AND SOLUTIONS RATED A+
✔✔A field's data type determines what kind of information can be stored there. - ✔✔true
✔✔Kian needs to sort a list of patients by birthdate to show the oldest patients first.
What sort order on the birthdate field will give him this result? - ✔✔smallest to largest
✔✔Ibraheem works for a music store. Which of the following tables will give him the
company contact information he needs to place a custom order for a guitar? -
✔✔vendors
✔✔What is the purpose of Expression Builder in Access? - ✔✔to create formulas
✔✔What would a password manager allow you to do? - ✔✔Create and store multiple
strong passwords.
✔✔You can monitor and protect your financial data in all of the following ways EXCEPT
_ - ✔✔Storing financial information in an unsent email message.
✔✔The news reports a security breach of credit card information at a large department
store that has recently laid off many employees. Why should the store investigate the
possibility of the breach being from an insider? - ✔✔Because insiders sometimes create
threats after incidents at their places of employment
✔✔How can an attacker execute malware through a script? - ✔✔A script can run a
series of instructions to download and run malware.
✔✔After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while they
were dating. He even lied about their breakup, creating rumors about her behavior.
Penny started getting inappropriate looks and advances from the team whenever she
was at practice and felt completely humiliated. Penny is a victim of ________. -
✔✔cyberbullying
✔✔Cassidy is a medical assistant in a hospital and has access to many medical files.
When she brings patients to the examining room, she can be observed swiping a card,
typing in a password, and staring into what appears to be a camera, all attached to the
computer. After completing her check-in, Cassidy leaves the patient in the examining
room waiting on the doctor. It is important that she logs out of the system so the patient
does not have access to the information stored in the hospital's database. Based on
Cassidy's actions what systems do you think the hospital has in place to protect the
patient medical records? - ✔✔biometrics
, ✔✔Your Facebook profile is private so there is no need to worry about your boss ever
seeing your posts such as your Spring Break pictures. - ✔✔false
✔✔Which of the following types of websites typically provides the least security? -
✔✔social media sites
✔✔What type of security requires something you know and something you have that no
one else has? - ✔✔two factor authentication
✔✔How can you protect a computer from electrical spikes and surges? - ✔✔use a
surge protector
✔✔Emma downloaded a new game from an unfamiliar website. A few days later, Emma
realized her system had been hacked and her credit card numbers were stolen. Without
Emma knowing, what type of malware might she have downloaded to her computer? -
✔✔trojan
✔✔Which is a first step to deter thieves from accessing your financial information? -
✔✔Do not provide personal information over the phone or through email.
✔✔Why is it not safe to connect to public Wi-Fi networks? - ✔✔Because these networks
are rarely protected
✔✔How can you protect personal information gathered by legitimate organizations? -
✔✔Create a separate email account for receiving information from websites.
✔✔What is a digital certificate? - ✔✔technology used to verify a user's identity
✔✔How does discarding computers in a landfill affect the environment? - ✔✔Lead and
mercury in computer parts are seeping into the ground and water supply.
✔✔Creating a(n) _____ means copying files from a computer's hard drive and storing
them in a remote location. - ✔✔data backup
✔✔What is it called when an attacker convinces you to enter personal information at an
imposter website after receiving an email from a person masquerading as an employee
from your bank? - ✔✔phishing
✔✔Social-networking sites have a history of providing tight security and giving users a
clear understanding of how security features work. - ✔✔false
✔✔Siobhan has recently opened a Facebook account and as a new user, is posting
frequently and accepting many friend requests. You see a post about an upcoming trip