The melting point of an impure compound is generally _______________ than that of the pure solid.
Answer:Low...
The performance of WANs can be improved by:
The performance of WANs can be improved by:
Answer: upgrading the circuits between the compute...
Which of the following is a primary advantage of a VPN in comparison to a private WAN connection?
Which of the following is a primary advantage of a VPN in comparison to a private WAN connection?
Answer: low co...
With a virtual private network, users create permanent virtual circuits through the Internet called:
With a virtual private network, users create permanent virtual circuits through the Internet called:
Answer: tunne...
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated...
The _________________ is a United States government agency that regulates voice and data communication.
The _________________ is a United States government agency that regulates voice and data communication.
Answer: F...
Pregnancy is divided into ___________.
Pregnancy is divided into ___________.
Answer: Three trimeste...
Placenta is connected by the __________ to the infant.
Placenta is connected by the __________ to the infant.
Answer: Umbilical co...
The structure that supplies the food/nutrients from the mother of the baby
The structure that supplies the food/nutrients from the mother of the baby
Answer: Placen...
Once implantation occurs, ____________.
Once implantation occurs, ____________.
Answer: The placenta begins to fo...
This is when the embryo attaches itself to the uterine wall
This is when the embryo attaches itself to the uterine wall
Answer: Implantati...
United sperm and cell, 36 hrs, travels through Fallopian tube, dividing
United sperm and cell, 36 hrs, travels through Fallopian tube, dividing
Answer: Zygo...
Caused by a virus (no cure) contagious through skin to skin contact inn infected area. Forms ________, period outbreaks throughout their life infected woman can also infect child during birth.
Caused by a virus (no cure) contagious through skin to skin contact inn infected area. Forms ________, period outbreaks throughout their life infected...
Person can be symptomatic for years _________________.
Person can be symptomatic for years _________________.
- usually dies from infections, spread through blood and body flui...
It attacks cells in immune system, progresses from no symptoms to advanced attacks on the immune system.
It attacks cells in immune system, progresses from no symptoms to advanced attacks on the immune system.
Answer: HIV&nbs...
Causes by bacteria (can be treated and cure with antibiotics) Symptoms include __________, pelvic inflammatory, _____________ and infertility.
Causes by bacteria (can be treated and cure with antibiotics) Symptoms include __________, pelvic inflammatory, _____________ and infertility.
- burning...
It is a _____ which means there is ________. When left untreated you can be left with _____ and _______.
It is a _____ which means there is ________. When left untreated you can be left with _____ and _______.
- virus
- no cure
- infertility
- cervical...
Can be spread through skin contacts and fluid contact, frequently no symptoms (genital warts)
Can be spread through skin contacts and fluid contact, frequently no symptoms (genital warts)
HPV - human papilloma vir...
Diseases that are spread through contacts with sexual organs (genitals), or though body and blood fluids
Diseases that are spread through contacts with sexual organs (genitals), or though body and blood fluids
Answer: Sexually Transmitted Diseas...
These levels will also increase the ____________, low birth weight babies, difficulty breastfeeding, and ________.
These levels will also increase the ____________, low birth weight babies, difficulty breastfeeding, and ________.
- risk of miscarriage
- low blood...
_________ will cause your cycle to be irregular, make you have _______, difficult _______ and cause issues with hair and skin.
_________ will cause your cycle to be irregular, make you have _______, difficult _______ and cause issues with hair and skin.
- low progesterone...
Your body works during your cycle to promote ____________. At ovulation _____________. There may be a slight pain at the ovarian site, temperature changes.
Your body works during your cycle to promote ____________. At ovulation _____________.There may be a slight pain at the ovarian site, temperature changes.
-Healthy...
A woman becomes pregnant if the ________________. If the egg is not fertilized, it __________. Then the hormone levels drop, and the _________ is shed during the menstrual period.
A woman becomes pregnant if the ________________. If the egg is not fertilized, it __________. Then the hormone levels drop, and the _________ is shed...
After the egg has left the ovary, it travels ______________. Hormone levels rise and ______________. A woman is most likely to get pregnant during the _________.
After the egg has left the ovary, it travels ______________. Hormone levels rise and ______________. A woman is most likely to get pregnant during the...
At about day 14 of an average 28 day cycle, _________________. This is called _________.
At about day 14 of an average 28 day cycle, _________________. This is called _________.
- the egg leaves the ovary
- ovulati...
Estrogen also makes the lining of uterus _______________. The lining of the womb is a place that nourishes the _____________. At the same times the lining of the womb is growing an _________.
Estrogen also makes the lining of uterus _______________. The lining of the womb is a place that nourishes the _____________. At the same times the...
In the first half of the cycle the____________________. Estrogen plays an important role in keeping you healthy by helping you build _________.
In the first half of the cycle the____________________. Estrogen plays an important role in keeping you healthy by helping you build _________.
-...
What is the average menstrual cycle?
What is the average menstrual cycle?
Answer: 28 da...
How is the menstrual cycle counted?
How is the menstrual cycle counted?
A cycle is counted from the first day of one period to the first day of your next period
...
The menstrual cycle provides ________ to keep you healthy and also prepare your body for __________.
The menstrual cycle provides ________ to keep you healthy and also prepare your body for __________.
- hormones
- pregnancy each mon...
Each month your body has the opportunity to _________. When this doesn't happen what does your body do?
Each month your body has the opportunity to _________. When this doesn't happen what does your body do?
- become pregnant
- your body sheds the uterine...
Activates changes to a woman's reproductive system before and after pregnancy
Activates changes to a woman's reproductive system before and after pregnancy
Progestero...
Causes puberty to begin and maintains it, and controls egg maturation
Causes puberty to begin and maintains it, and controls egg maturation
Estrog...
When a girl is born, there are hundreds of _________ within each ________. What happens to the eggs before they are released each month, what is this process known as?
When a girl is born, there are hundreds of _________ within each ________. What happens to the eggs before they are released each month, what is this...
Located a few inches below your waist , on on each side of your body. It's about the size of an almond . They produce ________ and ________, they also release __________.
Located a few inches below your waist , on on each side of your body. It's about the size of an almond . They produce ________ and ________, they also...
Located a few inches below your waist , on on each side of your body. It's about the size of an almond . They produce ________ and ________, they also release __________.
Located a few inches below your waist , on on each side of your body. It's about the size of an almond . They produce ________ and ________, they also...
Period when body changes and sexually mature and capable of reproduction
Period when body changes and sexually mature and capable of reproduction
Puber...
Ovaries- These organs release hormones that release ______, effect puberty and regulate _________
Ovaries- These organs release hormones that release ______, effect puberty and regulate _________
- eggs
- menstruati...
Pea sized gland in your Brian that controls functions such as ________ and _________. It also turns on other glands that effect ________.
Pea sized gland in your Brian that controls functions such as ________ and _________. It also turns on other glands that effect ________.
- pituitary
-...
Located in the brain, produces ___________, and controls the function of other gland.
Located in the brain, produces ___________, and controls the function of other gland.
- Hypothalamus
- releasing hormon...
Once the hormone has reached its target it can
Once the hormone has reached its target it can
- _________
- _________
- _________
- _________
- start
- stop
- speed up the body's activities
-...
A chemical substance produced by an endocrine gland. It acts as a _____________.
A chemical substance produced by an endocrine gland. It acts as a _____________.
-Hormone
- chemical messeng...
A group of organs that produce and release chemical substances that signal changes in the other parts of the body. They release ___________________.
A group of organs that produce and release chemical substances that signal changes in the other parts of the body. They release ___________________.
-Endocrine...
Which of the following must NOT be done if your vehicle is in an acceleration skid?
Which of the following must NOT be done if your vehicle is in an acceleration skid?
Answer: brake immediate...
You have parked facing up a steep hill. If you drive an automatic, you should leave your car in "park." Which gear should you use with a manual?
You have parked facing up a steep hill. If you drive an automatic, you should leave your car in "park." Which gear should you use with a manual?
Answer:...
What is the minimum property damage coverage requirement for an auto insurance policy on a California vehicle?
What is the minimum property damage coverage requirement for an auto insurance policy on a California vehicle?
Answer: 5,0...
If a California driver's first DUI conviction is for a blood alcohol concentration (BAC) of 0.20% or higher, his or her license will be suspended for ______ months.
If a California driver's first DUI conviction is for a blood alcohol concentration (BAC) of 0.20% or higher, his or her license will be suspended for...
When you are turning right from a one-way street onto a two-way or divided street, always turn from
When you are turning right from a one-way street onto a two-way or divided street, always turn from
Answer: the lane nearest the cu...
When preparing to exit the freeway, you should signal for at least ____ seconds before reaching the exit.
When preparing to exit the freeway, you should signal for at least ____ seconds before reaching the exit.
Answer:...
Two or more DUI convictions in the state of California may result in up to ___ years of license revocation.
Two or more DUI convictions in the state of California may result in up to ___ years of license revocation.
Answer:...
If your vehicle is parked on a level street, in which direction should the tires point?
If your vehicle is parked on a level street, in which direction should the tires point?
Answer: parallel to the cu...
Passing on the right is NOT permitted
Passing on the right is NOT permitted
Answer: a lane for left tur...
What is the minimum age requirement for a minors' driver license in the state of CA?
What is the minimum age requirement for a minors' driver license in the state of CA?
Answer: ...
Which of the following statements is true regarding lane markings on the road?
Which of the following statements is true regarding lane markings on the road?
Answer: a solid white line between lanes of traffic means that you...
In a skid, your most important vehicle control device is
In a skid, your most important vehicle control device is
Answer: the steering whe...
On a road with three or more lanes traveling in the same direction, the leftmost lane is used for
On a road with three or more lanes traveling in the same direction, the leftmost lane is used for
Answer: passing slower vehicl...
Before backing up your vehicle, you should look to the front, sides, and rear, and continue to look _________ while backing.
Before backing up your vehicle, you should look to the front, sides, and rear, and continue to look _________ while backing.
Answer: to the re...
On a two-way roadway with a center lane, drivers from either direction can _________ from the center lane.
On a two-way roadway with a center lane, drivers from either direction can _________ from the center lane.
Answer: make left turns or U-tur...
If you double your speed on a highway, your braking distance increases by
If you double your speed on a highway, your braking distance increases by
Answer: 4 tim...
What is the minimum age requirement for an adults' instruction permit in the state of California?
What is the minimum age requirement for an adults' instruction permit in the state of California?
Answer: ...
If a California driver loans his or her vehicle to an unlicensed driver, whether knowingly or unintentionally, it may be impounded for ____ days.
If a California driver loans his or her vehicle to an unlicensed driver, whether knowingly or unintentionally, it may be impounded for ____ days.
Answer:...
On a highway with three or more lanes going in one direction, vehicles passing others or turning left should use
On a highway with three or more lanes going in one direction, vehicles passing others or turning left should use
Answer: the left la...
You must not follow within ____ feet of any emergency vehicle with a siren or flashing lights.
You must not follow within ____ feet of any emergency vehicle with a siren or flashing lights.
Answer: 3...
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or...
The functional components of an _________ are: data source, sensor, analyzer, administration, manager, and operator.
The functional components of an _________ are: data source, sensor, analyzer, administration, manager, and operator.
Answer: I...
The _________ (RFC 4766) document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
The _________ (RFC 4766) document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
Answer: Intrusion Detection Message...
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
Answer: network-bas...
______ simulate human brain operation with neurons and synapse between them that classify observed data.
______ simulate human brain operation with neurons and synapse between them that classify observed data.
Answer: neural networ...
______ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
______ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether...
______ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
______ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
Answer:...
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of...
An IDS comprises three logical components: analyzers, user interface and _____.
An IDS comprises three logical components: analyzers, user interface and _____.
Answer: senso...
_______ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner.
_______ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access...
The _________ to an IDS enables a user to view output from the system or control the behavior of the system.
The _________ to an IDS enables a user to view output from the system or control the behavior of the system.
Answer: user interfa...
A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.
A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.
Answer: jou...
The broad classes of intruders are: cyber criminals, state-sponsored organizations, _________ , and others.
The broad classes of intruders are: cyber criminals, state-sponsored organizations, _________ , and others.
Answer: activis...
________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other malware, while maintaining fast scanning speeds.
________ technology is an anti-virus approach that enables the anti-virus program to easily detect even the most complex polymorphic viruses and other...
Developed by IBM and refined by Symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.
Developed by IBM and refined by Symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection...
Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.
Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.
Answer:...
A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.
A bot can use a __________ to capture keystrokes on the infected machine to retrieve sensitive information.
Answer: keylogg...
A __________ is a collection of bots capable of acting in a coordinated manner.
A __________ is a collection of bots capable of acting in a coordinated manner.
Answer: botn...
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs...
________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
________ code refers to programs that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
Answer:...
A __________ virus is explicitly designed to hide itself from detection by anti-virus software.
A __________ virus is explicitly designed to hide itself from detection by anti-virus software.
Answer: steal...
During the __________ phase the virus is activated to perform the function for which it was intended.
During the __________ phase the virus is activated to perform the function for which it was intended.
Answer: triggeri...
The four phases of a typical virus are: dormant phase, triggering phase, execution phase and __________ phase.
The four phases of a typical virus are: dormant phase, triggering phase, execution phase and __________ phase.
Answer: propagati...
Sometimes known as a "logic bomb", the __________ is the event or condition that determines when the payload is activated or delivered.
Sometimes known as a "logic bomb", the __________ is the event or condition that determines when the payload is activated or delivered.
Answer: t...
Sometimes referred to as the "infection vector", the __________ is the means by which a virus spreads or propagates.
Sometimes referred to as the "infection vector", the __________ is the means by which a virus spreads or propagates.
Answer: infection mechani...
A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.
A computer __________ is a piece of software that can "infect" other programs or any type of executable content and tries to replicate itself.
Answer:...
A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
Answer: blended...
A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence of its presence.
A _________ is a set of programs installed on a system to maintain covert access to that system with administrator (root) privileges while hiding evidence...
The _________ model provides a predefined environment for the cloud subscriber that is shared with other tenants, typically through tagging data with a subscriber identifier.
The _________ model provides a predefined environment for the cloud subscriber that is shared with other tenants, typically through tagging data with...
A __________ cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
A __________ cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Answer:...
_______ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
_______ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly...
A __________ language provides a uniform interface to the database for users and applications.
A __________ language provides a uniform interface to the database for users and applications.
Answer: i...
The __________ cloud infrastructure is operated solely for an organization.
The __________ cloud infrastructure is operated solely for an organization.
Answer: i...
The __________ is responsible both for the cloud infrastructure and for the control of data and operations within a public cloud.
The __________ is responsible both for the cloud infrastructure and for the control of data and operations within a public cloud.
Answer: i...
The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.
The information transfer path by which unauthorized data is obtained is referred to as an ___________ channel.
Answer: inferen...
In a discretionary access control environment database users are classified into three broad categories: administrator, end user other than application owner, and __________.
In a discretionary access control environment database users are classified into three broad categories: administrator, end user other than application...
In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization rights to other users, allowing them to grant and revoke access rights to the table.
In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization...
In a ___________ administration a small number of privileged users may grant and revoke access rights.
In a ___________ administration a small number of privileged users may grant and revoke access rights.
Answer: centraliz...
With ___________ administration the owner (creator) of a table may grant and revoke access rights to the table.
With ___________ administration the owner (creator) of a table may grant and revoke access rights to the table.
Answer: ownership-bas...
___ is a standardized language that can be used to define schema, manipulate, and query data in a relational database.
___ is a standardized language that can be used to define schema, manipulate, and query data in a relational database.
Answer: SQL (structured query...
A _________ is the result of a query that returns selected rows and columns from one or more tables.
A _________ is the result of a query that returns selected rows and columns from one or more tables.
Answer: vi...
In a relational database columns are referred to as _________.
In a relational database columns are referred to as _________.
Answer: attribut...
A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
A __________ is a suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
Answer:...
In digital identity systems, a __________ functions as a certification program.
In digital identity systems, a __________ functions as a certification program.
Answer: i...
A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.
A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.
Answer: ...
The three types of attributes in the ABAC model are subject attributes, object attributes, and _________ attributes.
The three types of attributes in the ABAC model are subject attributes, object attributes, and _________ attributes.
Answer: i...
There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.
There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC...
A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.
A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to...
Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Answer:...
A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.
A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.
Answer: sessi...
The __________ user ID is exempt from the usual file access control constraints and has system wide access.
The __________ user ID is exempt from the usual file access control constraints and has system wide access.
Answer: superus...
A __________ access control scheme is one in which an entity may be granted access rights that permit the entity, by its own volition, to enable another entity to access some resource.
A __________ access control scheme is one in which an entity may be granted access rights that permit the entity, by its own volition, to enable another...
Basic access control systems typically define three classes of subject: owner, __________ and world.
Basic access control systems typically define three classes of subject: owner, __________ and world.
Answer: gro...
The basic elements of access control are: subject, __________, and access right.
The basic elements of access control are: subject, __________, and access right.
Answer: obje...
________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.
________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to...
________ access control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
________ access control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users...
An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .
An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established...
X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.
X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.
Answer:...
The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.
The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.
Answer:...
A __________ is an individual to whom a debit card is issued.
A __________ is an individual to whom a debit card is issued.
Answer: cardhold...
A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Answer: deni...
In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.
In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password,...
________, in the context of passwords, refers to an adversary's attempt to learn the password by observing the user, finding a written copy of the password, or some similar attack that involves the physical proximity of user and adversary.
________, in the context of passwords, refers to an adversary's attempt to learn the password by observing the user, finding a written copy of the password,...
A host generated random number is often called a __________.
A host generated random number is often called a __________.
Answer: non...
The __________ is the pattern formed by veins beneath the retinal surface.
The __________ is the pattern formed by veins beneath the retinal surface.
Answer: retinal patte...
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.
Answer: biometr...
Authentication protocols used with smart tokens can be classified into three categories: static, dynamic password generator, and ___________.
Authentication protocols used with smart tokens can be classified into three categories: static, dynamic password generator, and ___________.
Answer:...
Objects that a user possesses for the purpose of user authentication are called ______
Objects that a user possesses for the purpose of user authentication are called ______
Answer: toke...
The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter.
The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________...
With the __________ policy a user is allowed to select their own password, but the system checks to see if the password is allowable.
With the __________ policy a user is allowed to select their own password, but the system checks to see if the password is allowable.
Answer: proactive...
A __________ is a separate file from the user IDs where hashed passwords are kept.
A __________ is a separate file from the user IDs where hashed passwords are kept.
Answer: shadow password fi...
Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics.
Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics.
Answer: dynam...
An authentication process consists of the _________ step and the verification step.
An authentication process consists of the _________ step and the verification step.
Answer: identificati...
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for...
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
Answer: library-based tape encrypti...
The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.
The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.
Answer: public and...
A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.
A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.
Answer: pseudor...
The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.
The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext...
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
Answer: Electronic Frontier...
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and...
The two criteria used to validate that a sequence of numbers is random are independence and _________ .
The two criteria used to validate that a sequence of numbers is random are independence and _________ .
Answer: uniform distributi...
Public-key encryption was first publicly proposed by __________ in 1976.
Public-key encryption was first publicly proposed by __________ in 1976.
Answer: Diffie and Hellm...
A __________ processes the input elements continuously, producing output one element at a time.
A __________ processes the input elements continuously, producing output one element at a time.
Answer: stream ciph...
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
Answer:...
A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Answer:...
The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.
The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.
Answer: decrypti...
There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.
There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.
Answer: brute for...
Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .
Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .
Answer:...
Security implementation involves four complementary courses of action: prevention, detection, response, and _________.
Security implementation involves four complementary courses of action: prevention, detection, response, and _________.
Answer: recove...
A ____ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.
A ____ is data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity...
The OSI security architecture focuses on security attacks, __________, and services.
The OSI security architecture focuses on security attacks, __________, and services.
Answer: mechanis...
A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.
A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the...
Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.
Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information...
Replay, masquerade, modification of messages, and denial of service are example of _________ attacks.
Replay, masquerade, modification of messages, and denial of service are example of _________ attacks.
Answer: acti...
Release of message contents and traffic analysis are two types of _________ attacks.
Release of message contents and traffic analysis are two types of _________ attacks.
Answer: passi...
The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _________.
The assets of a computer system can be categorized as hardware, software, communication lines and networks, and _________.
Answer: da...
Misappropriation and misuse are attacks that result in ________ threat consequences.
Misappropriation and misuse are attacks that result in ________ threat consequences.
Answer: usurpati...
A(n) _________ is any means taken to deal with a security attack.
A(n) _________ is any means taken to deal with a security attack.
Answer: countermeasu...
A(n) _________ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
A(n) _________ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.
Answer: ...
In the United States, student grade information is an asset whose confidentiality is regulated by the __________.
In the United States, student grade information is an asset whose confidentiality is regulated by the __________.
Answer: FERPA (Family Educational...
A loss of _________ is the disruption of access to or use of information or an information system.
A loss of _________ is the disruption of access to or use of information or an information system.
Answer: availabili...
Confidentiality, Integrity, and Availability form what is often referred to as the _____.
Confidentiality, Integrity, and Availability form what is often referred to as the _____.
Answer: CIA Tri...
______ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.
______ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability,...
The ________ of treasury stock will be reported as an increase in the cash provided by financing activities.
The ________ of treasury stock will be reported as an increase in the cash provided by financing activities.
Answer: SA...
When _________ are declared and paid within the year, they will be reported as a decrease in the cash provided by financing activities.
When _________ are declared and paid within the year, they will be reported as a decrease in the cash provided by financing activities.
Answer: D...
Increases in ________ and stockholders' equity will result in additions to the cash provided.
Increases in ________ and stockholders' equity will result in additions to the cash provided.
Answer: ASSET...
An increase in Wages Payable will cause the cash provided by operating activities under the indirect method to __________ (decrease, increase).
An increase in Wages Payable will cause the cash provided by operating activities under the indirect method to __________ (decrease, increase).
Answer:...
An increase in Accounts ______ would be an increase in the cash provided by operating activities under the indirect method.
An increase in Accounts ______ would be an increase in the cash provided by operating activities under the indirect method.
Answer: PAYAB...
The conversion of bonds into common stock is an example of __________ information that is reported outside of the three major sections of the statement of cash flows.
The conversion of bonds into common stock is an example of __________ information that is reported outside of the three major sections of the statement...
The ________ of bonds payable will increase the cash provided by financing activities.
The ________ of bonds payable will increase the cash provided by financing activities.
Answer: ISSUAN...
The purchase of _________ stock will be reported as a decrease in the cash provided by financing activities.
The purchase of _________ stock will be reported as a decrease in the cash provided by financing activities.
Answer: TREASU...
Companies using the indirect method must also disclose the amount paid for _______ and income taxes.
Companies using the indirect method must also disclose the amount paid for _______ and income taxes.
Answer: INTERE...
The ________ on the sale of an asset used in a company's business will be a deduction to the cash provided by operating activities under the indirect method.
The ________ on the sale of an asset used in a company's business will be a deduction to the cash provided by operating activities under the indirect...
Depreciation is a __________ expense.
Depreciation is a __________ expense.
Answer: NONCA...
Increases in ________ and stockholders' equity will result in additions to the cash provided.
Increases in ________ and stockholders' equity will result in additions to the cash provided.
Answer: LIABILITI...
This method is the most commonly used method for preparing the Statement of Cash Flows.
This method is the most commonly used method for preparing the Statement of Cash Flows.
Answer: INDIRE...
The entire________ from the sale of an asset used in the business will be reported as an increase in the cash provided by investing activities.
The entire________ from the sale of an asset used in the business will be reported as an increase in the cash provided by investing activities.
Answer:...
The changes in the _________ capital accounts are reported as adjustments to net income when determining the cash provided by operating activities under the indirect method.
The changes in the _________ capital accounts are reported as adjustments to net income when determining the cash provided by operating activities under...
The 2010 statement of cash flows of ABC Corp. explains the change in the cash and _____ equivalents from Dec. 31, 2009 through Dec. 31, 2010.
The 2010 statement of cash flows of ABC Corp. explains the change in the cash and _____ equivalents from Dec. 31, 2009 through Dec. 31, 2010.
Answer:...
An increase in Inventory will cause the cash provided by operating activities under the indirect method to __________ (decrease, increase).
An increase in Inventory will cause the cash provided by operating activities under the indirect method to __________ (decrease, increase).
Answer:...
The payment of dividends will be reported as a decrease in cash provided by ________ activities.
The payment of dividends will be reported as a decrease in cash provided by ________ activities.
Answer: FINANCI...
A decrease in Accounts ________ will cause an increase in the cash provided by operating activities under the indirect method.
A decrease in Accounts ________ will cause an increase in the cash provided by operating activities under the indirect method.
Answer: RECEIVAB...
The cash provided by _________ activities is sometimes compared to net income to make judgements about the quality of earnings.
The cash provided by _________ activities is sometimes compared to net income to make judgements about the quality of earnings.
Answer: OPERATI...
Under the indirect method of preparing the statement of cash flows, the cash provided by operating activities begins with net _______.
Under the indirect method of preparing the statement of cash flows, the cash provided by operating activities begins with net _______.
Answer: IN...
The less popular of the two methods allowed for preparing the statement of cash flows is the _________ method.
The less popular of the two methods allowed for preparing the statement of cash flows is the _________ method.
Answer: DIRE...
Depreciation expense is ________ to net income when determining the cash provided by operating activities (under the indirect method).
Depreciation expense is ________ to net income when determining the cash provided by operating activities (under the indirect method).
Answer: AD...
The ______ (similar to repurchase or retirement) of bonds payable will decrease the cash provided by financing activities.
The ______ (similar to repurchase or retirement) of bonds payable will decrease the cash provided by financing activities.
Answer: REDEMPTI...
The statement of cash flows often explains the change in cash and cash __________.
The statement of cash flows often explains the change in cash and cash __________.
Answer: EQUIVALEN...
The purchase of equipment to be used in the business will be reported as a decrease in the cash provided by __________ activities.
The purchase of equipment to be used in the business will be reported as a decrease in the cash provided by __________ activities.
Answer: INVEST...
Cash ______ (plural) from financing activities occur when a corporation issues equity securities, bonds, and long-term notes.
Cash ______ (plural) from financing activities occur when a corporation issues equity securities, bonds, and long-term notes.
Answer: INFLO...
The ________ (gain, loss) on the sale of an asset used in a company's business will be an addition to the cash provided by operating activities under the indirect method.
The ________ (gain, loss) on the sale of an asset used in a company's business will be an addition to the cash provided by operating activities under...
Cash _____ (opposite of inflows) from investing activities occur when a corporation purchases equipment to be used in the business and when it makes a long-term investment in another corporation.
Cash _____ (opposite of inflows) from investing activities occur when a corporation purchases equipment to be used in the business and when it makes...
Depreciation, depletion, and ________ are treated similarly on the statement of cash flows.
Depreciation, depletion, and ________ are treated similarly on the statement of cash flows.
Answer: AMORTIZATI...
But state-sponsored gaming has brought _____________ along with a new __________ source.Some state officials were charged with taking ___________.
But state-sponsored gaming has brought _____________ along with a new __________ source.Some state officials were charged with taking ___________.
Answer:...
The legislature then ___________ a land - based casino in New Orleans. Controversy developed when the gaming company opened a temporary casino and then said its __________ ________ pay what it owed. They claimed ___________, a legal process that allows a debtor to eliminate some debts.
The legislature then ___________ a land - based casino in New Orleans. Controversy developed when the gaming company opened a temporary casino and then...
_________ is the term for legal gambling. Video poker machines and river boat casinos also became legal in ________.
_________ is the term for legal gambling. Video poker machines and river boat casinos also became legal in ________.
Answer: gaming, 19...
Louisiana also has a _________ hospital system to meet those healthcare needs.
Louisiana also has a _________ hospital system to meet those healthcare needs.
Answer: publ...
The state has many people who __________ afford health insurance. The ___________ program provides healthcare for people with low incomes.
The state has many people who __________ afford health insurance. The ___________ program provides healthcare for people with low incomes.
Answer:...
A sound _____________, good ________, and a positive _________ climate are essential to improvement.
A sound _____________, good ________, and a positive _________ climate are essential to improvement.
Answer: economy, education, politic...
To change the image of Louisiana the state needs to improve the _____________ and accentuate the __________.
To change the image of Louisiana the state needs to improve the _____________ and accentuate the __________.
Answer: negative, positi...
Governor Blanco emphasized the need to change Louisiana's ________.
Governor Blanco emphasized the need to change Louisiana's ________.
Answer: ima...
In 2003, Louisiana elected the states first woman governor, Democrat __________ __________. The new governor heard from business people who said the states ________ keep new businesses from coming too Louisiana. One of the first actions of Governor Blanco and the legislature was to begin ___________ these taxes.
In 2003, Louisiana elected the states first woman governor, Democrat __________ __________. The new governor heard from business people who said the...
Tuition __________ __________ for students (TOPS) pays tuition for all Louisiana high school graduates who meet the requirements.
Tuition __________ __________ for students (TOPS) pays tuition for all Louisiana high school graduates who meet the requirements.
Answer: opportunity...
________ also received governor Foster's attention. One new popular state program pays _____________ for qualified students at state universities and at community colleges, and technical schools.
________ also received governor Foster's attention. One new popular state program pays _____________ for qualified students at state universities and...
Mike Foster described himself as a _________ business man and ________ to run the state the same way.
Mike Foster described himself as a _________ business man and ________ to run the state the same way.
Answer: conservation, promis...
The governor ___________ the state when he announced he would not run for office again.
The governor ___________ the state when he announced he would not run for office again.
Answer: surpris...
_______ is a program that provides health care for the ___________, partly funded by the federal government and partly by the state.
_______ is a program that provides health care for the ___________, partly funded by the federal government and partly by the state.
Answer: Medicaid,...
The huge increase in __________ spending became an important issue during this term.
The huge increase in __________ spending became an important issue during this term.
Answer: increa...
The idea of David Duke as governor _________ many Louisiana citizens both black and white. Because of this reaction to Duke, Edwin Edwards became governor for the ___________ time in 1992. no one else has __________ elected so many times.
The idea of David Duke as governor _________ many Louisiana citizens both black and white. Because of this reaction to Duke, Edwin Edwards became governor...
In the next primary election ___________ ________ received the highest number of voters; David Duke was _____________ and governor ____________ was third. The runoff election was a race between _____________ and _____________.
In the next primary election ___________ ________ received the highest number of voters; David Duke was _____________ and governor ____________ was...
This plan was ________ by some as a way to save the state's finances and _____________ by others as poor management.
This plan was ________ by some as a way to save the state's finances and _____________ by others as poor management.
Answer: praised, criticiz...
Roemer had a campaign as an outsider who would bring _____________ as governor, Roemer faced _____________ budget problems.
Roemer had a campaign as an outsider who would bring _____________ as governor, Roemer faced _____________ budget problems.
Answer: reform, maj...
Edwards problems brought out a long list of ________ in the 1987 election. Because he had lost support, _____________ dropped out of the race entirely. That meant that Roemer became the governor without a run off election.
Edwards problems brought out a long list of ________ in the 1987 election. Because he had lost support, _____________ dropped out of the race entirely....
Edwards also faced serious __________ problems in this 3rd term. The severance tax on oil could not ___________ big government programs as it had in the past.
Edwards also faced serious __________ problems in this 3rd term. The severance tax on oil could not ___________ big government programs as it had in...
By February 1985, the U.S. attorney had __________(formerly accused Edwards and seven others for wrong doing regarding ____________ and _____________ home permits.
By February 1985, the U.S. attorney had __________(formerly accused Edwards and seven others for wrong doing regarding ____________ and _____________...
Because of these problems the voters chose to return _________ __________ to governors office in 1983.
Because of these problems the voters chose to return _________ __________ to governors office in 1983.
Answer: Edwin Edwar...
Without the money from the proposed tax the governor ____________ to meet the states basic ________ needs.
Without the money from the proposed tax the governor ____________ to meet the states basic ________ needs.
Answer: struggled, financi...
When the price of ____________ and the ________ taxes collected by the state ___________ funding the budget became much more difficult.
When the price of ____________ and the ________ taxes collected by the state ___________ funding the budget became much more difficult.
Answer: oil,...
At the beginning of Green's terms the state was still receiving major ____________ from oil severance _____________ . Because of this, the governor encouraged the state legislature to ____________ the states ___________ tax as a benefit for voters.
At the beginning of Green's terms the state was still receiving major ____________ from oil severance _____________ . Because of this, the governor...
By 1979, Louisiana's _____________ party was strong enough to elect a governor. David ___________ won that election and became the states first _________ governor in the 20th century.
By 1979, Louisiana's _____________ party was strong enough to elect a governor. David ___________ won that election and became the states first _________...
Electing a ___________ as Louisiana's first 21st century governor made an even ___________ statement of political changes.
Electing a ___________ as Louisiana's first 21st century governor made an even ___________ statement of political changes.
Answer: women, strong...
These political trends are ___________ in the governors chosen by the voters.
These political trends are ___________ in the governors chosen by the voters.
Answer: reflect...
The price of oil is affected most by ______ The organization of petroleum exporting countries.
The price of oil is affected most by ______ The organization of petroleum exporting countries.
Answer: Op...
When the price of oil was ______ The economy bloomed. But the date struggled when the price of oil ______.
When the price of oil was ______ The economy bloomed. But the date struggled when the price of oil ______.
Answer: High, dropp...
During the 20th century, Louisiana's economy was like a ______ pushed _____ and _____ by oil.
During the 20th century, Louisiana's economy was like a ______ pushed _____ and _____ by oil.
Answer: Seesaw, up, do...
Louisiana must recover and _______ before it can move _______ these events have a big have become a major chapter in the _______ and _______ economy of Louisiana.
Louisiana must recover and _______ before it can move _______ these events have a big have become a major chapter in the _______ and _______ economy...
The hurricanes had a ______ Potomac impact that _______ growth in costal louisiana.
The hurricanes had a ______ Potomac impact that _______ growth in coastal louisiana.
Answer: Well latest, halt...
These devastating hurricane _______ Louisiana in ways that will be filled far into the ______.
These devastating hurricane _______ Louisiana in ways that will be filled far into the ______.
Answer: Change, futu...
As individuals and families attempted to ________ so did the states economy.
As individuals and families attempted to ________ so did the states economy.
Answer: Recover, econo...
The widespread ______ disrupted the lives of many of Louisiana's people.
The widespread ______ disrupted the lives of many of Louisiana's people.
Answer: Devastati...
The areas _______ Buy these hurricanes look like bomb sites.
The areas _______ Buy these hurricanes look like bomb sites.
Answer: Destroyed, bo...
This rescue effort was still in the way when hurricane __________ hey southwest Louisiana less than a month later.
This rescue effort was still in the way when hurricane __________ hey southwest Louisiana less than a month later.
Answer: Ri...
Despite the lack of information, a massive ________ and _______ effort began as people were stranded on _________ in the Superdome in the _________ center.
Despite the lack of information, a massive ________ and _______ effort began as people were stranded on _________ in the Superdome in the _________...
The days after Katrina held ________, _______, and _________.
The days after Katrina held ________, _______, and _________.
Answer: Misery, missing for misinformation and misunderstandi...
Hurricane Katrina has been described as one of the ________ natural disasters in U.S. history.
Hurricane Katrina has been described as one of the ________ natural disasters in U.S. history.
Answer: wor...
On August 28, 2005 Louisiana was moving ________ into the future done very next day the future shifty with the blow from hurricane ________.
On August 28, 2005 Louisiana was moving ________ into the future done very next day the future shifty with the blow from hurricane ________.
Answer:...
The________, Political and _________ aspects of present day Louisiana explain our state 21st century direction.
The________, Political and _________ aspects of present day Louisiana explain our state 21st century direction.
Answer: Economy and soci...
If you are required to show proof of financial responsibility for the future, for how many years must the proof be kept?
If you are required to show proof of financial responsibility for the future, for how many years must the proof be kept?
Answer: 2 yea...
Serious signs that you are drowsy and should not be driving are:
Serious signs that you are drowsy and should not be driving are:
Answer: All of these answers are corre...
The best advice for cell phone use is:
The best advice for cell phone use is:
Answer: To not make or take calls if the car is not parked
...
To manage risk when driving:
To manage risk when driving:
Answer: It is essential that you remain alert to conditions of objects that can increase levels of risk
...
Personal grooming is best done:
Personal grooming is best done:
Answer: Before leaving your ho...
The video TOE TAG warning about the dangers of distracted driving opens to a scene at:
The video TOE TAG warning about the dangers of distracted driving opens to a scene at:
Answer: A morg...
Driving when tired, sick, or medicated causes:
Driving when tired, sick, or medicated causes:
Answer: Impairment which adds to driving ri...
If you have passengers that are infants or children, make sure:
If you have passengers that are infants or children, make sure:
Answer: They are fed, watered, and dry before you belt them into their seats and begin...
While driving, resist distractions such as:
While driving, resist distractions such as:
Answer: All of these answers are corre...
Multi-tasking while driving means:
Multi-tasking while driving means:
Answer: Performing multiple functions in the vehicle at the same time
...
The most commonly practiced and dangerous driving behavior is:
The most commonly practiced and dangerous driving behavior is:
Answer: Speedi...
Putting on makeup while driving is highly encouraged.
Putting on makeup while driving is highly encouraged.
Answer: Fal...
You're allowed to use a cell phone while driving as long as there isn't any oncoming traffic.
You're allowed to use a cell phone while driving as long as there isn't any oncoming traffic.
Answer: Fal...
It is estimated that over ___________% of all crashes in the U.S. are caused by driver distraction.
It is estimated that over ___________% of all crashes in the U.S. are caused by driver distraction.
Answer: ...
What are some devices used for temporary work zone situations?
What are some devices used for temporary work zone situations?
Answer: All of the answers are corre...
Even if you are not intoxicated and you are under the age of 21 and have any detectable amount of alcohol in your system while operating a motor vehicle, you may be charged with:
Even if you are not intoxicated and you are under the age of 21 and have any detectable amount of alcohol in your system while operating a motor vehicle,...
When you are taking medicine prescribed for you by a doctor you should:
When you are taking medicine prescribed for you by a doctor you should:
Answer: Ask your doctor if it is safe for you to drive...
The maximum fine for a first non-driving alcohol-related offense of possession or consumption of alcohol by a minor is:
The maximum fine for a first non-driving alcohol-related offense of possession or consumption of alcohol by a minor is:
Answer: $5...
The maximum fine for driving and drinking an alcoholic beverage is:
The maximum fine for driving and drinking an alcoholic beverage is:
Answer: $500
...
If a minor under the age of 21 refuses to provide a breath or blood specimen to a police officer, the minor's driver license will be suspended for a first time refusal for:
If a minor under the age of 21 refuses to provide a breath or blood specimen to a police officer, the minor's driver license will be suspended for a...
Possession of an open container of alcohol receives a $500 fine and a jail confinement of:
Possession of an open container of alcohol receives a $500 fine and a jail confinement of:
Answer: 6 days
...
If you run over and kill someone while driving under the influence of intoxicating liquor, the worst offense with which you may be charged is:
If you run over and kill someone while driving under the influence of intoxicating liquor, the worst offense with which you may be charged is:
Answer:...
The most a person (age 21) can be fined for a first conviction of driving while under the influence of intoxicating liquor with no injury involved is:
The most a person (age 21) can be fined for a first conviction of driving while under the influence of intoxicating liquor with no injury involved is:
Answer:...
Heavy amphetamine use:
Heavy amphetamine use:
Answer: Makes a driver less coordinated and at times more likely to be involved in an accident
...
Steven Leslie was convicted of ________ after causing a fatal collision.
Steven Leslie was convicted of ________ after causing a fatal collision.
Answer: Second Degree Murd...
What is the number one killer of teenagers?
What is the number one killer of teenagers?
Answer: Driving Under the Influence
...
If you have an accident in which someone is injured, you should:
If you have an accident in which someone is injured, you should:
Answer: Carefully help anyone who might be hurt and send for skilled help as quickly...
If you damage an unattended vehicle you must:
If you damage an unattended vehicle you must:
Answer: Locate the owner or leave a signed statement on the vehic...
Vehicle skids are most likely to be caused by:
Vehicle skids are most likely to be caused by:
Answer: Driving too fast on slippery roa...
If you have a blowout while driving, you should:
If you have a blowout while driving, you should:
Answer: Steer firmly, take your foot off the gas, and brake cautiously
...
If you run off the pavement, you should:
If you run off the pavement, you should:
Answer: Steer straight and slow down before attempting to return to the paveme...
What is the first thing that should be done when a motor vehicle starts to skid?
What is the first thing that should be done when a motor vehicle starts to skid?
Answer: Take your foot off the accelerator and steer in the direction...
Child passenger safety seats are required for all children under the age of:
Child passenger safety seats are required for all children under the age of:
Answer: 8 years of age and less than 4 feet, 9 inch...
It is against the law for a child under what age to ride in the open bed of a truck or trailer?
It is against the law for a child under what age to ride in the open bed of a truck or trailer?
Answer: ...
If you are involved in an injury accident in a city, you must immediately notify:
If you are involved in an injury accident in a city, you must immediately notify:
Answer: The local poli...
You should not try to move accident victims from the scene.
You should not try to move accident victims from the scene.
Answer: Tr...
If blinded by an approaching motor vehicle at night, it is best to:
If blinded by an approaching motor vehicle at night, it is best to:
Answer: Slow down and avoid looking directly into the lights of the approaching...
On multiple lane highways slow drivers should drive:
On multiple lane highways slow drivers should drive:
Answer: In the right hand la...
At night, a driver should dim his headlights when an oncoming motor vehicle comes within:
At night, a driver should dim his headlights when an oncoming motor vehicle comes within:
Answer: 500 fe...
If you get drowsy while driving it is best to:
If you get drowsy while driving it is best to:
Answer: Stop, get out, and walk arou...
Why should you drive slower at night?
Why should you drive slower at night?
Answer: The distance which you can see ahead is le...
To avoid accidents, a defensive driver should:
To avoid accidents, a defensive driver should:
Answer: Stay alert and look for trouble spots developing around h...
The lights on your vehicle must be turned on at any time day or night when persons and vehicles cannot be clearly seen for:
The lights on your vehicle must be turned on at any time day or night when persons and vehicles cannot be clearly seen for:
Answer: 1000 fe...
When making a long trip, you should stop for a rest:
When making a long trip, you should stop for a rest:
Answer: About every two hours or one hundred mil...
The headlights must be turned on:
The headlights must be turned on:
Answer: 30 minutes after suns...
When you are driving in fog, you can see better by:
When you are driving in fog, you can see better by:
Answer: Using lower headlight be...
You should look at least ___________ seconds ahead of your car.
You should look at least ___________ seconds ahead of your car.
Answer: ...
You should hold your hands in the ___________ position on the steering wheel.
You should hold your hands in the ___________ position on the steering wheel.
Answer: 9 and...
When parking parallel, it is best to leave the curb side wheels:
When parking parallel, it is best to leave the curb side wheels:
Answer: 6 to 18 inches from the cu...
When turning left from a three lane, one-way street, you should turn from the:
When turning left from a three lane, one-way street, you should turn from the:
Answer: Left la...
When choosing your driving speed, the most important thing to consider is:
When choosing your driving speed, the most important thing to consider is:
Answer: The condition of the weather, traffic, road, car, and driv...
A vehicle should never be parked closer to a fire hydrant than:
A vehicle should never be parked closer to a fire hydrant than:
Answer: 15 fe...
When parking headed downhill it is best to:
When parking headed downhill it is best to:
Answer: Turn front wheels to the cu...
The speed limit for passenger cars in urban districts is:
The speed limit for passenger cars in urban districts is:
Answer: 30 m...
The speed limit for passenger cars on highways numbered by this state or the United States is:
The speed limit for passenger cars on highways numbered by this state or the United States is:
Answer: 70 m...
After parking your vehicle, for greatest safety you should get out of your vehicle:
After parking your vehicle, for greatest safety you should get out of your vehicle:
Answer: On the curb si...
Under favorable circumstances, including reaction time, a motor vehicle with good brakes going 50 mph can be stopped within:
Under favorable circumstances, including reaction time, a motor vehicle with good brakes going 50 mph can be stopped within:
Answer: About 229 fe...
When approaching an intersection, bridge, or railroad crossing, you should never drive (pass) on the left half of the roadway when within:
When approaching an intersection, bridge, or railroad crossing, you should never drive (pass) on the left half of the roadway when within:
Answer:...
The basic speed law means that you may never drive faster than it is safe for the current conditions.
The basic speed law means that you may never drive faster than it is safe for the current conditions.
Answer: Tr...
Speeding is a factor in ___________% of all fatal accidents.
Speeding is a factor in ___________% of all fatal accidents.
Answer: ...
When entering a street from an unpaved road, you should:
When entering a street from an unpaved road, you should:
Answer: Yield to the vehicle on the paved road in all instanc...
When a pedestrian walks out into the street in violation of the law, you should:
When a pedestrian walks out into the street in violation of the law, you should:
Answer: Yield the right of way to avoid injuring th...
If you must walk on the highway, you should:
If you must walk on the highway, you should:
Answer: Walk on the left side in order to watch for approaching vehicl...
A driver waiting to make a left turn when the traffic light turns green should:
A driver waiting to make a left turn when the traffic light turns green should:
Answer: Turn only after there is no danger from oncoming vehicl...
It is a violation of State law for pedestrians to:
It is a violation of State law for pedestrians to:
Answer: Stand in the roadway for purposes of soliciting a ri...
When you hear a siren coming, you should:
When you hear a siren coming, you should:
Answer: Yield to the emergency vehic...
When entering a street from a private alley or driveway, you must:
When entering a street from a private alley or driveway, you must:
Answer: Stop, then yield to approaching vehicles and pedestria...
When possible, pedestrians should walk:
When possible, pedestrians should walk:
Answer: On a sidewa...
Once you have stopped for a school bus, do not pass until the driver signals you to proceed, the red lights stop flashing, or:
Once you have stopped for a school bus, do not pass until the driver signals you to proceed, the red lights stop flashing, or:
Answer: The bus starts...
When a vehicle ahead of you stops to let a pedestrian pass in front of you, you should:
When a vehicle ahead of you stops to let a pedestrian pass in front of you, you should:
Answer: Stay in line and wait until the vehicle ahead pro...
Not including thinking distance, lawful brakes must stop a car at 20 miles per hour within how many feet?
Not including thinking distance, lawful brakes must stop a car at 20 miles per hour within how many feet?
Answer: 25 fe...
If you move, how many days do you have before you must report your change of address to the Department of Public Safety?
If you move, how many days do you have before you must report your change of address to the Department of Public Safety?
Answer: 30 da...
If your driver license is suspended, you may drive only:
If your driver license is suspended, you may drive only:
Answer: If you obtain an essential need driver licen...
A person's driver license will automatically be suspended if convicted of:
A person's driver license will automatically be suspended if convicted of:
Answer: Possessing a false driver licen...
If you are driving on a highway having at least four lanes with no fewer than two lanes in the same direction and you approach a stationary emergency vehicle or public safety vehicle on the roadside with lights flashing, you should:
If you are driving on a highway having at least four lanes with no fewer than two lanes in the same direction and you approach a stationary emergency...
___ reaction abilities means a driver can only respond to one situation at a time.
___ reaction abilities means a driver can only respond to one situation at a time.
Answer: simple
...
Texting while driving makes you how many times more likely to face a collision?
Texting while driving makes you how many times more likely to face a collision?
Answer: 23
...
What is the advantage of the 8 o'clock and 4 o'clock hand positions on the wheel?
What is the advantage of the 8 o'clock and 4 o'clock hand positions on the wheel?
Answer: 160 degrees without crossing arms
...
What are the three elements of the highway system you should evaluate for potential risk before and during your drive?
What are the three elements of the highway system you should evaluate for potential risk before and during your drive?
The driver,
The roadway,...
If you are teaching a beginner to drive, you must:
If you are teaching a beginner to drive, you must:
Answer: Be a licensed driver age 21 or ov...
Uninsured drivers become subject to license and vehicle registration suspension when accident damages amount to:
Uninsured drivers become subject to license and vehicle registration suspension when accident damages amount to:
Answer: At least $1000 to property...
Your driver license may be suspended for:
Your driver license may be suspended for:
Answer: Habitual reckless drivi...
What is the minimum age to get a license?
What is the minimum age to get a license?
Answer: 16 with an approved driver education cour...
What is the maximum fine for a conviction of driving without a valid driver license?
What is the maximum fine for a conviction of driving without a valid driver license?
Answer: $2...
You can lawfully allow an object to extend beyond the left side of your vehicle:
You can lawfully allow an object to extend beyond the left side of your vehicle:
Answer: 3 inch...
What might happen if the trailer is too high when you try to couple?
What might happen if the trailer is too high when you try to couple?
Answer: It might not couple correctl...
After coupling, how much space should be between the upper and lower fifth wheel ?
After coupling, how much space should be between the upper and lower fifth wheel ?
Answer: No space at a...
You should look into the back of the fifth wheel to see if it is locked onto the kingpin? (True or False)
You should look into the back of the fifth wheel to see if it is locked onto the kingpin? (True or False)
Answer: Tr...
How do you know if your trailer is equipped with antilock brakes?
How do you know if your trailer is equipped with antilock brakes?
Answer: Trailers built after 1998 are required to have ABS. One way to check...
To drive you need to raise the landing gear only until it just lifts off the pavement? (True or False)
To drive you need to raise the landing gear only until it just lifts off the pavement? (True or False)
Answer: Fal...
Subscribe to:
Posts (Atom)