Blackbeard
Calico Jack
Anne Bonny
Henry Morgan
Captain Kidd
100
Computer viruses,worms,Trojan Horses, and rootkits are classified as_____,which are programs that act without a user's knowledge and deliberately alter the computer's operations.
A. malware B. untrusted sources C. threats D. cybermals
100
Employee______involves the use of computers to observe, record, and review an employee's use of a computer,including communications such as e-mail images,keyboarding activity, and Web sites visited.
A. filtering B. monitoring C. spamming D. indexing
100
In sequence, most system development life cycles contain five phases:_________.
A. planning, analysis, design, implementation, support B. analysis, implementation, support,design, planning C. support, design, planning, analysis, implementation D. implementation, analysis, support, planning, design
100
Scope_________occurs when one activity in a project has led to another that was not originally planned;thus,the scope of the project has grown.
A. creep B. change C. growth D. slippage
100
To convert an assembly language source program into machine language, programmers use a program called a(n)_________.
A. manager B. converter C. assembler D. compiler
200
A virus_______is an e-mail message that warns users of a nonexistent virus, worm, or Trojan Horse.
A. myth B. threat C. DoS D. hoax
200
A(n)________program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
A. hoax B. secure C. antivirus D. antispyware
200
A(n)_______system is a collection of hardware, software, data, people, and procedures that work together to produce quality information.
A. data B. information C. feature D. support
200
Like a decision table, a decision_______shows conditions and actions in a process, but it shows them graphically.
A. index B. map C. tree D. repository
200
Naval officer______,a pioneer in computer programming,was a prime developer of COBOL.
A. Grace Hopper B. John Kemeny C. Dennis Ritchie D. Bjame Sroustrup
300
A particularly devastating type of DoS attack is the ______DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
A. distributed B. delayed C. limited D. staggered
300
_____detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
A. Violation B. Password C. Intrusion D. Traffic
300
Project_______is the process of planning, scheduling, and then controlling the activities during the system development cycle.
A. direction B. management C. clustering D. analysis
300
During_______,a systems analyst builds upon the data dictionary developed during the analysis phase.
A. storage design B. database design C. program design D. input and output design
300
Java uses a(n)______compiler to convert its source code into machine-dependent code.
A. JIT B. RPG C. VPE D. NET
400
_______is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
A. Rebuking B. Spoofing C. Transmitting D. Victimizing
400
A______is a small text file that a Web server stores on a user's computer.
A. worm B. spike C. cookie D. payload
400
The project leader usually records_________in a project plan.
A. required activities and the order of the activities B. time estimates and cost estimates for each activity C. activities that can take place at the same time D. all of the above
400
Integrated case products, sometimes called I-CASE or a CASE workbench, include these capabilities:__________
A. project repository and graphics B. prototyping and quality assurance C. code generators and housekeeping D. all of the above
400
A .NET-compatible language compiles the program source code into__________.
A. Java B. JavaScript C. Perl D. MSIL
500
A______is the unit of energy a surge protection device can absorb before it can be damaged.
A. Joule B. Spike C. Hash D. Macro
500
Web sites use a________to keep track of items in a user's shopping cart.
A. session cookie B. zombie C. adware D. shopping bot
500
A Gantt chart,developed by Henry Gantt, is a__________.
A. diagram that graphically show how actors interact with an information system B. tool that graphically shows the flow of data in a system C. bar chart that uses horizontal bars to show project phases or activities D. table that lists a variety of conditions and the actions that correspond to them
500
With a_________,only one location in the company uses a new system so it can be tested.
A. phased conversion B. direct conversion C. parallel conversion D. pilot conversion
500
__________is a subset of the Visual Basic language that allows programmers to add intelligence to Web pages.
A. VBScript B. ActiveX C. Rexx D. Perl