220 likes | 459 Views
Revision. Chapter 3, 4. Mock Test. Q1. CounterSpy is a program that protects against ____. A. phishing C. spoofing B. sniffing D . spyware. Q2. ____ is capturing and recording network traffic . A. Phishing C. Spoofing B. Sniffing D. Spyware. Q3.
E N D
Revision Chapter 3, 4 Mock Test
Q1 • CounterSpy is a program that protects against ____. A. phishing C. spoofing B. sniffing D. spyware
Q2 ____ is capturing and recording network traffic. A. Phishing C. Spoofing B. Sniffing D. Spyware
Q3 Hackers often use phishing to ____ information. A. delete C. intercept B. modify D. extort
Q4 ____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. A. Spam C. Identity theft B. Denial-of-service D. Virus hoax
Q5 The most common way to index and link databases is using ____. A. names C. Social Security numbers B. Addresses D. driver’s license numbers
Q6 A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance. A. acceptable use policy C. keylogger B. spam filter D. log file
Q7 ____ are generated by Web server software, record a user’s actions on a Web site. A. Viruses C. Logins B. Spam D. Log files
Q8 You make two copies of a software package you just bought and sell one to a friend. This action is ____. A. illegal and unethical C. legal but ethical B. legal but unethical D. legal and ethical
Q9 With ____, you request data from a database by constructing a statement made up of query forms. A. the database engine B. query by example C. select D. structured query language
Q10 The ____ operator searches for records that don’t meet the condition. A. NOT C. OR B. AND D. MIS
Q11 Distributing data among multiple sites minimizes the effects of computer ____. A. encapsulation C. fragmentation B. replication D. failures
Q12 Accessing one central database server could increase ____ for remote users. A. error rates C. productivity B. communication costs D. processing speed
Q13 The ____approach to setting up a distributed database addresses how tables are divided among multiple locations. A. data-driven C. fragmentation B. allocation D. replication
Q14 A(n) ____ database has the ability to represent more complex data relationships than a relational database. A. data-driven C. client/server B. object-oriented D. distributed
Q15 Grouping objects along with their attributes and methods into a class is called ____. A. replication C. encapsulation B. Inheritance D. distributed processing
Q16 • Consider the following process ‘Compute’: • It has INPUT: grossPay data • Have OUTPUTS: grossPay, overTimePay and nettPay
Q16 (cont.) • The process description is: IF grossPay > 5000 THEN overTimePay = 100 ELSE overTimePay = 0 ENDIF
Q16 (cont.) • Which statement is TRUE? A. The above is a process with unnecessary data input B. A process with an impossible output C. The above is NOT a process D. The above is not complete, storage is absent E. None of the above
Q17 (cont.) A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts B. The productivity per day must keep the output % within the range of 1% of the defective parts C. The return on investment (ROI) of the defective parts per day produce must be below 1%D. None of the above