Chapter 4
Chapter 5
Chapter 6
100

Name 1 of the Common Human Error's 

1. Carelessness with Laptops

2. Carelessness with Computing Devices

3. Opening Questionable E-mail

4. Careless Internet Surfing

5. Poor Password Selection and Use

100

Name 1 of the 3 things that Database Management Systems Maximize

1. Data Security

2. Data Integrity

3. Data Independence

100

What is 1 of the 2 Network Protocols 

1. Ethernet

2. Transmission Control Protocol/Internet Protocol (TCP/IP)

200

What is 1 of the 2 Unintentional Threats to Information Systems

1. Human Errors

2. Social Engineering

200

What is 1 of the 3 Main Problems that Database Management Systems Minimize

1. Data Redundancy

2. Data Isolation

3. Data Inconsistency 

200

What are the 2 Basic Concepts of Network Fundamentals

1. Digital Signals

2. Modem or Modulator-demodulator

300

Name 1 of the Five Factors Contributing to Vulnerability

1. Today's interconnected, interdependent, wirelessly networked business environment

2. Smaller, faster, cheaper computers & storage devices

3. Decreasing skills necessary to be a computer hacker

4. International organized crime taking over cybercrime

5. Lack of management support

300

Name 1 of the 5 Difficulties in Managing Data

1. Data increases exponentially with time

2. Multiple sources of data

3. Data rot, or data degradation

4. Data security, quality, and integrity

5. Government Regulation

300

What is 1 of the 2 Types of Network Processing

1. Client/server computing

2. Peer -to-peer Processing (P2P)

400

Name the 4 Software Attacks that require User Action

1. Virus

2. Worm

3. Phishing Attack

4. Spear Phishing Attack

400

What are the 3 Sources of Data

1. Internal Sources

2. Personal Sources

3. External Sources

400

What are 2 of the 4 Layers of the TCP/IP Reference Model

1. Application Layer

2. Transport Layer

3. Internet Layer

4. Network Interface Layer

500

What are the 4 Alien Softwares

1. Adware

2. Spyware

3. Spamware

4. Cookies

500

Name the Data Hierarchy

1. Bit

2. Byte

3. Field

4. Data File or Table

5. Database

500

What are the 3 ways of Accessing the Internet

1. Connecting via an Online Service

2. Connecting via Other Means

3. Addresses on the Internet

M
e
n
u