csis1/content/quizzes/final-exam-bank.md

21 KiB
Raw Blame History

Final Exam Question Bank

30 questions: 10 new cross-topic synthesis questions + 20 selected from weekly graded quizzes.


NEW SYNTHESIS QUESTIONS (Q1Q10)

Q1: Hardware Meets Security

Jasmine's laptop is stolen from a coffee shop. She had full-disk encryption enabled, a strong login password, and her files backed up to cloud storage. Which statement BEST describes her situation?

A. She's lost everything — the thief has full access to all her data B. The thief has the hardware, but full-disk encryption prevents data access without the password; her files are safe in the cloud and she can restore them on a new device C. Full-disk encryption only works on desktop computers, not laptops D. Cloud backups are automatically deleted when a laptop is stolen

Answer: B Explanation: This combines hardware (Week 1), cloud storage (Week 4), and encryption (Week 5). Full-disk encryption renders the drive unreadable without the password, protecting her data even though the physical device is gone. Cloud backups ensure she can restore her work on a replacement device.

Q2: Spreadsheets and Security

Coach Williams shares his team's stats spreadsheet via a public Google Sheets link so parents can view game results. He doesn't realize the spreadsheet also contains a hidden tab with players' home addresses and phone numbers. What risks and concepts are involved?

A. No risk — hidden tabs can't be seen by anyone B. Anyone with the link can see ALL tabs including hidden ones; this is both a privacy violation and poor data management — sensitive data should be in a separate, access-controlled file C. Google Sheets automatically encrypts hidden tabs D. Only the visible tab is shared; hidden tabs are always private

Answer: B Explanation: This crosses spreadsheet skills (Week 2) and security/privacy (Week 5). Hidden tabs in shared spreadsheets can be unhidden by anyone with access. Sensitive personal data should never be in the same file as publicly shared information. Proper data management means separating public and private data.

Q3: Phishing Meets Web Literacy

Daniela receives an email appearing to be from her bank with the link "https://secure-mybank.account-verify.net/login." The email has perfect grammar, the bank's logo, and a professional layout. What combination of knowledge helps her identify this as phishing?

A. She should trust it because HTTPS makes it secure and the grammar is perfect B. URL analysis (the real domain is account-verify.net, not her bank), email skepticism (unexpected requests for login), and knowing that AI can generate flawless phishing emails — multiple literacy skills work together C. Perfect grammar proves it's legitimate since phishing always has typos D. Bank logos can only be used by the real bank, so it must be authentic

Answer: B Explanation: This synthesizes web literacy (Week 4 — URL structure, HTTPS misconceptions), security awareness (Week 5 — phishing identification), and AI awareness (Week 6 — AI-generated phishing no longer has telltale typos). Modern phishing requires layered critical thinking, not just looking for obvious red flags.

Q4: Database Design for a Real Problem

A small library wants to track its books, members, and checkouts. They currently use one giant spreadsheet with columns for book title, author, member name, member phone, checkout date, and return date — with the member's info repeated on every checkout row. What is the BEST improvement?

A. Add more columns to the spreadsheet for additional member details B. Switch to a database with separate tables for Books, Members, and Checkouts — linked by IDs — to eliminate redundant data and improve searchability C. Create a separate spreadsheet for each member D. Delete the old checkout records to keep the spreadsheet small

Answer: B Explanation: This connects spreadsheet limitations (Week 2) with database concepts (Week 3). Repeating member info on every row is data redundancy — it wastes space and creates inconsistencies. A relational database with linked tables (Books, Members, Checkouts) stores each piece of data once and connects records through IDs.

Q5: Network Security at Work

A company's employee connects a personal smart speaker (IoT device) to the office WiFi network. The device has a default password and hasn't been updated since purchase. What layers of risk does this introduce?

A. No risk — personal devices can't affect a business network B. The IoT device with a default password is an easy entry point for attackers; once on the network, they could potentially access company resources, intercept data, or launch further attacks C. Smart speakers only connect to Bluetooth, not WiFi D. Default passwords are more secure than custom ones because they're random

Answer: B Explanation: This combines networking (Week 3 — LAN, device connectivity), security (Week 5 — authentication, default passwords), and IoT awareness (Week 6). An unsecured IoT device on a corporate network is a common real-world vulnerability. It demonstrates why network segmentation and device security policies matter.

Q6: AI in the Productivity Suite

A marketing manager uses AI to generate a first draft of a quarterly report, formats it in a word processor with heading styles, pulls sales data from a spreadsheet using formulas, and creates a presentation with key findings. Which statement BEST captures what she should verify?

A. Nothing — AI and software tools are always accurate B. She should fact-check the AI-generated content for hallucinations, verify the spreadsheet formulas produce correct results, and ensure the presentation distills complex data accurately without misleading simplifications C. She only needs to check the spelling and grammar D. She should re-do everything manually because AI tools can't be trusted at all

Answer: B Explanation: This integrates AI literacy (Week 6 — hallucinations), spreadsheets (Week 2 — formula accuracy), word processing (Week 2 — formatting), and presentations (Week 3 — clear communication). Each tool layer introduces potential errors. The human's job is verification and quality control across the entire workflow.

Q7: Cloud Computing and File Management

Ravi saves all his college work exclusively in Google Drive. His laptop breaks during finals week. Which statement is MOST accurate about his situation?

A. All his work is permanently lost because it was in the cloud B. He can access all his files from any device with internet access by logging into his Google account — cloud storage is independent of any single device C. He needs to buy the exact same laptop model to recover his files D. Google Drive only works on the device where files were first created

Answer: B Explanation: This connects file management (Week 1), cloud computing (Week 4), and backup strategy (Week 1). Cloud storage's key advantage is device independence — files live on remote servers, not on your hardware. However, this also means internet access is required, and relying solely on one cloud provider has its own risks.

Q8: Evaluating AI-Generated News

A news article about a local election goes viral on social media. It features a video of a candidate making controversial statements. You want to determine if the article and video are trustworthy. Which approach is MOST thorough?

A. If the article has many shares and comments, it's credible B. Check if the article comes from a recognized news outlet, verify the video hasn't been deepfaked (check official candidate channels, look for visual artifacts), use fact-checking sites, and consider whether the source has a bias or agenda C. Check only the article's publication date — if it's recent, it's accurate D. Ask ChatGPT if the article is true

Answer: B Explanation: This synthesizes information literacy (Week 6 — evaluating sources, detecting misinformation), AI awareness (Week 6 — deepfakes), web credibility (Week 4), and security mindset (Week 5 — skepticism toward unexpected claims). Thorough verification requires checking multiple angles: source credibility, media authenticity, and independent corroboration.

Q9: Complete Security Scenario

Maya is starting college. She gets a new laptop, creates accounts for email, Canvas, and social media, and connects to campus WiFi. What set of actions would BEST protect her digital life from the start?

A. Use one easy-to-remember password for everything so she doesn't get locked out B. Set up a password manager with unique passwords for each account, enable 2FA everywhere, install OS and software updates promptly, use HTTPS-only browsing, enable full-disk encryption, and be cautious with campus WiFi for sensitive transactions C. Avoid creating any online accounts to stay completely safe D. Only use her phone, never her laptop, because phones can't get viruses

Answer: B Explanation: This is a comprehensive security scenario drawing from passwords and 2FA (Week 5), encryption (Week 5), software updates (Week 5), HTTPS (Week 4), WiFi risks (Week 5), and general digital literacy. Layered security from day one is far easier than recovering from a breach later.

Q10: Technology Choices

A small nonprofit needs to: track 500 donors (names, addresses, donation history), send professional newsletters, manage a budget, and present annual results to its board. Which combination of tools is MOST appropriate?

A. Use a single Word document for everything B. A database or CRM for donor tracking, a word processor or email marketing tool for newsletters, a spreadsheet for the budget with formulas, and a presentation tool for the annual board report C. Print everything on paper — technology isn't necessary for nonprofits D. Use only a spreadsheet for all four tasks

Answer: B Explanation: This integrates knowledge across the entire course: databases for structured relational data (Week 3), word processing for documents (Week 2), spreadsheets with formulas for financial tracking (Week 2), and presentations for communicating results (Week 3). Choosing the right tool for each task is a core digital literacy skill.


SELECTED FROM WEEKLY GRADED QUIZZES (Q11Q30)

Q11: Choosing the Right Component (Week 1)

Maria's laptop is running slowly when she has multiple browser tabs and applications open. Which component upgrade would most directly help?

A. A larger SSD B. More RAM C. A better graphics card D. A faster internet connection

Answer: B Explanation: RAM handles data for active applications. When you run out of RAM, the computer uses slower storage as overflow (virtual memory), causing sluggish performance. More RAM lets you multitask smoothly.

Q12: File Management Scenario (Week 1)

Kenji downloads a file called "project_final_v2.docx.exe" from an email. What should concern him most?

A. The file has "v2" in the name, meaning it's outdated B. The .exe extension means it's actually a program, not a document — it could be malware C. Files with two extensions are always corrupted D. The .docx part means it can only be opened in Google Docs

Answer: B Explanation: The actual file type is determined by the last extension. A file ending in .exe is an executable program. Attackers often disguise malware with names like "document.docx.exe" to trick people into running it.

Q13: Absolute vs Relative References (Week 2)

Rosa has a spreadsheet where cell B1 contains a tax rate (8.5%). She wants every row to multiply the item price by this same tax rate. Which formula in C2 would work correctly when copied down?

A. =A2B1 B. =A2$B$1 C. =$A$2*$B$1 D. =A2*B2

Answer: B Explanation: $B$1 is an absolute reference — the dollar signs lock it so it won't change when the formula is copied. A2 is relative and will update to A3, A4, etc. This way, each row multiplies its own price by the fixed tax rate in B1.

Q14: IF Function (Week 2)

What does the formula =IF(B2>=60, "Pass", "Fail") do?

A. It checks if B2 is greater than or equal to 60; if yes, it displays "Pass"; otherwise, "Fail" B. It adds 60 to the value in B2 C. It counts how many cells contain the word "Pass" D. It changes the value in B2 to 60

Answer: A Explanation: The IF function has three parts: a condition (B2>=60), a value if true ("Pass"), and a value if false ("Fail"). It's one of the most useful spreadsheet functions for making decisions based on data.

Q15: Slide Design Scenario (Week 3)

Tomás has a slide with a bright red background, yellow text, and a 200-word paragraph. Which change would MOST improve this slide?

A. Change the text color to orange for better contrast B. Add an animation to each line of text so it appears one word at a time C. Reduce the text to 45 key bullet points and use a high-contrast color scheme D. Make the font smaller so more text fits on the slide

Answer: C Explanation: The slide has two problems: too much text and poor color contrast. Reducing to key bullet points keeps the audience engaged, and high-contrast colors ensure readability. Making text smaller or adding distracting animations would make things worse.

Q16: Database Query Thinking (Week 3)

An advisor wants to see all students enrolled in Biology 101 who have a GPA above 3.5. This is an example of:

A. A Delete operation B. A query — asking the database a specific question to filter and retrieve data C. A backup D. A Create operation

Answer: B Explanation: A query asks the database to find records matching specific criteria — filtering by course AND GPA. Queries are the "Read" part of CRUD and are how we extract useful information from large datasets.

Q17: Cloud Service Models (Week 4)

A startup wants to write their code and have someone else handle servers and infrastructure. Which cloud model fits?

A. SaaS B. IaaS C. PaaS — it provides a platform for developing and deploying apps without managing underlying infrastructure D. They must buy physical servers

Answer: C Explanation: PaaS (Platform as a Service) provides a development environment where you deploy your code without managing servers, operating systems, or networking. IaaS gives bare virtual machines; SaaS gives finished software.

Q18: URL Analysis (Week 4)

Mei receives a link to "https://secure-bankofamerica.login-verify.com/account." Should she trust it?

A. Yes — it says "secure" and "bankofamerica" in the URL B. Yes — it uses HTTPS C. No — the actual domain is "login-verify.com," not bankofamerica.com D. No — all bank emails are scams

Answer: C Explanation: The actual domain is determined by reading right-to-left from the first slash: "login-verify.com" is the real domain. "secure-bankofamerica" is just a subdomain anyone can create. HTTPS only means the connection is encrypted — it doesn't verify who owns the site.

Q19: AI Voice Cloning (Week 5)

Marcus receives a voicemail that sounds exactly like his boss, urgently requesting a $5,000 wire transfer. What should he do FIRST?

A. Wire the money immediately B. Reply to the voicemail number C. Contact his boss directly using a known, trusted phone number to verify the request D. Ignore it entirely

Answer: C Explanation: AI voice cloning can replicate someone's voice with just a few seconds of sample audio. Always verify unusual financial requests through a separate, trusted communication channel. Calling the voicemail number back could connect you to the scammer.

Q20: Password Manager Justification (Week 5)

Kai's friend uses the same password everywhere because they "can't remember different ones for 50 accounts." What is the BEST counter-argument?

A. Write each password on paper and keep it in a drawer B. A password manager generates and stores unique passwords — you only remember one master password C. Add a number to the end for each site (password1, password2) D. Browsers remember passwords, so don't worry about it

Answer: B Explanation: Password managers securely store unique, complex passwords for every account. Reusing passwords means one breach compromises all your accounts. Sequential variations are easily guessed.

Q21: Comprehensive Security (Week 5)

Which set of practices represents the STRONGEST overall personal security posture?

A. Same strong password everywhere, no 2FA, weekly antivirus B. Unique passwords via password manager, 2FA on all important accounts, regular updates, encrypted 3-2-1 backups, and skepticism toward unexpected messages C. Avoiding the internet entirely D. 2FA but never updating software and clicking links freely

Answer: B Explanation: Strong security is layered — no single measure is enough. Unique passwords prevent credential stuffing, 2FA adds a second barrier, updates patch vulnerabilities, backups protect against ransomware, and skepticism defends against social engineering.

Q22: AI Hallucinations in Practice (Week 6)

Amara asks ChatGPT for three academic sources on renewable energy. It returns three legitimate-looking citations. What should she do BEFORE using them?

A. Use them immediately B. Search for each citation in a library database or Google Scholar to verify they exist C. Ask ChatGPT if they're real D. Change the author names

Answer: B Explanation: LLMs frequently hallucinate citations — generating plausible but fabricated references. Always verify citations independently through library databases or Google Scholar.

Q23: Echo Chambers (Week 6)

Kevin only follows commentators he agrees with, and the algorithm keeps recommending similar content. Over time he becomes more extreme in his views. This is an example of:

A. Digital literacy B. An echo chamber — algorithmic curation reinforces beliefs and limits diverse perspectives C. Effective research D. Social engineering

Answer: B Explanation: Echo chambers form when algorithms feed content matching existing views, creating a feedback loop. Actively seeking diverse, credible sources is the antidote.

Q24: Backup Strategy (Week 1)

Amir keeps all his college work on his laptop with no backup. His roommate suggests the 3-2-1 rule. What does it recommend?

A. Back up 3 times a day, to 2 drives, keeping 1 copy at school B. Keep 3 copies of data, on 2 different media types, with 1 copy off-site C. Use 3 cloud services, 2 flash drives, and 1 external hard drive D. Save files in 3 formats across 2 folders on 1 computer

Answer: B Explanation: The 3-2-1 rule: 3 total copies, 2 different media types (e.g., internal drive + external), 1 off-site (e.g., cloud). This protects against hardware failure, theft, and disasters.

Q25: Formatting Strategy (Week 2)

Tanya wants consistent headings in a 20-page paper and an automatic table of contents. What is the BEST approach?

A. Manually format each heading B. Use built-in heading styles (Heading 1, Heading 2) consistently C. Type all headings in ALL CAPS D. Bold every heading and hope the TOC generator finds them

Answer: B Explanation: Built-in heading styles ensure consistent formatting AND enable automatic features like table of contents, navigation panes, and document outlines.

Q26: Network Troubleshooting (Week 3)

Jasmine can access other websites but can't reach one specific site. Her friend can access it from a different network. What's the MOST likely explanation?

A. Her computer doesn't have a browser B. The website is permanently deleted C. A DNS or routing issue between her network and that server D. She needs more RAM

Answer: C Explanation: If other sites work and someone else can reach the site, the issue is likely DNS resolution or routing between her specific network and that server.

After searching for running shoes on one site, Elena sees shoe ads on unrelated websites. What explains this?

A. Her computer has a virus B. Third-party tracking cookies followed her browsing activity across websites C. The shoe company hacked those sites D. All websites show the same ads

Answer: B Explanation: Third-party cookies from ad networks track browsing across sites to enable targeted advertising. This is why privacy tools like cookie blockers exist.

Q28: Smishing Scenario (Week 5)

Tyler gets a text: "USPS: Package undeliverable. Fee of $1.95 required. Pay here: bit.ly/usps-fee." He's not expecting a package. What's the BEST response?

A. Pay the $1.95 — it's small B. Click the link to check C. Delete it — it's smishing designed to steal payment info D. Reply "STOP" to unsubscribe

Answer: C Explanation: USPS doesn't request fees via text with shortened URLs. The small amount is intentional — the goal is capturing credit card information, not $1.95.

Q29: Responsible AI Use (Week 6)

Which scenario represents the BEST use of AI for a class assignment?

A. Having AI write your entire essay and submitting it B. Using AI to brainstorm ideas and outline arguments, then writing the essay yourself C. Asking AI for quiz answers and copying them D. Using AI to generate a fake bibliography

Answer: B Explanation: AI is most valuable as a thinking partner. The learning happens when YOU do the writing and critical thinking. Using AI to bypass learning defeats the purpose of education.

Q30: Scam Recognition (Week 5)

Rosa's grandmother receives a crying phone call from someone claiming to be Rosa, saying she needs $2,000 in gift cards for bail. What type of scam is this?

A. Tech support scam B. Impersonation / emergency scam ("grandparent scam") C. Romance scam D. Fake job offer

Answer: B Explanation: The "grandparent scam" exploits family bonds and urgency. The caller pretends to be a loved one in crisis, requesting untraceable payment (gift cards, wire transfers). The defense: hang up and call the real person directly.