SlideShare a Scribd company logo
Database
 1. Which of the following is NOT a characteristic of a distributed database?
    A: Data may be spread across several smaller databases connected via telecommunications devices.
    B: It enables local offices to create, manage, and use their own databases.
    C: It gives local sites more direct access to frequently-used data.
    D: It eases issues associated with who can access and change data.
 2. The ____is a nontechnical, but important role that ensures that data is managed as an important
    organizational resource.
    A: data manager
    B: data administrator
    C: database administrator
    D: database manager
 3. _____ is a popular database management system developed by Microsoft and frequently used on
    personal computers.
    A: Access
    B: Excel
    C: DB2
    D: Informix
 4. In the relational data model, each row of the table represents a ____.
    A: data attribute
    B: data entity
    C: primary key
    D: relationship
 5. The ____ design of a database involves identifying the relationships among the different data items
    and grouping them in an orderly fashion.
    A: detailed
    B: enterprise
    C: physical
    D: logical
 6. The repetition of data in separate files is known as ____.
    A: data integrity
    B: program-data dependence
    C: data redundancy
    D: data independence
 7. An information analysis tool that involves the automated discovery of patterns and relationships in a
    data warehouse is called ____.
    A: a data mart
    B: a data base query
    C: data management
    D: data mining
 8. The ____ allows managers and other database users to access, modify, and make queries about data
    contained in the database to generate reports.
    A: database query language
    B: database report writer
    C: data definition language
    D: data manipulation language
 9. The definition of the logical and physical structure of the data and relationships among the data in the
    database is called the ____.
    A: logical data model
    B: physical data model
    C: schema
    D: data definition language
10. In the relational data model, the columns of the table represent ____.
    A: domains
    B: entities
    C: attributes
    D: access paths
11. A situation where programs and data developed and organized for one application are incompatible
    with programs and data organized differently for another application is called ____.
    A: data redundancy
    B: program-data dependence
    C: the traditional approach to data management
    D: data integrity
12. A highly skilled and trained systems professional who directs or performs all activities related to
    maintaining a successful database environment is called a(n) ____.
    A: database administrator


                                                 Page 1 of 10
B: data administrator
   C: data resource manager
   D: information resource manager
13. A _____ works with users to decide the content of the database, to create a logical database model to
    meet the needs of the users, to document the numbers and frequency of the different kinds of data
    requests to be made, and to define the data-edit changes and controls needed for the database.
    A: system administrator
    B: data administrator
    C: database administrator
    D: systems analyst
14. Software packages, often written in the Java programming language for use on computers that are
    running the Windows NT operating system, that connect end users to databases holding the
    information they need to access are called ____.
    A: DBMSs
    B: application servers
    C: data warehouses
    D: data mining
15. A(n) ____ is a database that holds business information from many sources in the enterprise, covering
    all aspects of the company's processes, products, and customers.
    A: OLTP database
    B: data storage bin
    C: data warehouse
    D: transactional database
16. ____ is the process of capturing a company's collective expertise wherever it resides and distributing it
    wherever it can help produce the biggest payoff.
    A: competitive intelligence
    B: counterintelligence
    C: knowledge management
    D: business intelligence
17. A character of information is represented by a(n)____.
    A: bit
    B: byte
    C: field
    D: attribute
18. A field or set of fields in a record that uniquely identifies the record is called a(n) ____.
    A: attribute
    B: hierarchy of data
    C: entity
    D: primary key
19. A(n) _____ data model depicts an owner-member relationship in which a member can have many
    owners.
    A: relational
    B: hierarchical
    C: network
    D: E-R
20. Once data has been placed into a relational database, users can make inquires and analyze data. ____
    involves eliminating rows in the data table according to certain criteria.
    A: data normalizing
    B: joining
    C: projecting
    D: selecting
21. The most widely used database model is the ____ model.
    A: enterprise
    B: hierarchical
    C: network
    D: relational
22. The _____ data model describes data using a standard tabular format.
    A: network
    B: E-R diagram
    C: network
    D: relational
33. The term ____ is sometimes used to describe how well a database performs as the size of the database
    or the number of concurrent users is increased.
    A: data integrity
    B: database size
    C: integration


                                                  Page 2 of 10
D: scalability
34. Which of the following is NOT an expectation of the database administrator?
    A: have a clear understanding of the fundamental business of the organization
    B: be proficient in the use of selected database management systems
    C: stay abreast of emerging technologies and new design approaches
    D: set data standards and data definitions that apply across the many databases that an organization
    may have
35. Which of the following statements about SQL is NOT true?
    A: SQL stands for "standard query language."
    B: It was developed in the 1970s at the IBM Research Laboratory in San Jose, California.
    C: The American National Standards Institute adopted SQL as the standard query language for relational
    databases in 1986.
    D: uses standardized and simplified procedures for retrieving, storing, and manipulating data in a database
    system.
36. To use the database approach to data management, additional software called a(n) ____is required.
    A: data resource manager
    B: database management system
    C: application manager
    D: database manager


Network and Internet
47. ___ enables information to be transmitted to your computer directly, as digital data, over existing
    phone wires at a speed exceeding 500 Kbps.
    A: ISDN
    B: WATS
    C: DSL
    D: T1
48. The ____ signal is a continuous, curving signal.
    A: analog
    B: digital
    C: binary
    D: modulated
49. A coaxial cable consists of an inner conductor wire surrounded by insulation, called the ____.
    A: jacket
    B: dielectric
    C: conductive shield
    D: insulator
50. A ____ consists of communications media, devices, and software needed to connect two or more
    computer systems and/or devices.
    A: telecommunications model
    B: computer network
    C: local area network
    D: wide area network
51. Which of the following statements about the use of telecommuting is NOT true?
    A: Public policy often encourages companies to consider the use of telecommuting.
    B: Almost all jobs and all employees can use telecommuting to improve their effectiveness.
    C: Telecommuting can enable people who are not able to participate in the normal workforce to become
    productive workers.
    D: Telecommuting is often convenient for workers and can also lead to reduced corporate costs.
52. ____ is systems software that controls the computer systems and devices on a network and allows them
    to communicate with each other.
    A: Communications software
    B: A network operating system
    C: Network management software
    D: Network software
53. In a ____ network, each computer is set up as an independent computer. However, other computers
    can still access specific files on each computer's hard drive or share its printer. These types of networks
    have no server.
    A: bus
    B: local area
    C: peer-to-peer
    D: client/server
54. ____ digital networks are typically faster (from 64 Kbps to 2 Mbps) than standard phone lines and carry
    more signals than analog networks.
    A: ISDN


                                                   Page 3 of 10
B: DSL
   C: T1
   D: DSL
55. Extracting data from a composite analog signal to a digital signal is called ____.
    A: modulating
    B: demodulating
    C: digitizing
    D: converting
56. ___ is a form of transmission media that transmits signals using light beams generated by lasers.
    A: Coaxial cable
    B: Microwave
    C: Twisted pairs of wires
    D: Fiber-optic cable
57. Which of the following is NOT a form of communications channel?
    A: simplex
    B: complex
    C: half-simplex
    D: full-duplex
58. ___ is an intercompany, application-to-application communication of data in a standard format that
    permits the recipient to perform a standard business transaction.
    A: EDI
    B: Electronic document distribution
    C: Data switching
    D: MMDS
59. Most ____ provide(s) error checking and message formatting.
    A: communications software
    B: network operating systems
    C: network management software
    D: SNMP software
60. The world's largest public international network is ____.
    A: the UPSNet
    B: the WWW
    C: the WAN
    D: the Internet
61. The ____ was developed by AT&T to increase the number of voice calls that could be handled through
    existing cables. It has a speed of 1.544 Mbps developed from two dozen 64-Kbps channels, together
    with one 8-Kbps channel for carrying control information.
    A: ISDN
    B: DSL
    C: T1 carrier
    D: POTS
62. A telecommunications device that allows several signals to be transmitted over a single
    telecommunications medium at the same time is a ____.
    A: modem
    B: multiplexer
    C: front-end processor
    D: switched line processor
63. Which transmission media is most difficult to "tap into" to intercept communications?
    A: twisted pairs
    B: coaxial cable
    C: microwave
    D: fiber-optic cable
64. A form of communications channel that can transmit data in either direction, but not simultaneously, is
    called ____.
    A: simplex
    B: half-duplex
    C: complex
    D: full-duplex
65. ____ give(s) personal computer users access to vast databases, the Internet, and other services.
    A: Distance learning
    B: Electronic document distribution
    C: Video conferencing
    D: Public network services
66. Rules that ensure communications among computers of different types and from different
    manufacturers are called ____.
    A: OSI models

                                                Page 4 of 10
B: TCP/IP
    C: SNAs
    D: protocol
67. The term "____" refers to telecommunications in which a wide band of frequencies is available to
    transmit information, and this allows for more information to be transmitted in a given amount of time.
    A: baseband
    B: narrowband
    C: bandwidth
    D: broadband
68. ____ states that the information-carrying capacity of a channel is directly proportional to its bandwidth.
    A: Moore's law
    B: Shannon's fundamental law of information theory
    C: Law of entropy
    D: Electromagnetic theory
69. A ____ is placed in a computer's expansion slot to allow it to communicate with the local area network.
    A: network interface card
    B: modem
    C: network operating system
    D: connector
70. The ____ is a logical model that describes how networks are structured or configured.
    A: transmission protocol
    B: client/server architecture
    C: network topology
    D: OSI model
71. _____ is a specialized subset of telecommunications that refers to the electronic collection, processing,
    and distribution of data, typically between computer system hardware devices.
    A: Computer networking
    B: Business telecommunications
    C: Asynchronous communications
    D: Data communications
72. A basic processing strategy where all processing occurs in a single location or facility is called ____.
    A: centralized processing
    B: multiprocessing
    C: decentralized processing
    D: distributed processing
73 A ____ carries a signal between sender and receiver.
   A: modem
   B: transmitter
   C: computer network
   D: communications medium
74. ____ is a billing method for heavy users of voice services.
    A: WATS
    B: POTS
    C: DSL
    D: PBX
75. The wired connection between your home or small business and the central office is called the ____.
    A: switched line
    B: local area network
    C: local loop
    D: PBX
76. A telecommunications device that can break a network into subnets and can also determine preferred
    transmission paths to a final destination is called a ____.
    A: gateway
    B: switch
    C: bridge
    D: router
77. ____ is the most-widely installed LAN technology, and it is specified in the IEEE 802.3 standard.
    A: ATM
    B: SNA
    C: Ethernet
    D: Bluetooth
78. ____ transmission requires line-of-sight transmission and short distances (under a few hundred yards)
    to connect various devices and computers.
    A: Microwave
    B: Cellular
    C: Infrared

                                                 Page 5 of 10
D: Fiber-optics
79. Terrestrial microwave stations are usually placed in series from ____ to ____ miles apart before the
    curvature of the earth makes it impossible for the towers to "see one another."
    A: 1 to 10
    B: 10 to 30
    C: 30 to 70
    D: 70 to 100
80. Which of the following is NOT considered an advantage of the client/server approach?
    A: reduced costs
    B: improved performance
    C: increased security
    D: simplified vendor environment
81. The speed at which signals can be transmitted depends on the ____.
    A: channel capacity
    B: channel media
    C: channel bandwidth
    D: channel format
82. Both voice and phone conversations are examples of ____, where the receiver gets the message
    instantaneously, when it is sent.
    A: synchronous communications
    B: data communications
    C: asynchronous communications
    D: broadband communications
83. A telecommunications line that allows one transmission device to connect to other transmission
    devices is called a ____.
    A: dedicated line
    B: multiplexed line
    C: duplexed line
    D: switched line
84. ____ is a business application of networks that involves installing software on a file server for users to
    share.
    A: EDI
    B: Electronic software distribution
    C: Electronic document distribution
    D: File server
85. The two most common forms of communications satellites are ____ and ____.
    A: business and military
    B: geostationary and line-of-sight
    C: terrestrial and extra-terrestrial
    D: geostationary and low-earth-orbit
86. The term "____" refers to telecommunications in which a wide band of frequencies is available to
    transmit information, and this allows for more information to be transmitted in a given amount of time.
    A: baseband
    B: narrowband
    C: bandwidth
    D: broadband
87. ____ twisted-pair wire cable has a special conducting layer within the normal insulation, which makes
    the cable less prone to electrical interference, or "noise."
    A: Unshielded
    B: UTP
    C: Shielded
    D: Category 1
88. Countries that have few laws concerning telecommunications and databases are called ____.
    A: transborder data flow countries
    B: data pirates
    C: data havens
    D: data entry ports
89. ____ is a way to connect computers where the applications and database reside on one host computer,
    and the user interacts with the application and data using a "dumb" terminal.
    A: File server
    B: Terminal-to-host
    C: Client/server
    D: Distributed computing
90. A ____ network has a central hub with devices located at the end of the communications line that
    originate from the central hub.
    A: bus

                                                 Page 6 of 10
B: hybrid
    C: star
    D: ring
91. In the ____ architecture, the entire file is downloaded from the host computer to the user's computer in
    response to a request for data.
    A: centralized computing
    B: file server
    C: client/server
    D: distributed computing
92. ____ is a communications standard that simplifies communications among cell phones, handheld
    computers, and other wireless devices.
    A: ATM
    B: Bluetooth
    C: MMDS
    D: SNA
93. Each type of telecommunications media uses different types of ____ to link them to devices.
    A: modems
    B: connectors
    C: links
    D: channels
94. A ____ is a communications system that can manage both voice and data transfer within a building
    and to outside lines.
    A: multiplexer
    B: PBX
    C: local loop
    D: switched line
95. A strategy for processing where computers are placed at remote locations but connected to each other
    via telecommunications devices is called ____.
    A: multiprocessing
    B: distributed processing
    C: centralized processing
    D: decentralized processing

96. Which of the following statements is NOT true about push technology?
    A: The use of push technology is also frequently referred to as "Webcasting."
    B: Most push systems rely on HTTP or Java technology to collect content from Web sites and deliver it
    to a central server for users to access.
    C: Before they can automatically receive "pushed" information, users must download and install software that
    acts like a TV antenna, capturing transmitted content.
    D: The use of push technology can lead to information overload and clog up communications links with traffic.
97. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which
    provides a graphical interface to the Web.
    A: CSS
    B: Java program
    C: Web browser
    D: search engine
98. ___ is one of the leaders in instant messaging. Approximately 40 million people use its Instant
    Messenger and approximately 50 million people use its client program, ICQ.
    A: Yahoo!
    B: Microsoft
    C: Prodigy
    D: America Online
99. ____ is a protocol that describes how groups of messages can be stored on and sent between
    computers. It is used to form a virtual forum for the electronic community, and this forum is divided
    into newsgroups.
    A: PPP
    B: Usenet
    C: Instant messaging
    D: E-mail
100. The ____ is used as a standard way to designate where Internet elements such as servers, documents,
     newsgroups, etc. can be found.
     A: seven-layer OSI model
     B: TCP/IP
     C: URL
     D: e-mail address
101. ____ is a technique used to verify the identity of a message sender for processing on-line financial


                                                 Page 7 of 10
transactions. The technique uses public key encryption and a "hashing" algorithm that prevents the
     reconstruction of the original message.
     A: Cryptography
     B: Tunneling
     C: Digital signature
     D: XML
102. ____ is a secure connection between two points across the Internet.
     A: A tunnel
     B: A VPN
     C: VOIP
     D: An extranet
103. ____ was established in 1991 to enable businesses to connect to the Internet
     A: SAP
     B: Commercial Internet Exchange
     C: EDI
     D: E-commerce Interchange
104. A(n) ____ submits keywords to several individual search engines and returns the results from all search
     engines queried.
     A: Web browser
     B: search engine
     C: meta-search engine
     D: applet
105. A(n) ____ device prepares voice transmission using voice-over-IP by squeezing the recorded sound
     data and slicing it for packets for transfer over the Internet.
     A: modem
     B: PBX
     C: codec
     D: router
106. Using ____ technology, network managers can route phone calls and fax transmissions over the same
     network that they use for data.
     A: voice-over-IP
     B: content streaming
     C: hypermedia
     D: XML
107. In analyzing a web address such as http://www.course.com, which of the following statements is
     NOT true?
     A: The "http" specifies the access method and tells your software to access this particular file using the
     HyperText Transport Protocol.
     B: The "www" part of the address signifies that the address is associated with the World Wide Web service.
     C: The "course.com" part of the address is the domain name that identifies the Internet host site.
     D: For all countries, except the United States, Canada, and Mexico, the right most part of the domain
     name is the country code.
108. A ____ is a device that sits between your internal network and the Internet and limits access into and
     out of your network based on your organization's access policy.
     A: firewall
     B: virtual private network
     C: router
     D: tunnel
109. A(n)____ is a network that links selected resources of a company's intranet with its customers,
     suppliers, or other business partners. It is built on Web technologies.
     A: internet
     B: extranet
     C: WAN
     D: VPN
110. Which of the following statements about HTML is NOT true?
     A: It represents an evolving standard page description language for Web pages.
     B: Various vendors have added new tags to the standard that only work for that vendor's Web browser.
     C: Regardless of minor inconsistencies, all browsers work the same way when used to view the same
     Web page.
     D: Many word processor programs can actually generate the HTML needed to create a Web page.
111. Which of the following statements about obtaining "free" information from the Internet is NOT true?
     A: The Web browser software is used to locate those Web pages that match the keywords you specify.
     B: Free information and advice may not always be, unbiased, truthful, or helpful.
     C: Free services can change or even stop their offerings with little or no warning.
     D: Useful software can be found and downloaded at no cost.
112. ____ is a method of transferring multimedia files over the Internet so that the data stream of voice and


                                                 Page 8 of 10
pictures plays more or less continuously.
     A: FTP
     B: VOIP
     C: Content streaming
     D: Instant messaging
113. People who have registered domain names in the hope of selling the names to corporations or people
     at a later date are called ____.
     A: Web blackmailers
     B: cyber-squatters
     C: URL grabbers
     D: domain stealers
114. Which of the following tasks is NOT performed by a firewall?
     A: It permits e-mail from selected users outside your company to pass through to your employees.
     B: It prevents your employees from accessing selected Web sites.
     C: It prevents users on remote systems from logging onto your network computers using the telnet utility.
     D: It routes messages in the most efficient manner.
115. A(n) ____ is an internal corporate network built using Internet and World Wide Web standards.
     A: virtual private network
     B: LAN
     C: extranet
     D: intranet
116. ____ and ____ are two communications protocols that transmit data packets over telephone lines,
     allowing dial-up access to the Internet.
     A: TCP and IP
     B: SLIP and PPP
     C: Telnet and FTP
     D: Usenet and Instant messaging
117. The set of conventions used to pass packets of data from one host computer to another on the Internet
     is called the ____.
     A: telnet
     B: Internet protocol (IP)
     C: the seven-layer OSI model
     D: uniform resource locator (URL)
118. Which of the following identifies a set of emerging standards for describing Web documents?
     A: XML, XHTML, CSS, and DHMTL
     B: ICQ, Java, and hypermedia
     C: Netscape Navigator and Internet Explorer
     D: CIX, HTTP, and URL
119. Which of the following statements about usage of the Internet is NOT true?
     A: It is possible to listen to radio telecasts and view interactive talk shows.
     B: Some corporations have started to use Internet video to broadcast corporate messages or to advertise on the
     Web.
     C: Doctors are reluctant to use Internet video to monitor and control surgical operations.
     D: Employees can connect to the workplace via a virtual office on the Web.
120. Which of the following statements is NOT true about the building and use of an intranet?
     A: Most employees will require considerable training to make effective use of their corporate intranet.
     B: Most companies already have the foundation for an intranet: a network that uses the Internet's TCP/IP
     protocol and computers with Web browser software.
     C: Use of an intranet can lead to a substantial reduction in the need for paper.
     D: An intranet can pull all corporate computers, software, and databases into a single system that enables
     employees to find information wherever it resides.
121. Any company that provides individuals and organizations with access to the Internet is called a(n)
     ____.
     A: registrar
     B: backbone
     C: ISP
     D: PPP
122. Which of the following statements about the use of Java applets is NOT true?
     A: Java software runs not only on Sun Microsystems computers but on other computers as well.
     B: Java is used by programmers to make Web pages "come alive," adding graphics, animation, and real-time
     updates.
     C: Java enables software writers to create compact "just-in-time" programs that can be dispatched across a
     network such as the Internet.
     D: A Web page with an embedded Java applet contains an additional HTML tag called JAV, which
     refers to the Java applet.
123. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which


                                                   Page 9 of 10
provides a graphical interface to the Web.
     A: CSS
     B: Java program
     C: Web browser
     D: search engine
124. What Internet service enables two or more people to engage in on-line, interactive "conversation?"
     A: Usenet
     B: Newsgroups
     C: Content streaming
     D: Chat rooms
125. A(n) ____ is a Web site that contains files, phone numbers, e-mail addresses, and appointment
     calendar. It essentially allows your desktop computer, phone books, appointment scheduler, and other
     important information to be with you wherever you are.
     A: telecommuting Web site
     B: Internet office
     C: virtual office
     D: home page
126. ____ is the process of converting a message into a secret code and changing the encoded message
     back to regular text.
     A: Encryption
     B: Fraud
     C: Encoding
     D: Cryptography
127. Which of the following statements about the World Wide Web is NOT true?
     A: The Web was developed by Tim Berners-Lee at CERN in Geneva, and he conceived of it as a way to
     manage documents.
     B: The Web has grown to a collection of tens of thousands of independently-owned computers that work
     together as one Internet service.
     C: The Web is a menu-based system that uses the file-server model.
     D: An ordinary phone line connection to the Internet is unlikely to provide sufficient speed for a satisfactory
     Web experience.




                                                    Page 10 of 10

More Related Content

PPTX
Computer Networking Multiple Choice Questions
PDF
Collection of-cs-multiple-choice-questions-mcqs
PDF
Collections of CS Multiple Choice Questions
PDF
Computer Networking Multiple Choice Questions
PDF
computer communication networks MCQs
PDF
Computer networking short_questions_and_answers
PDF
[Mcq] computer communication networks lmt2
Computer Networking Multiple Choice Questions
Collection of-cs-multiple-choice-questions-mcqs
Collections of CS Multiple Choice Questions
Computer Networking Multiple Choice Questions
computer communication networks MCQs
Computer networking short_questions_and_answers
[Mcq] computer communication networks lmt2

What's hot (20)

DOCX
Mcq in int
PPTX
Networking Basic MCQ's TEST
PPTX
Lecture 04 Chapter 1 - Introduction to Parallel Computing
DOCX
Computer Network Unit I RGPV
PDF
Examination paper system maagement & operating systems
PDF
Examination paper system maagement operating systems
PPTX
Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...
PDF
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
PDF
Solution manual for_data_communications
PPT
Human Interface & Multimedia
DOCX
Mis 589 entire course (networking concepts and application)
PDF
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
PDF
Computer netwrks
PDF
All nsbm exam papers
PDF
CS6601 DISTRIBUTED SYSTEMS
PPTX
Lecture 02 - Chapter 1 (Part 02): Grid/Cloud Computing Systems, Cluster Comp...
PDF
basics of computer network
PPT
Network (IP)
PDF
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
Mcq in int
Networking Basic MCQ's TEST
Lecture 04 Chapter 1 - Introduction to Parallel Computing
Computer Network Unit I RGPV
Examination paper system maagement & operating systems
Examination paper system maagement operating systems
Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
Solution manual for_data_communications
Human Interface & Multimedia
Mis 589 entire course (networking concepts and application)
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
Computer netwrks
All nsbm exam papers
CS6601 DISTRIBUTED SYSTEMS
Lecture 02 - Chapter 1 (Part 02): Grid/Cloud Computing Systems, Cluster Comp...
basics of computer network
Network (IP)
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
Ad

Viewers also liked (20)

PDF
Educational media and technology solved multiple choice questions
DOCX
Educational technology
PPT
Educational Technology Exam
PPT
Educational Technology Exam Review
PDF
Computer graphics mcq question bank
PDF
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
PDF
LET Practice test in Professional Education-principles and strategies in teac...
PDF
MCQ on Computer and ICT
PDF
Computer Graphics MCQ's
DOCX
Multiple choice quiz for introductions to computers
PPTX
LET sample questions - professional education set 1
PPTX
Let reviewer prof ed
PDF
Information systems by checkmate...
PPSX
Educational technology 1
PDF
Mcq in computer science by timothy j williams
PPT
Professional Education Reviewer
PDF
Operating Systems MCQ Bank from mcqSets.com
PDF
DBMS Multiple Choice Questions
PDF
Introduction to visual DSP++ Kernel
PPT
Educational media and technology solved multiple choice questions
Educational technology
Educational Technology Exam
Educational Technology Exam Review
Computer graphics mcq question bank
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
LET Practice test in Professional Education-principles and strategies in teac...
MCQ on Computer and ICT
Computer Graphics MCQ's
Multiple choice quiz for introductions to computers
LET sample questions - professional education set 1
Let reviewer prof ed
Information systems by checkmate...
Educational technology 1
Mcq in computer science by timothy j williams
Professional Education Reviewer
Operating Systems MCQ Bank from mcqSets.com
DBMS Multiple Choice Questions
Introduction to visual DSP++ Kernel
Ad

Similar to Mcq for final (20)

PDF
34 Multiple choice questions, 3 points each t1. The practice of be.pdf
PDF
SBI IT (Systems) Assistant Manager Question Paper
PDF
Database MCQ (DBMS Most Important Question)
PDF
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
PDF
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
PDF
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
DOCX
Bis 219 final exam mcq`s correct answers 100%
DOCX
Bis 219 final exam mcq`s correct answers 100%
DOCX
(New) final exam for bis 219 all correct answers 100%
DOCX
(New) final exam for bis 219 all correct answers 100%
DOCX
(New) final exam for bis 219 bis 219 all correct answers 100%
PDF
Management Information Systems 6th Edition Oz Test Bank
PDF
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
PDF
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
DOCX
A ____________ is a disconnected, memory-resident representation o.docx
PDF
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
PDF
Management Information Systems 6th Edition Oz Test Bank
PDF
Management Information Systems 6th Edition Oz Test Bank
PDF
Immediate download Management Information Systems 6th Edition Oz Test Bank al...
PDF
Management Information Systems 6th Edition Oz Test Bank
34 Multiple choice questions, 3 points each t1. The practice of be.pdf
SBI IT (Systems) Assistant Manager Question Paper
Database MCQ (DBMS Most Important Question)
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
Bis 219 final exam mcq`s correct answers 100%
Bis 219 final exam mcq`s correct answers 100%
(New) final exam for bis 219 all correct answers 100%
(New) final exam for bis 219 all correct answers 100%
(New) final exam for bis 219 bis 219 all correct answers 100%
Management Information Systems 6th Edition Oz Test Bank
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
A ____________ is a disconnected, memory-resident representation o.docx
Business Driven Management Information Systems 3rd Edition Baltzan Test Bank
Management Information Systems 6th Edition Oz Test Bank
Management Information Systems 6th Edition Oz Test Bank
Immediate download Management Information Systems 6th Edition Oz Test Bank al...
Management Information Systems 6th Edition Oz Test Bank

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Basic Mud Logging Guide for educational purpose
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Anesthesia in Laparoscopic Surgery in India
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Sports Quiz easy sports quiz sports quiz
Module 4: Burden of Disease Tutorial Slides S2 2025
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Basic Mud Logging Guide for educational purpose
01-Introduction-to-Information-Management.pdf
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Anesthesia in Laparoscopic Surgery in India

Mcq for final

  • 1. Database 1. Which of the following is NOT a characteristic of a distributed database? A: Data may be spread across several smaller databases connected via telecommunications devices. B: It enables local offices to create, manage, and use their own databases. C: It gives local sites more direct access to frequently-used data. D: It eases issues associated with who can access and change data. 2. The ____is a nontechnical, but important role that ensures that data is managed as an important organizational resource. A: data manager B: data administrator C: database administrator D: database manager 3. _____ is a popular database management system developed by Microsoft and frequently used on personal computers. A: Access B: Excel C: DB2 D: Informix 4. In the relational data model, each row of the table represents a ____. A: data attribute B: data entity C: primary key D: relationship 5. The ____ design of a database involves identifying the relationships among the different data items and grouping them in an orderly fashion. A: detailed B: enterprise C: physical D: logical 6. The repetition of data in separate files is known as ____. A: data integrity B: program-data dependence C: data redundancy D: data independence 7. An information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse is called ____. A: a data mart B: a data base query C: data management D: data mining 8. The ____ allows managers and other database users to access, modify, and make queries about data contained in the database to generate reports. A: database query language B: database report writer C: data definition language D: data manipulation language 9. The definition of the logical and physical structure of the data and relationships among the data in the database is called the ____. A: logical data model B: physical data model C: schema D: data definition language 10. In the relational data model, the columns of the table represent ____. A: domains B: entities C: attributes D: access paths 11. A situation where programs and data developed and organized for one application are incompatible with programs and data organized differently for another application is called ____. A: data redundancy B: program-data dependence C: the traditional approach to data management D: data integrity 12. A highly skilled and trained systems professional who directs or performs all activities related to maintaining a successful database environment is called a(n) ____. A: database administrator Page 1 of 10
  • 2. B: data administrator C: data resource manager D: information resource manager 13. A _____ works with users to decide the content of the database, to create a logical database model to meet the needs of the users, to document the numbers and frequency of the different kinds of data requests to be made, and to define the data-edit changes and controls needed for the database. A: system administrator B: data administrator C: database administrator D: systems analyst 14. Software packages, often written in the Java programming language for use on computers that are running the Windows NT operating system, that connect end users to databases holding the information they need to access are called ____. A: DBMSs B: application servers C: data warehouses D: data mining 15. A(n) ____ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. A: OLTP database B: data storage bin C: data warehouse D: transactional database 16. ____ is the process of capturing a company's collective expertise wherever it resides and distributing it wherever it can help produce the biggest payoff. A: competitive intelligence B: counterintelligence C: knowledge management D: business intelligence 17. A character of information is represented by a(n)____. A: bit B: byte C: field D: attribute 18. A field or set of fields in a record that uniquely identifies the record is called a(n) ____. A: attribute B: hierarchy of data C: entity D: primary key 19. A(n) _____ data model depicts an owner-member relationship in which a member can have many owners. A: relational B: hierarchical C: network D: E-R 20. Once data has been placed into a relational database, users can make inquires and analyze data. ____ involves eliminating rows in the data table according to certain criteria. A: data normalizing B: joining C: projecting D: selecting 21. The most widely used database model is the ____ model. A: enterprise B: hierarchical C: network D: relational 22. The _____ data model describes data using a standard tabular format. A: network B: E-R diagram C: network D: relational 33. The term ____ is sometimes used to describe how well a database performs as the size of the database or the number of concurrent users is increased. A: data integrity B: database size C: integration Page 2 of 10
  • 3. D: scalability 34. Which of the following is NOT an expectation of the database administrator? A: have a clear understanding of the fundamental business of the organization B: be proficient in the use of selected database management systems C: stay abreast of emerging technologies and new design approaches D: set data standards and data definitions that apply across the many databases that an organization may have 35. Which of the following statements about SQL is NOT true? A: SQL stands for "standard query language." B: It was developed in the 1970s at the IBM Research Laboratory in San Jose, California. C: The American National Standards Institute adopted SQL as the standard query language for relational databases in 1986. D: uses standardized and simplified procedures for retrieving, storing, and manipulating data in a database system. 36. To use the database approach to data management, additional software called a(n) ____is required. A: data resource manager B: database management system C: application manager D: database manager Network and Internet 47. ___ enables information to be transmitted to your computer directly, as digital data, over existing phone wires at a speed exceeding 500 Kbps. A: ISDN B: WATS C: DSL D: T1 48. The ____ signal is a continuous, curving signal. A: analog B: digital C: binary D: modulated 49. A coaxial cable consists of an inner conductor wire surrounded by insulation, called the ____. A: jacket B: dielectric C: conductive shield D: insulator 50. A ____ consists of communications media, devices, and software needed to connect two or more computer systems and/or devices. A: telecommunications model B: computer network C: local area network D: wide area network 51. Which of the following statements about the use of telecommuting is NOT true? A: Public policy often encourages companies to consider the use of telecommuting. B: Almost all jobs and all employees can use telecommuting to improve their effectiveness. C: Telecommuting can enable people who are not able to participate in the normal workforce to become productive workers. D: Telecommuting is often convenient for workers and can also lead to reduced corporate costs. 52. ____ is systems software that controls the computer systems and devices on a network and allows them to communicate with each other. A: Communications software B: A network operating system C: Network management software D: Network software 53. In a ____ network, each computer is set up as an independent computer. However, other computers can still access specific files on each computer's hard drive or share its printer. These types of networks have no server. A: bus B: local area C: peer-to-peer D: client/server 54. ____ digital networks are typically faster (from 64 Kbps to 2 Mbps) than standard phone lines and carry more signals than analog networks. A: ISDN Page 3 of 10
  • 4. B: DSL C: T1 D: DSL 55. Extracting data from a composite analog signal to a digital signal is called ____. A: modulating B: demodulating C: digitizing D: converting 56. ___ is a form of transmission media that transmits signals using light beams generated by lasers. A: Coaxial cable B: Microwave C: Twisted pairs of wires D: Fiber-optic cable 57. Which of the following is NOT a form of communications channel? A: simplex B: complex C: half-simplex D: full-duplex 58. ___ is an intercompany, application-to-application communication of data in a standard format that permits the recipient to perform a standard business transaction. A: EDI B: Electronic document distribution C: Data switching D: MMDS 59. Most ____ provide(s) error checking and message formatting. A: communications software B: network operating systems C: network management software D: SNMP software 60. The world's largest public international network is ____. A: the UPSNet B: the WWW C: the WAN D: the Internet 61. The ____ was developed by AT&T to increase the number of voice calls that could be handled through existing cables. It has a speed of 1.544 Mbps developed from two dozen 64-Kbps channels, together with one 8-Kbps channel for carrying control information. A: ISDN B: DSL C: T1 carrier D: POTS 62. A telecommunications device that allows several signals to be transmitted over a single telecommunications medium at the same time is a ____. A: modem B: multiplexer C: front-end processor D: switched line processor 63. Which transmission media is most difficult to "tap into" to intercept communications? A: twisted pairs B: coaxial cable C: microwave D: fiber-optic cable 64. A form of communications channel that can transmit data in either direction, but not simultaneously, is called ____. A: simplex B: half-duplex C: complex D: full-duplex 65. ____ give(s) personal computer users access to vast databases, the Internet, and other services. A: Distance learning B: Electronic document distribution C: Video conferencing D: Public network services 66. Rules that ensure communications among computers of different types and from different manufacturers are called ____. A: OSI models Page 4 of 10
  • 5. B: TCP/IP C: SNAs D: protocol 67. The term "____" refers to telecommunications in which a wide band of frequencies is available to transmit information, and this allows for more information to be transmitted in a given amount of time. A: baseband B: narrowband C: bandwidth D: broadband 68. ____ states that the information-carrying capacity of a channel is directly proportional to its bandwidth. A: Moore's law B: Shannon's fundamental law of information theory C: Law of entropy D: Electromagnetic theory 69. A ____ is placed in a computer's expansion slot to allow it to communicate with the local area network. A: network interface card B: modem C: network operating system D: connector 70. The ____ is a logical model that describes how networks are structured or configured. A: transmission protocol B: client/server architecture C: network topology D: OSI model 71. _____ is a specialized subset of telecommunications that refers to the electronic collection, processing, and distribution of data, typically between computer system hardware devices. A: Computer networking B: Business telecommunications C: Asynchronous communications D: Data communications 72. A basic processing strategy where all processing occurs in a single location or facility is called ____. A: centralized processing B: multiprocessing C: decentralized processing D: distributed processing 73 A ____ carries a signal between sender and receiver. A: modem B: transmitter C: computer network D: communications medium 74. ____ is a billing method for heavy users of voice services. A: WATS B: POTS C: DSL D: PBX 75. The wired connection between your home or small business and the central office is called the ____. A: switched line B: local area network C: local loop D: PBX 76. A telecommunications device that can break a network into subnets and can also determine preferred transmission paths to a final destination is called a ____. A: gateway B: switch C: bridge D: router 77. ____ is the most-widely installed LAN technology, and it is specified in the IEEE 802.3 standard. A: ATM B: SNA C: Ethernet D: Bluetooth 78. ____ transmission requires line-of-sight transmission and short distances (under a few hundred yards) to connect various devices and computers. A: Microwave B: Cellular C: Infrared Page 5 of 10
  • 6. D: Fiber-optics 79. Terrestrial microwave stations are usually placed in series from ____ to ____ miles apart before the curvature of the earth makes it impossible for the towers to "see one another." A: 1 to 10 B: 10 to 30 C: 30 to 70 D: 70 to 100 80. Which of the following is NOT considered an advantage of the client/server approach? A: reduced costs B: improved performance C: increased security D: simplified vendor environment 81. The speed at which signals can be transmitted depends on the ____. A: channel capacity B: channel media C: channel bandwidth D: channel format 82. Both voice and phone conversations are examples of ____, where the receiver gets the message instantaneously, when it is sent. A: synchronous communications B: data communications C: asynchronous communications D: broadband communications 83. A telecommunications line that allows one transmission device to connect to other transmission devices is called a ____. A: dedicated line B: multiplexed line C: duplexed line D: switched line 84. ____ is a business application of networks that involves installing software on a file server for users to share. A: EDI B: Electronic software distribution C: Electronic document distribution D: File server 85. The two most common forms of communications satellites are ____ and ____. A: business and military B: geostationary and line-of-sight C: terrestrial and extra-terrestrial D: geostationary and low-earth-orbit 86. The term "____" refers to telecommunications in which a wide band of frequencies is available to transmit information, and this allows for more information to be transmitted in a given amount of time. A: baseband B: narrowband C: bandwidth D: broadband 87. ____ twisted-pair wire cable has a special conducting layer within the normal insulation, which makes the cable less prone to electrical interference, or "noise." A: Unshielded B: UTP C: Shielded D: Category 1 88. Countries that have few laws concerning telecommunications and databases are called ____. A: transborder data flow countries B: data pirates C: data havens D: data entry ports 89. ____ is a way to connect computers where the applications and database reside on one host computer, and the user interacts with the application and data using a "dumb" terminal. A: File server B: Terminal-to-host C: Client/server D: Distributed computing 90. A ____ network has a central hub with devices located at the end of the communications line that originate from the central hub. A: bus Page 6 of 10
  • 7. B: hybrid C: star D: ring 91. In the ____ architecture, the entire file is downloaded from the host computer to the user's computer in response to a request for data. A: centralized computing B: file server C: client/server D: distributed computing 92. ____ is a communications standard that simplifies communications among cell phones, handheld computers, and other wireless devices. A: ATM B: Bluetooth C: MMDS D: SNA 93. Each type of telecommunications media uses different types of ____ to link them to devices. A: modems B: connectors C: links D: channels 94. A ____ is a communications system that can manage both voice and data transfer within a building and to outside lines. A: multiplexer B: PBX C: local loop D: switched line 95. A strategy for processing where computers are placed at remote locations but connected to each other via telecommunications devices is called ____. A: multiprocessing B: distributed processing C: centralized processing D: decentralized processing 96. Which of the following statements is NOT true about push technology? A: The use of push technology is also frequently referred to as "Webcasting." B: Most push systems rely on HTTP or Java technology to collect content from Web sites and deliver it to a central server for users to access. C: Before they can automatically receive "pushed" information, users must download and install software that acts like a TV antenna, capturing transmitted content. D: The use of push technology can lead to information overload and clog up communications links with traffic. 97. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which provides a graphical interface to the Web. A: CSS B: Java program C: Web browser D: search engine 98. ___ is one of the leaders in instant messaging. Approximately 40 million people use its Instant Messenger and approximately 50 million people use its client program, ICQ. A: Yahoo! B: Microsoft C: Prodigy D: America Online 99. ____ is a protocol that describes how groups of messages can be stored on and sent between computers. It is used to form a virtual forum for the electronic community, and this forum is divided into newsgroups. A: PPP B: Usenet C: Instant messaging D: E-mail 100. The ____ is used as a standard way to designate where Internet elements such as servers, documents, newsgroups, etc. can be found. A: seven-layer OSI model B: TCP/IP C: URL D: e-mail address 101. ____ is a technique used to verify the identity of a message sender for processing on-line financial Page 7 of 10
  • 8. transactions. The technique uses public key encryption and a "hashing" algorithm that prevents the reconstruction of the original message. A: Cryptography B: Tunneling C: Digital signature D: XML 102. ____ is a secure connection between two points across the Internet. A: A tunnel B: A VPN C: VOIP D: An extranet 103. ____ was established in 1991 to enable businesses to connect to the Internet A: SAP B: Commercial Internet Exchange C: EDI D: E-commerce Interchange 104. A(n) ____ submits keywords to several individual search engines and returns the results from all search engines queried. A: Web browser B: search engine C: meta-search engine D: applet 105. A(n) ____ device prepares voice transmission using voice-over-IP by squeezing the recorded sound data and slicing it for packets for transfer over the Internet. A: modem B: PBX C: codec D: router 106. Using ____ technology, network managers can route phone calls and fax transmissions over the same network that they use for data. A: voice-over-IP B: content streaming C: hypermedia D: XML 107. In analyzing a web address such as http://www.course.com, which of the following statements is NOT true? A: The "http" specifies the access method and tells your software to access this particular file using the HyperText Transport Protocol. B: The "www" part of the address signifies that the address is associated with the World Wide Web service. C: The "course.com" part of the address is the domain name that identifies the Internet host site. D: For all countries, except the United States, Canada, and Mexico, the right most part of the domain name is the country code. 108. A ____ is a device that sits between your internal network and the Internet and limits access into and out of your network based on your organization's access policy. A: firewall B: virtual private network C: router D: tunnel 109. A(n)____ is a network that links selected resources of a company's intranet with its customers, suppliers, or other business partners. It is built on Web technologies. A: internet B: extranet C: WAN D: VPN 110. Which of the following statements about HTML is NOT true? A: It represents an evolving standard page description language for Web pages. B: Various vendors have added new tags to the standard that only work for that vendor's Web browser. C: Regardless of minor inconsistencies, all browsers work the same way when used to view the same Web page. D: Many word processor programs can actually generate the HTML needed to create a Web page. 111. Which of the following statements about obtaining "free" information from the Internet is NOT true? A: The Web browser software is used to locate those Web pages that match the keywords you specify. B: Free information and advice may not always be, unbiased, truthful, or helpful. C: Free services can change or even stop their offerings with little or no warning. D: Useful software can be found and downloaded at no cost. 112. ____ is a method of transferring multimedia files over the Internet so that the data stream of voice and Page 8 of 10
  • 9. pictures plays more or less continuously. A: FTP B: VOIP C: Content streaming D: Instant messaging 113. People who have registered domain names in the hope of selling the names to corporations or people at a later date are called ____. A: Web blackmailers B: cyber-squatters C: URL grabbers D: domain stealers 114. Which of the following tasks is NOT performed by a firewall? A: It permits e-mail from selected users outside your company to pass through to your employees. B: It prevents your employees from accessing selected Web sites. C: It prevents users on remote systems from logging onto your network computers using the telnet utility. D: It routes messages in the most efficient manner. 115. A(n) ____ is an internal corporate network built using Internet and World Wide Web standards. A: virtual private network B: LAN C: extranet D: intranet 116. ____ and ____ are two communications protocols that transmit data packets over telephone lines, allowing dial-up access to the Internet. A: TCP and IP B: SLIP and PPP C: Telnet and FTP D: Usenet and Instant messaging 117. The set of conventions used to pass packets of data from one host computer to another on the Internet is called the ____. A: telnet B: Internet protocol (IP) C: the seven-layer OSI model D: uniform resource locator (URL) 118. Which of the following identifies a set of emerging standards for describing Web documents? A: XML, XHTML, CSS, and DHMTL B: ICQ, Java, and hypermedia C: Netscape Navigator and Internet Explorer D: CIX, HTTP, and URL 119. Which of the following statements about usage of the Internet is NOT true? A: It is possible to listen to radio telecasts and view interactive talk shows. B: Some corporations have started to use Internet video to broadcast corporate messages or to advertise on the Web. C: Doctors are reluctant to use Internet video to monitor and control surgical operations. D: Employees can connect to the workplace via a virtual office on the Web. 120. Which of the following statements is NOT true about the building and use of an intranet? A: Most employees will require considerable training to make effective use of their corporate intranet. B: Most companies already have the foundation for an intranet: a network that uses the Internet's TCP/IP protocol and computers with Web browser software. C: Use of an intranet can lead to a substantial reduction in the need for paper. D: An intranet can pull all corporate computers, software, and databases into a single system that enables employees to find information wherever it resides. 121. Any company that provides individuals and organizations with access to the Internet is called a(n) ____. A: registrar B: backbone C: ISP D: PPP 122. Which of the following statements about the use of Java applets is NOT true? A: Java software runs not only on Sun Microsystems computers but on other computers as well. B: Java is used by programmers to make Web pages "come alive," adding graphics, animation, and real-time updates. C: Java enables software writers to create compact "just-in-time" programs that can be dispatched across a network such as the Internet. D: A Web page with an embedded Java applet contains an additional HTML tag called JAV, which refers to the Java applet. 123. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which Page 9 of 10
  • 10. provides a graphical interface to the Web. A: CSS B: Java program C: Web browser D: search engine 124. What Internet service enables two or more people to engage in on-line, interactive "conversation?" A: Usenet B: Newsgroups C: Content streaming D: Chat rooms 125. A(n) ____ is a Web site that contains files, phone numbers, e-mail addresses, and appointment calendar. It essentially allows your desktop computer, phone books, appointment scheduler, and other important information to be with you wherever you are. A: telecommuting Web site B: Internet office C: virtual office D: home page 126. ____ is the process of converting a message into a secret code and changing the encoded message back to regular text. A: Encryption B: Fraud C: Encoding D: Cryptography 127. Which of the following statements about the World Wide Web is NOT true? A: The Web was developed by Tim Berners-Lee at CERN in Geneva, and he conceived of it as a way to manage documents. B: The Web has grown to a collection of tens of thousands of independently-owned computers that work together as one Internet service. C: The Web is a menu-based system that uses the file-server model. D: An ordinary phone line connection to the Internet is unlikely to provide sufficient speed for a satisfactory Web experience. Page 10 of 10