Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CISC 310 Comprehensive Final (Modules 1 - 10)| Questions with Answers Updated 2023 Latest, Exams of Information Technology

CISC 310 Comprehensive Final (Modules 1 - 10)| Questions with Answers Updated 2023 Latest

Typology: Exams

2022/2023

Available from 11/18/2023

eloy-hermann
eloy-hermann 🇬🇧

1

(1)

2.4K documents

1 / 42

Toggle sidebar

Related documents


Partial preview of the text

Download CISC 310 Comprehensive Final (Modules 1 - 10)| Questions with Answers Updated 2023 Latest and more Exams Information Technology in PDF only on Docsity! CISC 310 Comprehensive Final (Modules 1 - 10)| Questions with Answers Updated 2023 Latest 1. Manipulating two-dimensional images to produce the illusion of three dimensional depth is called ______. - Correct answer Stereoscopy 2. What is another term for vector graphics software? - Correct answer Drawing software 3. Digital photographs are stored as bitmap files - Correct answer True 4. A _____ is software that helps a peripheral device establish communications with its host device - Correct answer device driver 5. A laser printer has a mozzle-like print head that spray ink onto paper to form characters and graphics - Correct answer False 6. Read-only memory (ROM) is temporary and volatile. RAM is more permanent and non-volatile - Correct answer false 7. _____ LANs are usually arranged in a star topology with computers wired to 15. Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses. - Correct answer non-compete clause 16. A _____ is a specification that the database designer sets up to filter data entered into a particular field - Correct answer field validation rule 17. In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent - Correct answer True 18. Land-grid arrays (LGA) have two rows of pins that connect the chip to a circuit board - Correct answer False 19. The bandwidth of a channel that carries digital data is usually measured in ___________. - Correct answer bits per second 20. Which of the following is not an HTTP method? - Correct answer Send 21. All of the following are search operators EXCEPT - Correct answer Get 22. Which HTTP method does a browser use when you upload files to a specific Web address? - Correct answer PUT 23. An HTML document consists of 3 sections: the head, body, and content - Correct answer false 24. The main directory on a storage device is referred to as the _____ directory - Correct answer root 25. An operating system's _____ capability supports a division of labor among all the processing units - Correct answer multiprocessing 33. Suppose you wanted to run a Web server or FRP server from your home. What type of IP address would you want? - Correct answer Static 34. If a Creative Commons license contains ND, what does that indicate? - Correct answer the work must not be changed when it is redistributed or shared 35. _____ can be used to flood a Web site with so much traffic that it can no longer provide its intended service - Correct answer DDoS 36. Spam accounts for approximately ______ of all email. - Correct answer 70% 37. Microsoft uses a service called Safe Browsing to alert users about sites to avoid. - Correct answer false 38. Companies such as IBM and Sperry Rand launched the computer industry when they bought the first mainframe to market in the _____. - Correct answer 1960s 39. Which of the following would not be considered a common carrier - Correct answer radio stations 40. Data ____ refers to computer algorithms that analyze information to discover previously unknown and potentially useful information. - Correct answer mining 41. _____ data consists of numbers that can be used in arithmetic operations - Correct answer Numeric 42. American Standard Code for Information Interchange (ASCII) requires _____ bits for each character - Correct answer seven 51. Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices. - Correct answer processes 52. A(n) _____ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker - Correct answer RAT 53. A ____ is a template that adds the correct formatting as data is entered. If someone attempts to enter data in the wrong format, the database can be set up to reject that entry or correct it - Correct answer field format 54. _____ is music, speech, and other sounds represented in binary format for use in digital devices - Correct answer Digital audio 55. Digital video uses bits to store color and brightness data for each video frame. - Correct answer true 56. Character data is composed of letters, symbols, and numerals that are used in calculations. - Correct answer false 57. Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices - Correct answer mesh 58. Networks that form the internet are maintained by _____. - Correct answer ISPs 59. Which type of network topology connects multiple devices to a central device? - Correct answer Star 60. Connection speed is technically a measure of capacity. - Correct answer true calculate the distance to an object? - Correct answer Lidar 69. Most Internet connections are symmetrical. - Correct answer false 70. By some estimates, nearly 40% of all online identities are fake. - Correct answer true 71. a computer _____ is a set of self- replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device - Correct answer virus 72. The use of several databases is one of ERP's major advantages. - Correct answer false 73. As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly. - Correct answer false 74. In digital video, a lower resolution reduces the bit rate - Correct answer 75. JPEG files are compressed using lossy compression. - Correct answer false 76. Which of the following is not an example of an expansion port - Correct answer RAM 77. _________ technology divides a message into several packets that can be routed independently to their destination. - Correct answer packet switching 78. The best defense against malware is _____. - Correct answer antivirus software 79. The process of designing, entering, and testing the rule in an expert system 87. HTTP uses port 20 for communications between a client device and a server. - Correct answer false 88. Which of the following is not a file- naming convention? - Correct answer spaces are not allowed 89. Telegraphy remained the major technology for intercontinental communication well into the ________. - Correct answer 1950s 90. When vector animations are used for special effects in movies, the animation sequences are _____. - Correct answer pre-rendered into digital video clips 91. It is not possible to encrypt a Windows hard drive volume - Correct answer false 92. The term _____ refers to the part of a digital device that holds the system board - Correct answer system unit 93. Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. - Correct answer true 94. Microwaves have more carrying capacity than radio waves - Correct answer true 95. the WWW is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____. - Correct answer HTTP 96. The main directory on a storage device is referred to as the ________ directory. - Correct answer root take? - Correct answer conduct a heuristic analysis 104. Blacklist and header filtering are usually performed by email clients and Webmail services. - Correct answer false 105. Which of the following would be considered a third-generation computer - Correct answer IBM 360 106. Using just HTML and CSS, Web designers can create dynamic Web pages. - Correct answer false 107. Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs. - Correct answer false 108. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed - Correct answer PUP 109. Antivirus software's on-access scanning has a high probability of identifying zero-day exploits - Correct answer false 110. Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels. - Correct answer interpolation 111. The organization that supervises Internet addressing is ARPANET - Correct answer false 112. Session cookies are stored on a disk or other permanent storage medium. - Correct answer false 113. The Web is synonymous with the Internet. - Correct answer true 114. a _____ work modifies a copyrighted work but does not substantially change 122. Modern processors follow Intel's original numbering sequence. - Correct answer false 123. UDP is faster than TCP but does not perform error checking. - Correct answer true 124. Browser cache is another term for browser History list. - Correct answer false 125. Unlike a sort order, an index has no bearing on the physical sequence of records on a storage device - Correct answer true 126. A private IP address can be used to send data over the internet - Correct answer false 127. Which of the following is NOT a wiki content standard? - Correct answer RSS 128. MITM attacks include which of the following? - Correct answer All of the above 129. The term ____ refers to the part of a digital device that holds the system board - Correct answer system unit 130. HTML tags are instructions for a browser - Correct answer true 131. The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory. - Correct answer true 132. Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously. - Correct answer false 133. _____ adds computer-generated vector objects to a view of the real world - Correct answer augmented reality vectors form? - Correct answer a wireframe 142. The CAN-SPAM act is considered an effective means of controlling the volume of spam on the internet - Correct answer false 143. To conserve space, applications that require high-quality sound use low sampling rates. - Correct answer false 144. Which of the following is not a characteristic of a computer worm - Correct answer spread through a process called side-loading 145. Within a single program, ____ allows multiple commands, or threads, to run simultaneously. - Correct answer false 146. Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher - Correct answer false 147. digital photographs are stored as bitmap files - Correct answer true 148. Which of the following sensors would be most useful for helping a drone remain level as it flies - Correct answer gyro sensor 149. LANs use many of the same network technologies as the Internet. - Correct answer true 150. _________ tags make it possible to search for photos or videos using keywords. - Correct answer Metadata - Correct answer
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved