Sei sulla pagina 1di 33

DB 01 DB 02 DB 03

What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one? What is a database? A tool to produce high quality documents

What does a record contain? DB 04 A document which contains text An RDBMS is a DB 05 remote DBMS Data Warehousing refers to DB 06 storing data offline at a separate site Unauthorised alteration of on-line records can be prevented by employing What is a database? DB 10 What does a record contain? DB 11 What is a report? DB 12 What is the best way to analyse and change data DB 13 DB 18 DB 19 DB 20 DB 226 Data Warehousing refers to DB 227 You are creating a client application that calls ActiveX DLLs. DB 235 Which of the following properties of the Err object provides the name of a component that information. The userto the This database holds personal sends an error back can help DB 24 to keep it confidential by DB 26 DB 27 DB 30 If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as What are some popular office orientated software applications? Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a

DB 07

Which of the following field types will generate the primary DB 365 key automatically? Referential integrity ensures that the: DB 366 Tables are related to one another through a: DB 367 A foreign key is: DB 368 You are creating a banking database to track customer DB 369 loans. The bank will, of course, have many customers, each of whom may take out one or between Companies and In a one-to-many relationship more loans, while each loan DB 370 Employees, which field is found in both tables? Which of the following ensures that records in related tables DB 371 are consistent with one another? For example, it ensures that you cannotdelete a relationship between tables key. How would you add a record with an invalid foreign in the DB 372 Relationships window? In a Customers tables, what does a plus sign next to the DB 373 CustomerID field mean? What is required of the fields that join two tables? DB 374 Assume a one-to-many relationship between the Customers DB 375 table and the Loans table, with referential integrity in effect. What of the following is attempt to delete a main form and Whichhappens when youtrue when viewinga customer ID DB 376 its associated subform in the Form Design view? Which of the following relationships does not belong in a DB 377 database based on a professional sports league such as footballsymbol is used at the end of the join line in a related Which or basketball? DB 378 table to signify the "many" side of a one-to-many relationship? You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? DB 379 The correct order of the arguments for the MsgBox DB 380 statement is: The first statement in a procedure named CreateList is: DB 381 Which of the following is TRUE related to form fields? DB 393 A text field: DB 394 The purpose of a database is to: DB 401 A database stores: DB 402 A database records: DB 403 A sales contact manager used by a salesperson is an DB 404 example of _______________ A Customer Resource Management (CRM) system is an DB 405 example of_________ The industry standard supported by all major DBMSs that DB 407 allows tables to be joined together is called __________.

A program whose job is to create, process and administer DB 408 databases is called the _____ Microsoft Access may use which of the following DBMS DB 409 engines? Which of the following are basic components of an DB 410 enterprise-class database system? In an enterprise-class database system ________ . DB 411 In an enterprise-class database system, the database DB 412 application ___ . In an enterprise-class database system, reports are created DB 413 by ____________________ . A database is considered "self-describing" because _______ DB 414 . In an enterprise-class database system, the database DB 415 _________ . A database may contain _________________________ . DB 416 A database designed using spreadsheets from the Sales DB 417 department is a database being designed _________________________ . requirements for a A database designed to implement DB 418 reporting application needed by the Sales department is a database being designed _______ . A database designed to combine two databases used by the DB 419 Sales department is a database being designed _________________________ . Database professionals use ________________ as specific DB 420 data sources for studies and analyses. Database professionals use a set of principles called DB 421 ________________ to guide and assess database design. A very popular development technique used by database DB 422 professionals for database design is known as _______________________technique used by database A very popular development . DB 423 professionals to adopt a database design to new or changing requirement is known as _____ . was (were) The predecessor(s) of database processing DB 424 __________ . In a relation __________________________ . DB 425 An attribute is also known as a(n) . DB 426 A combination of one or more columns used to identify DB 427 particular rows in a is___ . A combination of two or more columns used to identify DB 428 particular rows in a relation is________ . A determinant that determines all the other columns in a DB 429 relation is______ . When designing a database, one of the candidate keys in a DB 430 relation is selected as the _________ . Normalization is a process used to deal with which of the DB 431 following modification anomalies? When you are given a set of tables and asked to create a DB 432 database to store their data, the first step is to ____ . Modern microcomputer personal DBMS products______. DB 433

Which of the following are true about data mining DB 434 applications? We have obtained access to the company's operational DB 435 data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of We have obtained access to the company's operational DB 436 data. We have been asked to produce a report with an item bydata warehouse database differs from an figure available A item analysis of sales, but the only sales operational DB 437 database because: Which of the following objects is used to display a menu? DB 463 Which of the following objects are NOT found in an Access DB 464 application? You are developing an Access application that you expect to DB 465 upgrade periodically. Which of the following statements is TRUE?of the following statements regarding Access Which DB 466 applications is NOT true? Which of the following brings a copy of the table into the DB 467 current database and does not maintain a tie to the original table?makes a database an application? What DB 469 What is the Access tool that is used to create the user DB 470 interface? The purpose of a data warehouse is to: DB 503 ____________ is the art of protecting information by DS 279 transforming it into an unreadable format. DS 59 DS 62 DS 63 DS 66 EC 103 What is the term that describes spying on one's business EC 301 rivals to gain a competitive advantage? What would you NOT be looking for when spying on a EC 302 competitor? An online drugstore such as Drugstore.com is an example EC 406 of_______ Which of the following is an example of unacceptable online EC 51 'netiquette'? EC 58 IN 01 storing data on a disk drive A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per second. Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? the following best describes uploading information? Which of Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is: What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The most beneficial advantage of ERP system is

IN 02

IN 03 IN 04 IN 05 IN 06 IN 07 IN 08 IN 09 IN 10

The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. methods for rendering The principles, means and information unintelligible and for restoring encrypted information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and to authenticate Protected/private character string used conversations. an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software.

IN 104 IN 11

None the person who is known as father of Internet IN 110 This website is the biggest bookstore on the earth. IN 111 IN 112 IN 12 IN 13 IN 14 IN 15 A NIC is considered as IN 155 A hub is a device that can connect IN 156 IN 157 IN 158 What does a router route? IN 159 IN 16 IN 160 IN 161 Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? the following in an OSI layer Which of Which of the following is true concerning the function of a switch? What do routers connect? A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the The term HTTP stands for When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. The means of communicating between networks

IN 162 IN 163

When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a

To construct a simple LAN of 4 computers, you would IN 164* connect them with ______ What happens to data that is ruined before reaching to IN 165 receiver Bluetooth is IN 166 Which is not one of the recognized IEEE sub layers? IN 167 The most preferred number system to represent a IP IN 168 address is A MAC address is of IN 169 Protocol is IN 17 IN 172 A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not is of biggest disadvantage of its Ring topology? What all,the a local area network and theavailable resources.

IN 173 IN 174 IN 175 What are the various types of bus architecture? IN 176 What are the various types of ring architecture? IN 177 IN 178 IN 179 IN 18 IN 180 IN 181 IN 182 IN 194 LAN speeds are measured in IN 195 WAN speeds are IN 196 IN 197 IN 198 Accessing the Internet from a typical home PC requires the use of To use the Internet, you What are the most common LAN technologies used in networking today? Modem speeds are measured in In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub ............... , each work station is directly connected to a In a common communications channel Which one of the following is NOT a network topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are:

IN 20 IN 205 IN 21 IN 214 IN 218

The worldwide web server uses the following standard interface to act as the middleware: An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is JPEG and MPEG To use the Internet you

IN 22 A multiplexer is a form of IN 220 An ISP IN 221 FTP is IN 222 Telnet IN 223 A firewall is IN 224 A proxy server is IN 225 A search engine is IN 23 IN 23 IN 24 FTP is IN 25 Telnet IN 26 IN 267 IN 268 IN 269 IN 27 IN 270 IN 272 IN 273 IN 28 IN 285 Which of the following would be performed on a network server and not normally on individual workstations? Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources. A firewall is Which of the following is a true statement about the OSI model layers? Which of the following is NOT true about the Internet? To look for information about interest areas on the internet, the user should use a An ISP

What can be said about the safety of the Internet? IN 288 IN 29 IN 290 IN 297 IN 298 IN 30 IN 304 IN 306 IN 307 IN 308 IN 31 IN 31 IN 310 IN 312 IN 313 IN 314 IN 315 IN 316 IN 317 IN 318 IN 32 IN 33 IN 33 IN 34 Which of the following is a Web browser? IN 348 A Web page is another name for ----------IN 349 Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in HardwareSoftware Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life? An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet? The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called the Internet to pursue, harass, or contact another in an Using _________________. unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminalhelp with extracting The two most common tools used to of the mainframe are information are: Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism?

IN 35 IN 350 IN 351 IN 359 IN 36 IN 360 IN 45 IN 47 IN 49 IN 493 IN 50 IN 501 IN 68 IN 69

Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called: Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a tensecond sound file and a ten-second music video clip. You also add a hyperlink. Whichfor the mediawebsite, which the When saving a photograph of use on a elements has format should you choose? While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? the Internet for business-to-business A system that uses interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for?

IN 70 What is the purpose of DNS? IN 71 IN 72. IN 73. IN 74. What does IRC stand for? IN 75. If you do not pick up your email for a week...? IN 76 What does HTML stand for? IN 77 What is a disadvantage of joining a mailing list? IN 78 OS 01 OS 127 Which bus carries information between processors and OS 131 peripherals? Which of the following computer software is designed to direct and assist the execution of application programs Formatting a disk results in all the data being...? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom?

Which bus controls the sequencing of read/write operations? OS 132 Which computers use single chip processors? OS 139 CPU performance may be measured in OS 193 In processing cheques which of the following I/O techniques OS 199 have banks traditionally used Disk fragmentation OS 215 A compiler is OS 216 An interpreter is OS 217 Zipping a file means OS 219 An assembly language program is translated to machine OS 233 code by Which of the following is not part of the processor OS 234 If the Cancel Error Property of the CommonDialog Box is set OS 236 to true then which of the following statement is true: __________ control defaults to displaying the files in the OS 238 current directory: A ____________ occurs any time a program writes more OS 271 information into the temporary space it has allocated in the memory. a system requires certain common tools. Which Assessing OS 274 of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will OS 275 tell you what software and operating system a Web server is running. When software vendors discover flaws in their software, they OS 276 usually will write corrections to their code, known as: All ____________ have the option of blocking ports. OS 277 Which of the following is NOT a characteristic of a firewall? OS 278 Before shutting a service on an individual machine, which of OS 280 the following would you always check? At a minimum, which of the following should be implemented OS 281 under the protection phase? Attacks on your system may be prevented or trapped OS 282 through the use of: Setting restrictions as to the number of unique passwords to OS 283 use before a user can recycle them is called a password: Which of the following is NOT a step to take in securing a OS 284 workstation? To prevent a hacker from unauthorized access, what should OS 286 you do with the administrator account? What should be done with old backup tapes and CDs? OS 287 Which of the following is NOT an example of malware? OS 289

One step you can take to reduce the risk of being infected by OS 291 a virus is to: Which of the following is NOT a sign that a virus has infected OS 292 your system? Which of the following is the safest way to protect yourself OS 293 from e-mail viruses? A ____________ attack causes too much information to be OS 294 placed into temporary memory space. ____________ gathers user information with the user's OS 295 knowledge. Which of the following is the most common function of OS 296 spyware? Which of the following is NOT a virus-scanning technique? OS 299 Which of the following would NOT be a way to protect your OS 300 system from spyware? For which of the following positions would it be advisable to OS 309 conduct an extensive background check? Which of the following would you use to open an existing OS 329 file? The ability to have multiple applications open at the same OS 355 time is known as: Which of the following can be changed using the Options OS 356 command? Which of the following leaves an application open but OS 357 shrinks the window to a button on the Windows taskbar? Which of the following actions would move a floating toolbar OS 396 to dock it in a different place? To display a missing or needed toolbar, click the: OS 397 Which of the following is NOT a true statement regarding OS 399 password protection? The Linux operating systems is an example of: OS 495 The Windows operating systems is: OS 496 Application service providers offer: OS 497 A(n) _________ offers on-demand software on an asOS 498 needed basis to its clients over the web. _________ are systems used to interact with customers and OS 502 run a business in real time. The most common cause(s) of disaster is (are): OS 504 A _______ backup site is backup facility consisting of an OS 505 empty warehouse with all necessary connections for power and communication, but nothing else. To destroy an object and free the memory space occupied OS239 by it, the keyword used is:

clipboard search A way to analyse and manipulate numerical information

file sort

field field names

An organised way of storing information A way of maintaining a log about a set of similar things Information about certain programs A collection of files It contains all the data about one specific item B

relative DBMS

Relational DBMS

Reliable DBMS

backing up data regularly Key verification A way to analyse and manipulate numerical information Information about certain programs Reports allow users to extract information as hard copy (printed output) Extracting and analysing data Compilers, interpreters, editors DEFAULT and NOT NULL constraints CHANGE TABLE remote DBMS storing data offline at a separate site Number using a password the product code A database bookmarks

is related to data mining Computer sequence checks A tool to produce high qualitydocuments It contains all the data about one specific item Reports provide a very flexible way of creating and editing documents Spreadsheets make data easy to analyse Network software, backup systems FOREIGN KEY constraints MODIFY TABLE relative DBMS backing up data regularly Description keeping a backup copy the primary key Graphics operators

uses tape as opposed to disk Computer matching An organised way of storing information about a set of similar things A document which contains text A tool which allows text and graphics to be placed in documents Using queries Word processors, spreadsheets, databases, DTP PRIMARY KEY and UNIQUE constraints ALTER TABLE Relational DBMS is related to data mining Component keeping the original paper copy mail merge browser wildcards

Auto Primary

Auto ID

AutoNumber forms in a database are consistent with the underlying tables and its associated dynaset. query or queries.

records in a dynaset are consistent with related tables in a database the underlying tables. are consistent with one another. and a subform. foreign key. main form the primary key of both related tables. One-to-one EmployeeID The Tools menu, Relationship window Double click the Relationship line That there are several customers associated with that ID They must both be numbers Nothing, Access ignores the attempted command. The subform is not visible. A one-to-many relationship between teams and players # Either table at any time

the primary key of the related a field from an unrelated table. table. One-to-many CompanyID Referential integrity Right-click the Relationship line, then select Delete from the shortcut menu That some of the data is not viewable They cannot be text fields The customer's ID is deleted from the Customers table. The subform is displayed in Datasheet view. A one-to-many relationship between teams and coaches M The Customers table only The Loans table at any time when there are Loan records associated with that customer prompt, icon, title bar text. Sub CreateList. A text field enables the form user to choose from one of several existingmultiple must be set for entries. words. store data in tables. relationships. figures. multiuser database application multiuser database application Structured Question Language (SQL) title bar text, prompt, icon. CreateList. A drop-down list enables the user to choose from one of several existing entries. be set. does not have to create tables of rows and columns. metadata. information. e-commerce database application e-commerce database application Structured Query Language (SQL) Many-to-many EmployeeLastName The join line Select Undo in the Relationships pull-down menu That there are records in a related table They cannot be AutoNumber data types The customer's ID is deleted from the Customers table, and all the subform is displayed in Form Therelated loans are deleted view. A one-to-many relationship between coaches and teams

prompt, title bar text, icon. Dim CreateList. A check box enables the form user to choose from one of several existing entries. set for one word. must be help people keep track of things. data. facts. single-user database application single-user database application Sequential Query Language (SQL)

Database Modeling System Jet The user the database application(s) interact(s) with the DBMS creates queries the user all the users' data is in one place holds user data tables from existing data from existing non-database data from existing data data marts data marts data marts data marts file managers entities in a column vary as to kind table record record record composite key Insertion anomaly

Database Management System SQL Server The database application the DBMS accesses the database data creates form the database application it reduces data duplication holds metadata metadata as a new systems development project as a new systems development project as a new systems development project normalization normalization normalization normalization hierarchical models the order of the columns is important relation field field field primary key Update anomaly

Data Business Model System Oracle The database management system (DBMS) None of above creates reports the database management system (DBMS) it contains a description of its own structure holds indexes stored procedures as a redesign of an existing database as a redesign of an existing database as a redesign of an existing database data models data models data models entity-relationship data modeling network models the order of the rows is unimportant row key composite key foreign key foreign key Deletion anomaly

assess the existing tables' structure and design the database structure create one or more new tables content are supplied by several well-established were essentially killed off by manufacturers MS Access have poor response time

They use sophisticated mathematical techniques. dirty data dirty data data warehouse data are not stored in tables. Form Forms and reports It will be easier for the user to upgrade it if the objects and tables are in one database. The Link Tables command can be used to associate the tables in one database with the Import objects in another database. It contains more than one table Menu Wizard create backups for mission critical corporate data. Decryption Using data encryption. Unaltered in transmission. Both sender and receiver must have the private key before this encryption method will work. Collision. Error checking Competitive espionage A list of competitor's clients single-user database application Replying promptly

Their report delivery is more Nonintegrated data difficult than report delivery for reporting systems. inconsistent data nonintegrated data inconsistent data nonintegrated data

data warehouse databases do data warehouse data are often not have metadata. denormalized. Table Queries and tables It will be easier for the user to upgrade it if the objects are in oneapplication and the tables An database may consist of Report Macros It is advisable to put each object and table into a separate database. in an application, All objects

multiple databases, each with including the tables, must reside multiple objects, linked to yet within the same database. Link Merge It contains tables, reports, queries, and forms Build Menu centralize the manageability of data collection. Cipher Performing validity checks. Not intercepted en route. The private key cannot be broken into fragments and distributed errors.receiver. Data entry to the Data Integration Corporate espionage Contact numbers of the management group multi-user database application Keeping messages short It contains a user interface, or switchboard Interface Design Wizard put key business information into the hands or more decision makers. Encryption Conducting fraud-awareness training. Received by the intended recipient. The private key is used by the sender for encryption but not by the receiver for decryption. Failure of server duplicating function. Low cost of operation Industrial espionage Research data e-commerce database application Including the Subject

Removable drives that can be locked up Message authentication in Encryption performed by a at night provide adequate security when EDI systems performs the physically secure hardware the confidentiality of data is the primary same function as segregation device is more secure than sending information to a host computer Bandwidth storing data on the hard drive receiving information from a host computer Speed Size

Find Photography Key User-id Penetration Acts Spoofing Loss Sales - tax authorities

Save Digital Signature Lock Password Retrieval Regulations Imposting Threat Income - tax authorities

Browse Cryptography Hash Function Name Cryptography Address Unauthorising Exposure Judge of a civil court

Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts Router LAN hyper terminal tracing program National Informatics Center Only Computers Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer

Pirated software Hoffman Amazon .com Any Time Money Regulations Gateway WAN hypertext tracing program Network Interface card Can not computers Combines connectivity of a hub with the traffic regulation of a bridge frames gateway Two Data-Link Layer

Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address Port CAN hypertext transfer protocol New Information Card Only printers Switches data from incoming ports to outgoing ports. Two or more networks Packets router Four Network Layer

RG7U Physical address A cable Data return to the sender Wireless technology Physical Layer Binary 48 Bits software that facilitates connection to the internet Novell PC There isn't one

Coaxial cable Logical address Hub It gets destroyed bit by bit. Wired Technology Data Link Layer ASCII 48 Bytes a list of rules for transferring data over a network Client If one node goes down, it brings down the entire ring Topology Star Parallel Circular Bus Bus Bus Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps

Fiber A memory address Router It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB software that allows file copying Server If the hub goes down, it brings down all of the nodes on that section Both A and B Ring Both A and B Linear Star Star Linear Star Physical Layer Ethernet, DecNET, FDDI mbps Mbps

Physiology Bus Linear Parallel Ring Ring Star Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web

measured in bytes per second depend on the transmission medium a modem must use electronic mail Windows 95 must have a LAN account

key gateway interface a Novell Interface Controller CD-ROM drive Linux have to do with compression of graphics and video must use the World Wide Web Printer provides access to the Internet used to send email used to send email used to protect a computer room from fires and floods a backup server hardware scanner provides access to the Internet used to send email used to send email The layers cannot communicate with one another. It is one large network. Password cracking used to protect a computer room from fires and floods IP flood hack firewall a backup server Apply security patches

uniform resource locator used to control a printer a modem Novell Netware have to do with Web pages must use electronic mail modem is a CPU register used to browse the Web

common gateway interface interfaces a modem to a computer Windows package Windows NT the Internet must have a LAN account bridge is a CPU functional unit is part of Netscape

uses wireless communication is part of Netscape medium a form of virus an email server IR system for the Internet CD-ROM is a CPU register used to browse the Web uses telephone lines Any layer can communicate directly with any other layer. It is made up of many networks connected into transmission lines System intrusion called a form of virus Flood a Web server with requests packet router an email server Update virus definitions a screen saver program a poor file server browser clip-art file is a CPU functional unit is part of Netscape is part of Netscape Any layer can communicate only with the layer directly above or below it. the same way as a local It works network. Denial of Service a screen saver program Virus that initiates a ping flood flood switch a poor file server Backup data on a daily basis

All sites are safe and reliable. Use of identifiers by attaching to an e-mail. Phone A Trojan horse Modems cookies and Trojan horses.

There are safe and unsafe sites. Use of passwords through an FTP port. E-mail Adware Protocols Trojan horses and key loggers.

Only large name-recognizable sites are safe. Use of logical access methods by attaching itself to a document. Web traffic A worm Multiplexors cookies and key loggers.

An attack on a system for personal gain An attack with the purpose of Giving out disinformation gaining publicity Economic damage Crashing the stock market, as in the 1930s To carry more network capacity set its prices very high People Search Name of your bank Virus buy stocks. Shill bidding Internet stalking. pop-ups. Use a fake e-mail address. Encryption I only irc Adds more bytes to programs HTML Web query. Disruption in communication Shutdown of military security systems To improve network services limit access to computer owners only Yahoo People Search Date of birth Fraud invest without risk. Phishing cyber stalking. cookies. Never use your real identity. Physical Security controls II only ftp Verifies integrity of files Internet Explorer HTML document. Disruption in supply lines Contaminating water systems To improve system response time stop its competitors seeing their prices USA People Search Personal assets Adware purchase off-shore property. Siphoning virtual stalking. spam. Use a proxy server. Message sequence number checking Both I & II www Increases boot up time Microsoft Excel round trip HTML document.

.com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is stored on the hard drive on your computer Click on the Back arrow until the desired site is found the Refresh command Hyperlink BMP Save it to a floppy disk. extranet. an attachment. VoIP Desktop client, application, and database. Modem File Transfer Program So computers can be referenced by a name 193.1.2.3 paul .trigg @ domain. org. uk The US government Internet Relay Chat It will be deleted Hyper Textual Mark-up Lingo

.co in used for company the World Wide Web Consortium HTML. updating the values that are obtained through a Web queryon 'Go to' or 'Search' in Click the browser

.con is used for companies HTML. DHTML. clicking a hyperlink that references a document that is storedthethe floppy drive onlook Go to in History page and your for the site

the Insert Hyperlink command the Update command Screensaver GIF Write it down on a piece of paper. intranet. a signature. IPT Sound JPEG Add it to 'Favourites' or 'Bookmarks'. privileged network. a footer. IPP

Desktop client, software, and Desktop server, application, and hardware. database. CD-ROM File Transmission Protocol So IP addresses can be shorter 45.1.1.1 paul.trigg@domain.org.uk Scientists in Switzerland International Relay of Characters It will be waiting for you to collect it Hyperlink Text Marking Language Telephone line File Transfer Protocol So email is delivered faster 143.215.12.19 paul.domain.uk No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language High volumes of email Operating system Saved to the disk Address bus

Receiving messages automatically from People discussing a topic of anyone in the group interest globally Application Software Deleted from the disk Data bus Utility Programs Copied from the disk Auto bus

Data bus Personal computers BPS OCR is caused by wear a fast interpreter faster than a compiler encrypting it an assembler the ALU A runtime error can result if the user clicks the cancel button File List Box memory overflow Netcop www.nettools.com code correct. firewalls It can consist of hardware, software, or both. That any open applications be exited Antivirus software an intrusion-detection system. cycle. Make sure all update and security patches are applied. Delete it from the system and use the guest account. Tapes can be used over and over, and CDs should be kept forever. Trojan horse

Address bus Parallel computers MIPS MICR caused by overuse slower than an interpreter translates and executes programs statement by statement it decrypting a compiler the CU A compile time error occurs Dir List Box systems overload NetBrute www.WhoIs.com patches. switches It hides your network. Dependencies on other services Intrusion-detection software antivirus software. renewal.

Control bus Super computers MHz barcode scanning is due to bad disk blocks converts a program to assembly code converts a program to machine code compressing it an interpreter the power cord The program executes without any error Drive List Box RAM overflow Netcraft www.netcraft.com updates. hubs One of its techniques is packet filtering. That you are not on the Internet Firewall a network prevention system. age.

Install and keep current Limit user's ability to configure antivirus and anti-spyware the workstation. programs. change the built- Disable it and create a Delete it and in guest account to a power nondescript user account with user account. can be administrator rights. Tapes and CDs Tapes should be melted and CDs thrown away in the trash. Virus broken. IP spoofing

place a router between your ISP and your system. System acts abnormal Update antivirus software. virus A virus Obtain system IP addresses E-mail and attachment scanning Use your browser's security settings

add spyware to your system. Files are missing Do not propagate hoax viruses. Trojan horse A Trojan horse Obtain cookies Download scanning Do not open attachments in unknown e-mails

download files from reliable Web sites. Printing problems Turn off the auto-launch in your email client. spyware Spyware Check for open ports File scanning Avoid "skins" and "toolbars" download Junior accountant The Open command on the Edit menu cascading. the number of windows you have open minimizing

Administrative assistant to the president Cook The Standard toolbar multitasking. the default file location of new files shrinking Click on any border and drag. right mouse button anywhere on the Word window, choose the Customize command fromare automatically saved All documents the context-sensitive with a default password. public domain software. public domain software. on-demand computing. best-cost provider Operational systems power outages. hot Delete The Formatting toolbar tiling. whether the worksheet prints in landscape or portrait orientation multitasking

Click on any corner and drag. Click on the title bar and drag. right mouse button on any visible toolbar, and click on the missing toolbar. The password is casesensitive. nonprotective open source software. nonprotective open source software. on-demand software. software provider Informational systems hardware failures. cold Kill left mouse button on any visible toolbar, and click on the missing toolbar. document is protected by Once a a password, it cannot be opened without that password. software. protective open source protective open source software. utility computing. Web service provider Structured query systems floods. empty Nothing

layout B record grab D

C Database access controls D None of the above C None of the above B None of the above A None of the above C None of the above C IDENTITY columns C UPDATE TABLE C Reliable DBMS C uses tape as opposed to disk C Source D saving the file with different filenames e-mail C e-mail A engines C A

Auto Key C reports are consistent with the underlying tables or queries. report and its related query. A not a primary key of either related table. B Many-to-one B CompanyAddress A The one-to-many relationship B Click the Delete Relationships button on the toolbar B That records can be added by clicking on the plus sign C They must be the same data type D An error message is displayed. D The subform is an object on the form and can be moved or sized D like any other object. A many-to-many relationship between players and teams C * C Neither table B

C title bar text, icon, prompt. B Sub. B A drop-down list enables the user to enter text. C must be set for two words. C maintain data on different things in different tables. A all of the above D a and b D a or b A None of above B Relational Question Language (RQL) C

Relational Model Manager B a and b D All of the above. D All of above A b and c D the database B All of the above. C All of the above. D All of the above. D a and b A a and b B a and b C entity-relationship data modeling A entity-relationship data modeling B entity-relationship data modeling D data migration D relational data model A more than one column can use the same name field D tuple C foreign key C candidate key D surrogate key B All of above D move the data into the new database are not true DBMS products B A C

None of the above A a "wrong format" problem B a "wrong format" problem D b and c C Query A Spreadsheets D Regardless of how the objects and tables are stored, the user will B have to reentercan be created in An application the data in the such a way that it objects such as C forms Join and reports can be A It contains macros C Switchboard Manager D store all corporate transaction data in one single location. Cryptography C Reviewing the systems-access log. Sent to the correct address. A The private key is used by the receiver for decryption but not by the sender for encryption. Firewall vulnerability. Quality management B Economic espionage C A competitor's new project B None of above C Using all capital letters D Security at the transaction phase in EDI systems is not necessary C because problems at that level will B Channel A A D D C

Retrieve C Message Digest C Formula A Address B Password Cracker A Protocols D Approving A Hacking B Police officer of IPS rank. B Cracker C Howard Aiken A Msn .com B None of above C Protocols C Pin B PAN hypertext tracing protocol None of the above B None of the above D All of Above B Bridges and Hubs Hubs and nodes B None of the above virus checker None of the above C All of the above D C A A C

Twisted pair B None of the above B None of the above None of the above None of the above A All of the above D None of the above 48 MB a gateway calling program for internet bridging Network PC C If the hub goes down, it brings down all of the nodes on all of the rings B None of the above B All of above D None A Both A and B B Mesh C Mesh B Ring C Mesh A Data Link Layer D Ethernet, token ring, ARCnet B mips B Mips C limited by modem speeds C Netscape B All of the above A A A B B B

application protocol interface C connects a computer to a network Netscape None of the above C none of the previous A use appropriate communications software none of the previous D make of processor A is a protocol for the transfer of files between computers None of the above D none of the previous D none D none of the previous C search engine D make of processor A is a protocol for the transfer of files between computers D is a protocol that allows for remote D login Any layer can communicate only with the layer above it. C Individual computers can connect to it using an ISP. A Port sniffing C none of the previous D UDP flood A traffic C hub B none of the above D Limit logging on access C D A D B

ActiveX-enabled sites are safe. B Use of encryption methods D by scanning the computer for a connection. Application updates D Spyware D LAN B key loggers and worms. C Changing the content of a Web page All of the above are correct. D Shutdown of nuclear plant safety systems D To obtain an accurate inventory of network related equipment and D parts and prices as soon update its network nodes as they are changed Lycos Search B Criminal records A Spyware B make large amounts of money by parking funds in their bank D account. Hoaxing B Web stalking. B viruses. B Use anti-spyware software. B Logical access controls B Neither I or II C telnet C Misleads a program recompilation B both HTML and Internet Explorer B Web browser. B D D B

None of the above A one way HTML. C MHTML D viewing an Excel worksheet that you have saved as a Web page. B Go to the Bookmarks or Favorites page C the External Data command A Video C TIFF C Cut and paste it to a word processor document. C network topology A an encryption. B PoIP A Desktop server, software, and hardware. A None of the above B None of the above B None of the above A None of the above D None of the above B None of the above C None of the above A None of the above A None of the above C None of the above C Database management system C None of above A None of above A

None of above C None of above A VLSI B voice recognition B none of the previous B none of the previous B none of the previous B transmitting it C a linker A None of the above C You need to carry out conditional compilation Combo Box A buffer overflow D NetBIOS D www.netstat.com C upgrades. B scanners A It is a barrier between your network and the rest of the Internet. also shut down That you associated services Router C a proxy filtering system. A history. D Block all incoming traffic on a network. Create another administrator account to confuse the hacker. Give them to a recycle shop. C Spyware C D C B B A

hone your programming skills. C Problems with your wireless mouse D Never open an e-mail attachment unless you know what it is and D who sent it. buffer overflow D A buffer overflow C Obtain usernames and passwords D Backup file scanning D Use encryption software D Network administrator D The Save command on the File menu minimizing. A the margins on the printed DOCUMENT cascading C You cannot move a floating toolbar. left mouse button anywhere on the Word window, choose the Customize command from the Passwords can be up to only seven characters long. proprietary software C proprietary software. D utility software. B application service provider D Office automation A All of the above. D dormant B New C C B A A A

Potrebbero piacerti anche