PLS 021 Exam # 2
A relational database consists of a collection of: a) Tables b) Fields c) Records d) Keys
a) Tables
Data must be processed in order to produce information: a) True b) False c) Is this a trick question? Data and information are the same. d) Sometimes A, sometimes B.
a) True
Which one does NOT belong to the 4 rules in access? a) We need to double check the colour of header. b) The fields must have the same data type, but field names can be different. c) One of the fields must be a primary key. d) Tables must be closed
a) We need to double check the colour of header.
What is an algorithm? a) Well-defined, ordered set of steps used to solve a problem b) A special language computers speak c) A type of programming language d) Objects that have both data elements and can perform a function
a) Well-defined, ordered set of steps used to solve a problem
A collection of data related to a specific topic: a) btable b) form c) query d) bigdata
a) btable
What does XML stand for? a) extensible markup language b) xray markup language c) extra markup language d) excess markup language
a) extensible markup language
What is the name for the physical components of a computer? a) hardware b) software c) roughware d) toughward
a) hardware
How to start an new file script in Rstudio: a) open a new rscript b) open a new rnotebook c) open a new markdown d) open r presentacion
a) open a new rscript
What is data? a) raw facts b) data is made up from information c) something that doesn't need to be formatted for storage and processing d) data is the same as information
a) raw facts
What is End-user data? a) raw facts of interest to end user b) data about data c) both A & B d) None of the above
a) raw facts of interest to end user
What is a worm? a) self replicating, have to attach to another program, can transmit across files and destroy files b) malicious software, consists of programming that is designed to disrupt or deny operation and gather info for lost of privacy of exploitation c) appear to do something desirable, but actually do harm d) something you get if you are the early bird
a) self replicating, have to attach to another program, can transmit across files and destroy files
What is database? a) shared, integrated computer structure that stores a collection of end-user data and metadata b) raw facts of interest to end user c) Provides description of data characteristics and relationships in data d) Manages structure and controls access to data
a) shared, integrated computer structure that stores a collection of end-user data and metadata
What is a well-defined, ordered set of steps for defining a problem? a) Program b) Algorithms c) Operators d) Syntax
b) Algorithms
Which bluetooth threat allows hackers to gain access to a mobile phone's contacts? a) Bluejacking b) Bluesnarfing c) Bluespamming d) Bluebugging
b) Bluesnarfing
What is data? a) Source of information b) Building blocks of information c) Generic information d) Plain information
b) Building blocks of information
Which is NOT a limitation of file system data management? a) Requires extensive programming b) Can perform ad hoc queries c) Security features aren't adequate d) Difficult to make changes to existing structures
b) Can perform ad hoc queries
A dynamic IP address... a) Can only be used by laptops. b) Changes over time to protect information. c) Is untraceable d) Is only stable when using a CAT 5 Ethernet cable
b) Changes over time to protect information
Which of the following translates human-readable code into computer-readable instructions? a) Code Executioner b) Code Compiler c) Code Translator d) Code Debunker
b) Code Compiler
What does DBMS stand for? a) Database managerial system b) Database management system c) Database multiple system d) Database multicycle short
b) Database management system
These are all programming languages EXCEPT: a) Python b) Dutch c) Java d) C++
b) Dutch
What are the 5 major parts of a database system? a) Software, Procedures, Places, Data, Hardware b) Hardware, Software, People, Procedures, Data c) Data, Software, Procedures, Hardware, Planets d) Protocol, Hardware, Software, Data, People
b) Hardware, Software, People, Procedures, Data
What is true about computer virus? a) User notices symptoms immediately b) It is always attached into some other non-malware software c) Generally no damage occurs d) Not modeled after biological viruses
b) It is always attached into some other non-malware software
Message authentication is a service beyond: a) Message Confidentiality b) Message Integrity c) Message Splashing d) Message Sending
b) Message Integrity
Which of these is NOT a major component of hardware? a) CPU b) Programs c) Main memory d) Output devices
b) Programs
Which of the following is NOT an example of a threat to computer security? a) Trojan b) Spartan c) Malware d) Spyware
b) Spartan
The following are types of treats to computer and network security EXCEPT for a) Worm b) Spider c) Malware d) Virus
b) Spider
Which is not a basic element of a computer program? a) Variables and Assignments b) Syntax c) Logic d) Loops
b) Syntax
What is syntax? a) That which provides everything needed to create, test, and debug software. b) The correct use of key words, operators, and programmer-defined names. c) An entire sequence of instructions d) A volatile type of memory
b) The correct use of key words, operators, and programmer-defined names.
The Compiler is the: a) Computer b) Translator c) Programmer d) Engineer
b) Translator
How to minimize the risk of most threats? a) Download unknown content from trusted sites b) Use a firewall c) Give someone your password d) Open email attachments from untrusted sources
b) Use a firewall
What is the correct order of the programming work-flow? a) Compile the code producing an executable file, write the code in an editor program, run the program/executable file b) Write the code in an editor program, compile the code producing an executable file, run the program/executable file c) Write the code in an editor program, run the program/executable file, compile the code producing an executable file d) Run the program/executable file, write the code in an editor program, compile the code producing an executable file
b) Write the code in an editor program, compile the code producing an executable file, run the program/executable file
What is the definition of End-user data? a) data about data b) raw facts of interest to end user c) data about computer programs d) data about hard drives
b) raw facts of interest to end user
What is lookup value? a) what is lookup vector b) what is lookup result c) d)
c)
A set of rules to be followed in performing some operation or task: a) Finite b) Non-ambiguity c) An algorithms d) A calculus
c) An algorithms
Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security? a) Bluejacking b) Bluespamming c) Bluehacking d) Bluebugging
c) Bluehacking
Which is not a computer threat? a) Computer Virus b) Malware c) Computer Crash d) Trojan
c) Computer Crash
What is the biggest threat faced by computers? a) Malware b) Viruses c) Crimeware d) Spontaneous combustion
c) Crimeware
Which is NOT an example of a security threat? a) Malware b) Trojan c) Danger Warning d) Worm
c) Danger Warning
What is metadata? a) Metabolism data b) Raw data c) Data about data d) Metamorphic data
c) Data about data
Which one is not the common programming language? a) Java b) python c) English d) Visual Basic
c) English
Which of the following is not a required software in the database system environment? a) Operating system software b) DBMS software c) Hardware d) Application programs and utility software
c) Hardware
Which of the following is one of the four basic programming concepts? a) Number b) Equation c) Loops d) Programs
c) Loops
How do we program computers? a) Machine Language > Compiler > Programming Language b) Compiler > Programming Language > Machine Language c) Programming Language > Compiler > Machine Language d) Complier > Machine Language > Programming Language
c) Programming Language > Compiler > Machine Language
Which of the following is NOT true of programming languages? a) Machine language consists of 1's and 0's b) Programming language consists of words c) Programming language is more tedious than machine language d) Software can convert programming language to machine language
c) Programming language is more tedious than machine language
The following are safe anti-virus systems EXCEPT? a) Norton Antivirus b) Macaffe c) Rootkit d) Symmantec
c) Rootkit
Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions? a) Malware b) Computer virus c) Trojan d) Spyware
c) Trojan
Which kind of threat is self-replicating? a) Trojian b) Rootkit c) Worms d) Phishing
c) Worms
All of the following are types of computer hardware, EXCEPT: a) CPU b) input devices c) operating system d) output devices
c) operating system
What is data? a) information b) something that requires context to reveal meaning c) raw facts d) the result of processing raw data to reveal meaning
c) raw facts
What is the difference of the data and information? a) Data are raw facts b) Information is the result of processing raw data to reveal meaning c) Information requires context to reveal meaning d) A B C
d) A B C
Databases can be classified according to? a) Number of users b) Database location(s) c) Expected type and extent of use d) All The Above
d) All The Above
Data management focuses on? a) Proper Generation of Data b) Proper Storage of Data c) Proper Retrieval of Data d) All are correct
d) All are correct
Databases can be classified according to which of the following? a) Number of users b) Database location(s) c) Expected type and extent of use d) All of above
d) All of above
What are the major types of physical components? a) CPU b) Main Memory c) Secondary storage devices d) All of above
d) All of above
Threats are a serious deal and compromise our safety. Which of the following are examples of threats? a) Trojan b) Worms c) Malware d) All of the Above
d) All of the Above
Which is an advantage and role of a Database Management System? a) DBMS is the intermediary between user and database b) DBMS enables data to be shared c) DBMS integrates many users' view of the data d) All of the Above
d) All of the Above
Which of these modern settings involve data management? a) Business b) Research c) Administration d) All of the Above
d) All of the Above
How to secure your wireless network? a) Set up unique password for your device b) Turn SSID off c) Enable encryption such as WPA d) All of the above
d) All of the above
What are databases classified by? a) Number of users b) Database location(s) c) Expected type and extent of use d) All of the above
d) All of the above
What are some reasons for studying file systems? a) Complexity of database design is easier to understand b) Understanding file system problems helps to avoid problems with DBMS systems c) Knowledge of file system is useful for converting file system to database system d) All of the above
d) All of the above
What are some symptoms of an Infection? a) You see unexpected messages or images b) You get lots of system error messages c) Programs start unexpectedly d) All of the above
d) All of the above
What is a disadvantage of managing a database system? a) Management complexity b) Increased costs c) Maintaining currency d) All of the above
d) All of the above
What is malicious software? a) Designed to disrupt or deny operation b) Gather information that leads to loss of privacy or exploitation c) Gain unauthorized access to system resources d) All of the above
d) All of the above
What kinds of risks come with bluetooth-equipped devices? a) Bluejacking: anonymous text messages b) Bluespamming: a phone's contacts are secretly sent text messages c) Bluesnarfing: hackers gain access to a phone's contacts d) All of the above
d) All of the above
Which of the following is true regarding worms? a) They are self-replicating b) Doesn't need to attach itself to another program c) Harm can come like viruses in files d) All of the above
d) All of the above
Which of the followings is a basic element of a computer program? a) Variables and Assignments b) Arithmetic c) Logic ("if" statement) d) All of the above
d) All of the above
Which is NOT a limitations of file system data management? a) System administration is complex and difficult b) Requires extensive programming c) Security features are likely inadequate d) Analysts must review and update file systems frequently
d) Analysts must review and update file systems frequently
Which programming language described in lecture offers the most flexibility, but the least ease of use? a) HTML b) Python c) Java d) Assembly
d) Assembly
Which programming language is most flexible. a) C++ b) R c) HTML d) Assembly Language
d) Assembly Language
Which one is not a common programming language? a) Visual Basic b) Java c) C++ d) Boa
d) Boa
If you think your computer has been infected, what are the recommended after action steps? a) Disconnect from the internet both LAN & WAN b) Update your antivirus and Check your antivirus software manufacturere's website for specific procedures and software for particular viruses c) Close current web browser and open a new one d) Both A and B
d) Both A and B
Which of the following is NOT an advantage of DBMS? a) Improved data sharing b) Improved data access c) Better data integration d) Data redundancy
d) Data redundancy
Which of the following is not an example of an advantage of a DBMS? a) Improved data sharing b) Improved data access c) Improved data security d) Improve datum's appearance
d) Improve datum's appearance
Which of the following are NOT advantages of a DBMS? a) Improved data sharing and security b) Better data integration c) Minimized data inconsistency d) Increased money in our lawmakers pockets
d) Increased money in our lawmakers pockets
Data Management is understood to focus on the proper generation, storage and retrieval of data; therefore, all of the following are significant in this process EXCEPT: a) Good decision making is imperative for proper organization b) Accurate information contributes to proper management c) Information serves to reveal meaningful and proper data d) Information and data have no role in data management
d) Information and data have no role in data management
Which one is NOT the advantage of a DBMS? a) Better data integration b) Improve data access c) Improve decision making d) Maximized data inconsistency
d) Maximized data inconsistency
What is NOT an advantage of database management systems? a) Improved data sharing b) Improved data security c) Improved data access d) Quicker data filtering
d) Quicker data filtering
Which of the following answer is NOT a right way to minimize the risk of threat? a) use a firewall b) only vist trusted site c) use an antivirus software d) Set your browser to remember your passwords
d) Set your browser to remember your passwords
What are the important aspects of an algorithm? a) non-ambiguity b) ambiguity c) finite d) a & c
d) a & c
what are the things you can do to secure your network? a) Have a strong password b) Encryption c) turn SSID off d) all
d) all
Database can be classified according to? a) number of users b) database location c) expect of type and extent of use d) all of the above
d) all of the above
Malware consists of what type of programming? a) codes b) scripts c) active content d) all of the above
d) all of the above
What consists of programming? a) codes b) scripts c) active content d) all of the above
d) all of the above
What is the role and advantage of DBMS? a) it is the intermediary between the user and the database b) it enables data to be shared c) it integrates many users' views of the data d) all of the above
d) all of the above
Which statement about malware is correct? a) malicious software b) consists of programming c) designed to disrupt or deny operation d) all of the above
d) all of the above
All of the following describe the advantages of Database Management Systems EXCEPT: a) improved data security b) improved data sharing c) better data integration d) decrease in productivity
d) decrease in productivity
Which of the followings is a great example of Visual Basic control name? a) LblEmployee b) bTNClose c) txthoursworked d) txtHoursWorked
d) txtHoursWorked
What is/are characteristic(s) of a spyware? a) Does not need to attach itself to another program b) destroys file c) trick the user into some action to activate the software on your computer d) watches the actions of the user and passes it to a server
d) watches the actions of the user and passes it to a server
Data is managed most efficiently when stored in a ... a) Database b) Computer c) RAM d) Drawer
a) Database
What is needed to make a good decision? a) Good information b) Efficient database c) Understand file systems d) None of the above
a) Good information
What US Government agency is dedicated to cyber security? a) Homeland Security b) United States Department of Energy c) United States Department of Education d) United States Department of Defense
a) Homeland Security
What is one advantage of DBMS? a) Improve data sharing b) Improve organization c) Increase more customers
a) Increase data sharing
Which one is NOT an advantage of a database management system (DBMS)? a) Maximized data inconsistency b) Improved data access c) Better data integration d) Increased end-user productivity
a) Maximized data inconsistency
It refers to the act of attempting to acquire sensitive information: a) Phishing b) Threat c) Worm d) None of the above
a) Phishing
What language allows us to use words instead of numbers? a) Programming Language b) Virtual Language c) Machine Language d) Word Language
a) Programming Language
What is data? a) Raw facts b) Needs context c) Not facts d) Limited context
a) Raw facts
What is computer code? a) Collection of computer instruction written in human-readable programming language (usually plain text) b) A handbook on how to operate a computer c) Computer instructions written in binary numbers d) None of the above
a) Collection of computer instruction written in human-readable programming language (usually plain text)
What is data? a) Raw facts such as telephone number, birthday and year-to- year b) A group of characters c) Versions of same data d) Transaction-oriented database systems
a) Raw facts such as telephone number, birthday and year-to- year
What is a computer code? a) Collection of computer instructions written in a human-readable programming language, usually as plain text. b) Collection of symbols that are relevant to computer coding. c) Language that is used in computer programming. d) A special code that is unique to every computer.
a) Collection of computer instructions written in a human-readable programming language, usually as plain text.
What are the building blocks of information? a) Data b) information c) atoms d) none of the above
a) Data