Package deal
CSIT EXAM BUNDLE 2023 QUESTIONS & ANSWERS(GRADED A+)
CSIT 120 FINAL EXAM;CSIT 161- MIDTERM EXAM ;161: FINAL EXAM;CSIT 142 Final Exam CCBC;CSIT 111 Final Exam;CSIT 101: Concepts Exam; 101 FINAL EXAM
[Show more]CSIT 120 FINAL EXAM;CSIT 161- MIDTERM EXAM ;161: FINAL EXAM;CSIT 142 Final Exam CCBC;CSIT 111 Final Exam;CSIT 101: Concepts Exam; 101 FINAL EXAM
[Show more]Information Technology (IT) - ANSWER-The study or use of systems for storing, retrieving, and sending information 
 
Cybercrime - ANSWER-A criminal act committed primarily through the use of a computer system 
 
Phishing - ANSWER-Sending emails to lure people into revealing their personal informatio...
Preview 2 out of 7 pages
Add to cartInformation Technology (IT) - ANSWER-The study or use of systems for storing, retrieving, and sending information 
 
Cybercrime - ANSWER-A criminal act committed primarily through the use of a computer system 
 
Phishing - ANSWER-Sending emails to lure people into revealing their personal informatio...
NIC - ANSWER-Computers need this hardware to connect to a network 
 
Router - ANSWER-This device connects 2 or more networks (or computers) and directs the flow of information along the network 
 
Peer to Peer - ANSWER-Network technology best suited to networks of ten or fewer computers 
 
ISP - ANS...
Preview 2 out of 10 pages
Add to cartNIC - ANSWER-Computers need this hardware to connect to a network 
 
Router - ANSWER-This device connects 2 or more networks (or computers) and directs the flow of information along the network 
 
Peer to Peer - ANSWER-Network technology best suited to networks of ten or fewer computers 
 
ISP - ANS...
Describe a *Star* network topology? - ANSWER-for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch 
 
What is malware? - ANSWER-software that is intended to damage or disable computers and computer systems. 
 
List 4 types ...
Preview 1 out of 4 pages
Add to cartDescribe a *Star* network topology? - ANSWER-for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch 
 
What is malware? - ANSWER-software that is intended to damage or disable computers and computer systems. 
 
List 4 types ...
A Kindle eBook reader is an example of a(n) _____ computer? - ANSWER-special-purpose 
 
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? - ANSWER-zombie 
 
A _____ is an example of a computer assigned to a special task. - ANSWER-Kiosk 
 
A _____ provides c...
Preview 2 out of 8 pages
Add to cartA Kindle eBook reader is an example of a(n) _____ computer? - ANSWER-special-purpose 
 
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? - ANSWER-zombie 
 
A _____ is an example of a computer assigned to a special task. - ANSWER-Kiosk 
 
A _____ provides c...
Which of the following lines is a properly formatted comment? 
a. 
// This is a comment 
b. 
/* This is a comment */ 
c. 
/* 
this is a comment 
*/ 
d. 
both a and b 
e. 
a, b and c - ANSWER-e. a, b and c 
 
The Java compiler translates Java source code into _____________ . 
a. 
assembly code 
b. 
C...
Preview 3 out of 20 pages
Add to cartWhich of the following lines is a properly formatted comment? 
a. 
// This is a comment 
b. 
/* This is a comment */ 
c. 
/* 
this is a comment 
*/ 
d. 
both a and b 
e. 
a, b and c - ANSWER-e. a, b and c 
 
The Java compiler translates Java source code into _____________ . 
a. 
assembly code 
b. 
C...
Information Technology (IT) - ANSWER-Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization 
 
Cybercrime - ANSWER-Any criminal action perpetrated primarily through the use of a computer 
 
Phishing - ANSWER-An...
Preview 2 out of 6 pages
Add to cartInformation Technology (IT) - ANSWER-Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization 
 
Cybercrime - ANSWER-Any criminal action perpetrated primarily through the use of a computer 
 
Phishing - ANSWER-An...
True - ANSWER-A digital wallet is secure means of making payments from your mobile device (e.g. smartphone) 
 
True - ANSWER-Electronic trash is sometimes shipped overseas 
 
True - ANSWER-It is a good idea to wipe the hard disk of a computer before donating or selling it. 
 
True - ANSWER-The energ...
Preview 2 out of 11 pages
Add to cartTrue - ANSWER-A digital wallet is secure means of making payments from your mobile device (e.g. smartphone) 
 
True - ANSWER-Electronic trash is sometimes shipped overseas 
 
True - ANSWER-It is a good idea to wipe the hard disk of a computer before donating or selling it. 
 
True - ANSWER-The energ...
machine language - ANSWER-a set of instructions executed directly by a computer's CPU 
 
assembly language - ANSWER-a one-to-one correspondence between the language and the architecture's machine code instructions 
 
formal language - ANSWER-math, programming, created to solve algorithms 
 
natura...
Preview 2 out of 5 pages
Add to cartmachine language - ANSWER-a set of instructions executed directly by a computer's CPU 
 
assembly language - ANSWER-a one-to-one correspondence between the language and the architecture's machine code instructions 
 
formal language - ANSWER-math, programming, created to solve algorithms 
 
natura...
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. - ANSWER-analyze large amounts of data 
 
A common form of authentication is a ____. - ANSWER-password 
 
A new fourth-generation technology called ____ is competing to become the wirele...
Preview 2 out of 9 pages
Add to cartA challenge for companies such as Google and Facebook is building software that can ____ over the next few years. - ANSWER-analyze large amounts of data 
 
A common form of authentication is a ____. - ANSWER-password 
 
A new fourth-generation technology called ____ is competing to become the wirele...
The raw facts and figures that are entered into a computer system are called ________ 
A. information 
B. data 
C. material 
D. knowledge - ANSWER-Data 
 
A communications system connecting two or more computers is called a _______ 
A. modem 
B. cable 
C. telephone line 
D. network - ANSWER-Network ...
Preview 3 out of 16 pages
Add to cartThe raw facts and figures that are entered into a computer system are called ________ 
A. information 
B. data 
C. material 
D. knowledge - ANSWER-Data 
 
A communications system connecting two or more computers is called a _______ 
A. modem 
B. cable 
C. telephone line 
D. network - ANSWER-Network ...
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. 
c. analyze large amounts of data - ANSWER-a. filter inappropriate material 
b. sift through people's profiles 
c. analyze large amounts of data 
d. handle alphabetizing data 
 
A commo...
Preview 3 out of 21 pages
Add to cartA challenge for companies such as Google and Facebook is building software that can ____ over the next few years. 
c. analyze large amounts of data - ANSWER-a. filter inappropriate material 
b. sift through people's profiles 
c. analyze large amounts of data 
d. handle alphabetizing data 
 
A commo...
The idea of creating a computer program to solve a complex task by breaking it down into a list of simple instructions is known as _________. - ANSWER-top-down design 
 
A sequence of instructions that tell the computer what to do is known as a _________? - ANSWER-computer program 
 
A sketch in a s...
Preview 2 out of 9 pages
Add to cartThe idea of creating a computer program to solve a complex task by breaking it down into a list of simple instructions is known as _________. - ANSWER-top-down design 
 
A sequence of instructions that tell the computer what to do is known as a _________? - ANSWER-computer program 
 
A sketch in a s...
As organizations move from Data to Knowledge, they will start to include more and more variables for analysis resulting in better, more precise support for ___________. - ANSWER-Both A&B 
 
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and i...
Preview 2 out of 5 pages
Add to cartAs organizations move from Data to Knowledge, they will start to include more and more variables for analysis resulting in better, more precise support for ___________. - ANSWER-Both A&B 
 
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and i...
Moores law and its relation to the cost or data processing and storage - ANSWER-the number of transistors per square inch on an integrated chip doubles every 18 months. 
Meaning the cost of data processing and data storage is essentially zero 
 
the impact of jobs with routine skills and outsourcing...
Preview 1 out of 4 pages
Add to cartMoores law and its relation to the cost or data processing and storage - ANSWER-the number of transistors per square inch on an integrated chip doubles every 18 months. 
Meaning the cost of data processing and data storage is essentially zero 
 
the impact of jobs with routine skills and outsourcing...
CPU - ANSWER-Brain of the computer; selects instructions, and processes them and performs arithmetic and logic. 
 
2 CPU's - ANSWER-Dual. 
 
4 CPU's - ANSWER-Quad. 
 
Bit - ANSWER-What computers use to sow data using binary digits. 
 
1 Megabyte - ANSWER-1,024 kilobytes. 
 
1 Gigabyte - ANSWER-1,0...
Preview 1 out of 4 pages
Add to cartCPU - ANSWER-Brain of the computer; selects instructions, and processes them and performs arithmetic and logic. 
 
2 CPU's - ANSWER-Dual. 
 
4 CPU's - ANSWER-Quad. 
 
Bit - ANSWER-What computers use to sow data using binary digits. 
 
1 Megabyte - ANSWER-1,024 kilobytes. 
 
1 Gigabyte - ANSWER-1,0...
Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in? - ANSWER-audit 
 
Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not...
Preview 2 out of 13 pages
Add to cartRicky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in? - ANSWER-audit 
 
Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not...
To be effective, hackers and cybercriminals: - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. 
 
only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - ANSWER-only need to know one vulner...
Preview 3 out of 16 pages
Add to cartTo be effective, hackers and cybercriminals: - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. 
 
only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - ANSWER-only need to know one vulner...
Information Technology (IT) - ANSWER-the computers and other electronic devices used to store, retrieve, transmit and manipulate data 
 
Cybercrime - ANSWER-Any criminal action perpetrated primarily through the use of a computer 
 
Phishing - ANSWER-a technique to gain personal information for the p...
Preview 2 out of 5 pages
Add to cartInformation Technology (IT) - ANSWER-the computers and other electronic devices used to store, retrieve, transmit and manipulate data 
 
Cybercrime - ANSWER-Any criminal action perpetrated primarily through the use of a computer 
 
Phishing - ANSWER-a technique to gain personal information for the p...
1. A ________ is a device that provides a continuous supply power during a power failure and prevents spikes and surges from reaching your computer - ANSWER-D. UPS 
 
2. A(n)________ contains multiple outlets but can not filter out power spikes and surges - ANSWER-B. Power Strip 
 
3. A(n)_________ ...
Preview 2 out of 7 pages
Add to cart1. A ________ is a device that provides a continuous supply power during a power failure and prevents spikes and surges from reaching your computer - ANSWER-D. UPS 
 
2. A(n)________ contains multiple outlets but can not filter out power spikes and surges - ANSWER-B. Power Strip 
 
3. A(n)_________ ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller papersbyjol. Stuvia facilitates payment to the seller.
No, you only buy these notes for $38.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67096 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now