PLS 021 Exam # 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A relational database consists of a collection of: a) Tables b) Fields c) Records d) Keys

a) Tables

Data must be processed in order to produce information: a) True b) False c) Is this a trick question? Data and information are the same. d) Sometimes A, sometimes B.

a) True

Which one does NOT belong to the 4 rules in access? a) We need to double check the colour of header. b) The fields must have the same data type, but field names can be different. c) One of the fields must be a primary key. d) Tables must be closed

a) We need to double check the colour of header.

What is an algorithm? a) Well-defined, ordered set of steps used to solve a problem b) A special language computers speak c) A type of programming language d) Objects that have both data elements and can perform a function

a) Well-defined, ordered set of steps used to solve a problem

A collection of data related to a specific topic: a) btable b) form c) query d) bigdata

a) btable

What does XML stand for? a) extensible markup language b) xray markup language c) extra markup language d) excess markup language

a) extensible markup language

What is the name for the physical components of a computer? a) hardware b) software c) roughware d) toughward

a) hardware

How to start an new file script in Rstudio: a) open a new rscript b) open a new rnotebook c) open a new markdown d) open r presentacion

a) open a new rscript

What is data? a) raw facts b) data is made up from information c) something that doesn't need to be formatted for storage and processing d) data is the same as information

a) raw facts

What is End-user data? a) raw facts of interest to end user b) data about data c) both A & B d) None of the above

a) raw facts of interest to end user

What is a worm? a) self replicating, have to attach to another program, can transmit across files and destroy files b) malicious software, consists of programming that is designed to disrupt or deny operation and gather info for lost of privacy of exploitation c) appear to do something desirable, but actually do harm d) something you get if you are the early bird

a) self replicating, have to attach to another program, can transmit across files and destroy files

What is database? a) shared, integrated computer structure that stores a collection of end-user data and metadata b) raw facts of interest to end user c) Provides description of data characteristics and relationships in data d) Manages structure and controls access to data

a) shared, integrated computer structure that stores a collection of end-user data and metadata

What is a well-defined, ordered set of steps for defining a problem? a) Program b) Algorithms c) Operators d) Syntax

b) Algorithms

Which bluetooth threat allows hackers to gain access to a mobile phone's contacts? a) Bluejacking b) Bluesnarfing c) Bluespamming d) Bluebugging

b) Bluesnarfing

What is data? a) Source of information b) Building blocks of information c) Generic information d) Plain information

b) Building blocks of information

Which is NOT a limitation of file system data management? a) Requires extensive programming b) Can perform ad hoc queries c) Security features aren't adequate d) Difficult to make changes to existing structures

b) Can perform ad hoc queries

A dynamic IP address... a) Can only be used by laptops. b) Changes over time to protect information. c) Is untraceable d) Is only stable when using a CAT 5 Ethernet cable

b) Changes over time to protect information

Which of the following translates human-readable code into computer-readable instructions? a) Code Executioner b) Code Compiler c) Code Translator d) Code Debunker

b) Code Compiler

What does DBMS stand for? a) Database managerial system b) Database management system c) Database multiple system d) Database multicycle short

b) Database management system

These are all programming languages EXCEPT: a) Python b) Dutch c) Java d) C++

b) Dutch

What are the 5 major parts of a database system? a) Software, Procedures, Places, Data, Hardware b) Hardware, Software, People, Procedures, Data c) Data, Software, Procedures, Hardware, Planets d) Protocol, Hardware, Software, Data, People

b) Hardware, Software, People, Procedures, Data

What is true about computer virus? a) User notices symptoms immediately b) It is always attached into some other non-malware software c) Generally no damage occurs d) Not modeled after biological viruses

b) It is always attached into some other non-malware software

Message authentication is a service beyond: a) Message Confidentiality b) Message Integrity c) Message Splashing d) Message Sending

b) Message Integrity

Which of these is NOT a major component of hardware? a) CPU b) Programs c) Main memory d) Output devices

b) Programs

Which of the following is NOT an example of a threat to computer security? a) Trojan b) Spartan c) Malware d) Spyware

b) Spartan

The following are types of treats to computer and network security EXCEPT for a) Worm b) Spider c) Malware d) Virus

b) Spider

Which is not a basic element of a computer program? a) Variables and Assignments b) Syntax c) Logic d) Loops

b) Syntax

What is syntax? a) That which provides everything needed to create, test, and debug software. b) The correct use of key words, operators, and programmer-defined names. c) An entire sequence of instructions d) A volatile type of memory

b) The correct use of key words, operators, and programmer-defined names.

The Compiler is the: a) Computer b) Translator c) Programmer d) Engineer

b) Translator

How to minimize the risk of most threats? a) Download unknown content from trusted sites b) Use a firewall c) Give someone your password d) Open email attachments from untrusted sources

b) Use a firewall

What is the correct order of the programming work-flow? a) Compile the code producing an executable file, write the code in an editor program, run the program/executable file b) Write the code in an editor program, compile the code producing an executable file, run the program/executable file c) Write the code in an editor program, run the program/executable file, compile the code producing an executable file d) Run the program/executable file, write the code in an editor program, compile the code producing an executable file

b) Write the code in an editor program, compile the code producing an executable file, run the program/executable file

What is the definition of End-user data? a) data about data b) raw facts of interest to end user c) data about computer programs d) data about hard drives

b) raw facts of interest to end user

What is lookup value? a) what is lookup vector b) what is lookup result c) d)

c)

A set of rules to be followed in performing some operation or task: a) Finite b) Non-ambiguity c) An algorithms d) A calculus

c) An algorithms

Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security? a) Bluejacking b) Bluespamming c) Bluehacking d) Bluebugging

c) Bluehacking

Which is not a computer threat? a) Computer Virus b) Malware c) Computer Crash d) Trojan

c) Computer Crash

What is the biggest threat faced by computers? a) Malware b) Viruses c) Crimeware d) Spontaneous combustion

c) Crimeware

Which is NOT an example of a security threat? a) Malware b) Trojan c) Danger Warning d) Worm

c) Danger Warning

What is metadata? a) Metabolism data b) Raw data c) Data about data d) Metamorphic data

c) Data about data

Which one is not the common programming language? a) Java b) python c) English d) Visual Basic

c) English

Which of the following is not a required software in the database system environment? a) Operating system software b) DBMS software c) Hardware d) Application programs and utility software

c) Hardware

Which of the following is one of the four basic programming concepts? a) Number b) Equation c) Loops d) Programs

c) Loops

How do we program computers? a) Machine Language > Compiler > Programming Language b) Compiler > Programming Language > Machine Language c) Programming Language > Compiler > Machine Language d) Complier > Machine Language > Programming Language

c) Programming Language > Compiler > Machine Language

Which of the following is NOT true of programming languages? a) Machine language consists of 1's and 0's b) Programming language consists of words c) Programming language is more tedious than machine language d) Software can convert programming language to machine language

c) Programming language is more tedious than machine language

The following are safe anti-virus systems EXCEPT? a) Norton Antivirus b) Macaffe c) Rootkit d) Symmantec

c) Rootkit

Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions? a) Malware b) Computer virus c) Trojan d) Spyware

c) Trojan

Which kind of threat is self-replicating? a) Trojian b) Rootkit c) Worms d) Phishing

c) Worms

All of the following are types of computer hardware, EXCEPT: a) CPU b) input devices c) operating system d) output devices

c) operating system

What is data? a) information b) something that requires context to reveal meaning c) raw facts d) the result of processing raw data to reveal meaning

c) raw facts

What is the difference of the data and information? a) Data are raw facts b) Information is the result of processing raw data to reveal meaning c) Information requires context to reveal meaning d) A B C

d) A B C

Databases can be classified according to? a) Number of users b) Database location(s) c) Expected type and extent of use d) All The Above

d) All The Above

Data management focuses on? a) Proper Generation of Data b) Proper Storage of Data c) Proper Retrieval of Data d) All are correct

d) All are correct

Databases can be classified according to which of the following? a) Number of users b) Database location(s) c) Expected type and extent of use d) All of above

d) All of above

What are the major types of physical components? a) CPU b) Main Memory c) Secondary storage devices d) All of above

d) All of above

Threats are a serious deal and compromise our safety. Which of the following are examples of threats? a) Trojan b) Worms c) Malware d) All of the Above

d) All of the Above

Which is an advantage and role of a Database Management System? a) DBMS is the intermediary between user and database b) DBMS enables data to be shared c) DBMS integrates many users' view of the data d) All of the Above

d) All of the Above

Which of these modern settings involve data management? a) Business b) Research c) Administration d) All of the Above

d) All of the Above

How to secure your wireless network? a) Set up unique password for your device b) Turn SSID off c) Enable encryption such as WPA d) All of the above

d) All of the above

What are databases classified by? a) Number of users b) Database location(s) c) Expected type and extent of use d) All of the above

d) All of the above

What are some reasons for studying file systems? a) Complexity of database design is easier to understand b) Understanding file system problems helps to avoid problems with DBMS systems c) Knowledge of file system is useful for converting file system to database system d) All of the above

d) All of the above

What are some symptoms of an Infection? a) You see unexpected messages or images b) You get lots of system error messages c) Programs start unexpectedly d) All of the above

d) All of the above

What is a disadvantage of managing a database system? a) Management complexity b) Increased costs c) Maintaining currency d) All of the above

d) All of the above

What is malicious software? a) Designed to disrupt or deny operation b) Gather information that leads to loss of privacy or exploitation c) Gain unauthorized access to system resources d) All of the above

d) All of the above

What kinds of risks come with bluetooth-equipped devices? a) Bluejacking: anonymous text messages b) Bluespamming: a phone's contacts are secretly sent text messages c) Bluesnarfing: hackers gain access to a phone's contacts d) All of the above

d) All of the above

Which of the following is true regarding worms? a) They are self-replicating b) Doesn't need to attach itself to another program c) Harm can come like viruses in files d) All of the above

d) All of the above

Which of the followings is a basic element of a computer program? a) Variables and Assignments b) Arithmetic c) Logic ("if" statement) d) All of the above

d) All of the above

Which is NOT a limitations of file system data management? a) System administration is complex and difficult b) Requires extensive programming c) Security features are likely inadequate d) Analysts must review and update file systems frequently

d) Analysts must review and update file systems frequently

Which programming language described in lecture offers the most flexibility, but the least ease of use? a) HTML b) Python c) Java d) Assembly

d) Assembly

Which programming language is most flexible. a) C++ b) R c) HTML d) Assembly Language

d) Assembly Language

Which one is not a common programming language? a) Visual Basic b) Java c) C++ d) Boa

d) Boa

If you think your computer has been infected, what are the recommended after action steps? a) Disconnect from the internet both LAN & WAN b) Update your antivirus and Check your antivirus software manufacturere's website for specific procedures and software for particular viruses c) Close current web browser and open a new one d) Both A and B

d) Both A and B

Which of the following is NOT an advantage of DBMS? a) Improved data sharing b) Improved data access c) Better data integration d) Data redundancy

d) Data redundancy

Which of the following is not an example of an advantage of a DBMS? a) Improved data sharing b) Improved data access c) Improved data security d) Improve datum's appearance

d) Improve datum's appearance

Which of the following are NOT advantages of a DBMS? a) Improved data sharing and security b) Better data integration c) Minimized data inconsistency d) Increased money in our lawmakers pockets

d) Increased money in our lawmakers pockets

Data Management is understood to focus on the proper generation, storage and retrieval of data; therefore, all of the following are significant in this process EXCEPT: a) Good decision making is imperative for proper organization b) Accurate information contributes to proper management c) Information serves to reveal meaningful and proper data d) Information and data have no role in data management

d) Information and data have no role in data management

Which one is NOT the advantage of a DBMS? a) Better data integration b) Improve data access c) Improve decision making d) Maximized data inconsistency

d) Maximized data inconsistency

What is NOT an advantage of database management systems? a) Improved data sharing b) Improved data security c) Improved data access d) Quicker data filtering

d) Quicker data filtering

Which of the following answer is NOT a right way to minimize the risk of threat? a) use a firewall b) only vist trusted site c) use an antivirus software d) Set your browser to remember your passwords

d) Set your browser to remember your passwords

What are the important aspects of an algorithm? a) non-ambiguity b) ambiguity c) finite d) a & c

d) a & c

what are the things you can do to secure your network? a) Have a strong password b) Encryption c) turn SSID off d) all

d) all

Database can be classified according to? a) number of users b) database location c) expect of type and extent of use d) all of the above

d) all of the above

Malware consists of what type of programming? a) codes b) scripts c) active content d) all of the above

d) all of the above

What consists of programming? a) codes b) scripts c) active content d) all of the above

d) all of the above

What is the role and advantage of DBMS? a) it is the intermediary between the user and the database b) it enables data to be shared c) it integrates many users' views of the data d) all of the above

d) all of the above

Which statement about malware is correct? a) malicious software b) consists of programming c) designed to disrupt or deny operation d) all of the above

d) all of the above

All of the following describe the advantages of Database Management Systems EXCEPT: a) improved data security b) improved data sharing c) better data integration d) decrease in productivity

d) decrease in productivity

Which of the followings is a great example of Visual Basic control name? a) LblEmployee b) bTNClose c) txthoursworked d) txtHoursWorked

d) txtHoursWorked

What is/are characteristic(s) of a spyware? a) Does not need to attach itself to another program b) destroys file c) trick the user into some action to activate the software on your computer d) watches the actions of the user and passes it to a server

d) watches the actions of the user and passes it to a server

Data is managed most efficiently when stored in a ... a) Database b) Computer c) RAM d) Drawer

a) Database

What is needed to make a good decision? a) Good information b) Efficient database c) Understand file systems d) None of the above

a) Good information

What US Government agency is dedicated to cyber security? a) Homeland Security b) United States Department of Energy c) United States Department of Education d) United States Department of Defense

a) Homeland Security

What is one advantage of DBMS? a) Improve data sharing b) Improve organization c) Increase more customers

a) Increase data sharing

Which one is NOT an advantage of a database management system (DBMS)? a) Maximized data inconsistency b) Improved data access c) Better data integration d) Increased end-user productivity

a) Maximized data inconsistency

It refers to the act of attempting to acquire sensitive information: a) Phishing b) Threat c) Worm d) None of the above

a) Phishing

What language allows us to use words instead of numbers? a) Programming Language b) Virtual Language c) Machine Language d) Word Language

a) Programming Language

What is data? a) Raw facts b) Needs context c) Not facts d) Limited context

a) Raw facts

What is computer code? a) Collection of computer instruction written in human-readable programming language (usually plain text) b) A handbook on how to operate a computer c) Computer instructions written in binary numbers d) None of the above

a) Collection of computer instruction written in human-readable programming language (usually plain text)

What is data? a) Raw facts such as telephone number, birthday and year-to- year b) A group of characters c) Versions of same data d) Transaction-oriented database systems

a) Raw facts such as telephone number, birthday and year-to- year

What is a computer code? a) Collection of computer instructions written in a human-readable programming language, usually as plain text. b) Collection of symbols that are relevant to computer coding. c) Language that is used in computer programming. d) A special code that is unique to every computer.

a) Collection of computer instructions written in a human-readable programming language, usually as plain text.

What are the building blocks of information? a) Data b) information c) atoms d) none of the above

a) Data


Ensembles d'études connexes

ACCT 2020 Chapter 6 Smartbook Review

View Set

int mgnt 5.0 (manging arcross culture)

View Set

(Gillesania)TRIGONOMETRY SETS 10, 11

View Set

CompTIA A+ 1102 exam Practice Test 11

View Set

Microsoft/LinkedIn Administrative Skills Cert

View Set

MKTG 380 -- Safavi -- WWU -- FINAL ASSIGNMENTS

View Set

Functional Assessment and Behavior Intervention Plans

View Set

Anna's Ultimate Exam Practice Test

View Set

Health Promotion of Infants (2 days to 1 year)

View Set