Final exam Student Name _________________________ Date ___/____/_____ Time: 1 hour and 45 minutes Answer all questions No talking during the exam
1. A foreign key is 2. Data store is
A. only allowed once in an external table A. temporary storage B. a reprentation of all elements of an entity B. permanent storage C. primary key from another table C. volatile storage D. All of the above D. unnecessary for a business 3. Relational databases are unique because 4. A composite key is A. they are inexpensive A. created using Microsoft excel B. they group similar items together B. is a combination of two keys C.they are the most widely used type of database C. is a combination of keys that create a unique key D.None of the above D.All of the above 5. In a CSS file how are comments made 6. If a comment tag is not closed in HTML what A. () happens B. <! -- --> A. the code continues to work C. // // B. the code becomes inactive D. /* */ C. the editor crashes D. the code continues to function 7. The Master file is 8.Direct Access allows for _______ of data A. Is only found on relational databases A. Fast and random B. A collection of records based on a single B. Fast and sequential subject C. Slow and random C. is independent of the Data warehouse D. Fast and random D.All of the above 9.Sequential Access allows for _____ of data 10. Dataflow is a _______based on the idea of A. Fast and random connecting ______into stages (pipelines) that can B. Fast and sequential execute concurrently. C. Slow and random A. theory, networks D. Fast and random B. method, fiber optics C. sequence, corporate communication D. software paradigm, computational actors 11. The first level of Dataflow Diagrams 12.A virus and a DDOS attack are the same A. give an overview of the system A. True B. give pseudo code of the system functions B. False C. give selected data on a specific system D.All of the above 13.You receive an e-mail asking you to click on a 14. The transaction file is link in the e-mail to verify your bank account A. malware and dangerous to computers login. What do you do? B. updates the master file A. follow the instructions C. should be deleted B. reply to the e-mail asking for a reason D. in 3NF C. contact your bank by phone D.All of the above CAPE Information Technology UNIT 2 Montserrat Community College Final exam Student Name _________________________ Date ___/____/_____ 15.A transaction file is created when a customer 16.In terms of accessibility which is the best makes a transaction but with a business it A. Hard drive A. print receipts B. Usb drive B.checks payment method for validity C. Cloud drive C. deletes old data D. DVD D.updates the database 17. The FOUR structures of a DFD are 18.To do an Aural based presentation you will need A. Customer, Process, Data Store, Data Flow A.MS Powerpoint B. Entity , Process, Data Store, Data Flow B. Adobe Audition C. Data Flow, Data, Data Storage, Process C. Adobe Photoshop D. Customer,Database, Data Store, Data Flow D. MS Publisher 19. Two factor authentication is used to 20. An attacker will flood a computer or the A. Encrypt files entire network with traffic until a shutdown B. Send files occurs because of the overload C. prove identity A. Man in the middle D.disprove identity B. Phishing C. Ransomeware D.DDOS 21.This type of attack is extremely hard to stop as 22. An attacker encrypts files on users computer it controls internet traffic from the web server . and demands bitcoins A. Man in the middle A. Man in the middle B. Phishing B. Phishing C. Ransomeware C. Ransomeware D.DDOS D.DDOS 23.You client asked you make the background of 24. ________ is sorting through data to identify their website yellow. patterns in code structure. A. <background>yellow</background> A.Normalization B. <body bg="yellow"> B.Deduplication C. <body style="background-color:yellow;"> C.Data mining D.None of the Above D.Pattern identification 25.<p> means 26.<tr> means A.Print page A. truncate B.Paragraph B. text align right C.Photograph C. table row D.Parallel present D.text red CAPE Information Technology UNIT 2 Montserrat Community College Final exam Student Name _________________________ Date ___/____/_____ 27.What is the following code missing 28. .Tree{ <html> color: “Blue”; <head> } <title>Bob’s Hamburgers<title> A. Paragraph color is blue <head> B. Paragraph text is blue <body> C. Paragraph in Class Tree are blue <h1>Welcome to the best hamburger shop<h1> D. blue will appear whenever you type tree <p> All burgers start at $5 <p> <body> <html> A. <! B.CSS C./ D.Link tag 29.An example of inventory tracking software is 30. Jeremy the CIO of a newspaper wants to improve A. MS Word data efficiency, why is it significant important? B. MS Access A. It makes the most used data readily available C.MS Excel B. It may be the reason a company chooses one D.MS Powerpoint location over another C. It lowers the cost of data processing D. None of the above 31.An employee was fired from Bank Corp LTD 32. This type of malware keeps track of what a for sending company plans via their own email, person types on their computer using their own phone on the company network. A. Trojan They are argue in court that their communication B. Virus regardless of content was private. From your C. Polymorphic virus knowledge of company Information policy who is D. Keylogger correct? A. Employee.They are correct the company violated their privacy B. Firm.They have no right to privacy in a private firm C. Firm.They used the firm’s network making the communication company property D.Employee. They have a legal protection under law to their phone and its contents. 33.DBMS is 34. This type of malware allows other malware to A. Special software designed for companies attack your as it acts like a harmless file. B. Needed to both start up and turn of the A. Trojan computer B. Virus C. Needed to start up the computer C. Polymorphic virus D. Software that allows for storage, D. Keylogger modification and extraction of information in a database. CAPE Information Technology UNIT 2 Montserrat Community College Final exam Student Name _________________________ Date ___/____/_____ 35. Normalization is an aspect of malware 36. Data must first be in 3NF before it can be in 1NF protection A.True A.True B.Somewhat True B.Somewhat True C.False C.False D.Somewhat False D.Somewhat False 37.What does a IT manager have to do before 38. Automation is said to taking over from humans they donate old business systems to charity or a what is the most negative consequence of this? local school? A. Greater productivity A. Upgrade the hardware B. Job redundancy B. Wipe the storage device/s C. Job elimination C. Upgrade the software D. Job redistribution D. Ensure only old systems are sent 39. Does a business have the right to all 40.Why must a Primary key must be ____ communication that passes through its A. Redundant networks? B. Unique A. Legally yes C. Replicable B. Legally no D. Independent C. It depends on the communication D.It depends on the sender/receiver 41.Only specific people can use the specific 42.The _____ temporarily holds data before it is information kept in _______ . processed by an Information system. A.Data Mart A.Data Mart B. Data Warehouse B. Data Warehouse C.Database C.Database D.Data store D.Data store 43.Information and data are vital to a company, 44. Hexadecimal color codes are preceded by? that is why everyone is allowed to use_____ to A. ampersand - & get information. B. equal sign - = A.Data Mart C. number sign - # B. Data Warehouse D. semicolon - ; C.Database D.Data store 45. To get to 3NF A. files have to be write aligned in database B. files must be in 1NF C. files must be in 1NF and 2NF D. All of the above