Final Exam

Final Exam - ( the who Student Information Name: Skill Card...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
( the wh Student Information Name: Skill Card No: Contact Number: Email Address: Test Information Test Name: Final Exam (Fall 2008) Test Grade: 47 out of 50 Date Completed: 12/10/2008 10:42 Time to Complete: 00:21 # Area Question Description Correct Answer Student Answer G
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1 Final Fall 2008 Researchers are developing a sensor called _________ , designed to be so small that it floats in the air. smart dust smart dust 2 Final Fall 2008 A field whose value uniquely identifies each record in a table is called a(n): primary key. primary key. 4 Final Fall 2008 Using available technology to work from home or an off- site location is called _______. Telecommuting Telecommuting 5 Final Fall 2008 A(n) _____ acts or behaves like a human expert in a field or area. Expert system Expert system 6 Final Fall 2008 Structured Query Language is the name of a(n): language used for information retrieval in relational databases. set of commands that enables a program written in a language such as COBOL to interface with a database 7 Final Fall 2008 ____________ hardware is hardware that can change its architecture and behavior dynamically by autonomously interacting with its environment. evolvable evolvable 8 Final Fall 2008 The 2003 CAN-SPAM Act gives law enforcement the right to impose penalties on people using the Internet to distribute spam. True True 10 Final Fall 2008 _______ specialist analyzes a computer system's vulnerability to threats from worms, viruses, unauthorized access, and physical damage. security system 11 Final Fall 2008 What is the biggest difference between HTML and XHTML? XHTML documents must be well formed. XHTML documents must be well formed. 12 Final Fall 2008 The _____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition repetition control structure sequence control structure
Background image of page 2
is met. 13 Final Fall 2008 Strict DTD does NOT allow the use of deprecated elements. True True 14 Final Fall 2008 An unsolicited e-mail message encouraging you to participate in a contest for a world cruise is an example of: spam spam 15 Final Fall 2008 The act of attempting to fraudulently acquire information by distribution of e-mail messages asking prospective victims to verify their account or confirm billing information is referred to as _________ phishing phishing 17 Final Fall 2008 To create separate paragraphs, the content for each paragraph must exist within its own _____. <p> .
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 8

Final Exam - ( the who Student Information Name: Skill Card...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online