PLS 21 Lec Study Guide 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is an algorithm?

A set of steps that create an ordered approach to a problem solution.

What is malicious software?

All of the above [Designed to disrupt or deny operation; Gather information that leads to loss of privacy or exploitation; Gain unauthorized access to system resources]

Which of the following is true regarding worms?

All of the above [They are self-replicating; Doesn't need to attach itself to another program; Harm can come like viruses in files]

Which of the followings is a basic element of a computer program?

All of the above [Variables and assignments, arithmetic, logic]

What are some symptoms of an infection?

All of the above. [You see unexpected messages or images; You get lots of system error messages; Programs start unexpectedly]

a set of rules to be followed in performing some operation or task.

An algorithm

Which is NOT a limitation of file system data management?

Analysts must review and update file systems frequently

Which programming language described in lecture offers the most flexibility?

Assembly

Which programming language is most flexible?

Assembly Language

Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security?

Bluehacking

What kinds of risks come with bluetooth-equipped devices?

Bluejacking- anonymous text messages, Bluespamming- contacts sent messages, Bluesnarfing- access to contacts

Which one is NOT a common programming language?

Boa

If you think your computer has been infected, what are the recommended after action steps?

Both A&B [Disconnect from the internet both LAN &WAN, Update your antivirus and check antivirus software manufacturer's website]

Which of the following translates human-readable code into computer-readable instructions?

Code compiler

What is a computer code?

Collection of computer instruction written in human-readable programming language (usually plain text)

What is computer code?

Collection of computer instruction written in human-readable programming language (usually plain text)

Which is not an example of a security threat?

Danger Warning

These are all programming languages except...

Dutch

Which one is NOT the common programming language?

English

What does XML stand for?

Extensible Markup Language

What US government agency is dedicated to cybersecurity?

Homeland Security

What is true about computer virus?

It is always attached into some other non-malware software

Which of the following is one of the four basic programming concepts?

Loops

Which one is not the advantage of a DBMS?

Maximized data inconsistency

It refers to the act of attempting to acquire sensitive information...

Phishing

How do we program computers?

Programming Language > Compiler > Machine Language

Which of the following is NOT true of programming languages?

Programming language is more tedious than machine language

The following are safe anti-virus systems except?

Rootkit

Which of the following answers is not a right way to minimize the risk of threat?

Set your browser to remember your passwords

Which of the following is NOT an example of a threat to computer security

Spartan

The following are types of threats to computer and network security except for...

Spider

What is syntax?

The correct use of key words, operators, and programmer-defined names.

Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions?

Trojan

How to minimize the risk of most threats?

Use a firewall

Which one does NOT belong to the 4 rules in access?

We need to double check the color of a header

What is the correct order of programming work-flow?

Write the code in an editor program, compile the code producing an executable file, run the program

What are the things you can do to secure your network?

all of the above [Encryption, turn SSID off, have a strong password]

Which of these modern settings involve data management?

all of the above [business, research, administration]

Malware consists of what type of programming?

all of the above [codes, scripts, active content]

What consists of programming?

all of the above [codes, scripts, active content]

Which statement about malware is correct?

all of the above [malicious software, consists of programming, designed to disrupt or deny operation]

Database can be classified according to?

all of the above [number of users; database location; expect of type and extent of use]

How to secure you wireless network?

all of the above [unique password, turn SSID off, encryption]

Which of the following is NOT a computer threat?

bacteria

Which bluetooth threat allows hackers to gain access to a mobile phone's contacts?

bluesnarfing

What is data?

building blocks of information

Which is not a computer threat?

computer crash

What is the biggest threat faced by computers?

crimeware

What is metadata?

data about data

Data is managed most efficiently when stored in a ...

database

What does DBMS stand for?

database management system

All of the following decribe the advantage of DBMS EXCEPT:

decrease in productivity

What is the name for the physical components of a computer?

hardware

Which of the following is not a required software in the database system environment?

hardware

What are the 5 major parts of a database?

hardware, software, people, procedures, data

Which is NOT an advantage of a DBMS?

improve datum's appearance

How to start a new file script in Rstudio...

open a new rscript

All of the following are types of computer hardware, EXCEPT...

operating system

What is a well-defined, ordered set of steps for defining a problem?

program

What language allows us to use words instead of numbers?

programming language

Which of these is NOT a major component of hardware?

programs

What is data?

raw facts

What is the definition of End-user data?

raw facts of interest to the end user

What is a worm?

self replicating, have to attach to another program, can transmit across files and destroy files

Which is not a basic element of a computer program?

syntax

The compiler is the...

translator

Data must be processed in order to produce information.

true

What is a characteristic of spyware?

watches the actions of the user and passes it to a server

Which kind of threat is self-replicating?

worms

What is a disadvantage of managing a database system?

[management complexity, increased costs, maintaining currency]

What are the important aspects of an algorithm?

a & c [non-ambiguity; finite]

What are some reasons for studying file systems?

[complexity of database design is easier to understand, understanding file system problems helps to avoid problems with DBMS, knowledge of file system is useful for converting file system to database system]

What is the difference of the data and information?

[data are raw facts, information is the result of processing raw data to reveal meaning, information requires context to reveal meaning]

Which is an advantage and role of a DBMS?

[intermediary between user and database, enables data to be shared, integrates many users' view of the data]


Ensembles d'études connexes

study plan macroecon chapters 7 and 8

View Set

Quiz 9(a. b. & c.): Structured Assessment and Treatment Planning, Occlusion on Fixed Implant, Implant Configuration on Fixed Implant Prostheses Prosthesis

View Set

Principles of Coaching Final Part 4

View Set

3: Developing Project Schedules and Budgets

View Set

CH 15 Defense Mechanisms of the Gingiva

View Set

Section 3 - The Story of the Crusades

View Set