NET 101 - Networking Essentials I

Review for Third Test

The following questions are provided to help you study for the third test. Do not expect to see these exact questions on the test.

  1. What kind of database would use only a spreadsheet to hold its data?

  2. What does the word "confidentiality" mean, with regard to a database system?

  3. What does the word "integrity" mean, with regard to a database system?

  4. What does the word "availability" mean, with regard to a database system?

  5. Use an example of your own to explain the meaning of the word "entity".

  6. In a flat file system, we generally see data displayed in rows and columns. What are two other database words for a "column"?

  7. What are two other database words for a "row"?

  8. Explain which words mean the same thing: attribute, column, field, file, instance, property, record, relation, row, table, tuple.

  9. Explain a one to many relationship. How is it different from a many to one relationship?

  10. What is a one to one relationship?

  11. The examples in class showed the use of the CHAR and DECIMAL data types. Give an example of data that each type would be appropriate for.

  12. Some database words are the same as spreadsheet words. What do you call the intersection of a row and a column?

  13. What would be an appropriate range check for a field that is meant to hold a number that stands for a month?

  14. Web sites often present forms to people making a purchase. What kind of database check sends the customer back to the form to fill in empty fields?

  15. Would the customer in the question above be creating a table or adding a record to the seller's database?

  16. In a table, what is stored in a cell may be called an entry. What are the relation rules about entries?

  17. Why do the six relation rules say that the order of rows and columns is not important?

  18. One of the relation rules says that a row must be unique. What do we call the column or columns whose values make the row unique?

  19. What does SQL stand for?

  20. Student Number Last Name First Name Grade
    1100123 Jones Shane B
    1100136 Smith Kim A
    Using the Student table above, write a formal notation describing the structure of the table.

  21. What is the SQL command word that is used to create a new table?

  22. What is the SQL command that would delete the table in question 20?

  23. What is the SQL command to display all data in the table in question 20?

  24. Why is the WHERE clause of an SQL command frequently unnecessary?

  25. The text tells us that a security risk can be related to an action or an event. Give an example of each, explaining the difference between them.

  26. The text has several definitions that overlap a good bit. What does it tell us is the difference between a computer criminal and a cybercriminal?

  27. Assuming they are both "up to no good", what is the difference between a hacker and a script kiddie?

  28. What are a couple of ways employees of a company might create a security risk?

  29. What is a botnet used for? What are two names for the computers included in a botnet?

  30. What is a DoS attack? What variation makes it a DDoS attack?

  31. What are two elements that might be spoofed in an email based attack?

  32. How can an Acceptable Use Policy reduce security risks?

  33. How does a user normally identify him/herself to a network?

  34. What are the three parts that might be included in a classic multipart identification scenario?

  35. What are three body parts that might be scanned to prove identity?

  36. According to data presented in class, where are most laptops stolen?

  37. What is the CAPTCHA system? What is it meant to prevent?

  38. Why is private key encryption also called symmetric key encryption?

  39. What is another name for asymmetric encryption?

  40. Why can we say spear phishing is more focused than regular phishing scams?

  41. What is social engineering, in the context of chapter 5?