computer science test due tomorrow need A
Question 1 In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext.Answer plaintext encryption key firewall digital signature1 points Question 2 A typical enterprise consists of hundreds of individual operating entities called ____.Answer managers enterprise models functional units expert systems1 points Question 3 ____ conversion consists of running the old system alongside the new system for a specified time.Answer Direct Pilot Parallel Phased1 points Question 4 Which method of encryption inserts characters between existing characters?Answer transposition substitution expansion compaction1 points Question 5 A developer of a relational database refers to a file as a(n) ____.Answer tuple table attribute relation1 points Question 6 A(n) ____ is an item that contains data, as well as the actions that read or process the data.Answer unit object index key1 points Question 7 Benchmark tests measure the performance of hardware; they are not used for evaluating software.AnswerTrueFalse1 points Question 8 A developer of a relational database refers to a record as a(n) ____.Answer tuple table attribute unit1 points Question 9 A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.Answer analog form report backup1 points Question 10 When a program flags a deleted record, ____.Answer the record is removed physically from the disk the record remains on disk logically so it can be processed the program places an asterisk or some other character at the beginning of the record to flag it all of the above1 points Question 11 The field size defines the minimum number of characters a field can contain.AnswerTrueFalse1 points Question 12 A RAID server often is called a storage appliance because it is a piece of equipment with only one function to provide additional storage.AnswerTrueFalse1 points Question 13 In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.Answer Javascript macro antivirus definitions antispyware definitions1 points Question 14 A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network.Answer denial of service (DoS) attack Trojan horse virus worm1 points Question 15 A user of a relational database refers to a file as a(n) ____.Answer unit attribute table tuple1 points Question 16 As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.Answer DoS social engineering DRM scamming1 points Question 17 The first step in acquiring necessary hardware and software is to ____.Answer identify technical specifications solicit vendor proposals test and evaluate vendor proposals summarize the requirements for potential vendors1 points Question 18 A data ____ contains data about each file in the database and each field within those files.Answer log warehouse model dictionary1 points Question 19 The main disadvantage of compiled programs is that they do not run as fast as interpreted programs.AnswerTrueFalse1 points Question 20 A major benefit of OOP is the ability to ____.Answer write code that executes very fast reuse and modify existing objects write code that uses very little memory write system software1 points Question 21 ____ information has an age suited to its use.Answer Organized Accessible Useful Timely1 points Question 22 More complex DBMSs maintain a(n) ____, which is a listing of activities that change the contents of the database.Answer report index glossary log1 points Question 23 Spam is a program placed on a computer without the user s knowledge that secretly collects information about the user.AnswerTrueFalse1 points Question 24 All of the following are common ways computers become infected with malware, except ____.Answer opening infected files running an infected program booting the computer with infected removable media inserted in a drive or plugged in a port installing a software package from a CD1 points Question 25 A user of a relational database refers to a record as a column.AnswerTrueFalse1 points Question 26 Hardware thieves often target notebook computers of company executives.AnswerTrueFalse1 points Question 27 In the ASCII and EBCDIC coding schemes, each byte represents a single ____.Answer float integer bit character1 points Question 28 File maintenance procedures include ____.Answer adding records to a file deleting records from a file changing records in a file all of the above1 points Question 29 If an antivirus program cannot remove an infection, it often ____.Answer quarantines the infected file reports the user computer disables the drive the file is on removes the user from its registry1 points Question 30 Which of the following data types stores lengthy text entries?Answer Text Memo Hyperlink Object1 points Question 31 A unit test verifies that each individual program or object works by itself.AnswerTrueFalse1 points Question 32