BCIS 110 Final
In Microsoft Access, when you have the field name FirstName display as First Name, you are changing what field property?
Caption
Which of the following is not a common network topology?
Cluster
Which of the following is formally defined as any criminal action perpetrated primarily using a computer?
Cybercrime
Currently, there are no antivirus programs for mobile devices.
False
Data breaches are always intentional.
False
Databases only work with data, not information.
False
Every time you open a database you will receive a security warning.
False
Gray-hat hackers are not doing anything illegal.
False
HTML is an acronym for Highly Textual Markup Language.
False
In a star topology, the nodes connect to a central communications device called a router.
False
In an Access database, all field types include a field size property.
False
It is safe to change data in a query since you are only changing a temporary copy of the data, not the underlying data in the table.
False
Java and JavaScript refer to the same language.
False
Naming a table carefully is very important because it is the only way to describe what data that table contains.
False
Only the most complex databases have more than one table.
False
Since you can always redownload program files, you do not need to include them in backups.
False
Small slices of a data mart are called data warehouses.
False
The acronym BLOB stands for Bidirectional Large Objects.
False
The information in a data mart spans an entire enterprise.
False
The terms virus and worm mean the same thing.
False
UTP cable has foil shielding.
False
Using a backdoor program, you can use your computer while you are away from the office.
False
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
False
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
False
You always know when you are using a database.
False
________ cable is not subject to electromagnetic interference or radio frequency interference.
Fiber-Optic
Categories of data are called ________.
Fields
Which of the following types of databases would be adequate for simple tasks?
Flat
A(n) ________ address is the address that external entities use when communicating with your network.
IP
________ permits two or more people to communicate over the Internet in real time.
Instant Messaging
Data ________ means that the data contained in a database is accurate and reliable.
Integrity
Which of the following organizations research new Internet technologies to improve its capabilities?
Internet Engineering Task Force
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
Jam
A ________ is a virus that is attached to documents.
Macro Virus
Access is a ________ product.
Microsoft
Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?
Multi-Partite
Which protocol is used when sending files as attachments by e-mail?
Multipurpose Internet Mail Extensions (MIME)
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
One-to-One
Which of the following would not be considered a possessed object?
Password
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
Pharming
A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250.
Range
________ databases are the most commonly used electronic databases.
Relational
Which field property dictates whether the completeness check will trigger an error?
Required
What is the suggested data type for a street address?
Short Text
Which of the following is the most commonly used client/server network topology?
Star
Which of the following fields is a likely primary key in a student information record?
Student ID Number
In a database, a group of related records is referred to as a(n) ________.
Table
What is not true about field properties?
The categories are the same for all field types.
Which of the following information is not contained in a packet sent over the Internet?
The size (in bytes) of the packet
One type of CAPTCHA is ________.
The wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
A communications server manages Internet connectivity.
True
A database schema (dictionary) defines the name, data type, and length of each field in the database.
True
A macro virus is a virus that is attached to a file.
True
A table in Microsoft Word or a spreadsheet in Microsoft Excel, can be used as a flat database.
True
A time bomb virus can be triggered on a certain date.
True
A worm does not require human interaction to spread to other computers.
True
Access provides a wizard for easily importing Excel data into Access.
True
An image backup is the same as a system backup.
True
Bus networks use a passive topology.
True
Creating a database from a template can help you get started more quickly.
True
Each of the four numbers in a dotted decimal number is referred to as an octet.
True
Ethical hackers are also known as white-hat hackers.
True
FTP enables files to be downloaded or uploaded between computers.
True
In an Access database, a filter is limited to extracting data from a single table.
True
In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record.
True
Most databases can import electronic data from other software applications.
True
NoSQL databases are good for unstructured data.
True
P2P networks become difficult to administer when they have large numbers of users.
True
Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.
True
Real-time processing means that transactions are updated when they occur.
True
The Enforce Referential Integrity box should normally be checked.
True
The majority of Internet communications follow the client/server model of network communications.
True
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
True
Nontraditional data in object-oriented databases such as audio clips, video clips, pictures, and very large documents are called ________ data.
Unstructured
Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?
Virtualization
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Virus Signature
Which of the following is an example of an instant messaging service?
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
White Hat
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
Worm
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.
XML
IPv6 was introduced when IPv4 ________.
no longer had enough unique addresses
If you sorted a table which had 53 records by two fields, one ascending and the other descending, how many records would display?
53
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing ________.
A Firewall
Match each of the following terms to its definition: A. an operating system for network servers B. adapter card that connects a computer to a network C. method used on Ethernet networks to avoid data collisions D. network in which each node connected to the network communicates directly with every other node E. used for internal identification of nodes on a network 1. NOS 2. MAC address 3. P2P 4. NIC 5. CSMA/CD
A-1, B-4, C-5, D-3, E-2
Match each of the following terms to its meaning: A. attempts to travel between systems through network connections to spread an infection B. program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files C. a program that renders your computer files unusable by compressing them D. virus that changes its own code to avoid detection E. virus that is triggered when certain conditions are met 1. Computer Virus 2. Worm 3. Polymorphic Virus 4. Logic Bomb 5. Encryption Virus
A-2, B-1, C-5, D-3, E-4
Match each of the following terms to its definition: A. process by which great amounts of data are analyzed and investigated B. software that tries to replicate the decision making of human specialists C. small slice of a data warehouse D. attempts to create computers that think like humans E. includes transforming data to fit into a data warehouse 1. Artificial Intelligence 2. Data Staging 3. Data Mining 4. Expert System 5. Data Mart
A-3, B-4, C-5, D-1, E-2
Match each of the following TCP/IP suite protocols to its definition: A. used for transmission of e-mail messages across the Internet B. protocol that assigns dynamic IP addresses C. transfers data from servers to browsers D. prepares data for transmission providing for error checking and resending lost data E. sends data between computers on the Internet 1. HTTP 2. IP 3. SMTP 4. TCP 5. DHCP
A-3, B-5, C-1, D-4, E-2
________ is the branch of computer science that attempts to create computers that think like humans.
Artificial Intelligence
What data type assigns the next consecutive number to new records?
AutoNumber
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
DNS
Big data analytics is usually associated with ________ services.
Data Warehouse
You can set a ________, which is automatically displayed in a field unless the user enters something different.
Default Value
A communications server is a specialized computer whose sole function is to store, process, and send e-mail.
False
A denial-of-service attack can be used to deny hackers access to a computer system.
False
A knowledge-based system is an analysis tool that, using internal and external data, provides a view of a particular business situation for the purposes of decision making.
False
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
False
A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
A street address field is an example of a field that should have a default value.
False