Computer - Test Bank • Computer - Test Bank
Latest uploads for Computer - Test Bank at Computer - Test Bank. Looking for Computer - Test Bank notes at Computer - Test Bank? We have lots of notes, study guides and revision notes available for Computer - Test Bank at Computer - Test Bank.
-
9
- 0
- 0
Modules Computer - Test Bank at Computer - Test Bank
Notes available for the following courses of Computer - Test Bank at Computer - Test Bank
Latest notes & summaries Computer - Test Bank • Computer - Test Bank
Chapter 03 
Operational/Organizational Security 
 
 
 Multiple Choice Questions 
1. (p. 51) Statements made by management that lays out the organization's position on an issue are called ________. A. policies B. procedures C. standards D. guidelines 
 
 Difficulty: Easy 
2. (p. 51) Your boss needs instructions explaining the steps of how to send encrypted email properly for all employees. You will need to create the _________. A. policy B. proced...
Tutorial 3: Designing a Web Page with CSS 
 
TRUE/FALSE 
 
	1.	To render a document, the device displaying the page needs a style sheet that specifies the appearance of each page element. 
 
ANS:	T	PTS:	1	REF:	HTML 142 
 
	2.	In every version of CSS, you apply a style rule containing a list of style properties to an 
element or a group of elements known as a selector. 
 
ANS:	T	PTS:	1	REF:	HTML 144 
 
	3.	One advantage of user-defined style sheets is that they make the Web more accessible to vis...
Tutorial 3: Designing a Web Page with CSS 
 
TRUE/FALSE 
 
	1.	To render a document, the device displaying the page needs a style sheet that specifies the appearance of each page element. 
 
ANS:	T	PTS:	1	REF:	HTML 142 
 
	2.	In every version of CSS, you apply a style rule containing a list of style properties to an 
element or a group of elements known as a selector. 
 
ANS:	T	PTS:	1	REF:	HTML 144 
 
	3.	One advantage of user-defined style sheets is that they make the Web more accessible to vis...
Computers Are Your Future, 12e (LaBerta) 
Chapter 2 Inside the System Unit 
 
1) A byte: 
A) is the equivalent of eight binary digits. 
B) represents one digit in the decimal numbering system. 
C) is the smallest unit of information that a computer can process. 
D) can be compared to the state of one light switch being either on or off. 
Answer: A 
Diff: 2 
Reference: Representing Data as Bits and Bytes 
 
2) Computers count with ________ numbers. 
A) regular 
B) binary 
C) decimal 
D) digita...
Chapter 2 – Cryptographic Tools 
 
TRUE/FALSE QUESTIONS: 
 
T	F	1. Symmetric encryption is used primarily to provide confidentiality. 
T	F	2. Two of the most important applications of public-key encryption are 
 digital signatures and key management. 
 
T	F	3. Cryptanalytic attacks try every possible key on a piece of ciphertext 
 until an intelligible translation into plaintext is obtained. 
 
T 	F	4. The secret key is input to the encryption algorithm. 
 
T	F	5. Triple DES tak...
Chapter 1 – Computer Systems Overview 
 
TRUE/FALSE QUESTIONS: 
T	F	1. Threats are attacks carried out. 
T	F	2. Computer security is protection of the integrity, availability, and 
 confidentiality of information system resources. 
 
T	F	3. Data integrity assures that information and programs are changed only 
 in a specified and authorized manner. 
 
T 	F	4. Availability assures that systems works promptly and service is not 
 denied to authorized users. 
 
T	F	5. The “A...
Test Bank—Chapter Two (Data Manipulation) 
The following table is from Appendix C of the text. It is included here so that it can be incorporated in tests for student reference. Questions in this test bank refer to this table as the “language description table.” 
 Op- 
 code Operand 		Description 
	1	RXY	LOAD the register R with the bit pattern found in the memory cell whose address is XY.				Example: 14A3 would cause the contents of the memory cell located at address A3 to be pl...
3.1 Introduction 
(No Questions) 
3.2 Algorithms 
 
3.1 Specifying the order in which statements are to be executed in a computer program is called 
(a) an algorithm 
(b) transfer of control 
(c) program control 
(d) pseudocode 
ANS: (c) 
 
 
3.2. The two key attributes of an algorithm are: 
a) actions and start activity 
b) flow and order of flow 
c) actions and order of actions 
d) flow and start activity 
ANS: (c) 
3.3 Pseudocode 
 
3.3 Which of the following is true of pseudocode programs? 
...
Chapter 3 
Flow of Control 
 Multiple Choice 
1) An if selection statement executes if and only if: (a) the Boolean condition evaluates to false. 
(b) the Boolean condition evaluates to true. 
(c) the Boolean condition is short-circuited. 
(d) none of the above. Answer: B 
2) A compound statement is enclosed between: (a) [ ] 
(b) { } 
(c) ( ) 
(d) < > Answer: B 
3) A multi-way if-else statement 
(a) allows you to choose one course of action. 
(b) always executes the else statement. 
(c...
Chapter 3 – Function Basics --Test Questions 
These test questions are true-false, fill in the blank, multiple choice, and free form questions that may require code. The multiple choice questions may have more than one correct answer. You are required to mark and comment on correct answers.. Mark all of the correct answers for full credit. The true false questions require an explanation in addition to the true/false response, and, if false, also require a correction. 
True False: 
An explanati...