Presentation is loading. Please wait.

Presentation is loading. Please wait.

Revision Chapter 3, 4 Mock Test.

Similar presentations


Presentation on theme: "Revision Chapter 3, 4 Mock Test."— Presentation transcript:

1 Revision Chapter 3, 4 Mock Test

2 Q1 CounterSpy is a program that protects against ____.
A. phishing C. spoofing B. sniffing D. spyware

3 Q2 ____ is capturing and recording network traffic.
A. Phishing C. Spoofing B. Sniffing D. Spyware

4 Q3 Hackers often use phishing to ____ information.
A. delete C. intercept B. modify D. extort

5 Q4 ____ attacks inundate a Web site or network with s and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. A. Spam C. Identity theft B. Denial-of-service D. Virus hoax

6 Q5 The most common way to index and link databases is using ____.
A. names C. Social Security numbers B. Addresses D. driver’s license numbers

7 Q6 A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance. A. acceptable use policy C. keylogger B. spam filter D. log file

8 Q7 ____ are generated by Web server software, record a user’s actions on a Web site. A. Viruses C. Logins B. Spam D. Log files

9 Q8 You make two copies of a software package you just bought and sell one to a friend. This action is ____. A. illegal and unethical C. legal but ethical B. legal but unethical D. legal and ethical

10 Q9 With ____, you request data from a database by constructing a statement made up of query forms. A. the database engine B. query by example C. select D. structured query language

11 Q10 The ____ operator searches for records that don’t meet the condition. A. NOT C. OR B. AND D. MIS

12 Q11 Distributing data among multiple sites minimizes the effects of computer ____. A. encapsulation C. fragmentation B. replication D. failures

13 Q12 Accessing one central database server could increase ____ for remote users. A. error rates C. productivity B. communication costs D. processing speed

14 Q13 The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations. A. data-driven C. fragmentation B. allocation D. replication

15 Q14 A(n) ____ database has the ability to represent more complex data relationships than a relational database. A. data-driven C. client/server B. object-oriented D. distributed

16 Q15 Grouping objects along with their attributes and methods into a class is called ____. A. replication C. encapsulation B. Inheritance D. distributed processing

17 Q16 Consider the following process ‘Compute’:
It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and nettPay

18 Q16 (cont.) The process description is:
IF grossPay > 5000 THEN overTimePay = 100 ELSE overTimePay = 0 ENDIF

19 Q16 (cont.) Which statement is TRUE?
A. The above is a process with unnecessary data input B. A process with an impossible output C. The above is NOT a process D. The above is not complete, storage is absent E. None of the above

20 Q17

21 Q17 (cont.) A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts B. The productivity per day must keep the output % within the range of 1% of the defective parts C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above

22


Download ppt "Revision Chapter 3, 4 Mock Test."

Similar presentations


Ads by Google