NET 101 - Networking Essentials I
Review for Third Test
The following questions are provided to help you study for
the third test. Do not expect to see these exact questions on the test.
- What kind of database would use only a spreadsheet to hold
- What does the word "confidentiality" mean, with regard to a
- What does the word "integrity" mean, with regard to a
- What does the word "availability" mean, with regard to a
- Use an example of your own to explain the meaning of the
- In a flat file system, we generally see data displayed in
rows and columns. What are two other database words for a "column"?
- What are two other database words for a "row"?
- Explain which words mean the same thing: attribute,
column, field, file, instance, property, record, relation, row, table,
- Explain a one to many relationship. How is it different
from a many to one relationship?
- What is a one to one relationship?
examples in class showed the use of the CHAR and DECIMAL data types.
Give an example of data that each type would be appropriate for.
- Some database words are the same as spreadsheet words. What
do you call the intersection of a row and a column?
- What would be an appropriate range check for a field that
is meant to hold a number that stands for a month?
sites often present forms to people making a purchase. What kind of
database check sends the customer back to the form to fill in empty
- Would the customer in the question above be creating a
table or adding a record to the seller's database?
- In a table, what is stored in a cell may be called an
entry. What are the relation rules about entries?
- Why do the six relation rules say that the order of rows
and columns is not important?
of the relation rules says that a row must be unique. What do we call
the column or columns whose values make the row unique?
- What does SQL stand for?
Using the Student table above, write a formal notation describing the
structure of the table.
- What is the SQL command word that is used to create a new
- What is the SQL command that would delete the table in
- What is the SQL command to display all data in the table in
- Why is the WHERE clause of an SQL command frequently
text tells us that a security risk can be related to an action or an
event. Give an example of each, explaining the difference between them.
text has several definitions that overlap a good bit. What does it tell
us is the difference between a computer criminal and a cybercriminal?
- Assuming they are both "up to no good", what is the
difference between a hacker and a script kiddie?
- What are a couple of ways employees of a company might
create a security risk?
- What is a botnet used for? What are two names for the
computers included in a botnet?
- What is a DoS attack? What variation makes it a DDoS attack?
- What are two elements that might be spoofed in an email
- How can an Acceptable Use Policy reduce security risks?
- How does a user normally identify him/herself to a network?
- What are the three parts that might be included in a
classic multipart identification scenario?
- What are three body parts that might be scanned to prove
- According to data presented in class, where are most
- What is the CAPTCHA system? What is it meant to prevent?
- Why is private key encryption also called symmetric key
- What is another name for asymmetric encryption?
- Why can we say spear phishing is more focused than regular
- What is social engineering, in the context of chapter 5?