Use for objects such as Microsoft Word documents, Microsoft Excel spreadsheets, pictures, sounds, or other binary data
35Access. Which of the following data types uses for Hyperlinks? UNC path or a URL.
36 Access. Which of the following data types stores up to 64000 characters? Hyperlinks
37 Access. Which of the following data types uses for text or combinations of text and numbers, such as addresses, or for numbers that do not require calculations ? TEXT
38 Access. Which of the following answers best suits the statement for HYPERLINK data types?
Use for HYPERLINKs . A HYPERLINK can be a UNC path or a URL .
39Access. How many different types of objects in an Access Database? 9
40 Access. Which of the following best suits the statement for MEMO data types?
Use for lenthy text and numbers,such as notes or discriptions.
41 Data model types. This database model organizes data into a tree-like-structure. hierarchical database model
42Data model types. In this model, a child node will only have a single parent node. Hierarchical model
43 Data model types. In this model, data is organized into tree-like structure with one one-to-many relationship between two different types of data. Hierarchical model
44 Data model types. In this model data is organized more like a graph NETWORK MODEL
45 Data model types. In this model, data is organized in two-dimensional tables and the relationship is maintained by storing a common field. RELATIONAL MODEL
46 Data model types. In this model, data are organized grid-like mathematical structures consisting of columns and rows. RELATIONAL MODEL
47Data model types. This model was introduced by E.F Codd in 1970. RELATIONAL MODEL
48Data model types. A column of a relational database column is synonymous with FIELD, Attributes
49Network. Acronym for Local Area Network LAN
50 Network. Acronym for Metropolitan Area Network MAN
51 Network. Acronym for Wide Area Network WAN
52Network. The Internet is what type of network? WAN
53Network. Which of the following network is a privately owned computer network covering a small Networks geographical area, like a home, office, or groups of buildings? LAN
54 Network. Which of the following network consists of a computer network across an entire city, college campus or small region? MAN
55 Network. Which of the following network occupies a very large area, such as an entire country or the entire world? WAN
56 Network. Which of the following network is a telecommunication network? WAN
57 Network. What does LAN stand for? Local Area Network
|
|
58 Network. What does WAN stand for? Wide Area Network
59 Network. Computers on a network are called Nodes
60 Network. The graphical arrangement of computer systems, or nodes to form a computer network, is called the network …… NETWORK TOPOLOGY
61Network. It is a set of computers connected together for the purpose of sharing resources. COMPUTER NETWORK
62 Network. What topology is in the picture? Bus topology.
63<question>Network. What topology is in the picture? RING
64<question>Network. What topology is in the picture? STAR
65 The techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation is called Cyber security or Information Technology Secruty
66 Basic techniques used for application security is 1) input parameter Validation, 2) user/role authentication & authorization 3) session management, parameter manipulation, exception management 4) auditingand logging
67Network security components include 1) anti virus and anti-spyware, 2) firewall, to block unauthorized access to your network 3) intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero day or zero-hour attacks 4) virtual private networks (VPNs) to provide secure remote access
68 Acronym for the Open Systems Interconnection OSI
69 OSI. A web browser (Google Chrome, Firefox, Safari, etc.) or other app - Skype, Outlook, Office - are examples of ……. applications? LAYER 7
70OSI. A good example of this is encryption and decryption of data for secure transmission - this happens at …… LAYER 6 - Presentation
71OSI. The best known example of this layer is the Transmission Control Protocol (TCP). Layer4 - Transport
72OSI. It’s layer has two sublayers - the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. LAYER 2 - Datalink
73OSI. This layer represents the electrical and physical representation of the system.LAYER 1 – Physical
74It is a collection of rules and procedures for two computers to exchange information. Protocol
75Network communication protocols: Basic data communication protocols TCP IP and HTTP
|
|
Дата добавления: 2019-11-25; просмотров: 137; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!