Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ITE 100 Exam 2: Computer Software and Security Questions with Solutions, Exams of Information Systems

A series of multiple-choice questions and true/false statements related to computer software, operating systems, and security. It covers topics such as spreadsheet programs, database queries, pc maintenance tools, software types (application, utility), file compression, pdf creation, synchronization, personal finance software, firewalls, backup and restore processes, document management, retail software, folder management, legal software, multimedia authoring, image editing, font sizes, sharpness, note-taking software, green computing, product activation, intellectual property, cyber security threats (crackers, script kiddies, phishing, dos attacks), biometric identification, aups, cookies, bots, and backup policies. The questions are designed to test understanding of basic it concepts and security practices, making it a useful resource for students studying introductory computer courses. (404 characters)

Typology: Exams

2024/2025

Available from 06/03/2025

BetaTutors
BetaTutors 🇺🇸

4.5

(4)

1.5K documents

1 / 50

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ITE 100 EXAM 2 QUESTIONS WITH ACCURATE SOLUTIONS
1) In a spreadsheet program, how is data organized?
a) in rows and columns collectively called a spreadsheet
b) in rows and columns collectively called a worksheet
c) in columns and cells collectively called a notebook
d) in a notebook containing thousands of pages -- Correct Answer ✔✔ b. in
rows and columns collectively called a worksheet
2) Which of the following is a request for specific data from a database?
a) formula
b) resample
c) function
d) query -- Correct Answer ✔✔ d. query
3) You are experiencing some problems with your operating system on your desktop
and want to repair some problems with your hard disk. Which of the following will
you use?
a) backup tool
b) disk defragmenter
c) file compression tool
d) PC maintenance tool -- Correct Answer ✔✔ d. PC maintenance tool
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32

Partial preview of the text

Download ITE 100 Exam 2: Computer Software and Security Questions with Solutions and more Exams Information Systems in PDF only on Docsity!

ITE 100 EXAM 2 QUESTIONS WITH ACCURATE SOLUTIONS

  1. In a spreadsheet program, how is data organized? a) in rows and columns collectively called a spreadsheet b) in rows and columns collectively called a worksheet c) in columns and cells collectively called a notebook d) in a notebook containing thousands of pages -- Correct Answer ✔✔ b. in rows and columns collectively called a worksheet
  2. Which of the following is a request for specific data from a database? a) formula b) resample c) function d) query -- Correct Answer ✔✔ d. query
  3. You are experiencing some problems with your operating system on your desktop and want to repair some problems with your hard disk. Which of the following will you use? a) backup tool b) disk defragmenter c) file compression tool d) PC maintenance tool -- Correct Answer ✔✔ d. PC maintenance tool
  1. What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks? a) operating b) system c) utility d) application -- Correct Answer ✔✔ d. application
  2. The programmer of a virus, known as a virus author, intentionally writes a virus program True or False -- Correct Answer ✔✔ True
  3. Which of the following kinds of file utilities shrink the size of a file(s)? a) unit b) conversion c) file compression d) matrix -- Correct Answer ✔✔ c. file compression
  4. The only way to create a PDF file is in document management applications. True or False -- Correct Answer ✔✔ False
  5. Your new calendar application allows you to make sure that your mobile device and your corporation's server both have the latest version of any updated information. What is the term for this capability? a) reconciliation b) synchronization
  1. You need to purchase a new application on behalf of your company, one that will track product inventory and manage shipping status. Which kind of software will you buy? a) human resources software b) retail software c) distribution software d) manufacturing software -- Correct Answer ✔✔ c. distribution software
  2. You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location? a) folder b) index c) file manager d) safe spot -- Correct Answer ✔✔ a. folder
  3. While a computer is running, the operating system remains in memory. True or False -- Correct Answer ✔✔ True
  4. What type of software can your parents use to create a will without visiting an attorney? a) attorney supernumerary software b) legal software c) court-documented software d) accounting/tax preparation software -- Correct Answer ✔✔ b. legal software
  5. What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?

a) multimedia publishing b) multimedia authoring c) multimedia management d) multimedia editing -- Correct Answer ✔✔ b. multimedia authoring

  1. Clipping is the process of transferring an item from a clipboard to a specific location in a document. True or False -- Correct Answer ✔✔ False
  2. Many web page authoring programs allow users to organize, manage, or maintain web sites. True or False -- Correct Answer ✔✔ True
  3. Developers of freeware rely on the honor system, trusting users to send payment if software use extends beyond the stated trial period. True or False -- Correct Answer ✔✔ False
  4. Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing. True or False -- Correct Answer ✔✔ True
  5. What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like? a) image editing

a) the process of entering registration information so that users of the software will receive newsletters and other marketing materials regarding purchased software b) a technique to ensure software is not installed on more computers than legally licensed c) a term used to describe starting application software purchased in a retail store d) the method used by some software companies to guarantee that software purchased on the web will work on the computer on which the software was downloaded -- Correct Answer ✔✔ b. a technique to ensure software is not installed on more computers than legally licensed

  1. Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? a) DoS b) PGP c) IP d) TCP -- Correct Answer ✔✔ c. IP
  2. Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? a) cyberterrorist b) hacker c) script kiddie d) cyberextortionist -- Correct Answer ✔✔ c. script kiddie
  3. Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information? a) phishing

b) spit c) spyware d) spam -- Correct Answer ✔✔ a. phishing

  1. In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks? a) delayed b) distributed c) limited d) staggered -- Correct Answer ✔✔ b. distributed
  2. Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children? a) hand geometry system b) iris recognition system c) digital forensics system d) face recognition system -- Correct Answer ✔✔ a. hand geometry system
  3. In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? a) They restore the files. b) They resource the files. c) The index the files. d) They reset the files. -- Correct Answer ✔✔ a. They restore the files.
  4. What happens during a DDoS attack?
  1. What is the term for a program that performs a repetitive task on a network? a) zombie b) rootkit c) Trojan horse d) bot -- Correct Answer ✔✔ d. bot
  2. With a three-generation backup policy, the grandparent is which of the following? a) most recent copy of the file b) oldest copy of the file c) second oldest copy of the file d) original file -- Correct Answer ✔✔ b. oldest copy of the file
  3. The term firewall is _____________. a) the access point a hacker uses to intrude on a computer or network b) hardware and/or software that protects a network's resources from intrusion c) a virus that prevents the computer or network from accessing outside resources d) a program that searches for cybercriminals by looking for patterns in attacks -- Correct Answer ✔✔ b. hardware and/or software that protects a network's resources from intrusion
  4. Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data. True or False -- Correct Answer ✔✔ True
  1. An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? a) ethical b) practical c) permissible d) acceptable -- Correct Answer ✔✔ a. ethical
  2. Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure. True or False -- Correct Answer ✔✔ True
  3. Which of the following is not a security product developer? a) AVG b) Adobe c) McAfee d) Symantec -- Correct Answer ✔✔ b. Adobe
  4. Your browsing history is a list of all websites you have visited over a period of time. True or False -- Correct Answer ✔✔ True
  5. What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

True or False -- Correct Answer ✔✔ False; CIPA ( The Children's Internet Protection Act )

  1. Which of the following terms means in a location separate from the computer site? a) off-shore b) off-line c) off-site d) off-scope -- Correct Answer ✔✔ c. off-site
  2. Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously? a) site b) network c) multipurpose d) distributed -- Correct Answer ✔✔ b. network
  3. Which of the following provides the mobile user with a secure connection to the company network server? a) VPN b) XPN c) SPN d) TPN -- Correct Answer ✔✔ a. VPN
  4. How long can digital certificates be valid? a) six months b) two years c) four years d) five years -- Correct Answer ✔✔ b. two years
  1. Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once. True of False -- Correct Answer ✔✔ False; Spam is
  2. Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined. True or False -- Correct Answer ✔✔ True
  3. You should read reviews for programs and apps before you download and/or install them to make sure the program or app will meet your needs. True or False -- Correct Answer ✔✔ True
  4. As shown in the accompanying figure, which of the following kinds of card is a circuit board that enhances functions of a component of the system unit and/or provides connections to peripherals? a) peripheral b) microcode c) adapter d) conversion -- Correct Answer ✔✔ c. adapter
  5. L2 cache is slightly faster than L1 cache but has a much smaller capacity. True or False -- Correct Answer ✔✔ False; L2 cache is slower but has a much larger capacity
  1. The electronic components and circuitry of the system unit, such as the processor and memory, usually are part of or are connected to a circuit board called the fatherboard. True or False -- Correct Answer ✔✔ False
  2. Registers are part of the memory. True or False -- Correct Answer ✔✔ False; Registers are part of the processor, (not part of memory or a permanent storage device )
  3. Which of the following allows the processor to communicate with peripheral devices? a) power bus b) index bus c) expansion bus d) interpolated bus -- Correct Answer ✔✔ c. expansion bus
  4. When determining the amount of RAM necessary for a computer you wish to purchase, what should you consider? a) the processing speed of the CPU b) the size of the computer monitor c) the types of software you plan to use d) the number of expansion slots found in the computer -- Correct Answer ✔✔ c. the types of software you plan to use
  5. Your business is looking to rely on cloud computing services to manage your company's hardware, for example. What is the term for this?

a) Infrastructure as a Service b) Platform as a Service c) Data as a Service d) Software as a Service -- Correct Answer ✔✔ a. Infrastructure as a Service

  1. When a user runs an application, what transfers from a storage device to memory? a) cache b) registrations c) instructions d) operations -- Correct Answer ✔✔ c. instructions
  2. Which of the following is an alternate term for an adapter card? a) expansion card b) router c) bus card d) register -- Correct Answer ✔✔ a. expansion card
  3. What are the three categories of items stored in computer memory? a) system software; applications; command software b) system software; data being processed; Internet websites required to monitor and control the computer c) applications; application hardware; application data d) operating system and other programs; applications; data being processed -
  • Correct Answer ✔✔ d. operating system and other programs; applications; data being processed
  1. If you see eight numbers such as 01000101 grouped together and you are told these numbers represent the letter E, what is this combination of numbers called?
  1. Buses transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to output or storage devices. True or False -- Correct Answer ✔✔ True
  2. What is memory access time? a) the amount of time it takes the processor to read data, instructions, and information from memory b) the amount of time necessary to switch a bit from the value 0 to the value 1 c) the amount of time required to fetch and execute a single instruction by the processor provided the instruction is already stored in memory d) the amount of time in which a single byte of data can be stored in cache memory -- Correct Answer ✔✔ a. the amount of time it takes the processor to read data, instructions, and information from memory
  3. In the machine cycle, decoding is the process of obtaining a program instruction or data item from memory. True or False -- Correct Answer ✔✔ False; Decoding refers to the process of translating the instructions into signals the computer can execute
  4. If a computer advertisement states a computer operates at 5 GHz, what does that mean? a) The CPU in the computer is an Intel processor.

b) The system clock has a clock speed of five billion clock cycles per second. c) It guarantees the computer runs faster than one that operates at 4 GHz. d) The computer contains 5 GHz of RAM. -- Correct Answer ✔✔ b. The system clock has a clock speed of five billion clock cycles per second.

  1. A DC adapter converts the DC power from the wall outlet into the AC power that the peripheral requires. True or False -- Correct Answer ✔✔ False; The opposite
  2. Which of the following is an application that incorporates data from multiple providers into a new application? a) integrated app b) mashup c) aggregate d) combo -- Correct Answer ✔✔ b. mashup
  3. You want to add a new external hard disk to your computer, but you are unable to connect because you have run out of USB ports. Which of the following can you use instead? a) ExpressCard module b) peripheral index c) USB hub d) CPU center -- Correct Answer ✔✔ c. USB hub
  4. Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips because which of the following is true?