PLS 21 Lec Study Guide 2
What is an algorithm?
A set of steps that create an ordered approach to a problem solution.
What is malicious software?
All of the above [Designed to disrupt or deny operation; Gather information that leads to loss of privacy or exploitation; Gain unauthorized access to system resources]
Which of the following is true regarding worms?
All of the above [They are self-replicating; Doesn't need to attach itself to another program; Harm can come like viruses in files]
Which of the followings is a basic element of a computer program?
All of the above [Variables and assignments, arithmetic, logic]
What are some symptoms of an infection?
All of the above. [You see unexpected messages or images; You get lots of system error messages; Programs start unexpectedly]
a set of rules to be followed in performing some operation or task.
An algorithm
Which is NOT a limitation of file system data management?
Analysts must review and update file systems frequently
Which programming language described in lecture offers the most flexibility?
Assembly
Which programming language is most flexible?
Assembly Language
Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security?
Bluehacking
What kinds of risks come with bluetooth-equipped devices?
Bluejacking- anonymous text messages, Bluespamming- contacts sent messages, Bluesnarfing- access to contacts
Which one is NOT a common programming language?
Boa
If you think your computer has been infected, what are the recommended after action steps?
Both A&B [Disconnect from the internet both LAN &WAN, Update your antivirus and check antivirus software manufacturer's website]
Which of the following translates human-readable code into computer-readable instructions?
Code compiler
What is a computer code?
Collection of computer instruction written in human-readable programming language (usually plain text)
What is computer code?
Collection of computer instruction written in human-readable programming language (usually plain text)
Which is not an example of a security threat?
Danger Warning
These are all programming languages except...
Dutch
Which one is NOT the common programming language?
English
What does XML stand for?
Extensible Markup Language
What US government agency is dedicated to cybersecurity?
Homeland Security
What is true about computer virus?
It is always attached into some other non-malware software
Which of the following is one of the four basic programming concepts?
Loops
Which one is not the advantage of a DBMS?
Maximized data inconsistency
It refers to the act of attempting to acquire sensitive information...
Phishing
How do we program computers?
Programming Language > Compiler > Machine Language
Which of the following is NOT true of programming languages?
Programming language is more tedious than machine language
The following are safe anti-virus systems except?
Rootkit
Which of the following answers is not a right way to minimize the risk of threat?
Set your browser to remember your passwords
Which of the following is NOT an example of a threat to computer security
Spartan
The following are types of threats to computer and network security except for...
Spider
What is syntax?
The correct use of key words, operators, and programmer-defined names.
Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions?
Trojan
How to minimize the risk of most threats?
Use a firewall
Which one does NOT belong to the 4 rules in access?
We need to double check the color of a header
What is the correct order of programming work-flow?
Write the code in an editor program, compile the code producing an executable file, run the program
What are the things you can do to secure your network?
all of the above [Encryption, turn SSID off, have a strong password]
Which of these modern settings involve data management?
all of the above [business, research, administration]
Malware consists of what type of programming?
all of the above [codes, scripts, active content]
What consists of programming?
all of the above [codes, scripts, active content]
Which statement about malware is correct?
all of the above [malicious software, consists of programming, designed to disrupt or deny operation]
Database can be classified according to?
all of the above [number of users; database location; expect of type and extent of use]
How to secure you wireless network?
all of the above [unique password, turn SSID off, encryption]
Which of the following is NOT a computer threat?
bacteria
Which bluetooth threat allows hackers to gain access to a mobile phone's contacts?
bluesnarfing
What is data?
building blocks of information
Which is not a computer threat?
computer crash
What is the biggest threat faced by computers?
crimeware
What is metadata?
data about data
Data is managed most efficiently when stored in a ...
database
What does DBMS stand for?
database management system
All of the following decribe the advantage of DBMS EXCEPT:
decrease in productivity
What is the name for the physical components of a computer?
hardware
Which of the following is not a required software in the database system environment?
hardware
What are the 5 major parts of a database?
hardware, software, people, procedures, data
Which is NOT an advantage of a DBMS?
improve datum's appearance
How to start a new file script in Rstudio...
open a new rscript
All of the following are types of computer hardware, EXCEPT...
operating system
What is a well-defined, ordered set of steps for defining a problem?
program
What language allows us to use words instead of numbers?
programming language
Which of these is NOT a major component of hardware?
programs
What is data?
raw facts
What is the definition of End-user data?
raw facts of interest to the end user
What is a worm?
self replicating, have to attach to another program, can transmit across files and destroy files
Which is not a basic element of a computer program?
syntax
The compiler is the...
translator
Data must be processed in order to produce information.
true
What is a characteristic of spyware?
watches the actions of the user and passes it to a server
Which kind of threat is self-replicating?
worms
What is a disadvantage of managing a database system?
[management complexity, increased costs, maintaining currency]
What are the important aspects of an algorithm?
a & c [non-ambiguity; finite]
What are some reasons for studying file systems?
[complexity of database design is easier to understand, understanding file system problems helps to avoid problems with DBMS, knowledge of file system is useful for converting file system to database system]
What is the difference of the data and information?
[data are raw facts, information is the result of processing raw data to reveal meaning, information requires context to reveal meaning]
Which is an advantage and role of a DBMS?
[intermediary between user and database, enables data to be shared, integrates many users' view of the data]