CIS 1015 - Fundamental Concepts in Computer Science

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

What is the best reason to use a flat file instead of a database?

To exchange information between systems

2
New cards

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?

USB 3.0

3
New cards

Which of the following poses a higher risk to ensuring business continuity?

A converged network

4
New cards

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?

The number of rows

5
New cards

Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?

One-time purchases do not include full-feature upgrades.

6
New cards

What's a true statement about variables?

A variable can have any data type that the programming language supports.

7
New cards

An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?

HDMI

8
New cards

What is the easiest way to install a standard mouse, and configure it to use basic settings?

Use Control Panel/Settings.

9
New cards

A programmer's task is to analyze a colleague's pseudocode and make it better. What will the programmer try to do?

Make it more compact and efficient.

10
New cards

Which of the following encrypts data at rest?

File-level encryption

11
New cards

What is the advantage of DAS (Direct Attached Storage) over NAS (Network Attached Storage)?

DAS is less expensive.

12
New cards

What is an example of "processing" in a computer system?

Data is written to memory and manipulated by the CPU.

13
New cards

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?

Internet

14
New cards

An office building is using a Wi-Fi access point. The computer used to configure the access point's device options is located on the other side of the building. What does a technician need to make it work?

IP address of the web configuration page

15
New cards

What is a downside to digital products?

Digital products are easy to copy and steal.

16
New cards

Which statement holds true about a desktop/workstation when comparing it to a server?

Servers use the same type of components as a desktop.

17
New cards

What storage technology do SSDs (Solid State Drives) use?

Flash memory

18
New cards

Why would a programmer create a function instead of a procedure?

The process which calls the function needs to receive back a return value.

19
New cards

What is a true statement about interpreters and interpreted programming languages?

An interpreter converts the program into machine code at runtime.

20
New cards

What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system?

5120 MB

21
New cards

A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under?

Process management

22
New cards

What is an example of a cloud hosted application?

Google mail

23
New cards

When using web search engines, why should privacy considerations affect a user's decisions?

A user's web searches can reveal very valuable information.

24
New cards

The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant's desktop computer?

One-tier

25
New cards

A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?

User interface and programmatic access

26
New cards

What is a clean uninstall of a program?

Removing files and settings manually

27
New cards

Which of the following does NOT encrypt web page data?

Mobile device encryption

28
New cards

Why would a locally installed application store data files in a user folder and not the application folder?

To prevent users from modifying application folders

29
New cards

Which notation is a more efficient method to express large numbers?

Hexadecimal

30
New cards

Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?

Requiring a fob

31
New cards

What problem is Windows' UAC (User Account Control) designed to solve?

Elevated privileges

32
New cards

How do the CPU (Central Processing Unit) and storage devices in a computer process data?

As zeros and ones

33
New cards

A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do?

Use a Virtual Private Network.

34
New cards

What is a proper example of a string definition?

"It is polite to say \"Thank you\""

35
New cards

In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?

Table

36
New cards

What do the instructions in this pseudocode do?

declare Animal(9) as String

For i = 0 to 9

If i > 5 Then

Animal(i) = "dog"

Else

Animal(i) = "cat"

End If

Next

Set the first 6 elements of the array Animal to "cat", and the rest to "dog".

37
New cards

What is the second step in CompTIA's troubleshooting model?

Research knowledge base/Internet, if applicable.

38
New cards

Which of these practices is unsecure as your security becomes dependent on other organizations' security measures?

Reusing across sites

39
New cards

Why is it important to write data to a storage device, such as a hard disk?

Data stored in system memory is only preserved while the computer is powered on.

40
New cards

Convert the decimal number 35 into binary notation.

100011

41
New cards

Which of the following measures their data transfer capacity in Mbps (megabits per second)?

Wireless networks

42
New cards

Which document contains the information about how the software vendor will use any data that the software gathers and processes?

Software agreement

43
New cards

What indicates that a website has a highly trusted certificate?

Green padlock icon in front of address bar

44
New cards

What is the term for the processing speed of 1 billion cycles per second?

GHz

45
New cards

What does bps measure?

Throughput rate

46
New cards

A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?

Create a table called Customers, with fields called Name, Address, Phone, and Email.

47
New cards

How much storage does a character data type use?

1 byte

48
New cards

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?

DROP

49
New cards

A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customers' purchases in this database?

Create 2 new tables: Products and Purchases.

50
New cards

What is true about firewalls?

A firewall provides a way to restrict access to a computer or network.

51
New cards

A user's Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action?

Install the browser which is fully supported by the application.

52
New cards

A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?

Concurrent license

53
New cards

Which of the following is the best example of variety of data in a database?

A table with a string, number, and date fields

54
New cards

What type of language has working with datasets as its primary purpose?

Query

55
New cards

Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?

NFC

56
New cards

What is the difference between a software product key and a product ID?

The product key activates the software, and the product ID is for technical support.

57
New cards

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

Write a company policy and procedure for escorting visitors.

58
New cards

Which of the following ways best defeats social engineering?

Training end-users how to identify and report suspicious activity on the network or workstation

59
New cards

What is an authorization policy that would help a systems administrator grant rights to users to perform their job and no more?

Least privilege

60
New cards

What does a programmer use to visualize a program sequence?

Flow chart

61
New cards

When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?

Password managers

62
New cards

An employer fires an end-user for hijacking another employee's user account. Which of the following does NOT provide non-repudiation to the employer?

A guest user account

63
New cards

What's the difference between scripted and scripting languages?

Scripting languages are for configuring an operating system.

64
New cards

declare MinutesPerHour as Number = 60

A constant

65
New cards

Which of the following authentication factors is an example of something you have?

A software token

66
New cards

Which of the following is NOT true about critical data when configuring file backups?

Replication allows critical data backup, which protects from accidental deletion of a record.

67
New cards

How can a user belong to a group account and inherit security permissions in a workgroup?

Through privileges allocated to the groups

68
New cards

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?

800

69
New cards

What is the main cause of memory leaks?

Programming errors

70
New cards

Which protocol supports interactive mechanisms GET and POST?

HTTP

71
New cards

Which of the following helps protect against dangerous unsolicited email file attachment threats?

Using anti-malware

72
New cards

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?

The enclosure provides ports to connect the drive to the computer.

73
New cards

What is the difference between DropBox and OneDrive?

OneDrive is built into the Windows OS.

74
New cards

Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?

Satellite systems provide bigger areas of coverage.

75
New cards

Which of the following is NOT part of IoT (Internet of Things) home automation?

Insulin pump