1.
A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station.
Correct Answer
A. True
Explanation
A docking station is a device that allows a notebook PC to connect to various peripherals like a keyboard, mouse, and printer. It provides a convenient way to expand the functionality of a notebook by providing additional ports and connections. By connecting the notebook to the docking station, users can easily use their notebook as a desktop computer with all the necessary peripherals connected. Therefore, the statement "A device that can be used to connect a notebook PC to conventional hardware such as a keyboard, mouse, and printer is called a docking station" is true.
2.
A map of a database is called a__________.
Correct Answer
D. Schema
Explanation
A map of a database is called a schema. A schema is a visual representation of the logical structure of a database, including tables, relationships between tables, and constraints. It provides a blueprint for how the data is organized and helps in understanding the overall design of the database.
3.
A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.
Correct Answer
C. Worm
Explanation
A worm is a type of program that is designed to replicate itself and spread across a computer network or system. Unlike viruses, worms do not require a host file or program to attach themselves to. They can independently move through a network, copying themselves and consuming resources as they go. This continuous replication and consumption of resources can lead to a slowdown or even a shutdown of the affected computer or network. Therefore, a worm fits the description provided in the question.
4.
A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.
Correct Answer
A. Quarantine
Explanation
A quarantine is a separate area of a hard disk that holds an infected file until the infection can be removed. This allows the infected file to be isolated from the rest of the system, preventing it from spreading and causing further damage. By placing the infected file in quarantine, it can be safely analyzed and cleaned without risking the integrity of the rest of the system.
5.
An example of query criteria is:
Correct Answer
B. All records in which the valure in the score field is above 75.
Explanation
The given answer is correct because it accurately identifies that "All records in which the value in the score field is above 75" is an example of query criteria. Query criteria are conditions or requirements used to filter and retrieve specific data from a database. In this case, the criteria specify that only records with a score value above 75 should be included in the query results. This helps to narrow down the data and retrieve only the relevant information that meets the specified condition.
6.
All tags in XHTML are lower case.
Correct Answer
A. True
Explanation
In XHTML, all tags must be written in lowercase. This is because XHTML is an XML-based language, and XML is case-sensitive. Therefore, using uppercase letters for tags in XHTML would result in invalid markup. To ensure proper syntax and adherence to standards, it is necessary to write all tags in lowercase in XHTML.
7.
Encryption is a technique for scrambling documents so that they are unreadable if intercepted during transit.
Correct Answer
A. True
Explanation
Encryption is indeed a technique used to scramble documents or data in order to make them unreadable if intercepted during transit. It ensures the confidentiality and security of the information being transmitted, as only authorized parties with the decryption key can access and understand the encrypted content. This helps protect sensitive information from unauthorized access and maintain privacy and data integrity.
8.
Computers small enough that several hundred of them could fit inside the space of a human cell are known as _____________.
Correct Answer
B. Nanocomputers
Explanation
Nanocomputers are the correct answer because they refer to computers that are small enough to fit inside a human cell. This term specifically denotes computers that are on the nanoscale, which is a scale of measurement that is one billionth of a meter. Nanocomputers utilize nanotechnology to create extremely small and powerful computing devices. These devices have the potential to revolutionize various fields, such as medicine and electronics, due to their compact size and high computational capabilities.
9.
E-commerce enables many travelers to get travel information and purchase tickets without the services of travel agents. This is an example of a trend described as:
Correct Answer
D. Disintermediation
Explanation
Disintermediation refers to the elimination of intermediaries in a supply chain, allowing consumers to directly access products or services. In the context of e-commerce, travelers can bypass travel agents and directly obtain travel information and purchase tickets online. This trend is facilitated by the internet and advancements in technology, enabling consumers to have more control and convenience in their travel arrangements.
10.
Good user habits can help prevent physical injuries and discomfort due to the use of computers.
Correct Answer
A. True
Explanation
Good user habits, such as maintaining proper posture, taking regular breaks, and using ergonomic equipment, can help prevent physical injuries and discomfort that can arise from prolonged computer use. By practicing these habits, individuals can minimize the risk of conditions like musculoskeletal disorders, eye strain, and repetitive strain injuries. Therefore, it is true that good user habits can help prevent physical injuries and discomfort associated with computer use.
11.
HTML has a stricter syntax than XHTML.
Correct Answer
B. False
Explanation
HTML does not have a stricter syntax than XHTML. In fact, XHTML has a stricter syntax compared to HTML. XHTML requires well-formed and valid markup, while HTML is more forgiving and allows for looser syntax. XHTML follows the rules of XML, requiring elements to be properly nested, attributes to be quoted, and self-closing tags for empty elements. HTML, on the other hand, allows for unclosed tags, unquoted attributes, and other deviations from strict XML rules. Therefore, the correct answer is False.
12.
If a company needs to store data about its customers, employees, products, and orders in a way that will enable it to quickly process orders, answer questions about orders, and prepare reports, it should use a(n):
Correct Answer
B. Database management system.
Explanation
A database management system (DBMS) is the most suitable choice for a company that needs to store and efficiently process data about its customers, employees, products, and orders. Unlike a file management system, a DBMS provides a structured and organized approach to storing and retrieving data, allowing for faster processing of orders, answering questions about orders, and generating reports. Expert systems and neural networks are not specifically designed for data storage and processing, making them less appropriate for this scenario.
13.
If you make a copy of a proprietary program and give it to a friend you are committing:
Correct Answer
D. Software piracy
Explanation
If you make a copy of a proprietary program and give it to a friend, you are committing software piracy. Software piracy refers to the unauthorized copying, distribution, or use of copyrighted software without the permission of the owner. In this scenario, by making a copy of the proprietary program and sharing it with someone else, you are infringing on the copyright holder's rights and engaging in illegal activity.
14.
In XHTML, the <img> element is an empty element that must include a space and a slash before its closing bracket in order to be well formed.
Correct Answer
A. True
Explanation
In XHTML, the element is considered an empty element, meaning it does not require a closing tag. However, in order to be well-formed, it must include a space and a slash before its closing bracket. This is known as a self-closing tag syntax and is used to indicate that the element does not have any content between the opening and closing tags. Therefore, the statement "True" is correct.
15.
15. Many e-commerce sites use _____ to determine customer preferences.
Correct Answer
B. Data mining
Explanation
E-commerce sites use data mining to determine customer preferences. Data mining involves analyzing large sets of data to discover patterns, trends, and insights that can be used to understand customer behavior and preferences. By using data mining techniques, e-commerce sites can gather valuable information about customers' purchasing habits, interests, and preferences, which can then be used to personalize the shopping experience, target marketing campaigns, and make data-driven business decisions.
16.
Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program.
Correct Answer
A. Macros
Explanation
Macros are sets of instructions that are saved within an application, such as a word processing or spreadsheet program. These instructions can be used to automate tasks or perform certain actions. However, some viruses can be hidden within macros, allowing them to execute malicious code when the macro is run. Therefore, it is important to be cautious when enabling macros, especially if they are from an untrusted source, to prevent potential malware infections.
17.
The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Correct Answer
A. Electronic Communications Privacy Act (ECPA)
Explanation
The correct answer is the Electronic Communications Privacy Act (ECPA). This act was passed in 1986 and it provides protection for electronic communications, including voice mail, similar to the protection that covers mail and telephone communications. The ECPA sets standards for government access to electronic communications, prohibits unauthorized interception of electronic communications, and establishes privacy protections for stored electronic communications.
18.
The diamond shape in a program flow chart is used to represent a(n):
Correct Answer
A. Decision
Explanation
The diamond shape in a program flow chart is used to represent a decision. This means that at that point in the program, a choice needs to be made between two or more paths. The decision could be based on a condition or a comparison, and the different paths represent the different actions or outcomes that result from that decision.
19.
The nature of relationships can be examined further and quantified. This quantification is called _____________.
Correct Answer
B. Cardinality
Explanation
Cardinality refers to the quantification of the nature of relationships. It helps in determining the number of instances in one entity that are associated with the number of instances in another entity. In other words, it quantifies the relationship between two entities by defining the number of occurrences or instances of one entity that can be linked to the number of occurrences or instances of another entity.
20.
The purpose of ergonomic keyboards is to:
Correct Answer
C. Reduce the occurrence of carpal tunnel syndrome.
Explanation
Ergonomic keyboards are designed to reduce the occurrence of carpal tunnel syndrome. Carpal tunnel syndrome is a condition that affects the wrist and hand, causing pain, numbness, and tingling due to pressure on the median nerve. Ergonomic keyboards are specifically designed to promote a more natural and comfortable hand and wrist position while typing, reducing strain and pressure on the wrists. This can help prevent the development or worsening of carpal tunnel syndrome in individuals who spend long hours typing on a keyboard.
21.
The study and practice of using computing resources efficiently and with a worldly perspective is _________.
Correct Answer
D. Green computing
Explanation
Green computing refers to the study and practice of using computing resources efficiently and with a worldly perspective. It involves designing, manufacturing, using, and disposing of computers and other electronic devices in an environmentally friendly manner. This includes reducing energy consumption, minimizing electronic waste, and promoting the use of renewable resources. Green computing aims to minimize the negative impact of technology on the environment and promote sustainability in the IT industry.
22.
This English-like language was designed to make possible the easy manipulation of data.
Correct Answer
A. SQL
Explanation
SQL stands for Structured Query Language and it is a programming language designed for managing and manipulating relational databases. It allows users to easily interact with databases by writing queries to retrieve, insert, update, and delete data. SQL is specifically designed to handle data manipulation tasks efficiently and effectively. Therefore, it is the correct answer for the given question as it is a language designed for easy data manipulation.
23.
Three types of XHTML DTDs are: transitional, frameset, and strict.
Correct Answer
A. True
Explanation
The statement is true because there are indeed three types of XHTML DTDs: transitional, frameset, and strict. These DTDs define the rules and structure for different types of XHTML documents. Transitional DTD allows the use of older HTML elements and attributes, frameset DTD is used for documents with frames, and strict DTD restricts the use of deprecated elements and attributes, promoting cleaner and more modern code.
24.
To be able to resume operation after its computer system is damaged or destroyed, a company should:
Correct Answer
B. Create a disaster-recovery plan.
Explanation
A disaster-recovery plan is essential for a company to resume operation after its computer system is damaged or destroyed. This plan outlines the steps and procedures to be followed in order to recover and restore the system, ensuring minimal downtime and data loss. It includes strategies for backup and restoration of critical data, alternative infrastructure arrangements, and allocation of resources to address the specific needs of the company during a disaster situation. By creating a disaster-recovery plan, the company can effectively mitigate the impact of system damage or destruction and quickly resume normal operations.
25.
To ensure that an e-mail message or file came from the designated individual and was not tampered during transmission; you should use which of the following?
Correct Answer
B. Digital signature
Explanation
A digital signature is used to ensure the authenticity and integrity of an email message or file. It provides a way to verify that the message or file came from the designated individual and has not been tampered with during transmission. The digital signature uses encryption techniques to create a unique identifier for the message or file, which can be verified by the recipient using the sender's public key. This ensures that any changes made to the message or file will be detected, providing assurance of its origin and integrity.
26.
Too much web traffic can ___________ a web site or even prevent access to it.
Correct Answer
B. Slow down
Explanation
Too much web traffic can slow down a website or even prevent access to it. This is because an overwhelming amount of incoming requests can overload the server's capacity to handle them efficiently. As a result, the website's performance deteriorates, causing slower loading times and potentially leading to server crashes or downtime.
27.
Using available technology to work from home or an off-site location is called telecommuting.
Correct Answer
A. True
Explanation
Telecommuting refers to the practice of using technology to work remotely or from a location other than the traditional office. It allows individuals to work from home or off-site, using tools such as computers, internet, and communication devices to stay connected and complete their tasks. Therefore, the given statement that using available technology to work from home or an off-site location is called telecommuting is true.
28.
When programmers violate the rules of a programming language, ____ errors result.
Correct Answer
B. Syntax
Explanation
When programmers violate the rules of a programming language, syntax errors result. Syntax errors occur when the code does not follow the proper structure and grammar of the programming language. This can include missing or incorrect punctuation, misspelled keywords, or using incorrect syntax for a specific programming construct. These errors are typically caught by the compiler or interpreter during the compilation or interpretation process, preventing the code from running.
29.
When the document conforms to the rules and requirements of XHTML, it is said to be _____.
Correct Answer
C. Well formed
Explanation
When a document conforms to the rules and requirements of XHTML, it is said to be "well formed." This means that the document follows the syntax and structure specified by the XHTML standard, without any errors or inconsistencies. A well-formed document is valid and can be properly interpreted by web browsers and other XML parsers.
30.
When the document conforms to the rules and requirements of XHTML, it is said to be _____.
Correct Answer
C. Well formed
Explanation
When the document conforms to the rules and requirements of XHTML, it is said to be "well formed". This means that the document is structurally correct and follows the syntax and guidelines specified by the XHTML standard. A well-formed document does not contain any errors or inconsistencies that would prevent it from being properly interpreted by web browsers or other XML processors.
31.
When the records of more than one table are necessary to answer a query the tables must be __________.
Correct Answer
D. Joined
Explanation
When the records of more than one table are necessary to answer a query, the tables must be joined. Joining tables allows the combination of data from multiple tables based on a common column or key. This enables the retrieval of relevant information from different tables and provides a comprehensive result set that satisfies the query requirements.
32.
Which of the following is an advantage of a database management system?
Correct Answer
A. Quick response to requests for information
Explanation
An advantage of a database management system is its ability to provide quick responses to requests for information. This means that users can retrieve the required data in a timely manner, increasing efficiency and productivity. This advantage is crucial in organizations where quick access to accurate information is essential for decision-making and day-to-day operations.
33.
Which of the following is an example of assistive technology?
Correct Answer
D. All of the above
Explanation
All of the options listed are examples of assistive technology. Magnifiers help individuals with visual impairments to enlarge and enhance the visibility of text or objects. Screen reader software assists individuals who are blind or have low vision by converting text into speech or braille output. A braille keyboard enables individuals who are blind or have low vision to input information using braille characters. Therefore, all three options mentioned are examples of assistive technology.
34.
XHTML tags are enclosed in square brackets.
Correct Answer
B. False
Explanation
XHTML tags are not enclosed in square brackets. The correct syntax for XHTML tags is to enclose them in angle brackets (< >). Therefore, the given statement is false.
35.
__________ is the exploitation of vulnerability in domain name servers that allows traffic to a website to be redirected to another website.
Correct Answer
B. pHarming
Explanation
Pharming refers to the exploitation of vulnerabilities in domain name servers, which allows attackers to redirect traffic from a legitimate website to a malicious one. This can be done by tampering with the DNS cache or by poisoning the DNS server. By redirecting users to a different website, attackers can deceive them into entering sensitive information, such as login credentials or financial details, which can then be used for fraudulent purposes.
36.
__________ software can be used for brochures, letters, web pages, faxes, memos, calendar, and academic research paper purposes.
Correct Answer
A. Word Processing
Explanation
Word processing software is designed to create and edit text-based documents. It provides various formatting options, such as font styles, sizes, and colors, as well as tools for spell checking and grammar correction. With word processing software, users can easily create brochures, letters, web pages, faxes, memos, calendars, and academic research papers by typing and formatting text. This software is specifically designed for handling textual content and is widely used for various purposes in both personal and professional settings.
37.
A(n) _____ diagram depicts a database's entities and their relationships.
Correct Answer
B. Entity-relationship
Explanation
An entity-relationship diagram is a graphical representation of a database's entities and their relationships. It shows how different entities are connected and interact with each other in the database. This diagram is commonly used in database design to visualize the structure and organization of the data model.
38.
Elimination of data redundancy does not solve which problem:
Correct Answer
D. Data entry errors
Explanation
Elimination of data redundancy refers to the process of removing duplicate data from a database. While this helps in improving data consistency and reducing wasted space, it does not directly address the problem of data entry errors. Data entry errors occur when incorrect or inaccurate data is inputted into the system. This can happen due to human error or system limitations. Therefore, even if data redundancy is eliminated, data entry errors can still occur and need to be addressed separately.
39.
The relationship among tables is facilitated by ____ and ___ keys.
Correct Answer
D. Foreign, primary
Explanation
The relationship among tables is facilitated by foreign and primary keys. Foreign keys are used to establish a link between two tables by referencing the primary key of another table. The foreign key in one table refers to the primary key of another table, allowing for the establishment of relationships and maintaining data integrity. The primary key is a unique identifier for each record in a table, ensuring that each record is uniquely identified and can be referenced by foreign keys in other tables.
40.
Digital signature authenticates transactions.
Correct Answer
A. True
Explanation
A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message, document, or transaction. It provides a way to ensure that the sender of the message is who they claim to be and that the message has not been tampered with during transmission. By using encryption and public key infrastructure, digital signatures can guarantee the integrity and non-repudiation of transactions, making them a reliable method for authentication. Therefore, the statement that digital signatures authenticate transactions is true.
41.
Environmental responsibility involves:
Correct Answer
D. All of the above
Explanation
Environmental responsibility involves buying green products, which are environmentally friendly and sustainable. It also includes saving trees by reducing paper usage and promoting recycling. Additionally, saving energy is an important aspect of environmental responsibility as it helps reduce greenhouse gas emissions and conserve natural resources. Therefore, the correct answer is "All of the above" as all these actions contribute to being environmentally responsible.
42.
Two popular screen readers are JAWS and ICE.
Correct Answer
B. False
Explanation
Two popular screen readers are JAWS and ICE. This statement is false. While JAWS is indeed a popular screen reader, there is no widely recognized screen reader called ICE. Therefore, the correct answer is false.
43.
Spyware programs can harvest personal data by reading cookies and sending the data to a server.
Correct Answer
A. True
Explanation
Spyware programs are designed to collect personal data without the user's consent. One way they do this is by reading cookies, which are small files stored on a user's computer that contain information about their browsing habits. By accessing these cookies, spyware programs can gather personal data such as login credentials, browsing history, and other sensitive information. Once collected, this data is often sent to a remote server controlled by the attacker. Therefore, the statement that spyware programs can harvest personal data by reading cookies and sending the data to a server is true.
44.
___________ is a technique of exhaustively working through all possible combinations of letters, numbers, and special characters in order to guess a password.
Correct Answer
C. Brute force attack
Explanation
A brute force attack is a technique where an attacker systematically tries every possible combination of letters, numbers, and special characters to guess a password. This method is exhaustive and time-consuming, as it requires trying out all possible combinations until the correct password is found. It is a common method used by hackers to gain unauthorized access to systems or accounts.
45.
To indicate that a Web page is secure, many browsers display a(n):
Correct Answer
D. Image of a lock padlock
Explanation
The image of a lock padlock is commonly used by many browsers to indicate that a web page is secure. This symbol represents that the website is using a secure connection (HTTPS) to protect the data transmitted between the user's browser and the website's server. It assures the user that their information is encrypted and safe from potential threats.
46.
Select the correct letter(s) for the angle brackets < > to create a row in a table.
Correct Answer
A. Tr
Explanation
The correct answer is "tr" because in HTML, the "tr" tag is used to create a row in a table. The "th" tag is used to create a header cell in a table, the "r" tag does not exist in HTML, and the "td" tag is used to create a data cell in a table. Therefore, "tr" is the correct choice for creating a row in a table.