|
|
NET 101 - Networking Essentials I
Review for Third Test
The following questions are provided to help you study for
the third test. Do not expect to see these exact questions on the test.
- What kind of database would use only a spreadsheet to hold
its data?
- What does the word "confidentiality" mean, with regard to a
database system?
- What does the word "integrity" mean, with regard to a
database system?
- What does the word "availability" mean, with regard to a
database system?
- Use an example of your own to explain the meaning of the
word "entity".
- In a flat file system, we generally see data displayed in
rows and columns. What are two other database words for a "column"?
- What are two other database words for a "row"?
- Explain which words mean the same thing: attribute,
column, field, file, instance, property, record, relation, row, table,
tuple.
- Explain a one to many relationship. How is it different
from a many to one relationship?
- What is a one to one relationship?
- The
examples in class showed the use of the CHAR and DECIMAL data types.
Give an example of data that each type would be appropriate for.
- Some database words are the same as spreadsheet words. What
do you call the intersection of a row and a column?
- What would be an appropriate range check for a field that
is meant to hold a number that stands for a month?
- Web
sites often present forms to people making a purchase. What kind of
database check sends the customer back to the form to fill in empty
fields?
- Would the customer in the question above be creating a
table or adding a record to the seller's database?
- In a table, what is stored in a cell may be called an
entry. What are the relation rules about entries?
- Why do the six relation rules say that the order of rows
and columns is not important?
- One
of the relation rules says that a row must be unique. What do we call
the column or columns whose values make the row unique?
- What does SQL stand for?
-
Student Number |
Last Name |
First Name |
Grade |
1100123 |
Jones |
Shane |
B |
1100136 |
Smith |
Kim |
A |
Using the Student table above, write a formal notation describing the
structure of the table.
- What is the SQL command word that is used to create a new
table?
- What is the SQL command that would delete the table in
question 20?
- What is the SQL command to display all data in the table in
question 20?
- Why is the WHERE clause of an SQL command frequently
unnecessary?
- The
text tells us that a security risk can be related to an action or an
event. Give an example of each, explaining the difference between them.
- The
text has several definitions that overlap a good bit. What does it tell
us is the difference between a computer criminal and a cybercriminal?
- Assuming they are both "up to no good", what is the
difference between a hacker and a script kiddie?
- What are a couple of ways employees of a company might
create a security risk?
- What is a botnet used for? What are two names for the
computers included in a botnet?
- What is a DoS attack? What variation makes it a DDoS attack?
- What are two elements that might be spoofed in an email
based attack?
- How can an Acceptable Use Policy reduce security risks?
- How does a user normally identify him/herself to a network?
- What are the three parts that might be included in a
classic multipart identification scenario?
- What are three body parts that might be scanned to prove
identity?
- According to data presented in class, where are most
laptops stolen?
- What is the CAPTCHA system? What is it meant to prevent?
- Why is private key encryption also called symmetric key
encryption?
- What is another name for asymmetric encryption?
- Why can we say spear phishing is more focused than regular
phishing scams?
- What is social engineering, in the context of chapter 5?
|