1.All the following are examples of real security and privacy risks except (2)
(1) Hackers (2) Spam (3) Viruses (4) Identity theft (5) None of these
2.A (n) …… system is a small, wireless handheld computer that scans items, tags and pulls up the current price (and any special offer) as you shop. (1)
(1) PSS (2) POS (3) Inventory (4) Data mining (5) None of these
3.Which of the following is not a Web Browser? (3)
(1) Opera (2) Netscape (3) Microsoft Outlook (4) Internet Explorer (5) None of these
4.…… is a secret word which is used to prevent access to a file system or network? (2)
(1) login (2) Password (3) account no. (4) net id (5) None of these
5.The RDBMS terminology for a row is called (4)
(1) relation (2) attribute (3) degree (4) tuple (5) None of these