Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

computer science test due tomorrow need A

Question 1
  1.  In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext.Answer plaintext encryption key firewall digital signature

    1 points  

    Question 2
    1.  A typical enterprise consists of hundreds of individual operating entities called ____.Answer managers enterprise models functional units expert systems

      1 points  

      Question 3
      1.  ____ conversion consists of running the old system alongside the new system for a specified time.Answer Direct Pilot Parallel Phased

        1 points  

        Question 4
        1.  Which method of encryption inserts characters between existing characters?Answer transposition substitution expansion compaction

          1 points  

          Question 5
          1.  A developer of a relational database refers to a file as a(n) ____.Answer tuple table attribute relation

            1 points  

            Question 6
            1.  A(n) ____ is an item that contains data, as well as the actions that read or process the data.Answer unit object index key

              1 points  

              Question 7
              1.  Benchmark tests measure the performance of hardware; they are not used for evaluating software.Answer

                True

                False

                1 points  

                Question 8
                1.  A developer of a relational database refers to a record as a(n) ____.Answer tuple table attribute unit

                  1 points  

                  Question 9
                  1.  A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.Answer analog form report backup

                    1 points  

                    Question 10
                    1.  When a program flags a deleted record, ____.Answer the record is removed physically from the disk the record remains on disk logically so it can be processed the program places an asterisk or some other character at the beginning of the record to flag it all of the above

                      1 points  

                      Question 11
                      1.  The field size defines the minimum number of characters a field can contain.Answer

                        True

                        False

                        1 points  

                        Question 12
                        1.  A RAID server often is called a storage appliance because it is a piece of equipment with only one function to provide additional storage.Answer

                          True

                          False

                          1 points  

                          Question 13
                          1.  In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.Answer Javascript macro antivirus definitions antispyware definitions

                            1 points  

                            Question 14
                            1.  A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network.Answer denial of service (DoS) attack Trojan horse virus worm

                              1 points  

                              Question 15
                              1.  A user of a relational database refers to a file as a(n) ____.Answer unit attribute table tuple

                                1 points  

                                Question 16
                                1.  As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.Answer DoS social engineering DRM scamming

                                  1 points  

                                  Question 17
                                  1.  The first step in acquiring necessary hardware and software is to ____.Answer identify technical specifications solicit vendor proposals test and evaluate vendor proposals summarize the requirements for potential vendors

                                    1 points  

                                    Question 18
                                    1.  A data ____ contains data about each file in the database and each field within those files.Answer log warehouse model dictionary

                                      1 points  

                                      Question 19
                                      1.  The main disadvantage of compiled programs is that they do not run as fast as interpreted programs.Answer

                                        True

                                        False

                                        1 points  

                                        Question 20
                                        1.  A major benefit of OOP is the ability to ____.Answer write code that executes very fast reuse and modify existing objects write code that uses very little memory write system software

                                          1 points  

                                          Question 21
                                          1.  ____ information has an age suited to its use.Answer Organized Accessible Useful Timely

                                            1 points  

                                            Question 22
                                            1.  More complex DBMSs maintain a(n) ____, which is a listing of activities that change the contents of the database.Answer report index glossary log

                                              1 points  

                                              Question 23
                                              1.  Spam is a program placed on a computer without the user s knowledge that secretly collects information about the user.Answer

                                                True

                                                False

                                                1 points  

                                                Question 24
                                                1.  All of the following are common ways computers become infected with malware, except ____.Answer opening infected files running an infected program booting the computer with infected removable media inserted in a drive or plugged in a port installing a software package from a CD

                                                  1 points  

                                                  Question 25
                                                  1.  A user of a relational database refers to a record as a column.Answer

                                                    True

                                                    False

                                                    1 points  

                                                    Question 26
                                                    1.  Hardware thieves often target notebook computers of company executives.Answer

                                                      True

                                                      False

                                                      1 points  

                                                      Question 27
                                                      1.  In the ASCII and EBCDIC coding schemes, each byte represents a single ____.Answer float integer bit character

                                                        1 points  

                                                        Question 28
                                                        1.  File maintenance procedures include ____.Answer adding records to a file deleting records from a file changing records in a file all of the above

                                                          1 points  

                                                          Question 29
                                                          1.  If an antivirus program cannot remove an infection, it often ____.Answer quarantines the infected file reports the user computer disables the drive the file is on removes the user from its registry

                                                            1 points  

                                                            Question 30
                                                            1.  Which of the following data types stores lengthy text entries?Answer Text Memo Hyperlink Object

                                                              1 points  

                                                              Question 31
                                                              1.  A unit test verifies that each individual program or object works by itself.Answer

                                                                True

                                                                False

                                                                1 points  

                                                                Question 32
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question