Term
|
Definition
database programs can do all of the following except: |
|
|
Term
computerized file cabinet |
|
Definition
A(n) ______ is a good comparison to a database |
|
|
Term
|
Definition
database software is an example of a(n): |
|
|
Term
easy to secure because information from the database cannot be printed |
|
Definition
advantages of databases include all of the following except: |
|
|
Term
|
Definition
software for organizing storage and retrieval of information is a(n): |
|
|
Term
|
Definition
a collection of information stored in an organized form in a computer is a(n): |
|
|
Term
|
Definition
a relational database is composed of one or more: |
|
|
Term
|
Definition
in a database table, a ______ is a collection of data fields |
|
|
Term
|
Definition
in a customer database table, all of the information for one customer is kept in a: |
|
|
Term
|
Definition
in a customer database, a customer's surname would be keyed into a: |
|
|
Term
|
Definition
in a database, a _______ field shows results of calculations performed on data in other numeric fields |
|
|
Term
|
Definition
the number of newspapers sold on May 30 would be kept in a ______ field |
|
|
Term
|
Definition
bringing data from a word processing program into a database program is known as: |
|
|
Term
|
Definition
____ is perusing data in a database as if looking through pages in a notebook |
|
|
Term
|
Definition
when looking for a specific patient in a hospital's database, _______ is more efficient than browsing |
|
|
Term
|
Definition
arranging all customer records in customer number order is an example of: |
|
|
Term
|
Definition
an ordered list of specific records and specific fields printed in an easy-to-read format is known as a(n): |
|
|
Term
|
Definition
The process of ____________ would be used when sending data from a database to a word processor so that mailing labels could be produced. |
|
|
Term
|
Definition
database queries must be: |
|
|
Term
|
Definition
the following is an example of: select student_ID from students where major= business and credits >= 46 |
|
|
Term
personal information manager |
|
Definition
|
|
Term
|
Definition
a(n) _____ combines data tables with demographic information |
|
|
Term
|
Definition
a ______ manipulates data in a large collection files and cross references those files |
|
|
Term
database management system |
|
Definition
a large corporation would use a _______ to keep records for many employees and customers along with all of its inventory data |
|
|
Term
|
Definition
for a customer database, a good choice of key field would be: |
|
|
Term
uniquely identify a record |
|
Definition
|
|
Term
|
Definition
in a(n) _____, data from more than one table can be combined |
|
|
Term
|
Definition
______ processing is used when a large mail-order company accumulates orders and processes them together in one large set |
|
|
Term
|
Definition
when making an airline reservation through the internet, you use _____ processing |
|
|
Term
|
Definition
producing invoices once a month is an example of _____ processing |
|
|
Term
|
Definition
in a typical client/server environment, the client can be any of the following expect a: |
|
|
Term
processes a query from a client and then sends all the answers back to the client |
|
Definition
in a client/server environment, the server: |
|
|
Term
|
Definition
_______ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it |
|
|
Term
locating trends and patters in information kept in large databases |
|
Definition
|
|
Term
|
Definition
____ is a new, powerful data description language used to construct web pages as well as access to query databases using the internet |
|
|
Term
|
Definition
a CRM system organizes and tracks information on: |
|
|
Term
|
Definition
in an object-oriented database, every object is an instance of a |
|
|
Term
|
Definition
when a person uses language like ordinary English to query a database, it is known as a(n) _____ language query |
|
|
Term
|
Definition
the act of accessing data about other people through credit card information, credit bureau data, and public records and then using that data without permission is known as: |
|
|
Term
libraries must turn over their patrons' records |
|
Definition
an aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants: |
|
|
Term
accumulates so much data that it is difficult to use efficiently |
|
Definition
one disadvantage of data mining is that it: |
|
|
Term
two or more computers that are linked together |
|
Definition
a basic computer network can be described as: |
|
|
Term
|
Definition
the three essential components of every computer system include all of the following except: |
|
|
Term
promotes independence so users have exclusive control over their own data and applications |
|
Definition
all of the following are advantages of using a computer network except that it: |
|
|
Term
wireless networks are generally faster than wired networks |
|
Definition
all of the following statements are true except: |
|
|
Term
|
Definition
a(n) _____ broadcasts messages to all devices connected to a LAN |
|
|
Term
|
Definition
in a local area network, a ____ only transmits data to the destination node |
|
|
Term
|
Definition
|
|
Term
|
Definition
the primary difference between a LAN and a WAN is the: |
|
|
Term
|
Definition
each individual computer and networked peripheral attached to a LAN is a: |
|
|
Term
|
Definition
standard telephone cables containing copper wires are known as ______ cables |
|
|
Term
generally faster than wired LAN |
|
Definition
all of the following are true of a wireless network except: |
|
|
Term
metropolitan area network |
|
Definition
|
|
Term
|
Definition
the collection of common pathways between networks on a WAN is known as a: |
|
|
Term
|
Definition
the device or program that forwards messages between networks is known as a: |
|
|
Term
|
Definition
a(n) _____ is often used to set up a temporary communications systems that requires no centralized router |
|
|
Term
|
Definition
the US Department of Defense uses a(n) _____, which is a specialized network used to determine locations, maps, and directions using signals from satellites that are orbiting the earth |
|
|
Term
|
Definition
the system of satellites used to determine any position on the earth is known as: |
|
|
Term
|
Definition
a set of parallel wires that carries digital signals among a computer's components is called a(n): |
|
|
Term
|
Definition
in the 1970's, Xerox developed ______, which continues to be a popular networking architecture |
|
|
Term
user is connecting to a network through a phone line, television cable, or wireless link |
|
Definition
remote access means that a: |
|
|
Term
socket that enables information to move in and out |
|
Definition
|
|
Term
|
Definition
a newer PC will likely have an ethernet ____ on the main circuit board so it can directly connect to an ethernet network |
|
|
Term
|
Definition
a(n) _____ port is faster and more flexible than a traditional serial or parallel port |
|
|
Term
|
Definition
|
|
Term
|
Definition
a(n) ______ adds a special serial port to a computer so it can be directly connected to a network |
|
|
Term
|
Definition
the NIC controls the flow of data between the computer's RAM and the: |
|
|
Term
|
Definition
a(n) _____ signal is represented by a continuous wave |
|
|
Term
|
Definition
a(n) _____ converts a message from digital to analog or from analog to digital |
|
|
Term
|
Definition
a voice message must be converted to a(n) ____ signal so it can be stored on a computer's hard drive |
|
|
Term
|
Definition
____ is defined as millions of bits |
|
|
Term
|
Definition
the term, ______, refers to the amount of information transmitted through a communication medium in a given amount of time. |
|
|
Term
|
Definition
a broadband connection could be any of the following except: |
|
|
Term
|
Definition
a(n) _____ cable uses light waves to transmit multimedia and voice data |
|
|
Term
|
Definition
a(n) ____ uses radio waves to carry information at high speed |
|
|
Term
|
Definition
a personal area network is possible because of the wireless technology known as: |
|
|
Term
|
Definition
_____ is new technology currently available in Japan, much of Europe, and some major US cities. it uses high-bandwidth connection to communicate multimedia over wireless networks |
|
|
Term
|
Definition
the rules for how data is exchanged between network nodes is known as a(n): |
|
|
Term
|
Definition
a _____ is a high-speed, high-end computer that shares data and other resources with client computers |
|
|
Term
|
Definition
a ____ is a configuration that allows every computer on the network to act as both a client and a server |
|
|
Term
|
Definition
____ software enables a computer to function as a simple input/output device for sending messages to a host computer |
|
|
Term
|
Definition
the ____ stores data and software that can to be shared by several users |
|
|
Term
|
Definition
using a PC to copy software or data from a server, it is known as: |
|
|
Term
|
Definition
when a business can legally copy software, to all of the computers they own, the company has a(n) _____ license: |
|
|
Term
|
Definition
a(n) ______ is code embedded as a one-pixel graphics file in a web page or email message |
|
|
Term
|
Definition
most web-based email systems use ____ to retrieve mail and store the messages in a folder on a remote mail server |
|
|
Term
|
Definition
a(n) ______ is an invisible piece of code that notifies the sender that an email was opened and may even record other information about the user's computer or email software |
|
|
Term
|
Definition
a worldwide public newsgroup available on the internet is: |
|
|
Term
|
Definition
a worldwide public newsgroup available on the internet is: |
|
|
Term
do not have to be online at the same time |
|
Definition
asynchronous communication is when the sender and recipient |
|
|
Term
|
Definition
|
|
Term
|
Definition
graphical bodies used to represent a person in a virtual meeting place are known as: |
|
|
Term
|
Definition
_____ software and hardware allows a PC to act like a speakerphone |
|
|
Term
online role-playing games involving hundreds of thousands of players |
|
Definition
|
|
Term
|
Definition
unwanted junk email is known as |
|
|
Term
|
Definition
____ is designed to capture sensitive financial information from the person visiting a website |
|
|
Term
|
Definition
a ____ helps block unauthorized access to a computer |
|
|
Term
|
Definition
the _____ encryption scheme improves the security of wireless networks |
|
|
Term
|
Definition
____ is a secure electronic "tunnel" through the internet that prevents unauthorized access or eavesdropping |
|
|
Term
|
Definition
what was the department of the US government that developed the initial stages of the internet? |
|
|
Term
|
Definition
in what decade was ARPANET developed |
|
|
Term
|
Definition
|
|
Term
|
Definition
the internet is controlled by |
|
|
Term
|
Definition
hundreds of universities, government entities, and research labs have formed? |
|
|
Term
a few dozen computers at universities and government research centers |
|
Definition
the first users of the internet were? |
|
|
Term
|
Definition
much, or nearly all, of the cost of initially building and operating the internet was supplied by |
|
|
Term
transmission control protocol/internet protocol |
|
Definition
|
|
Term
standards not owned by any company |
|
Definition
|
|
Term
|
Definition
every host computer on the internet has a(n) |
|
|
Term
|
Definition
this address doesn't change every day |
|
|
Term
|
Definition
this address changes temporarily as the application connect to the internet |
|
|
Term
|
Definition
the way in which information is transmitted to multiple internet-connected devices is called |
|
|
Term
|
Definition
the system that translates an IP address into an easier to remember name is the |
|
|
Term
|
Definition
all of the following are top-level domains except |
|
|
Term
|
Definition
all of the following are top-level domains except |
|
|
Term
|
Definition
a recently created additional top-level domain name is |
|
|
Term
|
Definition
a URL can specify the IP address of the web ____ that houses a web page |
|
|
Term
|
Definition
in the e-mail address bowles@sou.edu "bowles" is the |
|
|
Term
host computer in an educational domain |
|
Definition
in the e-mail address bowles@sou.edu, "sou" is the |
|
|
Term
|
Definition
in the web address www.casamexicanca.com.mx, "mx" is a(n) |
|
|
Term
|
Definition
the three basic categories of connection to the internet include all except |
|
|
Term
|
Definition
T1 and T3 connections are considered |
|
|
Term
|
Definition
in a large organization LANs may be connected through a |
|
|
Term
|
Definition
if you are at home and do not have a direct internet connection, you will most likely connect through a |
|
|
Term
|
Definition
telephone modem connection are also called ____ connections, because they offer little bandwidth compared to other types of connections |
|
|
Term
|
Definition
broadband connections include all of the following except |
|
|
Term
|
Definition
|
|
Term
it cannot share signals with a telephone line of voice traffic |
|
Definition
all of the following are disadvantages of a DSL connection except |
|
|
Term
coaxial cables for television signals |
|
Definition
cable modems use the same medias as |
|
|
Term
|
Definition
wi-fi technology refers to |
|
|
Term
|
Definition
a ____ is a computer connected to two networks |
|
|
Term
|
Definition
which model is used by internet applications |
|
|
Term
|
Definition
in a client/server model, a client program |
|
|
Term
|
Definition
a university might have a(n) ______ to manage the mail of students, faculty, and staff |
|
|
Term
|
Definition
|
|
Term
|
Definition
the world wide web was introduced in |
|
|
Term
|
Definition
|
|
Term
|
Definition
the protocol used to transfer web pages is |
|
|
Term
|
Definition
HTML commands, such as H1, are known as |
|
|
Term
|
Definition
web pages can be created using |
|
|
Term
|
Definition
web authoring software includes all of the following except |
|
|
Term
a domain name registry company |
|
Definition
to register a business name and create a unique URL, a business pays a fee and goes to |
|
|
Term
|
Definition
an internet diary or grouping of ongoing commentaries is known a(n) |
|
|
Term
|
Definition
downloadable software extensions that add new features to a browser are known as |
|
|
Term
|
Definition
the first step when creating a web site should be to |
|
|
Term
|
Definition
what markup language includes all of the features of HTML and programming extensions |
|
|
Term
|
Definition
a software robot that systematically searches the web is a |
|
|
Term
|
Definition
yahoo!, MSN, and netscape are examples of |
|
|
Term
|
Definition
_____ is used when information is delivered to a client computer through a server at the clients request |
|
|
Term
|
Definition
_____ is an XML form of sharing data |
|
|
Term
peer-to-peer file sharing |
|
Definition
using napster to make music files from one hard drive available to others rather than posting them on a central server is an example of |
|
|
Term
|
Definition
in a survey of more than 500 companies and government agencies, ___ percent detected computer security breaches |
|
|
Term
|
Definition
the survey showed that these businesses lost more than _____ due to security breaches |
|
|
Term
trusted employee with no criminal record |
|
Definition
the typical computer criminal is a(n) |
|
|
Term
|
Definition
the majority of computer crimes are committed by |
|
|
Term
|
Definition
the common name for the crime of stealing passwords is |
|
|
Term
|
Definition
the FBI's operation cyber loss was designed to crack down on |
|
|
Term
|
Definition
collecting personal information and effectively posing as another individual is known as the crime of |
|
|
Term
|
Definition
____ is the term for the use of deception to get someone's sensitive information |
|
|
Term
|
Definition
malicious software is known as |
|
|
Term
|
Definition
a program that performs a useful task while simultaneously allowing destructive acts is |
|
|
Term
|
Definition
an intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a |
|
|
Term
|
Definition
in 1999, the melissa virus was a widely publicized |
|
|
Term
|
Definition
this virus that attaches itself to macros is called |
|
|
Term
|
Definition
what type of virus uses computer hosts to reproduce itself |
|
|
Term
microsoft server software |
|
Definition
the code red worm attacked |
|
|
Term
|
Definition
the thing that eventually terminates a worm is a lack of |
|
|
Term
|
Definition
when a logic bomb is activated by a time-related event, it is known as a |
|
|
Term
|
Definition
a logic bomb that was created to erupt on Michelangelo's birthday is an example of a |
|
|
Term
|
Definition
what is the name of an application program that gathers information and sends it to someone through the internet |
|
|
Term
|
Definition
when you visit certain web sites spyware may be automatically downloaded. this is called a |
|
|
Term
|
Definition
standardization of microsoft programs and the windows operating system has made the spread of viruses |
|
|
Term
a web pages in the HTML code |
|
Definition
|
|
Term
|
Definition
software programs that close potential security breaches in an operating system are known as |
|
|
Term
a denial of service attack |
|
Definition
when customers of a web site are unable to access it due to a bombardment of fake traffic, it is known as |
|
|
Term
|
Definition
unauthorized access to computers is called |
|
|
Term
|
Definition
criminal hacking is called |
|
|
Term
|
Definition
hackers who hijack legitimate web sites and redirect users to other sites are called |
|
|
Term
|
Definition
____ is the measurement of things such as finerprings and retinal scans used for security access |
|
|
Term
|
Definition
what is the most common tool used to restrict access to a computer system |
|
|
Term
|
Definition
the most common passwords in the US or britain include all of the following except |
|
|
Term
|
Definition
hardware or software designed to guard against unauthorized access to a computer network is known as a(n) |
|
|
Term
|
Definition
the scrambling of code is known as |
|
|
Term
|
Definition
if you want to secure a message, us a(n) |
|
|
Term
|
Definition
to prevent the loss of data during power failures, us a(N) |
|
|
Term
|
Definition
a(n) ____ can shield electronic equipment from power spikes |
|
|
Term
open all e-mail messages but open them slowly |
|
Definition
all of these are suggestions for sage computing except |
|
|
Term
|
Definition
freeware _____ encrypts data |
|
|
Term
|
Definition
___ is defines as any crime completed through the use of computer technology |
|
|
Term
|
Definition
most computer systems rely solely on ____ for authentication |
|
|
Term
|
Definition
creating strong computer security to prevent computer crime usually simultaneously helps protect |
|
|
Term
|
Definition
over ____ was spent by businesses and government to repair problems in regard to Y2K |
|
|
Term
|
Definition
what is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making |
|
|
Term
reduce but not eliminate risks |
|
Definition
|
|