logo image

chapter 8,9,12,13,14 and 15

True
A firewall is a security system that creates a barrier between a computer or network and the Internet in order to protect against unauthorized access
False
If you have a Wi-Fi network, its security features works by default. Hence, there is no need to anything else to protect the network.
False
A computer worm infects other computer files exactly the same way as a virus does
False
Biometric authentication uses information that an individual should know or can easily remember.
True
Botnets are a major security threat since criminals are increasingly creating botnets to use for computer sabotage.
False
Denial of service attacks are usually of insignificant cost in terms of business lost.
False
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
True
Information used in identity theft can be obtained by skimming or via social engineering
False
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
True
Private key encryption is also called symmetric key encryption, in which same key is used for both encryption and decryption
Cybercrime
Crimes committed via the use of a computer is called
True
A design and manufacturing system helps with efficient decision making regarding the manufacturing of products.
False
A paperless office has been achieved through a variety of technologies and processing techniques, and needs for using paper is NO LONGER needed.
True
Benchmark tests are tests to measure a computer system performance under typical usage considerations before purchase the system.
False
ERP refers to the process of requiring to submit and RFP or and RFQ.
True
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, and other organizations.
False
Operating systems software manage and process data starting from the generation of data through its conversion into information.
False
The final phase of the SDLC is System Analysis
False
The goal of supply chain management (SCM) is to organize and correlate all data required for Paperless Office
True
With a JIT system, inventory, production resources, and finished products are limited to the right number at the right time as required to fill orders.
True
An example of run-time error is when a program stop running due to division by zero.
False
Comments in a programming language are part of the code and it will be translated to machine code
True
A program bug is an error that causes a program to malfunction.
True
A structured program is divided into individual modules; each module represents a specific processing task
False
One of the control structure in a Programming Language is the repetition control structure which is also called the selection control structure.
True
Pseudocode uses English-like statements to express the necessary steps or the logic in a computer program
True
Structured programming embodies a top-down design philosophy.
True
Syntax error refers to the error in the grammar of the language being used.
True
Translating programming code to machine language can be done via compilers or interpreters.
True
With a logic error, the program will run but the output will be wrong.
True
A database can be defined as a group of related tables.
True
Arranging data for efficient retrieval is called data sorting.
True
Data dictionary contains meta-data about all data in a database application.
True
Data integrity refers to the accuracy of data
True
Data Protection refers to protecting data against destruction and misuse—both intentionally and accidentally.
False
In a table of a database, a record can be viewed as one column in the table.
True
Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity. For example, a class may be taken by many students and also each student can enrol in many classes
True
Most databases created today do use the relational database model
True
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
True
Typically, in hierarchical database management systems, a one-to-many relationship exists between data entities.
True
A computer network connects various computing devices hence make it possible to share resources such as many users sharing a printer.
False
An Intranet network is a public network that is accessible by any one with an Internet connection.
False
In a bus network topology, all the networked devices connect to a central device (such as a hub or a switch) through which all network transmissions are sent.
True
The Internet is the largest network exist as it connects various network together.
True
The original Plain Old Telephone Service(POTS) was one of the first communication network created.
False
Transferring data from a client computer, such as your home computer, to a server in a remote location is referred to as downloading.
False
Twisted pair cable can ONLY be used for transmitting signals for telephone networks but not for computer networks
True
A Local Area Network (LAN) is a network is network in a small geographical area such as in an educational campus.
False
Coaxial cable are typically used in peer-to-peer network such as the Comcast connections that comes to your house,
True
Communications satellites are space-based devices launched into orbit around the earth to receive and transmit microwave signals to and from earth.

Need essay sample on "chapter 8,9,12,13,14 and 15"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy