processing systems use ________...
Which type of security measure reduces the likelihood of a deliberate...
What is the term that refers to the sequence in which a computer...
The ________________ paradigm is based on the idea that the solution...
In the context of Prolog programming, a(n) ________________ is a...
A(n) __________  pings a packet of data to a port in order to see...
A(n) ____________ for a computer program is a set of steps that...
When antivirus software detects malware, which of the following would...
Which programming language is used for artificial intelligence...
Which of the following would be considered spyware?
After unit and integration testing are completed, _________ testing...
A low-level language has a low level of ___________ because it...
A cryptographic __________ is a procedure for encryption or...
The current standard for object-oriented documentation is referred to...
​A computer _________ is a set of self-replicating program...
​If you use a password manager, what do you as the user need to...
Which of the following is not a type of spam filter?
​Trojans depend on ________ to spread.
 _______________, such as BASIC, Python, Java, Prolog, and C++,...
The _____________ in a problem statement is the information that is...
The instructions that make up a computer program are sometimes...
A(n) _____________  defines the characteristics of a set of...
Which of the following is not a characteristic of a computer worm?
Which type of device is the top target for ransomware?
Which ecommerce classification encompasses online storefronts selling...
_______ applications provide optimal information when they encompass...
​Dark data centers are an extension of ___________, which allows...
​Which of the following is an example of an authentication protocol?
Which of the following is not a core CRM system?
The design phase of a SDLC includes all of the following except...
Which of the following terms would best match this definition:...
Spam accounts for approximately ______ of all email.
​A(n) ________________  takes place when an unauthorized person...
A(n) _____________ is a group of people working together to accomplish...
What is the term used to describe unwanted software that installs...
Which of the following can be used to block unauthorized access while...
​______________ is a deceptive practice that exploits human...
​There are various encryption methods, but __________ is the...
The _______________ paradigm describes aspects of a problem that lead...
A(n) _________ is a graphical representation of the way a computer...
​The best defense against malware is _____________.
_________________ refers to the process of hiding the internal details...
In addition to sales, CRM, and SCM, ERP modules support business...
Which of the following is a scripting language?
The process of designing, entering, and testing the rules in an expert...
A(n) __________ is a device or software that is designed to block...
A(n) ________________ tells a computer what to do based on whether a...
What is the process called when an app from a source other than an...
Which business practice is a technique initiated by top management...
​__________ is the process of modifying an executable file or data...
The maintenance phase of a SDLC includes all of the following except...
​____________ is a service offered by Google that checks URLs...
__________ changes an originating address or a destination address to...
​A ______________ exploit usually begins with a virus warning and an...
MITM attacks include which of the following?
A key component of an ecommerce application is an online _________.​
A password manager can store passwords in an encrypted file located at...
The planning phase of a SDLC includes all of the following except...
In 1969, computer scientists began to develop high-level languages,...
​_______ can be used to flood a Web site with so much traffic that...
Which of the following is not a step that a data breach victim should...
The implementation phase of a SDLC includes all of the following...
Which of the following is not a programming paradigm?​
​A virus __________ usually arrives as an email message that...
Which of the following is not part of the analysis phase of a SDLC?
​If you feel more secure with a totally random and unique password...
___________ provides OO programs with easy extensibility and can help...
A transaction processing system is characterized by its ability to:​
Regarding OO programming, which of the following terms best matches...
​A(n) __________ is a factor that remains the same throughout a...
The scope of an information system includes which of the following?​
Which of the following is not a characteristic of a management...
In Prolog, the __________ describes the relationship between the...
Industry standard tools for scheduling and project management include...
Which of the following is not a characteristic for a good problem...
____________ is a term for a person who devises and carries out a scam...
​Antivirus software can use techniques called__________ to detect...
The goal of the planning phase for an information system project is to...
A(n) _________ provides programmers with tools to build substantial...
Which programming language is an interpreted language most commonly...
In a problem statement, you can limit complexity by making...
In a repetition control structure, the computer is directed to repeat...
Which of the following is not included in Michael Porter's Five...
Finding a value for a variable is referred to as ___________.
Alert!

Advertisement