Term
|
Definition
|
|
Term
| Uniquely identify a record |
|
Definition
|
|
Term
|
Definition
| Bringing data from a word processing program into a database program is known as |
|
|
Term
|
Definition
| Database software is an example of a(n) |
|
|
Term
|
Definition
| The number of newspapers sold on May 30 would be kept in a ________ field |
|
|
Term
| Libraries must turn over their patrons' records |
|
Definition
| An aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants |
|
|
Term
| Computerized file cabinet |
|
Definition
| A(n) ________ is a good comparison to a database |
|
|
Term
|
Definition
| ________ processing is used when a large mail-order company accumulates orders and processes them together in one large set |
|
|
Term
| Accumulates so much data that it is difficult to use efficiently |
|
Definition
| One disadvantage of data mining is that it |
|
|
Term
|
Definition
| In a customer database, a customer's surname would be keyed into a |
|
|
Term
|
Definition
| In a customer database table, all of the information for one customer is kept in a |
|
|
Term
|
Definition
| ________ is perusing data in a database as if looking through pages in a notebook |
|
|
Term
|
Definition
| Database programs can do all of the following EXCEPT |
|
|
Term
|
Definition
The following is an example of: Select Student_ID From Students Where Major = Business and Credits >= 46 |
|
|
Term
|
Definition
| When a person uses language like ordinary English to query a database, it is known as a(n) ________ language query. |
|
|
Term
|
Definition
| A collection of information stored in an organized form in a computer is a(n) |
|
|
Term
| Personal Information Manager |
|
Definition
|
|
Term
|
Definition
| ________ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it. |
|
|
Term
|
Definition
| Unwanted junk email is known as |
|
|
Term
| Socket that enables information to move in or out |
|
Definition
|
|
Term
|
Definition
| ________ software enables a computer to function as a simple input/output device for sending messages to a host computer. |
|
|
Term
|
Definition
| A Broadband connection could be any of the following EXCEPT: |
|
|
Term
|
Definition
| ________ is new technology currently available in Japan, much of Europe, and some major US cities. It uses high-bandwidth connections to communicate multimedia over wireless networks. |
|
|
Term
| A user is connecting to a network through phone line, television cable, or wireless link |
|
Definition
| Remote access means that a |
|
|
Term
|
Definition
| Standard telephone cables containing copper wires are known as ________ cable |
|
|
Term
|
Definition
| The system of satellites used to determine any position on the Earth is known as |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A ________ is a high-speed, high-end computer that shares data and other resources with client computers |
|
|
Term
|
Definition
| A(n) ________ signal is represented by a continuous wave |
|
|
Term
|
Definition
| Graphical bodies used to represent a person in a virtual meeting place are known as |
|
|
Term
|
Definition
| A(n) ________ is code embedded as a one-pixel graphics file in a Web page or email message |
|
|
Term
|
Definition
| Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server. |
|
|
Term
|
Definition
| A personal area network is possible because of the wireless technology known as |
|
|
Term
| Online role-playing games involving hundred of thousands of players |
|
Definition
|
|
Term
|
Definition
| The ________ encryption scheme improves the security of wireless networks |
|
|
Term
|
Definition
| A(n) ________ adds a special serial port to a computer so it can be directly connected to a network |
|
|
Term
| Coaxial cables for television cables |
|
Definition
| Cable modems use the same media as |
|
|
Term
|
Definition
| What was the department of the U.S. government that developed the initial stages of the Internet? |
|
|
Term
|
Definition
| Telephone modem connections are also called ________ connections, because they offer little bandwidth compared to other types of connections. |
|
|
Term
| A few dozen computers at universities and government research centers |
|
Definition
| The first users of the Internet were |
|
|
Term
|
Definition
| A ________ is a computer connected to two networks |
|
|
Term
|
Definition
| In the Web address www.casamexicana.com.mx, mx is a(n) |
|
|
Term
| Standards not owned by any company |
|
Definition
|
|
Term
|
Definition
| All of the following are top-level domains EXCEPT |
|
|
Term
| Peer-to-peer file sharing |
|
Definition
| Using Napster to make music files from one hard drive available to others rather than posting them on a central server is an example of: |
|
|
Term
|
Definition
| A university might have a(n) ________ to manage the mail of students, faculty, and staff |
|
|
Term
| Host computer in an educational domain |
|
Definition
| In the e-mail address bowles@sou.edu, sou is the |
|
|
Term
|
Definition
| In a large organization LANs may be connected through a |
|
|
Term
| A domain name registry company |
|
Definition
| To register a business name and create a unique URL, a business pays a fee and goes to |
|
|
Term
|
Definition
| ________ is used when information is delivered to a client computer through a server at the clients request. |
|
|
Term
|
Definition
| Yahoo!, MSN, and Netscape are examples of |
|
|
Term
|
Definition
| The three basic categories of connection to the Internet include all EXCEPT |
|
|
Term
|
Definition
| All of the following are top-level domains EXCEPT |
|
|
Term
|
Definition
| This address doesnt change every day |
|
|
Term
|
Definition
| Collecting personal information and effectively posing as another individual is known as the crime of |
|
|
Term
|
Definition
| Software programs that close potential security breaches in an operating system are known as |
|
|
Term
|
Definition
| Over ________ was spent by businesses and government to repair problems in regard to Y2K |
|
|
Term
| A trusted employee with no criminal record |
|
Definition
| The typical computer criminal is a(n) |
|
|
Term
|
Definition
| The scrambling of code is known as |
|
|
Term
|
Definition
| The thing that eventually terminates a worm is a lack of |
|
|
Term
|
Definition
| Malicious software is known as |
|
|
Term
|
Definition
| Criminal hacking is called |
|
|
Term
|
Definition
| An intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a |
|
|
Term
|
Definition
| What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making? |
|
|
Term
| A web page in the HTML code |
|
Definition
|
|
Term
|
Definition
| Hardware or software designed to guard against unauthorized access to a computer network is known as a(n) |
|
|
Term
|
Definition
| Most computer systems rely solely on ________ for authentication |
|
|
Term
|
Definition
| A program that performs a useful task while simultaneously allowing destructive acts is a |
|
|
Term
|
Definition
| ________ is the measurement of things such as fingerprints and retinal scans used for security access |
|
|
Term
| Microsoft server software |
|
Definition
| The Code Red worm attacked |
|
|
Term
|
Definition
| In 1999, the Melissa virus was a widely publicized |
|
|