1.
Which of the following is NOT related to
data security?
Correct Answer
E. Row-level locking
Explanation
Row-level locking is not related to data security because it is a mechanism used in database systems to manage concurrency control, ensuring that multiple users can access and modify different rows of data simultaneously without conflicts. While row-level locking helps maintain data integrity and consistency, it does not directly address the protection and security of data from unauthorized access, loss, or breaches. Data security measures typically involve encryption, access control, authentication, backup and recovery plans, and other safeguards to protect data from unauthorized access, manipulation, and loss.
2.
Which
of the following refers to software used to connect two otherwise separate
applications?
Correct Answer
D. Middleware
Explanation
Middleware refers to software used to connect two otherwise separate applications. It acts as a bridge between different software systems, allowing them to communicate and share data. Middleware can handle tasks such as data transformation, message routing, and protocol conversion, enabling seamless integration between applications. It simplifies the development process by providing a standardized interface for communication between different systems.
3.
A
request for information from a database.
Correct Answer
C. Query
Explanation
A query is a request for information from a database. It is used to retrieve specific data or perform actions on the database. In this context, a query is the most appropriate term to describe a request for information from a database. The other options (record, middleware, field, RDBMS) do not accurately describe a request for information from a database.
4.
A
type of database software.
Correct Answer
E. RDBMS
Explanation
RDBMS stands for Relational Database Management System, which is a type of database software. It is designed to manage and organize data in a relational database, where data is stored in tables and relationships between tables are established using primary and foreign keys. RDBMS allows users to store, retrieve, and manipulate data efficiently, and it provides features like data integrity, concurrency control, and transaction management. Examples of popular RDBMS software include MySQL, Oracle, and SQL Server.
5.
A
column in a database table.
Correct Answer
D. Field
Explanation
A field refers to a specific piece of information within a database table. It represents a single attribute or characteristic of the data being stored. Each record in the table will have a corresponding value for that field. For example, in a table of customer information, a field could represent the customer's name, address, or phone number. Fields are used to organize and categorize data within a database, allowing for efficient storage and retrieval of information.
6.
Hardware
theft includes the theft of portable computers as well as desktop computers.
Correct Answer
A. True
Explanation
Hardware theft refers to the act of stealing physical computer equipment. This can include both portable computers, such as laptops, as well as desktop computers. Therefore, the statement that hardware theft includes the theft of portable computers as well as desktop computers is true.
7.
A surge
suppressor can be used to protect a computer against theft.
Correct Answer
B. False
Explanation
A surge suppressor is a device used to protect electronic equipment, such as computers, from power surges or spikes. It does not provide any protection against theft.
8.
A
good disaster-recovery plan includes information about where backup media is
located.
Correct Answer
A. True
Explanation
A good disaster-recovery plan should include information about the location of backup media because in the event of a disaster or system failure, having access to the backup media is crucial for restoring data and getting systems back up and running. Knowing where the backup media is located ensures that it can be quickly accessed and used effectively during the recovery process. Without this information, the disaster-recovery plan may be incomplete and ineffective in mitigating the impact of a disaster or system failure.
9.
Only data fro
Only data from online
purchases end up in marketing databases.
Correct Answer
B. False
Explanation
The statement suggests that only data from online purchases is included in marketing databases, but the correct answer is false. This means that data from sources other than online purchases can also be included in marketing databases.
10.
An e-mail filter is used to keep track of
the e-mail addresses of people you write frequently.
Correct Answer
B. False
Explanation
An e-mail filter is not used to keep track of the e-mail addresses of people you write frequently. An e-mail filter is a tool or software that is used to sort and organize incoming emails based on certain criteria such as sender, subject, or keywords. It helps to manage and prioritize emails by automatically directing them to specific folders or marking them as spam. Keeping track of frequently contacted email addresses is typically done through the email client's address book or contact list feature.
11.
Which of the following allows your
computer to be used when the power goes out?
Correct Answer
A. UPS
Explanation
A UPS (Uninterruptible Power Supply) allows your computer to be used when the power goes out. It is a device that provides backup power to your computer, allowing it to stay on and continue running even during a power outage. This is achieved by using a battery that is charged when the power is on, and then automatically switches to the battery power when the main power source is lost. This ensures that your computer remains operational and prevents any data loss or damage that could occur due to sudden power interruptions.
12.
Having control over how information about
you is collected and used is referred to as
Correct Answer
E. Information privacy
Explanation
Information privacy refers to having control over how information about you is collected and used. It involves being able to determine what personal data is shared, with whom it is shared, and for what purposes. This concept ensures that individuals have the right to protect their personal information from being accessed or misused by others. It is essential for maintaining confidentiality and safeguarding one's privacy in the digital age.
13.
Used
to prevent spam.
Correct Answer
D. Throw-away e-mail address
Explanation
A throw-away e-mail address is used to prevent spam. It is a temporary or disposable email address that can be used for a short period of time and then discarded. This helps to protect the user's primary email address from receiving unwanted spam messages. By using a throw-away e-mail address, the user can sign up for online services, newsletters, or other websites without exposing their personal or permanent email address to potential spam or unwanted communications.
14.
Used
to restore data when the original data is lost or damaged.
Correct Answer
C. Backup
Explanation
A backup is a process of creating a duplicate copy of data to protect against loss or damage. In the given context, when the original data is lost or damaged, a backup can be used to restore the data. It serves as a safety net, ensuring that important information is not permanently lost and can be recovered when needed.
15.
The unauthorized copying of a computer
program.
Correct Answer
B. Software piracy
Explanation
Software piracy refers to the unauthorized copying of a computer program. This involves the illegal reproduction, distribution, or use of copyrighted software without the permission of the software's owner. It is considered a form of intellectual property infringement and is punishable by law. Software piracy not only deprives software developers of their rightful profits but also undermines the integrity and security of the software industry as a whole.
16.
To
protect a newly created logo, the company should apply for a patent.
Correct Answer
B. False
Explanation
A patent is not the correct form of protection for a logo. A logo can be protected through trademark registration, which gives the owner exclusive rights to use the logo in connection with their goods or services. A patent is used to protect inventions or new and useful processes, machines, or compositions of matter. Therefore, applying for a patent would not be the correct course of action to protect a newly created logo.
17.
Computer
hoaxes are commonly spread via e-mail.
Correct Answer
A. True
Explanation
Computer hoaxes are commonly spread via e-mail because it is an easy and efficient way for people to share information. E-mail allows hoaxes to be quickly forwarded to a large number of recipients, increasing the potential reach and impact of the hoax. Additionally, the impersonal nature of e-mail makes it easier for individuals to be deceived by false information, as they may not have the same level of skepticism as they would in a face-to-face interaction.
18.
Using
a computer to remove red eye from a photograph would be considered digital
manipulation.
Correct Answer
A. True
Explanation
Using a computer to remove red eye from a photograph involves digitally altering the image. Red eye occurs when the flash of a camera reflects off the subject's retina, resulting in a red or orange glow in their eyes. By using software or editing tools, the red eye effect can be eliminated, thus modifying the original image. This process is considered digital manipulation because it involves altering the photograph using technology.
19.
To be ergonomically correct, the top of a computer monitor should be
even with the user’s chin.
Correct Answer
B. False
Explanation
The top of a computer monitor should not be even with the user's chin to be ergonomically correct. Having the monitor at eye level is recommended to maintain proper posture and reduce strain on the neck and upper back. Placing the monitor too low can cause the user to tilt their head downwards, leading to discomfort and potential long-term health issues. Therefore, the correct answer is false.
20.
Products that are ENERGY STAR compliant
exceed the minimum federal standards for reduced energy consumption.
Correct Answer
A. True
Explanation
ENERGY STAR compliant products are those that meet or exceed the minimum federal standards for reduced energy consumption. This means that these products are designed to consume less energy compared to non-compliant products, resulting in reduced energy usage and lower electricity bills. Therefore, the statement that products that are ENERGY STAR compliant exceed the minimum federal standards for reduced energy consumption is true.
21.
A software program’s _________ indicates
what can legally be done with that program.
Correct Answer
E. Licensing agreement
Explanation
A licensing agreement is a legal contract that outlines the terms and conditions under which a software program can be used. It specifies the rights and restrictions of the user, including whether the program can be modified, copied, or distributed. Therefore, the licensing agreement indicates what can legally be done with the program.
22.
The
term _________ describes the gap between those with access to technology and
those without.
Correct Answer
A. Digital divide
Explanation
The term "digital divide" refers to the gap or disparity between individuals or communities who have access to and use technology, such as computers and the internet, and those who do not. This divide can be based on various factors, such as socioeconomic status, geographical location, age, or education level. The digital divide can have significant implications for individuals and communities in terms of access to information, opportunities for education and employment, and participation in the digital economy.
23.
A word, phrase, symbol, or
design that identifies a good or service and uses the symbol ®.
Correct Answer
D. Trademark
Explanation
A trademark is a word, phrase, symbol, or design that identifies a good or service and uses the symbol ®. It distinguishes the goods or services of one company from those of others, providing brand recognition and protection against unauthorized use by competitors. Trademarks are registered with the appropriate government agency to establish legal ownership and exclusive rights to use the mark in commerce.
24.
What
is used to protect an invention.
Correct Answer
A. Patent
Explanation
A patent is used to protect an invention. It grants exclusive rights to the inventor, preventing others from making, using, or selling the invention without permission. This legal protection encourages innovation by providing inventors with the opportunity to profit from their creations. A patent can be obtained for new and useful processes, machines, manufactured products, or compositions of matter. It is a valuable asset that allows inventors to safeguard their intellectual property and prevent others from copying or stealing their ideas.
25.
What
is used by computer users who wish to utilize conventional hardware with their
notebook computers.
Correct Answer
B. Docking station
Explanation
A docking station is a device used by computer users who want to use traditional hardware with their notebook computers. It allows users to connect their laptops to additional peripherals such as monitors, keyboards, and mice, essentially transforming the notebook into a desktop computer setup. This enables users to have a more comfortable and efficient working experience by utilizing the convenience of conventional hardware while still having the portability of a notebook computer.