Download presentation
1
Revision Chapter 3, 4 Mock Test
2
Q1 CounterSpy is a program that protects against ____.
A. phishing C. spoofing B. sniffing D. spyware
3
Q2 ____ is capturing and recording network traffic.
A. Phishing C. Spoofing B. Sniffing D. Spyware
4
Q3 Hackers often use phishing to ____ information.
A. delete C. intercept B. modify D. extort
5
Q4 ____ attacks inundate a Web site or network with s and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. A. Spam C. Identity theft B. Denial-of-service D. Virus hoax
6
Q5 The most common way to index and link databases is using ____.
A. names C. Social Security numbers B. Addresses D. driver’s license numbers
7
Q6 A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance. A. acceptable use policy C. keylogger B. spam filter D. log file
8
Q7 ____ are generated by Web server software, record a user’s actions on a Web site. A. Viruses C. Logins B. Spam D. Log files
9
Q8 You make two copies of a software package you just bought and sell one to a friend. This action is ____. A. illegal and unethical C. legal but ethical B. legal but unethical D. legal and ethical
10
Q9 With ____, you request data from a database by constructing a statement made up of query forms. A. the database engine B. query by example C. select D. structured query language
11
Q10 The ____ operator searches for records that don’t meet the condition. A. NOT C. OR B. AND D. MIS
12
Q11 Distributing data among multiple sites minimizes the effects of computer ____. A. encapsulation C. fragmentation B. replication D. failures
13
Q12 Accessing one central database server could increase ____ for remote users. A. error rates C. productivity B. communication costs D. processing speed
14
Q13 The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations. A. data-driven C. fragmentation B. allocation D. replication
15
Q14 A(n) ____ database has the ability to represent more complex data relationships than a relational database. A. data-driven C. client/server B. object-oriented D. distributed
16
Q15 Grouping objects along with their attributes and methods into a class is called ____. A. replication C. encapsulation B. Inheritance D. distributed processing
17
Q16 Consider the following process ‘Compute’:
It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and nettPay
18
Q16 (cont.) The process description is:
IF grossPay > 5000 THEN overTimePay = 100 ELSE overTimePay = 0 ENDIF
19
Q16 (cont.) Which statement is TRUE?
A. The above is a process with unnecessary data input B. A process with an impossible output C. The above is NOT a process D. The above is not complete, storage is absent E. None of the above
20
Q17
21
Q17 (cont.) A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts B. The productivity per day must keep the output % within the range of 1% of the defective parts C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.