Test 3 On Chap 7+9+11

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Garciagisselle45
G
Garciagisselle45
Community Contributor
Quizzes Created: 2 | Total Attempts: 415
| Attempts: 228
SettingsSettings
Please wait...
  • 1/107 Questions

    A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.

    • Advance fee fraud
    • Pharming
    • Evil Twin
    • Address spoofing
Please wait...
Test 3 On Chap 7+9+11 - Quiz
About This Quiz

TEST 3 on chap 7+9+11 assesses knowledge on cybersecurity threats and preventive measures. It covers topics like computer viruses, anti-exploit software, authentication protocols, social engineering, and ransomware, focusing on understanding and preventing digital security breaches.


Quiz Preview

  • 2. 

    Which ecommerce classification encompasses consumers selling merchandise and services to each other?​

    • C2C

    • B2G

    • B2C

    • B2B

    Correct Answer
    A. C2C
    Explanation
    C2C stands for "consumer to consumer" and refers to the classification of ecommerce where consumers sell merchandise and services directly to each other. This type of ecommerce involves individuals or small businesses acting as both buyers and sellers, using online platforms or marketplaces to facilitate transactions. It allows individuals to monetize their unused or unwanted items by selling them to other consumers. C2C platforms often provide a convenient and accessible way for individuals to connect and engage in peer-to-peer transactions.

    Rate this question:

  • 3. 

    A(n) __________ is available for use by any routine in the program while a(n) _______________  can be accessed only from the routine in which it is defined.​

    • ​public attribute, class attribute

    • ​public attribute, private attribute

    • Private attribute, class attribute

    • Class attribute, public attribute

    Correct Answer
    A. ​public attribute, private attribute
    Explanation
    A public attribute is available for use by any routine in the program, meaning that it can be accessed and modified by any part of the program. On the other hand, a private attribute can only be accessed from the routine in which it is defined. This means that other routines or parts of the program cannot directly access or modify a private attribute, ensuring that it is encapsulated and protected within its defining routine.

    Rate this question:

  • 4. 

    The human-readable version of a program created in a high-level language by a programmer is called __________.​ 

    • Source code

    • Op code

    • Object code

    • Structured English

    Correct Answer
    A. Source code
    Explanation
    The human-readable version of a program created in a high-level language by a programmer is called source code. This refers to the written instructions and statements that are understandable by humans and can be written in programming languages such as Python, Java, or C++. It is the initial form of a program before it is compiled or interpreted into machine code that can be executed by a computer.

    Rate this question:

  • 5. 

    ​A(n) ______________  attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

    • Zero-day

    • Brute force

    • Dictionary

    • ​rootkit

    Correct Answer
    A. Zero-day
    Explanation
    A zero-day attack refers to an attack that takes advantage of vulnerabilities in software applications, hardware, and operating system program code that are previously unknown to the software vendor or developer. This means that the attack occurs before the developer has had a chance to develop a patch or fix for the vulnerability, giving the attacker an advantage.

    Rate this question:

  • 6. 

    Which of the following sequence of events best describes an online intrusion?

    • Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.

    • A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.

    • A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.

    • None of the above​

    Correct Answer
    A. Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
    Explanation
    This answer describes the most common sequence of events in an online intrusion. First, malware enters the device, usually through a malicious download or email attachment. Once inside, the malware opens a backdoor, creating a hidden entry point for the hacker. This backdoor then establishes an open communications link on the device, which the hacker can exploit to gain unauthorized access and carry out malicious activities. This sequence accurately represents the typical steps involved in an online intrusion.

    Rate this question:

  • 7. 

    A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.​

    • Function

    • Goto

    • Method

    • Iteration

    Correct Answer
    A. Function
    Explanation
    A function is a section of code that is part of a program but is not included in the main sequential execution path. Functions are used to group and organize code into reusable blocks that can be called upon when needed. They allow for modular programming and help to improve code readability and maintainability.

    Rate this question:

  • 8. 

    Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.

    • ​SIMULA

    • Python

    • ​Java

    • COBOL

    Correct Answer
    A. ​SIMULA
    Explanation
    SIMULA is believed to be the first programming language to work with objects, classes, inheritance, and methods. Computer historians credit SIMULA with introducing the concept of object-oriented programming (OOP) and providing the foundation for modern OOP languages like Java and Python. SIMULA was developed in the 1960s by Ole-Johan Dahl and Kristen Nygaard at the Norwegian Computing Center. It allowed programmers to define classes, create objects, and use inheritance to create new classes. SIMULA's influence on subsequent programming languages makes it the most likely answer to the question.

    Rate this question:

  • 9. 

    ​To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

    • Keylogger

    • Evil Twin

    • ​botnet

    • None of the above

    Correct Answer
    A. Evil Twin
    Explanation
    An Evil Twin is a type of cyber attack where hackers set up a fake Wi-Fi hotspot that appears to be legitimate. They make it unsecured and provide an Internet connection to lure unsuspecting users to connect to it. Once connected, the hackers can intercept and monitor the users' online activities, steal sensitive information, or carry out other malicious activities. This type of attack is often used to perform identity theft or gain unauthorized access to personal or corporate networks.

    Rate this question:

  • 10. 

    Which of the following is not a characteristic of a weak password?

    • Any sequence that includes a user name

    • Eight characters in length and include one or more uppercase letters, numbers, and symbols

    • Use of words from a dictionary

    • Uses default passwords such as password, admin, system, and guest.

    Correct Answer
    A. Eight characters in length and include one or more uppercase letters, numbers, and symbols
    Explanation
    The given answer, "Eight characters in length and include one or more uppercase letters, numbers, and symbols," is not a characteristic of a weak password because it meets the criteria of being strong. A weak password is usually easy to guess or crack, and it often includes common words, dictionary terms, or default passwords. However, a password that is eight characters long and includes a combination of uppercase letters, numbers, and symbols is considered strong and more difficult to guess or crack.

    Rate this question:

  • 11. 

    Which type of problem requires human intuition as the basis for finding a solution.

    • ​Structured

    • Unstructured

    • ​Semi-structured

    • None of the above

    Correct Answer
    A. Unstructured
    Explanation
    Unstructured problems are those that do not have a clear set of steps or rules to follow in order to find a solution. These problems often require human intuition and creativity to come up with a solution. In contrast, structured problems have well-defined procedures and steps, while semi-structured problems have some elements of structure but also require some level of intuition. Therefore, the correct answer is unstructured, as it specifically mentions the need for human intuition as the basis for finding a solution.

    Rate this question:

  • 12. 

    A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.​

    • ​interpreter, compiler

    • Compiler, object code

    • Constant, variable

    • Object code, compiler

    Correct Answer
    A. Compiler, object code
    Explanation
    A compiler is a program that converts all the statements in a program in a single batch. The resulting collection of instructions, called object code, is then placed in a new file. This object code can be directly executed by the computer's hardware.

    Rate this question:

  • 13. 

    Prolog allows you to ask open-ended questions by replacing constants with __________.​

    • Parameters

    • Variables

    • Functions

    • Rules

    Correct Answer
    A. Variables
    Explanation
    Prolog allows you to ask open-ended questions by replacing constants with variables. Variables in Prolog can be used to represent unknown values or placeholders in queries, allowing for flexible and dynamic querying of the database. By replacing constants with variables, you can ask Prolog to find all possible values that satisfy certain conditions, enabling open-ended exploration and discovery of information.

    Rate this question:

  • 14. 

    The current method of encrypting communication between a client and a server depends on a security protocol called _______

    • ​TLS

    • PUP

    • RAT

    • AES

    Correct Answer
    A. ​TLS
    Explanation
    The correct answer is TLS. TLS stands for Transport Layer Security, which is a security protocol used to encrypt communication between a client and a server. It ensures that the data transmitted between the two parties is secure and protected from unauthorized access or tampering. TLS is widely used in internet communication, such as secure web browsing (HTTPS), email transmission, and virtual private networks (VPNs). It provides authentication, confidentiality, and integrity of the data being transmitted, making it an essential component of secure communication.

    Rate this question:

  • 15. 

    A(n) _____________  changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.​

    • Sequence control structure

    • Sequential execution

    • Formal method

    • Programming paradigm

    Correct Answer
    A. Sequence control structure
    Explanation
    A sequence control structure changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program. This means that instead of executing instructions in a linear, sequential manner, the sequence control structure allows for branching and looping, enabling the program to make decisions and repeat certain instructions based on specific conditions.

    Rate this question:

  • 16. 

     ​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

    • Malware

    • Anti-exploit

    • Antivirus

    • Virus Signature

    Correct Answer
    A. Anti-exploit
    Explanation
    Anti-exploit software is designed to protect certain applications from common behaviors exhibited by intrusions. It specifically focuses on identifying and preventing exploits, which are techniques used by attackers to take advantage of vulnerabilities in software or systems. By proactively detecting and blocking these exploits, anti-exploit software helps to safeguard applications and prevent unauthorized access or damage caused by intrusions.

    Rate this question:

  • 17. 

    Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?

    • Corrective procedures

    • Deterrents

    • Detection activities

    • Preventive countermeasures​

    Correct Answer
    A. Corrective procedures
    Explanation
    Corrective procedures refer to security measures that are implemented after an attack has occurred to mitigate its effects. In this case, using data backups, disaster recovery plans, and redundant hardware devices can help in restoring the systems and data affected by the attack and minimize the impact of the attack. These measures do not prevent the attack from happening but rather focus on recovering from it and reducing the damage caused.

    Rate this question:

  • 18. 

    ____________ encompasses a broad set of activities that include planning, coding, testing, and documenting while a related activity, __________, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability.​

    • Software engineering, computer programming

    • Computer programming, software engineering

    • Application programming, systems programming

    • Systems programming, application programming

    Correct Answer
    A. Computer programming, software engineering
    Explanation
    Computer programming refers to the process of writing code to create computer software. It involves activities such as planning, coding, testing, and documenting. On the other hand, software engineering is a development process that utilizes mathematical, engineering, and management techniques to make computer programs more cost-effective, less complex, and more reliable and modifiable. Therefore, the correct answer is "Computer programming, software engineering."

    Rate this question:

  • 19. 

    __________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications

    • ​First

    • Third

    • Fourth

    • Second

    Correct Answer
    A. Third
    Explanation
    The given statement suggests that "Third-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications." This implies that these languages were widely utilized in both the business and scientific fields. The term "Third-generation" refers to a specific era or category of programming languages, indicating that they were developed after the earlier generations of languages. Therefore, the correct answer is "Third."

    Rate this question:

  • 20. 

    ​A ___________  is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker

    • ​TLS

    • ​RAT

    • PUP

    • DDoS

    Correct Answer
    A. ​RAT
    Explanation
    A Remote Access Trojan (RAT) is a type of malware that disguises itself as legitimate software and allows hackers to gain unauthorized access to a computer system. Once installed, a RAT establishes a covert communication channel with the hacker, enabling them to remotely control the infected system and carry out various malicious activities without the user's knowledge.

    Rate this question:

  • 21. 

    Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols

    • Entropy

    • ​brute force

    • Massive

    • ​dictionary

    Correct Answer
    A. ​brute force
    Explanation
    Brute force attack is a type of attack that uses password-cracking software to generate every possible combination of letters, numerals, and symbols. This method is time-consuming and requires a lot of computational power, but it is effective in breaking weak passwords. It systematically tries all possible combinations until the correct password is found. This attack is often used when there is no other information available about the password, and it is a common technique employed by hackers to gain unauthorized access to systems or accounts.

    Rate this question:

  • 22. 

    Three key concepts ensure good quality of service include all of the following except _______ .​

    • ​reliability

    • Convertibility

    • ​availability

    • Serviceability

    Correct Answer
    A. Convertibility
    Explanation
    The question asks for the concept that does not ensure good quality of service. Reliability, availability, and serviceability are all important factors in ensuring good quality of service. However, convertibility does not directly contribute to the quality of service. Convertibility refers to the ability of a system or service to be easily adapted or transformed into different forms or formats, which is not directly related to the quality of service provided.

    Rate this question:

  • 23. 

    A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.​

    • ​​ecommerce application

    • Supply chain

    • Payment processing routine

    • ​payment gateway

    Correct Answer
    A. Supply chain
    Explanation
    A supply chain refers to the entire process involved in the movement of a product or service from the supplier to the customer. It includes various organizations, people, activities, information, and resources that are necessary for the smooth flow of goods or services. This can include suppliers, manufacturers, distributors, retailers, and transportation companies, among others. The supply chain ensures that the product reaches the customer in a timely and efficient manner, taking into account factors such as sourcing, production, inventory management, and logistics.

    Rate this question:

  • 24. 

    Most modern transaction processing systems use ________ processing—a real-time method in which each transaction is processed as it is entered.​

    • Batch

    • Online

    • Inline

    • None of the above

    Correct Answer
    A. Online
    Explanation
    Most modern transaction processing systems use online processing, which means that each transaction is processed in real-time as it is entered. This method allows for immediate processing and response to transactions, ensuring that data is up to date and accurate. Batch processing, on the other hand, involves collecting a group of transactions and processing them together at a later time. Inline processing is not a commonly used term in transaction processing systems. Therefore, the correct answer is online.

    Rate this question:

  • 25. 

    Which type of security measure reduces the likelihood of a deliberate attack?​

    • Detection activities

    • ​Deterrents

    • Preventive countermeasures

    • ​Corrective procedures

    Correct Answer
    A. ​Deterrents
    Explanation
    Deterrents are security measures that are designed to discourage potential attackers from attempting to carry out a deliberate attack. These measures can include physical barriers, warning signs, surveillance systems, or security personnel. By implementing deterrents, the likelihood of a deliberate attack is reduced because potential attackers are deterred by the visible presence of security measures and the perceived risk of getting caught or facing consequences.

    Rate this question:

  • 26. 

    What is the term that refers to the sequence in which a computer executes program instructions?

    • Control structure

    • Flow control

    • Walkthrough

    • None of the above

    Correct Answer
    A. Flow control
    Explanation
    Flow control refers to the sequence in which a computer executes program instructions. It determines the order in which statements and instructions are executed, allowing the program to make decisions and repeat certain actions based on specific conditions. Flow control is essential for controlling the flow of execution in a program and ensuring that instructions are executed in the desired order.

    Rate this question:

  • 27. 

    The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.​

    • Declarative

    • Object-oriented

    • Procedural

    • None of the above

    Correct Answer
    A. Object-oriented
    Explanation
    The object-oriented paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other. This means that the problem is approached by identifying the objects involved, defining their attributes and behaviors, and modeling their interactions. This paradigm allows for the encapsulation of data and methods within objects, promoting code reusability and modularity. It also emphasizes concepts such as inheritance, polymorphism, and encapsulation, which help in creating flexible and scalable solutions.

    Rate this question:

  • 28. 

    In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.​​

    • ​selection control structure

    • Decision table

    • Storyboard

    • ​formal method

    Correct Answer
    A. Decision table
    Explanation
    A decision table is a tabular method commonly used in Prolog programming to visualize and specify rules based on multiple factors. It allows programmers to organize and analyze different combinations of inputs and their corresponding outputs, making it easier to understand and implement complex logical rules. By using a decision table, programmers can efficiently represent and evaluate various conditions and actions, making their code more structured and manageable.

    Rate this question:

  • 29. 

    A(n) __________  pings a packet of data to a port in order to see if that port is open or not.

    • Heuristic analysis

    • ​port scan

    • Virus signature

    • ​rootkit

    Correct Answer
    A. ​port scan
    Explanation
    A port scan is a technique used to check if a specific port on a computer or network is open or closed. It involves sending a packet of data to the target port and analyzing the response. If a response is received, it indicates that the port is open and accessible. This is commonly used by network administrators to identify potential vulnerabilities in a system or to ensure that certain ports are properly configured and accessible.

    Rate this question:

  • 30. 

    When antivirus software detects malware, which of the following would not be a course of action you could take?

    • Repair the infection.

    • Conduct a heuristic analysis.

    • Put the infected file into quarantine.

    • Delete the infected file.

    Correct Answer
    A. Conduct a heuristic analysis.
    Explanation
    Conducting a heuristic analysis is not a course of action that can be taken when antivirus software detects malware. Heuristic analysis is a method used by antivirus software to identify new and unknown threats based on behavioral patterns. However, once malware is detected, the appropriate actions would be to repair the infection, put the infected file into quarantine, or delete the infected file to prevent further damage.

    Rate this question:

  • 31. 

    A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.​

    • Control

    • Algorithm

    • Syntax

    • Parameter

    Correct Answer
    A. Algorithm
    Explanation
    An algorithm for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution. It serves as a guide or a roadmap for the program to follow in order to solve the problem at hand. Algorithms are essential in programming as they provide a systematic approach to problem-solving and help ensure that the program performs the desired tasks accurately and efficiently.

    Rate this question:

  • 32. 

    Which programming language is used for artificial intelligence applications and expert systems?

    • C++

    • Prolog

    • COBOL

    • Objective C

    Correct Answer
    A. Prolog
    Explanation
    Prolog is a programming language that is commonly used for artificial intelligence applications and expert systems. It is a logic-based language that excels in handling complex problem-solving and reasoning tasks. Prolog's built-in support for pattern matching and backtracking makes it well-suited for tasks such as natural language processing, expert systems, and rule-based decision making. Its declarative nature allows programmers to focus on describing the problem domain rather than the specific steps to solve it. This makes Prolog a popular choice for AI applications that require intelligent reasoning and inference capabilities.

    Rate this question:

  • 33. 

    Which of the following would be considered spyware?

    • A keylogger

    • Firewall software

    • ​Antivirus software

    • ​all of the above

    Correct Answer
    A. A keylogger
    Explanation
    A keylogger would be considered spyware because it is a type of malicious software that records keystrokes on a computer without the user's knowledge or consent. This allows the attacker to capture sensitive information such as passwords, credit card numbers, and other personal data. Unlike firewall and antivirus software, which are designed to protect against unauthorized access and malware, a keylogger is specifically designed to secretly monitor and steal information. Therefore, it falls under the category of spyware.

    Rate this question:

  • 34. 

    After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.​

    • Application

    • System

    • Unit

    • Integration

    Correct Answer
    A. System
    Explanation
    After unit and integration testing are completed, system testing ensures that all hardware and software components work together. This type of testing focuses on evaluating the system as a whole, rather than individual components or modules. It aims to identify any issues or conflicts that may arise when different components interact with each other. System testing helps to ensure that the entire system functions correctly and meets the desired requirements and specifications.

    Rate this question:

  • 35. 

    A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.​

    • Iteration

    • Abstraction

    • ​syntax

    • ​flow control

    Correct Answer
    A. Abstraction
    Explanation
    A low-level language has a low level of abstraction because it includes commands specific to a particular CPU or microprocessor family. This means that the language is closely tied to the hardware and does not provide high-level concepts or abstractions that make programming easier and more efficient. Instead, programmers using low-level languages have to work with detailed instructions and directly manipulate the hardware, which can be time-consuming and error-prone.

    Rate this question:

  • 36. 

    ​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

    • Trojan

    • Virus

    • Worm

    • All of the bove

    Correct Answer
    A. Virus
    Explanation
    A computer virus is a type of malicious software that can replicate itself and attach to legitimate executable files on a host device without the user's knowledge or consent. Unlike trojans and worms, viruses have the ability to self-replicate and spread to other files and devices, causing harm to the system. Therefore, the correct answer is virus.

    Rate this question:

  • 37. 

    A cryptographic __________ is a procedure for encryption or decryption.

    • ​ciphertext

    • Firewall

    • Algorithm

    • Key

    Correct Answer
    A. Algorithm
    Explanation
    An algorithm is a procedure that is used for encryption or decryption in cryptography. It is a set of well-defined steps or rules that determine how data is transformed from its original form to a secure, encrypted form or vice versa. Algorithms play a crucial role in ensuring the confidentiality and integrity of sensitive information by providing a systematic and reliable way to encrypt and decrypt data.

    Rate this question:

  • 38. 

    ​If you use a password manager, what do you as the user need to remember?

    • Your passwords for individual sites.

    • ​The master password

    • ​Form data including credit card numbers.

    • All of the above

    Correct Answer
    A. ​The master password
    Explanation
    The correct answer is the master password. When using a password manager, the user only needs to remember the master password, which grants access to all the stored passwords for individual sites and any other form data, including credit card numbers. The master password acts as the key to unlock and secure all the stored information in the password manager.

    Rate this question:

  • 39. 

    The current standard for object-oriented documentation is referred to as ______.​

    • XML

    • UML

    • HTML

    • DSS

    Correct Answer
    A. UML
    Explanation
    The current standard for object-oriented documentation is UML. UML, which stands for Unified Modeling Language, is a visual modeling language used to design and document software systems. It provides a standardized way to represent the structure, behavior, and relationships of different components within a system. UML diagrams can be used to communicate complex ideas and concepts in a clear and concise manner, making it an essential tool for software developers and designers.

    Rate this question:

  • 40. 

    Which of the following is not a type of spam filter?

    • Permission

    • ​Blacklist

    • Entropy

    • Content

    Correct Answer
    A. Entropy
    Explanation
    Entropy is not a type of spam filter. Spam filters typically use various techniques such as permission-based filtering, blacklisting, and content analysis to identify and block spam emails. Entropy, on the other hand, is a statistical measure of randomness or disorder within a system. It is not directly related to spam filtering and does not play a role in identifying or blocking spam emails.

    Rate this question:

  • 41. 

    ​Trojans depend on ________ to spread.

    • ​social engineering

    • ​rootkits

    • Code injection

    • Self-replication

    Correct Answer
    A. ​social engineering
    Explanation
    Trojans depend on social engineering to spread. Social engineering involves manipulating and deceiving individuals into performing certain actions, such as clicking on a malicious link or downloading an infected file. Trojans often disguise themselves as legitimate or desirable programs, tricking users into unknowingly installing them. This method of spreading relies on human interaction and psychological manipulation rather than exploiting technical vulnerabilities.

    Rate this question:

  • 42. 

     _______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.​

    • ​Low-level languages

    • ​High-level languages

    • Multiparadigm languages

    • First generation languages

    Correct Answer
    A. ​High-level languages
    Explanation
    High-level languages, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. These languages provide a higher level of abstraction, allowing programmers to focus more on problem-solving rather than dealing with low-level details of the computer's architecture. They offer a more user-friendly syntax and often come with built-in libraries and tools that simplify common programming tasks.

    Rate this question:

  • 43. 

    The _____________ in a problem statement is the information that is supplied to the computer to help it solve a problem

    • Algorithm

    • ​predicate

    • ​known information

    • ​assumption

    Correct Answer
    A. ​known information
    Explanation
    The known information in a problem statement refers to the data or facts that are provided to the computer to assist in solving the problem. This information serves as the initial input for the computer's algorithms and processes, allowing it to perform calculations and make decisions based on the given data. By utilizing the known information, the computer can effectively analyze the problem and generate a solution.

    Rate this question:

  • 44. 

    The instructions that make up a computer program are sometimes referred to as __________.​

    • Code

    • Control

    • Encapsulation

    • Function

    Correct Answer
    A. Code
    Explanation
    The instructions that make up a computer program are commonly known as code. Code consists of a set of commands or statements that tell the computer what actions to perform. It is written using a programming language and is executed by the computer to carry out specific tasks or calculations. Code is essential for the functioning of any computer program as it provides the necessary instructions for the computer to follow.

    Rate this question:

  • 45. 

    A(n) _____________  defines the characteristics of a set of objects.

    • ​function

    • Class attribute

    • Method

    • Control structure

    Correct Answer
    A. Class attribute
    Explanation
    A class attribute is a variable that defines the characteristics of a set of objects. It is a property or data member that belongs to a class and is shared by all instances of that class. It defines the common properties or attributes that all objects of that class will have.

    Rate this question:

  • 46. 

    Which type of device is the top target for ransomware?

    • Desktops

    • ​Laptops

    • Smartphones

    • All of the above

    Correct Answer
    A. Smartphones
    Explanation
    Smartphones are the top target for ransomware due to their widespread usage and the sensitive information they contain. Smartphones are highly connected devices that often store personal data, such as contacts, photos, and financial information. Additionally, many users do not have proper security measures in place, making them vulnerable to ransomware attacks. The popularity and prevalence of smartphones make them an attractive target for cybercriminals seeking to exploit vulnerabilities and extort money from users.

    Rate this question:

  • 47. 

    Which of the following is not a characteristic of a computer worm?

    • Self-replicating

    • Spread through a process called side-loading

    • Self-distributing

    • Usually standalone executable programs

    Correct Answer
    A. Spread through a process called side-loading
    Explanation
    A computer worm is a type of malicious software that can self-replicate and spread without any human intervention. It can infect other computers by exploiting vulnerabilities in the system. However, the characteristic of spreading through a process called side-loading is not associated with computer worms. Side-loading typically refers to the installation of apps from unofficial or third-party sources, which is more common in mobile devices. Computer worms usually spread through network connections or by exploiting software vulnerabilities.

    Rate this question:

  • 48. 

    ​Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.

    • ​colocation

    • Fuzzy logic

    • ​lights-out management

    • ​none of the above

    Correct Answer
    A. ​lights-out management
    Explanation
    Dark data centers are an extension of lights-out management, which allows system administrators to monitor and manage servers using remote control software. Lights-out management refers to the ability to control and manage server hardware and software remotely, without the need for physical access to the servers. Dark data centers take this concept further by implementing energy-efficient practices and reducing the need for human intervention, resulting in reduced costs and improved efficiency.

    Rate this question:

  • 49. 

    Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers?​

    • C2C

    • B2B

    • B2C

    • B2G

    Correct Answer
    A. B2C
    Explanation
    B2C refers to business-to-consumer, which is an ecommerce classification that involves online storefronts selling merchandise and services directly to consumers. This means that the business sells its products or services directly to individual customers rather than to other businesses or organizations. B2C is commonly associated with retail websites where consumers can browse and purchase products online.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2016
    Quiz Created by
    Garciagisselle45
Back to Top Back to top
Advertisement