Use for objects such as Microsoft Word documents, Microsoft Excel spreadsheets, pictures, sounds, or other binary data



35Access. Which of the following data types uses for Hyperlinks? UNC path or a URL.

36 Access. Which of the following data types stores up to 64000 characters? Hyperlinks

37 Access. Which of the following data types uses for text or combinations of text and numbers, such as addresses, or for numbers that do not require calculations ? TEXT

38 Access. Which of the following answers best suits the statement for HYPERLINK data types?

Use for HYPERLINKs . A HYPERLINK can be a UNC path or a URL .

39Access. How many different types of objects in an Access Database? 9

40 Access. Which of the following best suits the statement for MEMO data types?

Use for lenthy text and numbers,such as notes or discriptions.

41 Data model types. This database model organizes data into a tree-like-structure. hierarchical database model

42Data model types. In this model, a child node will only have a single parent node. Hierarchical model

43 Data model types. In this model, data is organized into tree-like structure with one one-to-many relationship between two different types of data. Hierarchical model

44 Data model types. In this model data is organized more like a graph NETWORK MODEL

45 Data model types. In this model, data is organized in two-dimensional tables and the relationship is maintained by storing a common field. RELATIONAL MODEL

46 Data model types. In this model, data are organized grid-like mathematical structures consisting of columns and rows. RELATIONAL MODEL

47Data model types. This model was introduced by E.F Codd in 1970. RELATIONAL MODEL

48Data model types. A column of a relational database column is synonymous with FIELD, Attributes

49Network. Acronym for Local Area Network LAN

50 Network. Acronym for Metropolitan Area Network MAN

51 Network. Acronym for Wide Area Network WAN

52Network. The Internet is what type of network? WAN

53Network. Which of the following network is a privately owned computer network covering a small Networks geographical area, like a home, office, or groups of buildings? LAN

54 Network. Which of the following network consists of a computer network across an entire city, college campus or small region? MAN

55 Network. Which of the following network occupies a very large area, such as an entire country or the entire world? WAN

56 Network. Which of the following network is a telecommunication network? WAN

57 Network. What does LAN stand for? Local Area Network

58 Network. What does WAN stand for? Wide Area Network

59 Network. Computers on a network are called Nodes

60 Network. The graphical arrangement of computer systems, or nodes to form a computer network, is called the network …… NETWORK TOPOLOGY

61Network. It is a set of computers connected together for the purpose of sharing resources. COMPUTER NETWORK

62 Network. What topology is in the picture? Bus topology.

63<question>Network. What topology is in the picture? RING

64<question>Network. What topology is in the picture? STAR

65 The techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation is called Cyber security or Information Technology Secruty

66 Basic techniques used for application security is 1) input parameter Validation, 2) user/role authentication & authorization 3) session management, parameter manipulation, exception management 4) auditingand logging

67Network security components include 1) anti virus and anti-spyware, 2) firewall, to block unauthorized access to your network 3) intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero day or zero-hour attacks 4) virtual private networks (VPNs) to provide secure remote access

68 Acronym for the Open Systems Interconnection OSI

69 OSI. A web browser (Google Chrome, Firefox, Safari, etc.) or other app - Skype, Outlook, Office - are examples of ……. applications? LAYER 7

70OSI. A good example of this is encryption and decryption of data for secure transmission - this happens at …… LAYER 6 - Presentation

71OSI. The best known example of this layer is the Transmission Control Protocol (TCP). Layer4 - Transport

72OSI. It’s layer has two sublayers - the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. LAYER 2 - Datalink

73OSI. This layer represents the electrical and physical representation of the system.LAYER 1 – Physical

74It is a collection of rules and procedures for two computers to exchange information. Protocol

75Network communication protocols: Basic data communication protocols TCP IP and HTTP

 


Дата добавления: 2019-11-25; просмотров: 137; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!