GRADED A+
✔✔Regarding computer protection, quarantining is defined as ________. - ✔✔placing a
found virus in a secure area on the hard drive
✔✔Which is NOT one of the four key pieces of personal information you should protect
from identity thieves?
Anniversary
Social Security number
Date of birth
Street address - ✔✔Anniversary
✔✔Which of the following is NOT an example of a factor used in multi-factor
authentication?
A password
A captcha
An ID card
A fingerprint - ✔✔captcha
✔✔Computer ________ involves identifying, extracting, preserving, and documenting
computer evidence. - ✔✔forensics
✔✔Which type of backup ensures you capture a complete snapshot of everything that
makes your computer run? - ✔✔Image
✔✔I. packet filtering
II. IP address
III. firewall
IV. CAPTCHA
V. biometric authentication device
A. program that generates distorted text and requires that it be typed into a box
B. reads a unique personal characteristic and converts its pattern to a digital code
C. hardware or software for protecting computers from hackers
D. a computer's numeric ID on the Internet
E. method for selectively allowing certain requests to access ports - ✔✔E, D, C, A, B
✔✔What is the first step of the system development life cycle (SDLC)? - ✔✔Problem
and Opportunity Identification
✔✔________ is the process of translating a task into a series of commands that a
computer will use to perform the task. - ✔✔programming
, ✔✔The set of specific, sequential steps that describe exactly what a computer program
must do to complete the work is called a(n) ________. - ✔✔algorithm
✔✔Translating an algorithm into a programming language is called ________. -
✔✔coding
✔✔Which of the following provides a visual representation of the patterns of an
algorithm? - ✔✔Flowchart
✔✔A loop decision point for an algorithm consists of three features: an initial value, a
set of actions to be performed, and a(n) ________. - ✔✔test condition
✔✔The capability of moving a completed programming solution easily from one type of
computer to another is known as ________. - ✔✔portability
✔✔Special symbols called tags are used in which of the following languages? -
✔✔HTML/XHTML
✔✔The process that converts program code into machine language is called ________.
- ✔✔compilation
✔✔I. pseudocode
II. error handling
III. source code
IV. binary decision
V. variable
A. program instructions written in a higher-level language
B. text-based approach to documenting an algorithm
C. item allocated storage space in RAM
D. managing what a program should do if input data is invalid
E. can be answered in only two ways (for example, yes/no) - ✔✔B, D, A, E, C
✔✔In a database an attribute or field is a: - ✔✔column
✔✔Which is true about a row in a table?
A technical term for a row is a tuple.
A row is often called a record.
A row is an entity instance, defining one particular object.
all of the above - ✔✔all of the above
✔✔The key field for the student database on a campus is probably the student: - ✔✔ID
✔✔For two tables to be related, they must share a common field. - ✔✔True