What must a DBMS have?

What must a DBMS have?



A. Word processor
B. None of these options
C. Web access
D. DB Engine


Answer: D

How does a database store data?

How does a database store data?



A. Relationships are initiated with foreign keys
B. In tables that consist of rows and columns
C. Each row in each table is unique by way of a primary key
D. All of these options


Answer: D

What are "islands of information?"

What are "islands of information?" 



A. Separate pool of redundant data spread throughout the organization
B. Centralized deposit of data
C. Any of these option
D. Non repeated data


Answer: A

Why do computers have power supply units?

Why do computers have power supply units?



A. In order to increase the power for computers
B. None of these
C. In order to convert alternative current to direct current
D. In order to act as a backup to power in case power is lost


Answer: C

The JPEG fie type stores images in what way?

The JPEG fie type stores images in what way?



A. Higher Quality lossless files with compression
B. Higher quality lossy files with compression
C. Lower quality lossy files with compression
D. Lower quality lossless files with compression


Answer: C

What is the best definition of an information system?

What is the best definition of an information system?



A. A technical system that that has been socially implemented
B. The emergent result of the mutually transformational interactions between the IT and the organization
C. The combination of data, databases, processes, and information
D. All options are correct


Answer: C

What is an example of Artificial Intelligence circa 2017?

What is an example of Artificial Intelligence circa 2017?


a.They are self aware
b.They can diagnose medical issues with high levels of accuracy
c.They can treat humans with mental illnesses
d.All of these


Answer: b.They can diagnose medical issues with high levels of accuracy

What was George Hotz known for in the Intellectual Property arena?

What was George Hotz known for in the Intellectual Property arena?


a.Founding PirateBay
b.Hacking Visa's payment systems
c.Tearing down a PS2 to hack the motherboard and sharing that on YouTube
d.Leaking government documents via WikiLeaks


Answer: c.Tearing down a PS2 to hack the motherboard and sharing that on YouTube

What is an example of a deontological approach to ethics?

What is an example of a deontological approach to ethics?


a.Killing baby Hitler to prevent World War II
b.Lying to your spouse in order to make them feel better about themselves
c.Allowing your friend to die since stealing the medicine to heal them is wrong
d.None of these


Answer: c.Allowing your friend to die since stealing the medicine to heal them is wrong

How can firewalls be defeated?

How can firewalls be defeated?


a.Antisocial engineering
b.Front Door Attacks
c.Brute force attacks
d.Phone phreaking


Answer: c.Brute force attacks

What ended up killing the Phone phreaking movement?

What ended up killing the Phone phreaking movement?


a.Lack of Media attention
b.Parasites using tools to manipulate the system after exposure by the media
c.Laws allowing the use of a blue box
d.All of the above


Answer: b.Parasites using tools to manipulate the system after exposure by the media

Modern hacking is said to have originated with which group?

Modern hacking is said to have originated with which group?


a.Phone phreakers, who manipulated telephone company employees
b.Anonymous
c.Wozniak's Hackers of America
d.Microsoft


Answer: a.Phone phreakers, who manipulated telephone company employees

A Denial of Service attack involves what?

A Denial of Service attack involves what?


a.Flooding a server with so many hits that it shuts down
b.Distributing viruses
c.Activating zombies on a botnet
d.Spoofing


Answer: a.Flooding a server with so many hits that it shuts down

How was the hacker Captain Crunch (John Draper) named?

How was the hacker Captain Crunch (John Draper) named?


a.He could crunch numbers in head so quickly that he could beat most calculators
b.He popularized the use of the Cap'n Crunch whistle to break into phone systems
c.He really liked cereal
d.He broke motherboards


Answer: b.He popularized the use of the Cap'n Crunch whistle to break into phone systems

What is the difference between hackers and script kiddie?

What is the difference between hackers and script kiddie?


a.The former are problem solvers and the latter have mal intent with little problem solving skills
b.They are the same
c.The hackers break into systems illegally
d.None of the above


Answer: a.The former are problem solvers and the latter have mal intent with little problem solving skills

A DNS attack will

A DNS attack will


a.Kill a firewall
b.Reroute a request for a web page
c.Crash a server
d.Disable a virus scanner


Answer: b.Reroute a request for a web page

Why did the average losses per company decrease after 2001

Why did the average losses per company decrease after 2001


a.Managers realized that an ROI of 0 was superior to millions in losses
b.The formal approach to security started to take hold
c.Awareness of the problem became prevalent
d.All of the above


Answer: d.All of the above

What is a difference between personal and organizational security?

What is a difference between personal and organizational security?


a.Organizational security must account for many people accessing the system
b.Organizations have to maintain vastly more complex data sets
c.Organizations must comply with data privacy laws
d.All of these


Answer: d.All of these

What is a "Blue Box" within the context of Computer Security?

What is a "Blue Box" within the context of Computer Security?


a.A tool used by the FBI to record emails
b.A method of encryption
c.A tool created by early hackers to hack into phone systems
d.A high end "hacking computer"


Answer: c.A tool created by early hackers to hack into phone systems

What is a similarity between personal and organizational security?

What is a similarity between personal and organizational security?


a.They both have to be aware of internal threats
b.They both use some similar technical tools such as firewalls and virus scans
c.They both require security policies to ensure total security is achieved
d.All of the above


Answer: b.They both use some similar technical tools such as firewalls and virus scans

What does Blockchain mean?

What does Blockchain mean?


a.the place in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor
b.a set of rules that governs the delivery of data over the Internet or other network that uses the Internet Protocol, and sets up a connection between the sending and receiving computers
c.a digital media transport system that runs over standard IP networks
d.a digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly


Answer: d.a digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly

Why did losses due to security breaches peak in 2001/2002?

Why did losses due to security breaches peak in 2001/2002?


a.Al Qaida was invested in attacking our corporate infrastructure
b.Businesses were getting online as a result of the dot com boom and were not dealing with security
c.More criminals were active
d.Internal threats were more prevalent


Answer: b.Businesses were getting online as a result of the dot com boom and were not dealing with security

How does the general public view hackers?

How does the general public view hackers?


a.As a diverse group with differing views of how hacking should be done
b.As a generally good group that tries to help when it can
c.As a generally bad group whose sole motivation is malicious
d.None of the above


Answer: c.As a generally bad group whose sole motivation is malicious

Kevin Kelly (5000 days of the web video) described what people thought the Web would be in the future back when the web first started. What was this prediction?

Kevin Kelly (5000 days of the web video) described what people thought the Web would be in the future back when the web first started. What was this prediction?


a.The Web would be like TV but better
b.The Web would have a lot of free services
c.The Web would grow at a slow and steady pace
d.All of the above


Answer: a.The Web would be like TV but better

What are three types of 3D printing?

What are three types of 3D printing?


a.Intrusion, wire, and bio
b.Extrusion, granular, and bio
c.Bio, extrusion, and modular
d.Modular, Intrusion, and extrusion


Answer: b.Extrusion, granular, and bio

Your instructor felt which way about Genetically Modified Organisms and food production?

Your instructor felt which way about Genetically Modified Organisms and food production?


a.He agreed with the plurality of scientists that supported it
b.He agreed with the activist groups who claim it is inherently dangerous and untested
c.He felt that genetic modification was appropriate in some cases but not most
d.None of the above


Answer: a.He agreed with the plurality of scientists that supported it

How might cancer be treated in the future?

How might cancer be treated in the future?


a.Via personalized medicine
b.Via nanotech robots that physically remove cancer cells
c.Via genetic analysis and treatment
d.All of these


Answer: d.All of these

What is the singularity?

What is the singularity?


a.The theoretical emergence of greater than human superintelligence through technological means
b.Humans merging with machines
c.The edge of the atmosphere
d.A and B


Answer: d.A and B

Which of the following situations is ethical?

Which of the following situations is ethical?


a.You violate an End User License Agreement (EULA) in order to make a copy of copyright protected software for the purpose of personal backup
b.You violate a EULA in order to make a copy of copyright protected software for the purpose of sharing with a friend
c.Your bank sells your information to a 3rd party without your permission
d.None of the above is ethical


Answer: a.You violate an End User License Agreement (EULA) in order to make a copy of copyright protected software for the purpose of personal backup

What are the basic logic structures used in programming?

What are the basic logic structures used in programming?


a.SQL, COBOL, Java, and Assembly
b.Tables, arrays, and characters
c.Sequential, conditional, and iterative
d.Sequential, step-by-step, and looping


Answer: c.Sequential, conditional, and iterative

What does COBOL stand for?

What does COBOL stand for?


a.It doesn't stand for anything; it's just "COBOL"
b.Codefied Boolean Language
c.Coded Object Binary Oliniated Language
d.Common Business Oriented Language


Answer: d.Common Business Oriented Language

When developing a program, what is the correct order of activities?

When developing a program, what is the correct order of activities?


a.Plan > Analyze > Design > Implement > Operation
b.Design > Analyze > Plan > Implement > Operation
c.Analyze > Plan > Operation > Design > Implement
d.Plan > Analyze > Operation > Design > Implement


Answer: a.Plan > Analyze > Design > Implement > Operation

What is a program?

What is a program?


a.A set of instructions
b.An algorithm
c.All of these
d.An executable file that does something on a computer


Answer: c.All of these

Concerning 4th generation languages

Concerning 4th generation languages


a.Both the 2nd and 3rd options
b.The general consensus is that SQL is the 4th generation
c.The instructor feels we need "Natural Language" and Artificial Intelligence in order to achieve the 4th gen
d.There is debate as to whether or not we have a 4th generation


Answer: a.Both the 2nd and 3rd options

What does a modem do?

What does a modem do?


a.Modulate analog signals and demodulate digital signals
b.All of these
c.Transform wifi signals to digital signals in the computer
d.Convert alternating current to direct current


Answer: a.Modulate analog signals and demodulate digital signals

What is HTML?

What is HTML?


a.All of these
b.A formatting language
c.A procedural programming language
d.A data definition language


Answer: b.A formatting language

When considering the WWW and the Internet

When considering the WWW and the Internet


a.The Internet is part of the WWW
b.They are completely different and not related
c.The WWW is part of the Internet
d.They are the same thing


Answer: c.The WWW is part of the Internet

What does Tim Berners-Lee think about Web 2.0?

What does Tim Berners-Lee think about Web 2.0?


a.He does not think it is a real thing
b.He believes it is a great innovation
c.He directly created it
d.He has no opinion


Answer: a.He does not think it is a real thing

What does P2P stand for?

What does P2P stand for?


a.Point to Point
b.Peer to Peer
c.Ping to Ping
d.Protocol to Protocol


Answer: b.Peer to Peer

How can Web 2.0 be defined?

How can Web 2.0 be defined?



a.Emailing files
b.Using gif files
c.All of these
d.Participatory information sharing


Answer: d.Participatory information sharing

Why does the Internet utilize both TCP and IP?

Why does the Internet utilize both TCP and IP?


a.To maximize speed and maximize errors
b.To minimize speed and maximize errors
c.To minimize speed and minimize errors
d.To maximize speed and minimize errors


Answer: d.To maximize speed and minimize errors

What are some of the benefits of online for profit schools?

What are some of the benefits of online for profit schools?


a.Name recognition and reputation of institutions
b.You don't have to go in to class and can set your own schedule
c.Close relationships with professors
d.Cheaper tuition than traditional schools


Answer: b.You don't have to go in to class and can set your own schedule

What are the benefits of gaming?

What are the benefits of gaming?


a.Ergonomic results of sedentary lifestyle
b.Potential mental health issues
c.All of the above
d.Better judgment times in independent tests and increased hand-eye coordination


Answer: d.Better judgment times in independent tests and increased hand-eye coordination

The 16 bit header checksum in an Internet packet is used to

The 16 bit header checksum in an Internet packet is used to



a.Hold the data in the packet
b.Tell routers where the packet is going
c.Tell routers where the packet is
d.Allow error checking of the packet


Answer: d.Allow error checking of the packet

What protocol is used for web pages?

What protocol is used for web pages?




a.Hypertext Transfer Protocol
b.None of the above
c.File Transfer Protocol
d.Simple Mail Transfer Protocol


Answer: a.Hypertext Transfer Protocol