1. The overall description of a database is called______:
(1) Data definition
(2) Data manipulation
(3) Data integrity
(4) Database schema
(5) None of these
2. Which is proper subset designed to support ‘views’ belonging to different classes of users in order to hide or protect information?
(1) Schema
(2) Subschema
(3) Non-schema
(4) None-subschema
(5) None of these
3. Who interact with the system without writing a program?
(1) Naïve users
(2) Casual users
(3) Sophisticated user
(4) All of these
(5) None of these
4. The performance of a data communication network depends on_____
(1) The number of users
(2) The transmission media
(3) The hardware and software
(4) All of the above
(5) None of these
5. Viruses are network ______ issue.
(1) Performance
(2) Reliability
(3) Security
(4) Management
(5) None of these
6. The information to be communicated in a data communication system is the _______
(1) Medium
(2) Protocol
(3) Message
(4) Transmission
(5) Topology
7. ________ is the division of one task among multiple computers.
(1) Distributed Processing
(2) Distributed Messaging
(3) Distributed Telephony
(4) Electronic Messaging
(5) None of these
8. Which topology requires a central controller or hub?
(1) Mesh
(2) Star
(3) Bus
(4) Ring
(5) Router
9. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these
10. Dynamic addressing makes it more difficult for hackers to find likely victims because ______.
(1) the ISP assigns counterfeit IP addresses.
(2) the IP address is protected by a firewall.
(3) the ISP hides the IP addresses for computers on their network.
(4) the IP address changes each time a user logs on to their ISP.
(5) None of these
No comments:
Post a Comment