1/60
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
When simplifying the relationships on an ERD, what rule should be applied for 1:N relationships?
Primary key of the 1 side of the relationship should be added as a foreign key on the opposite side of the relationship.
If one doctor can be related to many patients, and one patient can be related to one doctor, what is the relationship that results?
1:N
Which of the following is the most accurate interpretation of a M:N relationship between Orders and Products?
-Many orders can be related to many products.
-A single order can be related to many products.
-A single product can be related to many orders.
-B and C
-None of the above.
-A single order can be related to many products.
-A single product can be related to many orders.
Database designers document the conceptual data model with:
an entity-relationship diagram
When simplifying the relationships on an ERD, what rule should be applied for 1:1 relationships?
Relationships should be merged into 1 table with one entity becoming an attribute of the other.
A characteristic or quality describing an entity is called a(n):
attribute.
What is a primary key of one table that appears in another table?
Foreign key
If many clients can be related to many salespeople, what is the relationship that results?
Not enough information to determine the relationship.
Who is the person responsible for the more technical and operational aspects of managing the information contained in organizational databases?
Database administrator
Who finds vulnerabilities in systems and often fixes the problems?
White-hat hackers
What is the weakest link in computer security?
People
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
Public key encryption
What says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
Fair Use Doctrine
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
Copyright
Which operating system is safe from attacks?
All operating systems are vulnerable to attack.
What looks for people on the network who shouldn't be there or who are acting suspiciously?
Intrusion-detection software
Decryption is the process of transforming _________ message back to _________ message.
ciphertext, plain text
All of the following are considered biometrics, except:
Password
biometrics
Fingerprint
Retina
Voice
Who would like to be hackers, but don't have much technical expertise?
Script kiddies
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?
Worm
What is hardware and/or software that protects computers from intruders?
Firewall
What is the unauthorized use, duplication, distribution or sale of copyrighted software?
Pirated software
Which of the following floods a Web site with so many requests for service from multiple computers that the Web site slows down or crashes?
Distributed denial-of-service attacks
Which of the following is a random, secret value placed with the encryption algorithim to encrypt or decrypt messages?
key
Which of the following can identify suspicious network traffic entering your network?
Intrusion Detection System
Why do computers need telecommunications protocols?
-Computers are "dumb" and don't know how to communicate
-Computers need to communicate using a common "language"
What technological advancement in fiber optic cabling allows for multiple colors of light to be sent on the same strand of fiber?
Dense Wavelength Division Multiplexing (DWDM)
Microwave signals
-follow a straight line.
-have been used for telecommunications between the North and South campuses here at UB.
Wired media is also called _______ media and wireless media is also called _______ media.
Bounded, Unbounded
Which of the following has 8 wires bundled in twisted pairs?
Ethernet cable
Which of the following lists the networking devices in order of intelligence from "dumb" to "smart"?
Hub, switch, router
How would you classify the computer lab network in the room you have recitation?
LAN
Which networking device connects multiple computers in a network and broadcasts all messages to all computers on the network?
Hub
What type of server are you accessing with your client when you access www.ebay.com?
Web server
Which term describes a point on the Internet where several connections converge?
Network access points
Telnet is the capability to/for:
log onto a remote computer and work on it
Which of the following prompted the initial surge in Internet usage in the early 1990's?
The development of the WWW and the graphical web browser Mosaic.
The original purpose of the Internet was
to enable researchers to collaborate and share data.
FTP is the capability to/for:
upload and download files from one computer to another.
A company employing an extranet must be sure to put a(n) _________________ in place.
firewall
Which of the following is generally used as a B2E network?
Intranet
Which of the following events prompted the creation of CERT?
The Internet worm of 1988.
Which of the following is a true statement?
IP addresses are used to identify machines on the Internet.
Which of the following is a true statement?
-TCP/IP is the protocol of the Internet.
-The word Internet comes from the combination of the 2 words "interconnected networks".
Which of the following is a true statement?
The WWW is less than 40 years old.
What percent of information systems fail after being developed and implemented?
80%
During which phase of the SDLC is the Requirements Definition Document created?
System Analysis
During which phase of the SDLC is a technical blueprint of how the proposed system will work developed?
System Design
During which phase of the SDLC is the feasibility study originally conducted?
Preliminary Analysis
System testing:
tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.
Which of the following approaches to organizational change is the most conservative (i.e. low risk, low return)?
Automation
Which example of organizational change "tweaks" the existing business processes to streamline them a bit?
Rationalization of Procedures
How many phases are in the SDLC?
It depends which textbook you read!
During which SDLC phase is it cheapest to find an error? Hint: the sooner you discover an error, the better!
Preliminary Analysis
Which type of error is the most difficult to find?
logic error
Which phase involves end-users and IT specialists working together (JAD) to gather, understand, and document the business requirements for the proposed system?
System Analysis phase
Which system conversion strategy is best suited for a mission critical system?
Parallel
Which system conversion strategy is the riskiest?
Direct cutover
What in a Salesforce App can help prevent GIGO?
-Correct data types for fields.
-Appropriately defined validation rules.
-Descriptive field help text.
-Properly established field sizes.
Automation that can perform advanced operations, making the Salesforce App more powerful and user-friendly is called a _________.
flow builder