Back to quiz

6. Web crawlers are used to _____

  • secure a webs server
  • build an index of web pages on the internet
  • help a user navigate to a specific pager

7. A flatfile database ______

  • Consists of one file
  • Consists of multiple file types
  • Is not stored permenantly

8. A record is ____

  • One row of the table
  • One column of the table
  • Another name given to the table

9. What is direct addressing?

  • Where the operand references a register that contains the address of the value used
  • Where the operand contains the memory address of the value being operated on
  • Where the operand is the actual value to be operated on

10. the Vernam Cipher uses ___ gates

  • OR
  • NAND
  • XOR
  • AND

11. 2NF requires the table to be in 1NF and...

  • contains no composite keys
  • contains attributes full dependent on the whole key
  • contains partial dependencies

12. The system bus connects the CPU, memory and ___.

  • Input output devices
  • input/output controllers
  • Input/output handles

13. A hash value is calculated using _____

  • White noise
  • The message data
  • A random key generator

14. How many busses are used to connect the Processor to memory?

  • 1,000,000
  • 3
  • 10

15. Internet registries are governed by the...

  • ICANN
  • INP
  • IPSS
  • ISPSS

16. What is used to transmit the memory address of a word

  • The address bus
  • The memory bus
  • The data bus
  • The bus bus

17. hash tables are used to ____

  • act as a foreign key in large data sets
  • create indexes of where data is stored
  • encrypt data
  • order data

18. The waterfall model describes a development process, where____

  • each development stage is completed one after another
  • Where steps are taken in unison
  • Where steps can be taken in any order

19. How many stages of normalisation are there?

  • 3
  • 2
  • 1

20. Contempary processor architecture is ____

  • Where there are hundreds of system buses
  • The use of both Harvard and Nuemann ideas
  • Quantum computing