100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Quiz Answers

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
28-11-2022
Written in
2021/2022

List of all possible questions at the quiz












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 28, 2022
Number of pages
44
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Chapter 6:
record
1. A database describes a database entity.

2. Data redundancy creates confusion that hampers the creation of
information systems that integrate data from different sources.
3. Which common database challenge is illustrated by a person receiving
multiple copies of an L.L. Bean catalog, each addressed to a slightly
different variation of his or her full name?
 Data duplication
C o r r e c t a n s w e r .
 Data accuracy
 Data redundancy
 Data normalization
4. Which of the following enables a DBMS to reduce data redundancy and
inconsistency?
Ability to couple program and data

 Ability to minimize isolated files with repeated data
C o r r e c t a n s w e r .
 Ability to enforce referential integrity
 Ability to create two-dimensional tables
5. A DBMS makes the:
 relational database available for different analytic views.
 physical database available for different analytic views.
 relational database available for different logical views.
 physical database available for different logical views.

6. The logical and physical views of data are combined into a single view
in a DBMS.
True
 False
7. Complicated groupings of data in a relational database need to be
adjusted to eliminate awkward many-to-many relationships.
 True
False
8. The term big data refers to all of the following except:

,  machine-generated data (i.e. from sensors).
 data from Web traffic.
 datasets with unstructured data.
 datasets with fewer than a billion records.
9. Each table in a relational database has one field that is designated as its
primary
key. When the field Supplier_Number appears in the PART table, it is called a
foreign
key and is essentially a
lookup
field to look up data about the
supplier
of a specific
part


10. Data cleansing, also known as data
scrubbing
, consists of activities for detecting and
correcting
data in a database that are incorrect, incomplete, improperly formatted, or
redundant
. Data cleansing not only corrects
errors
but also enforces
consistency
among different sets of data that originated in separate information systems.



Chapter 7:

1. In TCP/IP, IP is responsible for which of the following?
 Sequencing the transfer of packets
 Establishing an Internet connection between two computers
 Disassembling and reassembling packets during transmission
C o r r e c t a n s w e r .
 Moving packets over the network
2. What are the four layers of the TCP/IP reference model?
 Physical, Application, Internet, and Network Interface

,  Application, Transport, Internet, and Network Interface
C o r r e c t a n s w e r .
 Application, Hardware, Internet, and Network Interface
 Physical, Application, Transport, and Network Interface

3. Telephone networks are based on the same principles as
computer networks.
True
False
4. In a client/server network, a network server sets the rules of
communication for the network.
True
False
5. Two computers using TCP/IP can communicate even if they are
based on different hardware and software platforms.
True
False
6. Bandwidth is the:
 number of frequencies that can be broadcast through a medium.
 total number of bytes that can be sent through a medium per second.
 number of cycles per second that can be sent through a medium.
 difference between the highest and lowest frequencies that can be
accommodated on a single channel.
digital
7. A(n) signal is a discrete, binary waveform that transmits data coded
into two discrete states such as 1-bits and 0-bits.
encrypted
8. A VPN is an private network configured within a public network.
9. Hubs are simple devices that connect network components, sending a
packet
of data to all other connected devices. A
switch
has more
intelligence
than a
hub
and can filter and forward data to a
specified

, destination on the network.

10. Packet
switching
is a method of
slicing
digital messages into parcels called
packets
, sending the packets along different communication paths as they become available,
and then
reassembling
the packets once they arrive at their
destinations


Chapter 8:

1. Which of the following refers to policies, procedures, and technical
measures used to prevent unauthorized access, alteration, theft,
or physical damage to information systems?
 Controls
 Identity management
 Benchmarking
 Security
2. A salesperson clicks repeatedly on the online ads of a competitor
in order to drive the competitor's advertising costs up. This is an
example of:
 click fraud
 phishing
 pharming
 spoofing
Ransomw ar
3. is malware that hijacks a user's computer and demands
payment in return for giving back access.
4. Using numerous computers to inundate and overwhelm the network from
DDoS
numerous launch points is called a(n) attack.
5. Which of the following is the single greatest cause of network
security breaches?
 User lack of knowledge
C o r r e c t a n s w e r .
CA$19.66
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
treasykata

Get to know the seller

Seller avatar
treasykata Conestoga College
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
3 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions