1.
The compilation of data that is arranged for better and faster retrieval and is accessed via computers is known as
Correct Answer
D. Online database
Explanation
An online database is the correct answer because it refers to a compilation of data that is organized and stored in a way that allows for efficient retrieval and access through computers. Unlike browsing or the internet, which are broader terms, an online database specifically focuses on the structured storage and retrieval of data.
2.
____________ allows or disallows user actions on the database and objects within it
Correct Answer
C. Database security
Explanation
Database security refers to the measures and controls put in place to protect a database from unauthorized access, misuse, or any other potential threats. It includes various mechanisms such as authentication, authorization, encryption, and auditing to ensure that only authorized users can access and manipulate the database and its objects. By allowing or disallowing user actions on the database and objects within it, database security plays a crucial role in maintaining the integrity, confidentiality, and availability of the data stored in the database.
3.
There are three generally accepted categories of secrecy-related problems in data base systems include all except
Correct Answer
C. Accepting and initiating unwanted popups.
Explanation
The given answer, "Accepting and initiating unwanted popups," is the correct answer because it does not belong to the three generally accepted categories of secrecy-related problems in database systems. The other three options, which are the improper release of information, the improper modification of data, and denial-of-service threats, are all examples of secrecy-related problems that can occur in database systems. However, accepting and initiating unwanted popups is not directly related to secrecy or data protection in a database system.
4.
Security risks to database systems include all except
Correct Answer
B. Modification of database data by the administrator
Explanation
The correct answer is "modification of database data by the administrator." This is because administrators have authorized access to the database system and are responsible for managing and maintaining it. Therefore, their actions are not considered a security risk but rather a part of their role. The other options listed all represent potential security risks, such as unauthorized access, data leakage, physical damage, and unintended misuse by authorized users.
5.
One reason why people ignore index is because
Correct Answer
A. They may make your queries slower instead of faster
Explanation
Indexes are used to speed up search queries by allowing the database to quickly locate the desired data. However, in some cases, indexes can actually slow down queries. This can happen when the index is not properly designed or when the query requires a large number of rows to be retrieved. In such cases, the database engine may spend more time searching through the index than it would take to scan the entire table. Therefore, people may choose to ignore indexes if they believe that the indexes will not improve the performance of their queries.
6.
One importance of database security is
Correct Answer
B. Ensure the data confidentiality
Explanation
The importance of database security lies in ensuring the confidentiality of data. This means that unauthorized individuals or entities should not be able to access or view sensitive information stored in the database. By implementing security measures such as access controls, encryption, and authentication protocols, the data can be protected from unauthorized access, thereby maintaining its confidentiality.
7.
The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance and to
Correct Answer
C. Close the redo thread that was left open
Explanation
The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance. In the event of a crash or failure, there may be data changes that were not yet written to disk. The redo thread, which is responsible for writing these changes to disk, may have been left open during the crash. Closing the redo thread ensures that all pending changes are written to disk and the database is brought back to a consistent state.
8.
One of these is not a key issue in the security of database
Correct Answer
D. Disclosure
Explanation
Disclosure refers to the act of making information known or revealing it to others. In the context of database security, disclosure is not a key issue because it does not directly relate to the protection and integrity of the database. The other options - importance, privacy, and availability - are all crucial aspects of database security. Importance refers to the significance of the data and the need to protect it. Privacy involves ensuring that only authorized individuals have access to the data. Availability refers to the accessibility and reliability of the database for authorized users.
9.
The database security issued that is concerned with improper denial of access to information is known as
Correct Answer
C. Availability
Explanation
The correct answer is availability. Availability is the database security issue that deals with ensuring that authorized users have access to the information they need, while preventing unauthorized users from accessing the information. It focuses on preventing improper denial of access to information, such as denial of service attacks or system failures that result in the unavailability of data.
10.
Encryption is useful especially to
Correct Answer
D. Pass a secret message from one place to another without anyone else being able to read it
Explanation
Encryption is a process of converting information into a code or cipher to prevent unauthorized access. It is useful for passing a secret message from one place to another without anyone else being able to read it. By encrypting the message, it ensures that only the intended recipient with the correct decryption key can decipher and understand the content, providing confidentiality and security. The other options mentioned, such as blocking unwanted users, controlling internet access, or giving access only to known individuals, are not directly related to the purpose of encryption.
11.
One of the following indexes does not exist
Correct Answer
C. Human
Explanation
The correct answer is "human" because it is the only word in the given list that does not refer to a type of index. "Book indexes" and "citation" both refer to indexes related to books or written materials, while "indexes" is a plural form of "index." Therefore, "human" is the only word that does not fit the category of indexes.
12.
One problem of encryption is that it is
Correct Answer
B. Slower than normal browsing
Explanation
Encryption is slower than normal browsing because it involves the process of converting data into a coded form, which requires additional computational resources. This process adds a layer of security by making the data unreadable to unauthorized individuals. However, it also introduces a delay in the transmission and retrieval of data, resulting in slower browsing speeds compared to unencrypted connections.
13.
One characteristic of Crash and instance recovery is that they
Correct Answer
A. Redo the changes using the current online data files
Explanation
Crash and instance recovery involve redoing the changes using the current online data files. This means that in the event of a crash or failure, any changes that were made but not yet saved will be re-executed using the most up-to-date data available. This ensures that the system remains consistent and any lost or uncommitted changes are recovered. By redoing the changes using the current online data files, the system can restore itself to a consistent state and minimize data loss.
14.
The term “virus” is a general term that actually applies to three different kinds of malicious programs listed below except
Correct Answer
B. Hackers
Explanation
The term "virus" is a general term used to describe malicious programs, but it does not apply to hackers. Hackers are individuals who gain unauthorized access to computer systems or networks with the intention of stealing or manipulating data, causing disruption, or committing other illegal activities. While hackers can use viruses as tools, they are not a type of virus themselves. The other options listed, zombies, Trojan Horse, and worms, are all types of malicious programs that can be considered viruses.
15.
A __________ is a program that is designed to replicate and spread throughout a computer system
Correct Answer
A. Worm
Explanation
A worm is a type of program that is specifically created to replicate and spread itself throughout a computer system. Unlike viruses, worms do not require a host file or program to attach themselves to. Instead, they can independently move across networks and systems, exploiting vulnerabilities to propagate and infect other devices. Worms can cause significant damage by consuming system resources, slowing down networks, and potentially compromising sensitive information.
16.
Which of these options is not amongst the characteristics of index
Correct Answer
B. Restrict access to topics or features using the terminology of prospective users
Explanation
The given options describe the characteristics of an index. The first option states that an index helps identify documentary units that treat particular topics or possess particular features. The second option suggests that an index restricts access to topics or features using the terminology of prospective users. The third option mentions that an index provides access through synonymous and equivalent terms. The fourth option states that an index uses terminology that is as specific as documentary units warrant and the indexing language permits. Out of these options, the one that is not amongst the characteristics of an index is "restrict access to topics or features using the terminology of prospective users." An index does not restrict access based on the terminology used by prospective users; instead, it aims to provide access through synonymous and equivalent terms.
17.
Indexes in database is necessary since it
Correct Answer
A. it makes search queries much faster
Explanation
Indexes in a database are necessary because they make search queries much faster. By creating an index on a specific column or set of columns, the database can locate the required data more efficiently. Instead of scanning the entire table, the database engine can use the index to quickly narrow down the search to the relevant rows. This significantly improves the performance of search operations, especially when dealing with large amounts of data.
18.
The database that can do multiple tasks in parallel allowing the database to make use of multiple CPU cores and multiple disks that are standard for modern database servers is
Correct Answer
A. Parallel database
Explanation
A parallel database is designed to perform multiple tasks simultaneously, utilizing the multiple CPU cores and disks available in modern database servers. This allows for faster processing and improved performance. Unlike a distributed database that is spread across multiple nodes, a parallel database operates on a single node but can execute tasks in parallel, making it an efficient choice for handling large amounts of data and complex queries. Instance recovery and crash recovery are not directly related to the ability of a database to perform tasks in parallel.
19.
A suite of tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behaviour, with minimal impact on user operations and productivity is known as
Correct Answer
D. Database Activity Monitoring
Explanation
Database Activity Monitoring refers to a suite of tools that can be used to identify and report on fraudulent, illegal, or undesirable behavior within a database system. These tools are designed to minimize the impact on user operations and productivity while providing effective monitoring and reporting capabilities. By continuously monitoring database activities, such as queries, transactions, and user access, organizations can detect and respond to any suspicious or unauthorized activities promptly. Database Activity Monitoring helps enhance security and compliance by ensuring the integrity and confidentiality of sensitive data.
20.
Normal index is also known
Correct Answer
C. Ordinary index
Explanation
The correct answer is "ordinary index" because a normal index is also referred to as an ordinary index. It is a type of index that improves the efficiency of data retrieval operations by creating a separate data structure that allows for faster searching and sorting of data in a database table.
21.
People prefer peer-to-peer network to client-server because of it
Correct Answer
C. Does require a server
Explanation
The correct answer is "does require a server." This is because in a client-server network, a dedicated server is required to manage and control the network. However, in a peer-to-peer network, there is no need for a central server as all devices in the network can act as both clients and servers. This makes peer-to-peer networks easier to set up and less expensive to install compared to client-server networks.
22.
Some common features of Trojan horse programs include
Correct Answer
A. Causing payment triggers
Explanation
Trojan horse programs are malicious software that disguise themselves as legitimate programs to deceive users. One common feature of such programs is causing payment triggers, which means they can initiate unauthorized transactions or manipulate payment systems to steal money from victims. These programs exploit vulnerabilities in the system to carry out financial fraud or gain unauthorized access to sensitive information. By causing payment triggers, Trojan horse programs can deceive users into unknowingly making payments or transferring funds, resulting in financial losses.
23.
One advantage of distributed database is that it (a) (b) (c)
Correct Answer
A. Reflects organizational structure.
Explanation
Distributed databases have the advantage of reflecting the organizational structure. This means that the data is organized and distributed in a way that aligns with the structure of the organization. This can make it easier to access and manage the data, as it is organized in a way that mirrors the different departments or divisions within the organization. This can also help to improve efficiency and collaboration within the organization, as the data is structured in a way that is familiar and intuitive to the users.
24.
A ________________ is a single logical database that is spread physically across computers in multiple locations that are connected by a data communications network
Correct Answer
B. Distributed database.
Explanation
A distributed database refers to a single logical database that is physically spread across multiple computers in different locations, connected by a data communications network. This allows for data to be stored and accessed from various locations, providing improved scalability, fault tolerance, and performance. Unlike an incomplete database, which suggests missing or incomplete data, a distributed database is a complete database that is distributed across multiple locations for better efficiency. It is not a parallel database, which refers to a type of database that processes queries simultaneously using multiple processors.
25.
The type of network where all computers have the same status is known as
Correct Answer
D. Peer-to-peer
Explanation
A peer-to-peer network is a type of network where all computers have the same status. In this network, each computer can act as both a client and a server, allowing for direct communication and sharing of resources between computers without the need for a central server. This decentralized structure promotes equal status and autonomy among all computers in the network.
26.
_____________ is the term used by hackers to describe computers that have been infected by a class of virus that allows the hacker to control the workstation remotely
Correct Answer
D. Zombies
Explanation
Zombies is the term used by hackers to describe computers that have been infected by a class of virus that allows the hacker to control the workstation remotely. This term is derived from the concept of a zombie army, where multiple infected computers are used by the hacker to carry out coordinated attacks or spamming activities without the knowledge of the computer owners. The infected computers become part of a botnet and can be used for various malicious purposes, such as launching DDoS attacks or sending out spam emails.
27.
The kind of virus that can prevent you from being able to boot your hard disk is
Correct Answer
C. Boot sector virus
Explanation
A boot sector virus is a type of virus that infects the boot sector of a computer's hard disk. The boot sector is responsible for loading the operating system when the computer is turned on. When infected with a boot sector virus, the computer may fail to boot or encounter errors during the booting process. This type of virus can prevent the computer from starting up properly, making it impossible to access the files and data stored on the hard disk.
28.
The ______________ also controls the network access of the other
Correct Answer
C. Server
Explanation
The server controls the network access of the other devices or clients. It acts as a central hub and manages the network resources, granting or denying access based on predefined rules and permissions. The server ensures that the network operates efficiently and securely by regulating the flow of data and managing user authentication and authorization.
29.
What among the following devices is not a network device
Correct Answer
B. Keyboard
Explanation
A keyboard is not a network device because it is an input device used for typing and entering data into a computer system. It does not have the capability to connect to a network or transmit data over a network. On the other hand, NIC (Network Interface Card), cable, and switch are all network devices. A NIC is used to connect a computer to a network, a cable is used to transmit data between network devices, and a switch is used to connect multiple devices within a network.
30.
This type of network can also be seen in the bank where workers have access to the client and only a few managers have access to the server is known as
Correct Answer
B. Client - server
Explanation
A client-server network is a type of network where clients, such as bank workers, have access to the client side and can interact with it, while only a few managers have access to the server side. In this network, clients request services or resources from the server, which provides them. This type of network architecture is commonly used in organizations where centralized control and management of resources is necessary, and access to sensitive information needs to be restricted to a select few.
31.
The need for creating a school network is because of its
Correct Answer
A. Services
Explanation
The need for creating a school network is primarily driven by the services it offers. A school network allows for the sharing of resources, such as printers and files, among different devices connected to the network. It also enables communication and collaboration between students and teachers through email, messaging, and video conferencing. Additionally, a school network provides internet access to support research, online learning platforms, and educational websites. Therefore, the services provided by a school network are essential for facilitating efficient communication, resource sharing, and access to educational resources.
32.
One of these is not a computer professional
Correct Answer
C. Computer wizard
Explanation
The term "computer wizard" is not typically used to describe a computer professional. While computer education, computer engineer, and computer scientist are all professions related to computers, a computer wizard is more commonly associated with someone who has exceptional skills or knowledge in using computers, but may not necessarily work in a professional capacity in the field.
33.
One of these is not part of the scenarios necessitate media recovery
Correct Answer
D. Datafile is a security itself
Explanation
The given answer suggests that "datafile is a security itself" is not part of the scenarios that necessitate media recovery. This means that a datafile being a security itself does not require media recovery. The other scenarios mentioned, such as restoring a backup of a datafile or a backup control file, or taking a datafile offline, may require media recovery. However, without further context or information, it is difficult to fully understand the meaning of "datafile is a security itself" in this context.
34.
A computer wizard is a person that has a vast knowledge in the area of information technology
Correct Answer
B. False
Explanation
The given statement is false because a computer wizard is not just someone with vast knowledge in the area of information technology. A computer wizard is actually a term used to describe someone who is exceptionally skilled or talented in using computers and technology. It goes beyond just having knowledge and encompasses a high level of expertise and proficiency in various aspects of computer systems, programming, troubleshooting, and problem-solving.
35.
One is these is not a condition for performing incomplete recovery of the whole database (a) (b) (c) (d) .
Correct Answer
D. You lose your current control file and cannot use a backup control file to open the database
Explanation
Losing the current control file and not being able to use a backup control file to open the database is not a condition for performing incomplete recovery of the whole database. Incomplete recovery refers to recovering the database to a specific point in time, but not fully restoring it to its original state. The other options mentioned in the question are conditions that can lead to incomplete recovery, such as media failure destroying redo logs, user error causing data loss, or missing archived redo logs.
36.
The components of computer network include all except (a) cables (b) switch (c) internet. (d) NIC
Correct Answer
C. Internet
Explanation
The components of a computer network typically include cables, switches, and NICs (Network Interface Cards). These components are essential for establishing connections and facilitating communication between devices in a network. The internet, however, is not considered a component of a computer network, but rather a global network of networks that connects millions of devices worldwide. Therefore, the correct answer is internet.
37.
The database security that concerns the need to ensure that entire database is secured from external and internal system breaches is
Correct Answer
A. Confidentiality
Explanation
Confidentiality is the correct answer because it refers to the protection of sensitive information from unauthorized access. In the context of database security, confidentiality ensures that the entire database is secured from external and internal system breaches, preventing unauthorized individuals or entities from accessing and viewing the data. This includes implementing access controls, encryption, and other security measures to protect the confidentiality of the database and its contents.
38.
A computer has been infected by a virus when
Correct Answer
A. The hard drive is filling up
Explanation
When the hard drive is filling up, it is an indication that the computer has been infected by a virus. Viruses often replicate and spread themselves by creating multiple copies of their code, which can quickly consume the available storage space on the hard drive. Therefore, a rapidly filling hard drive is a common symptom of a virus infection.
39.
_________ indexes allow users to look up people’s names and find information about personal and family relationships (a) book (b) pictorial (c) genealogy (d) cumulative
Correct Answer
C. Genealogy
Explanation
Genealogy indexes are specifically designed to help users look up people's names and find information about personal and family relationships. This type of index is commonly used in genealogical research to trace family histories and connections.
40.
One can get virus through
Correct Answer
C. Cracked software
Explanation
Using cracked software can lead to the installation of viruses on a computer. Cracked software refers to unauthorized copies of paid software that have been modified to bypass licensing restrictions. These cracked versions often contain hidden malware or viruses that can infect the computer when the software is installed. Therefore, downloading and using cracked software increases the risk of getting a virus on the computer.
41.
We prefer WLAN to LAN because it is _______
Correct Answer
C. Easier to move workstations
Explanation
The correct answer is "easier to move workstations" because WLAN (Wireless Local Area Network) allows for wireless connectivity, which means that workstations can be easily moved around without the need for physical connections. In contrast, LAN (Local Area Network) typically requires wired connections, making it more difficult to move workstations without additional setup.
42.
To protect your system against virus, we should do the following except
Correct Answer
D. Download files or email attachments from unknown or unauthorized sources
Explanation
Downloading files or email attachments from unknown or unauthorized sources can expose your system to potential viruses and malware. It is important to only download files from trusted and authorized sources to ensure the safety and security of your system. By avoiding this action, you can protect your system against potential threats and reduce the risk of virus infections.