1. To provide security against unauthorized users
2. To process client requests for Web pages
3. To process client requests for database access
4. To provide TCP/IP
5. None of these
To provide TCP/IP
1. Data redundancy
2. Information overload
3. Duplicate data
4. Data inconsistency
5. None of these
Data inconsistency
1. Control words
2. Reserved words
3. Control structures
4. Reserved keys
5. None of these
Reserved words
1. A worm has the ability to self-propagate from an infected user's computer to other computers
2. A worm is usually written by a cracker: script bunnies do not have the skills to develop a worm program
3. A virus is very harmful to the computers it infects: a worm is not as serious a problem
4. Anti-virus software is effective in fighting viruses but not worms
5. None of these
A worm is usually written by a cracker: script bunnies do not have the skills to develop a worm program
1. Structures
2. Field markers
3. Field definitions
4. Field names
5. None of these
Field markers
1. Router
2. Modem
3. Node
4. Cable
5. None of these
Modem
1. Minimize the number of relationships
2. Minimize the number of entities
3. Minimize the number of tables
4. Minimize data redundancy
5. None of these
Minimize data redundancy
1. Extranet
2. Intranet
3. Internet
4. Hacker
5. None of these
Internet
1. URL
2. Web site address
3. Hyperlink
4. Domain name
5. None of these
Domain name
1. Transistor
2. Resistor
3. Integrated circuit
4. Semiconductor
5. None of these
Integrated circuit