Quiz On Data Processing

42 Questions | Attempts: 968
Share

SettingsSettingsSettings
Quiz On Data Processing - Quiz

This is an online quiz on data processing and is designed. Data is a vital and very important part of today's world, and just like that, data processing has become a major concern. The quiz here has several questions on data processing and its various aspects. You will not only get an opportunity to test your knowledge as well as expand it. All the best to you with this quiz.


Questions and Answers
  • 1. 
    The compilation of data that is arranged for better and faster retrieval and is accessed via computers is known as
    • A. 

      browsing

    • B. 

      Internet

    • C. 

      Database

    • D. 

      Online database

  • 2. 
    ____________ allows or disallows user actions on the database and objects within it
    • A. 

      Database

    • B. 

      Internet

    • C. 

      Database security

    • D. 

      Internet security

  • 3. 
    There are three generally accepted categories of secrecy-related problems in data base systems include all except
    • A. 

      The improper release of information from reading data that was intentionally or accidentally accessed by unauthorized users

    • B. 

      The improper modification of data

    • C. 

      Accepting and initiating unwanted popups.

    • D. 

      Denial-of-service threats

  • 4. 
    Security risks to database systems include all except
    • A. 

      Unintended activity or misuse by authorized database users

    • B. 

      Modification of database data by the administrator

    • C. 

      Physical damage to database servers caused by computer room fires or floods

    • D. 

      Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data

  • 5. 
    One reason why people ignore index is because
    • A. 

      They may make your queries slower instead of faster

    • B. 

      Users have the opportunity to optimize searching against even large amounts of text located in any field indexed as such

    • C. 

      They make search queries much faster

    • D. 

      Help to avoid duplicate row data

  • 6. 
    One importance of database security is
    • A. 

      Confidential misconduct

    • B. 

      Ensure the data confidentiality

    • C. 

      Preventing authorized user

    • D. 

      Prevent authorized data modification

  • 7. 
    The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance and to
    • A. 

      Prevent authorized users from accessing files

    • B. 

      Blog spammers

    • C. 

      Close the redo thread that was left open

    • D. 

      Control which data is uploaded and downloaded

  • 8. 
    One of these is not a key issue in the security of database
    • A. 

      Importance

    • B. 

      Privacy

    • C. 

      Availability

    • D. 

      Disclosure

  • 9. 
    The database security issued that is concerned with improper denial of access to information is known as
    • A. 

      Disclosure

    • B. 

      Privacy

    • C. 

      Availability

    • D. 

      Secrecy

  • 10. 
    Encryption is useful especially to
    • A. 

      Block unwanted user from browsing the internet

    • B. 

      Control which user is accessing the internet

    • C. 

      Give access only to people known by an admin

    • D. 

      Pass a secret message from one place to another without anyone else being able to read it

  • 11. 
    One of the following indexes does not exist 
    • A. 

      Book

    • B. 

      Indexes

    • C. 

      Human

    • D. 

      Citation

  • 12. 
    One problem of encryption is that it is 
    • A. 

      Easy to install

    • B. 

      Slower than normal browsing

    • C. 

      The highest security feature to use

    • D. 

      Available to everyone

  • 13. 
    One characteristic of Crash and instance recovery is that they 
    • A. 

      Redo the changes using the current online data files

    • B. 

      Use instance control

    • C. 

      Process information in orderly manner

    • D. 

      Check when a photo is uploaded

  • 14. 
    The term “virus” is a general term that actually applies to three different kinds of malicious programs listed below except 
    • A. 

      Zombies

    • B. 

      Hackers

    • C. 

      Trojan Horse

    • D. 

      Worms

  • 15. 
    A __________ is a program that is designed to replicate and spread throughout a computer system 
    • A. 

      Worm

    • B. 

      Trojam Horse

    • C. 

      Zombies

    • D. 

      Hackers

  • 16. 
    Which of these options is not amongst the characteristics of index
    • A. 

      Identify documentary units that treat particular topics or possess particular features

    • B. 

      Restrict access to topics or features using the terminology of prospective users

    • C. 

      Provide access through synonymous and equivalent terms

    • D. 

      Use terminology that is as specific as documentary units warrant and the indexing language permits

  • 17. 
    Indexes in database is necessary since it 
    • A. 

      it makes search queries much faster

    • B. 

      Duplicates row data

    • C. 

      reduce searching against even large amounts of text located in any field indexed as such

    • D. 

      Restrict users with an effective and systematic means for locating documentary that are relevant to information needs or requests

  • 18. 
    The database that can do multiple tasks in parallel allowing the database to make use of multiple CPU cores and multiple disks that are standard for modern database servers is
    • A. 

      Parallel database

    • B. 

      Distributed database

    • C. 

      Instance recovery

    • D. 

      Crash recovery

  • 19. 
    A suite of tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behaviour, with minimal impact on user operations and productivity is known as
    • A. 

      Database

    • B. 

      DBAMS

    • C. 

      Database Activity Maintenance

    • D. 

      Database Activity Monitoring

  • 20. 
    Normal index is also known 
    • A. 

      Unique index

    • B. 

      Primary key index

    • C. 

      Ordinary index

    • D. 

      Normal index also known

  • 21. 
    People prefer peer-to-peer network to client-server because of it
    • A. 

      Is easy to set up

    • B. 

      Is less expensive to install

    • C. 

      Does require a server

    • D. 

      Demands a moderate level of skill to administer the network

  • 22. 
    Some common features of Trojan horse programs include 
    • A. 

      Causing payment triggers

    • B. 

      Helping users to login easily

    • C. 

      Withdrawing money from ATM

    • D. 

      Creating a website

  • 23. 
    One advantage of distributed database is that it (a)  (b) (c)
    • A. 

      Reflects organizational structure.

    • B. 

      Manages other recovery

    • C. 

      distributes other recovery reduce reliability and availability

    • D. 

      None of the above

  • 24. 
    A ________________ is a single logical database that is spread physically across computers in multiple locations that are connected by a data communications network
    • A. 

      Incomplete database

    • B. 

      Distributed database.

    • C. 

      Parallel database

    • D. 

      Complete database

  • 25. 
    The type of network where all computers have the same status is known as
    • A. 

      status network

    • B. 

      Client

    • C. 

      Server

    • D. 

      Peer-to-peer

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.