IS Chapter 14 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The term _____ typically refers to raw unorganized facts.

Data

The following are true of databases EXCEPT: -They can be relational - They organize a collection of data into information -Fields may be added or subtracted -Data cannot be imported

Data cannot be imported

A database designer is responsible for databases used in the business environment, much as a network administrator is responsible for an organization's file and print servers. True/False

False

A large percentage of all Web sites are indexed and therefore searchable. True/False

False

A webmaster is typically responsible for software design, coding, compiling, debugging, program testing, and revision. True/False

False

HTML is a widely used programming language used to create objects within standard and mobile Web devices. True/False

False

Information and data are the same thing. True/False

False

Secure programming is sometimes referred to as offensive programming. True/False

False

In a large organization, typical database management tasks include the following EXCEPT: -Add newly created Web pages to a Web server -Install database system software -Monitor user access and maintain system security -Restore a test database that was accidentally written over due to an error in a new program

Add newly created Web pages to a Web server

Which of the following is a scripting language based on standard HTML, and commonly used to create both standard Web sites and mobile applications? -Hypertext Preprocessor (PHP) -Active Server Pages (ASP) -Adobe ColdFusion -Java

Adobe ColdFusion

The following are skills and knowledge requires by a Web developers EXCEPT: -Background in communication media, graphic arts, and computer science -Background in configuring servers and routers -Proficiency in languages such as HTML, JavaScript, PHP, and ASP -Extensive skills in graphic design and page layout

Background in configuring servers and routers

You have been working as a network technician for a few years and want to specialize in network design and engineering. What certification would be most appropriate to pursue?

Cisco Certified Design Associate (CCDA)

You have been working as a network technician for a few years and want to specialize in computer and network forensics. Which certification would be most appropriate to pursue?

Certified Computer Examiner (CCE)

The classic definition of a database says that a database has three pieces. Which of the following is NOT part of the classic definition of a database? -Records -Files -Fields -Connections

Connections

In a large organization, the following are typical duties of a database designer EXCEPT: -Defining backup and restore strategies -Specifying appropriate characteristics for each data item being stored -Creating the development database -Maintaining the database model

Defining backup and restore strategies

In a large organization, the following are typical duties of a database administrator EXCEPT: -Resolving errors reported by the database software -Maintaining security -Performing database updates -Designing database architecture

Designing database architecture

You have been working as a network technician for a few years and want to sharpen your ethical hacking and penetration testing skills. What certification would be the best to pursue?

EC-Council Certified Security Analyst (ECSA)

The Deep Web, or Dark Web, consists of Web sites that are hidden from Google and in which illegal activity occurs. True/False

False

The hardware aspect of networking is referred to "connectivity." True/False

False

Professional management of databases requires the following knowledge and skills EXCEPT: -Relational database theory, data modeling, industry standards, SQL programming, and day-to-day administration, including security configurations -Industry standards for data modeling and database design and maintenance -How to develop secure Web applications -Development and design of database management system (DBMS)

How to develop secure Web applications

In a large organization, typical day-to-day tasks of a Web developer include the following EXCEPT: -Developing secure end user interfaces -Integrating databases -Writing supportive client- or server-side code -Installing database system software

Installing database system software

You work for a midsize organization as a programmer. Your manager says that a new position is being created that requires mid-level skills in HTML5 with JavaScript and CSS3 and security implementation throughout the software development life cycle. What combination of certifications would be the best to pursue to qualify for the position?

Microsoft Certified Solutions Developer (MCSD)-Web Applications and Certified Secure Software Lifestyle Professional (CSSLP)

You are still in school but plan to pursue a career in database administration. You want to achieve a certification soon after graduation. What certification is the most appropriate?

Microsoft Technology Associate (MTA), Database track

Which of the following is an open-source Web-development language commonly used within HTML to create Web forms, surveys, picture galleries, and sign-in pages? -Java -Hypertext Preprocessor (PHP) -Active Server Pages (ASP) -Adobe ColdFusion

NOT Adobe ColdFusion NOT Java

The following are skills and knowledge required by a Web developer EXCEPT: -Extensive skills in graphic design and page layout -Background in configuring servers and routers -Proficiency in languages such as HTML, JavaScript, PHP, and ASP -Background in communication media, graphic arts, and computer science

NOT Background in communication media

Your job is to maintain and secure hardware in an IT infrastructure, as well as secure the software and protocols on the network. What job is being described?

NOT Database administrator

A database designer is a business analyst or software developer rather than a production support technician. True/False

True

A relational database is one in which the required information is organized into tables that are related to each other by specific rules established during the database design. True/False

True

An entry of data in a table is called a record or a tuple. True/False

True

Both Citrix and VMware offer certifications in network virtualization. True/False

True

One way to access the Deep Web is known as The Onion Router (TOR). True/False

True

Performing and securing backups is a disaster recovery measure most often performed by a network administrator or database administrator. True/False

True

Perl is an open source programming language used, among other things, to make dynamic Web pages and interactive Web elements. True/False

True

The term "Internet" is derived from the term "internetwork," meaning a group of connected networks. True/False

True

Transactions are logical groupings of related activities involving a database's data. True/False

True

Web developers need the ability to develop sites for traditional endpoint devices, like a desktop PC, as well as mobile devices. True/False

True

In a large organization, a _____ develops the back-end of a Web site and incorporates appropriate security measures from initial concept to completion.

Web developer

In a large organization, a _____ formulates how a Web site is structures, including the organizational flow, navigational design, and usability features.

Web site designer

In a large organization, a _____ performs many of the administrative duties of maintaining a Web site, including upgrading the Web server hardware, managing permissions, and troubleshooting hardware challenges.

Webmaster


Set pelajaran terkait

Final: chapter 59 male repro disorders

View Set

Group 2: Social-Behavioral-Educational (Non-HPD) Researchers CITI Training

View Set

Wiley Anatomy and Physiology Chapter 1

View Set