PLS 21 Lecture Exam 2 Questions
What is the difference of the data and information? A B C Data are raw facts Information requires context to reveal meaning Information is the result of processing raw data to reveal meaning
A B C
Which programming language described in lecture offers the most flexibility, but the least ease of use? HTML Java Python Assembly
Assembly
Which programming language is most flexible. HTML R C++ Assembly Language
Assembly Language
What language allows us to use words instead of numbers? Machine Language Word Language Programming Language Virtual Language
Programming Language
What is data? Needs context Limited context Not facts Raw facts
Raw facts
The following are safe anti-virus systems except? Symmantec Norton Antivirus Rootkit Macaffe
Rootkit
Which of the followings is a great example of Visual Basic control name? LblEmployee txtHoursWorked bTNClose txthoursworked
txtHoursWorked
a set of rules to be followed in performing some operation or task. A calculus Finite Non-ambiguity An algorithms
An algorithms
How to secure your wireless network? Set up unique password for your device Enable encryption such as WPA Turn SSID off All of the above
All of the above
What are databases classified by? Database location(s) Expected type and extent of use Number of users All of the above
All of the above
What are some reasons for studying file systems? Knowledge of file system is useful for converting file system to database system Complexity of database design is easier to understand Understanding file system problems helps to avoid problems with DBMS systems All of the above
All of the above
What is a disadvantage of managing a database system? All of the above Management complexity Maintaining currency Increased costs
All of the above
What is malicious software? Gain unauthorized access to system resources Gather information that leads to loss of privacy or exploitation All of the above Designed to disrupt or deny operation
All of the above
What kinds of risks come with bluetooth-equipped devices? Bluesnarfing: hackers gain access to a phone's contacts Bluespamming: a phone's contacts are secretly sent text messages All of the above Bluejacking: anonymous text messages
All of the above
Which of the following is true regarding worms? Harm can come like viruses in files Doesn't need to attach itself to another program All of the above They are self-replicating
All of the above
What are some symptoms of an Infection? You get lots of system error messages. All of the above. You see unexpected messages or images. Programs start unexpectedly.
All of the above.
What is a well-defined, ordered set of steps for defining a problem? Operators Program Syntax Algorithms
Algorithms
Databases can be classified according to which of the following? All of above Number of users Database location(s) Expected type and extent of use
All of above
What are the major types of physical components? CPU Secondary storage devices Main Memory All of above
All of above
What are the major types of physical components? Secondary storage devices Main Memory All of above CPU
All of above
Threats are a serious deal and compromise our safety. Which of the following are examples of threats Malware All of the Above Trojan Worms
All of the Above
Which is an advantage and role of a Database Management System DBMS is the intermediary between user and database All of the Above DBMS enables data to be shared DBMS integrates many users' view of the data
All of the Above
Which of these modern settings involve data management? Administration Research All of the Above Business
All of the Above
Which is NOT a limitations of file system data management? System administration is complex and difficult Security features are likely inadequate Analysts must review and update file systems frequently Requires extensive programming
Analysts must review and update file systems frequently
Which of the following is NOT a computer threat? Malware Bacteria Virus Rootkit
Bacteria
Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security? Bluejacking Bluehacking Bluebugging Bluespamming
Bluehacking
Which bluetooth threat allows hackers to gain access to a mobile phone's contacts? Bluesnarfing Bluespamming Bluebugging Bluejacking
Bluesnarfing
Which one is not a common programming language ? C++ Boa Java Visual Basic
Boa
If you think your computer has been infected, what are the recommended after action steps? Close current web browser and open a new one Update your antivirus and Check your antivirus software manufacturere's website for specific procedures and software for particular viruses Both A and B Disconnect from the internet both LAN & WAN
Both A and B
What is data? Source of information Plain information Generic information Building blocks of information
Building blocks of information
Which of the following is one of the four basic programming concepts? Programs Number Loops Equation
Loops
Which one is not an advantage of a database management system (DBMS)? Increased end-user productivity Maximized data inconsistency Better data integration Improved data access
Maximized data inconsistency
What is computer code? None of the above A handbook on how to operate a computer Computer instructions written in binary numbers Collection of computer instruction written in human-readable programming language (usually plain text)
Collection of computer instruction written in human-readable programming language (usually plain text)
What is a computer code? Language that is used in computer programming. collection of symbols that are relevant to computer coding. Collection of computer instructions written in a human-readable programming language, usually as plain text. A special code that is unique to every computer.
Collection of computer instructions written in a human-readable programming language, usually as plain text.
A dynamic IP address... Changes over time to protect information. Is only stable when using a CAT 5 Ethernet cable Is untraceable. Can only be used by laptops.
Changes over time to protect information.
Which of the following translates human-readable code into computer-readable instructions? Code Executioner Code Compiler Code Debunker Code Translator
Code Compiler
Which is not a computer threat? Malware Computer Virus Trojan Computer Crash
Computer Crash
What is the biggest threat faced by computers? Crimeware Malware Spontaneous combustion Viruses
Crimeware
Which of the followings is a basic element of a computer program? C. Logic ("if" statement) A. Variables and Assignments D. All of the above B. Arithmetic
D. All of the above
Which is NOT an example of a security threat? Malware Trojan Worm Danger Warning
Danger Warning
What are the building blocks of information? information atoms Data none of the above
Data
What is metadata? Metamorphic data Raw data Metabolism data Data about data
Data about data
What is/are characteristic(s) of a spyware? D. watches the actions of the user and passes it to a server A. Does not need to attach itself to another program B. destroys file C. trick the user into some action to activate the software on your computer
D. watches the actions of the user and passes it to a server
Which of the following is NOT an advantage of DBMS? Data redundancy Improved data sharing Better data integration Improved data access
Data redundancy
Data is managed most efficiently when stored in a ... Computer Database Drawer RAM
Database
What does DBMS stand for? Database managerial system Database management system Database multiple system Database multicycle short
Database management system
These are all programming languages EXCEPT Java Dutch Python C++
Dutch
which one is not the common programming language? Visual Basic python English Java
English
Which of the following is not a required software in the database system environment? Operating system software Hardware DBMS software Application programs and utility software
Hardware
What are the 5 major parts of a database system? Protocol, Hardware, Software, Data, People Data, Software, Procedures, Hardware, Planets Hardware, Software, People, Procedures, Data Software, Procedures, Places, Data, Hardware
Hardware, Software, People, Procedures, Data
What US Government agency is dedicated to cyber security? United States Department of Education United States Department of Energy Homeland Security United States Department of Defense
Homeland Security
Which of the following is not an example of an advantage of a DBMS? Improved data access Improve datum's appearance Improved data sharing Improved data security
Improve datum's appearance
Which of the following are NOT advantages of a DBMS? Minimized data inconsistency Increased money in our lawmakers pockets Better data integration Improved data sharing and security
Increased money in our lawmakers pockets
What is true about computer virus? It is always attached into some other non-malware software Not modeled after biological viruses User notices symptoms immediately Generally no damage occurs
It is always attached into some other non-malware software
Message authentication is a service beyond Message Sending Message Integrity Message Confidentiality Message Splashing
Message Integrity
It refers to the act of attempting to acquire sensitive information Worm None of the above Phishing Threat
Phishing
How do we program computers? Machine Language > Compiler > Programming Language Compiler > Programming Language > Machine Language Complier > Machine Language > Programming Language Programming Language > Compiler > Machine Language
Programming Language > Compiler > Machine Language
Which of the following is NOT true of programming languages? Software can convert programming language to machine language Programming language is more tedious than machine language Machine language consists of 1's and 0's Programming language consists of words
Programming language is more tedious than machine language
Which of these is NOT a major component of hardware? Main memory CPU Output devices Programs
Programs
What is not an advantage of database management systems? Improved data security Quicker data filtering Improved data access Improved data sharing
Quicker data filtering
Which of the following answer is not a right way to minimize the risk of threat? Use a firewall only visit trusted site Set your browser to remember your passwords use an antivirus software
Set your browser to remember your passwords
Which of the following is NOT an example of a threat to computer security Spartan Trojan Spyware Malware
Spartan
The following are types of treats to computer and network security except for Malware Virus Worm Spider
Spider
Which is not a basic element of a computer program? Variables and Assignments Logic Syntax Loops
Syntax
A relational database consists of a collection of Fields Records Tables Keys
Tables
What is syntax? A volatile type of memory An entire sequence of instructions That which provides everything needed to create, test, and debug software. The correct use of key words, operators, and programmer-defined names.
The correct use of key words, operators, and programmer-defined names.
The Compiler is the Programmer Computer Engineer Translator
Translator
Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions? Trojan Computer virus Spyware Malware
Trojan
Data must be processed in order to produce information. True. Sometimes A, sometimes B. False. Is this a trick question? Data and information are the same.
True
How to minimize the risk of most threats? Use a firewall Open email attachments from untrusted sources Download unknown content from trusted sites Give someone your password
Use a firewall
Which one does NOT belong to the 4 rules in access? Tables must be closed One of the fields must be a primary key. We need to double check the colour of header. The fields must have the same data type, but field names can be different.
We need to double check the colour of header.
What is an algorithm? Objects that have both data elements and can perform a function Well-defined, ordered set of steps used to solve a problem A type of programming language A special language computers speak
Well-defined, ordered set of steps used to solve a problem Which of these is NOT a major component of hardware? Main memory CPU Output devices Programs
Which kind of threat is self-replicating? Phishing Worms Rootkit Trojian
Worms
What is the correct order of the programming work-flow? Write the code in an editor program, run the program/executable file, compile the code producing an executable file Write the code in an editor program, compile the code producing an executable file, run the program/executable file Compile the code producing an executable file, write the code in an editor program, run the program/executable file Run the program/executable file, write the code in an editor program, compile the code producing an executable file
Write the code in an editor program, compile the code producing an executable file, run the program/executable file
What are the important aspects of an algorithm? finite a & c ambiguity non-ambiguity
a & c
what are the things you can do to secure your network? all turn SSID off Encryption Have a strong password
all
Database can be classified according to? expect of type and extent of use number of users database location all of the above
all of the above
Malware consists of what type of programming? all of the above scripts active content codes
all of the above
What consists of programming? scripts active content all of the above codes
all of the above
What is the role and advantage of DBMS? it enables data to be shared it integrates many users' views of the data all of the above it is the intermediary between the user and the database
all of the above
Which statement about malware is correct? malicious software designed to disrupt or deny operation all of the above consists of programming
all of the above
All of the following describe the advantages of Database Management Systems except: improved data sharing better data integration decrease in productivity improved data security
decrease in productivity
What does XML stand for? excess markup language extensible markup language xray markup language extra markup language
extensible markup language
What is the name for the physical components of a computer? roughware toughward software hardware
hardware
which one is not the advantage of a DBMS? Better data integration Improve decision making maximized data inconsistency Improve data access
maximized data inconsistency
How to start an new file script in Rstudio open a new markdown open a new rnotebook open a new rscript open r presentacion
open a new rscript
All of the following are types of computer hardware, EXCEPT: input devices CPU output devices operating system
operating system
What is data? data is the same as information raw facts data is made up from information something that doesn't need to be formatted for storage and processing
raw facts
What is data? something that requires context to reveal meaning the result of processing raw data to reveal meaning information raw facts
raw facts
What is the definition of End-user data? data about data raw facts of interest to end user data about computer programs data about hard drives
raw facts of interest to end user
What is a worm? something you get if you are the early bird self replicating, have to attach to another program, can transmit across files and destroy files malicious software, consists of programming that is designed to disrupt or deny operation and gather info for lost of privacy of exploitation appear to do something desirable, but actually do harm
self replicating, have to attach to another program, can transmit across files and destroy files