Revision Chapter 3, 4 Mock Test.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Chapter 13 (Web): Distributed Databases
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
--What is a Database--1 What is a database What is a Database.
Overview of Databases and Transaction Processing Chapter 1.
Databases Chapter Distinguish between the physical and logical view of data Describe how data is organized: characters, fields, records, tables,
IT ARCHITECTURE © Holmes Miller BUILDING METAPHOR 3CUSTOMER’S CONCERN Has vision about building that will meet needs and desires 3ARCHITECT’S CONCERN.
Database Software File Management Systems Database Management Systems.
12 CHAPTER DATABASES Databases are the key to accessing information throughout our lives. Used in hospitals, grocery stores, schools, department stores,
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
Fundamentals, Design, and Implementation, 9/e Chapter 7 Using SQL in Applications.
Chapter 14 The Second Component: The Database.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS CHAPTER 3
Introduction to Database Management
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Attribute databases. GIS Definition Diagram Output Query Results.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Overview of Database Languages and Architectures.
Lecture-8/ T. Nouf Almujally
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Linux Operations and Administration
Chapter 11 Databases.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Section 3.1 Describe Internet hardware and software Explain Internet protocols Compare intranets, extranets, and the Internet Section 3.2 Identify URL.
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
Simple Database.
CORE 2: Information systems and Databases CENTRALISED AND DISTRIBUTED DATABASES.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
2. Database System Concepts and Architecture
Monitoring the Rate of Return on Investment in Internet Applications Presented by Allen Monroe International Quality and Productivity Center San Francisco,
Universiti Utara Malaysia Chapter 3 Introduction to ASP.NET 3.5.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Jeopardy K201 – The Computer In Business Exam Review 2 Manjit Trehan.
MIS DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA MARTS CHAPTER 3
Informational Objects TypeExamples 1. Structured Items Vouchers, Travel Orders, Invoices, Purchase Orders 2. Semi-Structured Items Letters, Memoranda,
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Chapter 4 Database Processing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 4-1.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Databases: An Overview Chapter 7, Exploring the Digital Domain.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
Construction Planning and Prerequisite
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
SQL Jan 20,2014. DBMS Stores data as records, tables etc. Accepts data and stores that data for later use Uses query languages for searching, sorting,
Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.
3/6: Data Management, pt. 2 Refresh your memory Relational Data Model
Computer Security By Duncan Hall.
Chapter 3: Relational Databases
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ADVANCED SQL.  The SQL ORDER BY Keyword  The ORDER BY keyword is used to sort the result-set by one or more columns.  The ORDER BY keyword sorts the.
Chapter 16 – Careers in Information Technology
Database System Concepts and Architecture
Special Topics in CCIT: Databases
Chapter 4 Relational Databases
TYPES OF SERVER. TYPES OF SERVER What is a server.
Protect Your Computer Against Harmful Attacks!
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Handling Data Using Databases
MANAGING DATA RESOURCES
Database.
MANAGING DATA RESOURCES
Chapter 7 Using SQL in Applications
DATABASES WHAT IS A DATABASE?
The ultimate in data organization
Presentation transcript:

Revision Chapter 3, 4 Mock Test

Q1 CounterSpy is a program that protects against ____. A. phishing C. spoofing B. sniffing D. spyware

Q2 ____ is capturing and recording network traffic. A. Phishing C. Spoofing B. Sniffing D. Spyware

Q3 Hackers often use phishing to ____ information. A. delete C. intercept B. modify D. extort

Q4 ____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. A. Spam C. Identity theft B. Denial-of-service D. Virus hoax

Q5 The most common way to index and link databases is using ____. A. names C. Social Security numbers B. Addresses D. driver’s license numbers

Q6 A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance. A. acceptable use policy C. keylogger B. spam filter D. log file

Q7 ____ are generated by Web server software, record a user’s actions on a Web site. A. Viruses C. Logins B. Spam D. Log files

Q8 You make two copies of a software package you just bought and sell one to a friend. This action is ____. A. illegal and unethical C. legal but ethical B. legal but unethical D. legal and ethical

Q9 With ____, you request data from a database by constructing a statement made up of query forms. A. the database engine B. query by example C. select D. structured query language

Q10 The ____ operator searches for records that don’t meet the condition. A. NOT C. OR B. AND D. MIS

Q11 Distributing data among multiple sites minimizes the effects of computer ____. A. encapsulation C. fragmentation B. replication D. failures

Q12 Accessing one central database server could increase ____ for remote users. A. error rates C. productivity B. communication costs D. processing speed

Q13 The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations. A. data-driven C. fragmentation B. allocation D. replication

Q14 A(n) ____ database has the ability to represent more complex data relationships than a relational database. A. data-driven C. client/server B. object-oriented D. distributed

Q15 Grouping objects along with their attributes and methods into a class is called ____. A. replication C. encapsulation B. Inheritance D. distributed processing

Q16 Consider the following process ‘Compute’: It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and nettPay

Q16 (cont.) The process description is: IF grossPay > 5000 THEN overTimePay = 100 ELSE overTimePay = 0 ENDIF

Q16 (cont.) Which statement is TRUE? A. The above is a process with unnecessary data input B. A process with an impossible output C. The above is NOT a process D. The above is not complete, storage is absent E. None of the above

Q17

Q17 (cont.) A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts B. The productivity per day must keep the output % within the range of 1% of the defective parts C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above