SQL
Database
Pseudocode
Security
Networks
100

What must a query end with?

A semi-colon

100

What is a database

An organised collection of structured information

100

What must be at the beginning and end of pseudocode

a BEGIN/START and END

100

What are is APP

Australian Privacy Principles

100

What is a protocol?

A set of rules that allow communication

200

What function is used to return unique records

DISTINCT

200

What is a foreign key?

A field that relates to a primary key in another field

200

How many indentations total should their if a piece of pseudocode only has a single if statement?

2

200

What is meant by anonymity

Anonymity means that an individual cannot be identified, and the entity does not collect personal information or identifiers. 

200

What does URL stand for

Universal Resource Locator

300

What data type does HAVING return

Boolean

300

What is meant by normalisation

Organising data in a database to remove redundancy and protect data

300
How do you call a sub-function within pseudocode

subfunction()

300

What are the three objectives of security

maintaining confidentiality, integrity, and availability.

300

What are the 4 main Transmission Principles?

Latency, Jitter, Guarantee, Timeliness of delivery

400

What is the purpose of an INNER JOIN

To join two tables and return records in both of them based on criteria

400

With a 1:many uniqueness constraint, what causes the uniqueness

The many column 

400

What is the correct format of an IF statement?

IF cond THEN

    ....

ELSEIF cond THEN

    ....

ELSE

    ....

END IF

400

What is meant by dissemination?

The process by which producers of microdata from surveys and from public and official statistics make their data available to other users.

400

What is SHA?

Secure Hash algorithms

500

What would you write to finding words starting with letters after g

WHERE word >= 'h'
500

What is a transitive dependency?

When there is an indirect relationship between values in the table.  If a relates to b and b relates to c then a relates to c.

500

What encryption method is regarded as mostly impervious to attack except for brute force?

Advanced Encryption Standard

500

What are the 7 OSI layers

Physical, Datalink, network, transport, session, presentation, application.

M
e
n
u