computer stuff
What networking organizations set the standards for network communication? A) IETF B) ITU-T C) CODASYL D) all of these answers are correct
D) all of these answers are correct
What is a computer server? A) A centralized computer system which provides services over a network B) A computer system that stores a data warehouse C) A secure facility to store sensitive data D) The physical casing for a large computer system
A) A centralized computer system which provides services over a network
A field in a database table whose values are the same as the primary key of another table is called: A) A foreign key B) A primary key C) A secondary key D) A candidate key
A) A foreign key
What type of hardware device is a WiFi card? A) A network interface card to establish a wireless connection B) A port on a computer to plug in a WiFi cable C) A device that encrypts a signal before it is transmitted over a WiFi connection D) A special card that gives you free access to WiFi hotspots
A) A network interface card to establish a wireless connection
_____ is a field in a database table (or a combination of fields) that has a unique value. A) A primary key B) A foreign key C) A secondary key D) An identifier
A) A primary key
What is a search engine? A) A program that enables users to locate specific websites of information on the Internet based on keywords B) A tool that navigates the Web by following hyperlinks for the purpose of indexing content and storing Web pages C) Part of the HTML code of a Web page that provides information to Web browsers D) A computer connected directly to the Internet which stores information
A) A program that enables users to locate specific websites of information on the Internet based on keywords
How does the use of a router differ from a bridge in telecommunication? A) A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic. B) Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network. C) A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level. D) A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports
A) A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
What is a firewall? A) A security system consisting of software or hardware between an internal network and the Internet B) A physical enclosure of a data storage system to keep it safe from fire, water and other elements C) Software that encrypts data before it leaves an internal network D) A backup system for a database so it can be recovered if the original is destroyed
A) A security system consisting of software or hardware between an internal network and the Internet
Which of the following statements regarding computer servers is false? A) A single computer server is sufficient for all types of networks. B) A computer server is a computer system that provides services over a network. C) Computer servers can consume a lot of energy and are therefore often stored in a dedicated, cooled room. D) Regular desktop computers can be configured to operate as a server, but many servers consist of specialized hardware
A) A single computer server is sufficient for all types of networks.
Which of the following about XHTML is FALSE? A) it entails XML syntax B) it is similar to HTML C) it is not case sensitive D) it works well with database and workflow applications
C) it is not case sensitive
What is a computer virus? A) A type of malware that replicates itself into computer programs and performs some type of harmful activity. B) A type of malware that provides unauthorized access to someone computer system. C) Software that logs a user's keystrokes on a keyboard in order to get access to their passwords. D) Software that keeps track of someone's online activities without their knowledge.
A) A type of malware that replicates itself into computer programs and performs some type of harmful activity.
Which of the following tasks is a typical role of a database administrator? A) All are typical tasks. B) Managing data recovery and backup procedures C) Controlling data security D) Controlling access to the database
A) All are typical tasks.
A relationship between two or more tables is also known as: A) An association B) An attribute C) A key D) A link
A) An association
_____ refers to how many records in a table are related to the number of records in another table. A) Cardinality B) Linking C) Keying D) Association
A) Cardinality
Which of the following technologies use microwaves? A) Cellular B) Infrared C) None of these use microwaves D) FM Radio
A) Cellular
_____ operators are used to compare values, while _____ operators make it possible to combine two or more conditions in a single statement. A) Comparison; boolean B) Arithmetic; comparison C) Arithmetic; boolean D) Boolean; comparison
A) Comparison; boolean
The database administrator has already set permissions for several people to use the system. Three of the users need to be able to use the database at the same time. What function does the administrator need to set? A) Concurrency B) User permissions C) Backup and recovery D) Security
A) Concurrency
In securing information and information systems, an organization can implement an SMS-based password authentication protocol in an addition to the username/password combination requirement for system access. Which aspect of information security is addressed by the additional layer of security? A) Confidentiality B) Availability C) Integrity D) None
A) Confidentiality
Which of the following is not a typical application of Bluetooth wireless communication? A) Connecting several devices to the wireless Internet. B) Hands-free calling by connecting a mobile phone to a car's stereo system C) Wireless connection between a computer and peripheral devices (e.g mouse, keyboard, camera, printer) D) Wireless headset for a mobile phone
A) Connecting several devices to the wireless Internet.
What is a loop? A) Cycling through a set of instructions until a condition is met B) Data that changes over time C) Putting information into the computer and generating an output display D) Controlled calculations
A) Cycling through a set of instructions until a condition is met
What is the primary advantage of using a distributed database? A) Data access and processing are much faster. B) Multiple users can use the same database at the same time. C) Data management is much simpler. D) Storage capacity needs are reduced.
A) Data access and processing are much faster.
Which of the following statements is false with respect to distributed databases? A) Data at any site are only available to users at those sites. B) Multiple computer network sites are connected by a communication system. C) Data at each site are under control of the DBMS. D) Users may not be aware that they are using a distributed database.
A) Data at any site are only available to users at those sites.
What does the acronym DBA stand for in the context of information systems? A) Database administrator B) Database business address C) Doing business as D) Database administration
A) Database administrator
What type of standards are built by the officials and network professionals in organizations? A) Formal standards B) De facto standards C) Specifications D) Guideline standards E) TCP/IP standards
A) Formal standards
Which of the following devices can be used to interface computer networks that use different communication protocols? A) Gateway B) Repeater C) Router D) Hub
A) Gateway
A single Wi-Fi Access Point can cover a geographic area as large as a(n) _____. A) House B) Metropolitan area C) College campus D) Apartment building
A) House
Which of the following wireless communication technologies does not travel through walls and needs line-of-sight to communicate? A) Infrared B) Ultra-wide band C) Bluetooth D) Zigbee
A) Infrared
Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi? A) Integrated Wi-Fi B) Hotspot C) Access Point D) Wireless card
A) Integrated Wi-Fi
What does federal law 18 U.S.C. Section 1030 do in respect to cybercrime? A) It criminalizes conduct which attacks computer systems. B) It requires a background check for those working on federal computers. C) None of the responses are correct. D) It requires a civil penalty for cybercrime.
A) It criminalizes conduct which attacks computer systems.
Which of the following is NOT true of a data warehouse? A) It is one large database that is stored in a large building. B) It is a collection of databases that work together. C) It provides a way for businesses to understand data from multiple databases. D) It provides storage of data.
A) It is one large database that is stored in a large building.
Which of the following programming languages makes a website more interactive and dynamic? A) JavaScript B) CSS C) XML D) HTML
A) JavaScript
Which of the following is NOT a strategy to improve network security? A) Keeping cables organized B) Creating automatic backup procedures C) Running anti-virus software D) Installing a firewall
A) Keeping cables organized
Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provides _____. A) Lower cost and longer battery life B) Lower cost C) Longer range and lower cost D) Longer battery life
A) Lower cost and longer battery life
A database of auto parts has two tables. The first table includes all the different parts. The second table includes all the different types of vehicles. Some parts can be used in more than one vehicle, while all vehicles consist of more than one part. This describes which type of table association? A) Many-to-many B) Many-to-one C) One-to-many D) All-to-many
A) Many-to-many
What type of coverage does Wi-Fi provide? A) Medium range wireless communication B) Broadband wired communication C) Small range wired communication D) Medium range wired communication
A) Medium range wireless communication
Which of the following is a feature of 5G? A) Multiple device support B) Dead zones C) Satellite uplink D) Latency
A) Multiple device support
Which of the following wireless communication technologies has the shortest range? A) Near Field Communication B) Bluetooth C) Zigbee D) WiFi
A) Near Field Communication
You need to work with someone who can monitor the performance of a network, address problems before they can have a serious impact, update software without needing to update individual computers and help with maintaining compliance with software licensing. Who would you need to work with? A) Network Administrator B) Manager C) Software Administrator D) IT Specialist
A) Network Administrator
How do signals travel between a GPS satellite and an on-the-ground GPS receiver? A) Only from the satellite to the receiver B) From the satellite to the receiver and back, but through a ground station C) From the satellite to a ground station and then from the ground station to the receiver D) From the satellite to the receiver and back
A) Only from the satellite to the receiver
Which layer provides the physical connection between the computer and network? A) Physical layer B) Network layer C) Transport layer D) Session layer E) Application layer
A) Physical layer
Which of the following is NOT a potential advantage of a database management system (DBMS)? A) Reduces data storage needs B) Increases security and reliability due to a limited number of managers C) Allows multiple users to access the same data simultaneously D) Reduces multiple versions of the same data
A) Reduces data storage needs
_____ are important because they make it possible for hardware and software produced by different companies to easily share information and work together. A) Standards B) Specifications C) Suggestions D) Guidelines
A) Standards
Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports? A) Switch B) Router C) Hub D) Gateway
A) Switch
The _____ is the most well-known and important protocol suite. A) TCP/IP B) None of the above C) ISO D) IEEE
A) TCP/IP
Which of the following industry bodies is responsible for the development of the Open System Interconnection (OSI) reference model? A) The International Organization for Standardization (ISO) B) The American National Standards Institute (ANSI) C) The Internet Engineering Task Force (IETF) D) The Institute of Electrical and Electronics Engineers (IEEE)
A) The International Organization for Standardization (ISO)
How is output from a program characterized? A) The end result of the program B) The processing of data C) Saving data to a file D) Entering information into a program
A) The end result of the program
What is data encryption? A) The process of encoding messages so it can only be viewed by authorized individuals B) Translating a message into a language nobody else can understand C) Copying data onto an external drive and locking this into a safe D) Breaking up a database into many pieces before sending it across the Internet so nobody can see the entire
A) The process of encoding messages so it can only be viewed by authorized individuals
Why are conditional statements important? A) They control a program loop by stopping it at specified predetermined event. B) They monitor the input. C) They receive data from a computer calculation. D) They deliver the output.
A) They control a program loop by stopping it at specified predetermined event.
If you owned a business, how might you use data mining? A) To find patterns in large amounts of data B) Use basic summaries of information to get a general idea of customer habits C) Analyze a small sampling of data in order to make predictions D) You can only use data mining with credit card customers
A) To find patterns in large amounts of data
Which of the following products uses a robot? A) VGo Telepresence application B) Microsoft Sharepoint C) WebEx D) Microsoft NetMeeting
A) VGo Telepresence application
Company employees can see people in other countries as life sized figures on which media? A) Video Conference B) Voice Over Internet Protocol C) Virtual Reality D) Telepresence
A) Video Conference
How does a loop know when to stop? A) When a predetermined condition is met B) It stops when it reaches the last line of the program C) After 100 runs D) It stops after the first trial run
A) When a predetermined condition is met
Which of the following is NOT a network operating system? A) Windows 8 B) Windows Server C) Linux
A) Windows 8
How did cybercrime initially start? A) With criminals hacking into high-level security networks. B) With criminals engaging in identity theft. C) With criminals engaging in software piracy. D) None of the responses are correct.
A) With criminals hacking into high-level security networks.
The term modem is short for _____. A) modulator-demodulator B) mode demonstration C) modern demodulation D) modulation-demolition
A) modulator-demodulator
Which method has had the fastest growth in recent years? A) a collaborative immersion site B) telepresence C) video conferencing D) voice over internet protocol
C) video conferencing
Gia is designing a website for her floral business and wants to incorporate the same color scheme, background, and styles throughout the site. which language BEST suits Gia's particular web design needs? A) HTML B) CSS C) XML D) JavaScript
B) CSS
Which of the following is NOT one of the seven layers of the OSI Model? A) Physical layer B) Domain layer C) Network layer D) Transport layer
B) Domain layer
ZYX marketing has been hired to provide branding services for XLS Corporation. XLS allows ZYX to use their _____ to access important information about their company. A) Intranet B) Extranet C) Wide Area Network D) Virtual Private Network
B) Extranet
Which programming tool was developed in 1993 and became the standard for the Internet? A) JavaScript B) HTML C) CSS D) XML
B) HTML
How many servers does a typical client/server network have? A) As many as there are clients. B) One for every three clients. C) One or more. D) 6, maximum.
B) One for every three clients.
Where is a multi-user database typically located? A) A laptop computer which is used by multiple users B) A central computer server C) A desktop computer of one of the employees D) A USB flash drive that is passed around the office
B) A central computer server
Which of the following is an example of a cybercrime? A) Network intrusions B) All of the responses are correct. C) Identity theft D) Software piracy
B) All of the responses are correct.
What are the three fundamental elements of a database management system? A) Texts, numbers and multimedia B) Physical database, database engine and database schema C) Records, fields and tables D) Data entry, data storage and data analysis
B) Physical database, database engine and database schema
Ransomware is a malicious program that can encrypt intercepted data. The attacker controlling the software can demand a ransom before allowing the data to be decrypted, rendering it useless until the price is paid. Which of the following is TRUE about ransomware? A)Defining a password security policy will prevent system infection with ransomware. B) Ransomware is a type of malware. C) Using a VPN to exchange information prevents it from being encrypted, making ransomware attacks impossible. D) Up-to-date antivirus software will effectively prevent all possible ransomware attacks.
B) Ransomware is a type of malware.
Which of the following is NOT a basic component of a telecommunication network? A) Telecommunication channels B) Remote control unit C) Protocols D) Input and output devices
B) Remote control unit
What do state laws regarding cybercrime generally pertain to? A) None of the responses are correct. B) Trespass to a computer C) Harassment D) Bullying
B) Trespass to a computer
What is(are) the principal difference(s) between a smartphone and a tablet? a) screen size b) ability to make and receive calls over the cellular network c) use of touchscreen technology d) processing speed A) a and b B) a only C) c only D) a, b, c and d
B) a only
All of the following are advantages of "telepresence" EXCEPT A) participants may feel as if they are in the same room with each other B) it is cost effective C) information can be exchanged electronically D) the technology is advanced
B) it is cost effective
Which of the following is NOT an advantage of social media for businesses? A) it helps connect businesses with existing and potential customers B) it's private C) it's easy and convenient D) it lowers costs
B) it's private
What is the significance of Facebook having 850 million users, Twitter having 100 million users, and LinkedIn having 175 million users? A) people are not looking to connect to others B) people are actively using social media platforms personally and professionally C) people aren't reading newspapers anymore D) people don't like blogging
B) people are actively using social media platforms personally and professionally
Facebook does NOT enable businesses to ____. A) post status updates B) store inventory in Facebook warehouses C) advertise products and service D) promote specials and sales
B) store inventory in Facebook warehouses
The bandwidth of a computer network refers to _____. A) the thickness of the cables connecting the computers in a network B) the amount of data that can be transferred over a network per second C) the storage capacity of each computer in the network D) the type of cables and ports being used to connect the computers in a network E) the ability of a network to automatically back up data files
B) the amount of data that can be transferred over a network per second
Many businesses today have changed their approach to marketing in all of the following ways EXCEPT: A) they used LinkedIn B) they rely on employees to drive sales C) they build social capital D) they use Facebook and Twitter
B) they rely on employees to drive sales
Which of the following does not represent a typical scenario with respect to the use of a database by a hospital ? A) Allows multiple users to access the same data simultaneously B) Reduces multiple versions of the same data C) Reduces data storage needs D) Provides automated methods to create, store and retrieve data
C) Reduces data storage needs
A URL consists of different levels. What level is .com in the web address www.google.com A) Domain name B) Host name C) Top-level domain name D) Very high level domain
C) Top-level domain name
Which of the following is NOT a difference between regular mobile phones and satellite phones? A) Type and size of the antenna B) Cost of hardware and service C) Two-way wireless communication D) Number of service providers
C) Two-way wireless communication
Which of the following is a Boolean logic operator? A) IF B) ADD C) AND D) BUT
C) AND
Which of the following is NOT an Internet technology that enables the use of intranets and extranets? A) Hypertext Markup Language (HTML) B) Web pages C) Blogs D) Transmission Control Protocol/Internet Protocol (TCP/IP)
C) Blogs
Which of the following terms refers to defining the rules for communication between two computers to prevent overload? A) Standards B) Protocols C) Flow Control D) OSI Model E) Network Architecture
C) Flow Control
What is the approximate distance between devices when establishing a connection using short-range wireless communication? A) From a few centimeters to several meter B) From a few centimeters to approximately 1 kilometer C) From a few centimeters to several meter D) 3 to 5 meters E) 1 to 100 meters
C) From a few centimeters to several meter
Ben is a remote employee for a web-based company. He just submitted in writing his information about a new accounting ruling to his team with a note telling everyone to read it. What kind of software is he using? A) Voice Over Internet Protocol B) Social Media C) Groupware D) Telepresence
C) Groupware
Which of the following is the most accurate description of clients in a client/server architecture? A) All devices connected to a network. B) Computers connected to a network used for downloading data from a server C) Hardware devices which provide end users with access to data and services on the server. D) Desktop computers with a wired connection, and laptop computers with a wireless connection.
C) Hardware devices which provide end users with access to data and services on the server.
Each computer or device connected to the Internet has a unique identifying number. What is this called? A) ISP Address B) Telephone Number C)IP Address D) DNS Number E) Web Page
C) IP Address
In what way is a peer-to-peer network different from client/server networks? A) In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, only one client requests resources or services from the network. B) In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, a number of network clients or workstations request resources or services from the network. C) In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network. D) In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network,
C) In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
Which of the following problems would the OSI Model solve? A) It would provide direction for how to build a server. B) It would instruct developers what software still needs to be created. C) It would allow a Mac and a PC to be used on the same network. D) It would allow multiple software programs on the same computer to communicate with each other.
C) It would allow a Mac and a PC to be used on the same network.
What is the benefit of a multi-platform network as compared to a single platform? A) Multi-platform allows different devices with different OS to connect to the same network, whereas single platform doesn't allow different OS to connect at the same time. B) Multi-platform can run different network OS at the same time, whereas single platform can only run one network at a time. C) Multi-platform allows different devices with different OS to connect to the same network, whereas single platform doesn't allow different OS to connect at the same time. D) Multi-platform allows different devices to connect, but only if they use the same OS and hardware, whereas single platform only allows different OS to connect to the network , Not Selected Multi-platform doesn't have a benefit. It's all personal preference. Both multi and single platform work the s
C) Multi-platform allows different devices with different OS to connect to the same network, whereas single platform doesn't allow different OS to connect at the same time.
How do signals travel between a GPS satellite and an on-the-ground GPS receiver? A) From the satellite to a ground station and then from the ground station to the receiver B) Only from the receiver to the satellite C) Only from the satellite to the receiver D) From the satellite to a ground station and then from the ground station to the receiver E) From the satellite to the receiver and back, but through a ground station
C) Only from the satellite to the receiver
Which of the following is false about packets? A) Packets are small bundles of data B) Packets contain headers and footers of information C) Packets contain only headers of information D) Packets travel in multiple paths in order to reach their destination faster E) Packets are arranged back together based on instructions and protocol
C) Packets contain only headers of information
What does the acronym P2P stand for in the context of computer network architecture? A) People-to-people B) Person-to-person C) Peer-to-peer D) Private-to-public
C) Peer-to-peer
In the context of wireless computing devices, the term PDA stands for _____ _____ _____ ? A) Personal Digital Aid B) Progressive Device Analog C) Personal Digital Assistant D) Progressive Digital Analog
C) Personal Digital Assistant
Which of the following is true about TCP/IP or Transmission Control Protocol/Internet Protocol? A) TCP/IP is responsible for looking up for IP addresses B) TCP/IP is a protocol just recently developed for wireless devices C) TCP/IP is only used to print information from your computer D) TCP/IP is a communication protocol that enables you to send and receive information over the internet E) TCP/IP is not used very often and could be
D) TCP/IP is a communication protocol that enables you to send and receive information over the internet
Choose the correct set of words to fill in the blanks; ____ are used to describe ____ for displaying text, graphics, and user inputs in an HTML document A) Brackets; browsers B) Codes; terms C) Parentheses; coding D) Tags; instructions
D) Tags; instructions
A _____ attack is a cyber attack where the attacker tries guessing system access credentials like passwords by trying different character combinations until a correct combination is identified. A) Phishing B) Man-in-the-Middle C) Malware D) Brute force
D) Brute force
What is NOT true about a computer network? A) The storage capacity on a network is increased. B) All computers in a network can be identified. C) Files can be shared. D) Connections between computers can only be done through wires. E) It can support different applications.
D) Connections between computers can only be done through wires.
Which organization created the suggested standard for communications that describes how data is sent and received over a network? A) Federal Communications Commission (FCC) B) World Wide Web Consortium (W3C) C) American Communication Consortium (ACC) D) International Organization for Standardization (ISO)
D) International Organization for Standardization (ISO)
What does cybercrime consist of? A) None of the above responses are correct. B) It consists of illegal activity achieved by utilizing a gun. C) It consists of illegal activity achieved by use of violence. D) It consists of illegal activity by means of utilizing a computer to achieve the desired criminal results.
D) It consists of illegal activity by means of utilizing a computer to achieve the desired criminal results.
On the staff of Kumquat Computing, Inc. - Jared's main task is to protect the confidentiality of a customer database that's kept on a LAN in the lobby and waiting rooms. -Tyrone's main task is to protect the confidentiality of client files that are stored in the cloud. Which is true of Jared's and Tyrone's main tasks? A) Both Jared and Tyrone are doing information security and cybersecurity. B) Jared is doing information security only. Tyrone is doing cybersecurity only. C) Both Jared and Tyrone are doing information security. Neither of them is doing cybersecurity. D) Jared is doing information security. Tyrone is doing both information security and cybersecurity.
D) Jared is doing information security. Tyrone is doing both information security and cybersecurity.
Big Business, Inc. needs a computer system to handle a large amount of data. Price is not an issue but they need all of the data secured at one location. What type of system do they need? A) Peer-to-peer B) Laptop C) Client server D) Mainframe E) Desktop computer
D) Mainframe
What are the three general types of computer network architecture? A) Peer-to-peer, client/host, and mainframe. B) Point-to-point, client/server, and supercomputer. C) Point-to-point, client/host, and mainframe. D) Peer-to-peer, client/server, and mainframe.
D) Peer-to-peer, client/server, and mainframe.
Which of the following search engine components consists of the interface in which a word or phrase is entered into a text box and then the submit button is clicked to perform a search? A) Robot B) Server C) Database D) Search Form
D) Search Form
A device that you can use to make and receive calls using a wireless connection and also contain some of the functionality of a computer is called a _____. A) Cellular phone B) Tablet C) Handheld computer D) Smartphone
D) Smartphone
Annabelle, the CEO of Kumquat Computing, Inc., emails her vice president, Roland, to discuss an upcoming merger. Evelyn intercepts the email and changes the content of the message, altering the proposed terms of the merger, before Roland sees it. Which of these is true? A) This describes a Man-in-the-Middle attack. Roland will probably realize that that the email was tampered with. B) This describes a Phishing attack. Roland will probably realize that the email was tampered with. C) This describes a Phishing attack. Roland will probably NOT realize the email was tampered with. D) This describes a Man-in-the-Middle attack. Roland will probably NOT realize that the email was tampered with
D) This describes a Man-in-the-Middle attack. Roland will probably NOT realize that the email was tampered with
A web address is often referred to as a URL. URL stands for which of the following? A) Unknown Reference Locator B) Uniform Regulatory Location C) Unknown Record Legitimacy D) Uniform Resource Locator
D) Uniform Resource Locator
Which of the following is NOT an example of a telecommunications system? A) Cellular telephone networks B) Radio broadcasting system C) Computer networks D) a letter written on paper and sent through the mail
D) a letter written on paper and sent through the mail
What is the main benefit of using chat applications? A) it allows you to read people's opinions on various topics B) it allows you to instantly talk with coworkers about real-time issues C)it allows you to post and see pictures of your friends D) it provides you with the news from a variety of media outlets E) it provides a forum for short messages, including videos, photos and documents
E) it provides a forum for short messages, including videos, photos and documents