NAME

Question types


Start with


Question limit

of 74 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Schema
  2. Expert Systems (ES)
  3. Virtual Reality System
  4. Safeguards for protection against data destroyed by malicious software and hacking attempts
  5. Primary Key
  1. a A field that uniquely identifies a record
  2. b information system that can make suggestions and reach conclusions in much the same way that a human expert can
  3. c Antivirus, Firewall, Antispyware
  4. d computer simulated environment or event
  5. e an outline of the logical and physical structure of the data and relationships among the data in the database

5 Multiple choice questions

  1. security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient
  2. a business' use of an outside company to take over portions of its workload
  3. assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and sometimes by its partners and customers
  4. sharing copyright material is bad and against the law
  5. combine both spoofed e-mail and a spoofed Web site in order to trick a person into providing private information

5 True/False questions

  1. DatabaseA collection of data organized to meet user's needs

          

  2. Data Dictionarydetailed description of all data used in the database

          

  3. Object Oriented (OO) systems developmentinformation system that can make suggestions and reach conclusions in much the same way that a human expert can

          

  4. Identity theftthe criminal act of using stolen information about a person to assume that person's identity, typically for financial gain

          

  5. M commerce systemform of e commerce that takes place over wireless mobile devices such as handheld computers and cell phones