Term
|
Definition
|
|
Term
Uniquely identify a record |
|
Definition
|
|
Term
|
Definition
Bringing data from a word processing program into a database program is known as |
|
|
Term
|
Definition
Database software is an example of a(n) |
|
|
Term
|
Definition
The number of newspapers sold on May 30 would be kept in a ________ field |
|
|
Term
Libraries must turn over their patrons' records |
|
Definition
An aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants |
|
|
Term
Computerized file cabinet |
|
Definition
A(n) ________ is a good comparison to a database |
|
|
Term
|
Definition
________ processing is used when a large mail-order company accumulates orders and processes them together in one large set |
|
|
Term
Accumulates so much data that it is difficult to use efficiently |
|
Definition
One disadvantage of data mining is that it |
|
|
Term
|
Definition
In a customer database, a customer's surname would be keyed into a |
|
|
Term
|
Definition
In a customer database table, all of the information for one customer is kept in a |
|
|
Term
|
Definition
________ is perusing data in a database as if looking through pages in a notebook |
|
|
Term
|
Definition
Database programs can do all of the following EXCEPT |
|
|
Term
|
Definition
The following is an example of: Select Student_ID From Students Where Major = Business and Credits >= 46 |
|
|
Term
|
Definition
When a person uses language like ordinary English to query a database, it is known as a(n) ________ language query. |
|
|
Term
|
Definition
A collection of information stored in an organized form in a computer is a(n) |
|
|
Term
Personal Information Manager |
|
Definition
|
|
Term
|
Definition
________ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it. |
|
|
Term
|
Definition
Unwanted junk email is known as |
|
|
Term
Socket that enables information to move in or out |
|
Definition
|
|
Term
|
Definition
________ software enables a computer to function as a simple input/output device for sending messages to a host computer. |
|
|
Term
|
Definition
A Broadband connection could be any of the following EXCEPT: |
|
|
Term
|
Definition
________ is new technology currently available in Japan, much of Europe, and some major US cities. It uses high-bandwidth connections to communicate multimedia over wireless networks. |
|
|
Term
A user is connecting to a network through phone line, television cable, or wireless link |
|
Definition
Remote access means that a |
|
|
Term
|
Definition
Standard telephone cables containing copper wires are known as ________ cable |
|
|
Term
|
Definition
The system of satellites used to determine any position on the Earth is known as |
|
|
Term
|
Definition
|
|
Term
|
Definition
A ________ is a high-speed, high-end computer that shares data and other resources with client computers |
|
|
Term
|
Definition
A(n) ________ signal is represented by a continuous wave |
|
|
Term
|
Definition
Graphical bodies used to represent a person in a virtual meeting place are known as |
|
|
Term
|
Definition
A(n) ________ is code embedded as a one-pixel graphics file in a Web page or email message |
|
|
Term
|
Definition
Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server. |
|
|
Term
|
Definition
A personal area network is possible because of the wireless technology known as |
|
|
Term
Online role-playing games involving hundred of thousands of players |
|
Definition
|
|
Term
|
Definition
The ________ encryption scheme improves the security of wireless networks |
|
|
Term
|
Definition
A(n) ________ adds a special serial port to a computer so it can be directly connected to a network |
|
|
Term
Coaxial cables for television cables |
|
Definition
Cable modems use the same media as |
|
|
Term
|
Definition
What was the department of the U.S. government that developed the initial stages of the Internet? |
|
|
Term
|
Definition
Telephone modem connections are also called ________ connections, because they offer little bandwidth compared to other types of connections. |
|
|
Term
A few dozen computers at universities and government research centers |
|
Definition
The first users of the Internet were |
|
|
Term
|
Definition
A ________ is a computer connected to two networks |
|
|
Term
|
Definition
In the Web address www.casamexicana.com.mx, mx is a(n) |
|
|
Term
Standards not owned by any company |
|
Definition
|
|
Term
|
Definition
All of the following are top-level domains EXCEPT |
|
|
Term
Peer-to-peer file sharing |
|
Definition
Using Napster to make music files from one hard drive available to others rather than posting them on a central server is an example of: |
|
|
Term
|
Definition
A university might have a(n) ________ to manage the mail of students, faculty, and staff |
|
|
Term
Host computer in an educational domain |
|
Definition
In the e-mail address bowles@sou.edu, sou is the |
|
|
Term
|
Definition
In a large organization LANs may be connected through a |
|
|
Term
A domain name registry company |
|
Definition
To register a business name and create a unique URL, a business pays a fee and goes to |
|
|
Term
|
Definition
________ is used when information is delivered to a client computer through a server at the clients request. |
|
|
Term
|
Definition
Yahoo!, MSN, and Netscape are examples of |
|
|
Term
|
Definition
The three basic categories of connection to the Internet include all EXCEPT |
|
|
Term
|
Definition
All of the following are top-level domains EXCEPT |
|
|
Term
|
Definition
This address doesnt change every day |
|
|
Term
|
Definition
Collecting personal information and effectively posing as another individual is known as the crime of |
|
|
Term
|
Definition
Software programs that close potential security breaches in an operating system are known as |
|
|
Term
|
Definition
Over ________ was spent by businesses and government to repair problems in regard to Y2K |
|
|
Term
A trusted employee with no criminal record |
|
Definition
The typical computer criminal is a(n) |
|
|
Term
|
Definition
The scrambling of code is known as |
|
|
Term
|
Definition
The thing that eventually terminates a worm is a lack of |
|
|
Term
|
Definition
Malicious software is known as |
|
|
Term
|
Definition
Criminal hacking is called |
|
|
Term
|
Definition
An intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a |
|
|
Term
|
Definition
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making? |
|
|
Term
A web page in the HTML code |
|
Definition
|
|
Term
|
Definition
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n) |
|
|
Term
|
Definition
Most computer systems rely solely on ________ for authentication |
|
|
Term
|
Definition
A program that performs a useful task while simultaneously allowing destructive acts is a |
|
|
Term
|
Definition
________ is the measurement of things such as fingerprints and retinal scans used for security access |
|
|
Term
Microsoft server software |
|
Definition
The Code Red worm attacked |
|
|
Term
|
Definition
In 1999, the Melissa virus was a widely publicized |
|
|