A database _______ is responsible for data storage, manipulation, and retrieval. Answer program index system engine

Question 18

A database _______ is responsible for data storage, manipulation, and retrieval.

Answer

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

program

index

system

engine

Question 19

_______ has created decency concerns, because these e-mails often contain explicit language or nudity.

Answer

Phishing

Spoofing

Sniffing

Spamming

Question 20

In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.

Answer

phishing

nonrepudiation

spoofing

accountability

Question 21

You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup. This action is ________.

Answer

illegal and unethical

legal but unethical

illegal but ethical

legal and ethical

Question 22

In the context of the important concepts regarding Web and network privacy, ________is a method for binding all the parties to a contract.

Answer

phishing

nonrepudiation

cybersquatting

synchronous

communication

Question 23

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of _______.

Answer

cybersquatting

the digital divide

a virtual organization

telecommuting

Question 24

Which of the following is a type of access control?

Answer

Steel encasements

Passwords

Firewalls

Identification badges

Question 25

_______ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Answer

Intrusion detection systems

Proxy servers

Physical security measures Biometric security measures

Question 26

Which of the following is a physical security measure?

Answer

Electronic trackers

Passwords

Firewalls

Signature analysis

Question 27

_______ security measures use a physiological element to enhance security measures.

Answer

Physical

Social

Biofeedback

Biometric

Question 28

A(n) _______ is often used so remote users have a secure connection to the organization’s network.

Answer

biometric security system

intrusion detection system

virtual private network

terminal resource network

Question 29

A _______ travels from computer to computer in a network, but it does not usually erase data.

Answer

Trojan program

worm

virus backdoor

Question 30

_______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure.

Answer

Script kiddies

Black hats

White hats

Hex editors

Question 31

The amount of data that can be transferred from one point to another in one second is called _______.

Answer

bandwidth

controller

router

protocol

Question 32

The Transmission Control Protocol (TCP) operates at the OSI model’s _______ layer.

Answer

Data link

Physical

Transport

Network

Question 33

The _______ layer of the OSI model serves as the window through which applications access network services.

Answer

Application

Presentation

Network Data link

Question 34

The _______ topology is costly and difficult to maintain and expand.

Answer

star

mesh

ring

bus

Question 35

The most common n-tier architecture involves _______ tiers.

Answer

two

three

four

five

Question 36

A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.

Answer

podcast

RSS feed

blog wiki

Question 37

Which of the following protocols is used for retrieving messages?

Answer

SMTP

POP

HTTP

VoIP

Question 38

A(n) ____ is the address of a document or site on the Internet.

Answer

TLD

URL

IP

DNS

Question 39

The Federal Express Tracking System allows customers to enter a package’s tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.

Answer

intranet

Internet

extranet

DMZ

Question 40

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.

Answer

podcast

RSS feed

blog

wiki

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"