E
|
PASCAL
|
2
|
Т
|
|
A hotspot is:
|
A
|
|
special security system
|
B
|
+
|
wireless Internet system
|
C
|
|
cable connected Internet system
|
D
|
|
special kind of software
|
E
|
|
cable connector
|
3
|
Т
|
|
Hierarchical structure of websites is:
|
A
|
|
home page dependent websites
|
B
|
+
|
link up with each page
|
C
|
|
web based communications
|
D
|
|
link up between two pages
|
E
|
|
website
|
4
|
Т
|
|
Choose characteristic(s) of Bioinformatics.
|
A
|
|
Saving few data
|
B
|
+
|
A combination of biological data
|
C
|
|
uses of nano technology
|
D
|
|
technology dependent security
|
E
|
|
new technology
|
5
|
Т
|
|
Maximum speed of voice band is:
|
A
|
|
6900 bps
|
B
|
|
6900 kpbs
|
C
|
|
9500 kbps
|
D
|
+
|
9600 bps
|
E
|
|
1900 bps
|
6
|
Т
|
|
Choose database administrator's function(s).
|
A
|
+
|
database design
|
B
|
+
|
backing up the database
|
C
|
+
|
user coordination
|
D
|
|
output
|
E
|
|
search
|
F
|
|
pack
|
7
|
Т
|
|
Updating a database means ______ or ______
|
A
|
+
|
modifying
|
B
|
+
|
adding record occurrences
|
C
|
|
revising the file structure
|
D
|
|
reorganizing the database
|
E
|
|
delete darabase
|
8
|
Т
|
|
The designer of a form includes:
|
A
|
+
|
filed designators
|
B
|
+
|
prompts
|
C
|
|
data
|
D
|
|
search data
|
E
|
|
identity theft
|
9
|
Т
|
|
The data dictionary tells the DBMS:
|
A
|
+
|
what files are in the database
|
B
|
+
|
what attribute are possessed by the data
|
C
|
+
|
what these files contain
|
D
|
|
search data
|
E
|
|
copy file
|
F
|
|
delete file
|
10
|
Т
|
|
All of the following are examples of real security and privacy risks EXCEPT:
|
A
|
|
hackers
|
B
|
+
|
spam
|
C
|
|
viruses
|
D
|
|
identity theft
|
E
|
|
error
|
11
|
Т
|
|
To have a file hold a list, it is necessary to:
|
A
|
+
|
identify the records in the list
|
B
|
+
|
identify the name, width and type of the fields of each record
|
C
|
+
|
decide which fields will be used as sort or index keys
|
D
|
|
search record
|
E
|
|
delete record
|
F
|
|
fined key
|
12
|
Т
|
|
Sophisticated report generators can:
|
A
|
+
|
print row-oriented reports
|
B
|
+
|
perform arithmetic operations
|
C
|
+
|
selectively retrieve and print portions of a list
|
D
|
|
new base
|
E
|
|
select file
|
F
|
|
fined data
|
13
|
Т
|
|
Internal auditors should review data system design before they are:
|
A
|
+
|
developed
|
B
|
+
|
implemented
|
C
|
+
|
modified
|
D
|
|
select
|
E
|
|
update
|
F
|
|
search
|
14
|
Т
|
|
Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
|
A
|
|
computer forensics
|
B
|
+
|
robotics
|
C
|
|
simulation
|
D
|
|
forecasting
|
E
|
|
compile
|
15
|
Т
|
|
Technology no longer protected by copyright, available to everyone, is considered to be:
|
A
|
|
open
|
B
|
+
|
proprietary
|
C
|
|
experimental
|
D
|
|
in the public domain
|
E
|
|
close
|
16
|
Т
|
|
____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
|
A
|
|
Nanoscience
|
B
|
+
|
Artificial intelligence (AI)
|
C
|
|
Nanotechnology
|
D
|
|
Simulation
|
E
|
|
Information technology
|
17
|
Т
|
|
A set of programs that handle a firm's data base responsibilities is called:
|
A
|
+
|
Data Base Management System (DBMS)
|
B
|
+
|
Data Base Processing System (DBPS)
|
C
|
+
|
Data Management System (DMS)
|
D
|
|
Data Base
|
E
|
|
Data Management
|
F
|
|
Processing System
|
18
|
Т
|
|
____________ is data that has been organized or presented in a meaningful fashion.
|
A
|
|
A process
|
B
|
+
|
Information
|
C
|
|
Software
|
D
|
|
Storage
|
E
|
|
Hardware
|
19
|
Т
|
|
The name for the way that computers manipulate data into information is called:
|
A
|
|
programming
|
B
|
+
|
processing
|
C
|
|
storing
|
D
|
|
organizing
|
E
|
|
copy
|
20
|
Т
|
|
Characteristic(s) of a distributed MIS structure:
|
A
|
+
|
interactive sharing of the workload
|
B
|
+
|
a multiprocessing environment
|
C
|
+
|
computers supporting local DP operations
|
D
|
|
supporting
|
E
|
|
sharing
|
F
|
|
process data
|
21
|
Т
|
|
Computers gather data, which means that they allow users to ____________ data.
|
A
|
|
present
|
B
|
+
|
input
|
C
|
|
output
|
D
|
|
store
|
E
|
|
organizing
|
22
|
Т
|
|
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
|
A
|
|
data
|
B
|
+
|
output
|
C
|
|
input
|
|