1. A(n) _____ feature has a graphical user interface to assist users with retrieving data. a. QBE b. SQL c. OOP d. GIGO 2 out of 20 2. The _____ specifies the kind of data a field can contain and how the field is used. a. definition file b. byte record c. primary key d. data type 3 out of 20 3. A _____ consists of rules and standards that define how the database organizes data. a. data model b. data dictionary c. data warehouse d. data topology 4 out of 20 4. Processed data is called _____. a. GIGO b. SQL c. information d. DBMS 5 out of 20 5. _____ is a computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input. a. Garbage in, Garbage out b. Validity check c. Good data, good output d. Accurate data, valuable information 6 out of 20 6. File maintenance refers to procedures that changes records, deletes records, and _____. a. fills in records b. verifies records c. adds records d. all of the above 7 out of 20 7. Disadvantages of using a database include _____. a. needing more memory and storage b. reduced data redundancy c. reduced data checking d. all of the above 8 out of 20 8. The _____ decides on the proper placement of fields and defines the relationships among data. a. DBA b. DA c. OBD d. Data Manager 9 out of 20 9. A _____ is a collection of related records stored on a storage medium such as a hard disk, CD, or DVD. a. data dictionary b. data file c. DBMS d. data house 10 out of 20 10. A(n) _____ stores data in objects. a. OQL b. data warehouse c. OODB d. SQL 11 out of 20 11. The term SQL stands for _____. a. structured query language b. standard query language c. special query relations d. simple query list 12 out of 20 12. A _____ check verifies that a required field contains data. a. completeness b. security c. range d. required 13 out of 20 13. A _____ database is a database that stores data in tables that consist of rows and columns. a. dimensional b. relational c. warehouse d. virtual 14 out of 20 14. A user of a relational database refers to a record in a table as a _____. a. file b. attribute c. column d. row 15 out of 20 15. A(n) _____ is a connection within the data in a database. a. query b. relationship c. join d. SQL 16 out of 20 16. Many complex DBMSs maintain a _____, which is a listing of activities that change the contents of the database. a. listing wizard b. utility c. watchdog d. log 17 out of 20 17. A _____ is a field that uniquely identifies each record in a file. a. primary key b. data key c. field marker d. record terminator 18 out of 20 18. A(n) _____ is a group of related fields. a. associate b. key c. field d. record 19 out of 20 19. The _____ defines the maximum number of characters a field can contain. a. field size b. record size c. record limit d. data type 20 out of 20 20. A _____ check determines whether a number is within a specified set of limits. a. numeric b. digit c. range d. completeness --------------------------------------- 1. A _____ is an assault whose purpose is to disrupt computer access to an Internet service. a. cyberlock b. DoS attack c. firewall d. Trojan horse 2 out of 20 2. A _____ is a notice that guarantees a user or a Web site is legitimate. a. PGP b. secure site c. certificate authority d. digital certificate 3 out of 20 3. _____ involves reducing the electricity and environmental waste while using a computer. a. Ergonomics b. Adware c. Green computing d. Energy Star 4 out of 20 4. _____ is an unsolicited e-mail message or newsgroup posting. a. A cookie b. Spam c. Adware d. Phish 5 out of 20 5. A _____ uses special electrical components to provide a stable current flow to the computer. a. surge protector b. power strip c. power source d. PGP 6 out of 20 6. A(n) _____ is a unique combination of characters, that identifies one specific user. a. password b. user name c. system identifier d. IP 7 out of 20 7. _____ is when individuals attempt to detect an unsecured wireless access point while driving a vehicle through areas they suspect have a wireless network. a. Piracy b. Phishing c. Wi-Fi d. War driving 8 out of 20 8. _____ is the act of stealing computer equipment a. Hardware theft b. Cyberterrorism c. Hardware vandalism d. Piracy 9 out of 20 9. A _____ is someone who uses e-mail as a vehicle for extortion. a. cyberspam b. cyberspy c. cyberterrorist d. cyberextortionist 10 out of 20 10. The term _____ refers to online or Internet-based illegal acts. a. computer crime b. cyberterrorist c. cybercrime d. cyber security risk 11 out of 20 11. A computer _____ is a potentially damaging computer program that infects a computer negatively by altering the way the computer works. a. cookie b. virus c. hacker d. spyware 12 out of 20 12. A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed. a. quarantine b. partition c. signature d. holding area 13 out of 20 13. Which of the following is not a category of a perpetrator of cybercrime? a. unethical employee b. hacker c. cybergeek d. script kiddie 14 out of 20 14. _____ is a technique intruders use to make their Internet transmission appear legitimate to a victim computer or network. a. DoS b. Bluetooth c. Back door d. Spoofing 15 out of 20 15. A computer _____ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. a. security risk b. script c. cracker d. hacker 16 out of 20 16. You may have _____ if you have sore, tired, burning, itchy eyes; blurred vision; headache or sore neck. a. computer vision syndrome (CVS) b. repetitive strain injury (RSI) c. carpal tunnel syndrome (CTS) d. tired eye disease (TED) 17 out of 20 17. A _____ is an encrypted code that a person attaches to an electronic message to verify the identity of the message sender. a. certificate authority b. digital signature c. PGP d. DoS 18 out of 20 18. A program that displays an online advertisement in a banner or pop-up window on a Web page is called _____. a. adware b. spyware c. cookie d. bannerware 19 out of 20 19. A virus _____ is a known specific pattern of virus code. a. definition b. signature c. cookie d. platform 20 out of 20 20. Computer _____ are moral guidelines that govern the use of computers and information systems. a. ethics b. encryption c. firewalls d. privacy -----
I'm clueless on the first 20- that's database stuff, next on my to learn list. As for the second 20: 1. B 2. D 3. C 4. B 5. A 6. B 7. D 8. A 9. D 10. C 11. B 12. A 13. C 14. D 15. A 16. A 17. A 18. A 19. A 20. A I guessed on half of these. What certification is this from? It smacks of a Comptia cert. It seems like they make up their questions and definitions as they go half the time.
its some discovering computers thing i hate database crap as well... i got these 2 to do and 2 more and i think thas it... got done with erythign else 19/20 on each...
db questions 1. A 2. D 3. A or maybe D 4. C 5. A 6. C 7. A 8. DA 9. C 10. C 11. A 12. D or maybe A 13. B 14. D 15. B 16. D 17. A 18. D 19. A 20. C
DUDE. Please don't delete your PowerPoint presentations anymore. http://www.int.gu.edu.au/courses/1004int/slides/Week9a.ppt