1. Question: Which of the following statement is not correct in term of computer viruses?

    A
    Viruses are small programs.

    B
    Viruses can destroy all your data.

    C
    It can spread from one computer to another

    D
    Computers are protected from viruses if we don't use internet.

    Note: Not available
    1. Report
  2. Question: Which one of the following statements about anti-virus software is true?

    A
    Anti-virus software can detect all known viruses

    B
    Anti-virus software can disinfect applications as well as files

    C
    Before accessing the internet, you need to run a virus check.

    D
    Deleting an infected file will eliminate the virus.

    Note: Not available
    1. Report
  3. Question: Which of the following secures our network from access by unauthorized users?

    A
    Backup

    B
    Firewall

    C
    Email

    D
    e-banking

    Note: Not available
    1. Report
  4. Question: A _____ is a field that uniquely identifies each record in a file.

    A
    data type

    B
    data file

    C
    primary key

    D
    data character

    Note: Not available
    1. Report
  5. Question: In some tables, the primary key consists of multiple fields, called a _____.

    A
    composite key

    B
    secondary key

    C
    key field

    D
    column

    Note: Not available
    1. Report
  6. Question: _____ procedures include adding records to, modifying records in, and deleting records from a file.

    A
    Range check

    B
    File maintenance

    C
    Backup

    D
    Validation

    Note: Not available
    1. Report
  7. Question: A _____ verifies that a required field contains data.

    A
    completeness check

    B
    range check

    C
    consistency check

    D
    numeric check

    Note: Not available
    1. Report
  8. Question: When an organization uses _____, many programs and users share the data in the database.

    A
    a data model

    B
    a file processing system

    C
    the database approach

    D
    a check digit

    Note: Not available
    1. Report
  9. Question: All of the following are strengths of the database approach, except _____.

    A
    less complexity

    B
    improved data integrity

    C
    reduced development time

    D
    easier access

    Note: Not available
    1. Report
  10. Question: Many organizations adopt the _____ policy, where users’ access privileges are limited to the lowest level necessary to perform required tasks.

    A
    golden rule

    B
    principle of least privilege

    C
    principle of highest access

    D
    least order

    Note: Not available
    1. Report
Copyright © 2024. Powered by Intellect Software Ltd