Skip to content
Back to quiz
6. Web crawlers are used to _____
- secure a webs server
- build an index of web pages on the internet
- help a user navigate to a specific pager
7. A flatfile database ______
- Consists of one file
- Consists of multiple file types
- Is not stored permenantly
8. A record is ____
- One row of the table
- One column of the table
- Another name given to the table
9. What is direct addressing?
- Where the operand references a register that contains the address of the value used
- Where the operand contains the memory address of the value being operated on
- Where the operand is the actual value to be operated on
10. the Vernam Cipher uses ___ gates
11. 2NF requires the table to be in 1NF and...
- contains no composite keys
- contains attributes full dependent on the whole key
- contains partial dependencies
12. The system bus connects the CPU, memory and ___.
- Input output devices
- input/output controllers
- Input/output handles
13. A hash value is calculated using _____
- White noise
- The message data
- A random key generator
14. How many busses are used to connect the Processor to memory?
15. Internet registries are governed by the...
16. What is used to transmit the memory address of a word
- The address bus
- The memory bus
- The data bus
- The bus bus
17. hash tables are used to ____
- act as a foreign key in large data sets
- create indexes of where data is stored
- encrypt data
- order data
18. The waterfall model describes a development process, where____
- each development stage is completed one after another
- Where steps are taken in unison
- Where steps can be taken in any order
19. How many stages of normalisation are there?
20. Contempary processor architecture is ____
- Where there are hundreds of system buses
- The use of both Harvard and Nuemann ideas
- Quantum computing