Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
computer science test due tomorrow need A
- In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext.Answer plaintext encryption key firewall digital signature
1 points
Question 2- A typical enterprise consists of hundreds of individual operating entities called ____.Answer managers enterprise models functional units expert systems
1 points
Question 3- ____ conversion consists of running the old system alongside the new system for a specified time.Answer Direct Pilot Parallel Phased
1 points
Question 4- Which method of encryption inserts characters between existing characters?Answer transposition substitution expansion compaction
1 points
Question 5- A developer of a relational database refers to a file as a(n) ____.Answer tuple table attribute relation
1 points
Question 6- A(n) ____ is an item that contains data, as well as the actions that read or process the data.Answer unit object index key
1 points
Question 7- Benchmark tests measure the performance of hardware; they are not used for evaluating software.Answer
True
False
1 points
Question 8- A developer of a relational database refers to a record as a(n) ____.Answer tuple table attribute unit
1 points
Question 9- A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.Answer analog form report backup
1 points
Question 10- When a program flags a deleted record, ____.Answer the record is removed physically from the disk the record remains on disk logically so it can be processed the program places an asterisk or some other character at the beginning of the record to flag it all of the above
1 points
Question 11- The field size defines the minimum number of characters a field can contain.Answer
True
False
1 points
Question 12- A RAID server often is called a storage appliance because it is a piece of equipment with only one function to provide additional storage.Answer
True
False
1 points
Question 13- In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.Answer Javascript macro antivirus definitions antispyware definitions
1 points
Question 14- A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network.Answer denial of service (DoS) attack Trojan horse virus worm
1 points
Question 15- A user of a relational database refers to a file as a(n) ____.Answer unit attribute table tuple
1 points
Question 16- As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.Answer DoS social engineering DRM scamming
1 points
Question 17- The first step in acquiring necessary hardware and software is to ____.Answer identify technical specifications solicit vendor proposals test and evaluate vendor proposals summarize the requirements for potential vendors
1 points
Question 18- A data ____ contains data about each file in the database and each field within those files.Answer log warehouse model dictionary
1 points
Question 19- The main disadvantage of compiled programs is that they do not run as fast as interpreted programs.Answer
True
False
1 points
Question 20- A major benefit of OOP is the ability to ____.Answer write code that executes very fast reuse and modify existing objects write code that uses very little memory write system software
1 points
Question 21- ____ information has an age suited to its use.Answer Organized Accessible Useful Timely
1 points
Question 22- More complex DBMSs maintain a(n) ____, which is a listing of activities that change the contents of the database.Answer report index glossary log
1 points
Question 23- Spam is a program placed on a computer without the user s knowledge that secretly collects information about the user.Answer
True
False
1 points
Question 24- All of the following are common ways computers become infected with malware, except ____.Answer opening infected files running an infected program booting the computer with infected removable media inserted in a drive or plugged in a port installing a software package from a CD
1 points
Question 25- A user of a relational database refers to a record as a column.Answer
True
False
1 points
Question 26- Hardware thieves often target notebook computers of company executives.Answer
True
False
1 points
Question 27- In the ASCII and EBCDIC coding schemes, each byte represents a single ____.Answer float integer bit character
1 points
Question 28- File maintenance procedures include ____.Answer adding records to a file deleting records from a file changing records in a file all of the above
1 points
Question 29- If an antivirus program cannot remove an infection, it often ____.Answer quarantines the infected file reports the user computer disables the drive the file is on removes the user from its registry
1 points
Question 30- Which of the following data types stores lengthy text entries?Answer Text Memo Hyperlink Object
1 points
Question 31- A unit test verifies that each individual program or object works by itself.Answer
True
False
1 points
Question 32
- A unit test verifies that each individual program or object works by itself.Answer
- Which of the following data types stores lengthy text entries?Answer Text Memo Hyperlink Object
- If an antivirus program cannot remove an infection, it often ____.Answer quarantines the infected file reports the user computer disables the drive the file is on removes the user from its registry
- File maintenance procedures include ____.Answer adding records to a file deleting records from a file changing records in a file all of the above
- In the ASCII and EBCDIC coding schemes, each byte represents a single ____.Answer float integer bit character
- Hardware thieves often target notebook computers of company executives.Answer
- A user of a relational database refers to a record as a column.Answer
- All of the following are common ways computers become infected with malware, except ____.Answer opening infected files running an infected program booting the computer with infected removable media inserted in a drive or plugged in a port installing a software package from a CD
- Spam is a program placed on a computer without the user s knowledge that secretly collects information about the user.Answer
- More complex DBMSs maintain a(n) ____, which is a listing of activities that change the contents of the database.Answer report index glossary log
- ____ information has an age suited to its use.Answer Organized Accessible Useful Timely
- A major benefit of OOP is the ability to ____.Answer write code that executes very fast reuse and modify existing objects write code that uses very little memory write system software
- The main disadvantage of compiled programs is that they do not run as fast as interpreted programs.Answer
- A data ____ contains data about each file in the database and each field within those files.Answer log warehouse model dictionary
- The first step in acquiring necessary hardware and software is to ____.Answer identify technical specifications solicit vendor proposals test and evaluate vendor proposals summarize the requirements for potential vendors
- As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.Answer DoS social engineering DRM scamming
- A user of a relational database refers to a file as a(n) ____.Answer unit attribute table tuple
- A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network.Answer denial of service (DoS) attack Trojan horse virus worm
- In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.Answer Javascript macro antivirus definitions antispyware definitions
- A RAID server often is called a storage appliance because it is a piece of equipment with only one function to provide additional storage.Answer
- The field size defines the minimum number of characters a field can contain.Answer
- When a program flags a deleted record, ____.Answer the record is removed physically from the disk the record remains on disk logically so it can be processed the program places an asterisk or some other character at the beginning of the record to flag it all of the above
- A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.Answer analog form report backup
- A developer of a relational database refers to a record as a(n) ____.Answer tuple table attribute unit
- Benchmark tests measure the performance of hardware; they are not used for evaluating software.Answer
- A(n) ____ is an item that contains data, as well as the actions that read or process the data.Answer unit object index key
- A developer of a relational database refers to a file as a(n) ____.Answer tuple table attribute relation
- Which method of encryption inserts characters between existing characters?Answer transposition substitution expansion compaction
- ____ conversion consists of running the old system alongside the new system for a specified time.Answer Direct Pilot Parallel Phased
- A typical enterprise consists of hundreds of individual operating entities called ____.Answer managers enterprise models functional units expert systems