Thursday, May 5, 2011

Network Security Plus Questions and Answers Test 3

Test 3 Study Guide


Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
   

1.

Two types of system software are ____.
a.
application software and utility programs
b.
Web browsers and application software
c.
operating systems and utility programs
d.
operating systems and Web browsers

ANSWER:

C
   

2.

A cross-platform program is one that has ____ on multiple operating systems.
a.
one version and runs identically
b.
one version and runs differently
c.
multiple versions, and each version runs identically
d.
multiple versions, and each version runs differently

ANSWER:

C
   

3.

With Windows XP, a warm boot can be performed by ____.
a.
pressing a combination of keyboard keys (CTRL+ALT+DEL)
b.
selecting a button or an option from a list in a dialog box
c.
pressing the reset button on the computer
d.
all of the above

ANSWER:

D
   

4.

In Windows XP, the ____ consists of several files that contain the system configuration information.
a.
buffer
c.
platform
b.
driver
d.
registry

ANSWER:

D
   

5.

In Windows XP, the ____ contains a list of programs that open automatically when users boot the computer.
a.
Restore folder
c.
Swap folder
b.
Startup folder
d.
Backup folder

ANSWER:

B
   

6.

A ____ provides lists of options as a means of entering commands.
a.
command-line interface
c.
performance-monitor interface
b.
menu-driven interface
d.
graphical user interface (GUI)

ANSWER:

B
test3studyguide_files/i0080000.jpg
   

7.

With virtual memory, which is illustrated in the accompanying figure, a ____ is the amount of data and program instructions that can swap at a given time.
a.
log
c.
spool
b.
page
d.
boot

ANSWER:

B
   

8.

With virtual memory, which is illustrated in the accompanying figure, when an operating system spends much of its time paging, instead of executing application software, it is said to be ____.
a.
zipping
c.
restoring
b.
compressing
d.
thrashing

ANSWER:

D
   

9.

If a new device, such as a printer or scanner, is attached to a computer, its ____ must be installed before the device can be used.
a.
driver
c.
manager
b.
platform
d.
kernel

ANSWER:

A
   

10.

The person overseeing network operations, called the ____, uses the network OS to add and remove users, computers, and other devices to and from a network.
a.
network administrator
c.
network installer
b.
network operator
d.
network server

ANSWER:

A
   

11.

While entering a ____, most computers hide the actual characters by displaying some other characters, such as asterisks (*) or dots.
a.
user name
c.
user ID
b.
password
d.
all of the above

ANSWER:

B
   

12.

____ is the process of encoding data and information into an unreadable form.
a.
Encryption
c.
Transmission
b.
Formatting
d.
Spooling

ANSWER:

A
   

13.

Utility programs included with most operating systems provide all of the following functions except ____.
a.
managing files and viewing graphics files
b.
uninstalling programs and diagnosing problems
c.
removing viruses and compressing files
d.
backing up files and defragmenting disks

ANSWER:

C
   

14.

Windows XP includes a file manager called ____.
a.
Windows Picture and Fax Viewer
c.
DriveSpace
b.
Windows Explorer
d.
Dr. Watson

ANSWER:

B
   

15.

Windows XP includes an image viewer called ____.
a.
Windows Picture and Fax Viewer
c.
DriveSpace
b.
Windows Explorer
d.
Dr. Watson

ANSWER:

A
   

16.

In Windows XP, the uninstaller is available through the ____ command in the Control Panel.
a.
Add New Hardware
c.
Add/Remove Programs
b.
Accessibility Options
d.
Power Management

ANSWER:

C
   

17.

____ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer.
a.
Formatting
c.
Spooling
b.
Defragmenting
d.
Compressing

ANSWER:

B
   

18.

Windows XP includes the diagnostic utility, ____, which diagnoses problems as well as suggests courses of action.
a.
Windows Picture and Fax Viewer
c.
DriveSpace
b.
Windows Explorer
d.
Dr. Watson

ANSWER:

D
   

19.

Many backup programs ____, or shrink the size of, files during the backup process.
a.
restore
c.
fragment
b.
register
d.
compress

ANSWER:

D
   

20.

Screen savers originally were developed to prevent a problem called ____, in which images could be permanently etched on a monitor’s screen.
a.
thrashing
c.
ghosting
b.
paging
d.
hacking

ANSWER:

C
   

21.

Examples of stand-alone operating systems include all of the following except ____.
a.
DOS and Windows XP
c.
Mac OS X and OS/2 Warp Client
b.
NetWare and Solaris
d.
UNIX and Linux

ANSWER:

B
   

22.

When first developed by Microsoft, ____ used a command-line interface, but later versions included both command-line and menu driven user interfaces.
a.
Windows XP
c.
Mac OS X
b.
DOS
d.
UNIX

ANSWER:

B
   

23.

____ is available in three editions: Home Edition, Professional, and Tablet PC Edition.
a.
Windows XP
c.
OS/2 Warp Client
b.
Linux
d.
DOS

ANSWER:

A
   

24.

____ includes features from previous Apple computer operating systems, such as large photo-quality icons, built-in networking support, and enhanced speech recognition.
a.
DOS
c.
Linux
b.
UNIX
d.
Mac OS X

ANSWER:

D
   

25.

____ has been used by businesses because of IBM’s long association with business computing and the operating system’s strong networking support.
a.
Mac OS X
c.
UNIX
b.
Windows XP
d.
OS/2

ANSWER:

D
   

26.

Examples of network operating systems include all of the following except ____.
a.
NetWare and Windows .NET Server
b.
OS/2 Warp Server for e-business and Solaris
c.
DOS and Pocket PC 2002
d.
UNIX and Linux

ANSWER:

C
   

27.

Like Linux, ____ is a multipurpose operating system because it is both a stand-alone and network operating system.
a.
NetWare
c.
Mac OS X
b.
UNIX
d.
OS/2 Warp Server for e-business

ANSWER:

B
   

28.

Popular embedded operating systems include all of the following except ____.
a.
Windows CE .NET
c.
Pocket PC 2002
b.
Palm OS and Symbian OS
d.
NetWare and Linux

ANSWER:

D
   

29.

____, which is used on PDAs such as the Sony CLIE, supports handwriting recognition software called Graffiti.
a.
Palm OS
c.
Pocket PC 2002
b.
Symbian OS
d.
Windows CE .NET

ANSWER:

A
   

30.

A ____ is a program that acts without a user’s knowledge and deliberately alters a computer’s operations.
a.
malicious-logic program
c.
system software program
b.
utility program
d.
diagnostic program

ANSWER:

A
   

31.

A ____ does not replicate itself to other computers.
a.
virus
c.
Trojan horse
b.
worm
d.
all of the above

ANSWER:

C
   

32.

Compressing files ____ system performance.
a.
demands extra room on the storage media and impairs
b.
demands extra room on the storage media but improves
c.
frees up room on the storage media but impairs
d.
frees up room on the storage media and improves

ANSWER:

D
   

33.

Compress files, sometimes called ____.
a.
ripped files, usually have a .rip extension
b.
tipped files, usually have a .tip extension
c.
dipped files, usually have a .dip extension
d.
zipped files, usually have a .zip extension

ANSWER:

D
   

34.

Two examples of ____ are cable television lines and telephone lines.
a.
sending devices
c.
receiving devices
b.
communications channels
d.
communications devices

ANSWER:

B
   

35.

A type of communications device that connects a communications channel to a sending or receiving device is a ____.
a.
modem
c.
PDA
b.
server
d.
all of the above

ANSWER:

A
   

36.

____ can serve as sending and receiving devices in a communications system.
a.
Mainframe computers and servers
b.
Desktop computers and notebook computers
c.
Tablet PCs and PDAs
d.
all of the above

ANSWER:

D
   

37.

____ allows users to share documents with others in real time.
a.
An online meeting
c.
Voice mail
b.
Internet telephony
d.
Internet printing

ANSWER:

A
   

38.

Groupware is a component of a broad concept called ____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions.
a.
public Internet access
c.
Web services
b.
workgroup computing
d.
short message service

ANSWER:

B
   

39.

A GPS receiver is a handheld, mountable, or embedded device that contains all of the following except a(n) ____.
a.
radio receiver
c.
floppy disk
b.
antenna
d.
processor

ANSWER:

C
   

40.

A voice mailbox is a(n) ____ in a voice mail system.
a.
storage location on a hard disk
c.
processor
b.
input device
d.
output device

ANSWER:

A
   

41.

A ____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount.
a.
network license
c.
peer license
b.
server license
d.
site license

ANSWER:

D
   

42.

A ____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
a.
local area network (LAN)
c.
wide area network (WAN)
b.
metropolitan area network (MAN)
d.
variable area network (VAN)

ANSWER:

A
   

43.

A ____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
a.
local area network (LAN)
c.
wide area network (WAN)
b.
metropolitan area network (MAN)
d.
variable area network (VAN)

ANSWER:

B
   

44.

A ____ is a network that covers a large geographical area, such as a country or the world, using a communications channel that combines many types of media.
a.
local area network (LAN)
c.
wide area network (WAN)
b.
metropolitan area network (MAN)
d.
variable area network (VAN)

ANSWER:

C
   

45.

A file server is a dedicated server that ____.
a.
stores and manages files
b.
manages printers and print jobs
c.
stores and provides access to a database
d.
manages network traffic (activity)

ANSWER:

A
   

46.

A print server is a dedicated server that ____.
a.
stores and manages files
b.
manages printers and print jobs
c.
stores and provides access to a database
d.
manages network traffic (activity)

ANSWER:

B
   

47.

A database server is a dedicated server that ____.
a.
stores and manages files
b.
manages printers and print jobs
c.
stores and provides access to a database
d.
manages network traffic (activity)

ANSWER:

C
   

48.

A network server is a dedicated server that ____.
a.
stores and manages files
b.
manages printers and print jobs
c.
stores and provides access to a database
d.
manages network traffic (activity)

ANSWER:

D
test3studyguide_files/i0510000.jpg
   

49.

On a ____, such as that illustrated in the accompanying figure, all of the computers and devices (nodes) on the network connect to a central device.
a.
bus network
c.
star network
b.
ring network
d.
token ring network

ANSWER:

C
   

50.

On a star network, such as that illustrated in the accompanying figure, the central device that provides a common connection point for nodes on the network is called the ____.
a.
hub
c.
printer
b.
personal computer
d.
file server

ANSWER:

A
   

51.

On a star network, such as that illustrated in the accompanying figure, if one node fails ____.
a.
only that node is affected
b.
only the nodes before that node are affected
c.
only the nodes after that node are affected
d.
all the nodes are affected

ANSWER:

A
   

52.

Today, ____ is the most popular LAN technology because it is relatively inexpensive and easy to install and maintain.
a.
Ethernet
c.
TCP/IP
b.
token ring
d.
802.11

ANSWER:

A
   

53.

Internet transmissions commonly use ____.
a.
Ethernet
c.
TCP/IP
b.
token ring
d.
802.11

ANSWER:

C
   

54.

When a computer sends data over the Internet, the data is divided into small pieces, or ____.
a.
bundles
c.
slices
b.
packets
d.
baskets

ANSWER:

B
   

55.

The technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called ____.
a.
packet catching
c.
packet switching
b.
packet building
d.
packet swapping

ANSWER:

C
   

56.

One popular use of the ____ standard is in public Internet access points that offer mobile users the ability to connect to the Internet with their wireless computers and devices.
a.
Ethernet
c.
TCP/IP
b.
token ring
d.
802.11

ANSWER:

D
   

57.

Communications software consists of programs that ____.
a.
help users establish a connection to another computer or network
b.
manage the transmission of data, instructions, and information
c.
provide an interface for users to communicate with one another
d.
all of the above

ANSWER:

D
   

58.

Although ____ are not a type of standard telephone line, they are a very popular type of dedicated line that allows a home user to connect to the Internet.
a.
ISDN lines
c.
T-carrier lines
b.
DSL
d.
cable television (CATV) lines

ANSWER:

D
   

59.

With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called ____.
a.
packet switching
c.
multiplexing
b.
routing
d.
modulating

ANSWER:

C
   

60.

DSL is much ____ data transfer rates.
a.
harder to install than ISDN and provides much slower
b.
harder to install than ISDN but provides much faster
c.
easier to install than ISDN but provides much slower
d.
easier to install than ISDN and provides much faster

ANSWER:

D
   

61.

The most popular T-carrier line is the ____.
a.
T1 line
c.
T3 line
b.
T2 line
d.
T4 line

ANSWER:

A
   

62.

A T3 line is ____.
a.
slower than a T1 line and quite expensive
b.
slower than a T1 line but quite inexpensive
c.
equal in speed to 28 T1 lines but quite expensive
d.
equal in speed to 28 T1 lines and quite inexpensive

ANSWER:

C
   

63.

A ____ is a device that provides a central point for cables in a network.
a.
hub
c.
node
b.
packet
d.
router

ANSWER:

A
   

64.

A networked computer in a house can ____.
a.
share a single high-speed Internet connection
b.
access files and programs on other computers in the house
c.
share peripherals such as a printer, scanner, external hard disk, or DVD drive
d.
all of the above

ANSWER:

D
   

65.

A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system.
a.
peripheral home network
c.
wired home network
b.
value-added home network
d.
intelligent home network

ANSWER:

D
   

66.

Physical transmission media used in communications include all of the following except ____.
a.
twisted-pair cable
c.
broadcast radio cable
b.
coaxial cable
d.
fiber-optic cable

ANSWER:

C
   

67.

Fiber-optic cables have all of the following advantages over cables that use wire except ____.
a.
lower costs and easier installation and modification
b.
faster data transmission and smaller size
c.
less susceptible to noise from other devices
d.
better security for signals during transmission

ANSWER:

A
   

68.

____ is a computer phrase that means users cannot create correct information from data that is incorrect.
a.
Nothing ventured, nothing gained (NVNG)
b.
Bad data, bad info (BDBI)
c.
Garbage in, garbage out (GIGO)
d.
What you see is what you get (WYSIWYG)

ANSWER:

C
   

69.

Accurate information ____.
a.
is error free
b.
has meaning to the person who receives it
c.
is available when a decision maker needs it
d.
has an age suited to its use

ANSWER:

A
   

70.

Organized information ____.
a.
is error free
b.
is arranged to suit the needs and requirements of a decision maker
c.
can be proven as correct or incorrect
d.
has an age suited to its use

ANSWER:

B
   

71.

Useful information ____.
a.
is available when a decision maker needs it
b.
has an age suited to its use
c.
can be proven as correct or incorrect
d.
has meaning to the person who receives it

ANSWER:

D
   

72.

A database contains files, a file contains ____.
a.
characters, a character contains fields, and a field is made up of records
b.
fields, a field contains characters, and a character is made up of records
c.
records, a record contains characters, and a character is made up of fields
d.
records, a record contains fields, and a field is made up of characters

ANSWER:

D
   

73.

____ is a common data type that consists of dollar and cent amounts or numbers containing decimal values.
a.
AutoNumber
c.
Currency
b.
Text
d.
Object

ANSWER:

C
   

74.

____ is a common data type that consists of Web addresses that link to a document or Web page.
a.
Hyperlink
c.
Yes/No
b.
AutoNumber
d.
Currency

ANSWER:

A
   

75.

Users add new records to a file ____.
a.
when a record no longer is needed
c.
when they obtain new data
b.
to correct inaccurate data
d.
to update old data with new data

ANSWER:

C
   

76.

____, a user deletes it from a file.
a.
To correct inaccurate data
c.
To update old data with new data
b.
When new data is obtained
d.
When a record no longer is needed

ANSWER:

D
   

77.

When a program flags a deleted record, the record ____ process it.
a.
is deleted physically from the disk and is deleted logically because the program will not
b.
is deleted physically from the disk but remains logically because the program will
c.
remains physically on the disk but is deleted logically because the program will not
d.
remains physically on the disk and remains logically because the program will

ANSWER:

C
   

78.

Deleting unneeded files ____ storage space.
a.
increases the size of files and frees up
b.
increases the size of files and takes up
c.
reduces the size of files but takes up
d.
reduces the size of files and frees up

ANSWER:

D
   

79.

If the lowest monthly fee at a fitness center is $20.25 and the highest is $55.50, a(n) ____ on the Monthly Fee field ensures it is a value between $20.25 and $55.50.
a.
range check
c.
consistency check
b.
completeness check
d.
alphabetic/numeric check

ANSWER:

A
   

80.

A(n) ____ tests the data in two or more associated fields to ensure that the relationship is logical.
a.
range check
c.
consistency check
b.
completeness check
d.
alphabetic/numeric check

ANSWER:

C
   

81.

A program determines the ____ by applying a formula to the numbers in the primary key.
a.
data type
c.
field size
b.
check digit
d.
default value

ANSWER:

B
   

82.

A major weakness of a lot of file processing systems is that ____.
a.
they have redundant data and they isolate data
b.
they are much more complex than a database
c.
data is more vulnerable than data in a database
d.
all of the above

ANSWER:

A
   

83.

A(n) ____ program interacts with a DBMS, which in turn interacts with the database.
a.
before image
c.
after image
b.
front-end
d.
back-end

ANSWER:

B
   

84.

When compared with a file processing system, a database offers all of the following except ____.
a.
reduced data redundancy
b.
easier access and shared data
c.
reduced development time
d.
less required memory, storage, and processing power

ANSWER:

D
   

85.

A DBMS uses the ____ to perform validation checks.
a.
data server
c.
data warehouse
b.
data mart
d.
data dictionary

ANSWER:

D
   

86.

Commonly used methods to retrieve and maintain data include all of the following except ____.
a.
report generators and forms
c.
validation rules
b.
query languages
d.
query by example

ANSWER:

C
   

87.

Although a query language can be used for other purposes, most users only ____ data with a query language.
a.
retrieve
c.
change
b.
add
d.
delete

ANSWER:

A
   

88.

A personal trainer with ____ privileges to the e-mail addresses in a fitness club database could view the addresses but not change them.
a.
read-only
c.
full-update
b.
write-only
d.
no access

ANSWER:

A
   

89.

To ensure privacy, members would have ____ privileges to the data in a fitness club database.
a.
read-only
c.
full-update
b.
write-only
d.
no access

ANSWER:

D
   

90.

In a relational database, each row ____.
a.
and each column has a primary key
b.
has a unique name and each column has a primary key
c.
has a primary key and each column has a unique name
d.
and each column has a unique name

ANSWER:

C
test3studyguide_files/i0940000.jpg
   

91.

A user of a relational database, such as that pictured in the accompanying figure, refers to a file as a ____.
a.
table
c.
row
b.
column
d.
relationship

ANSWER:

A
   

92.

A user of a relational database, such as that pictured in the accompanying figure, refers to a record as a ____.
a.
table
c.
row
b.
column
d.
relationship

ANSWER:

C
   

93.

A user of a relational database, such as that pictured in the accompanying figure, refers to a field as a ____.
a.
table
c.
row
b.
column
d.
relationship

ANSWER:

B
   

94.

In a relational database, such as that pictured in the accompanying figure, a ____ is a connection within the data.
a.
table
c.
row
b.
column
d.
relationship

ANSWER:

D
   

95.

Compared with relational databases, object-oriented databases ____.
a.
can store more types of data
c.
allow programmers to reuse objects
b.
access data faster
d.
all of the above

ANSWER:

D
   

96.

A ____ stores images, audio clips, and/or video clips.
a.
multimedia database
b.
groupware database
c.
computer-aided design (CAD) database
d.
hypertext database

ANSWER:

A
   

97.

A ____ stores data about engineering, architectural, and scientific designs.
a.
multimedia database
b.
groupware database
c.
computer-aided design (CAD) database
d.
hypertext database

ANSWER:

C
   

98.

Many e-commerce sites use ____ to determine customer preferences.
a.
data checking
c.
data sorting
b.
data mining
d.
data serving

ANSWER:

B
   

99.

To access data in a ____, users fill in a form on a Web page.
a.
hypertext database
c.
Web database
b.
multimedia database
d.
groupware database

ANSWER:

C
   

100.

Many search engines use databases to store Web site descriptions; thus, the search engine’s home page is the ____ to the database.
a.
front end
c.
back end
b.
before image
d.
after image

ANSWER:

A

No comments:

Post a Comment