BCIS 110 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Microsoft Access, when you have the field name FirstName display as First Name, you are changing what field property?

Caption

Which of the following is not a common network topology?

Cluster

Which of the following is formally defined as any criminal action perpetrated primarily using a computer?

Cybercrime

Currently, there are no antivirus programs for mobile devices.

False

Data breaches are always intentional.

False

Databases only work with data, not information.

False

Every time you open a database you will receive a security warning.

False

Gray-hat hackers are not doing anything illegal.

False

HTML is an acronym for Highly Textual Markup Language.

False

In a star topology, the nodes connect to a central communications device called a router.

False

In an Access database, all field types include a field size property.

False

It is safe to change data in a query since you are only changing a temporary copy of the data, not the underlying data in the table.

False

Java and JavaScript refer to the same language.

False

Naming a table carefully is very important because it is the only way to describe what data that table contains.

False

Only the most complex databases have more than one table.

False

Since you can always redownload program files, you do not need to include them in backups.

False

Small slices of a data mart are called data warehouses.

False

The acronym BLOB stands for Bidirectional Large Objects.

False

The information in a data mart spans an entire enterprise.

False

The terms virus and worm mean the same thing.

False

UTP cable has foil shielding.

False

Using a backdoor program, you can use your computer while you are away from the office.

False

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

False

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

False

You always know when you are using a database.

False

________ cable is not subject to electromagnetic interference or radio frequency interference.

Fiber-Optic

Categories of data are called ________.

Fields

Which of the following types of databases would be adequate for simple tasks?

Flat

A(n) ________ address is the address that external entities use when communicating with your network.

IP

________ permits two or more people to communicate over the Internet in real time.

Instant Messaging

Data ________ means that the data contained in a database is accurate and reliable.

Integrity

Which of the following organizations research new Internet technologies to improve its capabilities?

Internet Engineering Task Force

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Jam

A ________ is a virus that is attached to documents.

Macro Virus

Access is a ________ product.

Microsoft

Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?

Multi-Partite

Which protocol is used when sending files as attachments by e-mail?

Multipurpose Internet Mail Extensions (MIME)

A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.

One-to-One

Which of the following would not be considered a possessed object?

Password

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

Pharming

A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250.

Range

________ databases are the most commonly used electronic databases.

Relational

Which field property dictates whether the completeness check will trigger an error?

Required

What is the suggested data type for a street address?

Short Text

Which of the following is the most commonly used client/server network topology?

Star

Which of the following fields is a likely primary key in a student information record?

Student ID Number

In a database, a group of related records is referred to as a(n) ________.

Table

What is not true about field properties?

The categories are the same for all field types.

Which of the following information is not contained in a packet sent over the Internet?

The size (in bytes) of the packet

One type of CAPTCHA is ________.

The wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

A communications server manages Internet connectivity.

True

A database schema (dictionary) defines the name, data type, and length of each field in the database.

True

A macro virus is a virus that is attached to a file.

True

A table in Microsoft Word or a spreadsheet in Microsoft Excel, can be used as a flat database.

True

A time bomb virus can be triggered on a certain date.

True

A worm does not require human interaction to spread to other computers.

True

Access provides a wizard for easily importing Excel data into Access.

True

An image backup is the same as a system backup.

True

Bus networks use a passive topology.

True

Creating a database from a template can help you get started more quickly.

True

Each of the four numbers in a dotted decimal number is referred to as an octet.

True

Ethical hackers are also known as white-hat hackers.

True

FTP enables files to be downloaded or uploaded between computers.

True

In an Access database, a filter is limited to extracting data from a single table.

True

In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record.

True

Most databases can import electronic data from other software applications.

True

NoSQL databases are good for unstructured data.

True

P2P networks become difficult to administer when they have large numbers of users.

True

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.

True

Real-time processing means that transactions are updated when they occur.

True

The Enforce Referential Integrity box should normally be checked.

True

The majority of Internet communications follow the client/server model of network communications.

True

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

True

Nontraditional data in object-oriented databases such as audio clips, video clips, pictures, and very large documents are called ________ data.

Unstructured

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

Virtualization

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

Virus Signature

Which of the following is an example of an instant messaging service?

WhatsApp

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

White Hat

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

Worm

________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

XML

IPv6 was introduced when IPv4 ________.

no longer had enough unique addresses

If you sorted a table which had 53 records by two fields, one ascending and the other descending, how many records would display?

53

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing ________.

A Firewall

Match each of the following terms to its definition: A. an operating system for network servers B. adapter card that connects a computer to a network C. method used on Ethernet networks to avoid data collisions D. network in which each node connected to the network communicates directly with every other node E. used for internal identification of nodes on a network 1. NOS 2. MAC address 3. P2P 4. NIC 5. CSMA/CD

A-1, B-4, C-5, D-3, E-2

Match each of the following terms to its meaning: A. attempts to travel between systems through network connections to spread an infection B. program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files C. a program that renders your computer files unusable by compressing them D. virus that changes its own code to avoid detection E. virus that is triggered when certain conditions are met 1. Computer Virus 2. Worm 3. Polymorphic Virus 4. Logic Bomb 5. Encryption Virus

A-2, B-1, C-5, D-3, E-4

Match each of the following terms to its definition: A. process by which great amounts of data are analyzed and investigated B. software that tries to replicate the decision making of human specialists C. small slice of a data warehouse D. attempts to create computers that think like humans E. includes transforming data to fit into a data warehouse 1. Artificial Intelligence 2. Data Staging 3. Data Mining 4. Expert System 5. Data Mart

A-3, B-4, C-5, D-1, E-2

Match each of the following TCP/IP suite protocols to its definition: A. used for transmission of e-mail messages across the Internet B. protocol that assigns dynamic IP addresses C. transfers data from servers to browsers D. prepares data for transmission providing for error checking and resending lost data E. sends data between computers on the Internet 1. HTTP 2. IP 3. SMTP 4. TCP 5. DHCP

A-3, B-5, C-1, D-4, E-2

________ is the branch of computer science that attempts to create computers that think like humans.

Artificial Intelligence

What data type assigns the next consecutive number to new records?

AutoNumber

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

DNS

Big data analytics is usually associated with ________ services.

Data Warehouse

You can set a ________, which is automatically displayed in a field unless the user enters something different.

Default Value

A communications server is a specialized computer whose sole function is to store, process, and send e-mail.

False

A denial-of-service attack can be used to deny hackers access to a computer system.

False

A knowledge-based system is an analysis tool that, using internal and external data, provides a view of a particular business situation for the purposes of decision making.

False

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

False

A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

A street address field is an example of a field that should have a default value.

False


Set pelajaran terkait

SEDATIVE- HYPNOTIC & ANTI ANXIETY DRUGS

View Set

Restorative Justice Exam 1 Ch 1-5

View Set

CH. 5 Linear motion of the system

View Set

Marvel alter egos van superhelden ( alter ego: echte naam)

View Set