BCIS 5-13
Which of the following is not an example of a factor used in multi-factor authentication?
A password
What option automatically deletes records in related tables that match the primary key?
Cascade Delete Related Records
Which of the following is not a type of UTP cable you would use in a wired Ethernet network?
Cat 7B
Match each of the following terms to its definition:
Circuit Switching: a dedicated connection is formed between two communication parties PGP: public-key package Handshaking: exchange control packets between computers Packet switching: breaks info down into pieces that can take different paths ICANN: allocates IP addresses
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
Circuit switching
Which of the following is not a common network topology?
Cluster
________ is the standard communications protocol used on most client/server networks.
Ethernet
Every keystroke and every mouse click creates an action, or ________, in the respective device.
Event
Mobile hotspots let you tether only one device to the Internet at one time.
False
Most instant messaging services provide a high level of encryption for their messages.
False
Most wired home networks use Cat 7 cable.
False
Multi-factor authentication requires three of four possible authentication factors.
False
Multi-factor authentication requires three of four possible factors be demonstrated before authorization is granted.
False
Naming a table carefully is very important because it is the only way to describe what data that table contains.
False
One function of a communication server is to process and deliver incoming and outgoing e-mail.
False
Patents last for a period of 30 years from the date the patent is filed.
False
The control unit is one component of the ________.
CPU
Which of the following is not a major factor to consider when selecting network cabling?
Cable diameter
Peer-to-peer networks are considered centralized networks.
False
Text you add to the criteria row in a query is case sensitive, so be careful or you may get unexpected results.
False
The AND operator will give you the most results in a query.
False
The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
False
The information in a data mart spans an entire enterprise.
False
The terms deep web and dark web can be used interchangeably.
False
The use of field headings without row references in a structured formula is called a qualified reference.
False
UTP cable has foil shielding.
False
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
False
WEP is a stronger form of security than WPA.
False
When connecting to the Internet, the acronym POP stands for Post Office Protocol.
False
When using Access, the text of the Declaration of Independence would be stored in a short text field.
False
When your computer runs out of RAM, the operating system borrows space from the CPU.
False
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
False
XML technologies allow web pages to change after they have been loaded.
False
You always know when you are using a database.
False
You can only sort records by one field.
False
You should use the same password for each system or website you need to access.
False
YouTube is the entity legally responsible for its content, rather than the person who uploaded the content.
False
"lastName" is an example of ________.
Camel case
Which of the following is not a characteristic of a table?
Can contain multiple ranges
In Microsoft Access, when you have the field name FirstName display as First Name, you are changing what field property?
Caption
Which of the following organizations research new Internet technologies to improve its capabilities?
Internet Engineering Task Force
Which of the following is not a common network architecture type?
Intraoffice area network (IAN)
What is not true about the Compact and Repair Database utility?
It can be set up to run automatically when a database is closed.
Which is not a reason someone might risk violating a copyright?
It is hard to prove the copyright in court.
Which of the following is not true about machine learning?
It is the opposite of Natural language processing.
All of the following are terms related to part of the boot process except ________.
JSON
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
Jam
Which table style option is useful to display aggregated data when it is checked?
Last Column
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
File ________ provides an organizational structure to the files and folders on your storage device.
Management
A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250.
Range
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
Referential integrity
Which field property dictates whether the completeness check will trigger an error?
Required
Match each of the following terms to its definition:
Resolution: number of data points used to capture an image. Digital: data encoded as zeros and ones Analog: continuous sound of light waves CCD: electronic sensor used in digital cameras Codec: a rule that squeezes audio and video info into less space
A ________ sends information between two networks.
Router
Match each of the following TCP/IP suite protocols to its definition:
SMTP: used for transmission of e-mail messages across the Internet DHCP: protocol that assigns dynamic IP addresses HTTP: Tranfers data from servers to browsers TCP: prepares data for transmission providing for error checking and resending lost data IP: sends data between computers on the Internet
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Sampling rate
Match each of the following terms to its definition:
Server: provides information and resources to other computers on a network Client: computer on which users accomplish specific tasks and make specific requests Network: two or more computers connected together so they can communicate Piggybacking: unauthorized connection to a wireless network Node: a computer, peripheral, or communication device on a network
Which chart type is a visual "dashboard" of your data?
Sparkline
Which of the following does not influence a CPU's processing power?
Speed of the motherboard
________ is a program that gathers information about your surfing habits without your knowledge.
Spyware
Which of the following is the most commonly used client/server network topology?
Star
Which of the following fields is a likely primary key in a student information record?
Student ID Number
Match each of the following terms to its definition:
Switch: makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node Firewall: software or hardware that prevents unauthorized entry to a network Router: device that sends info between two networks Bridge: sends data between different collision domains on a single network Packet: data broken into a small segment with an address to which it is sent
The main suite of protocols used for transmitting data on the Internet is ________.
TCP/IP
Which of the following is not a conditional formatting option?
Table format
What does the Digital Living Network Alliance standardize?
The convergence of devices.
When you have frozen rows and columns, what happens when you press the Ctrl+Home combination?
The first unfrozen cell becomes the active cell
How long do current U.S. laws grant copyright protection?
The life of the author (creator) plus 70 years
A primary key can be a combination of several fields.
True
A switch acts like a traffic signal on a network.
True
A system restore point is a snapshot of your entire computer system's settings.
True
A virus signature is a portion of virus code that is unique to a particular computer virus.
True
A worm does not require human interaction to spread to other computers.
True
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
True
An application server acts as a repository for application software.
True
Cloud service providers often host file servers for customers.
True
Computer forensics is used to collect evidence for use in courtrooms.
True
Creating a database from a template can help you get started more quickly.
True
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
True
Each of the four numbers in a dotted decimal number is referred to as an octet.
True
Each root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.
True
FTP enables files to be downloaded or uploaded between computers.
True
Facts cannot be copyrighted.
True
In an Access database, a filter is limited to extracting data from a single table.
True
In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record.
True
Network attached storage devices can be set up to automatically backup data on a computer and save it on the network attached storage device.
True
NoSQL databases are good for unstructured data.
True
One advantage of establishing relationships between tables is so you can combine fields from more than one table in a query or report.
True
P2P networks are most commonly used in home networks.
True
P2P networks become difficult to administer when they have large numbers of users.
True
Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.
True
Real-time processing means that transactions are updated when they occur.
True
Rows and/or columns which have been deleted in a data table can be brought back with the Undo command.
True
TCP uses a three-way handshake to establish a connection.
True
The Cascade Update Related Fields checkbox is irrelevant if the primary key has an AutoNumber field type.
True
The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.
True
The OpenPgP encryption protocol stands for Open Pretty Good Privacy.
True
The dark web is a well-concealed part of the deep web.
True
The downside of using a wireless range extender over an access point is that it shares the wireless connection and can potentially slow the entire network.
True
The foil sheath on a STP cable is there to help cut down on interference.
True
The majority of Internet communications follow the client/server model of network communications.
True
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
True
When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be recreated.
True
When several people need access to a database, a dedicated database server can be the solution.
True
When you use the Freeze Panes option you freezing both columns and rows.
True
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
True
Wireless network connections are usually slower than wired broadband connections.
True
You can freeze as many columns and rows at the same time as you desire.
True
You should always check the terms of use document before using any copyrighted material on a website.
True
Your online reputation consists of the information available about you in cyberspace.
True
What transmission media is used for normal telephone service?
Twisted-pair cable
Which of the following is not a home operating system that supports P2P networking?
Unix
The main path of the Internet along which data travels the fastest is known as the Internet ________.
backbone
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
What is the name of the massive public online ledger which records the time and amount of every finalized cryptocurrency transaction?
block chain
A(n) ____virus replicates itself onto a hard drive's master boot record.
boot-sector
A ________ sends data from one collision domain to another.
bridge
In which topology are all computers connected in sequence on a single cable?
bus
A client/server network is an example of ________ administration.
central
Data ________ helps to ensure data integrity by maintaining information in only one place.
centralization
Running the Disk Cleanup utility is a quick way to ________.
clear out temporary Internet files
A ________ network can contain servers as well as individual computers.
client/server
Which of the following are the smallest segments within a sector on a hard drive?
cluster
A ________ check compares the values of data in two or more fields to see whether those values are reasonable.
consistency
Data in a multidimensional database is organized in a ________ format.
cube
The ________ consists of anonymously hosted websites that are mostly used for illegal activities.
dark web
Big data analytics is usually associated with ________ services.
data warehouse
A ________ is a collection of related data that can be stored, sorted, organized, and queried.
database
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs.
digital convergence
An IP address in the form 197.169.100.1 is called a(n) ________.
dotted quad
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
To assign a field size of 12 to a field in a table you would ________.
enter 12 in the Field Size property of that field
Management information systems (MIS) provide ________ reports, which show conditions that are unusual or need attention from users of the system.
exception
Android is an open source operating system for network servers.
false
As long as you pick the correct chart you can mix numeric value systems, such as dollars and number of units sold.
false
Cache memory is a form of ROM.
false
In Windows 10, then is a limit of 25 virtual desktops that a user can create.
false
RAID 0 automatically duplicates your data and saves it on two identical drives.
false
RAM memory is a type of nonvolatile storage that holds the critical startup instructions.
false
Registers are areas of memory that are located close to the CPU.
false
The File History utility only keeps the most recent version of a file.
false
The collection of commands that a specific CPU can execute is called the instruction language for that system.
false
The hard drive's seek time is the time it takes a storage device to locate its stored data and make it available for processing,
false
The taskbar is the primary working area on the screen.
false
When configuring a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
false
When you create a chart Excel automatically creates the chart on its own sheet and labels it Chart1.
false
A(n) ________ server is a server that stores and manages files for network users.
file
Which utility temporarily removes redundancies in a file to reduce the file size?
file compression
The location of a file is specified by its ________.
file path
You would use a ________ in an Access database to temporarily display records of residents for the city of Boston.
filter
Viruses, adware, and spyware are referred to collectively as ________.
grayware
When setting up a home network, make sure each node ________.
has a network adapter
A ________ topology uses more than one type of topology when building a network.
hybrid
A(n) ________ backup makes a copy of all changes since the last backup.
incremental
Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.
information assurance
Data ________ means that the data contained in a database is accurate and reliable.
integrity
Using a wireless network without the network owner's permission is known as ________.
piggybacking
________ is a technique that allows the CPU to work on more than one instruction at the same time.
pipelining
Google ________ is an online store that can be used for self-publishing books.
play
Individual Internet users connect to ISPs through a(n) ________.
point of presence (POP)
All of the following activities may infect your computer with a virus except ________.
printing a document
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
root
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
select query
A ________ uses electronic memory and has no motors or moving parts.
solid-state drive
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
spooler
An application programming interface (API) is ________.
the code the application software uses to take advantage of code written by others
Cache memory levels are based on proximity to ________.
the processor
One type of CAPTCHA is ________.
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
A ________ is a virus that is triggered on a certain date.
time bomb
The Apple logo would be considered a(n) ________.
trademark
Every computer has an operating system.
true
File Explorer is Windows's main program to find, manage and view files.
true
In Windows, you can monitor CPU utilization in Task Manager.
true
Installing a device driver can sometimes cause system instability.
true
Level 1 cache usually contains the least amount of storage of the cache memory levels.
true
Most computers today come with network adapters already installed.
true
Multitasking is when one user can do multiple processes at the same time.
true
Pie charts can only display one data series.
true
SSD drives can make a huge difference in the amount of time it takes your computer to boot up.
true
Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive.
true
SuperFetch is part of the Windows memory management system.
true
The authentication process involves the verification of a user's login name and password.
true
Wireless networks are more vulnerable to attack by hackers than wired networks.
true
You can use System Restore to return your system's settings back to a specific date when everything was working properly.
true
What is a website that allows an instructor to upload a paper to check for plagiarism?
turnitin.com
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
Nontraditional data in object-oriented databases such as audio clips, video clips, pictures, and very large documents are called ________ data.
unstructured
Which of the following ports is not considered to be exclusively a video port?
usb
RAM is an example of ________ storage.
volatile
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
worm
MS-DOS is an example of a menu-driven interface.
False
In the URL http://www.pearsonhighered.com, which of the following is the top-level domain?
.com
Which of the following is not a video file extension?
.jpg
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?
802.11ac
Which of the following is not a standard for wireless Ethernet networks?
802.11zx
According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can greatly increase your computer's performance.
90%
Which of the following is not a valid comparison operator?
=>
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which of the following, when included, distorts the effectiveness of charting data points?
Aggregates
What field property would allow the user to enter two quote marks with nothing between them ("") into a field with a Short Text data type?
Allow Zero Length
Which is not one of the four key pieces of personal information you should protect from identity thieves?
Anniversary
What allows you to add components to an existing database, rather than creating an entire new database?
Application parts
Which of the following is not a type of user interface?
Application programming interface (API)
________ is the branch of computer science that attempts to create computers that think like humans.
Artificial intelligence
Match each of the following terms to its definition:
Copyleft: granting of certain rights to a work while retaining other rights Sampling rate: number of times an analog wave is measured Trademark: allows McDonalds to protect its logo Fair use: allows people to use portions of a copyrighted work for specific purposes Digital rights management: allows only limited use of legally purchased materials
To protect a movie, what category of intellectual property would be used?
Copyright
To what does the @ symbol refer in a structured reference?
Current row
Using your computer for non-work activities while you are being paid to work is known as ________.
Cyber loafing
What is a system of access control that allows only limited use of material that has been legally purchased?
DRM
In Datasheet view, what does a pencil symbol to the left of a record indicate?
Data in that record has not been saved yet.
What field property would you use to automatically enter "PA" in a state field?
Default value
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?
Defragment and Optimize Drives
Match each of the following terms to its definition:
Defragment and Optimize: repositions related pieces of files on the hard disk to improve access time Task Manager: lists all the programs being used and indicates their status System Restore: brings system back to a previously stable state File History, File Recover: backs up important files, makes a complete mirror image of your current computer setup Disk Cleanup: removes unnecessary files from the hard drive
Which of the following views would you use to view or modify a table's structure?
Design
Which of the following is not a broadband Internet connection option?
Dial-up
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and National White Collar Crime Center
A full backup and an image backup are the same thing.
False
A knowledge-based system is an analysis tool that, using internal and external data, provides a view of a particular business situation for the purposes of decision making.
False
A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
A summary report generated by an MIS provides a list of the transactions that occurred during a specified time period.
False
Access requires that common fields be named exactly the same.
False
All viruses cause serious destruction of computer data.
False
Although you can link to external data, it is not recommended.
False
An access point connects to the main router wirelessly.
False
An international company like Microsoft would use a MAN to connect all of its computers.
False
As long as your data is accurate there is no real need to print preview your reports.
False
Before you freeze panes make sure the active cell is one row above and one column to the left of the rows and columns you want to freeze.
False
Cable TV is a two-way service with signals coming to and from your TV to the cable provider.
False
Client-side programs run on a web server rather than on your computer.
False
Currently, there are no antivirus programs for mobile devices.
False
Data breaches are always intentional.
False
Data redundancy ensures that the data contained in the database is accurate and reliable.
False
Detail forms are used to control how new data is entered into a database.
False
Digital currency cannot be sent anonymously.
False
Employees' last name would usually make an appropriate primary key field.
False
Even if panes are frozen pressing Ctrl+Home will still make A1 the active cell.
False
Facebook Connect is one of the most popular instant messaging services.
False
Full backups back up all your data, but not your applications.
False
HTML is an acronym for Highly Textual Markup Language.
False
Hot wallets are much safer than cold wallets.
False
IPv6 uses six groups of 16-bit numbers.
False
In a relational database, when two tables have a common field, the link between the tables is known as a hyperlink.
False
In terms of video resolution, HD stands for highly digitized.
False
Intangible personal property has no value.
False
It is impossible to create a data table from random, unorganized data.
False
Java and JavaScript refer to the same language.
False
JavaScript uses the Device Object Model to organize the objects and page elements.
False
Limiting your signal range does not help increase wireless network security.
False
Match each of the following terms to its definition:
Fiber-optic cable: made up of plastic or glass and transmits data at extremely fast speeds Twisted-pair cable: made up of multiple copper wires Coaxial cable: single copper wire surrounded by layers of plastic Peer-to-peer network: each node can communicate directly with every other node on the network Client/server network: central computer provides info and resources to other computers
In a database, the term ________ is synonymous with a category of data.
Field
Match each of the following terms to its definition:
Field: a category of info in a database Database: a collection of related data that can be stored, sorted, organized and queried Record: a group of related fields Table: a group of related records Primary key: a field that has a unique to each record
The ________ Windows utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage location.
File History
Most users enter information into a database through the use of a ________.
Form
Which chart element cannot be chosen from the Chart Elements dialog box?
Format Back Wall
High-performance video graphics cards often use ________ memory.
GDDR5
Match each of the following terms to its definition:
GUI: type of user interface in macOS and Microsoft Windows 10 Thrashing: the condition of excessive paging Desktop: primary work area Pin: place an application tile on the Start screen or icon on the taskbar POST: checks hardware at startup
Which type of hackers break into systems for the thrill or to show off their skills.
Gray-hat
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
ICANN
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
IP
A(n) ________ address is the address that external entities use when communicating with your network.
IP
Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?
Image
What field property increases the speed at which searches can be performed?
Indexed
A violation of the holder's rights is known as copyright ________.
Infrigement
What field property insures that all phone numbers have a consistent look?
Input mask
________ permits two or more people to communicate over the Internet in real time.
Instant messaging
The rule of thumb that predicts that the number of transistors on a CPU will double every two years is called ________ Law.
Moore's
A ________ is any device connected to a network such as a computer, printer, or game console.
Node
In the task pane, what does a diagonal white triangle next to a chart category indicate?
None of the category's options are displayed.
________ is used to ensure that data is organized most efficiently in a database.
Normalization
Match each of the following terms to its definition:
Office support: assists employees in day-to-day tasks and comm Natural language: comm with a computer systems using a natural spoken language Managment Info System: provides managers with timely and accurate info Enterprise Resource Planning: software system that integrates multiple system data sources and ties together the various processes of an organization
Which of the following is the online storage system affiliated with Microsoft?
OneDrive
Which of the following is not another term for cryptocurrency?
Online currency
The two major types of system software programs are utility programs and the ________.
Operating System
Instead of writing a term paper, some people cheat and purchase one from a(n) ________.
Paper mill
Which of the following is not a computer virus category?
Pharming
The process of determining which applications and tiles are on the Start Menu is called ________.
Pinning
Which of the following is not a permanent storage option?
Random access memory
Which of the following information is not contained in a packet sent over the Internet?
The size (in bytes) of the packet
Which of the following is not true about e-books?
They are always PDF file format.
What is not true about field names?
They can begin with a space
What is not true about database relationships?
They tend to increase the overall file size of a database.
Ring networks use the ________ method to avoid data collisions.
Token
Deleted files on a Mac computer are moved to the ________.
Trash
Match each of the following terms to its meaning:
Trojan horse: program that appears to be something useful or desirable Pretexting: creating a scenario that sounds legitimate enough that someone will trust you Cookie: text file for storing personal preferences pertaining to websites Botnet: programs that run on a large number of zombie computers Time Bomb: virus that is triggered by the passage of time on a certain date
A database schema (dictionary) defines the name, data type, and length of each field in the database.
True
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
Which field property helps a user know why an entry error was generated?
Validation Text
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.
Virtual memory
The network architecture that spans the largest physical distance is called a ________.
WAN
A data ________ is a large-scale collection of data that contains and organizes all of an organization's data in one place.
Warehouse
Which of the following is an example of an instant messaging service?
When does copyright protection begin?
When a work is created and fixed into a digital or physical form
What is a good rule to follow to avoid plagiarism?
When in doubt, cite your source.
Cars often have ________ connectivity.
Wi-fi and bluetooh
If you want to access your home network from your distant garage, a ________ might help boost the signal.
Wireless range extender
What should you not select when selecting data for a chart?
Worksheet titles
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.
XML
What is true about adding a new field to the right side of an existing data table?
You can add it to the right of the data table and Excel will extend the table to include the new field.
A(n) ________ chip converts sound waves from a voice into a digital signal.
analog-to-digital converter
Which of the following two operating systems are used most frequently on tablets?
android and IOS
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
applet
When your hard drive has to wait for the correct sector to spin to the read/write head, the delay is known as ________.
latency
Match each of the following terms to its meaning:
latency: time needed for corrector sector to spin sectors: pie-shaped wedges on the surface tracks: concentric circles on a hard drive seek time: time required for the read/write platter: round, thin places of metal within
A packet analyzer is a program that can enable a hacker to do all of the following except ________.
launch a denial of service (DoS) attack on your computer
Where does the primary axis display on a Combo chart?
left side
The physical address assigned to each network adapter is called its ________ address.
media access control (MAC)
When referring to hard drives, access time is measured in ________.
milliseconds
Data staging consists of all of the following steps, except ________.
mining the data
Siri, the personal assistant application on Apple's iPhone, is an example of a ________.
natural language processing (NLP) system
Routers and switches are example of network ________ devices.
navigation
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
network adapter
IPv6 was introduced when IPv4 ________.
no longer had enough unique addresses
A ________ is any device connected to a network such as a computer, printer, or game console.
node
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
one-to-one
Data are sent through a network in bundles called ________.
packets
C:\Windows\System32\drivers\etc\protocol is an example of a file ________.
path
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
pharming