2
Q1
CounterSpy is a program that protects against ____.
A. phishing C. spoofing
B. sniffing D. spyware
3
Q2
____ is capturing and recording network traffic.
A. Phishing C. Spoofing
B. Sniffing D. Spyware
5
Q4
____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic.
A. Spam C. Identity theft
B. Denial-of-service D. Virus hoax
6
Q5
The most common way to index and link databases is using ____.
A. names C. Social Security numbers
B. Addresses D. driver’s license numbers
7
Q6
A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance.
A. acceptable use policy C. keylogger
B. spam filter D. log file
8
Q7
____ are generated by Web server software, record a user’s actions on a Web site.
A. Viruses C. Logins
B. Spam D. Log files
9
Q8
You make two copies of a software package you just bought and sell one to a friend. This action is ____.
A. illegal and unethical C. legal but ethical
B. legal but unethical D. legal and ethical
10
Q9
With ____, you request data from a database by constructing a statement made up of query forms.
A. the database engine
B. query by example
C. select
D. structured query language
11
Q10
The ____ operator searches for records that don’t meet the condition.
A. NOT C. OR
B. AND D. MIS
12
Q11
Distributing data among multiple sites minimizes the effects of computer ____.
A. encapsulation C. fragmentation
B. replication D. failures
13
Q12
Accessing one central database server could increase ____ for remote users.
A. error rates C. productivity
B. communication costs D. processing speed
14
Q13
The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations.
A. data-driven C. fragmentation
B. allocation D. replication
15
Q14
A(n) ____ database has the ability to represent more complex data relationships than a relational database.
A. data-driven C. client/server
B. object-oriented D. distributed
16
Q15
Grouping objects along with their attributes and methods into a class is called ____.
A. replication C. encapsulation
B. Inheritance D. distributed processing
17
Q16
Consider the following process ‘Compute’: It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and
nettPay
18
Q16 (cont.)
The process description is:
IF grossPay > 5000 THEN overTimePay = 100
ELSE
overTimePay = 0
ENDIF
19
Q16 (cont.)
Which statement is TRUE?
A. The above is a process with unnecessary data input
B. A process with an impossible output
C. The above is NOT a process
D. The above is not complete, storage is absent
E. None of the above
21
Q17 (cont.)
A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts
B. The productivity per day must keep the output % within the range of 1% of the defective parts
C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above