GMU IT 104 FINAL EXAM REVIEW
A map of a database is called a________. - Answers -schema
___________language, known as the first generation of programming languages, is the
only language a computer directly recognizes. - Answers -Machine
A_______is a program that copies itself repeatedly in memory or on a network, using up
resources and possibly shutting down the computer or network. - Answers -Worm
A(n)________ is a separate area of a hard disk that holds an infected file until the
infection can be removed. - Answers -quarantine
Web site owners generally prefer more rather than less traffic. Excessive traffic,
however, designed to immobilize a Web site can be caused by: - Answers -DoS (Denial
of Service)
_______ is a technique of exhaustively working through all possible combinations of
letters, numbers, and special characters in order to guess a password. - Answers -
Bruteforce attack
____ is a popular programming language for client-side applications that enable a user
to create interactive Web pages that respond to user actions. - Answers -JavaScript
Two popular screen readers are JAWS and ICE. - Answers -False
To indicate that a Web page is secure, many browsers display a(n): - Answers -Image
of a locked padlock
Which of the following is used for defining the visual design of a Web page or group of
pages? - Answers -Cascading Style Sheets (CSS)
A _____ can be used to communicate information about your clothes being washed to
the washing machine. - Answers -agent
Elimination of data redundancy does not solve which problem: - Answers -Data entry
errors
Using _____, Web users can jump between Web pages stored on various Web servers,
creating the illusion of interacting with one big computer. - Answers -hyperlinks
When the records of more than one table are necessary to answer a query the tables
must be ______. - Answers -joined
A map of a database is called a________. - Answers -schema
___________language, known as the first generation of programming languages, is the
only language a computer directly recognizes. - Answers -Machine
A_______is a program that copies itself repeatedly in memory or on a network, using up
resources and possibly shutting down the computer or network. - Answers -Worm
A(n)________ is a separate area of a hard disk that holds an infected file until the
infection can be removed. - Answers -quarantine
Web site owners generally prefer more rather than less traffic. Excessive traffic,
however, designed to immobilize a Web site can be caused by: - Answers -DoS (Denial
of Service)
_______ is a technique of exhaustively working through all possible combinations of
letters, numbers, and special characters in order to guess a password. - Answers -
Bruteforce attack
____ is a popular programming language for client-side applications that enable a user
to create interactive Web pages that respond to user actions. - Answers -JavaScript
Two popular screen readers are JAWS and ICE. - Answers -False
To indicate that a Web page is secure, many browsers display a(n): - Answers -Image
of a locked padlock
Which of the following is used for defining the visual design of a Web page or group of
pages? - Answers -Cascading Style Sheets (CSS)
A _____ can be used to communicate information about your clothes being washed to
the washing machine. - Answers -agent
Elimination of data redundancy does not solve which problem: - Answers -Data entry
errors
Using _____, Web users can jump between Web pages stored on various Web servers,
creating the illusion of interacting with one big computer. - Answers -hyperlinks
When the records of more than one table are necessary to answer a query the tables
must be ______. - Answers -joined