CSIT 1110 Test 2

Card Set Information

Author:
blade3612
ID:
48165
Filename:
CSIT 1110 Test 2
Updated:
2010-11-08 16:35:42
Tags:
Test 2
Folders:

Description:
Multiple choice answers for test 2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user blade3612 on FreezingBlue Flashcards. What would you like to do?


  1. HTML is?

    a) a language used to describe the layout of a web page.

    b) a full, general-purpose programming language.

    c) a compiled, third generation language.

    d) all of the above.
    a) a language used to describe the layout of a web page.
  2. TCP/IP is .

    a) a sophisticated browser that supports many different types of web pages.

    b) a protocol suite that supports routing/delivery of information between the nodes of network.

    c) the set of protocols that creates what we call "The Web"

    d) an older technology that ran on the original ARPANET network, but is no longer in use.
    b) a protocol suite that supports routing/delivery of information between the nodes of network.
  3. The Internet is composed of _____________.

    a) a series of tubes.

    b) Big trucks.

    c) a complex interconnected web of machines and software that is so technical there is no way to even begin to talk about it.

    d) clients and servers communicating by means of protocols.
    d) clients and servers communicating by means of protocols.
  4. _________________ "invented the Internet."

    a) Al Gore

    b) Ted Stevens

    c) Vinton Cerf and Robert Kahn

    d) Johnny Bench and Joe Morgan
    c) Vinton Cerf and Robert Kahn
  5. Web 2.0 refers to the emergence of web-based communities and hosted services. True or False?
    True
  6. The Internet is a series of tubes. True or False?
    False
  7. Generally, a WAN covers a larger geographic area that a LAN or PAN. True or False?
    True
  8. Network "topology" refers to the shape of a computer network. True or False?
    True
  9. The telegraph was the first means of telecommunication (communicating at a distance). True or False?
    False
  10. Databases are centralized repositories of information. True or False?
    True.
  11. Network protocols are?

    a) not used very much in the online environment created by Web 2.0.

    b) a visual language used to describe the topology of a network.

    c) sets of rules that govern communication.

    d) the numbers that indicate how important one network is relative to another.
    c) sets of rules that govern communication.
  12. Currently, the most popular form of DBMS is the hierarchial model. True or False?
    False.
  13. In a relational database, records are represented as columns. True or False?
    False.
  14. The program (or programmer) that creates a flat-file determines the format of the file. True or False?
    Truel.
  15. Relationships between tables are formed by duplicating data from one table in the other. True or False?
    True.
  16. A database management system provides:

    a) a central repository for data

    b) a means of performing common operations on data.

    c) a way to describe the format, meaning and relationships of data.

    d) all of the above.
    d) all of the above.
  17. Who invented the relational database model?

    a) Alan Turing

    b) Larry Page and Sergey Brin

    c) Edgar Codd

    d) Joe Namath
    c) Edgar Codd
  18. Which of the following is not an SQL DML statement?

    a) insert

    b) modify

    c) update

    d) delete
    b) modify
  19. The 4th Amendment to the constitution addresses " "

    a) unreasonable search and seizure

    b) the right to keep and bear arms

    c) the right to keep and arm bears

    d) freedom of speech
    a) unreasonable search and seizure
  20. The problem with flat-files is:

    a) the format of the file must be known in order for the file to be used.

    b) files with the same data may be in use throughout the organization.

    c) the data conatained in file may be out of date due to it being repeated in other files.

    d) all of the above.
    d) all of the above.
  21. The process of turning ideas into computer programs is called "software development."
    True.
  22. In the the software Development Process, the Implementation Phase is the time to start talking to customers about what they want the software to do.
    False.
  23. An algorithm is a step-by-step process of how to accomplish a task.
    True.
  24. A flowchart is a verbal description of an algorithm.
    False.
  25. Good analysts make lots of money.
    True.
  26. Programming requires:

    a) Telling the computer exactly what to do.

    b) Talking to the computer in a language it can understand.

    c) Telling the computer in an unambiguous way what is to be done.

    d) All of the above.
    d) all of the above.
  27. When should documentation be compiled during the Software Development Process?

    a) after the " Testing " phase.

    b) before the " User Acceptance " phase.

    c) During each phase.

    d) Actually, documentation is usually unnecassary unless the system is extremely complicated.
    c) during each phase.
  28. In object-oriented language:

    a) objects are composed of properties and methods.

    b) classes act as templates for object instances.

    c) classes can inherit properties and methods from other classes.

    d) all of the above.
    d) all of the above.
  29. What are the archetypal operations that all languages support in some way?

    a) alu, cpu, cu, cache

    b) sequence, conditions, repetition, functions

    c) printing, reading, adding, subtracting

    d) seeing, hearing, tasting, touching, smelling
    b) sequence, conditions, repetition, functions
  30. Which of the following does not have its own flowcharting symbol?

    a) Storage

    b) Decision

    c) Process

    d) Input
    a) Storage
  31. If something has software, it is likely possible that it can be hacked.
    True.
  32. The term " hacker " has always meant something derogatory.
    False.
  33. Most hacking requires great technical expertise, an example of which David Kernell's technically sophisticated attack on Vice Presidential candidate Sarah Palin's Yahoo e-mail account.
    False.
  34. The " Patriot Act " expanded the scope and penalties imposed by the 1986 " Computer Fraud and Abuse Act."
    True.
  35. When it comes to security, it is not all that important to limit physical access to a computer system, as long as you have a powerful enough firewall in place.
    False.
  36. A " " is malware that replicates itself in order to infect the system it is attacking. Once the system is infected, it can then infect other applications.

    a) virus

    b) worm

    c) Trojan horse

    d) logic bomb
    a) virus
  37. A program which looks like a game, but in fact contains malicious software which will become destructive on December 23, 2012 is an example of:

    a) a trojan horse

    b) a logic bomb

    c) a time bomb

    d) all of the above
    d) all of the above
  38. Social engineering refers to:

    a) trying to create a " Master Race. "

    b) genetic engineering in general.

    c) manipulating people so as to gain an advantage or compromising security.

    d) creating human viruses that modify human behavior in predictable and controllable ways.
    c) manipulating people so as to gain an advantage or compromising security.
  39. John Draper could make free phone calls by " ."

    a) using a toy whistle found in boxes of cereal.

    b) whistling into the phone lines, since he had perfect pitch.

    c) wrapping his head in aluminum foil and thinking about the person that he was trying to call.

    d) by stringing twine between himself and those he wished to call, then connecting the twine to a pair of tin cans.
    a) using a toy whistle found in boxes of cereal.
  40. Zombie computers are " ."

    a) computers that have destructive software on them such that they are 'dead' until a valid key is supplied, at which they 'come back from the dead.'

    b) computers that are operated by people who are among the undead.

    c) computers that cannot be disabled unless their cpu is removed or destroyed.

    d) computers that have been compromised and forced to run software that carries out attacks on other computers.
    d) computers that have been compromised and forced to run software that carries out attacks on other computers.

What would you like to do?

Home > Flashcards > Print Preview