IT final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is used to insert a line break?

<br />

To create separate paragraphs, the content for each paragraph must exist within its own _____.

<p> ... </p>

Which of the following is true about copyrights?

A composer automatically has copyrights to any piece of music he or she writes.

An example of a record in a database is:

All of the data about one specific thing, such as an individual employee.

The ____ Act regulates how Web sites can collect information from minors and communicate with them.

Children's Online Privacy Protection

__________ software can be used for asset tracking, inventory control, order entry, resource scheduling, and video collections.

Database

With the B2B business model, consumers sell directly to other consumers, such as via an online auction site.

FALSE

Netiquette refers to:

Informal rules of behavior for the Internet.

Structured Query Language is the name of a(n):

Language used for information retrieval in relational databases.

Which of the following is a free, open source scripting language?

PHP

A field whose value uniquely identifies each record in a table is called a(n):

Primary key.

A recipient uses which of the following to read an encrypted message?

Private key

One way to reduce the occurrence of carpal tunnel syndrome it to:

Take frequent breaks when you are working at a keyboard.

A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformats a hard disk.

Trojan horse

A(n) ______ is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

Web filter

A ___________ is the person responsible for designing, developing and maintaining a website.

Webmaster

Which of the following is not a logic error?

You type ADN where you should have typed AND.

_____________ is the use of the internet and other electronic technologies through which business communicates and negotiates with customers.

e-commerce

To keep a message from being understood by anyone who intercepts it, you should:

encrypt it

____________ hardware is hardware that can change its architecture and behavior dynamically by autonomously interacting with its environment.

evolvable

If an <img> element does not include height and width attributes, then the ToolTip will be empty when the user moves the mouse over the image.

false

Longer passwords provide less security than shorter ones.

false

A column in a database in which customer names are stored would be referred to as a

field

Which of the following is not related to intellectual property rights?

gelmark

A (n) ______ translates and executes one statement at a time.

interpreter

An if-then-else statement uses which type of control structure?

selection

When programmers violate the rules of a programming language, ____ errors result.

syntax

Using someone else's identity to purchase goods or services or perform other transactions is called identity theft.

true

Virtualization is the practice of sharing or pooling computer resources, such as servers and storage devices.

true


Conjuntos de estudio relacionados

Chapter 37 Hematological Disorders

View Set

Marketing Management - Iacobucci - Ch 9

View Set

Chapter 4 - Development of dominant-minority group relations in pre-industrial America

View Set

Ch. 5: Planning the Foundation of Successful Management

View Set

ACT 5. Romeo and Juliet All Study Guide Questions and Answers

View Set

Lesson 18 - Psychedelic Trends in the Late 1960s

View Set