Chapter 9
In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database
A. A link between tables that defines how the data are related
Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies
A. Cookies obtain your personal information by searching your hard drive.
Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming
A. Engineering
__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining
A. Exporting
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network
A. MAC
A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN
A. MAN
_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity
A. Referential integrity
__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented
A. Relational
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)
A. Routers and switches
A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic
A. completeness
A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine
A. database
In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table
A. field
A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo
A. hyperlink
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data
A. internal data
A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate
A. local
The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)
A. natural language processing (NLP) system
FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods
A. people pretending to represent official organizations
All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption
A. snakes
9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable
A. software and hardware
A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb
A. worm
Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus
B. A time bomb
________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed
B. Bandwidth
Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams
B. Computer viruses
What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system
B. Database management system
Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data
B. Implementing data mining
A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm
B. Macro virus
Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.
B. Power surges can be blocked by using a computer surround.
One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking
B. Spyeye Mobile Banking
You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software
B. a firewall
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group
B. batch
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group
B. batch
________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption
B. boot-sector
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking
B. cybercrime
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
B. enable SSID broadcast
Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network
B. enable nodes in a network to communicate with each other
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata
B. external data
A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint
B. filter
Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware
B. grayware
Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency
B. integrity
When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object
B. join
Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data
B. mining of data
10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router
B. network adapter
Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware
B. network operating system (NOS)
8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem
B. node
In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric
B. numeric
In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink
B. object
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying
B. pharming
With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file
B. placing a found virus in a secure area in the hardware
A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric
B. range
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization
B. redundancy
SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier
B. service set identifier
Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable
B. twisted-pair cable
_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking
C. A DDoS attack
A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate
C. Central
CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP
C. DNS
Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data
C. Data mine
IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department
C. FBI and National White Collar Crime Center
A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols
C. Keep your password written down and stored in any easy-to-remember location
3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN
C. PAN
Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm
C. Polymorphic
Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL
C. Radio Waves
Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception
C. Redundancy
All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
C. Unix
An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst
C. administrator
Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata
C. binary large objects (BLOBs)
A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric
C. consistency
Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports
C. exception reports
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector
C. firewall
A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many
C. one-to-one
Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches
C. packets
Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking
C. piggybacking
A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite
C. polymorphic
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate
C. real-time
In a database, a ________ is a group of related fields. A. file B. list C. record D. table
C. record
1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query
C. select query
Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs
C. the way in which they are managed and the distance between their nodes
All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking
C. theft of a cell phone
6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable
C. unshielded twisted-pair (UTP) cable
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse
C. warehouse
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
D. Cat 7B
5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify
D. Connectify
Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.
D. Database information cannot be changed once it is entered.
Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable
D. Fiber-Optic cable
_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware
D. Spyware
All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses
D. assassinating all viruses
All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography
D. child pornography
A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary
D. data dictionary
Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining
D. data mining
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer
D. launch a denial of service (DoS) attack on your computer
All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail
D. logging into e-mail
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking
D. logical port blocking
7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network
D. purchasing initial equipment for the network
2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
D. sharing an operating system
In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table
D. table
All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network
D. the number of nodes on the network
A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb
D. time bomb
The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n
D.802.11n