Term
Microsoft Access is an example of ________ in an information system. |
|
Definition
database management system |
|
|
Term
Management information system’s (MIS) ________ include programs developed in-house. |
|
Definition
|
|
Term
The output of an information system is ________. |
|
Definition
|
|
Term
A typical PDA includes a(n) ________. |
|
Definition
|
|
Term
The purpose of an information system’s ________ component is generating the most useful type of information for making decisions. |
|
Definition
|
|
Term
A(n) _______ is a type of memory that stores data sequentially. |
|
Definition
|
|
Term
________ computer languages are machine independent and are called high-level languages. |
|
Definition
|
|
Term
Transistor was the major technology used during the _______ generation of hardware. |
|
Definition
|
|
Term
An operating system (OS) is: |
|
Definition
a set of programs for controlling and managing computer hardware and software. |
|
|
Term
A _______ is the size of a character. |
|
Definition
|
|
Term
Extended ASCII data code allows representation of: |
|
Definition
|
|
Term
_______ is information in its original form. |
|
Definition
|
|
Term
A data _______ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. |
|
Definition
|
|
Term
_______ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. |
|
Definition
|
|
Term
Data in a data warehouse can be differentiated from data in a database in that the former _______. |
|
Definition
comes from a variety of sources |
|
|
Term
A _______ operation searches data in a table and retrieves records based on certain criteria. |
|
Definition
|
|
Term
A database _______ is responsible for data storage, manipulation, and retrieval. |
|
Definition
|
|
Term
The _______ approach to a distributed DBMS has each site store a copy of the data in the organization’s database. |
|
Definition
|
|
Term
In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities. |
|
Definition
|
|
Term
_______ has created decency concerns, because these e-mails often contain explicit language or nudity. |
|
Definition
|
|
Term
Amazon.com uses _______ to provide customized book recommendations based on past purchases. |
|
Definition
|
|
Term
You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup. This action is ________. |
|
Definition
|
|
Term
In the context of the important concepts regarding Web and network privacy, ________ is a method for binding all the parties to a contract. |
|
Definition
|
|
Term
_______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure. |
|
Definition
|
|
Term
_______ is the process of capturing and recording network traffic. |
|
Definition
|
|
Term
Which of the following is a biometric security measure? |
|
Definition
|
|
Term
A(n) _______ is software that acts as an intermediary between two systems. |
|
Definition
|
|
Term
_______ means that computers and networks are operating and authorized users can access the information they need. |
|
Definition
|
|
Term
Which of the following is a type of access control? |
|
Definition
|
|
Term
Typically, an organization leases the media used for a VPN on a(n) _______ basis. |
|
Definition
|
|
Term
In a bus topology, _______ are used at each end of the cable to absorb the signal. |
|
Definition
|
|
Term
The amount of data that can be transferred from one point to another in one second is called _______. |
|
Definition
|
|
Term
The _______ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network |
|
Definition
|
|
Term
A hierarchical topology is also called a _______ topology. |
|
Definition
|
|
Term
Another name for a network interface card is a(n) _______. |
|
Definition
|
|
Term
A(n) ____ is the address of a document or site on the Internet. |
|
Definition
|
|
Term
____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature. |
|
Definition
|
|
Term
Google.com, Bing.com, and Ask.com are examples of ____. |
|
Definition
|
|
Term
A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content. |
|
Definition
|
|
Term
In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of the directory in which files are stored. |
|
Definition
|
|