This question is to help test your knownledge on content from Chapter 6 System Analysis to Chapter 14 Future of Computing in the textbook: Fundamental to Computing Third Edition by Kendell/Hunt.
List
Data flow diagram
Topology
Schema
Rate this question:
Computer virus
Trojan horse
Worm
All of the above
Rate this question:
Quarantine
Firewall
Payload
Honeypot
Rate this question:
Changing an integer field to a 0 decimal.
All records in which the valure in the score field is above 75.
Linking the Employee and Department tables.
All of the above are examples of query criteria.
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Optical computers
Nanocomputers
Quantum computers
Molecular computers
Rate this question:
Hub hopping
Reintermediation
E-fallout
Disintermediation
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
File management system.
Database management system.
Expert system.
Neural network.
Rate this question:
Hacking
Salami shaving
Spoofing
Software piracy
Rate this question:
True
False
Rate this question:
Data checking
Data mining
Data sorting
Data serving
Rate this question:
Macros
Cookies
Logs
Spikes
Rate this question:
Electronic Communications Privacy Act (ECPA)
Fair Credit Reporting Act
Computer Fraud and Abuse Act
Computer Matching and Priavcy Proctection Act
Rate this question:
Decision
Action to be taken
Beginging or end of a module
Input and output of data
Meeting point for several paths
Rate this question:
Normalization
Cardinality
Batching
Warehousing
Rate this question:
Increase the speed with which workers can enter data.
Encrypt data as as it is sent from the keyboard to the CPU.
Reduce the occurrence of carpal tunnel syndrome.
Enter data in the languages that do not use the Roman alphabet.
Rate this question:
Nanotechnology
Recycling
Disaster recovery
Green computing
Rate this question:
SQL
ERC
ERD
DBS
Rate this question:
True
False
Rate this question:
Prepare a system requirements document.
Create a disaster-recovery plan.
Encrypt all transmitted data.
Require passwords for all employees.
Rate this question:
Firewall
Digital signature
Antivirus program
Encryprion
Rate this question:
Speed up
Slow down
Have no effect no
None of the above
Rate this question:
True
False
Rate this question:
Run-time
Syntax
Logic
Beta
Rate this question:
Transtional
Deprecated
Well formed
Formatted
Rate this question:
Transtional
Deprecated
Well formed
Formatted
Rate this question:
Projected
Divided
Closed
Joined
Rate this question:
Quick response to requests for information
Increased data redundance
Lower software cost
All of the above are DBMS advantages.
Rate this question:
Magnifiers
Screen reader software
Braille keyboard
All of the above
Rate this question:
True
False
Rate this question:
Short selling
Pharming
Back end
Shopping
Rate this question:
Word Processing
Spreadsheet
Database
Presentation
Rate this question:
Data flow
Entity-relationship
Flowcart
Process
Rate this question:
Wasted space
Slower processing
Data inconsistency
Data entry errors
Rate this question:
Natural, systematic
Foreign, systematic
Natural, primary
Foreign, primary
Rate this question:
True
False
Rate this question:
Buying green
Save trees
Saving energy
All of the above
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Dictionary attack
Password guessing attack
Brute force attack
None of the above
Rate this question:
Dollar sign with a line through it
Logo of the Trust-E organization
Digital wallet
Image of a lock padlock
Rate this question:
Tr
Th
R
Td
Rate this question:
Quiz Review Timeline (Updated): Jul 2, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.