CSCI Final (4) + Microsoft Access

¡Supera tus tareas y exámenes ahora con Quizwiz!

NAS devices handle the following tasks:

- Automatically back up all computers connected to the network - Act as a repository for files to be shared across the network - Function as an access gateway to allow any computer on the network to be accessed from a remote location via the Internet

When determining how big of data plan you need to buy, what should you look to assess the situation?

- download apps, stream music, or play online games? - watch streaming video? - download files attached to e-mails or from your company website? - use apps that are communicating with the Internet?

Amazon uses what proprietary digital format extension?

.azw extension

What is the result of the following expression?2 * 5 + 8 - 6 / 2

15

Most home wireless routers can support up to?

253 wireless connections

Maximum range of 802.11n or 802.11ac?

350 feet

Coaxial cable has all of the following, EXCEPT

4 pairs of copper wires

SQL is an example of a ____ category programming language?

4GL

How long does copyright last?

70 years plus the life of the author

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

C#

A Microsoft programming language developed to compete with Java

Cat 5E

A UTP cable commonly found in wired Ethernet networks, designed for 100 Mbps-wired Ethernet networks

Initial Value

A beginning point

Visualizations

A chart, graph, map to depict data

Trojan horse

A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge

Virus

A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged

Hexadecimal Digit

A digit with 16 possible values: 0-9 and A-F.

Datasheet view

A grid that enables you to add, edit, and delete the records of a table.

Record

A group of related fields

Table (file)

A group of related records in a database

Table

A group of related records; a collection of data

Network

A group of two or more computers (or nodes) that are configured to share information and resources such as printers, files, and databases

Cascading Style Sheet (CSS)

A list of rules that defines in one single location how to display HTML elements.

Sort

A method of listing records in a specific sequence (such as alphabetically).

Peer-to-Peer (P2P) network

A network in which each node connected to the network can communicate directly with every other node on the network

Local Area Network (LAN)

A network in which the nodes are located within a small geographic area.

Wide Area Network (WAN)

A network made up of local area networks (LANs) connected over long distances.

Decision Point

A place where a program must choose from a list of actions based on the value of a certain input

Summary report

A report generated by a management information system that provides a consolidated picture of detailed data; these reports usually include some calculation or visual displays of information.

Detail report

A report generated by a management information system that provides a list of the transactions that occurred during a certain time period.

Exception report

A report generated by a management information system that shows conditions that are unusual or that need attention by system users.

Criteria row

A row in the Query Design view that determines which records will be selected.

Code (compression/decompression)

A rule, implemented in either software or hardware, which sequeezes a given amount of audio and video into less space. Ex: MPEG-4, H.264, DivX

Hypertext Markup Language (HTML)

A series of tags that define how elements on a website should be displayed in a browser. Adobe Dreamweaver helps with this. Formatting and display instructions for webpages using tags

Proxy Server

A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).

VBScript

A subset of Visual Basic, used to introduce dynamic decision making into web pages

Whole-house surge protector

A surge protect that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges

JavaScript Object Notation (JSON)

A syntax for exchanging information between computers

Which type of virus was the famous Michelangelo virus?

A time bomb

Electronic Ink (E ink)

A very crisp, sharp grayscale representation of text achieved by using millions of microcapsules with white and black particles in a clear fluid

Where would you enter the e-mail address for a person whom you do not want the recipient to know you are including with the message? A. CC: Line B. BCC: Line C. Signature Line

A. BCC: Line

How would you reply to an e-mail you've received that has multiple recipients, all of whom you would like to see your reply? A. Click Reply to All B. Click Forward C. Click Reply

A. Click Reply to All

Which of the following is NOT a panel of code displayed in the CodePen editor?

ASP

Which of the following would help improve a wireless signal throughout a network?

Access Point

A(n) ____ is a wireless connectivity device that is connected with a wire to the router and extends a Wi-Fi signal in a designated area

Access point

Which of the following is NOT used to protect a wireless network?

Activating packet switching

Once debugging is done, can the created software program be released?

Actually, after debugging, the last step is to test and document the program

Once I've defined my problem statement, can I start coding?

Actually, after defining the problem statement, the next steps in a programming project is for programmers to translate the programs into an algorithm

How do I create fields in a database?

Actually, you can create the fields manually by assigned field names

What happens after programmers create an algorithm?

After programmers create an algorithm, they select a programming language and translate the algorithm into that language.

Which feature is used to define data in a data table?

All of the above

Which of the following is a TRUE statement when considering using databases instead of lists?

All of the above (data integrity can be ensured with a database, data can be easily shared among users, and data-entry errors can be minimized with databases)

In selection the most appropriate language it is useful to know

All of the above (how quickly the final code must run, how much space the final code delivered can occupy, if there is a specific target environment)

Which of the following allows you to connect to the Internet wirelessly?

All of the above (mobile hotspot, 4G LTE, WiFi)

Syntax

An agree-on set of rules defining how a language must be structured

Rapid Application Development (RAD)

An alternative program-development method; instead of developing detailed system documents before they produce the system, developers first create a prototype, then generate system documents as they use and remodel the product

Extranet

An area of an intranet that only certain entities or individuals can access; the owner of the extranet decides who will be permitted to access it

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection

Database Administrator (database designer)

An information technology professional responsible for designing, constructing, and maintaining databases. They use MySQL (a tool) sometimes to monitor

What is an IDE?

An integrated development environment (IDE) is a development tool that helps programmers write, compile, and test their programs.

codepen.io

An interactive site where you code with HTML, CSS, and Javascript

Report

An object that contains professional-looking formatted information from underlying tables or queries.

Table

An object used to store data, organizing data into columns and rows.

Wi-Fi Alliance

An organization that manages Wi-Fi standards

Spyware

An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system

Transport Layer Security (TLS)

An updated extension of Secure Sockets Layer.

Unstructured data

Audio clips, video clips, pictures, and extremely large documents. Also called binary large object (BLOB)

What does iris scanning do?

Authenticate you and log you in to your phone by scanning your iris (color)

Which type of server is designed to keep track of who is logging on to the network and which network services are available?

Authentication

_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user

Authentication

________ is the process that requires users to prove that they have permission to access a computer network.

Authentication

What's the best type of server to control user access to a network?

Authentication server

What are authentication servers?

Authentication servers keep track of who is logging on to the network.

The Access data type used to automatically assign an incremental number to each record is _____.

AutoNumber

Which of the following characteristics of an e-mail header should cause suspicion? A. Multiple recipients B. No subject line C. Unknown Sender

B. No subject line

Which of the following utilities is used to recover in the event of a loss or damage?

Back Up Databases

_____ is another name for data transfer rate

Bandwidth

________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.

Bandwidth

Wireless Networks (Wi-Fi)

Based on the IEEE 802.11 standard, established by IEEE

Which of the following is used to increase security on a client/server network?

Bastion host

Programmers choose Visual Basic why?

Because programmers often like to build a prototype

________ viruses are often transmitted by a flash drive left in a USB port.

Boot-sector

Why would you want to disable SSID broadcast?

Both A and B (to make it difficult for a neighbor to connect to your network AND to make it more difficult for hackers to detect your network)

Artificial intelligence

Branch of a computer science that attempts to create computers that think like humans

A(n) _____ transfers data between collision domains.

Bridge

When setting up a network, which of the following is the suggested order for turning on equipment?

Broadband mode, router, computers, and TVs

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

Bus

__ systems are used mostly at the executive level to improve business decision making with databases and other fact-based support systems

Business intelligence

Which type of information system is used mainly by executive managers and gathers data from data warehouse and data marts?

Business intelligence system

How are classes defined

By Information (data) within the class and Actions (methods) associated with the class

In the sound byte, problems in the help desk database are ranked

By importnace

Is there a good reason to set up a network for two computers?

By setting up a network, you can share a broadband Internet connection.

Many modern operating systems are written in ________.

C

Which of the following is NOT a good programming language to begin with to learn how to program?

C++

When you wish to send an e-mail to multiple parties, you enter their addresses in the To: line separated by which of the following? A. Spaces B. Periods C. Commas

C. Commas

What languages do programmers use if the problem requires a lot of "number crunching?"

C/C++

method used on Ethernet networks to avoid data collisions

CSMA/CD

Controls how the elements look

CSS

The type of fonts and colors used for each element on the page is defined by

CSS

Which of the following is true regarding table views?

Changes made in Datasheet view are automatically saved when you move the insertion point to a different record

Field property

Characteristic of a field that determines how it looks and behaves.

Which of the following tasks should you not consider performing on a public-accessed secured network?

Check your checking account balance.

Which server is used to control all data transmitted between the internal network and external networks?

Communications server

Record

Complete set of all the fields about one person, place, event, or concept.

CAPTCHA stands for

Completely Automated Public Turing Test To Tell Computers and Humans Apart

CAPTCHA stands for ________.

Completely Automated Public Turing Test to Tell Computers and Humans Apart

JPEG file

Compressed just a bit, keeping most of the details or compressed a great deal, losing some detail

Creating and distributing ________ is one of the most widespread types of cybercrimes.

Computer viruses

Mobile Broadband

Connections to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access

Multitable Query

Contains two or more tables, enabling you to take advantage of the relationships that have been set in your database.

Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

Violation of a holder's right is known as

Copyright infringement

IP Categories

Copyright, patent, trademarks, service marks, and trade dress

Public Domain

Copyrightable works whose copyright has expired, or that never had copyright protection

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

Cybercrime

How exactly are dynamic addresses assigned?

DHCP

assigns users IP addresses for the duration of a session

DHCP

A small subset of data from a data warehouse is knowns as

Data mart

The process by which great amounts of data are analyzed and investigated is known as?

Data mining

__ is the process by which great amounts of data are analyzed and investigated for significant patterns or trends within the data

Data mining

Time-variant data

Data that doesn't pertain to one period in time.

What are decision points?

Decision points are points at which the program must choose from different actions, based on the value of its current inputs.

Field size

Defines the maximum number of characters that a field can hold in a database

How does anti-virus software work?

Detection, stopping virus execution, prevention of future infection

Why should programmers be prepared to learn many different languages?

Different problems have different needs

DVRs

Digital Video Recorder

SiriusXM and HD Radio are broadcast in?

Digital formats

Tabular layout

Displays fields horizontally.

Stacked layout

Displays fields in a vertical column.

Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.

Electromagnetic interference/EMI

Tag

Electronically identfying someone in a photo or post

Layout view

Enables users to make changes to a layout while viewing the data in the form or report.

Query

Enables you to ask questions about the data stored in a database and provides answers to the questions in a datasheet

Design view

Enables you to change advanced design settings you cannot see in Layout view, such as removing a layout control.

Report View

Enables you to determine what a printed report will look like in a continuous page layout.

A bridge sends information between two networks.

FALSE

MAC adapters perform specific tasks to enable nodes to communicate on a network

False

Most modern operating systems do not include some type of NOS functionality

False

Network technicians are expected to personally resolve all problems referred to them with no escalation

False

Problems are ranked by importance based on the time when they are lovged

False

Ring topologies are the most widely used topology

False

The main advantage of a ring topology is that the failure of one computer does not affect the entire network.

False

Tiles provide a one page summary of all visualizations

False

You need to be familiar with HTML and CSS to use Squarespace (T/F)

False

Which of the following cables is composed of plastic or glass fibers that transmit data at extremely fast speeds?

Fiber-optic

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-optic

Which of the following provides a visual representation of the patterns in an algorithm?

Flowchat

Interpreter

For a programming language, translates the source code into an intermediate form, line by line; each line is then executed by as it's translated

Which of the following is an example of an Access object?

Form

Circuit Switching

Forms a dedicated connection between two communicating parties. Where a dedicated connection is formed between two points (such as two people on telephones) and the connection remains active for the duration of the transmission

Patents

Grant inventors the right to stop others from manufacturing, using, or selling (including importing) their inventions for a period of 20 years from the date the patent was filed

A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.

Grey/gray

Frame

Groups of data packets that are sent together in a package

Fair Use

Guidelines allowing people to use portions of a copyrighted work for specific purposes without recieving prior permission from the copyright holder

can be used for a small home-based business

HAN

HDTV or UHDTV have multiple

HDMI connectors

Controls which elements display

HTML

The definition of an element like a paragraph on a page is done through

HTML

What's the most basic formatting language for web applications?

HTML

Which of the following establishes elements on a web page?

HTML

transfers data from servers to browsers

HTTP

Packet Screening

Having a screening router examine data packets to ensure they originated from or are authorized by valid users on a network

What Windows feature shares files with other computers on a network?

HomeGroup

Which Windows feature facilitates sharing peripherals and info on a home network?

HomeGroup

Web server

Hosts websites that can be accessed via the Internet

allocates IP address

ICANN

Waterfall Model

Idealized view of software development

Real Property

Immoveable property such as land or a home (often called real estate)

If Else

In C++, a binary decision in the code where the program can follow one of two paths: If the decision is mad eon way, the program follows one path; if made the other way (else), the program follows another path

Select query

In Structured Query Language, displays a subset of data from a table (or tables) based on the criteria specified

For

In Visual Basic, programmers use the keyword For to implement a loop; after the keyword For, an input or output item is given a starting value, and then the statements in the body of the loop are executed

Next

In Visual Basic, programmers use the keyword Next to implement a loop; when the Next command is run, the program returns to the For statement and increments the value of input or output item by 1 and then runs a test cycle

Inheritance

In object-oriented analysis, the ability of a new class to automatically pick up all the data and methods of an existing class and then extend and customize those to fit its specific needs

Reusability

In object-oriented analysis, the ability to reuse existing classes from one project for another project

Derived Class

In object-oriented analysis, the modified class

Base Class

In object-oriented analysis; the original class

A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.

Incremental partial

Cybercriminals

Individuals who use computers, networks, and the Internet to perpetrate crime

Online reputation

Information available about you in cyberspace that can influence people's opinions of you in the real world

Digital (Digitized)

Information measured and converted (from analog data) to a stream of numerical values

An __ is a software that is used to gather and analyze data

Information system

What are the 3 important features to look for in a loop?

Initial value, set of actions, and test condition

Argument

Input used to produce output for a function.

What are ways to improve a wireless signal

Installing an access point or wireless range extender are good options

100 GbE is used for major transmission lines of the Internet known as the?

Internet backbone

The collection of large national and international networks used to establish the Internet is called the a. T1 b. highway system c. oc d. internet backbone

Internet backbone

section of a hard drive that stores web page information

Internet cache

A typical ________ is made up of one or more network switches to which ISPs connect.

Internet exchange point/IXP

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Which of the following is NOT a common network architecture type?

Intraoffice area network (IAN)

Is copyright protection automatic

It accrue as soon as you create the intellectual property and set it down in digital or physical form

Which of the following best describes HTML?

It is used to tag elements of web pages and give them structure and formatting.

What does Microsoft .NET do?

It's a software that is designed to let websites "talk" to each other easily

Most android apps are written in _____

Java

What language do programmers use for applications that need to collect information from networked computers

Java and C#

Controls what a user can do

JavaScript

The algorithms that define the interactivity of the web page with users are often coded in

JavaScript

________ is the most commonly used scripting language for creating DHTML effects.

JavaScript

JSON stands for

JavaScript Object Notation

__ allows users to interact with a web page

Javascript

Which of the following is NOT a language used in developing websites?

KML

What are some dedicated software for e-texts?

Kindle and NOOK

_ systems include expert systems and natural language processing as part of a DSS

Knowledge-based

The simplest view you can use to modify control widths in a form is:

Layout view

Which of the following statements is false (Access)?

Layouts for forms and reports are the predefined sets of colors, fonts, and graphics

What app lets you find which area library has the book you want?

Libby app

The main reason to set a field size in Access is to:

Limit the length of values in a table.

Which of the following helps to protect a wireless network from piggybacking?

Limiting the wireless signal range

Which of the following specifications is used to simplify attachments to e-mail messages?

MIME

Exception report

MIS report generated to show unusual situations that require attention

Digital music file types

MP3, AAC, WMA, AAC-format, DivX, MPEG-4, (.mp4) WMV, and Xvid

A _ provides timely and accurate information for critical business decisions

Management information system

Processing

Manipulating or organizing data into information

Which of the following cannot be adjusted in the Property Sheet?

Mathematical expression

Which of the following is an example of an e-mail client?

Microsoft Outlook

Which hardware device connects your computer to the Internet?

Modem

Home network servers

More sophisticated type of NAS device. It's designed to store media, share media across the network, and back up files on computers connected to a home network

Some of my devices don't need wireless and would work better with a wired connection. Are there different types of wired networks I need to choose from?

Most wired networks for the home are Ethernet networks.

Which type of database organizes data by measure and feature attributes?

Multidimensional database

MIME stands for ________.

Multipurpose Internet Mail Extensions

adapter card that connects a computer to a network

NIC

Is Pharming a virus type?

No

Which of the following is true for the Query Wizard?

No criteria can be added as you step through the Wizard

Will SMTP keep my e-mails safe?

No, SMTP cannot keep your e-mails safe, but there are other security measures like encryption that can keep your e-mails safe.

Do instant messaging (IM) services use secure data transmission software to provide security of data exchanged?

No, most instant messaging services don't use secure data transmission software. Hence it is not safe to exchange important data over IM.

Once compilation is done, is the program finished?

No, programmers still need to test the code to see whether the program behaves as it should

In the sound byte, the students wireless connectivity problem turned out to be

Not a problem

Data

Numbers, words, pictures, or sounds that represent facts, figure, or ideas; the raw input that users have at the start of a job

High-speed ________ communication lines use fiber-optics.

OC

___ software provides flexible viewing and manipulation of data in a data warehouse

OLAP

____ fields hold things such as pictures and video clips

OLE object

What's the most popular language for writing macOS applications?

Objective C

Which programming language is most commonly used for iOS devices and (OSX)?

Objective C

Where is the Wireless Network Connection button located on the desktop?

On the Windows Taskbar

After programmers finish coding, what do they do next?

Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler

When can programmers begin developing a detailed algorithm?

Once the programmer understands exactly what the program must do and have created the final problem statement

Transmission Control Protocol (TCP)

One of the original two protocols developed for the Internet. Uses a process called three-way handshake

Which type of relationship should be used to connect a Password table to a User Account table?

One-to-one relationship

HaLow

Operates on the 801.11ah standard. Twice the range of current Wi-Fi and is also more robust (can easily penetrate walls or other barriers)

network in which each node connected to the network communicates directly with every other node

P2P

A network consisting of devices used by a single person connected via wireless media is a?

PAN

The type of network used for communication among a laptop and smartphone using Bluetooth is a

PAN

used by a single individual connecting devices using wireless media

PAN

Element

Part of a web page; in HTML, a part of tags and the text between them

Web Services (.NET Framework)

Part of the Microsoft .NET Framework, programs that a website uses to make information available to other websites

In the sound byte, the e-mail security flaw was resolved by downloading and installing a software_ patch from the manufacturer

Patch

Tethered downloads

Paying for music and owning it, but restricted on its use

P2P

Peer-to-peer; node can communicate directly with every other node on the network

Network Administrator

Person who maintains networks for a business or organization

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

Phishing

Pharming

Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites

__ is a set of tools used to analyze data from a variety of sources and present components of the data visually to gain insights

Power BI

The field that has a unique entry for each record in a database is called the?

Primary key

Use the ____________ to see exactly what the printed report will look like before printing.

Print Preview

What is the first step of the system development life cycle (SDLC)?

Problem and Opportunity Identification

List the 6 steps of SDLC

Problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation

Visual Programming Languages

Programming language that uses graphical blocks to represent control elements and variables

Active Server Pages (ASP), JavaServer Pages (JSP), PHP (PHP: Hypertext Preprocessor)

Programming languages used to build websites with interactive capabilities; adapts the HTML page to the user's selections

Rootkit

Programs that allow hackers to gain access to your computer and take almost complete control of it with your knowledge. These programs ares designed to subvert normal login procedures to a computer and hide their operations from normal detection methods

Where to find free e-books?

Project Gutenberg

Report Wizard

Prompts you for input and then uses your answers to generate a customized report.

Intangible personal property

Property that can't be touched-- or potentially even seen-- yet it still has value

Tangible Personal Property

Property that has substance like your smartphone or car

Simple Query Wizard

Provides a step-by-step guide to help you through the query design process.

Layout control

Provides guides to help keep controls aligned horizontally and vertically and give your form a uniform appearance.

Which Access database object enables you to ask questions of the database?

Query

Which tool is used to search for information in a database?

Query

The software holding area for print jobs is called a print ____

Queue

Power BI uses __ to apply artificial intelligence to analyze data, looking for pattersn

Quick insights

RAW files

Records all the original image informations, so it's larger than a compressed JPEG file

You edit several records in an Access table. When should you execute the Save command?

Records are saved automatically; the save command is not required

Intellectual Property (IP)

Refers to products derived from the mind, such as works of art and literature, inventions, and software code

In the sound byte, the printer problem was resolved by

Reinstalling corrupt printer server software

In the sound byte, at the end of the day, a network technician should do all of the following except

Report to your shift supervisor before leaving

Which of the following is NOT a data mining technique

Reporting

For complete access to all visualization tools, you should use which of the following?

Reports

Which of the following statements about reports is false?

Reports are primarily used to modify data

If you own copyright to a work, what do you own?

Reproducing the work, preparing derivative works, distributing the work to the public, public performance, and public display of the work

AND condition

Returns only records that meet all criteria.

OR Condition

Returns records meeting any of the specified criteria.

The _____ topology uses tokens to control data transmission.

Ring

A(n) _____ sends data between two networks.

Router

Which of the following statements is TRUE?

Router firmware should be kept up to date

Referential Integrity

Rules in a database that are used to preserve relationships between tables when records are changed.

Which protocol is used to transmit e-mail over the internet?

SMTP

the protocol used to send email over the internet is

SMTP

used for transmission of e-mail messages across the Internet

SMTP

________ is malware that tries to convince you that your computer is infected with a virus.

Scareware

Give 2 examples of Visual Programming Languages

Scratch and App Inventory

In the acronym HTTPS, the S stands for ________.

Secure

Benefits of Networks

Sharing an Internet connection, sharing printers and other peripherals, sharing files, and common communications (must be running same OS)

SMTP stands for ________.

Simple Mail Transfer Protocol

What is SMTP?

Simple mail transfer protocol (SMTP) is the protocol responsible for sending e-mail messages from an e-mail client to an e-mail server.

Data mart

Small slice of related data from a data warehouse grouped together and separated from the main body of data in the data warehouse so that related sets of data can be analyzed

Patch

Software repair

Network Operating System (NOS)

Software that handles requests for information, Internet Access, and the use of peripherals for network nodes, providing the services necessary for the computers on the network to communicate. Examples include: Windows Server and SUSE Linux Enterprise Server

Network Operating System (NOS)

Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.

Malware

Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include: spyware, viruses, worms, and Trojan

Which of the following statements is false (Access)?

Stacked layouts are more common for reports because they use less paper when printed

4G

Stands for 4th Generation. The latest mobile communication standard with faster data transfer rates than 3G

Which of the following is the most commonly used client/server network topology?

Star

Firmware

System software that controls hardware devices

Business Intelligence System

Systems used to analyze and interpret data in order to enable managers to make informed decisions about how best to run a business.

prepares data for transmission providing for error checking and resending lost data

TCP

The main suite of protocols used on the Internet is ________.

TCP/IP

__ is the main suite of protocols used on the Internet?

TCP/IP

The Internet is a WAN

TRUE

Where is the data in a database stored?

Table

Why is it important to establish relationships between tables?

Table relationships join tables together so queries can work with fields from more than one table

A query's specifications as to which tables to include must be entered on the:

Table row of the query design grid

In order to summarize data in a report and override the sort order of the record source you would use:

The Group, Sort, and Total Pane

does the IP address remain the same or can it change automatically

The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.

Which of the following about the Total row in Query design is false?

The Total row applies only to non-numeric fields

Dynamic Decision Making

The ability of a web page to decide how to display itself based on the choices the reader makes

Business Intelligence

The ability to improve business decision making with databases and other fact-based support systems

Plagiarism

The act of copying text or ideas from someone else and claiming them as your own

Pretexting

The act of creating an invented scenario (the pretext) to convince someone to divulge information

Data staging

The act of formatting data from source databases before fitting it into a data warehouse; it consists of three steps: extraction, transformation, and storage.

Computer Forensics

The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime

Executable Program

The binary sequence that instructs the CPU to run the programmer's code

Portability

The capability to move a completed solution easily from one type of computer to another

Resolution

The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen

Local Administration

The configuration and maintenance of the network must be performed on each individual computer attached to the network. Peer-to-Peer (P2P) is an example

Network Architectures (network designs)

The design of a computer network; includes both physical and logical design. Can be classified by the following: the distance between nodes, the way in which the network is managed (or administered), or the set of rules (or protocol) used to exchange data between network nodes

What's the first step in programming?

The first step in programming is to define the problem statement.

Disadvantage of Networks

The initial time it takes to set up the network

Source Code

The instructions programmers write in a higher level language

Internet of Things (IoT)

The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer interaction

Data transfer rate (bandwidth)

The maximum speed at which data can be transmitted between two nodes on a network; measured in megabits per second (Mbps) or gigabits per second (Gbps)

CSMA/CD

The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals; data collision avoidance method

Unshielded twisted pair (UTP) cable

The most popular transmission media option for Ethernet networks. It is composed of four pairs of wires that are twisted around each other to reduce electrical interference

What kind of wire do I use to set up an Ethernet network?

The most popular transmission media option for wired home Ethernet networks is unshielded twisted-pair (UTP) cable

Network topology

The physical or logical arrangement of computers, transmission media (cable), and other network components.

Quarantining

The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files

Release to Manufacturers (RTM)

The point in the release cycle, where, after beta testing, a manufacturer makes changes to the software and releases it to other manufacturers, for installation on new machines, for example

General Availability (GA)

The point in the release cycle, where, after release to manufacturers, software is available for purchase by the public

Phising

The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or SSN or other sensitive information that could lead to identify theft

Programming

The process of translating a task into a series of commands a computer will use to perform that task

Peer-to-Peer (P2P) sharing

The process of users transferring files between computers. Examples being BitTorrent

Objective C

The programming language most often used to program applications to run under OS X

Which of the following information is NOT contained in a packet?

The size (in bytes) of the packet

What are the critical issues to consider when selecting the best language for a specific problem?

The speed, the space requirements, and the amount of staffing on hand

Code editing

The step of programming in which a programmer types the code to be executed

Null

The term uses to describe a blank field.

Which of the following is NOT an advantage of star topology?

They are cheap to expand.

How do I share an Internet connection on an Ethernet network?

To share an Internet connection on an Ethernet network, you need a router.

_______ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks

Top-down design

A system that is designed to help keep track of everyday business activities is a(n)?

Transaction-processing system

Which kind of business information system is used at an operational-level of an organization and helps to keep track of daily activities?

Transaction-processing systems are used to keep track of daily operational-level activities

A network technicians used ghosting software to install multiple programs on multiple lab computers

True

An organizations computer graveyard can be a source for replacement parts

True

Codepin.io provides three panels for users to interact with HTML, CSS, and JavaScript (T/F)

True

In Squarespace, images, text, and pages can all be edited or deleted easily (T/F)

True

In the ring topology, a device grabs the token when it needs to send data.

True

In the ring topology, data flows around the circle in one direction only.

True

When you enter data using an Access form, the data in the underlying table is also updated.

True

________ technology places data packets inside other data packets.

Tunneling

What transmission media is used for normal telephone service?

Twisted-pair cable

Which of the following is NOT a home operating system that supports P2P networking

Unix

What is the most common type of transmission media in wired HOME networks?

Unshielded Twisted Pair cable

What wired transmission is used on a network?

Unshielded Twisted Pair cable, Twister Pair cable, Coaxial cable, Fiber-optic cable

Which of the following is NOT a type of cable used in wired networks?

Unshielded coaxial

Which of the following cables is the most popular transmission media for Ethernet networks?

Unshielded twisted-pair (UTP)

Spam

Unwanted or junk e-mail

As a business grows it needs to?

Use a database management system that can collect and store data from multiple sources

How to secure wireless network?

Use encryption and security protocols, change your network name (SSID), disable SSID broadcast, change default password, create a passphrase, implement media access control, limit your signal range, apply firmware upgrades, disable remote access, keep your router firmware up to date

Document Object Model (DOM)

Used by JavaScript to organize objects and page elements.

Which of the following is NOT an encryption security protocol?

WIP

Analog

Waves that illustrate the loudness of a sound or the brightness of the colors in an image at a given moment in time. Continuous.

A(n) ________ server is used to host an Internet site.

Web

Which server would be included on a network to enable the hosting of a web site?

Web server

Data centralization

When data is maintained in only one file

Urban Legends

When hoaxes become so well known that they're incoroprated into society as true events even though they're false

Data breach

When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data

Data integrity

When the data in a database is accurate and reliable

But, if I include the primary key of one table in the other table, won't I have two primary keys for a record?

When the primary key of one table is included in another table to establish a relationship between the two tables, it is called a foreign key in the related table

One-to-many relationship

When the primary key value in the primary table can match many of the foreign key values in the related table.

Cascade Delete Related Records

When the primary key value is deleted in a primary table, Access will automatically delete all foreign key values in a related table.

Data collision

When two computers send data at the same time and the sets of data collide somewhere in the connection media.

Which of the following are NOT a typical wired network transmission medium?

Wi-Fi

802.11ad is known as?

WiGig (7 gigabits at 60 GHz frequencies)

What is used to indicate a search term can be anywhere in a string of text?

Wildcards

Which of the following is LEAST LIKELY to be an obstacle for a wireless network

Window

What transmission media is used on a wireless network?

Wireless (wi-fi)

Servers

Workhorses of the client/server network

________ is a consortium of organizations that develops web protocols and sets standards.

World Wide Web Consortium/W3C

________ defines the content in terms of the data that is being described rather than how it is to be displayed.

XML

Which of the following is an example of an instant messenger service?

Yahoo Messenger

is there an alternative to remembering IP addresses

Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.

Do I need any special software to use dedicated servers?

Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate

With respect to importing data into Access, which of the following statements is true?

You can assign a primary key while you are importing Excel data.

How do I perform encryption?

You can encrypt messages using private-key encryption. In private-key encryption, only the two parties involved in sending and receiving the message have the code.

Which of the following statements is true (Access)?

You can group records to show a list of properties by state

How does the computer know the IP address of other computers?

Your computer consults a database maintained on a domain name server (DNS) to determine other IP addresses

What are the risks of an unsecured wireless network?

Your wireless network can be piggybacked or hacked

Knowledge Based System

a business intelligence system that provides intelligence that supplements the user's own intellect and makes the decision support system more effective

When the Event element is added to a template in Squarespace, it can be configured to include

a calender

Access Card Reader

a device that reads info from a magnetic strip on the back of a credit-card like access card

In public-key encryption, the two keys—one for coding and one for decoding—are known as ________.

a key pair

When setting up a home network, make sure each node has ____

a network adapter

WAN

a network that covers the greatest distance

A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.

access card reader/card reader

A wireless __ provides wireless connectivity on an existing ethernet network

access point

Installing a(n) __ on an existing ethernet network will provide wireless connectivity

access point

IPv6 uses 128 bits to assign a: a. data packet to each transmission b. memory address to the CPU c. address to every device connect to the internet d. destination internet address to each e-mail

address to every device connected to the Internet

IPv6 uses 128 bits to assign an

address to every device connected to the internet

the rise of the internet of things has meant

all of the above

Analytics that are automatically collected by a Squarespace site include

all of the above (the traffic to the site.the percentage of users from mobile devices.the most popular content on site.)

A coding community like CodePen can help you learn quickly because

all of these

Form

allows editing of individual records

JSON, JavaScript Object Notation is useful because it

allows web services to exchange information

Squarespace collects data on visitors viewing your site using ________.

analytics

Website _____ provide website owners with reports on website use.

analytics

The Sound Byte suggests a network technician needs all of the following EXCEPT __________.

anger management training

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

antivirus

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

applet

A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.

applet

A school network might use a(n) __ server to distribute software such as Microsoft Office

application

A(n) ____ server acts as a repository for software such as Microsoft Office

application

For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

attachments

MIME is primarily associated with this feature of e-mail

attachments

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

The main path of the Internet along which data travel the fastest is known as the Internet ________.

backbone

The maximum speed at which data can be transmitted between two nodes on a network is called the ____

bandwidth

A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

packet switching send information between two points

by breaking it into small chunks and sending the chunks across different routes

Twisted-pair cable

cable made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)

list of rules that define how to display HTML elements

cascading style sheet

A client/server network is an example of ____ administration

central

client/server

central computer provides information and resources to other computers

Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet

cloud

a server not physically located at a company's site

cloud

The shielded cable with a solid copper core that is more resistant to interference than twisted-pair is known as __ cable

coaxial

encryption is used to

code your email so only one person can decipher it

text file for storing personal preferences pertaining to websites

cookie

MAN

covers a city

Using your computer for non-work activities while you are being paid to work is known as ________.

cyberloafing

using an employer's computer for nonwork activities

cyberloafing

Unnecessary duplication of data in a database is referred to as

data redundancy

Metadata

data that describes other data

A ____ server provides client computers with access to stored information

database

A(n) ____ is a collection of related data that can be stored, organized, and queried.

database

allows client computers to access a database

database

Which of the following is NOT considered metabase?

database name

router

directs data traffic between networks

switch

directs signals to the intended device

A ____ takes place of an IP address because its easier for humans to recall than a long string of numbers

domain name

An IP address in the form 197.169.100.1 is called a(n) ________.

dotted quad

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

dynamic

When using ________ addressing, a computer is assigned a temporary address from available IP addresses.

dynamic

temporary IP address for a computer that is assigned from a pool of available IP addresses

dynamic addressing

specifically deals with the SMTP communication method

e-mail

A(n) _____ is a specialized computer with the sole function of storing, processing, and sending email

e-mail server

peer-to-peer

each node can communicate directly with every other node on the network

An IDE is a tool that has support for

editing and debugging

Fiber-optic cable most likely would be used in a business network when?

electrical or magnetic interference is present

Text such as <b>This should be bolded.</b> is an example of an HTML ________

element

In addition to text and images, you can add ________ like a calendar on a Squarespace web page.

elements

A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.

extranet

A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.

false

a multidimensional database uses two dimensions in which to organize data

false

a small slice of data warehouse is called a data mine

false

data warehouses capture data only from one time period

false

if you use an internet cache, then the information displayed in your browser is automatically refreshed

false

instant messaging is secure because of the type of encryption used

false

the term dotted quad means you have four dots in a row in your Java source code

false

A(n) ________ cable contains a glass or plastic core.

fiber-optic

The fastest broadband Internet service is usually

fiber-optic

__ cable transmits data via pulses of light

fiber-optic

A topology can be compared to the __________.

floor plan of a building

A ________ is a visual representation of a process, including the decisions that need to be made along the way.

flowchart

To establish a relationship between two tables, the primary key in one table is associated with the ____ in the other table.

foreign key

A ________ enables Access users to view or enter data one record at a time.

form

A __________ enables Access users to view or enter data one record at a time.

form

Adware and spyware are referred to collectively as ________.

grayware

flaunts expertise to the administrator of a system

grey-hat hacker

Acceptable use policies

guidelines regarding usage of computer systems

________ a website involves writing code in many languages, depending on needs and functionality.

hand coding

switch

handles data traffic between nodes on the same network

exchange of control packets between computers

handshaking

broadband

high speed internet connection

computer system designed to attract unauthorized users

honey pot

A ________ topology uses more than one topology when building a network.

hybrid

Objective C is a language commonly used to create what kind of software?

iOS applications

The most financially damaging cybercrime affecting individuals is ________.

identity theft

Computer helpdesks often prioritize problems based on __________.

importance

Numeric check

in a database, confirms that only numbers are entered in a field

During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

inoculation

All of the following are ways that can infect your computer with a virus EXCEPT ________.

installing a manufacturer's printer driver (or printing a document)

JavaScript

is commonly used to make HTML documents more dynamic; An Internet protocol addressing scheme that makes IP addresses longer, thereby providing more available addresses

HTTPS is different than HTTP because

is is a combination of HTTP and the secure sockets layer (SSL)

A MAC address...

is used for internal identification purposes on a network

used in a common encryption technique

key pair

A ring topology is also known as a(n) ________ topology.

loop

Power BI includes three elements: a desktop applications, a web-based service, and a __

mobile app

The device used to connect a network to the Internet is called a

modem

A(n) ____ database stores data in more than two dimensions.

multidimensional

Two or more computers that are connected via software and hardware so that they communicate with each other is called a(n) ____

network

All modern computing devices have a(n) __ preinstalled that enables them to connect to a wired or wireless network

network adapter

Node

network device

A ____ is any device connected to a network such as a computer, printer, or game console

node

Which language do you need to be familiar with to use Squarespace?

none

Data are sent through a network in bundles called

packets

Which of the following is NOT a virus category?

pharming

Individual Internet users connect to ISPs through a(n) ________.

point of presence (POP)

virus that changes its own code to avoid detection

polymorphic virus

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

possessed

creating a scenario that sounds legitimate enough that someone will trust you

pretexting

The purpose of a token in a token ring network is to ________.

prevent data collisions from occurring

Tokens are used in a token ring network to __________.

prevent data collisions from occurring

The _____ field must be a unique identifier of each record in a database.

primary key

When only the two parties involved in sending a message have the code, this is called ____-key encryption

private

Ethernet

protocol most commonly used on star networks

A(n) ________ server acts as a liaison between an internal network and an external network.

proxy

________ is a text-based approach to documenting an algorithm.

pseudocode

In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.

public

In the sound byte, the intern had to reinstall corrupted printer server software And rebuild the print

queue

Wireless network devices use ____ to communicate with each other

radio waves

A ____ would be a good device to install if you need a wireless solution to improve a weak Wi-Fi signal in an area far from the router your home.

range extender

malware on your computer used to convince you that your computer has a virus

scareware

The computer that provides information or resources to the client computers on the network is called a(n) _____

server

the internet is managed by

several non-profit organizations

coaxial cable

single copper wire surrounded by layers of plastic

techniques used to manipulate people into performing actions or divulging confidential information

social engineering

Unwanted, unsolicited e-mail is referred to as ________.

spam

A database _____ organizes data into fields and records.

table

device that absorbs a signal so that it is not reflected back

terminator

In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.

the helpdesk problem database

Hypertext Transfer Protocol Secure (HTTPS)

the internet protocol that ensures data is sent securely over the web

if data is broken into chunks and sent over various routes at the same time, how do you these packets reach their destination

the packets contains destination information in our reassembled when they all reach the destination

Real time processing

the processing of database transactions in which the database is updated while the transaction is taking place

cascading style sheets allow you to quickly change

the rules for applying formatting to an HTML document

Default value

the value a database automatically uses for a field unless the user enters another value

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.

theft of services

Ring networks use the ________ method to avoid data collisions.

token

special type of data packet

token

When designing a program, the developer selects a design approach like

top down or object oriented

.com and .edu are examples of a(n) ________.

top-level domain/TLD

Data flows on a(n) __ to get between different points on a network

transmission media

MIME is the protocol that supports sending files as e-mail attachments

true

Your internet service provider has a default DNS server to translate a URL into an IP address

true

A quick way to deploy software to a large number of computers (discussed in this Sound Byte) is to __________.

use "ghosting" software to copy the image of one computer to another

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

A company would use a(n) _____ server to provide internet-based information

web

A(n) ____ server is used to host an internet site

web

delivers HTML documents on request

web

hosts websites that can be accessed via the Internet

web

an "ethical" hacker

white-hat hacker

A(n) ________ provides wireless devices with a sending and receiving connection point to the network.

wireless access point/WAP

The Query _____ prompts you step-by-step through the creation of a query.

wizard

A(n) ________ takes advantage of file transport methods to spread on its own.

worm

The internet is primarily funded by a. voluntary contributions b. Google c. your state income taxes d. your federal income taxes

your federal income taxes

the internet is primarily funded by

your federal income taxes

Most often, hackers initiate a DDoS attack by creating and activating ________ computers.

zombie

a computer controlled by a hacker

zombie

Keywords

(1) A specific word a user wishes to query (or look for) in an internet search. (2) A specific word that has a predefined meaning in a particular programming language

Cat

A UTP cable type that provides more than 1 Gbps of throughput

Point of Presence (POP)

A bank of modems, servers, routers, and switches through which Internet users connect to an Internet service provider.

Cable Internet

A broadband service that transmits data over coaxial cables

Enterprise Resource Planning (ERP) Systems

A business intelligence system that accumulates in a central location all information relevant to running a business and makes it readily available to whoever needs it to make decisions

Fiber-optic cable

A cable that transmits data via light waves along glass or plastic fibers

Aggregate function

A calculation performed on an entire column of data which returns a single value. Includes functions such as Sum, Avg, and Count.

Field

A category of information in a database; a category of data; The component of a database in which the database stores each category of information

Classes

A category of input identified in object-oriented analysis; classes are defined by information and actions

Central Administration

A centrally administered network, tasks performed from one computer can affect the other computer on the network

Scalability

A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.

Centralized

A characteristic of client/server networks where the server, not the individual nodes, provide services such as data security

Decentralized

A characteristic of peer-to-peer networks where the individual nodes provide services such as data security.

Test Condition

A check to see whether the loop in an algorithm is completed

Program Specification

A clear statement of the goals and objectives of the project. This is apart of Analysis.

Multidimensional database

A database that stores data from different perspectives, called dimensions, and organizes data in cube format

Personal Firewall

A firewall specifically designed for home networks

C++

A programming language, takes C to an object-oriented level

Macro virus

A virus that's distributed by hiding it inside a macro

Time bomb

A virus that's triggered by the passage of time or on a certain date

E-mail virus

A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself

Group of people willing to share experience

Coding community

________ combines HTML, cascading style sheets, and JavaScript.

Dynamic HTML

How is digital text displayed?

E ink and Backlit monitors

What electronic devices are trying to replace books?

E-readers

The terms virus and worm actually mean the same thing.

FALSE

________ cable is the most costly to install.

Fiber-optic

an operating system for network servers

NOS

Which of the following classifications of viruses can change its own code to avoid detection?

Polymorphic

Computer graveyard

Possible source for replacement parts

FTP enables files to be downloaded or uploaded between computers.

TRUE

Property sheet

The location you change settings such as number format and number of decimal places.

Personal Property

Things of value that you own (car or laptop)

Which of the following data-mining techniques is used to determine which data goes together?

affinity grouping

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

biometric

Retinal scanning is an example of ________ authentication.

biometric

an unethical hacker

black-hat hacker

A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.

botnet

programs that run on a large number of zombie computers

botnet

A ________ sends data from one collision domain to another.

bridge

data captured from websites as users navigate through a website is called

clickstream data

A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.

client-side

A ________ network can contain servers as well as individual computers.

client/server

When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers

client/server

A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.

cloud

Translating an algorithm into a programming language is called

coding

______ a website by hand involves writing HTML, CSS and JavaScript.

coding

Database

collection of objects

In http://www.pearsonhighered.com, which of the following is the top-level domain?

com

Hybrid Topology

combining multiple topologies into one network

enables users to purchase items over the Internet

commerce

A(n) _____ server handles all messaging between a network and other networks, including internet connectivity

communications

NIC

connects a node to a network

__ are collections of data connected to Power BI from one or several sources

datasets

_____ are points at which a program must choose from a range of different actions based on the value of its current inputs.

decision points

New ______ like calendars can be added to a template in Squarespace.

elements

a program that renders your computer files unusable by compressing them

encryption virus

twisted-pair

made up of copper wires

NIC stands for ________.

network interface card

Using a wireless network without the network owner's permission is known as ________.

piggybacking

With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

Most small businesses use ____ database as they are reliable and less costly.

relational

To combine data from more than one table, you need to create a(n) ____ between the tables.

relationship

To use data from two Access tables, you must create a _____ between them.

relationship

__ are collections of visualizations displayed on one or more pages in Power BI

reports

Which topology tends to provide the fairest allocation of network resources?

ring

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

rootkit

Data type (field type)

(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field and prevents the wrong type of data from being entered into the field

Data Types (field type)

(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field that prevents the wrong type of data from being entered into the field

Why is wireless slower than wired?

- Wireless bandwidth is shared among devices. - Wireless signals are more susceptible to interference from magnetic and electrical sources. - Other wireless networks (such as your neighbor's network) can interfere with the signals on your network. - Certain building materials (such as concrete and cinderblock) and metal (such as a refrigerator) can decrease throughput. - Throughput varies depending on the distance between your networking equipment. - Wireless networks usually use specially coded signals to protect their data, whereas wired connections don't protect their signals. This process of coding signals can slightly decrease throughput, although once coded, data travels at usual speeds.

Strong encryption now requires ________-bit keys.

256

Which of the following is NOT a standard for wireless Ethernet networks?

802.11ab

If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

802.11ac

Which of the following is currently the fastest wireless standard?

802.11ac

Gigabit Ethernet (GbE)

802.3. The most commonly used wired Ethernet standard deployed in devices designed for home networks; provides bandwidth of up to 1 Gbps

Operators

A coding symbol that represents a fundamental action of the programming language

Which best describes a data warehouse?

A collection of all the data from an organization's databases

Dataset

A collection of data connections

Database

A collection of data organized as meaningful information that can be accessed, managed, stored, queried, sorted, and reported.

AJAX (Asynchronous JavaScript and XML)

A collection of technologies that allow the creation of web applications that can update information on a page without requiring the user to refresh or leave the page

Dashboard

A collection of visualizations on a single page for sharing

Report

A collection of visualizations on one or more pages

Expression

A combination of elements that produce a value.

Dynamic HTML (DHTML)

A combination of technologies—HTML, cascading style sheets, and JavaScript—used to create lively and interactive websites.

T line

A communications line that carries digital data over twisted-pair wires.

Packet Switching

A communications methodology that makes computer communication efficient; in packet switching, data is broken into smaller chunks called packets.

Internet Service Providers (ISPs)

A company that specializes in providing Internet Access. May be specialized providers, like Juno, or companies that provide other services in addition to Internet access (such as phone and cable television)

Pack analyzer (sniffer)

A computer hardware device or software designed to detect and record digital information being transmitted over a network

Fifth Generation Languages (5GL)

A computer language in which a program is presented as a series of facts or constraints instead of as a specific algorithm; the system of facts can then be queried; considered the most "natural" of languages. Example include: PROgrammingLOGic

Third Generation Language (3GL)

A computer language that uses symbols and commands to help programmers tell the computer what to do, making 3GL languages easier for humans to read and remember; examples include: BASIC, FORTRAN, COBOL, C/C++, and JAVA

Fourth Generation Languages (4GL)

A computer language type that includes database query languages and report generators

Web Server

A computer running a specialized operating system that enables it to host Web pages (and other information) and provide requested Web pages to clients.

Honey pot

A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.

Zombie

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems

Logic bomb

A computer virus that runs when a certain of conditions is met, such as when a program is launched a specific number of times

Relationship

A connection between two tables using a common field.

Data Plan

A connectivity plan or text messaging plan in which data charges are separate from cell phone calling charges and are provided at rates different from those for voice calls

Backups

A copy of a computer file that can be used to replace the original file if it's lost or damaged

Image backup

A copy of an entire computer system, created for restoration purposes

Copyright

A creator's exclusive rights to use a work of intellectual property, such as making copies or selling it

Grey hat hacker

A cross between black and white-- a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security

An illustration of a one-to-many relationship would be:

A customer may have more than one account in an accounts table

What is the difference between a data warehouse and a data mart?

A data warehouse is a large collection of data from multiple sources in an organization and a data mart is data extracted from a data warehouse that pertains to a single component of the business

Report

A database document that outputs meaningful information to its readers.

Form

A database object that is used to add data or edit data in a table.

Structured Query Languages (SQL)

A database programming language used to construct queries to extract data from relational databases; one example of a fourth generation language

Structured Query Language (SQL)

A database programming language used to construct queries to extract data from relational databases; one example of a fourth-generation language

Object-oriented database

A database that stores data in objects rather than in tables

Relational database

A database type that organizes data into related tables based on logical groupings

Theme

A defined set of colors, fonts, and graphics that can be applied to a form or report.

Integrated Development Environment (IDE)

A developmental tool that helps programmers write and test their programs; one IDE can be configured to support many different languages

Node

A device (printer, game console, or router) connected to a network such as a computer, a peripheral (such as a printer), or a communications device (such as a modem)

Network-ready device (internet-ready device)

A device (such as a printer or an external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network

Switch

A device for transmitting data on a network. A switch makes decisions, based on the media access control (MAC) address of the data, as to where the data is to be sent.

Switch

A device for transmitting data on a network. It makes decisions, based on the media access control address of the data, as to where the data is to be sent

Network Navigation Device

A device on a network such as a router or switch that moves data signals around the network

Terminator

A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it

Wireless Range Extender

A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity

E-readers

A device that can display e-text and that has supporting tools like note taking, bookmarks, and integrated dictionaries

Modem

A device that connects a network to the Internet

Network Adapter

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol

Network Adapters

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.

Access Point

A device that is connected by a cable to the main router that amplifies a wireless signal to otherwise unreachable locations

Surge Protector

A device that protects computers and other electronic devices from power surges

Router

A device that routes packets of data between two or more networks

Router

A device that routes packets of data between two or more networks.

biometric authentication device

A device that uses some unique characteristic of human biology to identify authorized users

biometric authentication device

A device that uses some unique characteristic of human biology to identify authorized users.

Bridge

A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.

What is a Database

A digital collection of related data that can be stored, sorted, organized, and queried

Second-level domain

A domain that's directly below a top-level domain. (dropbox.com, dropbox is the domain level)

Smart home

A dwelling in which devices and appliances are automated or controlled by apps

Architecture Neutral

A feature of Java whereby code needs to be compiled only once, after which the code can be run on many different CPUs

Foreign key

A field in one table that is also the primary key of another table.

What is the difference between a record and a field?

A field is a single piece of information in a record

Calculated field

A field that displays the result of an expression rather than data stored in a field.

Primary key

A field that has a value unique to each record

Full backup

A file backup that encompasses all files on a computer Irregardless of whether they have changed since the last backup

Service Message Block (SMB) protocol

A file sharing protocol incorporated into all operating systems that enables users at non-Windows computers to access data in Windows machines

Data files

A file that contains stored data

Selection Filter

A filtering method that displays only records that match selected criteria.

Filter by form

A filtering method that displays records based on multiple criteria.

White hat hacker (ethical hacker)

A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies

Black hat hacker

A hacker who uses his or her knowledge to destroy information or for illegal gain

Bastion Host

A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.

Broadband

A high-speed Internet connection such as cable, satellite, or digital subscriber line (DSL). Has a transmission rate that ranges from 1 to 500 Mbps

Programming Language

A kind of "code" for the set of instructions the CPU knows how to perform

Natural Language Processing (NLP) system

A knowledge-based business intelligence system that enables users to communicate with computer systems using a natural spoken or written language instead of a computer programming language.

Botnet

A large group of software applications (called robots or bots) that run without user intervention on a large number of computers

Metropolitan Area Network (MAN)

A large network designed to provide access to a specific geographical area, such as an entire city. Many U.S. cities are now deploying them to provide Internet access to residents and tourists. Some employ WiMAX wireless technology that extends local Wi-Fi networks across greater distances

Data warehouse

A large-scale collection of data that contains and organizes in one place all the data from an organization's multiple databases.

Which of the following statements is true (Access)?

A last name is an example of a common field to group by

Script

A list of commands (mini-programs or macros) that can be executed on a computer without user interaction

Object

A main component that is created and used to make a database function, such as a table or form.

Encryption virus

A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusuable

Data dictionary (database schema)

A map of a database that defines the features of the fields in the database.

Extensible Markup Language (XML)

A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed

eXtensible Markup Language (XML)

A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed

To function, all networks must include:

A means to connect to the nodes on the network, special hardware devices that allow the nodes to communicate with each other and to send data, and software that allows the network to run

Grouping

A method of summarizing data by the values of a field.

Access method

A method to control which computer is allowed to use transmission media at a certain time.

Total row

A method to display aggregate function results as the last row in Datasheet view of a table or query.

When creating a calculation, which of the following would be identified as an error by Access?

A missing colon in the expression (for example: TotalHours [OTHours]+[RegHours]).

Client/Server Model

A model of network communications where a client device such as a computer, tablet, or smartphone uses browsers to request services from networks that make up the Internet.

Local Area Network (LAN)

A network in which the nodes are located within a small geographical area. Examples include a network in a computer lab at school or at a fast food restaurant

Service Set Identifier (SSID)

A network name that wireless routers use to identify themselves

Secure Sockets Layer (SSL)

A network security protocol that provides for the encryption of data transmitted using the Internet. The current versions of all major web browsers support SSL.

Ethernet Network

A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate

Virtual Private Networks (VPN)

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations

Virtual Private Network (VPN)

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.

Personal Area Network (PAN)

A network used for communication among devices close to one person, such as smartphones and tablets using wireless technologies such as BlueTooth and Wifi. Hotspots are an example

Open Systems Interconnection (OSI)

A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.

Comment

A note left by a programmer

AutoNumber

A number that automatically increments each time a record is added.

Field

A piece of information stored in a table, such as a company name or city.

Virus signature

A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software

Function

A predefined computation that performs a complex calculation.

Template

A predefined database that includes professionally designed tables, forms, reports, and other objects.

Intranet

A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

Packet FIltering

A process in which firewalls are configured so that they filter out packets sent to specific logical ports

Network Address Translation (NAT)

A process that firewalls use to assign internal Internet protocol addresses on a network

Normalization

A process to ensure data is organized most efficiently in a database

Inoculation

A process used by antivirus software; compares old and current qualities of files to detect viral activity

System Development Life Cycle (SDLC)

A process used to develop information systems; it consists of the following six steps: problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation

Worm

A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves

Adware

A program that downloads on your computer when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad

Backdoor program

A program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission

Client-side program

A program that runs on the client computer and that requires no interaction with a web server.

Compiler

A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language

Swift

A programming language introduced by Apple for developing for iOS and macOS

C

A programming language originally developed for system programmers

HTML embedded scripting language

A programming language that tucks programming code directly within the HTML of a web page; the most popular example is JavaScript.

Visual Basic (VB)

A programming language used to build a wide range of Windows applications

Caption

A property in a database that enables the field name to display in a more meaningful or readable manner

Dynamic Host Configuration Protocol (DHCP)

A protocol for assigning dynamic internet protocol addresses

Connection-oriented protocol

A protocol for exchanging information that requires two computers to exchange control packets, thereby setting up the parameters of the data-exchange session, before sending packets that contain data. Method is also known as handshaking

Connectionless Protocol

A protocol that a host computer can use to send data over the network without establishing a direct connection with any specific recipient computer.

Pretty Good Privacy (PGP)

A public-key package for encryption available for download on the Internet.

Object Query Language (OQL)

A query language used by many object-oriented databases

Join query

A query used to extract data that's in two or more tables in a database.

Query

A question you ask about the data in your database.

Internet cache

A section of the hard drive that stores information that may be needed again, such as Internet protocol addresses and frequently accessed web pages.

Statements

A sentence in a code

Application server

A server that acts as a repository for application software; Acts as a repository for software such as Microsoft Office

Communications server

A server that handles all communications between the network and other networks, including managing Internet connectivity.

Cloud server

A server that is maintained by a hosting company and that is connected to networks via the Internet

Authentication server

A server that keeps track of who's logging on to the network and which services on the network are available to each user; Keeps track of user logins to the network and which services are available to each user

Database server

A server that provides client computers with access to information stored in a database; Allows client computer to access a database

File server

A server that stores and manages files for network users or that acts as a storehouse for files that users can download

Dedicated server

A server used to fulfill one specific function, such as handling e-mail

E-mail server

A server whose function is to process and deliver incoming and outgoing e-mail; Processes and delivers incoming and outgoing e-mail

Application part

A set of common Access components that can be added to an existing database.

Protocol

A set of rules for conducting communications

Application Programming Interface (API)

A set of software routines that allows one software system to work with another

Algorithm

A set of specific, sequential steps that describe exactly what the computer program must do to complete the required work. This is apart of Making a Plan

Which of the following best describes Power BI?

A set of tools used to analyze data from a variety of sources

Scripting Language

A simple programming language that's limited to performing a set of specialized tasks

Copyleft

A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights

Form view

A simplified user interface primarily used for data entry; does not allow you to make changes to the layout.

Coaxial cable

A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.

Coaxial Cable

A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service

Tile

A single visualization

Java Applet

A small Java-based program

Applet

A small application located on a server; when requested, it downloads to the client

Prototype

A small model of a program built at the beginning of a large project

Macro

A small program that groups a series of commands to run as a single command

Master boot record

A small program that runs whenever a computer boots up

Packet

A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent.

Cookies

A small text file that some websites automatically store on a client computer's hard drive when a user visits the site

Print queue

A software holding area for print jobs. Also called a print spooler.

What is Circos?

A software package that uses a circular layout for visualizing data and information

Firewall

A software program or hardware device designed to prevent unauthorized access to computers or networks

Database Management System (DBMS)Correct Answer

A software system that provides the tools needed to create, maintain, and use a database

Exploit kits

A software toolkit used to take advantage of security weaknesses found in apps or operating systems, usually to deploy malware

Service Packs

A software update

What is an example of a record in the Windows Media Player database?

A song

Token

A special data packet used to pass data on a network

Wireless Network Interface Card (wireless NIC)

A special network adapter card that allows a computing device to connect to a network using wireless access.

Jam Signal

A special signal sent to network nodes alerting them that a data collision has occurred.

Editor

A special tool in an integrated development environment (IDE) that helps programmers as they enter code

Network Attached Storage (NAS) device

A specialized computing device designed to store and manage network data. Examples being AirPort Time Capsule for Apple cpmputers

Database management system (DBMS)

A specially designed application software used to create and manage databases

Query language

A specially designed computer language used to manipulate data in or extract data from a database

Home Area Network (HAN)

A specific type of LAN located in a home. Used to connect all of a home's digital devices, such as computers, peripherals, phones, gaming devices, digital video recorders (DVRs), and televisions

High Definition (HD)

A standard of digital TV signal that guarantees a specific level of resolution and a specfic aspect ratio, which is the rectangular shape of the image

Javascript Object Notation (JSON)

A syntax for exchanging information between computers

Proprietary System

A system having the characteristic of being closed to public access (private), as opposed to an open system.

Open System

A system having the characteristic of being public for access by an interested party; as opposed to a proprietary system

Digital Rights Management (DRM)

A system of access control that allows only limited use of material that has been legally purchased

Bus (linear bus) topology

A system of networking connections in which all devices are connected in sequence on a single cable.

Information System

A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information

Information System

A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information.

Expert System

A system that tries to replicate the decision-making processes of human experts in order to solve specific problems.

Top-down design

A systematic approach in which a problem is broken into a series of high-level tasks

Which database object is used to store data and is organized by fields and records?

A table

Spear phishing

A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data

Control

A text box, button, label, or other tool you use to add, edit, and display the data in a form or report.

Pseudocode

A text-based approach to documenting an algorithm

Debugger

A tool in an IDE that helps programmers analyze a program as it runs

Which statement about a totals query is true?

A totals query may contain several grouping fields and several aggregate fields

Object-oriented analysis

A type of analysis in which programmers first identify all the categories of inputs that are part of the problem the program is meant to solve

Incremental Backup

A type of backup that only backs up files that have changed since the last time files were backed up

Decision Support System (DSS)

A type of business intelligence system designed to help managers develop solutions for specific problems

Transaction Processing System (TPS)

A type of business intelligence system for keeping track of everyday business activities.

Digital Subscriber Line (DSL)

A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmission to share the same line

Loops

A type of decision point in algorithm. In a loop, a question is asked, and if the answer is yes, a set of actions is performed. Once the set of actions has finished, the question is asked again, creating a loop. If the answer to the question is no, the algorithm breaks free of the loop and moves on to the first step that follows the loop

Binary Decisions

A type of decision point in an algorithm that can be answered in one of only two ways: yes (true) or no (false)

Scareware

A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware

Client/server network

A type of network that uses servers to deliver services to computers that are requesting them (clients).

Client/Server Network

A type of network that uses servers to deliver services to computers that are requesting them (clients). They can usually be identified by having 10 or more nodes

Ring (loop) topology

A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.

Server-side program

A type of program that runs on a web server rather than on a computer (PHP and NET).

Keystroke Logger (keylogger)

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information

Constant

A value that does not change.

Beta Version

A version of the software that's still under development. Many beta versions are available for a limited trial period and are used to help the developers correct any errors before they launch the software on the market

Syntax Errors

A violation of the strict set of rules that define the programming language

Logical port

A virtual communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers

Polymorphic Virus

A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for anti-virus programs to detect the virus

Boot-sector virus

A virus that replicates itself into the master boot record of a flash drive or hard drive

Stealth Virus

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer

Internet exchange point (IXP)

A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISPs connect.

Field name

A way of describing the information in the field

Satellite Internet

A way to connect to the Internet using a small satellite dish, which is placed outside the home and is connected to a computer with coaxial cable. The satellite company then sends the data to a satellite orbiting Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer

Totals query

A way to display aggregate data when a query is run.

What are web servers?

A web server is used to host a website so it will be available through the internet

Trademark

A word, phrase, symbol, or design-- or a combination of these-- that uniquely identifies and differentiates the goods (or services) of one party from those of another

Which of the following is a reason to establish a network?

All of the above (to share an Internet connection, to share files, to share peripherals)

Which of the following can be added to a totals query?

All of the above can be added to a totals query

Which of the following cannot be used in a calculated field?

All of these can be used in a calculated field

Second Generation Language (2GL)

Also known as an Assembly Language, it is a computer language that allows programmers to write programs using a set of short, English-like commands that speak directly to the CPU and that give the programmer direct control of hardware resources

What is an example of a database?

Amazon

Where to buy e-boks?

Amazon kindle store, Barnes and Noble NOOK e-bookstore, publishers, textbooks directly from publishers

Repeater

Amplifies signals on long cable runs

Navigation pane

An Access interface element that organizes and lists database objects in a database.

Form

An Access object that simplifies entering, modifying, and deleting table data.

Expression builder

An Access tool that helps you create more complicated expressions.

what is an IP address and where I can find the IP address for my computer

An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."

Wireless ISP

An ISP thar provides service to wireless devices such as smartphones

In the sound byte, the problem with the router port was fixed by

An IT technician

IPv6

An Internet Protocol (IP) addressing scheme that makes IP addresses longer, thereby providing more available addresses

User Datagram Protocol (UDP)

An Internet Protocol that creates data packets across the internet.

Denial-of-service (DoS) attack

An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate user access

Brute force attack

An attempt to access an account by repeatedly trying different passwords.

Distributed denial-of-service (DDos) attack

An automated attack that's launched from more than one zombie computer at the same time

What's an e-mail server?

An e-mail server is a specialized computer that stores, processes, and sends e-mails.

How is an e-mail server different from a communications server?

An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing internet connectivity

Runtime error

An error in a program that occurs when a programmer accidentally writes code that divides by a zero, a mathematical error

Logical Error

An error in a program that produces unintended or undesired output, where the syntax is correct but some other human error has occured

Scope Creep

An ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype

Java

An object-oriented programming language that has a large set of existing classes. It is also architecture neutral, meaning it can work on most computers

What is Hadoop

An open source platform sponsored by the Apache Software Foundation that makes big, complex, and unstructured data easier to manage

Spam filter

An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox

Programmers often use an IDE named ________ to develop apps for Android devices.

Android SDK

Android mobile app development is often performed in which of the following environments?

Android studio using Java

Which of the following would be matched if you use a Selection filter's exact match option for the name Ann?

Ann, ANN, and ann

Cybercrime

Any criminal action perpetrated primarily through the use of a computer

Possessed object

Any object that users carry to identify themselves and that grants them access to a computer system or facility.

Social Engineering

Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information

Hacker

Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)

Hoax

Anything designed to decieve another person either as a pratical joke or for financial gain

To add a predefined table to an existing database, you should use which of the following?

Application part

What's the best type of server to use when employees need to share software programs (apps)?

Application server

Which of the following best describes Quick Insights?

Artificial intelligence used to analyze data, Generates insights that otherwise might not be noted, and Generates conclusions about data that might already be known

All of the following are suggested guidelines for table design except:

Avoid date arithmetic.

How do I get started on creating a database?

Before creating a database, you need to know the three main components of a database. These include fields, records, and tables

What are the two types of decision points?

Binary and Loops

Most popular languages?

C/C++ and Java. COBOL is used in banking and insurance industries

program that generates distorted text and require that it be typed into a box

CAPTCHA

________ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser.

CGI

The set of instructions that define how to display the HTML elements in your site is a. CSS b. XML c. AJAX d. PHP

CSS

Which panel of CodePen editor would you use to to change the color of headings on the entire web page?

CSS

__ determines the colors and fonts of a web page

CSS

the set of instructions that defines how to display the HTML elements in your site is

CSS

Which of the following is NOT a factor to consider when selecting network cabling?

Cable diameter

Twisted pair cable

Cable made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)

Pmt function

Calculates the loan payment given the rate, number of periods (also known as term), and the present value of the loan (the principal).

Which of the following could not be done using an aggregate function?

Calculating the payment amount of a loan

Which of the following determines how the field names can be made more readable in table and query datasheets?

Caption property

An option that directs Access to automatically update all foreign key values in a related table when the primary key value is modified in a primary table.

Cascade Update Related Fields

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network

Cat 7B

________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.

Circuit switching

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

Circuit switching

How would you set up your connection so that it connects to a particular wireless network every time you're in the area without requesting any manual intervention?

Click the connection and then click the Connect automatically check box.

Which of the following is NOT a common network topology?

Cluster

_____ cable consists of a single copper wire surrounded by layers of plastic and is commonly used to connect TVs

Coaxial

Split form

Combines two views of the same record source—one section is displayed in a stacked layout and the other section is displayed in a tabular layout.

________ servers are computers that enable users to buy goods and services over the web.

Commerce

when my friend connects to my computer, how is data transferred

Computers communicate efficiently using the communication methodology called packet switching.

but how do computers get the IP address from a domain name

Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.

What types of scams do identity thieves perpetrate?

Counterfeiting existing credit/debit cards, requesting change of address for bank statements, opening new credit/bank accounts, obtaining medical services under your name, and buying a home with a mortgage in your name

protocol that assigns dynamic IP addresses

DHCP

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

DNS

translates a domain name into an IP address

DNS

The ________ defines items on a web page such as graphics, tables, and headers as objects.

DOM

Which of the following is the component of Power BI that is a collection of visuals displayed on a single page and shared with others?

Dashboard

__are collections of visualizations displayed on one page in Power BI and shared with others

Dashboards

List the 3 things that are relevant to creating a useful program (aka the 3 elements of the problem statement

Data (input), information (output), method (process)

Data inconsistency

Data for a record being different in two different lists

Two lists showing different values for the same data in different places of a database is an example of?

Data inconsistency

What kind of processes are used to spot trends in large sets of data?

Data mining is used to analyze large amounts of data to help identify trends

Which of the following statements about a ring topology is TRUE?

Data only flows in one direction

Extracting and reformatting data from each sources so all data is consistent and then storing the data is known as

Data staging

Extracting, transforming, and storing data are processes associated with which of the following?

Data staging

Structured (analytical) data

Data such as "Bill" or "345," as opposed to unstructured data

Information

Data that has been organized or presented in a meaningful fashion; the result, or output that users require at the end of a job

Time-variant data

Data that is not limited to particular time period

What is the term for how fast data moves through networks?

Data transfer rate (also called bandwidth)

A large-scale collection of data that consolidated data from various operational systems is known as a?

Data warehouse

What kind of data is captured in a data warehouse?

Data warehouse data is time-variant, and it gets its data from sources inside and outside the business, as well as from clickstream data from websites

A library book reservation service is a good example of a use for a(n) ________ server.

Database

Which of the following is NOT a common consideration when selecting an appropriate programming language for a project?

Database access

Help desk software

Database where technicians log users problems

Which of the following is NOT an advantage of installing a network in a business?

Decentralization of files and data

Knowledge-based and model management systems are used in which type of business information system?

Decision support systems can be enhanced and made more effective by using knowledge-based and/or model management systems

List the 5 stages of PDLC

Describing the problem, making a plan, coding, debugging, and testing and documentation

Documentation

Description of how the technical details of the software, how the code works, and how the user interacts with the program; in addition, all the necessary user documentation that will be distributed to the program's users

Which of the following views provides you with the most flexibility in modifying forms and reports?

Design view

Cat 6A

Designed for ultrafast Ethernet networks that run at speeds as fast as 10 Gbps

Data type

Determines the type of data that can be entered and the operations that can be performed on that data.

You can find out which network adapters are installed in your system by using the Windows _____ manager utility

Device

What would you use to see what network adapters are installed in your Windows computer?

Device Manager Utility

Mobile Hotspot

Devices that enable you to connect more than one device to the Internet; they require access to a data plan. Most smartphones have this capability built-in

Data-flow diagram

Diagrams that trace all data in an information system from the point at which data enters the system to its final resting place (storage or output). This is apart of design.

Which of the following is NOT a wired broadband Internet connection option?

Dial-up

Multiple Items Form

Displays multiple records in a tabular layout similar to a table's Datasheet view, with more customization options.

What special problems can occur with wireless networks?

Distance from the router, as well as floors, walls, and large metal object s between a device and the router can interfere with wireless connectivity

Cyberloafing (cyberslacking)

Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working

A(n) ________ links a URL to an IP address when a web page is requested.

Domain Name System (DNS) server

________ occur when a website downloads harmful software onto your computer.

Drive-by downloads

For business networks, which of the following is NOT a main cable type?

Duplex

DHTML stands for ________.

Dynamic HyperText Markup Language(dhtml)

Variable

Each input and output item the program manipulates

Label Wizard

Enables you to easily create mailing labels, name tags, and other specialized tags.

Print View

Enables you to see exactly what the report will look like when it is printed.

Filter

Enables you to specify conditions to display only those records that meet certain conditions.

A good way to protect your e-mails is to use __

Encryption

________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.

Encryption

What steps can be taken to secure a wireless network?

Ensure a firewall is installed and make changes to several settings with your router and on your network

Range check

Ensure that the data entered into the field of a database falls within a certain range of values

Information assurance

Ensuring that information systems contain accurate information and are adequately secured against tampering.

A __ system is a large software system that gathers information from all parts of a business and integrates it to make is readily available for decision making

Enterprise resource planning

Which of the following conditions is available through a Selection filter?

Equal condition

How the program should behave if the input data is invalid is part of?

Error handling

Most home networks use the ________ standard

Ethernet

________ is the standard communications protocol used on most client/server networks.

Ethernet

What network standard is used in my home network?

Ethernet Network

Which of the following is NOT true of an Access database?

Every table in a database contains the same number of records as every other table

A P2P network needs specialized network operating system software installed on every node

FALSE

A denial-of-service attack can be used to deny hackers access to a computer system.

FALSE

A logical error can be detected and repaired by the compiler

FALSE

A phishing attack is an attempt to access an account by repeatedly trying different passwords.

FALSE

A stealth virus is designed to infect multiple file types to fool the antivirus software.

FALSE

All viruses cause serious destruction of computer data.

FALSE

An RTM version fo software is often released so users can help debug it

FALSE

An access point connects to the main router wirelessly

FALSE

An encryption virus replicates itself onto a hard drive's master boot record.

FALSE

An international company like Microsoft would use a MAN to connect all of its computers.

FALSE

Client-side programs run on a web server rather than on your computer.

FALSE

Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.

FALSE

Currently, there are no antivirus programs for mobile devices.

FALSE

Data flows in both directions in a ring network.

FALSE

File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.

FALSE

HTML is a simple programming language.

FALSE

IPv6 uses six groups of 16-bit numbers.

FALSE

In a client/server network, each network node communicates directly with every other node on the network.

FALSE

Java and JavaScript refer to the same language.

FALSE

JavaScript commands are executed on a server computer.

FALSE

Limiting your signal range does not help increase wireless security

FALSE

MAC addresses and IP addresses are the same thing.

FALSE

MAC addresses are restricted to Macintosh computers.

FALSE

Many programming languages are moving away from the object-oriented paradigm.

FALSE

P2P networks become difficult to manage when they exceed five users.

FALSE

The United States government is in charge of the Internet.

FALSE

WEP is a stronger form of security than WPA

FALSE

When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.

FALSE

When using packet switching, packets are always sent over the same route.

FALSE

Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.

FALSE

XML technologies allow web pages to change after they have been loaded.

FALSE

You should use the same password for each system or website you need to access.

FALSE

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

FBI and National White Collar Crime Center

A Short Text field can store no more than 100 characters.

False

A proxy server is used to host websites on a client/server network

False

A repeater moves data between two networks.

False

AutoNumber data types are generally used for calculation fields such as price.

False

HTML changes the style of all elements on a web page (T/F)

False

If you like the menu settings of one template in Squarespace, you can use it in another template (T/F)

False

In the Sound Byte exploration of Magic Gradient, moving the mouse straight up and down made the background color change wildly

False

In the bus topology, only the device for which a signal is intended can hear the sent data signal.

False

In the sound byte, the intern used a port replicator to determine that there was a defective port

False

It is always best to use natural language queries and quick insights to analyze data in Power BI rather than creating the data analysis model manually in Power BI

False

Which transmission medium transmits data the fastest?

Fiber-optic cable

If files need to be accessible to multiple employees, what type of server should a network include?

File server

What do file servers do?

File servers are used to store and manage files for network users

Program Files

Files that are used in the running of software programs and that do not store data

Which option is used to filter records by using criteria in one or more fields?

Filter by Form

What do banks use to verify your identity?

Finger vein authentication technology

Periodically applying ________ upgrades fixes known problems in the ROM of a router or other networking devices.

Firmware

Control Structure

General term used for a keyword in a programming language that allows the programmer to direct the flow of the program based on a decision

Why is digital format better than analog?

Gives us a simple way to describe sound and light AND it can be reproduced exactly and distributed easily

How is client-side programming done?

HTML embedded scripting language AND applet

Which of the following is NOT true about HTML?

HTML is a fully featured programming language.

What is the current release of HTML?

HTML5

Which of the following was created for the transfer of hypertext documents across the Internet?

HTTP

Which of the following is NOT a typical data source for data warehouses

Hyperlink data

All IP addresses must be registered with the __, which is responsible for allocating IP addresses to network administrators

ICANN

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

ICANN

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

IP

A(n) ________ address is the address that external entities use when communicating with your network.

IP

sends data between computers on the Internet

IP

a computer's identity on the Internet

IP address

a unique identification number that defines each computer, service, or other device that connects to the Internet

IP address

197.169.73.63 is an example of a(n) ________.

IP address, Internet Protocol address, dotted decimal number,dotted quad

The original IP addressing scheme is?

IPv4

The IPv4 protocol is beginning to be replaced by the ________ protocol.

IPv6

The ________ IP addressing scheme uses 128-bit addressing.

IPv6

primary key field

In a database, a field that has a value unique to a record

Query

In a database, a way of retrieving information that defines a particular subset of data; can be used to extract data from one or more tables.

Consistency check

In a database, compares the values of data in two or more fields to see if those values are reasonable

Alphabetic check

In a database, confirms that only textual characters are entered in a field

Completeness check

In a database, ensures that all required fields have been completed

Validation rule

In a database, generally defined as part of the data dictionary and specified in the field properties for each field; violations result in an error message and a suggested action.

Filter

In a database, temporarily displays records that match certain criteria

Passive topology

In a network, a type of topology where the nodes do nothing to move data along the network

Active topology

In a network, a type of topology where the nodes participate in moving data through the network.

Referential integrity

In a relational database, a condition where, for each value in the foreign key table, there's a corresponding value in the primary key table.

Relationship

In a relational database, a link between tables that defines how the data is related; A link between tables that defines how the data is connected

One-to-many relationship

In a relational database, a record appears only once in one table while having the capability of appearing many times in a related table

One-to-one relationship

In a relational database, each record in a table has only one corresponding record in a related table

Many-to-many relationship

In a relational database, records in one table are related to multiple records in a second table, and vice versa

Foreign key

In a relational database, the common field between tables that's not the primary key

____ is the ability of two or more people to communicate in text over the internet in real time

Instant messaging

________ permits two or more people to communicate over the Internet in real time.

Instant messaging

Who developed the Ethernet Protocol?

Institute of Electrical and Electronics Engineers (IEEE)

E-reader advantages include?

Integrated dictionaries, note taking, URL links, cloud bookmarks, e-books and audio can be linked, and magnifying

What sources does a data warehouse get its data from?

Internal sources, external sources, and clickstream data

Fiber-optic service

Internet access that is enabled by transmitting data at the speed of light through glass or plastic fibers

Advance fee fraud

Involves convincing individuals to send money as a "good faith" gesture to enable them to receive larger payments in return

Non-auction/non-delivery scams

Involves running auctions (or sales) of merchandise that does not really exist

Network Administration

Involves tasks such as (1) installing new computers and device, (2) monitoring the network to ensure it's performing efficiently, (3) updating and installing new software on the network, and (4) configuring or setting up proper security for a network

What is the flaw of fingerprint scanning technology?

It can be duplicated

Why is Java is considered an architecture-neutral language?

It can run on many different CPUs with only one compilation

Personal Video ecording

Kodi

The computers in a lab on a floor of a building would be connected using a ________.

LAN

a network in a small geographic area

LAN

Multipartite virus

Literally meaning "multi-part" virus; a type of computer virus that attempts to infect computers using more than one method

How to know what's connecting your to router AND how to determine what's connected to your router

Log in to an account associated with your router's IP address

How can you tell what wireless devices are connected to your router?

Log in to the router's IP address and check the configuration page.

A(n) __ address is the unique physical address of a network adapter

MAC

A(n) ________ address is a specific/unique number for each network adapter.

MAC

The unique number assigned to a network adapter by the manufacturer is referred to as the _____ address

MAC

A key component for data navigation on an internal network is a(n) _________.

MAC address

Each network adapter has a unique physical address called a(n) __ that identifies it

MAC address

Network adapters send data packets based on a(n)?

MAC address

used for internal identification on a network

MAC address

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

links users in a specific geographic area (usually a city)

MAN

Which protocol is used when sending files as attachments by e-mail?

Multipurpose Internet Mail Extensions (MIME)

What would the consequences be to you if your neighbors in an apartment complex inadvertently piggyback on your wireless network, even if they did nothing malicious?

My network would slow down

Power BI uses __ to enable users to use plain English to ask questions about data

Natural Language Queries

A type of data analysis that uses plain English instead of special code or syntax is called:

Natural Language Query

Is one table in a database enough to enter all my information in it and store all the fields?

No, you need to create different tables and categorize data to be stored in them

Is a home network the same kind as the one at the corporation where I work?

No. Most companies use client/server networks. You'll be setting up a P2P network

Do database servers manage the network databases?

Not really. Database servers provide client computers with access to information stored in a database

Which Access data type enables you to store numeric values that need to be calculated?

Number

The ranking of network problems by importance is usually determined by

Number of affected users

public-key package

PGP

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

Packet switching

how do packets travel through the internet

Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.

In the sound byte, the intern used a ____ to diagnose the router problem

Port scanner

A file type that was created for exchanging documents independent of software applications and operating system environment.

Portable Document Format (PDF)

If you need to send a report to a user who does not have Microsoft Office available, which of the following file formats would be the best choice to ensure it can be opened?

Portable Document Format (PDF)

When adding date criteria to the Query Design view, the dates you enter must be delimited by:

Pound signs (#)

Ghosting

Process of copying complete hard drive comtents

MCSE

Professional certification

What file types are used for digital images (digital cameras)

RAW files and JPEG files

________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.

Radio frequency/RF

Who invented e-mail?

Ray Tomlinson in 1971

Two types of property

Real and Personal

A __ is a type of Information system that tracks transactions

Real-time processing

A report can be made from one or more tables or a query. The object(s) that a report is based on is known as the:

Record source

What are the three main types of databases?

Relational databases, object-oriented databases, and multidimensional databases

Changing the ________ from the default name given by the manufacturer can make it more difficult for hackers to access your network.

SSID

________ means that additional users can easily be added without affecting the performance of the other network nodes.

Scalability

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.

Secure Sockets Layer (SSL)

How to publish your own works (digital text)?

Self publish on Amazon Kindle Store (Kindle Direct Publishing), using a company like Smashwords, and using a site like Lulu

If you want to calculate aggregate statistics about graduation rates for students in a college database, which of the following would provide the least useful information if you were to group by it?

Social Security Number

Antivirus software

Software specifically designed to detect viruses and protect a computer and files from harm

Model Management System

Software that assists in building management models in decision support systems; an analysis tool that, through the use of internal and external data, provides a view of a particular business situation for the purposes of decision making.

Device driver

Software that facilitates the communication between a device and the operating system.

Where to publicize your band's music?

Sound Cloud, CD Baby, and ReverbNation

What process does source data need to go through to be useable in a data warehouse?

Source data must go through a process called data staging and be extracted, reformatted, and then stored in a data warehouse

Wide Area Network (WAN)

Spans a large physical distance. The Internet is the largest version if this, which covers the globe. It's also a networked collection of LANs. If a school has multiple campuses located in different towns, each with its own LAN, connecting the LANs of each campus by telecommunications lines allows the users of the LANs to communicate. All the connected LANs would be described as a single WAN

Wildcard

Special character that can represent one or more characters in the criterion of a query.

Multipurpose Internet Mail Extensions (MIME)

Specification for sending files as attachments to e-mail.

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

Spooler

One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.

Spyeye Mobile Banking

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

A facial-recognition scanner is an example of a biometric authentication device.

TRUE

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.

TRUE

A printer connected to a wireless network is considered to be a node on that network

TRUE

A switch acts like a traffic signal on a network

TRUE

A time bomb virus can be triggered on a certain date.

TRUE

A virus signature is a portion of virus code that is unique to a particular computer virus.

TRUE

A worm does NOT require human interaction to spread to other computers.

TRUE

A zombie is another person's computer controlled by a hacker.

TRUE

AJAX allows you to create websites that can refresh without the user taking an action

TRUE

An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.

TRUE

Creating and spreading online viruses is a cybercrime.

TRUE

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

TRUE

Dynamic IP addressing is accomplished using a DHCP server.

TRUE

Ethical hackers are also known as white-hat hackers.

TRUE

In an active topology, each node helps to move data through a network.

TRUE

Most computers today come with network adapters already installed

TRUE

P2P networks are most commonly used in home networks.

TRUE

Sharing files is a benefit of a network

TRUE

Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

TRUE

The tag <i> informs a browser that the text that follows the tag should be italicized.

TRUE

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.

TRUE

Transmission media comprise the physical system that data take to flow between devices on the network.

TRUE

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

TRUE

Wireless network connections are slower than wired broadband connections

TRUE

Wireless networks are more vulnerable to attack than wired networks

TRUE

XML and JSON are both common formats for the exchange of information between web services

TRUE

When creating an Access table in Design view, you can add each of the following EXCEPT ________.

Table sizes

HTML tag

Tags that surround and define HTML content (such as and, which indicate bolding)

Two types of Personal Property

Tangible and intangible

Variable Declaration

Tells the operating system that the program needs to allocate storage space in RAM

Which of the following is FALSE about working with templates in Squarespace?

Templates cannot be customized.

Which is NOT a key component of a typical client/server network?

Terminator

Which of the following is the final stage of the program development life cycle (PDLC)?

Testing and Documentation

Electronic text (e-text)

Textual information stored as digital information, so that it can be stored, manipulated, and transmitted by electronic devices

Token method

The access method used by ring networks to avoid data collisions

Backward Compatibility

The accommodation of current devices being able to use previously issued software standard in addition to the current standard

Batch processing

The accumulation of transaction data until a certain point is reached, at which time several transactions are processed at once.

Network Adapter

The device within a computing device that connects it to a network

Electronic Data Interchange (EDI)

The exchange of large amounts of data in a standardized electronic format.

It is more efficient to make a copy of an existing query rather than to create a new query when which of the following is true?

The existing query and the new query use the same tables and fields

Primary key

The field (or combination of fields) that uniquely identifies each record in a table.

Which of the following is TRUE about considerations for choosing programming languages for programs that will be embedded on a chip?

The final program needs to not take up a lot of storage space.

Public key

The key for coding distributed to the public in public-key encryption.

Private Key

The key for decoding retained as private in public-key encryption.

First Generation Language (1GL)

The machine language of a CPU; the sequence of bits that the CPU understands

Internet Backbone

The main pathway of high-speed communications lines over which all Internet traffic flows.

Tunneling

The main technology for achieving a virtual private network; the placement of data packets inside other data packets.

Star topology

The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.

When I attach a file to my e-mail, will SMTP send it to the e-mail server?

The multipurpose Internet mail extensions (MIME) protocol is responsible for sending e-mail file attachments.

How can you recognize an unsecured wireless network?

The network icon will have a warning symbol.

My office has shifted to a client/server network and uses one server in the office—is that sufficient?

The number and types of servers you need depends on the workload your network experiences

Sampling Rate

The number of times per second a signal is measured and converted to a digital value. It is measured in kilobits per second

All of the following statements are true about creating a database except:

The objects provided in a template cannot be modified

Internet Corporation for Assigned Names and Numbers (ICANN)

The organization that registers Internet protocol addresses to ensure they're unique and haven't been assigned to other users

Error Handling

The part of a program statement where programmers describe what the program should do if the input data is invalid or just gibberish

Testing Plan

The part of the problem statement that lists specific input numbers the programmers would typically expect the user to enter; the plan then lists the precise output values that a perfect program would return for those input values

Media Access Control (MAC) address

The physical address, similar to a serial number, of each network adapter

Compilation

The process by which code is converted into machine language-- the language the CPU can understand

Data mining

The process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.

Identity theft

The process by which someone uses personal information about someone else (such as victim's name, address, and SSN) to assume to the victim's identity for the purpose of defrauding another

Encryption

The process of coding e-mail so that only the person with the key to the code (the intended recipient) can decode the message

Piggybacking

The process of connecting to a wireless network without the permission of the owner of the network

Validation

The process of ensuring that data entered into a database is correct (or at least reasonable) and complete.

Method

The process of how a program converts inputs into the correct outputs

Authentication

The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network

Program Development Life Cycle (PDLC)

The process of performing a programming project, which consists of five stages: describing the problem, making a plan, coding, debugging, and testing and documentation

Debugging

The process of running a program over and over to find and repair errors and to make sure the program behaves in the way it should

Simple Mail Transfer Protocol (SMTP)

The protocol responsible for sending e-mail along the Internet to its destination; part of the Internet Protocol suite.

Hypertext Transfer Protocol (HTTP)

The protocol that allows files to be transferred from a web server so that you can see them on your computer by using a browser.

Transmission Media

The radio waves or the physical system (cable) that transports data on a network. Can be wired or wireless

Transmission Media

The radio waves or the physical system (cable) that transports data on a network; system which enables the flow of data on a network

Online Transaction Processing (OLTP)

The real-time processing of database transactions online.

A network technician can expect each of the following except

The same challenges every day

Order of operations

The sequence by which operations are performed in a mathematical expression.

Problem Statement

The starting point of programming work; a clear description of what tasks the computer program must accomplish and how the program will execute those tasks and respond to unusual situations

When entering, deleting, or editing input masks:

The table must be in Design view.

Record source

The table or query that supplies the records for a form or report.

Persistence of Information

The tendency for pictures, videos, and narratives to continue to exist in cyberspace even after you delete them

Data redundancy

The unnecessary storing of duplicate data in two or more tables.

Relational algebra

The use of English-like expressions that have variables and operations, much like algebraic equations, to extract data from databases using Structured Query Languages

Digital Convergence

The use of a single unifying device to handle media, Internet, entertainment, and telephony needs

Drive-by-download

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing the web

What are the different types of databases and which is the most common?

There are relational, object-oriented, and multidimensional databases. Of these, the relational database is most common

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks

How many UTP cables?

Three; Cat 5E, Cat 6, and Cat 6A

How is analog converted to digital?

Through a process called analog-to-digital conversion

__ are elements such as videos, weblinks, and images which can eb added to a power BI dashboard

Tiles

__ day is data that doesn't pertain to on period of time

Time-variant

Coding

Translating an algorithm into a programming language

program that appears to be something useful or desirable

Trojan horse

Microsoft has free online Power BI tools available

True

Switches are used to send data on a specific route through an internal network

True

Shielded twisted-pair (STP) cable

Twisted-pair cable that contains a layer of foil shielded to reduce interference.

What are Alibaba and Panjiva?

Two online business-to-business databases that help to navigate these transactions

Fuzzy logic

Used probabilities to inject experimental learning in knowledge-based systems. Enables the interjection of experiential learning into knowledge-based systems by allowing the consideration of probabilities

Caption property

Used to create a more understandable label than a field name that displays in the top row in Datasheet view and in forms and reports.

Form tool

Used to create data entry forms for customers, employees, products, and other tables.

Report Tool

Used to instantly create a tabular report based on the table or query currently selected.

Comparison Operator

Uses greater than (>), less than (<), greater than or equal to (>=), and less than or equal to (<=), etc. to limit query results that meet these criteria.

Virtualization

Using specialized software to make individual physical servers behave as though they are more than one physical device.

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

How do nodes connect to each other?

Via transmission media

Design view

View that enables you to create and modify a table design.

Software Piracy

Violating a software license agreement by copying an application onto more computers than the license agreement permits

Trade Dress

Visual appearance of a product or its packaging, similar to a trade mark. Example: Coca Cola Bottle

Flowchart

Visual diagram of a process, including the decisions that need to be made along the way

Which protocol uses standard internet connections to make phone calls over the internet

VoIP

__ technology is used to make free long-distance calls

VoIP

A(n) ________ is made up of two or more LANs that are miles apart.

WAN

The network architecture that spans the largest physical distance is called a _____

WAN

network of two or more LANs

WAN

How to get free Wi-Fi access?

Websites like Wi-Fi-FreeSpot, apps like WifiGet, and ISPs which may provide free hotspot service

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

White-hat

Can I set up a wireless network at home?

You can have a wireless network only if each node connected to the network has a wireless network adapter attached to it or installed in it.

What else can I store in a field besides text, numeric values, and contents of a calculation?

You can store pictures and video clips using OLE Object fields

What data type can I use for a field if I have to store a page of text?

You can use memo fields. They are text fields that are used to hold long pieces of text

Is there any other safer way to encrypt e-mails?

You can use public-key encryption. In public-key encryption, two keys are created, one key for encoding and the other for decoding.

What server is used to store applications?

You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer

How do I create relationships between tables?

You use primary and foreign key fields to create relationships between tables

How can I share an Internet connection on a wireless network?

You'll need a special router to share an Internet connection on a wireless network.

Field constraint

a property that must be satisfied for an entry to be accepted into the field

Model Release

a release which usually grants the photographer the right to use an image of the model (or subject of the photo) commercially

Print server

a server that manages all client-requested jobs for all printers on a network

Computer Protocol

a set of rules for exchanging electronic information

An applet is a. a small application located on a server computer b. a program distributed by Apple Inc c. a hardware device that encrypts e-mail messages d. a program language used to help create dynamic web pages

a small application located on a server computer

an applet is

a small application located on a server computer

A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.

algorithm

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.

algorithm

in the client/server model, clients are phones or computers and serves are computers

all of the above

If you need a professional-looking website with many features, you can

all of the above (code it by hand.pay a professional web designer.use a web design tool like Squarespace)

acts as a repository for application software

application

The process whereby users prove they have authorization to use a computer network is known as

authentication

To manage authorized connections to internal networks, which server would a client/server network include?

authentication

keeps track of user logins to the network and which services are available to each user

authentication

How would you reply to an e-mail you've received that has multiple recipients, when you only want the sender to see your reply? a) Click Reply to All b) Click Reply c) Click Forward

b) Click Reply

sends data between different collision domains

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

brute force attack

Connecting computers in a line on a single cable run is called a(n) _____ topology.

bus

In a ________ topology, all computers are connected in a line on a single cable run.

bus

In a table, if you need to store the extended price (number of units sold times the price per unit) of an order, you would store the data in a ____ field.

calculated

The results of multiplying the Hours field times the Rate field would be store in a(n) ____ field.

calculated

Digital cameras don't use film. Instead, they capture images on electronic sensors called _________ arrays and then convert those images to digital data, series of numbers that represent the color and brightness of millions of points in the image

charge-coupled device (CCD)

Traditional landline telephones use __, which is a dedicated connection between two points that remains active for the duration of transmission

circuit switching

a dedicated connection is formed between two communicating parties

circuit switching

In an object-oriented programming language, ________ are a combination of data fields and methods and model things like network connections, windows, scrollbars.

classes

By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.

classless interdomain routing (CIDR)

Encryption is used to a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the internet more available

code your e-mail so only one person can decipher it

An integrated development environment (IDE) is a ______.

collection of tools that helps programmers write and test their programs

All of the following are types of objects in an Access database EXCEPT ________.

columns

Which server would a client/server network include to control data exchanges with other networks?

communications

Codepen.io has a coding ________ which provides an ability to interact with others and learn from their projects or Pens.

community

A(n) _____ is a program which reads the instructions programmers have written and translates these instructions into binary patterns that will execute commands on the CPU.

compiler

a set of rules for exchanging electronic information

computer protocol

program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files

computer virus

client

computers on which users accomplish specific tasks and make specific requests

LAN

confined to a small geographic location beyond the home

Collections of data connected to Power BI are known as __?

datasets

A(n) ________ server is a server used to fulfill one specific purpose.

dedicated

In a network, ____ servers preform specific tasks such as handling e-mail or managing files

dedicated

Servers such as print and database are examples of ___ servers that fulfill a specific network function

dedicated

All of the following are extra precautions you can take to secure a wireless network EXCEPT

enable SSID broadcast

Network Adapters _____.

enable nodes in a network to access the network and to communicate with each other

a key pair is a set of two keys used to

encrypt and decrypt an email message

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

encryption

_____ is the process of encoding data so that only the person with the key can decode and read the message.

encryption

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

In http://example.gov, what is the second-level domain?

example

Which network cable type is virtually immune to signal interference?

fiber-optic

What type of network media is virtually immune to interference?

fiber-optic cable

A category of information about students, such as their phone numbers, would be stored in a(n) ____.

field

In ________ generation languages, problems are presented as a series of facts or constraints instead of as a specific algorithm.

fifth

A(n) ________ server is a server that stores and manages files for network users.

file

In terms of databases, a table is also referred to as a(n) ____.

file

Which of the following is used to create a temporary subset of data that matches certain criteria?

filter

A ________ is named after a housing construction feature that slows the spread of fires from house to house.

firewall

A ________ keeps your computer safe by determining who is trying to access it.

firewall

A(n) ____ is a hardware or software solution that helps protect your network.

firewall

Installing a(n) ________ is the first step in securing your network from unwanted intruders.

firewall

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

firewall

hardware or software for protecting computers from hackers

firewall

software or hardware that prevents unauthorized entry

firewall

A(n) ________ is a group of data packets that are sent together.

frame

holds multiple data packets

frame

data attached to a photo that indicates when/where the photo was taken

geotag

Wireless Access Point (WAP)

gives wireless devices a sending and receiving connection point to the network

A secure website using SSL encryption will have __ followed by ://www.websitename.com as the protocol in its URL

https

communication between two or more people over the Internet in real time

instant messaging

firmware

instructions in read-online memory

All of the following are considered dedicated servers EXCEPT ____

internal servers

the collection of large national and international network used to establish the internet is called the

internet backbone

A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

intranet

As your wirelessly connected device moves further away from the wireless router, what happens to the signal

it decreases

Which of the following statements about using ghosting software is false

it is difficult to use

All of the following are problems with the bus topology EXCEPT ________.

it is more expensive than star topology

HTTPS is different than HTTP because a. of how it transforms or reformats the data b. it is a combination of HTTP and the secure sockets layer c. it extracts data from source databases d. it stores data in the data warehouse

it is. a combination of HTTP and the Secure Sockets Layer (SSL)

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

keystroke loggers/key loggers

A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.

launch a denial of service (DoS) attack on your computer

Fiber-optic cable transmits signals using

light waves

Which of the following is NOT a database component?

list

A peer-to-peer (P2P) network is an example of ____ administration

local

virus that is triggered when a file is opened or program is started a certain number of times

logic bomb

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

In a database, a text field capable of holding complete paragraphs has a ____ data type.

long text

When you evaluate a template to start your website design, you should

look at the fonts and layout of content.

An example of a first-generation language is?

machine language

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

All of the following are top cybercrimes reported to the IC3 EXCEPT

malware fraud

bandwidth

maximum speed at which data can be transmitted

Dynamic addressing

means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet

The physical address assigned each network adapter is called its ________.

media access control (MAC)

In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of the background.

movement of the mouse

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

multipartite

A ________ is a group of two or more computers, or nodes, designed to share information and resources.

network

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

network

Every device you would like to connect to a network, whether wired or wireless must have a(n) __ installed in it

network adapter

For the nodes on a network to communicate with each other and access the network, each node needs a _____

network adapter

The device that breaks data into packets for transmission on a network is the _________.

network adapter

Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.

network administrators

Client/server networks are controlled by a central server that runs specialized software called a(n) ______.

network operating system (NOS)

IPV6 was needed when IPV4 ________.

no longer had enough unique addresses

A process to ensure that data in a database is organzed most efficiently is called

normalization

The type of database that would be best to store and organize video clips and pictures is which of the following?

object-orriented database

NOS software is needed

on all computers in a client/server network

a customer info table linked to an order table in a business database reflects what type of relationship?

one-to-many

Java is considered to be architecture neutral because it

only needs to be compiled once and can run on many different CPUs

Another name for a sniffer is a(n) ________ analyzer.

packet

Bundled data is referred to as a(n) ____.

packet

data broken into a small segment with an address to which it is sent

packet

method for selectively allowing certain requests to access ports

packet filtering

The communications methodology that computers use to transfer data is called __

packet switching

breaks information down into pieces that can take different paths

packet switching

Packet switching is the communication methodology where data is broken into __ that are sent over various routes at the same time

packets

A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.

passive

A(n) ________ network is often the type of network that is set up in a home or very small business.

peer-to-peer

In a ________ network, each node connected to the network communicates directly with every other node.

peer-to-peer

The most common home network is a?

peer-to-peer network (P2P)

Codepen.io lets users share their work in projects named ________

pens

FBI-related scams involve ________.

people pretending to represent official organizations

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming

The most common kind of pretexting in cyberspace is ________.

phishing

Which of these is NOT one of the three features in a loop?

phrase

Pixel is short for?

picture element

Connecting to a wireless network without the owner's permission is known as ________.

piggybacking

To ensure that there are no duplicate records in a database table, you need to establish a ____.

primary key

When using ________-key encryption, only the message sender and recipient have the code.

private

The _____ encryption, only the two parties involved in sending a message have the code to unlock the message

private-key

used to decode an encrypted message

private-key

Before programmers decide which programming language to use or start writing code, they develop a complete description of the task the program needs to accomplish. This is called a ________.

problem statement

_____ is the process of translating a task into a series of commands a computer will use to perform that task.

programming

Web service

programs that a website uses to make information available to other websites

Providing adequate security on a corporate network involves all of the following issues EXCEPT

proprietary software encryption

A ________ is a set of rules for how information and communication are exchanged.

protocol

set of common rules that control communications among network devices

protocol

WEP and WPA are examples of ________.

protocols that use encryption to protect wireless transmissions

Programmers often begin by constructing a working simulation of the program, called a(n) ________.

prototype

server

provides information and resources to other computers on a network

_____ encryption is the most commonly used encryption on the internet

public-key

In ____ encryption, a key pair is created, where one key is for coding and the other is for decoding

public-key (also known as key pair)

PGP

public-key encryption apckage

The Q in SQL stands for Structured ________ Language.

query

Which device might you use to improve your Wi-Fi signal without using a cable to connect to the router

range extender

Which of the following is a method of inputting data into transaction processing system while the transaction is taking place?

real-time processing

At a minimum, all data packets must contain the __

recipient's address, sender's address, reassembling instructions, and data

A group of related fields is called a ____.

record

The information about a single student would be stored in a ____.

record

The duplication of data in a database is called data _____.

redundancy

programs that allow hackers to gain access to your computer without your knowledge

rootkit

On client/server networks, bridges

route data between two collision domains on a single network

A ________ sends data between two networks.

router

A navigation device that transfers packets of data between two or more networks is called a ______.

router

A(n) ____ is used to send data between a home network and the Internet

router

A(n) ________ can often be equipped to act as a hardware firewall.

router

An example of a network navigation device is a __________.

router

To transfer data packets between two or more networks, a ____ is used.

router

device that sends information between two networks

router

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

A(n) ________ virus is a series of commands that is executed without your knowledge.

script

unique domain within another domain

second-level domain

To keep current with fixes to problems, technicians should do all of the following except

seek advanced degrees

SMTP is the set of rules used to a. send e-mail along the internet to its destination b. shrink the amount of space it takes to store e-mail c. encrypt e-mail messages d. make shopping on the internet more available

send e-mail along the Internet to its destination

SMTP is the set of rules used to

send emails along the internet to its destination

CGI scripts are known as ________ programs because these programs run on a web server.

server-side

HAN

services a residence

Which of the following is an advantage of installing a client/server network in a business?

sharing of peripherals

Which of the following is not a report in Squarespace website analytics?

social media likes

Online Analytical Processing (OLAP)

software that provides standardized tools for viewing and manipulating data in a data warehouse

A(n) ________ can help block unwanted, unsolicited e-mail.

spam filter

All of the following are navigation devices to move data around or between networks EXCEPT ________.

spans

sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data

spear phishing

transmits information about you, such as your Internet-surfing habits

spyware

Sites like _______ allow you to make high quality websites without any coding.

squarespace

________ is a website that helps you design elegant websites for free.

squarespace

Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.

star

In the ________ topology, all network devices are connected together through a central switch.

star

An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.

static

When a(n) ________ address is assigned to a computer, its IP address will not change.

static

An IP address that does not change and is usually assigned manually by a network administrator is called a __

static address

IP address for a computer does not change

static addressing

A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

stealth

A(n) ________ protects a computer against power surges.

surge protector

All of the following are network topologies EXCEPT ________.

switch

If your router does not have enough wired ports to add more devices, you can install a ________ to add extra ports to your network.

switch

On a network, a(n) ____ helps prevent data packets from colliding with each other

switch

The device that receives data packets and sends them to the intended node on the same network is a(n) _____

switch

makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node

switch

_____ transmit signals only to the devices that need to receive them.

switches

The following are common to all programming languages:

syntax, keywords, and operators

A group fo related records is called a(n) ____.

table

What is the Access object that organizes data into fields and records?

table

The two types of objects responsible for collecting data in Access are ________.

tables and forms

<b> is an example of an HTML ________.

tag

<i> is an example of an HTML ________.

tag

HTML uses _____ to provide a browser instructions on how to display and format the document.

tags

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

The final step in the PDLC is ________.

testing and documentation

throughput

the actual speed of data transfer that is achieved on a network

Artificial Intelligence

the branch of computer science that deal with the attempt to create computers that think like humans

The information in a data packet includes a. that data and the destination b. the data and circuit identifier c. just the data d. different types of information depending on the type of message being sent

the data and the destination

the information in a data packet includes

the data and the destination

what if the IPS's web server cannot locate the IP information on the default DNS server

the default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listing for an entire top level domain

The actual (speed of) data transfer rate is called ____.

throughput

__ are single visualizations found in a Power BI reported or dashboard

tiles

A ________ is a virus that is triggered on a certain date.

time bomb

virus that is triggered by the passage of time or on a certain date

time bomb

A private key is important a. to reboot the system hardware b. to reset your public key if you lose a password c. to decode an encrypted message d. because it enables you to use MIME

to decode an encrypted message

a private key is important

to decode an encrypted message

The physical arrangement of computers, peripherals, and media used to create a network is called network ________.

topology

The physical or logical arrangements of computers, transmission media (cables), and other network components is known as network

topology

The system that data takes to flow between devices on a network is called _________.

transmission media

a query is used to extract a subset of data from a database

true

A very cost effective wired media for an environment with little to no interference is

twisted pair cable

__ is the most cost-effective wired transmission media

twisted pair cable

The most cost effective wired media is ____________.

twisted-pair cable

Most home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

How to see what network adapters are installed in your computer?

use Device Manager utility

You do not need to know how to program to

use Microsoft Word to type text and select various fonts

Rules for creating passwords include all of the following EXCEPT ________.

use a dictionary to find a lengthy word that is easy to remember

When creating a client side web page, you will often

use all three (HTML, CSS, and JavaScript)

PAN

used to communicate among devices near an individual

Input forms

used to control how new data is entered into a shared database

Join Line

used to create a relationship between two tables

Another name for bots is ________.

web robots

Paper Mills

websites that sell prewritten or custom written research papers to students

whens it sufficient to use a list to organize data?

when the data is simple and can be organized in one table

attempts to travel between systems through network connections to spread an infection

worm

Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.

writing computer manuals

A benefit of creating your own reports rather than relying entirely on Natural Language Queries and Quick Insights is __

you know your data and business climate better than artificial intelligence can

You can add images to a Squarespace site from the Getty Images service if

you purchase the images from Getty.


Conjuntos de estudio relacionados

Chapter 4: The Nursing Process in Drug Therapy

View Set

National 2 Quiz (Property & Government Rights)

View Set

Praxis II Social Studies Content Knowledge test (5081) Master Set

View Set

5.6 Standard Enthalpies of Formation

View Set

Ch.10 Marketing Channels Delivering Customer Value

View Set