Exercise & Quiz Test – 23


Question 1

1. Which software coordinates the interaction of technology devices_________
1) Application software
2) Utility software
3) Development software
4) Systems software
5) None of these

Answer & Solution
4) Systems software
Question 2

2. Which is considered a direct entry input device________
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.

Answer & Solution
5) All of the above.
Question 3

3. Which is a secondary memory device?
1) CPU
2) Kilobyte
3) motherboard
4) Gigabyte
5) None of the above

Answer & Solution
5) None of the above
Question 4

4. If you wanted to tell the database management system that a specific attribute contained numbers only, what would you need to set?
1) Data category
2) Data type
3) Data dictionary
4) Data definition
5) None of these

Answer & Solution
2) Data type
Question 5

5. Which one of the following statements is false?
1) The data dictionary is normally maintained by the database
administrator.
2) Data elements in the database can be modified by changing the data dictionary.
3) The data dictionary contains the name and description of each data element.
4) The data dictionary is a tool used exclusively by the database administrator.
5) None of these

Answer & Solution
2) Data elements in the database can be modified by changing the data dictionary.
Question 6

6. A(n) _________converts all the source code into machine code, creating an executable file.
1) linker
2) compiler
3) assembler
4) interpreter
5) None of these

Answer & Solution
2) compiler
Question 7

7. The color of an object is an example of a(n) ________
1) attribute
2) detail
3) listing
4) specification
5) None of these

Answer & Solution
1) attribute
Question 8

8. The ________prevents unlawful access to voice communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these

Answer & Solution
1) Electronic Communications Privacy Act
Question 9

9. A _______ is anything that can cause harm.
1) vulnerability
2) phish
3) Threat
4) spoof
5) All of the above

Answer & Solution
3) Threat
Question 10

10. Which function in an organization plans for information resources?
1) Data administration
2) Database administration
3) Knowledge Management
4) Information Management
5) None of these

Answer & Solution
1) Data administration