You are on page 1of 4

CAPE Information Technology UNIT 2

Montserrat Community College


Final exam
Student Name _________________________ Date ___/____/_____
Time: 1 hour and 45 minutes
Answer all questions
No talking during the exam

1. A foreign key is 2. Data store is


A. only allowed once in an external table A. temporary storage
B. a reprentation of all elements of an entity B. permanent storage
C. primary key from another table C. volatile storage
D. All of the above D. unnecessary for a business
3. Relational databases are unique because 4. A composite key is
A. they are inexpensive A. created using Microsoft excel
B. they group similar items together B. is a combination of two keys
C.they are the most widely used type of database C. is a combination of keys that create a unique key
D.None of the above D.All of the above
5. In a CSS file how are comments made 6. If a comment tag is not closed in HTML what
A. () happens
B. <! -- --> A. the code continues to work
C. // // B. the code becomes inactive
D. /* */ C. the editor crashes
D. the code continues to function
7. The Master file is 8.Direct Access allows for _______ of data
A. Is only found on relational databases A. Fast and random
B. A collection of records based on a single B. Fast and sequential
subject C. Slow and random
C. is independent of the Data warehouse D. Fast and random
D.All of the above
9.Sequential Access allows for _____ of data 10. Dataflow is a _______based on the idea of
A. Fast and random connecting ______into stages (pipelines) that can
B. Fast and sequential execute concurrently.
C. Slow and random A. theory, networks
D. Fast and random B. method, fiber optics
C. sequence, corporate communication
D. software paradigm, computational actors
11. The first level of Dataflow Diagrams 12.A virus and a DDOS attack are the same
A. give an overview of the system A. True
B. give pseudo code of the system functions B. False
C. give selected data on a specific system
D.All of the above
13.You receive an e-mail asking you to click on a 14. The transaction file is
link in the e-mail to verify your bank account A. malware and dangerous to computers
login. What do you do? B. updates the master file
A. follow the instructions C. should be deleted
B. reply to the e-mail asking for a reason D. in 3NF
C. contact your bank by phone
D.All of the above
CAPE Information Technology UNIT 2
Montserrat Community College
Final exam
Student Name _________________________ Date ___/____/_____
15.A transaction file is created when a customer 16.In terms of accessibility which is the best
makes a transaction but with a business it A. Hard drive
A. print receipts B. Usb drive
B.checks payment method for validity C. Cloud drive
C. deletes old data D. DVD
D.updates the database
17. The FOUR structures of a DFD are 18.To do an Aural based presentation you will need
A. Customer, Process, Data Store, Data Flow A.MS Powerpoint
B. Entity , Process, Data Store, Data Flow B. Adobe Audition
C. Data Flow, Data, Data Storage, Process C. Adobe Photoshop
D. Customer,Database, Data Store, Data Flow D. MS Publisher
19. Two factor authentication is used to 20. An attacker will flood a computer or the
A. Encrypt files entire network with traffic until a shutdown
B. Send files occurs because of the overload
C. prove identity A. Man in the middle
D.disprove identity B. Phishing
C. Ransomeware
D.DDOS
21.This type of attack is extremely hard to stop as 22. An attacker encrypts files on users computer
it controls internet traffic from the web server . and demands bitcoins
A. Man in the middle A. Man in the middle
B. Phishing B. Phishing
C. Ransomeware C. Ransomeware
D.DDOS D.DDOS
23.You client asked you make the background of 24. ________ is sorting through data to identify
their website yellow. patterns in code structure.
A. <background>yellow</background> A.Normalization
B. <body bg="yellow"> B.Deduplication
C. <body style="background-color:yellow;"> C.Data mining
D.None of the Above D.Pattern identification
25.<p> means 26.<tr> means
A.Print page A. truncate
B.Paragraph B. text align right
C.Photograph C. table row
D.Parallel present D.text red
CAPE Information Technology UNIT 2
Montserrat Community College
Final exam
Student Name _________________________ Date ___/____/_____
27.What is the following code missing 28. .Tree{
<html> color: “Blue”;
<head> }
<title>Bob’s Hamburgers<title> A. Paragraph color is blue
<head> B. Paragraph text is blue
<body> C. Paragraph in Class Tree are blue
<h1>Welcome to the best hamburger shop<h1> D. blue will appear whenever you type tree
<p> All burgers start at $5 <p>
<body>
<html>
A. <!
B.CSS
C./
D.Link tag
29.An example of inventory tracking software is 30. Jeremy the CIO of a newspaper wants to improve
A. MS Word data efficiency, why is it significant important?
B. MS Access A. It makes the most used data readily available
C.MS Excel B. It may be the reason a company chooses one
D.MS Powerpoint location over another
C. It lowers the cost of data processing
D. None of the above
31.An employee was fired from Bank Corp LTD 32. This type of malware keeps track of what a
for sending company plans via their own email, person types on their computer
using their own phone on the company network. A. Trojan
They are argue in court that their communication B. Virus
regardless of content was private. From your C. Polymorphic virus
knowledge of company Information policy who is D. Keylogger
correct?
A. Employee.They are correct the company
violated their privacy
B. Firm.They have no right to privacy in a private
firm
C. Firm.They used the firm’s network making the
communication company property
D.Employee. They have a legal protection under
law to their phone and its contents.
33.DBMS is 34. This type of malware allows other malware to
A. Special software designed for companies attack your as it acts like a harmless file.
B. Needed to both start up and turn of the A. Trojan
computer B. Virus
C. Needed to start up the computer C. Polymorphic virus
D. Software that allows for storage, D. Keylogger
modification and extraction of information
in a database.
CAPE Information Technology UNIT 2
Montserrat Community College
Final exam
Student Name _________________________ Date ___/____/_____
35. Normalization is an aspect of malware 36. Data must first be in 3NF before it can be in 1NF
protection A.True
A.True B.Somewhat True
B.Somewhat True C.False
C.False D.Somewhat False
D.Somewhat False
37.What does a IT manager have to do before 38. Automation is said to taking over from humans
they donate old business systems to charity or a what is the most negative consequence of this?
local school? A. Greater productivity
A. Upgrade the hardware B. Job redundancy
B. Wipe the storage device/s C. Job elimination
C. Upgrade the software D. Job redistribution
D. Ensure only old systems are sent
39. Does a business have the right to all 40.Why must a Primary key must be ____
communication that passes through its A. Redundant
networks? B. Unique
A. Legally yes C. Replicable
B. Legally no D. Independent
C. It depends on the communication
D.It depends on the sender/receiver
41.Only specific people can use the specific 42.The _____ temporarily holds data before it is
information kept in _______ . processed by an Information system.
A.Data Mart A.Data Mart
B. Data Warehouse B. Data Warehouse
C.Database C.Database
D.Data store D.Data store
43.Information and data are vital to a company, 44. Hexadecimal color codes are preceded by?
that is why everyone is allowed to use_____ to A. ampersand - &
get information. B. equal sign - =
A.Data Mart C. number sign - #
B. Data Warehouse D. semicolon - ;
C.Database
D.Data store
45. To get to 3NF
A. files have to be write aligned in database
B. files must be in 1NF
C. files must be in 1NF and 2NF
D. All of the above

You might also like