Term
|
Definition
| database programs can do all of the following except: |
|
|
Term
| computerized file cabinet |
|
Definition
| A(n) ______ is a good comparison to a database |
|
|
Term
|
Definition
| database software is an example of a(n): |
|
|
Term
| easy to secure because information from the database cannot be printed |
|
Definition
| advantages of databases include all of the following except: |
|
|
Term
|
Definition
| software for organizing storage and retrieval of information is a(n): |
|
|
Term
|
Definition
| a collection of information stored in an organized form in a computer is a(n): |
|
|
Term
|
Definition
| a relational database is composed of one or more: |
|
|
Term
|
Definition
| in a database table, a ______ is a collection of data fields |
|
|
Term
|
Definition
| in a customer database table, all of the information for one customer is kept in a: |
|
|
Term
|
Definition
| in a customer database, a customer's surname would be keyed into a: |
|
|
Term
|
Definition
| in a database, a _______ field shows results of calculations performed on data in other numeric fields |
|
|
Term
|
Definition
| the number of newspapers sold on May 30 would be kept in a ______ field |
|
|
Term
|
Definition
| bringing data from a word processing program into a database program is known as: |
|
|
Term
|
Definition
| ____ is perusing data in a database as if looking through pages in a notebook |
|
|
Term
|
Definition
| when looking for a specific patient in a hospital's database, _______ is more efficient than browsing |
|
|
Term
|
Definition
| arranging all customer records in customer number order is an example of: |
|
|
Term
|
Definition
| an ordered list of specific records and specific fields printed in an easy-to-read format is known as a(n): |
|
|
Term
|
Definition
The process of ____________ would be used when sending data from a database to a word processor so that mailing labels could be produced. |
|
|
Term
|
Definition
| database queries must be: |
|
|
Term
|
Definition
the following is an example of: select student_ID from students where major= business and credits >= 46 |
|
|
Term
| personal information manager |
|
Definition
|
|
Term
|
Definition
| a(n) _____ combines data tables with demographic information |
|
|
Term
|
Definition
| a ______ manipulates data in a large collection files and cross references those files |
|
|
Term
| database management system |
|
Definition
| a large corporation would use a _______ to keep records for many employees and customers along with all of its inventory data |
|
|
Term
|
Definition
| for a customer database, a good choice of key field would be: |
|
|
Term
| uniquely identify a record |
|
Definition
|
|
Term
|
Definition
| in a(n) _____, data from more than one table can be combined |
|
|
Term
|
Definition
| ______ processing is used when a large mail-order company accumulates orders and processes them together in one large set |
|
|
Term
|
Definition
| when making an airline reservation through the internet, you use _____ processing |
|
|
Term
|
Definition
| producing invoices once a month is an example of _____ processing |
|
|
Term
|
Definition
| in a typical client/server environment, the client can be any of the following expect a: |
|
|
Term
| processes a query from a client and then sends all the answers back to the client |
|
Definition
| in a client/server environment, the server: |
|
|
Term
|
Definition
| _______ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it |
|
|
Term
| locating trends and patters in information kept in large databases |
|
Definition
|
|
Term
|
Definition
| ____ is a new, powerful data description language used to construct web pages as well as access to query databases using the internet |
|
|
Term
|
Definition
| a CRM system organizes and tracks information on: |
|
|
Term
|
Definition
| in an object-oriented database, every object is an instance of a |
|
|
Term
|
Definition
| when a person uses language like ordinary English to query a database, it is known as a(n) _____ language query |
|
|
Term
|
Definition
| the act of accessing data about other people through credit card information, credit bureau data, and public records and then using that data without permission is known as: |
|
|
Term
| libraries must turn over their patrons' records |
|
Definition
| an aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants: |
|
|
Term
| accumulates so much data that it is difficult to use efficiently |
|
Definition
| one disadvantage of data mining is that it: |
|
|
Term
| two or more computers that are linked together |
|
Definition
| a basic computer network can be described as: |
|
|
Term
|
Definition
| the three essential components of every computer system include all of the following except: |
|
|
Term
| promotes independence so users have exclusive control over their own data and applications |
|
Definition
| all of the following are advantages of using a computer network except that it: |
|
|
Term
| wireless networks are generally faster than wired networks |
|
Definition
| all of the following statements are true except: |
|
|
Term
|
Definition
| a(n) _____ broadcasts messages to all devices connected to a LAN |
|
|
Term
|
Definition
| in a local area network, a ____ only transmits data to the destination node |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the primary difference between a LAN and a WAN is the: |
|
|
Term
|
Definition
| each individual computer and networked peripheral attached to a LAN is a: |
|
|
Term
|
Definition
| standard telephone cables containing copper wires are known as ______ cables |
|
|
Term
| generally faster than wired LAN |
|
Definition
| all of the following are true of a wireless network except: |
|
|
Term
| metropolitan area network |
|
Definition
|
|
Term
|
Definition
| the collection of common pathways between networks on a WAN is known as a: |
|
|
Term
|
Definition
| the device or program that forwards messages between networks is known as a: |
|
|
Term
|
Definition
| a(n) _____ is often used to set up a temporary communications systems that requires no centralized router |
|
|
Term
|
Definition
| the US Department of Defense uses a(n) _____, which is a specialized network used to determine locations, maps, and directions using signals from satellites that are orbiting the earth |
|
|
Term
|
Definition
| the system of satellites used to determine any position on the earth is known as: |
|
|
Term
|
Definition
| a set of parallel wires that carries digital signals among a computer's components is called a(n): |
|
|
Term
|
Definition
| in the 1970's, Xerox developed ______, which continues to be a popular networking architecture |
|
|
Term
| user is connecting to a network through a phone line, television cable, or wireless link |
|
Definition
| remote access means that a: |
|
|
Term
| socket that enables information to move in and out |
|
Definition
|
|
Term
|
Definition
| a newer PC will likely have an ethernet ____ on the main circuit board so it can directly connect to an ethernet network |
|
|
Term
|
Definition
| a(n) _____ port is faster and more flexible than a traditional serial or parallel port |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a(n) ______ adds a special serial port to a computer so it can be directly connected to a network |
|
|
Term
|
Definition
| the NIC controls the flow of data between the computer's RAM and the: |
|
|
Term
|
Definition
| a(n) _____ signal is represented by a continuous wave |
|
|
Term
|
Definition
| a(n) _____ converts a message from digital to analog or from analog to digital |
|
|
Term
|
Definition
| a voice message must be converted to a(n) ____ signal so it can be stored on a computer's hard drive |
|
|
Term
|
Definition
| ____ is defined as millions of bits |
|
|
Term
|
Definition
| the term, ______, refers to the amount of information transmitted through a communication medium in a given amount of time. |
|
|
Term
|
Definition
| a broadband connection could be any of the following except: |
|
|
Term
|
Definition
| a(n) _____ cable uses light waves to transmit multimedia and voice data |
|
|
Term
|
Definition
| a(n) ____ uses radio waves to carry information at high speed |
|
|
Term
|
Definition
| a personal area network is possible because of the wireless technology known as: |
|
|
Term
|
Definition
| _____ is new technology currently available in Japan, much of Europe, and some major US cities. it uses high-bandwidth connection to communicate multimedia over wireless networks |
|
|
Term
|
Definition
| the rules for how data is exchanged between network nodes is known as a(n): |
|
|
Term
|
Definition
| a _____ is a high-speed, high-end computer that shares data and other resources with client computers |
|
|
Term
|
Definition
| a ____ is a configuration that allows every computer on the network to act as both a client and a server |
|
|
Term
|
Definition
| ____ software enables a computer to function as a simple input/output device for sending messages to a host computer |
|
|
Term
|
Definition
| the ____ stores data and software that can to be shared by several users |
|
|
Term
|
Definition
| using a PC to copy software or data from a server, it is known as: |
|
|
Term
|
Definition
| when a business can legally copy software, to all of the computers they own, the company has a(n) _____ license: |
|
|
Term
|
Definition
| a(n) ______ is code embedded as a one-pixel graphics file in a web page or email message |
|
|
Term
|
Definition
| most web-based email systems use ____ to retrieve mail and store the messages in a folder on a remote mail server |
|
|
Term
|
Definition
| a(n) ______ is an invisible piece of code that notifies the sender that an email was opened and may even record other information about the user's computer or email software |
|
|
Term
|
Definition
| a worldwide public newsgroup available on the internet is: |
|
|
Term
|
Definition
| a worldwide public newsgroup available on the internet is: |
|
|
Term
| do not have to be online at the same time |
|
Definition
| asynchronous communication is when the sender and recipient |
|
|
Term
|
Definition
|
|
Term
|
Definition
| graphical bodies used to represent a person in a virtual meeting place are known as: |
|
|
Term
|
Definition
| _____ software and hardware allows a PC to act like a speakerphone |
|
|
Term
| online role-playing games involving hundreds of thousands of players |
|
Definition
|
|
Term
|
Definition
| unwanted junk email is known as |
|
|
Term
|
Definition
| ____ is designed to capture sensitive financial information from the person visiting a website |
|
|
Term
|
Definition
| a ____ helps block unauthorized access to a computer |
|
|
Term
|
Definition
| the _____ encryption scheme improves the security of wireless networks |
|
|
Term
|
Definition
| ____ is a secure electronic "tunnel" through the internet that prevents unauthorized access or eavesdropping |
|
|
Term
|
Definition
| what was the department of the US government that developed the initial stages of the internet? |
|
|
Term
|
Definition
| in what decade was ARPANET developed |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the internet is controlled by |
|
|
Term
|
Definition
| hundreds of universities, government entities, and research labs have formed? |
|
|
Term
| a few dozen computers at universities and government research centers |
|
Definition
| the first users of the internet were? |
|
|
Term
|
Definition
| much, or nearly all, of the cost of initially building and operating the internet was supplied by |
|
|
Term
| transmission control protocol/internet protocol |
|
Definition
|
|
Term
| standards not owned by any company |
|
Definition
|
|
Term
|
Definition
| every host computer on the internet has a(n) |
|
|
Term
|
Definition
| this address doesn't change every day |
|
|
Term
|
Definition
| this address changes temporarily as the application connect to the internet |
|
|
Term
|
Definition
| the way in which information is transmitted to multiple internet-connected devices is called |
|
|
Term
|
Definition
| the system that translates an IP address into an easier to remember name is the |
|
|
Term
|
Definition
| all of the following are top-level domains except |
|
|
Term
|
Definition
| all of the following are top-level domains except |
|
|
Term
|
Definition
| a recently created additional top-level domain name is |
|
|
Term
|
Definition
| a URL can specify the IP address of the web ____ that houses a web page |
|
|
Term
|
Definition
| in the e-mail address bowles@sou.edu "bowles" is the |
|
|
Term
| host computer in an educational domain |
|
Definition
| in the e-mail address bowles@sou.edu, "sou" is the |
|
|
Term
|
Definition
| in the web address www.casamexicanca.com.mx, "mx" is a(n) |
|
|
Term
|
Definition
| the three basic categories of connection to the internet include all except |
|
|
Term
|
Definition
| T1 and T3 connections are considered |
|
|
Term
|
Definition
| in a large organization LANs may be connected through a |
|
|
Term
|
Definition
| if you are at home and do not have a direct internet connection, you will most likely connect through a |
|
|
Term
|
Definition
| telephone modem connection are also called ____ connections, because they offer little bandwidth compared to other types of connections |
|
|
Term
|
Definition
| broadband connections include all of the following except |
|
|
Term
|
Definition
|
|
Term
| it cannot share signals with a telephone line of voice traffic |
|
Definition
| all of the following are disadvantages of a DSL connection except |
|
|
Term
| coaxial cables for television signals |
|
Definition
| cable modems use the same medias as |
|
|
Term
|
Definition
| wi-fi technology refers to |
|
|
Term
|
Definition
| a ____ is a computer connected to two networks |
|
|
Term
|
Definition
| which model is used by internet applications |
|
|
Term
|
Definition
| in a client/server model, a client program |
|
|
Term
|
Definition
| a university might have a(n) ______ to manage the mail of students, faculty, and staff |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the world wide web was introduced in |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the protocol used to transfer web pages is |
|
|
Term
|
Definition
| HTML commands, such as H1, are known as |
|
|
Term
|
Definition
| web pages can be created using |
|
|
Term
|
Definition
| web authoring software includes all of the following except |
|
|
Term
| a domain name registry company |
|
Definition
| to register a business name and create a unique URL, a business pays a fee and goes to |
|
|
Term
|
Definition
| an internet diary or grouping of ongoing commentaries is known a(n) |
|
|
Term
|
Definition
| downloadable software extensions that add new features to a browser are known as |
|
|
Term
|
Definition
| the first step when creating a web site should be to |
|
|
Term
|
Definition
| what markup language includes all of the features of HTML and programming extensions |
|
|
Term
|
Definition
| a software robot that systematically searches the web is a |
|
|
Term
|
Definition
| yahoo!, MSN, and netscape are examples of |
|
|
Term
|
Definition
| _____ is used when information is delivered to a client computer through a server at the clients request |
|
|
Term
|
Definition
| _____ is an XML form of sharing data |
|
|
Term
| peer-to-peer file sharing |
|
Definition
| using napster to make music files from one hard drive available to others rather than posting them on a central server is an example of |
|
|
Term
|
Definition
| in a survey of more than 500 companies and government agencies, ___ percent detected computer security breaches |
|
|
Term
|
Definition
| the survey showed that these businesses lost more than _____ due to security breaches |
|
|
Term
| trusted employee with no criminal record |
|
Definition
| the typical computer criminal is a(n) |
|
|
Term
|
Definition
| the majority of computer crimes are committed by |
|
|
Term
|
Definition
| the common name for the crime of stealing passwords is |
|
|
Term
|
Definition
| the FBI's operation cyber loss was designed to crack down on |
|
|
Term
|
Definition
| collecting personal information and effectively posing as another individual is known as the crime of |
|
|
Term
|
Definition
| ____ is the term for the use of deception to get someone's sensitive information |
|
|
Term
|
Definition
| malicious software is known as |
|
|
Term
|
Definition
| a program that performs a useful task while simultaneously allowing destructive acts is |
|
|
Term
|
Definition
| an intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a |
|
|
Term
|
Definition
| in 1999, the melissa virus was a widely publicized |
|
|
Term
|
Definition
| this virus that attaches itself to macros is called |
|
|
Term
|
Definition
| what type of virus uses computer hosts to reproduce itself |
|
|
Term
| microsoft server software |
|
Definition
| the code red worm attacked |
|
|
Term
|
Definition
| the thing that eventually terminates a worm is a lack of |
|
|
Term
|
Definition
| when a logic bomb is activated by a time-related event, it is known as a |
|
|
Term
|
Definition
| a logic bomb that was created to erupt on Michelangelo's birthday is an example of a |
|
|
Term
|
Definition
| what is the name of an application program that gathers information and sends it to someone through the internet |
|
|
Term
|
Definition
| when you visit certain web sites spyware may be automatically downloaded. this is called a |
|
|
Term
|
Definition
| standardization of microsoft programs and the windows operating system has made the spread of viruses |
|
|
Term
| a web pages in the HTML code |
|
Definition
|
|
Term
|
Definition
| software programs that close potential security breaches in an operating system are known as |
|
|
Term
| a denial of service attack |
|
Definition
| when customers of a web site are unable to access it due to a bombardment of fake traffic, it is known as |
|
|
Term
|
Definition
| unauthorized access to computers is called |
|
|
Term
|
Definition
| criminal hacking is called |
|
|
Term
|
Definition
| hackers who hijack legitimate web sites and redirect users to other sites are called |
|
|
Term
|
Definition
| ____ is the measurement of things such as finerprings and retinal scans used for security access |
|
|
Term
|
Definition
| what is the most common tool used to restrict access to a computer system |
|
|
Term
|
Definition
| the most common passwords in the US or britain include all of the following except |
|
|
Term
|
Definition
| hardware or software designed to guard against unauthorized access to a computer network is known as a(n) |
|
|
Term
|
Definition
| the scrambling of code is known as |
|
|
Term
|
Definition
| if you want to secure a message, us a(n) |
|
|
Term
|
Definition
| to prevent the loss of data during power failures, us a(N) |
|
|
Term
|
Definition
| a(n) ____ can shield electronic equipment from power spikes |
|
|
Term
| open all e-mail messages but open them slowly |
|
Definition
| all of these are suggestions for sage computing except |
|
|
Term
|
Definition
| freeware _____ encrypts data |
|
|
Term
|
Definition
| ___ is defines as any crime completed through the use of computer technology |
|
|
Term
|
Definition
| most computer systems rely solely on ____ for authentication |
|
|
Term
|
Definition
| creating strong computer security to prevent computer crime usually simultaneously helps protect |
|
|
Term
|
Definition
| over ____ was spent by businesses and government to repair problems in regard to Y2K |
|
|
Term
|
Definition
| what is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making |
|
|
Term
| reduce but not eliminate risks |
|
Definition
|
|