Download Revision

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Open Database Connectivity wikipedia , lookup

Entity–attribute–value model wikipedia , lookup

Extensible Storage Engine wikipedia , lookup

Microsoft SQL Server wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Database wikipedia , lookup

Functional Database Model wikipedia , lookup

Concurrency control wikipedia , lookup

Relational model wikipedia , lookup

ContactPoint wikipedia , lookup

Versant Object Database wikipedia , lookup

Clusterpoint wikipedia , lookup

Database model wikipedia , lookup

Transcript
Revision
Chapter 3, 4
Mock Test
Q1

CounterSpy is a program that protects
against ____.
A.
B.
phishing
sniffing
C.
D.
spoofing
spyware
2
Q2
____ is capturing and recording network traffic.
A.
B.
Phishing
Sniffing
C.
D.
Spoofing
Spyware
3
Q3
Hackers often use phishing to ____
information.
A.
delete
C.
intercept
B.
modify
D.
extort
4
Q4
____ attacks inundate a Web site or network
with e-mails and other network traffic so that it
becomes overloaded and can’t handle
legitimate traffic.
A. Spam
C. Identity theft
B. Denial-of-service
D. Virus hoax
5
Q5
The most common way to index and link
databases is using ____.
A.
names
C.
Social Security numbers
B.
Addresses D. driver’s license numbers
6
Q6
A(n) ____ is a set of rules specifying legal and
ethical use of a system and activities and the
consequences of noncompliance.
A.
B.
acceptable use policy C. keylogger
spam filter
D. log file
7
Q7
____ are generated by Web server software,
record a user’s actions on a Web site.
A.
B.
Viruses
Spam
C.
D.
Logins
Log files
8
Q8
You make two copies of a software package
you just bought and sell one to a friend. This
action is ____.
A.
illegal and unethical C.
B.
legal but unethical
D.
legal but
ethical
legal and
ethical
9
Q9
With ____, you request data from a database
by constructing a statement made up of query
forms.
A.
B.
C.
D.
the database engine
query by example
select
structured query language
10
Q10
The ____ operator searches for records that
don’t meet the condition.
A.
B.
NOT
AND
C.
D.
OR
MIS
11
Q11
Distributing data among multiple sites
minimizes the effects of computer ____.
A.
encapsulation
C.
fragmentation
B.
replication
D.
failures
12
Q12
Accessing one central database server could
increase ____ for remote users.
A.
error rates
C.
productivity
B.
communication costs D. processing
speed
13
Q13
The ____ approach to setting up a distributed
database addresses how tables are divided
among multiple locations.
A.
data-driven
C.
fragmentation
B.
allocation
D.
replication
14
Q14
A(n) ____ database has the ability to represent
more complex data relationships than a
relational database.
A.
data-driven
C.
client/server
B.
object-oriented
D.
distributed
15
Q15
Grouping objects along with their attributes and
methods into a class is called ____.
A.
replication
C.
encapsulation
B.
Inheritance D. distributed processing
16
Q16

Consider the following process ‘Compute’:


It has INPUT: grossPay data
Have OUTPUTS: grossPay, overTimePay and
nettPay
17
Q16 (cont.)

The process description is:
IF grossPay > 5000 THEN
overTimePay = 100
ELSE
overTimePay = 0
ENDIF
18
Q16 (cont.)
Which statement is TRUE?
A. The above is a process with unnecessary
data input
B. A process with an impossible output
C. The above is NOT a process
D. The above is not complete, storage is
absent
E. None of the above

19
Q17
20
Q17 (cont.)
A. The system performance standard for a
manufacturing process is to provide no more
than 1% defective parts
B. The productivity per day must keep the
output % within the range of 1% of the
defective parts
C. The return on investment (ROI) of the
defective parts per day produce must be below
1%
D.
None of the above
21
22