chapter 8,9,12,13,14 and 15 – Flashcards
Unlock all answers in this set
Unlock answersquestion
A firewall is a security system that creates a barrier between a computer or network and the Internet in order to protect against unauthorized access
answer
True
question
If you have a Wi-Fi network, its security features works by default. Hence, there is no need to anything else to protect the network.
answer
False
question
A computer worm infects other computer files exactly the same way as a virus does
answer
False
question
Biometric authentication uses information that an individual should know or can easily remember.
answer
False
question
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
answer
True
question
Denial of service attacks are usually of insignificant cost in terms of business lost.
answer
False
question
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
answer
False
question
Information used in identity theft can be obtained by skimming or via social engineering
answer
True
question
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
answer
False
question
Private key encryption is also called symmetric key encryption, in which same key is used for both encryption and decryption
answer
True
question
Crimes committed via the use of a computer is called
answer
Cybercrime
question
A design and manufacturing system helps with efficient decision making regarding the manufacturing of products.
answer
True
question
A paperless office has been achieved through a variety of technologies and processing techniques, and needs for using paper is NO LONGER needed.
answer
False
question
Benchmark tests are tests to measure a computer system performance under typical usage considerations before purchase the system.
answer
True
question
ERP refers to the process of requiring to submit and RFP or and RFQ.
answer
False
question
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, and other organizations.
answer
True
question
Operating systems software manage and process data starting from the generation of data through its conversion into information.
answer
False
question
The final phase of the SDLC is System Analysis
answer
False
question
The goal of supply chain management (SCM) is to organize and correlate all data required for Paperless Office
answer
False
question
With a JIT system, inventory, production resources, and finished products are limited to the right number at the right time as required to fill orders.
answer
True
question
An example of run-time error is when a program stop running due to division by zero.
answer
True
question
Comments in a programming language are part of the code and it will be translated to machine code
answer
False
question
A program bug is an error that causes a program to malfunction.
answer
True
question
A structured program is divided into individual modules; each module represents a specific processing task
answer
True
question
One of the control structure in a Programming Language is the repetition control structure which is also called the selection control structure.
answer
False
question
Pseudocode uses English-like statements to express the necessary steps or the logic in a computer program
answer
True
question
Structured programming embodies a top-down design philosophy.
answer
True
question
Syntax error refers to the error in the grammar of the language being used.
answer
True
question
Translating programming code to machine language can be done via compilers or interpreters.
answer
True
question
With a logic error, the program will run but the output will be wrong.
answer
True
question
A database can be defined as a group of related tables.
answer
True
question
Arranging data for efficient retrieval is called data sorting.
answer
True
question
Data dictionary contains meta-data about all data in a database application.
answer
True
question
Data integrity refers to the accuracy of data
answer
True
question
Data Protection refers to protecting data against destruction and misuse—both intentionally and accidentally.
answer
True
question
In a table of a database, a record can be viewed as one column in the table.
answer
False
question
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity. For example, a class may be taken by many students and also each student can enrol in many classes
answer
True
question
Most databases created today do use the relational database model
answer
True
question
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
answer
True
question
Typically, in hierarchical database management systems, a one-to-many relationship exists between data entities.
answer
True
question
A computer network connects various computing devices hence make it possible to share resources such as many users sharing a printer.
answer
True
question
An Intranet network is a public network that is accessible by any one with an Internet connection.
answer
False
question
In a bus network topology, all the networked devices connect to a central device (such as a hub or a switch) through which all network transmissions are sent.
answer
False
question
The Internet is the largest network exist as it connects various network together.
answer
True
question
The original Plain Old Telephone Service(POTS) was one of the first communication network created.
answer
True
question
Transferring data from a client computer, such as your home computer, to a server in a remote location is referred to as downloading.
answer
False
question
Twisted pair cable can ONLY be used for transmitting signals for telephone networks but not for computer networks
answer
False
question
A Local Area Network (LAN) is a network is network in a small geographical area such as in an educational campus.
answer
True
question
Coaxial cable are typically used in peer-to-peer network such as the Comcast connections that comes to your house,
answer
False
question
Communications satellites are space-based devices launched into orbit around the earth to receive and transmit microwave signals to and from earth.
answer
True