CompSci

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

value

A key-___ data model provides each data element with a key.

reserved

File naming rules typically do not allow you to use certain characters or ___ words in a file name.

portfolio

Finding a job in the IT industry is similar to finding any job. Preparing a resume is essential, and it can be spplemented by a Web ___ with links to relevant web sites, such as past employers, your alma mater, and samples of your work.

DBMS

For databases composed of more than one record type, it is best to use a database management system, which is abbreviated as ___.

polymorphism

For flexibility, a concept called ___, or overloading, allows programmers to create a single, generic name for a procedure that behaves in unique ways for different classes.

grammar

Fourth-generation languages were designed to eliminate many of the strict punctuation and ___ rules that complicated third-generation languages.

Demoware

Freeware is copyrighted software that is available free of charge. ___ is also available free of charge, but is limited in some way until you pay for it.

cloud

A database and the DBMS used to create it are installed on a specific in-house computing platform, such as Linux, or are hosted as a(n) ___ service.

procedural; algorithm

Languages such as COBOL and Fortran support a traditional approach to programming called the ___ paradigm, which is based on a step-by-step ___.

setup

Local applications for PCs are installed using a(n) ___ program that copies files, checks resources, and updates the Windows ___.

spoofing; DNS

MITM attacks are also carried out by ___ the addresses in email messages, IP packets, ___ servers, and ARP routing tables.

payload

Malware refers to any computer program designed to surreptitiously enter a digital device. The action carried out by malware code is referred to as a(n) ___.

backdoor

Malware with ___ control capability is programmed for off-site control of the camera or microphone on a victim's device.

primary

A database designer must also consider how to sort or index records. The ___ key for a table specifies the order in which records are stored and indicates where new records are inserted in a table.

support

A decision ___ system helps workers and managers make non-routine decisions by constructing decision models that include data collected from internal and external sources.

path

A file's location is defined by a file ___, which includes the storage device, folder(s), file name, and extension.

unstructured

A filing cabinet full of folders and papers would be classified as a(n) ___ file.

strategic

Managers depend on information systems to supply data that is essential for long-term ___ planning and short term tactical planning.

codes

Many IT organizations have ___ of ethics designed to help computer professionals make tough decisions.

dedicated

Many ___ applications, from consumer apps to enterprise-level ERP systems, have a database at their core.

spam

Many social engineering attacks begin with ___, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

sequence

Procedural languages provide programmers with a variety of ___ control structures for specifying the order of program execution.

ethics

Professional ___ refers to on the job choices and actions that reflect a person's values.

formal

Programmers can use ___ methods based on rigorous logical and mathematical models to reduce the number of defects in a software product.

paradigms

Programming ___, such as procedural, object-oriented, and declarative, are methodologies that affect the way programmers conceptualize and approach computer programming.

integrated

Programming languages can be obtained a la carte or in a package of tools such as an SDK or ___ development environment.

declarative

Programming languages such as Prolog support the ___ programming paradigm because they encourage programmers to describe a(n) ___ rather than its solution.

predictive

Programming projects can be approached using a(n) ___ methodology, which required extensive planning and documentation up front.

parameters

Programs are composed of a series of statements that include a(n) ___ such as input or print and parameters.

instantiation

Prolog uses a process called ___ to evaluate facts and rules to determine whether they are true.

INSERT

Records can be added to a table using the SQL ___ command.

DELETE

Records can be removed from a database using the SQL ___ command.

entity

Relationships can be depicted graphically by using ___-relationship diagrams.

paragraph

To change the spacing between lines or the alignment of text, you can use tools to adjust ___ style.

exploit

To defent against attacks, consuers can install anti-___ security software.

data; colocation

To protect data from being destroyed by natural disasters, human errors, and other factors, enterprises often house their information systems in private ___ centers or shared ___ centers.

uninstall

To remove software that has been installed on a PC, Windows supplies a(n) ___ utility.

SELECT

To search for data, you can use the SQL ___ command.

processing

Transaction ___ systems provide an organization with a way to collect, display, modify, or cancel transactions.

Hadoop; MapReduce

Two very popular NoSQL tools include, ___ which is a big data file system, and ___, which sends processing logic to the data, rather than bringing the data to the computer that performs the processing.

identity

Unauthorized access to corporate information systems is a primary source of ___ theft.

fuzzy

Using a technique called ___ logic, these systems can deal with imprecise data and problems that have more than one solution.

pseudocode

Various planning tools, such as structured English, ___, and flowcharts, help programmers plan the steps for a procedural program.

Header

___ filters review the email header for falsified information, such as spoofed IP addresses.

Management

___ information systems typically build on the data collected by a TPS to produce reports that managers use to make the business decisions needed to solve routine, structured problems.

ERP (Enterprise resource planning)

___ is a suite of software modules that use a common database and a common user interface.

Shareware

___ is also distributed free of charge but uses the honor system to collect payment.

Phishing

___ is an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS.

Scripting

___ languages, such as JavaScript and Perl, are executed one line at a time.

Adware

___ monitors web browsing activity to supply ad-serving sites with data used to generate targeted ads.

Desktop

___ operating systems - such as Windows, Chrome OS and OS-X accommodate one user at a time, are capable of multitasking, and include a graphical user interface designed for keyboard and mouse input.

Server

___ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.

Mobile

___ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.

Corrective

___ procedures reduce the effect of an attack.

Authentication

___ protocols, such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.

Pharming

___ redirects Web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.

Deterrents

___ reduce the likelihood of deliberate attack.

Database

___ software helps you store, find, organize, update, and report information located in one or more tables.

Spreadsheet

___ software is like a smart piece of paper that automatically adds up the columns of numbers you write on it.

Commercial

___ software is usually sold in retail stores or at Web sites and may have options for site licenses as well as single user licenses.

Presentation

___ software supplies tools for creating a series of electronic slides that can be shown on a computer screen or projector.

multiprocessing

___ supports a division of labor among several processing units.

Information; mission statement

___ systems play a key role in helping organizations achieve goals, which are set forth in a(n) ___.

System

___ testing ensures that the software components work correctly on the hardware and with other, perhaps older, elements of the information system.

Unit; integration

___ testing is performed on each module, and then ___ testing is performed to make sure that all the modules work together correctly.

Encryption

___ transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

system

An operating system uses a file ___ to track the physical location of files.

plaintext

An original message or file that has not yet been encrypted is reffered to as ___ or cleartext.

signatures; heuristic

Antivirus software is a type of utility software that looks for and eradicates malware by watching for virus ___ or through a(n) ___ analysis that examines the behavior of suspicious files.

spyware

Any software that secretly gathers personal information without the victim's knowledge is classified as ___.

capital

As in other industries, businesses in the information sector produce consumer goods and ___ goods.

acceptance

At the end of the conversion process, the information system undergoes a final test called ___ testing, designed to assure the system's owner that the new system works as specified.

predicate; argument

A Prolog fact begins with a(n) ___, such as shapeof, followed by a series of ___ within parentheses, such as (pizza,round).

worm

A computer ___ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.

programmer

A computer ___ is defined as any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

keywords

A computer programming language is a set of grammar rules and ___ for creating instructions that can ultimately be processed by a computer.

objects

An object is a single instance of an entity. Programmers can use a class as a template for a group of ___ with similar characteristics.

syntax

A program is not complete until it has been tested to ensure that it contains no ___ errors, logic errors, or runtime errors.

planning; development

A project begins with a(n) ___ phase. In this phase, the project team is assembled and creates a project ___ plan containing a justification of the project and an initial project schedule.

structured

A project team can use one of several approaches to the system development process. For example, the ___ methodology focuses on the processes that take place in an information system.

occurrence

A record that contains data is sometimes referred to as a record ___.

antivirus

A rogue ___ exploit usually beins with a virus warning and an offer to disinfect the infected device.

virtual

A single device can run more than one operating system as a(n) ___ machine.

update

A software ___ or patch is a small section of program code designed to correct problems and address security vulnerabilities.

filter

A spam ___ uses a set of rules to examine email messages and determine which are spam.

zero

A(n) ___ -day attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

Remote

A(n) ___ Access Trojan is malware that arrives in a trojan, disguised as legitimate software, and then sets up a(n) ___ that prevents unauthorized access to a victim's device.

dictionary

A(n) ___ attack helps hackers guess your password by stepping through a dictionary containing word lists in common languages.

selection

A(n) ___ control provides a choice of paths based on whether a condition is true or false.

repetition

A(n) ___ control, or loop, repeats one or more instructions until a certain condition is met.

multidimensional

A(n) ___ database organizes relationships over three or more dimensions.

object

A(n) ___ database stores data in objects that can be grouped into classes and defined by attributes and methods.

function

A(n) ___ directs the computer to execute one or more instructions not coded as part of the main execution path of a program.

inference

A(n) ___ engine evaluates the facts and rules to produce answers to questions posed to the system.

structured

A(n) ___ file uses a uniform format to store data for each person or thing in the file.

brute

A(n) ___ force attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

database

A(n) ___ is a collection of information, generally stored as computer files.

keylogger

A(n) ___ records keystrokes and sends them to a hacker.

expert; knowledge

A(n) ___ system is designed to analyze data and produce a recommendation or decision based on a set of facts and rules called a(n) ___ base.

turnkey

A(n) ___ system might offer a complete hardware and software solution.

column

A(n) ___-oriented data model makes it easy to access data stored in similar fields, rather than in individual records.

defensive

Additional techniques for producing high-quality, secure code include threat modeling and ___ programming.

maintenance

After testing and installation, an information system enters the ___ phase of its life cycle.

remarks

All computer programs should include internal documentation in the form of ___, which are explanatory comments inserted into a computer program along with lines of code.

interpreter

Alternatively, a(n) ___ converts and executes one line at a time.

NoSQL

Although SQL and relational databases can be used for big datasets, a collection of alternative tools referred to as ___ has become popular.

fraud

Although consumers have little control over data that is stored on corporate systems, they can take steps to protect their identity by placing a(n) ___ alert on their credit reports.

query

Although the specifications for searches and other database tasks are collected by easy-to-use graphical user interfaces, those spefications are converted into SQL ___, which can communication directly with the database.

IMSI

An MITM attack that targets cellular data eavesdrops on conversations using a(n) ___ catcher.

Evil Twin

An MITM exploit executed at Wi-Fi hotspots is called the ___.

keywords; CREATE

An SQL query contains SQL ___, such as SELECT, FROM, INSERT, JOIN, and WHERE, plus ___ that specify the details of the command.

agile; sprints

An alternative approach is to use the ___ methodology in which programs are developed in iterations called ___.

ciphertext

An encrypted message or file is referred to as ___.

what-if

Because it is so easy to experiment with different numbers, this type of software is particularly useful for ___ analyses.

tracks; sectors

Before a computer stores data on a disck, CD, or DVD, it creates the equivalent of electronic storage bins by dividing the disk into ___ and then further dividing the disk into ___.

statement

Before program code can be written, a programmer needs a clear problem ___, which includes a list of assumptions, a description of known information, and a specification for what constitutes a solution.

3rd; mobile

Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It is a core component of the ___ platform, which also includes cloud computing, ___ devices, and social networking.

operating

Both ____ software and application software are essential for accomplishing tasks with a digital device.

offshoring

Businesses also make extensive use of ___ when manufacturing, services, and product development are moved to other countries.

manual

By 1200 a(n) ___ calculator, called the abacus, had appeared in China.

UPDATE

Changing or replacing the data in a field requires the SQL ___ command.

client

Chrome OS is considered a thin___ because it depends substantially on processing supplied by a remote computer.

inheritance

Classes can be derived from other classes through a process called ___.

sectors

Companies and businesses that create jobs, develop products, and offer services are classified into economic ___.

science

Computer ___ degree programs focus on digital computer architecture and how to program computers to make them work effectively and efficiently.

engineering

Computer ___ degree programs focus on the design of computer hardware and peripheral devices.

compiler; source; object

Computer code must ultimately be converted into machine language so that it can be executed by the processor. That conversion can be performed by a(n) ___, that converts ___ code into ___ code.

whistleblowers

Computer professionals who are compelled to become ___ and speak out against on the job activities that threaten the public interest should understand the potential legal and career risks before they proceed.

contract

Computer professionals work in full-time or part-time jobs, and some are ___ workers, who arrange to work for a company on a temporary basis, usually as consultants for particular projects.

writing

Computer programmers focus on ___ computer programs, but they also plan, test, and document computer programs.

standalone

Computer worms are usually ___ executable files that can spread themselves from one device to another without any assistance from victims.

8

Conventional wisdom tells us that strong passwords are at least ___ characters in length and include one or more uppercase letters, numbers, and symbols.

loyalty

Data for these systems may originate from ___ programs or from customer information collected during the sales cycle.

certificates

Data sent over encrypted channels also falls victim to MITM attacks that use fake digital ___.

serializability

Database tools also support multiple users and use a technique called ___ to handle situations in which more than one user attempts to update the same user record.

distributing

Database tools handle the way data is physically stored, including the process of ___ data across multiple servers.

procedural

Declarative languages, such as Prolog, can be used for problems that require calculations, but those problems are typically better suited to ___ languages.

firewalls; port

Defense against intrusions is also offered by personal ___, which block unauthorized ___ access.

feature

Development can be derailed by unmanaged ___ creep, so the team should have a formal system of change requrests.

algorithm

Devices such as the abacus require the operator to apply a(n) ___ to perform calculations.

XML

Document-related databases store text in JSON format or marked up with ___.

implementation; testing

During the ___ phase of the SDLC, the project team supervises the technicians who set up new hardware, install programming languages and other application ___ tools, create and test applications, and customize software.

decision table

Each Prolog rule has a(n) ___, which defines an outcome or fact, followed by the notation :-, which means "if".

abstraction

Each generation of languages has a higher level of ___ that removes or hides low-level details.

type

Each kind of record is referred to as a record ___.

record; field

Each row in the table is a(n) ___, and each column of the table is a(n) ___.

cluster

Each sector of a disk is numbered, providing a storage address that the operating system can track. Many computers work with a group of sectors, called a(n) ___, to increase the efficiency of file storage operations.

B2B

Ecommerce activities are classified as B2C, C2C, B2G, and ___.

disaster

Enterprises also have ___ recovery plans in place that contain step by step methods to secure data against threats, recover lost data, and resume operations after a disruption.

customer relationship management

Enterprises also use ___ applications to coordinate sales, marketing, and customer support.

breaches

Enterprises strive to prevent data ___, in which personal data is viewed, accessed, or retrieved without authorization.

ICT laws

Ethical decisions should take into account applicable ___, such as the Digital Millenium Copyright Act.

counting

Even before recorded history, humans used various ___ aids, such as pebbles and notched sticks, to keep track of quantities.

conventions

Every file has a name and might also have a file extension. The rules that specify valid file names are called file-naming ___.

directory

Every storage device has a(n) ___ containing a list of files stored on the device.

.app

Executable files for Macs have a(n) ___ extension.

botnet

Hackers who gain control over several computers can organize them into a client-server network known as a(n) ___.

goal

In Prolog jargon, a question or query to a program's database is called a(n) ___.

mechanical

In contrast, ___ calculators, such as the Pascaline and de Colmar's Aritmometer, are designed to carry out calculations autonomously.

engineers

In contrast, software ___ apply formalized techniques to reduce the cost and complexity of software while increasing reliability.

fields

In database software, data is stored in ___, which form records.

one

In databases, records can be related by one-to-___ relationships, one-to-many relationships, or many-to-many relationships.

Babbage

In the 1800s, an English mathematician named Charles ___ proposed to build a device, called the Analytical Engine, that would operate using steam power.

telegraph

In the 1800s, inventors created the ___, which used electricity to transmit data over a distance. Signals were sent usually using ___ code.

prototype

In the 1930s and 1940s, several ___ computers were developed, including the Atanasoff-Berry computer, Z3, Harvard Mark I, Colossus, and ENIAC.

design; development

In the ___ phase of the SDLC, the project team identifies potential software solutions, such as the use of programming languages, application ___ tools, or application software.

psychology

In the context of cyber security, social engineering is a deceptive practice that exploits human ___ by inducing victims to interact with a digital device in a way that is not in their best interest.

security

In theory, increased use of ICT can raise a country's GDP. However, technology has also created national ___ vulnerabilities, and the threat of cyberwarfare continues to grow.

colon

In windows, storage devices are identified by a drive letter, followed by a(n) ___.

certification

Inaddition to a college degree, ___ provides job applicants with marketable credentials pertaining to skills and knowledge of specific software or hardware.

supply

Information systems are used to track and control the ___ chain, which beings with raw materials shipped to a manufacturer, monitors finished goods shipped to distributors, and ends with merchandise delivered to customers.

installed; locked; jailbreak

Mobile apps are designed for smartphones and tablets. They are typically downloaded and ___ from an app store or web sites, though ___ owners' devices must ___ the device to obtain apps from third-party sources.

rootkits

Modern ___ are used to hide malicious code by replacing parts of the operating system with modified code.

dynamic

Modern database tools also handle ___ scaling as devices are added when additional capacity is required.

independence

Modern database tools support data ___, which means separating data from the programs that manipulate data.

relational

Most of these database management systems support ___ databases with data stored in tables, but database tool vendors also offer products for other database models.

vacuum

Most of these early computers used ___ tubes, which paved the way for the architecture of first-generation computers, such as UNIVAC.

multitasking

Most operating systems have ___ capabilities that allow two or more processes to run simultaneously.

upgrades

New versions of software are called ___.

schema-less

NoSQL tools are sometimes said to create ___ databases, but they usually have some type of structure, thought it may be more flexible than the relational model.

messages

OO programmers can create ___ to define what happens once an action is initiated.

Unified

OO programmers often use ___ Modeling Language diagrams to plan the classes for a program.

methods

Objects interact with each other to solve problems by exchanging ___, which initiate an action, a process, or a procedure.

productivity

Office suites are sometimes referred to as ___ software because they offer features that really help get work done.

Atlantic

One of the biggest challenges for this technology was creating a worldwide network that linked continents. In 1858, this worldwide network became a possibility when the first undersea cable was laid across the ___ Ocean.

flat

One of the simplest methods for storing data is a(n) ___ file that consists of a single, two dimensional table of data elements.

source

Open ___ software may be sold or distributed free of charge, but the distribution must include the source code.

buffers

Operating systems also manage ___ that collect and hold data from peripheral devices until a device is ready to accept it.

memory

Operating systems manage resources by monitoring processor cycles, allocating ___ space to programs, tracking stored files, and supervising data exchanges with peripheral devices.

Moore's

Outsourcing practices account in part for declining prices of digital products, but another factor is ___ law, which predicted that the number of transistors in an integrated circuit would double every two years.

portable

PC software that can be carried on a USB flash drive and used without installation is called ___ software.

entropy

Password ___ is a measure of a password's unpredictability.

gateway

Payment authorization is facilitated through a payment ___.

JOIN

SQL also provides a(n) ___ command that can be used to temporarily consolidate two tables so that data can be accessed simultaneously from both of them.

query; client

SQL is a database ___ language that generally works behind the scenes as an intermeidary between the database ___ software provided to users and the database itself.

transistors

Second-generation computers were smaller and less power hungry because they used ___.

assembly

Second-generation languages, called ___ languages, allowed programmers to write programs consisting of abbreviated op codes instead of 1s and 0s.

responsibility

Situations that require computer professionals to make ethical decisions often involve software copyrights, privacy, conflict of interest, use of work computers, software quality, hacking, and social ___.

ransomware

Smarthopnes are the top target for ___ that locks a device and then requests payment for an unlocking code.

DMG

Software for Macs is distributed as ___ packages that are dragged to the Applications folder to complete the installation.

Web

Software is available in several paradigms that affect how it is installed and used. ___ apps run in a browser and require no installation.

EULA; domain

Software licenses, referred to by the acronym ___ can be divided into two main categories: public ___ and proprietary.

subscription

Software pricing models include one-time purchase, ___, trial, and freemium.

PUP

Some software is not exacly malware, but it is a nuisance. A(n) ___ (hint: use the acronym) takes up residence on a digital device and seems impossible to disable or remove.

disruptive

Some technologies have transformative effects on lifestyles, employment, and economics. These ___ technologies include digital photography, the telephone, and smartphones.

productivity

Technologies also have an effect on ___, which is the amount of output that is produced per unit of input.

pay

Television was an additional technology to emerge in the telecommunications industry. Its evolution into ___ television provided another Internet access technology, especially popular in the United States.

encapsulation

The OO paradigm allows programmers to hide the internal details of objects and their methods. This process, called ___, allows objects to be easily reused, modified, and repurposed.

Hyperlink

The ___ data type can be used to store URLs.

memo

The ___ data type is a variable length field for entering text.

text

The ___ data type is used for fixed length fields containing text that is not intended to be mathematically manipulated.

BLOB

The ___ data type is used to store binary data, such as MP3 files and graphics.

logical

The ___ data type is used to store true/false and yes/no data.

information

The ___ industry encompasses those companies that focus on digital equipment, software, communications technologies, and related services.

manager

The core function of a password ___ (sometimes called a keychain) is to store user IDs with their corresponding passwords. Passwords can be stored in the ___, locally, or on a USB drive.

client

The data can be accessed by devices using other platforms through the use of database ___ software.

formatting

The dividing process of a disk is referred to as ___.

1996

The first cellular phones that were able to access the Internet were available in ___.

machine

The first programming languages were low-level ___ languages.

real

The first step in desigining a relational database is to define its fields by specifying a field name and a data type. Integer, date, and ___ data types are used for fields containing data that might be mathematically manipulated.

velocity; density

The five Vs of big data are high volume, high ___, diversified variety, unknown veracity, and low-___ value.

engineering

The information ___ methodology focuses on the data that an information system collects.

code

The instructions for a computer program are sometimes referred to as ___.

microprocessor

The key technology for fourth-generation computers, including personal computers, is the ___.

Hype Cycle

The life of a technology product, innovation, or idea can be tracked using a product life cycle, Rogers' bell curve, or the Gartner ___.

.exe

The main executable file for PC software has a(n) ___ extension.

cardinality

The number of associations that can exist between two record types is referred to as ___.

normalization

The number of tables in a database can be determined by a process called ___, which helps a database designer group fields into record types and avoid data redundancy.

oriented

The object-___ methodology treats an information system as a collection of interacting objects.

interact

The object-oriented paradigm is based on the idea that the solution to a problem can be visualized in terms of objects that ___ with each other.

kernel

The operating system ___ remains in RAM while a device is in operation and manages the device's resources.

analysis; life

The process of planning and building an information system is referred to as systems ___ and design, based on a system development ___ cycle (SDLC) which consists of several phases.

analysis

The project then proceeds to the ___ phase, with the goal of producing a list of requirements for a new or revised information system.

hierarchy

The set of superclasses and subclasses that are related to each other is referred to as a class ___.

strong

The single most effective security measure for digital devices is to password protect access to them. A(n) ___ password is difficult to hack.

flow; use

The team uses documentation tools, such as data ___ diagrams and ___ case diagrams.

common

The telephone industry grew rapidly and is now classified as a(n) ___ carrier because it is similar to shippers that transport goods and passenger over regular routes at set rates.

root; folders

The top-level list of a device is referred to as the ___ directory, which can be subdivided into several smaller lists called subdirectories that are depicted as ___.

logical

The way that data is actually stored is referred to as the ___ storage model.

interception

There are several types of ___ exploits that surreptitiously capture data.

virus; executable

There are several types of malware. A computer ___ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate ___ file on a host computer.

outsourced

These goods may be produced in house or they may be ___ to other companies.

human

These modules typically include applications for ___ resources management, financial management, SCM, CRM, and manufacturing.

success

These requirements are sometimes called ___ factors.

out; shards

These tools work well when databases scale ___ (horizontally) and when databases are broken into subsets called ___.

integrated

Third generation computers were even smaller because they used ___ circuits.

variables; constants

Those parameters may include ___ that represent values that can change, or ___ that represent unchanging values.

loading

Through a process called side-___, an app from a source other than an official app store is installed on a device.

quarantine

When an antivirus software detects malware, it can try to remove the infection, put the file into ___, or simply delete the file.

leak

When an operating system fails to correctly track the allocation of RAM space to applications, a memory ___ may produce "Program Not Responding" error messages.

cookie

When customers put items in their online shopping carts, the ecommerce site's server sends a(n) ___ to the customer's computers containing the ID number of a shopping cart.

validation

When designing fields, a database designer can also include field formats, field ___ rules, and lookup routines to reduce data entry errors.

detailed

When the solution requires custom programming, a(n) ___ design phase produces specifications that describe the way the new information system should interact with users, store data, process data, and format reports.

related

When two sets of records are ___, database software allows you to access data from both tables at the same time.

page

When you want to change margins, headers, and footers, you can use ___ layout tools.

Finder

Windows File Explorer and the OS X ___ are examples of file management utilities provided by operating systems.

visual

With a clear plan, a programmer can begin coding using a text editor, program editor, or ___ development environment.

processing

Word ___ software assists you with composing, editing, designing, printing, and electronically publishing documents.

Detection

___ activities recognize attacks and trigger a corrective response.

trojans

___ are a type of standalone malware that masquerades as useful utilities or applications, which victims download and install unaware of their destructive nature.

multithreading

___ capabilities allow an operating system to run multiple simultaneous operations for a single program.

Preventative

___ countermeasures shield vulnerabilities to render an attack unsuccessful.

Hierarchical

___ databases allow only one-to-many relationships.

Graph

___ databases connect nodes much like a sociogram.

Relational

___ databases exist as a series of tables that can be related by common fields.

Information systems

___ degree programs focus on applying computers to business problems.

Data

___ files can be created and manipulated by using a variety of tools, including word processing and spreadsheet software.

Blacklist

___ filters block mail that originates from IP addresses of known spammers.

Permission

___ filters block or allow mail based on the sender's address.

Content

___ filters examine the content within a message for certain words or phrases commonly used in spam emails.


Set pelajaran terkait

Chapters 6,7,8 Human Anatomy and Physiology

View Set

PSCI 2306: Second Half Exam Review Terms

View Set

5 | Sequences: Lists and Tuples (Self Check)

View Set

chapter 13- licensing requirements

View Set

Chapter 5: Cultural Diversity [PrepU Questions]

View Set

Chapter 29 Management of Patients with Nonmalignant Hematologic Disorders

View Set