FBLA COMP TECH REAL EX
Retailers use customer databases for all the following reasons except _____.
guaranteeing maximum company profits
What is the systems development life cycle?
the overall process for developing information systems from planning and analysis
through implementation and maintenance
The most frequently used instructions of a computer program are likely to be fetched
from _____.
cache
_____ happens when someone steals your personal information to commit fraud
Identity theft
Leaders of team decision making _____.
All of the above
cannot act bureaucratically
must be mindful of the desired outcome
read the personalities in the group
A national retail store has customer account information revealed to masses of people.
This is an example of a _______.
security breach
Which of the following is not a type of organizational information system?
analysis processing system
What is the total value of all goods and services manufactured in a particular country
in a single year?
gross domestic product
A form that helps a user navigate around a database is called a _____
main switchboard
All the following are advantages of outsourcing IT except _____.
confidentiality
The steps for analyzing processes that will facilitate the identification of waste and
non-value-added activity is found in the _____.
Process Improvement Plan
The sequence of processes involved in the production and distribution of a
commodity is referred to as _____.
supply chain
By using _____, members of management can easily see which workers are doing a
stellar job.
productivity-monitoring software to monitor their organization
A network ______ is the way everything on your network is connected.
topology
What is part of a database that holds all of the information about one item or subject?
record
Which of the following is a valid IP address?
192.0.0.35
OSI is a general model for what?
network communication
Which one of the following command prompts will show you active TCP connections,
ports on which the computer is listening, and other network connections?
netstat
Which of the following OSI layers handles port addresses?
session
Many pieces of network hardware have rapidly blinked lights on them. What are these
called?
link lights
Which of the following is an OS patch not likely to do?
redesign the OS UI
A tree network is described in which of the following?
a hub is connected to two devices, each of which has two child devices
_____ is part of the physical layer.
Fiber optic
Which one of the following is not a major concern when setting up a network operating
system?
setting the BIOS to boot loop in case the operating system crashes
Wi-Fi signal strength is measured in _____.
decibels (dB)
You type "debug ip rip" on the router console and see that "172.16.10.0" is being
advertised to you with a metric of 16. What does this mean?
the route is inaccessible
You modify a switch to send all input as output on all other ports (i.e. all data input to
port C are output from ports A and B). You have created what type of networking
device?
hub
If a user says their name is “; DROP TABLE users;” and all your users suddenly lose the
ability to log in, you were not preventing what type of attack?
SQL injection
Some organizations use a private, in-house network to make services such as project
management tools, corporate applications, and even curated search engines available
to employees, but not the internet at large. What is the name for such a network?
intranet
1A:3B:FC:8D:33:C3 is an example of _____.
MAC address