Question: Software that can be installed with a Web browser to block access to certain Web sites that contain inappropriate or offensive material is known as which of the following?

Answer Options:

Web modem
router
Internet filter
bridge

Answer: Internet filter

 

Question: Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?

Answer Options:

India
United States
Japan
China

Answer: China

 

Question: Possession of child pornography is a federal offense punishable by up to how many years in prison?

Answer Options:

seven
five
ten
two

Answer: ten

 

Question: Which of the following statements is true of Children’s Internet Protection Act (CIPA)?

Answer Options:

CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
CIPA requires the tracking of Internet use by minors or adults.
In June 2004, the Supreme Court ruling in the case of Ashcroft v. American Civil Liberties Union made it clear that CIPA was unconstitutional.
In case of CIPA, Congress specifically defined what content or Web sites should be forbidden and the measures to be used.

Answer: CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

 

Question: The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government?

Answer Options:

defamation
audition
declamation

Answer: defamation

 

Question: Which of the following statements best describes the reason why social networking companies cannot be sued for defamation for user postings that appear on their sites?

Answer Options:

Section 230 of the Communications Decency Act (CDA) does not provide immunity to an Internet service provider (ISP).
The Communications Decency Act (CDA) is not applicable to social networking sites.
Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.
The Communications Decency Act (CDA) uses a vague definition of indecency.

Answer: Section 230 of the Communications Decency Act (CDA) is not considered unconstitutional.

 

Question: Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.

Answer Options:

True
False

Answer: False

 

Question: Smart devices will increasingly need __________. (select all that apply)

Answer Options:

new protocols
higher bandwidth
less cache
less memory

Answer: higher bandwidth

 

Question: Bits are used for computer data because they __________.

Answer Options:

are represented exclusively as alphabets
can have three possible states at a time
are easy to represent physically
are more complex than bytes

Answer: are easy to represent physically

 

Question: Main memory is also known as __________.

Answer Options:

optical memory
read-only memory
cache memory
random access memory

Answer: random access memory

 

Question: Which of the following is an example of SaaS?

Answer Options:

iCloud
Oracle on Demand
Amazon S3
Microsoft Windows Azure

Answer: iCloud

 

Question: Which of the following refers to the three tiers in the three-tier architecture?

Answer Options:

TCP, IP, and HTTP
tunnel, switch, and access point
HTML, XML, and JSON
user, server, and database

Answer: user, server, and database

 

Question: Identify the closed-source DBMS product(s) among the following. (Select all that apply)

Answer Options:

DB2
MySQL
Access
Oracle Database

Answer: DB2 Oracle Database

 

Question: The characteristics of an entity are referred to as _______.

Answer Options:

attributes
relationships
primary key(s)
foreign key(s)

Answer: attributes

 

Question: Which of the following is a NoSQL (i.e., not-relational) DBMS? (select all that apply)

Answer Options:

Access
SharePoint
Dynamo
Cassandra

Answer: Dynamo Cassandra

 

Question: A data integrity problem will occur only if __________.

Answer Options:

the database is very large
queries are sent simultaneously to the database
a database has multiple administrators
data are duplicated in a database

Answer: data are duplicated in a database

 

Question: An employee database includes a column named “Employee Number” to assign unique numbers to each employee. This column is referred to as a(n) __________.

Answer Options:

functionally dependent key
primary key
foreign key
master key

Answer: primary key

 

Question: In an E-R diagram, which symbol is used to indicate that at least one entity of that type is required?

Answer Options:

arrow
small oval
triangular block
vertical bar

Answer: vertical bar