Revision Chapter 3, 4 Mock Test Q1 CounterSpy is a program that protects against ____. A. B. phishing sniffing C. D. spoofing spyware 2 Q2 ____ is capturing and recording network traffic. A. B. Phishing Sniffing C. D. Spoofing Spyware 3 Q3 Hackers often use phishing to ____ information. A. delete C. intercept B. modify D. extort 4 Q4 ____ attacks inundate a Web site or network with e-mails and other network traffic so that it becomes overloaded and can’t handle legitimate traffic. A. Spam C. Identity theft B. Denial-of-service D. Virus hoax 5 Q5 The most common way to index and link databases is using ____. A. names C. Social Security numbers B. Addresses D. driver’s license numbers 6 Q6 A(n) ____ is a set of rules specifying legal and ethical use of a system and activities and the consequences of noncompliance. A. B. acceptable use policy C. keylogger spam filter D. log file 7 Q7 ____ are generated by Web server software, record a user’s actions on a Web site. A. B. Viruses Spam C. D. Logins Log files 8 Q8 You make two copies of a software package you just bought and sell one to a friend. This action is ____. A. illegal and unethical C. B. legal but unethical D. legal but ethical legal and ethical 9 Q9 With ____, you request data from a database by constructing a statement made up of query forms. A. B. C. D. the database engine query by example select structured query language 10 Q10 The ____ operator searches for records that don’t meet the condition. A. B. NOT AND C. D. OR MIS 11 Q11 Distributing data among multiple sites minimizes the effects of computer ____. A. encapsulation C. fragmentation B. replication D. failures 12 Q12 Accessing one central database server could increase ____ for remote users. A. error rates C. productivity B. communication costs D. processing speed 13 Q13 The ____ approach to setting up a distributed database addresses how tables are divided among multiple locations. A. data-driven C. fragmentation B. allocation D. replication 14 Q14 A(n) ____ database has the ability to represent more complex data relationships than a relational database. A. data-driven C. client/server B. object-oriented D. distributed 15 Q15 Grouping objects along with their attributes and methods into a class is called ____. A. replication C. encapsulation B. Inheritance D. distributed processing 16 Q16 Consider the following process ‘Compute’: It has INPUT: grossPay data Have OUTPUTS: grossPay, overTimePay and nettPay 17 Q16 (cont.) The process description is: IF grossPay > 5000 THEN overTimePay = 100 ELSE overTimePay = 0 ENDIF 18 Q16 (cont.) Which statement is TRUE? A. The above is a process with unnecessary data input B. A process with an impossible output C. The above is NOT a process D. The above is not complete, storage is absent E. None of the above 19 Q17 20 Q17 (cont.) A. The system performance standard for a manufacturing process is to provide no more than 1% defective parts B. The productivity per day must keep the output % within the range of 1% of the defective parts C. The return on investment (ROI) of the defective parts per day produce must be below 1% D. None of the above 21 22