1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

Computer nerds... easy questions... help...

Discussion in 'BBS Hangout' started by AMS, Nov 27, 2006.

  1. AMS

    AMS Member

    Joined:
    Oct 8, 2003
    Messages:
    9,646
    Likes Received:
    218
    1. A(n) _____ feature has a graphical user interface to assist users with retrieving data.

    a. QBE
    b. SQL
    c. OOP
    d. GIGO
    2 out of 20

    2. The _____ specifies the kind of data a field can contain and how the field is used.

    a. definition file
    b. byte record
    c. primary key
    d. data type
    3 out of 20

    3. A _____ consists of rules and standards that define how the database organizes data.

    a. data model
    b. data dictionary
    c. data warehouse
    d. data topology
    4 out of 20

    4. Processed data is called _____.

    a. GIGO
    b. SQL
    c. information
    d. DBMS
    5 out of 20

    5. _____ is a computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input.

    a. Garbage in, Garbage out
    b. Validity check
    c. Good data, good output
    d. Accurate data, valuable information
    6 out of 20

    6. File maintenance refers to procedures that changes records, deletes records, and _____.

    a. fills in records
    b. verifies records
    c. adds records
    d. all of the above
    7 out of 20

    7. Disadvantages of using a database include _____.

    a. needing more memory and storage
    b. reduced data redundancy
    c. reduced data checking
    d. all of the above
    8 out of 20

    8. The _____ decides on the proper placement of fields and defines the relationships among data.

    a. DBA
    b. DA
    c. OBD
    d. Data Manager
    9 out of 20

    9. A _____ is a collection of related records stored on a storage medium such as a hard disk, CD, or DVD.

    a. data dictionary
    b. data file
    c. DBMS
    d. data house
    10 out of 20

    10. A(n) _____ stores data in objects.

    a. OQL
    b. data warehouse
    c. OODB
    d. SQL
    11 out of 20

    11. The term SQL stands for _____.

    a. structured query language
    b. standard query language
    c. special query relations
    d. simple query list
    12 out of 20

    12. A _____ check verifies that a required field contains data.

    a. completeness
    b. security
    c. range
    d. required
    13 out of 20

    13. A _____ database is a database that stores data in tables that consist of rows and columns.

    a. dimensional
    b. relational
    c. warehouse
    d. virtual
    14 out of 20

    14. A user of a relational database refers to a record in a table as a _____.

    a. file
    b. attribute
    c. column
    d. row
    15 out of 20

    15. A(n) _____ is a connection within the data in a database.

    a. query
    b. relationship
    c. join
    d. SQL
    16 out of 20

    16. Many complex DBMSs maintain a _____, which is a listing of activities that change the contents of the database.

    a. listing wizard
    b. utility
    c. watchdog
    d. log
    17 out of 20

    17. A _____ is a field that uniquely identifies each record in a file.

    a. primary key
    b. data key
    c. field marker
    d. record terminator
    18 out of 20

    18. A(n) _____ is a group of related fields.

    a. associate
    b. key
    c. field
    d. record
    19 out of 20

    19. The _____ defines the maximum number of characters a field can contain.

    a. field size
    b. record size
    c. record limit
    d. data type
    20 out of 20

    20. A _____ check determines whether a number is within a specified set of limits.

    a. numeric
    b. digit
    c. range
    d. completeness
    ---------------------------------------




    1. A _____ is an assault whose purpose is to disrupt computer access to an Internet service.

    a. cyberlock
    b. DoS attack
    c. firewall
    d. Trojan horse
    2 out of 20

    2. A _____ is a notice that guarantees a user or a Web site is legitimate.

    a. PGP
    b. secure site
    c. certificate authority
    d. digital certificate
    3 out of 20

    3. _____ involves reducing the electricity and environmental waste while using a computer.

    a. Ergonomics
    b. Adware
    c. Green computing
    d. Energy Star
    4 out of 20

    4. _____ is an unsolicited e-mail message or newsgroup posting.

    a. A cookie
    b. Spam
    c. Adware
    d. Phish
    5 out of 20

    5. A _____ uses special electrical components to provide a stable current flow to the computer.

    a. surge protector
    b. power strip
    c. power source
    d. PGP
    6 out of 20

    6. A(n) _____ is a unique combination of characters, that identifies one specific user.

    a. password
    b. user name
    c. system identifier
    d. IP
    7 out of 20

    7. _____ is when individuals attempt to detect an unsecured wireless access point while driving a vehicle through areas they suspect have a wireless network.

    a. Piracy
    b. Phishing
    c. Wi-Fi
    d. War driving
    8 out of 20

    8. _____ is the act of stealing computer equipment

    a. Hardware theft
    b. Cyberterrorism
    c. Hardware vandalism
    d. Piracy
    9 out of 20

    9. A _____ is someone who uses e-mail as a vehicle for extortion.

    a. cyberspam
    b. cyberspy
    c. cyberterrorist
    d. cyberextortionist
    10 out of 20

    10. The term _____ refers to online or Internet-based illegal acts.

    a. computer crime
    b. cyberterrorist
    c. cybercrime
    d. cyber security risk
    11 out of 20

    11. A computer _____ is a potentially damaging computer program that infects a computer negatively by altering the way the computer works.

    a. cookie
    b. virus
    c. hacker
    d. spyware
    12 out of 20

    12. A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.

    a. quarantine
    b. partition
    c. signature
    d. holding area
    13 out of 20

    13. Which of the following is not a category of a perpetrator of cybercrime?

    a. unethical employee
    b. hacker
    c. cybergeek
    d. script kiddie
    14 out of 20

    14. _____ is a technique intruders use to make their Internet transmission appear legitimate to a victim computer or network.

    a. DoS
    b. Bluetooth
    c. Back door
    d. Spoofing
    15 out of 20

    15. A computer _____ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

    a. security risk
    b. script
    c. cracker
    d. hacker
    16 out of 20

    16. You may have _____ if you have sore, tired, burning, itchy eyes; blurred vision; headache or sore neck.

    a. computer vision syndrome (CVS)
    b. repetitive strain injury (RSI)
    c. carpal tunnel syndrome (CTS)
    d. tired eye disease (TED)
    17 out of 20

    17. A _____ is an encrypted code that a person attaches to an electronic message to verify the identity of the message sender.

    a. certificate authority
    b. digital signature
    c. PGP
    d. DoS
    18 out of 20

    18. A program that displays an online advertisement in a banner or pop-up window on a Web page is called _____.

    a. adware
    b. spyware
    c. cookie
    d. bannerware
    19 out of 20

    19. A virus _____ is a known specific pattern of virus code.

    a. definition
    b. signature
    c. cookie
    d. platform
    20 out of 20

    20. Computer _____ are moral guidelines that govern the use of computers and information systems.

    a. ethics
    b. encryption
    c. firewalls
    d. privacy
    -----
     
  2. Xerobull

    Xerobull ...and I'm all out of bubblegum

    Joined:
    Jun 18, 2003
    Messages:
    37,105
    Likes Received:
    36,059
    I'm clueless on the first 20- that's database stuff, next on my to learn list.

    As for the second 20:

    1. B
    2. D
    3. C
    4. B
    5. A
    6. B
    7. D
    8. A
    9. D
    10. C
    11. B
    12. A
    13. C
    14. D
    15. A
    16. A
    17. A
    18. A
    19. A
    20. A

    I guessed on half of these. What certification is this from? It smacks of a Comptia cert. It seems like they make up their questions and definitions as they go half the time.
     
  3. AMS

    AMS Member

    Joined:
    Oct 8, 2003
    Messages:
    9,646
    Likes Received:
    218
    its some discovering computers thing

    i hate database crap as well...

    i got these 2 to do and 2 more and i think thas it... got done with erythign else 19/20 on each...
     
  4. Jeff

    Jeff Clutch Crew

    Joined:
    Feb 14, 1999
    Messages:
    22,412
    Likes Received:
    362
    I need my slide rule.
     
  5. vlaurelio

    vlaurelio Member

    Joined:
    Jan 26, 2005
    Messages:
    21,310
    Likes Received:
    11,755
    db questions

    1. A
    2. D
    3. A or maybe D
    4. C
    5. A
    6. C
    7. A
    8. DA
    9. C
    10. C
    11. A
    12. D or maybe A
    13. B
    14. D
    15. B
    16. D
    17. A
    18. D
    19. A
    20. C
     
  6. pradaxpimp

    pradaxpimp Member

    Joined:
    Aug 3, 2002
    Messages:
    5,025
    Likes Received:
    71
    dork.
     
  7. SwoLy-D

    SwoLy-D Member

    Joined:
    Jul 20, 2001
    Messages:
    37,618
    Likes Received:
    1,456

Share This Page