IST FINAL EXAM QUESTIONS AND VERIFIED
ANSWERS
peripheral device - Answers - can connect to your mobile device and enable you to print
Normal Bluetooth Range without extension - Answers - 33 ft
Tower Server - Answers - used when the server room has ample (a lot) floor space
notebook - Answers - portable, personal computer designed to fit on your lap
SLR camera - Answers - high-end digital camera that has interchangeable lenses and
uses a mirror to display on its screen an exact replica of the image to be photographed
processor - Answers - electronic component that interprets and carries out the basic
instructions that operate the computer
You are investigating a problem with the motherboard, what are the two main
components to check out? - Answers - memory, processor
** motherboard is protected by systems unit
pairing - Answers - process of initiating contact between two Bluetooth devices and
allowing them to communicate with each other
Which of the following occurs when the electrical supply or voltage drops, often defined
as more than five percent below the normal volts?
a.
overvoltage
b.
power surge
c.
undervoltage
d.
online surge - Answers - C. Undervoltage
DTP - Answers - software that enables professional designers to create sophisticated
documents that contain text, graphics, and many colors
software suite - Answers - collection of individual programs sold as a unit
what features come with the purchase of word processing software - Answers -
wordwrap, spell checker, clip art
,what does an index do? - Answers - stores information about a file, including its name,
date created, and author name
query - Answers - a request for specific data from a database
Which of the following kinds of software provides the capabilities of paint software and
also includes the ability to enhance and modify existing images and pictures?
a.
desktop publishing
b.
illustration
c.
photo management
d.
image editing - Answers - D. Image editing
QR code - Answers - a square-shaped coded graphic that corresponds to a web
address or other information
rootkit - Answers - a program that hides in a computer and allows someone from a
remote location to take full control of the computer
Which of the following does your daughter's daycare use to verify the identity of parents
who pick up their children?
a.
iris recognition system
b.
hand geometry system
c.
digital forensics system
d.
face recognition system - Answers - b. hand geometry system
The term, payload, as it pertains to computer crime, is defined as ___________
a.
the financial burden computer crime places on its victims
b.
the destructive event or prank the program is intended to deliver
c.
the money a criminal receives from extortion or other computer crimes
d.
the amount of data loss to a company or individual who is a victim of a computer crime -
Answers - b.
the destructive event or prank the program is intended to deliver
, Computer viruses, worms, Trojan horses, and rootkits are classified as which of the
following?
a.
threats
b.
cybermalls
c.
malware
d.
untrusted sources - Answers - c. malware
What is another name for public key encryption
a.
asymmetric key encryption
b.
controlled key encryption
c.
virtual key encryption
d.
secure key encryption - Answers - a.
asymmetric key encryption
certificate authority - Answers - an authorized person or company that issues and
verifies digital certificates
cyberterrorist - Answers - someone who uses the Internet or network to destroy or
damage computers for political reasons
Which of the following statements is not a safeguard against the failure of hardware?
a.
surge protectors
b.
UPS
c.
fault-tolerant computers
d.
device-tracking apps - Answers - d.
device-tracking apps
If a computer advertisement states a computer operates at 5 GHz, what does that
mean?
a.
The CPU in the computer is an Intel processor.
b.
The computer contains 5 GHz of RAM.
c.
ANSWERS
peripheral device - Answers - can connect to your mobile device and enable you to print
Normal Bluetooth Range without extension - Answers - 33 ft
Tower Server - Answers - used when the server room has ample (a lot) floor space
notebook - Answers - portable, personal computer designed to fit on your lap
SLR camera - Answers - high-end digital camera that has interchangeable lenses and
uses a mirror to display on its screen an exact replica of the image to be photographed
processor - Answers - electronic component that interprets and carries out the basic
instructions that operate the computer
You are investigating a problem with the motherboard, what are the two main
components to check out? - Answers - memory, processor
** motherboard is protected by systems unit
pairing - Answers - process of initiating contact between two Bluetooth devices and
allowing them to communicate with each other
Which of the following occurs when the electrical supply or voltage drops, often defined
as more than five percent below the normal volts?
a.
overvoltage
b.
power surge
c.
undervoltage
d.
online surge - Answers - C. Undervoltage
DTP - Answers - software that enables professional designers to create sophisticated
documents that contain text, graphics, and many colors
software suite - Answers - collection of individual programs sold as a unit
what features come with the purchase of word processing software - Answers -
wordwrap, spell checker, clip art
,what does an index do? - Answers - stores information about a file, including its name,
date created, and author name
query - Answers - a request for specific data from a database
Which of the following kinds of software provides the capabilities of paint software and
also includes the ability to enhance and modify existing images and pictures?
a.
desktop publishing
b.
illustration
c.
photo management
d.
image editing - Answers - D. Image editing
QR code - Answers - a square-shaped coded graphic that corresponds to a web
address or other information
rootkit - Answers - a program that hides in a computer and allows someone from a
remote location to take full control of the computer
Which of the following does your daughter's daycare use to verify the identity of parents
who pick up their children?
a.
iris recognition system
b.
hand geometry system
c.
digital forensics system
d.
face recognition system - Answers - b. hand geometry system
The term, payload, as it pertains to computer crime, is defined as ___________
a.
the financial burden computer crime places on its victims
b.
the destructive event or prank the program is intended to deliver
c.
the money a criminal receives from extortion or other computer crimes
d.
the amount of data loss to a company or individual who is a victim of a computer crime -
Answers - b.
the destructive event or prank the program is intended to deliver
, Computer viruses, worms, Trojan horses, and rootkits are classified as which of the
following?
a.
threats
b.
cybermalls
c.
malware
d.
untrusted sources - Answers - c. malware
What is another name for public key encryption
a.
asymmetric key encryption
b.
controlled key encryption
c.
virtual key encryption
d.
secure key encryption - Answers - a.
asymmetric key encryption
certificate authority - Answers - an authorized person or company that issues and
verifies digital certificates
cyberterrorist - Answers - someone who uses the Internet or network to destroy or
damage computers for political reasons
Which of the following statements is not a safeguard against the failure of hardware?
a.
surge protectors
b.
UPS
c.
fault-tolerant computers
d.
device-tracking apps - Answers - d.
device-tracking apps
If a computer advertisement states a computer operates at 5 GHz, what does that
mean?
a.
The CPU in the computer is an Intel processor.
b.
The computer contains 5 GHz of RAM.
c.