ISSC290 Week 1 Quiz

pdf

School

American Military University *

*We aren’t endorsed by this school

Course

290

Subject

Information Systems

Date

Jan 9, 2024

Type

pdf

Pages

3

Uploaded by MagistrateMorningSquid9

Report
Attempt Score 10 / 10 - 100 % Overall Grade (Highest Attempt) 10 / 10 - 100 % Question 1 1 / 1 point ____ refers to the efforts taken through policy, procedure, and design in order to create and maintain the privacy and discretion of information and systems. Question options: Integrity Availability Confidentiality Portability Question 2 1 / 1 point The term ____ refers to those who have mastered the firmware and software of modern computer systems, and enjoy the exploration and analysis of network security with no intent to intrude or cause harm. Question options: cracker consultant hacker defender Question 3 1 / 1 point ____ are responsible for the theft and destruction that affect our systems. Question options: White Black Red Blue Question 4 1 / 1 point ____ are documents containing a specific programming language, such as HyperText Markup Language (HTML) or JAVA, etc., that are designed to be viewable on the World Wide Web. Question options:
Web pages Crackers Macros Patches Question 5 1 / 1 point ____ is an application that acts as the interface for the Internet, providing a way for people to interact with and view pages on the World Wide Web. Question options: HTTP Web Browser DNS Web Server Question 6 1 / 1 point The ____ holds a database of domain names and their respective IP addresses. Question options: HPPT SQL OS DNS Question 7 1 / 1 point Viruses that do not become active until predetermined specific conditions are met are known as ____ bombs. Question options: spyware logic worm Trojan Question 8 1 / 1 point A(n) ____ is an application that allows others to search stored data in order to locate specific information. Question options:
SQL POS TDS DBMS Question 9 1 / 1 point A ____ is a single field or group of fields used to identify an entry in a table. Question options: Cell Key Password sheet Question 10 1 / 1 point The ____ database structure is a treelike storage schema that represents records and relationships through the use of tiers and parent-to-child relationships. Question options: hierarchical flat relational object
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help