CIS 1
Executable files for Macs have a(n) ___ extension.
.app
The main executable file for PC software has a(n) ___ extension.
.exe
The first cellular phones that were able to access the Internet were available in ___.
1996
Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It is a core component of the ___ platform, which also includes cloud computing, ___ devices, and social networking.
3rd; mobile
Conventional wisdom tells us that strong passwords are at least ___ characters in length and include one or more uppercase letters, numbers, and symbols.
8
___ monitors web browsing activity to supply ad-serving sites with data used to generate targeted ads.
Adware
One of the biggest challenges for this technology was creating a worldwide network that linked continents. In 1858, this worldwide network became a possibility when the first undersea cable was laid across the ___ Ocean.
Atlantic
___ protocols, such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.
Authentication
Ecommerce activities are classified as B2C, C2C, B2G, and ___.
B2B
The ___ data type is used to store binary data, such as MP3 files and graphics.
BLOB
In the 1800s, an English mathematician named Charles ___ proposed to build a device, called the Analytical Engine, that would operate using steam power.
Babbage
___ filters block mail that originates from IP addresses of known spammers.
Blacklist
___ software is usually sold in retail stores or at Web sites and may have options for site licenses as well as single user licenses.
Commercial
___ filters examine the content within a message for certain words or phrases commonly used in spam emails.
Content
___ procedures reduce the effect of an attack.
Corrective
For databases composed of more than one record type, it is best to use a database management system, which is abbreviated as ___.
DBMS
Records can be removed from a database using the SQL ___ command.
DELETE
Software for Macs is distributed as ___ packages that are dragged to the Applications folder to complete the installation.
DMG
___ files can be created and manipulated by using a variety of tools, including word processing and spreadsheet software.
Data
___ software helps you store, find, organize, update, and report information located in one or more tables.
Database
Freeware is copyrighted software that is available free of charge. ___ is also available free of charge, but is limited in some way until you pay for it.
Demoware
___ operating systems - such as Windows, Chrome OS and OS-X accommodate one user at a time, are capable of multitasking, and include a graphical user interface designed for keyboard and mouse input.
Desktop
___ activities recognize attacks and trigger a corrective response.
Detection
___ reduce the likelihood of deliberate attack.
Deterrents
___ is a suite of software modules that use a common database and a common user interface.
ERP (Enterprise resource planning)
Software licenses, referred to by the acronym ___ can be divided into two main categories: public ___ and proprietary.
EULA; domain
___ transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
Encryption
An MITM exploit executed at Wi-Fi hotspots is called the ___.
Evil Twin
Windows File Explorer and the OS X ___ are examples of file management utilities provided by operating systems.
Finder
___ databases connect nodes much like a sociogram.
Graph
Two very popular NoSQL tools include, ___ which is a big data file system, and ___, which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.
Hadoop; MapReduce
___ filters review the email header for falsified information, such as spoofed IP addresses.
Header
___ databases allow only one-to-many relationships.
Hierarchical
The life of a technology product, innovation, or idea can be tracked using a product life cycle, Rogers' bell curve, or the Gartner ___.
Hype Cycle
The ___ data type can be used to store URLs.
Hyperlink
Ethical decisions should take into account applicable ___, such as the Digital Millenium Copyright Act.
ICT laws
An MITM attack that targets cellular data eavesdrops on conversations using a(n) ___ catcher.
IMSI
Records can be added to a table using the SQL ___ command.
INSERT
___ degree programs focus on applying computers to business problems.
Information systems
___ systems play a key role in helping organizations achieve goals, which are set forth in a(n) ___.
Information; mission statement
SQL also provides a(n) ___ command that can be used to temporarily consolidate two tables so that data can be accessed simultaneously from both of them.
JOIN
___ information systems typically build on the data collected by a TPS to produce reports that managers use to make the business decisions needed to solve routine, structured problems.
Management
___ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.
Mobile
Outsourcing practices account in part for declining prices of digital products, but another factor is ___ law, which predicted that the number of transistors in an integrated circuit would double every two years.
Moore's
Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as ___ has become popular.
NoSQL
Some software is not exacly malware, but it is a nuisance. A(n) ___ (hint: use the acronym) takes up residence on a digital device and seems impossible to disable or remove.
PUP
___ filters block or allow mail based on the sender's address.
Permission
___ redirects Web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.
Pharming
___ is an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS.
Phishing
___ software supplies tools for creating a series of electronic slides that can be shown on a computer screen or projector.
Presentation
___ countermeasures shield vulnerabilities to render an attack unsuccessful.
Preventative
___ databases exist as a series of tables that can be related by common fields.
Relational
A(n) ___ Access Trojan is malware that arrives in a trojan, disguised as legitimate software, and then sets up a(n) ___ that prevents unauthorized access to a victim's device.
Remote
To search for data, you can use the SQL ___ command.
SELECT
___ languages, such as JavaScript and Perl, are executed one line at a time.
Scripting
___ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.
Server
___ is also distributed free of charge but uses the honor system to collect payment.
Shareware
___ software is like a smart piece of paper that automatically adds up the columns of numbers you write on it.
Spreadsheet
___ testing ensures that the software components work correctly on the hardware and with other, perhaps older, elements of the information system.
System
Changing or replacing the data in a field requires the SQL ___ command.
UPDATE
OO programmers often use ___ Modeling Language diagrams to plan the classes for a program.
Unified
___ testing is performed on each module, and then ___ testing is performed to make sure that all the modules work together correctly.
Unit; integration
Software is available in several paradigms that affect how it is installed and used. ___ apps run in a browser and require no installation.
Web
Document-related databases store text in JSON format or marked up with ___.
XML
Each generation of languages has a higher level of ___ that removes or hides low-level details.
abstraction
At the end of the conversion process, the information system undergoes a final test called ___ testing, designed to assure the system's owner that the new system works as specified.
acceptance
An alternative approach is to use the ___ methodology in which programs are developed in iterations called ___.
agile; sprints
Devices such as the abacus require the operator to apply a(n) ___ to perform calculations.
algorithm
The project then proceeds to the ___ phase, with the goal of producing a list of requirements for a new or revised information system.
analysis
The process of planning and building an information system is referred to as systems ___ and design, based on a system development ___ cycle (SDLC) which consists of several phases.
analysis; life
A rogue ___ exploit usually beins with a virus warning and an offer to disinfect the infected device.
antivirus
Second-generation languages, called ___ languages, allowed programmers to write programs consisting of abbreviated op codes instead of 1s and 0s.
assembly
Malware with ___ control capability is programmed for off-site control of the camera or microphone on a victim's device.
backdoor
Hackers who gain control over several computers can organize them into a client-server network known as a(n) ___.
botnet
Enterprises strive to prevent data ___, in which personal data is viewed, accessed, or retrieved without authorization.
breaches
A(n) ___ force attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.
brute
Operating systems also manage ___ that collect and hold data from peripheral devices until a device is ready to accept it.
buffers
As in other industries, businesses in the information sector produce consumer goods and ___ goods.
capital
The number of associations that can exist between two record types is referred to as ___.
cardinality
Data sent over encrypted channels also falls victim to MITM attacks that use fake digital ___.
certificates
Inaddition to a college degree, ___ provides job applicants with marketable credentials pertaining to skills and knowledge of specific software or hardware.
certification
An encrypted message or file is referred to as ___.
ciphertext
Chrome OS is considered a thin___ because it depends substantially on processing supplied by a remote computer.
client
The data can be accessed by devices using other platforms through the use of database ___ software.
client
A database and the DBMS used to create it are installed on a specific in-house computing platform, such as Linux, or are hosted as a(n) ___ service.
cloud
Each sector of a disk is numbered, providing a storage address that the operating system can track. Many computers work with a group of sectors, called a(n) ___, to increase the efficiency of file storage operations.
cluster
The instructions for a computer program are sometimes referred to as ___.
code
Many IT organizations have ___ of ethics designed to help computer professionals make tough decisions.
codes
In windows, storage devices are identified by a drive letter, followed by a(n) ___.
colon
A(n) ___-oriented data model makes it easy to access data stored in similar fields, rather than in individual records.
column
The telephone industry grew rapidly and is now classified as a(n) ___ carrier because it is similar to shippers that transport goods and passenger over regular routes at set rates.
common
Computer code must ultimately be converted into machine language so that it can be executed by the processor. That conversion can be performed by a(n) ___, that converts ___ code into ___ code.
compiler; source; object
Computer professionals work in full-time or part-time jobs, and some are ___ workers, who arrange to work for a company on a temporary basis, usually as consultants for particular projects.
contract
Every file has a name and might also have a file extension. The rules that specify valid file names are called file-naming ___.
conventions
When customers put items in their online shopping carts, the ecommerce site's server sends a(n) ___ to the customer's computers containing the ID number of a shopping cart.
cookie
Even before recorded history, humans used various ___ aids, such as pebbles and notched sticks, to keep track of quantities.
counting
Enterprises also use ___ applications to coordinate sales, marketing, and customer support.
customer relationship management
To protect data from being destroyed by natural disasters, human errors, and other factors, enterprises often house their information systems in private ___ centers or shared ___ centers.
data; colocation
A(n) ___ is a collection of information, generally stored as computer files.
database
Each Prolog rule has a(n) ___, which defines an outcome or fact, followed by the notation :-, which means "if".
decision table
Programming languages such as Prolog support the ___ programming paradigm because they encourage programmers to describe a(n) ___ rather than its solution.
declarative
Many ___ applications, from consumer apps to enterprise-level ERP systems, have a database at their core.
dedicated
Additional techniques for producing high-quality, secure code include threat modeling and ___ programming.
defensive
In the ___ phase of the SDLC, the project team identifies potential software solutions, such as the use of programming languages, application ___ tools, or application software.
design; development
When the solution requires custom programming, a(n) ___ design phase produces specifications that describe the way the new information system should interact with users, store data, process data, and format reports.
detailed
A(n) ___ attack helps hackers guess your password by stepping through a dictionary containing word lists in common languages.
dictionary
Every storage device has a(n) ___ containing a list of files stored on the device.
directory
Enterprises also have ___ recovery plans in place that contain step by step methods to secure data against threats, recover lost data, and resume operations after a disruption.
disaster
Some technologies have transformative effects on lifestyles, employment, and economics. These ___ technologies include digital photography, the telephone, and smartphones.
disruptive
Database tools handle the way data is physically stored, including the process of ___ data across multiple servers.
distributing
Modern database tools also handle ___ scaling as devices are added when additional capacity is required.
dynamic
The OO paradigm allows programmers to hide the internal details of objects and their methods. This process, called ___, allows objects to be easily reused, modified, and repurposed.
encapsulation
Computer ___ degree programs focus on the design of computer hardware and peripheral devices.
engineering
The information ___ methodology focuses on the data that an information system collects.
engineering
In contrast, software ___ apply formalized techniques to reduce the cost and complexity of software while increasing reliability.
engineers
Relationships can be depicted graphically by using ___-relationship diagrams.
entity
Password ___ is a measure of a password's unpredictability.
entropy
Professional ___ refers to on the job choices and actions that reflect a person's values.
ethics
A(n) ___ system is designed to analyze data and produce a recommendation or decision based on a set of facts and rules called a(n) ___ base.
expert; knowledge
To defent against attacks, consuers can install anti-___ security software.
exploit
Development can be derailed by unmanaged ___ creep, so the team should have a formal system of change requrests.
feature
In database software, data is stored in ___, which form records.
fields
A spam ___ uses a set of rules to examine email messages and determine which are spam.
filter
Defense against intrusions is also offered by personal ___, which block unauthorized ___ access.
firewalls; port
One of the simplest methods for storing data is a(n) ___ file that consists of a single, two dimensional table of data elements.
flat
The team uses documentation tools, such as data ___ diagrams and ___ case diagrams.
flow; use
Programmers can use ___ methods based on rigorous logical and mathematical models to reduce the number of defects in a software product.
formal
The dividing process of a disk is referred to as ___.
formatting
Although consumers have little control over data that is stored on corporate systems, they can take steps to protect their identity by placing a(n) ___ alert on their credit reports.
fraud
A(n) ___ directs the computer to execute one or more instructions not coded as part of the main execution path of a program.
function
Using a technique called ___ logic, these systems can deal with imprecise data and problems that have more than one solution.
fuzzy
Payment authorization is facilitated through a payment ___.
gateway
In Prolog jargon, a question or query to a program's database is called a(n) ___.
goal
Fourth-generation languages were designed to eliminate many of the strict punctuation and ___ rules that complicated third-generation languages.
grammar
The set of superclasses and subclasses that are related to each other is referred to as a class ___.
hierarchy
These modules typically include applications for ___ resources management, financial management, SCM, CRM, and manufacturing.
human
Unauthorized access to corporate information systems is a primary source of ___ theft.
identity
During the ___ phase of the SDLC, the project team supervises the technicians who set up new hardware, install programming languages and other application ___ tools, create and test applications, and customize software.
implementation; testing
Modern database tools support data ___, which means separating data from the programs that manipulate data.
independence
A(n) ___ engine evaluates the facts and rules to produce answers to questions posed to the system.
inference
The ___ industry encompasses those companies that focus on digital equipment, software, communications technologies, and related services.
information
Classes can be derived from other classes through a process called ___.
inheritance
Mobile apps are designed for smartphones and tablets. They are typically downloaded and ___ from an app store or web sites, though ___ owners' devices must ___ the device to obtain apps from third-party sources.
installed; locked; jailbreak
Prolog uses a process called ___ to evaluate facts and rules to determine whether they are true.
instantiation
Programming languages can be obtained a la carte or in a package of tools such as an SDK or ___ development environment.
integrated
Third generation computers were even smaller because they used ___ circuits.
integrated
The object-oriented paradigm is based on the idea that the solution to a problem can be visualized in terms of objects that ___ with each other.
interact
There are several types of ___ exploits that surreptitiously capture data.
interception
Alternatively, a(n) ___ converts and executes one line at a time.
interpreter
The operating system ___ remains in RAM while a device is in operation and manages the device's resources.
kernel
A(n) ___ records keystrokes and sends them to a hacker.
keylogger
A computer programming language is a set of grammar rules and ___ for creating instructions that can ultimately be processed by a computer.
keywords
An SQL query contains SQL ___, such as SELECT, FROM, INSERT, JOIN, and WHERE, plus ___ that specify the details of the command.
keywords; CREATE
When an operating system fails to correctly track the allocation of RAM space to applications, a memory ___ may produce "Program Not Responding" error messages.
leak
Through a process called side-___, an app from a source other than an official app store is installed on a device.
loading
The ___ data type is used to store true/false and yes/no data.
logical
The way that data is actually stored is referred to as the ___ storage model.
logical
Data for these systems may originate from ___ programs or from customer information collected during the sales cycle.
loyalty
The first programming languages were low-level ___ languages.
machine
After testing and installation, an information system enters the ___ phase of its life cycle.
maintenance
The core function of a password ___ (sometimes called a keychain) is to store user IDs with their corresponding passwords. Passwords can be stored in the ___, locally, or on a USB drive.
manager
By 1200 a(n) ___ calculator, called the abacus, had appeared in China.
manual
In contrast, ___ calculators, such as the Pascaline and de Colmar's Aritmometer, are designed to carry out calculations autonomously.
mechanical
The ___ data type is a variable length field for entering text.
memo
Operating systems manage resources by monitoring processor cycles, allocating ___ space to programs, tracking stored files, and supervising data exchanges with peripheral devices.
memory
OO programmers can create ___ to define what happens once an action is initiated.
messages
Objects interact with each other to solve problems by exchanging ___, which initiate an action, a process, or a procedure.
methods
The key technology for fourth-generation computers, including personal computers, is the ___.
microprocessor
A(n) ___ database organizes relationships over three or more dimensions.
multidimensional
___ supports a division of labor among several processing units.
multiprocessing
Most operating systems have ___ capabilities that allow two or more processes to run simultaneously.
multitasking
___ capabilities allow an operating system to run multiple simultaneous operations for a single program.
multithreading
The number of tables in a database can be determined by a process called ___, which helps a database designer group fields into record types and avoid data redundancy.
normalization
A(n) ___ database stores data in objects that can be grouped into classes and defined by attributes and methods.
object
An object is a single instance of an entity. Programmers can use a class as a template for a group of ___ with similar characteristics.
objects
A record that contains data is sometimes referred to as a record ___.
occurrence
Businesses also make extensive use of ___ when manufacturing, services, and product development are moved to other countries.
offshoring
In databases, records can be related by one-to-___ relationships, one-to-many relationships, or many-to-many relationships.
one
Both ____ software and application software are essential for accomplishing tasks with a digital device.
operating
The object-___ methodology treats an information system as a collection of interacting objects.
oriented
These tools work well when databases scale ___ (horizontally) and when databases are broken into subsets called ___.
out; shards
These goods may be produced in house or they may be ___ to other companies.
outsourced
When you want to change margins, headers, and footers, you can use ___ layout tools.
page
Programming ___, such as procedural, object-oriented, and declarative, are methodologies that affect the way programmers conceptualize and approach computer programming.
paradigms
To change the spacing between lines or the alignment of text, you can use tools to adjust ___ style.
paragraph
Programs are composed of a series of statements that include a(n) ___ such as input or print and parameters.
parameters
A file's location is defined by a file ___, which includes the storage device, folder(s), file name, and extension.
path
Television was an additional technology to emerge in the telecommunications industry. Its evolution into ___ television provided another Internet access technology, especially popular in the United States.
pay
Malware refers to any computer program designed to surreptitiously enter a digital device. The action carried out by malware code is referred to as a(n) ___.
payload
An original message or file that has not yet been encrypted is reffered to as ___ or cleartext.
plaintext
A project begins with a(n) ___ phase. In this phase, the project team is assembled and creates a project ___ plan containing a justification of the project and an initial project schedule.
planning; development
For flexibility, a concept called ___, or overloading, allows programmers to create a single, generic name for a procedure that behaves in unique ways for different classes.
polymorphism
PC software that can be carried on a USB flash drive and used without installation is called ___ software.
portable
Finding a job in the IT industry is similar to finding any job. Preparing a resume is essential, and it can be spplemented by a Web ___ with links to relevant web sites, such as past employers, your alma mater, and samples of your work.
portfolio
A Prolog fact begins with a(n) ___, such as shapeof, followed by a series of ___ within parentheses, such as (pizza,round).
predicate; argument
Programming projects can be approached using a(n) ___ methodology, which required extensive planning and documentation up front.
predictive
A database designer must also consider how to sort or index records. The ___ key for a table specifies the order in which records are stored and indicates where new records are inserted in a table.
primary
Declarative languages, such as Prolog, can be used for problems that require calculations, but those problems are typically better suited to ___ languages.
procedural
Languages such as COBOL and Fortran support a traditional approach to programming called the ___ paradigm, which is based on a step-by-step ___.
procedural; algorithm
Transaction ___ systems provide an organization with a way to collect, display, modify, or cancel transactions.
processing
Word ___ software assists you with composing, editing, designing, printing, and electronically publishing documents.
processing
Office suites are sometimes referred to as ___ software because they offer features that really help get work done.
productivity
Technologies also have an effect on ___, which is the amount of output that is produced per unit of input.
productivity
A computer ___ is defined as any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
programmer
In the 1930s and 1940s, several ___ computers were developed, including the Atanasoff-Berry computer, Z3, Harvard Mark I, Colossus, and ENIAC.
prototype
Various planning tools, such as structured English, ___, and flowcharts, help programmers plan the steps for a procedural program.
pseudocode
In the context of cyber security, social engineering is a deceptive practice that exploits human ___ by inducing victims to interact with a digital device in a way that is not in their best interest.
psychology
When an antivirus software detects malware, it can try to remove the infection, put the file into ___, or simply delete the file.
quarantine
Although the specifications for searches and other database tasks are collected by easy-to-use graphical user interfaces, those spefications are converted into SQL ___, which can communication directly with the database.
query
SQL is a database ___ language that generally works behind the scenes as an intermeidary between the database ___ software provided to users and the database itself.
query; client
Smarthopnes are the top target for ___ that locks a device and then requests payment for an unlocking code.
ransomware
The first step in desigining a relational database is to define its fields by specifying a field name and a data type. Integer, date, and ___ data types are used for fields containing data that might be mathematically manipulated.
real
Each row in the table is a(n) ___, and each column of the table is a(n) ___.
record; field
When two sets of records are ___, database software allows you to access data from both tables at the same time.
related
Most of these database management systems support ___ databases with data stored in tables, but database tool vendors also offer products for other database models.
relational
All computer programs should include internal documentation in the form of ___, which are explanatory comments inserted into a computer program along with lines of code.
remarks
A(n) ___ control, or loop, repeats one or more instructions until a certain condition is met.
repetition
File naming rules typically do not allow you to use certain characters or ___ words in a file name.
reserved
Situations that require computer professionals to make ethical decisions often involve software copyrights, privacy, conflict of interest, use of work computers, software quality, hacking, and social ___.
responsibility
The top-level list of a device is referred to as the ___ directory, which can be subdivided into several smaller lists called subdirectories that are depicted as ___.
root; folders
Modern ___ are used to hide malicious code by replacing parts of the operating system with modified code.
rootkits
NoSQL tools are sometimes said to create ___ databases, but they usually have some type of structure, thought it may be more flexible than the relational model.
schema-less
Computer ___ degree programs focus on digital computer architecture and how to program computers to make them work effectively and efficiently.
science
Companies and businesses that create jobs, develop products, and offer services are classified into economic ___.
sectors
In theory, increased use of ICT can raise a country's GDP. However, technology has also created national ___ vulnerabilities, and the threat of cyberwarfare continues to grow.
security
A(n) ___ control provides a choice of paths based on whether a condition is true or false.
selection
Procedural languages provide programmers with a variety of ___ control structures for specifying the order of program execution.
sequence
Database tools also support multiple users and use a technique called ___ to handle situations in which more than one user attempts to update the same user record.
serializability
Local applications for PCs are installed using a(n) ___ program that copies files, checks resources, and updates the Windows ___.
setup
Antivirus software is a type of utility software that looks for and eradicates malware by watching for virus ___ or through a(n) ___ analysis that examines the behavior of suspicious files.
signatures; heuristic
Open ___ software may be sold or distributed free of charge, but the distribution must include the source code.
source
Many social engineering attacks begin with ___, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.
spam
MITM attacks are also carried out by ___ the addresses in email messages, IP packets, ___ servers, and ARP routing tables.
spoofing; DNS
Any software that secretly gathers personal information without the victim's knowledge is classified as ___.
spyware
Computer worms are usually ___ executable files that can spread themselves from one device to another without any assistance from victims.
standalone
Before program code can be written, a programmer needs a clear problem ___, which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution.
statement
Managers depend on information systems to supply data that is essential for long-term ___ planning and short term tactical planning.
strategic
The single most effective security measure for digital devices is to password protect access to them. A(n) ___ password is difficult to hack.
strong
A project team can use one of several approaches to the system development process. For example, the ___ methodology focuses on the processes that take place in an information system.
structured
A(n) ___ file uses a uniform format to store data for each person or thing in the file.
structured
Software pricing models include one-time purchase, ___, trial, and freemium.
subscription
These requirements are sometimes called ___ factors.
success
Information systems are used to track and control the ___ chain, which beings with raw materials shipped to a manufacturer, monitors finished goods shipped to distributors, and ends with merchandise delivered to customers.
supply
A decision ___ system helps workers and managers make non-routine decisions by constructing decision models that include data collected from internal and external sources.
support
A program is not complete until it has been tested to ensure that it contains no ___ errors, logic errors, or runtime errors.
syntax
An operating system uses a file ___ to track the physical location of files.
system
In the 1800s, inventors created the ___, which used electricity to transmit data over a distance. Signals were sent usually using ___ code.
telegraph
The ___ data type is used for fixed length fields containing text that is not intended to be mathematically manipulated.
text
Before a computer stores data on a disck, CD, or DVD, it creates the equivalent of electronic storage bins by dividing the disk into ___ and then further dividing the disk into ___.
tracks; sectors
Second-generation computers were smaller and less power hungry because they used ___.
transistors
___ are a type of standalone malware that masquerades as useful utilities or applications, which victims download and install unaware of their destructive nature.
trojans
A(n) ___ system might offer a complete hardware and software solution.
turnkey
Each kind of record is referred to as a record ___.
type
To remove software that has been installed on a PC, Windows supplies a(n) ___ utility.
uninstall
A filing cabinet full of folders and papers would be classified as a(n) ___ file.
unstructured
A software ___ or patch is a small section of program code designed to correct problems and address security vulnerabilities.
update
New versions of software are called ___.
upgrades
Most of these early computers used ___ tubes, which paved the way for the architecture of first-generation computers, such as UNIVAC.
vacuum
When designing fields, a database designer can also include field formats, field ___ rules, and lookup routines to reduce data entry errors.
validation
A key-___ data model provides each data element with a key.
value
Those parameters may include ___ that represent values that can change, or ___ that represent unchanging values.
variables; constants
The five Vs of big data are high volume, high ___, diversified variety, unknown veracity, and low-___ value.
velocity; density
A single device can run more than one operating system as a(n) ___ machine.
virtual
There are several types of malware. A computer ___ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate ___ file on a host computer.
virus; executable
With a clear plan, a programmer can begin coding using a text editor, program editor, or ___ development environment.
visual
Because it is so easy to experiment with different numbers, this type of software is particularly useful for ___ analyses.
what-if
Computer professionals who are compelled to become ___ and speak out against on the job activities that threaten the public interest should understand the potential legal and career risks before they proceed.
whistleblowers
A computer ___ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
worm
Computer programmers focus on ___ computer programs, but they also plan, test, and document computer programs.
writing
A(n) ___ -day attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
zero