CIS103 Created by osama bani hamad

1- The Diamonds in a figure shown Represent
Optional or mandatory relationship
relationship
Entity
ER diagram
2- Which of the following Attributes is not normalized ?
Students
Class
Materials
a+c
3- from the following figure, the primary key of material entity is
Material Name
Material istructor
Material ID
a+c
4- the summation of two primary numbers 11011101 and 1011101101 = (?) in hexadecimal number
1111001010
3CA
1712
31210
5- the 10 TB = ( ? ) KB
10*1024*1024
10/(1024*1024*1024)
10*2^30
10/2^30
6- all software existing and potential in an organization means :
Application portfolio
organization's Application
Joint Application Design
Prototypes
7- Provide the software for the organizations as a service over network, indicate
Software as a Service
Application Service provider
Application service management
Web host
8-System Development Life Cycle is an example modern methods to Create Application.
True
False
9-The examination of the business problem that the organization plan to solve with an information system.
Testing
Debugging
Knowing user requirement
Maintenance
10- is interested in the design phase and the analysis stage only to create an application
Rapid Application Development
Agile
Computer-Assisted software engineering
Joint Application Development
11-Deliver frequent communication in rapid iterations is an example of
RAD
Agile
CASE
ICASE
12- Deliberate threat, designed to capture your sensitive information such as password and send them to creator .
Worm
Logic bomb
Trojan horse
Denial of service
13- Perpetrators attack the vulnerability before the software vendor can prepare a patch for vulnerability.
Back door
phishing attack
denial software
zero day attack
14-Smaller, faster, cheaper computers and storage devices this factor leads to decrease threats of information privacy.
True
False
15-computing skills necessary to be a hacker are decreasing this factor leads to decrease threats of information privacy.
True
False
16- Occur when attacked company system use to attack another company system.
Cybercrime
Downstream liability
Unmanaged devices
Denial of service
17-insufficient funding, technological obsolescence, and lack of attention these points are related with which type of factors Increasing privacy threats.
Government legislation
Lack of management support
Downstream liability
Unmanaged devices
18-is the harm, loss or damage that can result if a threat compromises that resource.
threat to an information
exposure of information resources
system’s vulnerability
Risk
19-Software that gathers user information through the user’s Internet connection without their knowledge
Trojan horse
Spyware
Virus
Adware
20-Determines which actions, rights, or privileges the person has, based on verified identity.
Privacy
Authorization.
Ppplication control
Authentication.
0
{"name":"CIS103 Created by osama bani hamad", "url":"https://www.quiz-maker.com/Q9EY3ZR","txt":"1- The Diamonds in a figure shown Represent, 2- Which of the following Attributes is not normalized ?, 3- from the following figure, the primary key of material entity is","img":"https://cdn.poll-maker.com/32-1094100/er.jpg?sz=1200"}
Powered by: Quiz Maker