CBK IT - may 2017 - All correct

Asked by nerdygirl
Dated: 17th May'17 08:19 PM
Bounty offered: $25.00

Question 1 (5 points)

 

Which of the following characteristics is a disadvantage of cloud-based hosting?

Question 1 options:

 

It involves significant requirement of capital.

 

It involves high dependency on vendor.
 

 

It involves high annual maintenance costs.

 

It involves high ongoing support costs.

Save

Question 2 (5 points)

 

DSL is a type of an Internet __________.

Question 2 options:

 

connection

 

protocol

 

address

 

server

Save

Question 3 (5 points)

 

Which of the following is an international standard language for processing a database?

Question 3 options:

 

DB2

 

Cassandra

 

MS Access

 

SQL

Save

Question 4 (5 points)

 

Bits are grouped into 8-bit chunks called __________.

Question 4 options:

 

bytes

 

switches

 

nibbles

 

strings

Save

Question 5 (5 points)

 

The microprocessor's speed is determined by its __________.

Question 5 options:

 

word size

 

cache size

 

clock speed

 

all of the above

Save

Question 6 (5 points)

 

Microsoft Windows7 and Apple MacOS X are two examples of __________.

Question 6 options:

 

programming languages

 

operating systems

 

utilities

 

application software packages

Save

Question 7 (5 points)

 

Every computer on the Internet has a(n) __________ address.

Question 7 options:

 

IP

 

ISP

 

favorite

 

server

Save

Question 8 (5 points)

 

A login password should not include __________.

Question 8 options:

 

more than 8 characters

 

lowercase letters

 

uppercase letters

 

personal information, such as birthdays

Save

Question 9 (5 points)

 

Which of the following is the presentation format of an application?

Question 9 options:

 

User interface

 

Botnet

 

Cookie

 

Process blueprints

Save

Question 10 (5 points)

 

When a network does not have a server, all the computers essentially are equal, and programs and data are distributed among them. This is called a __________ network.

Question 10 options:

 

simple

 

peer-to-peer

 

PC-to-PC

 

local area

Save

Question 11 (5 points)

 

Mark is transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?

Question 11 options:

 

www

 

ftp

 

.com

 

https

Save

Question 12 (5 points)

 

The term "open source" means that the source code of the program is __________.

Question 12 options:

 

available only to carefully vetted contractors

 

available exclusively through licensing

 

available to the public

 

less stable and platform dependent

Save

Question 13 (5 points)

 

What type of network has a computer called a file server that acts as the central storage location?

Question 13 options:

 

Workstation

 

Client/server

 

Local area (LAN)

 

Peer-to-peer

Save

Question 14 (5 points)

 

__________ is a network that can be especially useful in buildings with no wired local area networks.

Question 14 options:

 

Bluetooth

 

IEEE

 

PAN

 

WiFi

Save

Question 15 (5 points)

 

Which of the following conditions exist when data are isolated in separated information systems?

Question 15 options:

 

Information silo

 

Information overload

 

Data segregation

 

Encapsulation

Save

Question 16 (5 points)

 

A relational DBMS allows you to create database structures containing __________.

Question 16 options:

 

fields

 

tables

 

all of the above

 

table relationships

Save

Question 17 (5 points)

 

Printers are __________.

Question 17 options:

 

capable of connecting to a USB port if they have a USB connector

 

computer peripherals

 

all of the above

 

output devices

Save

Question 18 (5 points)

 

In a computer, components called __________ are used to accomplish the input and output functions.

Question 18 options:

 

cards

 

display adapters

 

ergonomic devices

 

peripheral devices

Save

Question 19 (5 points)

 

A __________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally without the owner's permission and often without the owner's knowledge.

Question 19 options:

 

key escrow

 

threat

 

vulnerability

 

target

Save

Question 20 (5 points)

 

Most web pages are created using the __________ programming language to describe the format of a Web page.

Question 20 options:

 

HTML

 

HTTP

 

Javascript

 

Java

Save

CBK IT - may 2017 - all correct
Answered by nerdygirl
Expert Rating: 200 Ratings
Dated: 17th May'17 08:19 PM
5 words and 1 attachment(s).
Tutorial Rating: 1 Rating
Sold 1 times.
(preview of the tutorial; some sections have been intentionally blurred)
…to…

attachments

CBK-Quiz-Mod-6.docx (97.73 KB)
Preview of CBK-Quiz-Mod-6.docx
languagesoperating     packagesSaveQuestion   points) Every computer     Internet       address   7 options:IPISPfavoriteserverSaveQuestion     login       include   Question 8     8       information,   as birthdaysSaveQuestion     of       the   format of     9       10 (5   a network     have       the   essentially are     programs       distributed   them This     a       10   areaSaveQuestion 11 (5     transferring