Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Which of the following statements about relational databases is true? a. Tables are composed of rows and columns. b. The set of tables are

1. Which of the following statements about relational databases is true?

a. Tables are composed of rows and columns.

b. The set of tables are also called records.

c. The columns are also called the records.

d. The rows are also called the fields.

e. Data is kept in graph format.

2. Bob and Tom are friends on Facebook. Tom frequently likes and comments on Bob's posts. How will the EdgeRank algorithm respond to Tom's actions?

No change - both Bob and Tom will see each other's posts with the same frequency.

Bob will see more of other Facebook users' posts.

Bob will see more of Tom's posts in his news feed.

Tom will see more of Bob's posts in his news feed.

Both Bob and Tom will see more of each other's posts in their news feed.

3. Using symmetric encryption, Ted encrypts a message with a secret key and sends the ciphertext to Joe. What does Joe need to decrypt the ciphertext?

The same secret key.

Nothing, because ciphertext can be easily read like plaintext.

A private key.

A public key.

A different secret key.

4. Which of the following is NOT TRUE about structured data?

a.

It is organized in a tabular format.

b.

It is stored in relational databases.

c.

It constitutes around 20% of today's data.

d.

It has irregular formats.

e.

The example is data stored in Access database.

5. Which of the following is NOT correct about a brute force attack?

a.

It can be avoided by locking the account after a number of failed attempts.

b.

It tries every single possible combination of password characters.

c.

It can be avoided using strong passwords.

d.

It injects malicious and executable Java script into the target websites.

e.

It's not a severe security threat in a well-design system.

6. Which of the following is NOT part of a typical cloud computing system?

a.

A firewall is used as part of the network security system e.g. to monitor and control incoming traffic to the network.

b.

Automatic backup of application data.

c.

Users accessing the cloud system using shared interface.

d.

Assignment of new connections by load balancing algorithms.

e.

It has a centralized location.

7. The uncertainty of data which can be due to data inconsistency and incompleteness relates to which attribute of the big data:

a.

Velocity

b.

Variety

c.

Vicinity

d.

Veracity

e.

Viability

8. Which of the following is correct with regards to secondary memory?

a.

Its capacity is smaller than RAM.

b.

It is faster than RAM.

c.

Its cost per bit is cheaper than RAM (Random Access Memory).

d.

Its content is erased in the absence of electricity.

e.

Its content cannot be altered.

9. What characteristic(s) that Document-based databases and Key-value pair databases have in common?

a.

They store data in a graph format.

b.

They are classified as relational databases.

c.

They store data in a key-value pair.

d.

All of the above.

e.

None of the above.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

International Marketing

Authors: Philip Cateora

16th Edition

0073529974, 9780073529974

More Books

Students also viewed these Economics questions