Table or Bench?
Sea Quill
GIGO
Network what?
Risky Business
100
A data______, which is a framework for organizing and storing data, consist of one or more files or tables.
a. structure b. roster c. index d. integral
100
During the systems design phase,________fields are used to organize, access and maintain data structures.
a. glossary b. tabular c. content d. key
100
_______is the process of creating table designs by assigning specific fields or attributes to each table in a database.
a. Encapsulation b. Normalization c. Standardization d. Encryption
100
In the OSI (open system interconnection) model, the presentation layer________.
a. defines network addresses and determines how data is routed over the network b. provides reliable data flow and error recovery c. assures that data is uniformly structured and formatted for network transmission d. contains the physical components that carry data
100
To measure system performance, companies use_______testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
a. metric b. benchmark c. threat d. allocation
200
One problem in a file processing environment is____, which means that data common to two or more information systems is stored in several places.
a. rigid data structure b. data integrity c. referential integrity d. data redundancy
200
A_________is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
a. primary key b. common key c. secondary key d. combination key
200
Each object in an OODB has a unique______, which is similar to a primary key in a relational database.
a. object identifier b. common field c. associative entity d. binary digit
200
A disadvantage of a bus network is that________.
a. peformance can decline as more users and devices are added. b. devices cannot be attached or detached without disturbing the rest of the network c. failure in one workstation necessarily affects other workstations on the network d. all of the above
200
Risk______analyzes the organization's assets, threats, and vulnerabilities.
a. assessment b. management c. identification d. control
300
In a typical file processing environment,______problems can occur if updates are not applied in every file.
a. rigid data structure b. data integrity c. referential integrity d. data redundancy
300
One type of validity check, called_______integrity, is a set of rules that avoids data inconsistency and quality problems.
a. candidate b. combinational c. referential d. foreign
300
In the event of a file catastrophe,_____ can be used to restore the file or database to its current state at the time of the last backup.
a. recovery procedure b. crow's foot notation c. audit log files d. standard notation format
300
A popular network protocol is _______, which today is the backbone of the Internet.
a. FTP b. Telnet c. TCP/IP d. all of the above
300
Risk_______develops safeguards that reduce risks and their impact.
a. assessment b. management c. identification d. control
400
Many database programs generate_________,which is a language that allows PC client workstations to communicate with servers and mainframe computers.
a. DDE] b. DBL c. DML d. SQL
400
In an entity-relationship diagram, entities are represented as__________.
a. triangles b. circles c. rectangles d. hexagons
400
________is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
a. Transparency b. Scalability c. Redundancy d. Interoperability
400
The_______section in a typical system design specification describes the constraints , or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.
a. Time and Cost Estimates b. System Environment c. Executive Summary d. System Components
400
Risk_________measures risk likelihood and impact.
a. assessment b. management c. indentification d. control
500
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a_____________.
a. connective b. schema c. exchange d. collective
500
One common method of indicating_______is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
a. scalability b. compatibility c. cardinality d. functionality
500
A system design where the server performs all the processing is described as__________.
a. mainframe architecture b. thin architecture c. workstation architecture d. thick architecture
500
_____means examining the whole in order to learn about the individual elements.
a. Synthesis b. Risk Management c. Analysis d. Risk Identification
500
A_________is an internal or external entity that could endanger an asset.
a. menace b. strike c. malware d. threat
M
e
n
u