CSCI Final (4) + Microsoft Access
NAS devices handle the following tasks:
- Automatically back up all computers connected to the network - Act as a repository for files to be shared across the network - Function as an access gateway to allow any computer on the network to be accessed from a remote location via the Internet
When determining how big of data plan you need to buy, what should you look to assess the situation?
- download apps, stream music, or play online games? - watch streaming video? - download files attached to e-mails or from your company website? - use apps that are communicating with the Internet?
Amazon uses what proprietary digital format extension?
.azw extension
What is the result of the following expression?2 * 5 + 8 - 6 / 2
15
Most home wireless routers can support up to?
253 wireless connections
Maximum range of 802.11n or 802.11ac?
350 feet
Coaxial cable has all of the following, EXCEPT
4 pairs of copper wires
SQL is an example of a ____ category programming language?
4GL
How long does copyright last?
70 years plus the life of the author
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
C#
A Microsoft programming language developed to compete with Java
Cat 5E
A UTP cable commonly found in wired Ethernet networks, designed for 100 Mbps-wired Ethernet networks
Initial Value
A beginning point
Visualizations
A chart, graph, map to depict data
Trojan horse
A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge
Virus
A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged
Hexadecimal Digit
A digit with 16 possible values: 0-9 and A-F.
Datasheet view
A grid that enables you to add, edit, and delete the records of a table.
Record
A group of related fields
Table (file)
A group of related records in a database
Table
A group of related records; a collection of data
Network
A group of two or more computers (or nodes) that are configured to share information and resources such as printers, files, and databases
Cascading Style Sheet (CSS)
A list of rules that defines in one single location how to display HTML elements.
Sort
A method of listing records in a specific sequence (such as alphabetically).
Peer-to-Peer (P2P) network
A network in which each node connected to the network can communicate directly with every other node on the network
Local Area Network (LAN)
A network in which the nodes are located within a small geographic area.
Wide Area Network (WAN)
A network made up of local area networks (LANs) connected over long distances.
Decision Point
A place where a program must choose from a list of actions based on the value of a certain input
Summary report
A report generated by a management information system that provides a consolidated picture of detailed data; these reports usually include some calculation or visual displays of information.
Detail report
A report generated by a management information system that provides a list of the transactions that occurred during a certain time period.
Exception report
A report generated by a management information system that shows conditions that are unusual or that need attention by system users.
Criteria row
A row in the Query Design view that determines which records will be selected.
Code (compression/decompression)
A rule, implemented in either software or hardware, which sequeezes a given amount of audio and video into less space. Ex: MPEG-4, H.264, DivX
Hypertext Markup Language (HTML)
A series of tags that define how elements on a website should be displayed in a browser. Adobe Dreamweaver helps with this. Formatting and display instructions for webpages using tags
Proxy Server
A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
VBScript
A subset of Visual Basic, used to introduce dynamic decision making into web pages
Whole-house surge protector
A surge protect that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges
JavaScript Object Notation (JSON)
A syntax for exchanging information between computers
Which type of virus was the famous Michelangelo virus?
A time bomb
Electronic Ink (E ink)
A very crisp, sharp grayscale representation of text achieved by using millions of microcapsules with white and black particles in a clear fluid
Where would you enter the e-mail address for a person whom you do not want the recipient to know you are including with the message? A. CC: Line B. BCC: Line C. Signature Line
A. BCC: Line
How would you reply to an e-mail you've received that has multiple recipients, all of whom you would like to see your reply? A. Click Reply to All B. Click Forward C. Click Reply
A. Click Reply to All
Which of the following is NOT a panel of code displayed in the CodePen editor?
ASP
Which of the following would help improve a wireless signal throughout a network?
Access Point
A(n) ____ is a wireless connectivity device that is connected with a wire to the router and extends a Wi-Fi signal in a designated area
Access point
Which of the following is NOT used to protect a wireless network?
Activating packet switching
Once debugging is done, can the created software program be released?
Actually, after debugging, the last step is to test and document the program
Once I've defined my problem statement, can I start coding?
Actually, after defining the problem statement, the next steps in a programming project is for programmers to translate the programs into an algorithm
How do I create fields in a database?
Actually, you can create the fields manually by assigned field names
What happens after programmers create an algorithm?
After programmers create an algorithm, they select a programming language and translate the algorithm into that language.
Which feature is used to define data in a data table?
All of the above
Which of the following is a TRUE statement when considering using databases instead of lists?
All of the above (data integrity can be ensured with a database, data can be easily shared among users, and data-entry errors can be minimized with databases)
In selection the most appropriate language it is useful to know
All of the above (how quickly the final code must run, how much space the final code delivered can occupy, if there is a specific target environment)
Which of the following allows you to connect to the Internet wirelessly?
All of the above (mobile hotspot, 4G LTE, WiFi)
Syntax
An agree-on set of rules defining how a language must be structured
Rapid Application Development (RAD)
An alternative program-development method; instead of developing detailed system documents before they produce the system, developers first create a prototype, then generate system documents as they use and remodel the product
Extranet
An area of an intranet that only certain entities or individuals can access; the owner of the extranet decides who will be permitted to access it
Network Interface Card (NIC)
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection
Database Administrator (database designer)
An information technology professional responsible for designing, constructing, and maintaining databases. They use MySQL (a tool) sometimes to monitor
What is an IDE?
An integrated development environment (IDE) is a development tool that helps programmers write, compile, and test their programs.
codepen.io
An interactive site where you code with HTML, CSS, and Javascript
Report
An object that contains professional-looking formatted information from underlying tables or queries.
Table
An object used to store data, organizing data into columns and rows.
Wi-Fi Alliance
An organization that manages Wi-Fi standards
Spyware
An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system
Transport Layer Security (TLS)
An updated extension of Secure Sockets Layer.
Unstructured data
Audio clips, video clips, pictures, and extremely large documents. Also called binary large object (BLOB)
What does iris scanning do?
Authenticate you and log you in to your phone by scanning your iris (color)
Which type of server is designed to keep track of who is logging on to the network and which network services are available?
Authentication
_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user
Authentication
________ is the process that requires users to prove that they have permission to access a computer network.
Authentication
What's the best type of server to control user access to a network?
Authentication server
What are authentication servers?
Authentication servers keep track of who is logging on to the network.
The Access data type used to automatically assign an incremental number to each record is _____.
AutoNumber
Which of the following characteristics of an e-mail header should cause suspicion? A. Multiple recipients B. No subject line C. Unknown Sender
B. No subject line
Which of the following utilities is used to recover in the event of a loss or damage?
Back Up Databases
_____ is another name for data transfer rate
Bandwidth
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
Bandwidth
Wireless Networks (Wi-Fi)
Based on the IEEE 802.11 standard, established by IEEE
Which of the following is used to increase security on a client/server network?
Bastion host
Programmers choose Visual Basic why?
Because programmers often like to build a prototype
________ viruses are often transmitted by a flash drive left in a USB port.
Boot-sector
Why would you want to disable SSID broadcast?
Both A and B (to make it difficult for a neighbor to connect to your network AND to make it more difficult for hackers to detect your network)
Artificial intelligence
Branch of a computer science that attempts to create computers that think like humans
A(n) _____ transfers data between collision domains.
Bridge
When setting up a network, which of the following is the suggested order for turning on equipment?
Broadband mode, router, computers, and TVs
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
Bus
__ systems are used mostly at the executive level to improve business decision making with databases and other fact-based support systems
Business intelligence
Which type of information system is used mainly by executive managers and gathers data from data warehouse and data marts?
Business intelligence system
How are classes defined
By Information (data) within the class and Actions (methods) associated with the class
In the sound byte, problems in the help desk database are ranked
By importnace
Is there a good reason to set up a network for two computers?
By setting up a network, you can share a broadband Internet connection.
Many modern operating systems are written in ________.
C
Which of the following is NOT a good programming language to begin with to learn how to program?
C++
When you wish to send an e-mail to multiple parties, you enter their addresses in the To: line separated by which of the following? A. Spaces B. Periods C. Commas
C. Commas
What languages do programmers use if the problem requires a lot of "number crunching?"
C/C++
method used on Ethernet networks to avoid data collisions
CSMA/CD
Controls how the elements look
CSS
The type of fonts and colors used for each element on the page is defined by
CSS
Which of the following is true regarding table views?
Changes made in Datasheet view are automatically saved when you move the insertion point to a different record
Field property
Characteristic of a field that determines how it looks and behaves.
Which of the following tasks should you not consider performing on a public-accessed secured network?
Check your checking account balance.
Which server is used to control all data transmitted between the internal network and external networks?
Communications server
Record
Complete set of all the fields about one person, place, event, or concept.
CAPTCHA stands for
Completely Automated Public Turing Test To Tell Computers and Humans Apart
CAPTCHA stands for ________.
Completely Automated Public Turing Test to Tell Computers and Humans Apart
JPEG file
Compressed just a bit, keeping most of the details or compressed a great deal, losing some detail
Creating and distributing ________ is one of the most widespread types of cybercrimes.
Computer viruses
Mobile Broadband
Connections to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access
Multitable Query
Contains two or more tables, enabling you to take advantage of the relationships that have been set in your database.
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
Violation of a holder's right is known as
Copyright infringement
IP Categories
Copyright, patent, trademarks, service marks, and trade dress
Public Domain
Copyrightable works whose copyright has expired, or that never had copyright protection
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Cybercrime
How exactly are dynamic addresses assigned?
DHCP
assigns users IP addresses for the duration of a session
DHCP
A small subset of data from a data warehouse is knowns as
Data mart
The process by which great amounts of data are analyzed and investigated is known as?
Data mining
__ is the process by which great amounts of data are analyzed and investigated for significant patterns or trends within the data
Data mining
Time-variant data
Data that doesn't pertain to one period in time.
What are decision points?
Decision points are points at which the program must choose from different actions, based on the value of its current inputs.
Field size
Defines the maximum number of characters that a field can hold in a database
How does anti-virus software work?
Detection, stopping virus execution, prevention of future infection
Why should programmers be prepared to learn many different languages?
Different problems have different needs
DVRs
Digital Video Recorder
SiriusXM and HD Radio are broadcast in?
Digital formats
Tabular layout
Displays fields horizontally.
Stacked layout
Displays fields in a vertical column.
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
Electromagnetic interference/EMI
Tag
Electronically identfying someone in a photo or post
Layout view
Enables users to make changes to a layout while viewing the data in the form or report.
Query
Enables you to ask questions about the data stored in a database and provides answers to the questions in a datasheet
Design view
Enables you to change advanced design settings you cannot see in Layout view, such as removing a layout control.
Report View
Enables you to determine what a printed report will look like in a continuous page layout.
A bridge sends information between two networks.
FALSE
MAC adapters perform specific tasks to enable nodes to communicate on a network
False
Most modern operating systems do not include some type of NOS functionality
False
Network technicians are expected to personally resolve all problems referred to them with no escalation
False
Problems are ranked by importance based on the time when they are lovged
False
Ring topologies are the most widely used topology
False
The main advantage of a ring topology is that the failure of one computer does not affect the entire network.
False
Tiles provide a one page summary of all visualizations
False
You need to be familiar with HTML and CSS to use Squarespace (T/F)
False
Which of the following cables is composed of plastic or glass fibers that transmit data at extremely fast speeds?
Fiber-optic
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
Which of the following provides a visual representation of the patterns in an algorithm?
Flowchat
Interpreter
For a programming language, translates the source code into an intermediate form, line by line; each line is then executed by as it's translated
Which of the following is an example of an Access object?
Form
Circuit Switching
Forms a dedicated connection between two communicating parties. Where a dedicated connection is formed between two points (such as two people on telephones) and the connection remains active for the duration of the transmission
Patents
Grant inventors the right to stop others from manufacturing, using, or selling (including importing) their inventions for a period of 20 years from the date the patent was filed
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
Grey/gray
Frame
Groups of data packets that are sent together in a package
Fair Use
Guidelines allowing people to use portions of a copyrighted work for specific purposes without recieving prior permission from the copyright holder
can be used for a small home-based business
HAN
HDTV or UHDTV have multiple
HDMI connectors
Controls which elements display
HTML
The definition of an element like a paragraph on a page is done through
HTML
What's the most basic formatting language for web applications?
HTML
Which of the following establishes elements on a web page?
HTML
transfers data from servers to browsers
HTTP
Packet Screening
Having a screening router examine data packets to ensure they originated from or are authorized by valid users on a network
What Windows feature shares files with other computers on a network?
HomeGroup
Which Windows feature facilitates sharing peripherals and info on a home network?
HomeGroup
Web server
Hosts websites that can be accessed via the Internet
allocates IP address
ICANN
Waterfall Model
Idealized view of software development
Real Property
Immoveable property such as land or a home (often called real estate)
If Else
In C++, a binary decision in the code where the program can follow one of two paths: If the decision is mad eon way, the program follows one path; if made the other way (else), the program follows another path
Select query
In Structured Query Language, displays a subset of data from a table (or tables) based on the criteria specified
For
In Visual Basic, programmers use the keyword For to implement a loop; after the keyword For, an input or output item is given a starting value, and then the statements in the body of the loop are executed
Next
In Visual Basic, programmers use the keyword Next to implement a loop; when the Next command is run, the program returns to the For statement and increments the value of input or output item by 1 and then runs a test cycle
Inheritance
In object-oriented analysis, the ability of a new class to automatically pick up all the data and methods of an existing class and then extend and customize those to fit its specific needs
Reusability
In object-oriented analysis, the ability to reuse existing classes from one project for another project
Derived Class
In object-oriented analysis, the modified class
Base Class
In object-oriented analysis; the original class
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Incremental partial
Cybercriminals
Individuals who use computers, networks, and the Internet to perpetrate crime
Online reputation
Information available about you in cyberspace that can influence people's opinions of you in the real world
Digital (Digitized)
Information measured and converted (from analog data) to a stream of numerical values
An __ is a software that is used to gather and analyze data
Information system
What are the 3 important features to look for in a loop?
Initial value, set of actions, and test condition
Argument
Input used to produce output for a function.
What are ways to improve a wireless signal
Installing an access point or wireless range extender are good options
100 GbE is used for major transmission lines of the Internet known as the?
Internet backbone
The collection of large national and international networks used to establish the Internet is called the a. T1 b. highway system c. oc d. internet backbone
Internet backbone
section of a hard drive that stores web page information
Internet cache
A typical ________ is made up of one or more network switches to which ISPs connect.
Internet exchange point/IXP
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Which of the following is NOT a common network architecture type?
Intraoffice area network (IAN)
Is copyright protection automatic
It accrue as soon as you create the intellectual property and set it down in digital or physical form
Which of the following best describes HTML?
It is used to tag elements of web pages and give them structure and formatting.
What does Microsoft .NET do?
It's a software that is designed to let websites "talk" to each other easily
Most android apps are written in _____
Java
What language do programmers use for applications that need to collect information from networked computers
Java and C#
Controls what a user can do
JavaScript
The algorithms that define the interactivity of the web page with users are often coded in
JavaScript
________ is the most commonly used scripting language for creating DHTML effects.
JavaScript
JSON stands for
JavaScript Object Notation
__ allows users to interact with a web page
Javascript
Which of the following is NOT a language used in developing websites?
KML
What are some dedicated software for e-texts?
Kindle and NOOK
_ systems include expert systems and natural language processing as part of a DSS
Knowledge-based
The simplest view you can use to modify control widths in a form is:
Layout view
Which of the following statements is false (Access)?
Layouts for forms and reports are the predefined sets of colors, fonts, and graphics
What app lets you find which area library has the book you want?
Libby app
The main reason to set a field size in Access is to:
Limit the length of values in a table.
Which of the following helps to protect a wireless network from piggybacking?
Limiting the wireless signal range
Which of the following specifications is used to simplify attachments to e-mail messages?
MIME
Exception report
MIS report generated to show unusual situations that require attention
Digital music file types
MP3, AAC, WMA, AAC-format, DivX, MPEG-4, (.mp4) WMV, and Xvid
A _ provides timely and accurate information for critical business decisions
Management information system
Processing
Manipulating or organizing data into information
Which of the following cannot be adjusted in the Property Sheet?
Mathematical expression
Which of the following is an example of an e-mail client?
Microsoft Outlook
Which hardware device connects your computer to the Internet?
Modem
Home network servers
More sophisticated type of NAS device. It's designed to store media, share media across the network, and back up files on computers connected to a home network
Some of my devices don't need wireless and would work better with a wired connection. Are there different types of wired networks I need to choose from?
Most wired networks for the home are Ethernet networks.
Which type of database organizes data by measure and feature attributes?
Multidimensional database
MIME stands for ________.
Multipurpose Internet Mail Extensions
adapter card that connects a computer to a network
NIC
Is Pharming a virus type?
No
Which of the following is true for the Query Wizard?
No criteria can be added as you step through the Wizard
Will SMTP keep my e-mails safe?
No, SMTP cannot keep your e-mails safe, but there are other security measures like encryption that can keep your e-mails safe.
Do instant messaging (IM) services use secure data transmission software to provide security of data exchanged?
No, most instant messaging services don't use secure data transmission software. Hence it is not safe to exchange important data over IM.
Once compilation is done, is the program finished?
No, programmers still need to test the code to see whether the program behaves as it should
In the sound byte, the students wireless connectivity problem turned out to be
Not a problem
Data
Numbers, words, pictures, or sounds that represent facts, figure, or ideas; the raw input that users have at the start of a job
High-speed ________ communication lines use fiber-optics.
OC
___ software provides flexible viewing and manipulation of data in a data warehouse
OLAP
____ fields hold things such as pictures and video clips
OLE object
What's the most popular language for writing macOS applications?
Objective C
Which programming language is most commonly used for iOS devices and (OSX)?
Objective C
Where is the Wireless Network Connection button located on the desktop?
On the Windows Taskbar
After programmers finish coding, what do they do next?
Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler
When can programmers begin developing a detailed algorithm?
Once the programmer understands exactly what the program must do and have created the final problem statement
Transmission Control Protocol (TCP)
One of the original two protocols developed for the Internet. Uses a process called three-way handshake
Which type of relationship should be used to connect a Password table to a User Account table?
One-to-one relationship
HaLow
Operates on the 801.11ah standard. Twice the range of current Wi-Fi and is also more robust (can easily penetrate walls or other barriers)
network in which each node connected to the network communicates directly with every other node
P2P
A network consisting of devices used by a single person connected via wireless media is a?
PAN
The type of network used for communication among a laptop and smartphone using Bluetooth is a
PAN
used by a single individual connecting devices using wireless media
PAN
Element
Part of a web page; in HTML, a part of tags and the text between them
Web Services (.NET Framework)
Part of the Microsoft .NET Framework, programs that a website uses to make information available to other websites
In the sound byte, the e-mail security flaw was resolved by downloading and installing a software_ patch from the manufacturer
Patch
Tethered downloads
Paying for music and owning it, but restricted on its use
P2P
Peer-to-peer; node can communicate directly with every other node on the network
Network Administrator
Person who maintains networks for a business or organization
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Phishing
Pharming
Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites
__ is a set of tools used to analyze data from a variety of sources and present components of the data visually to gain insights
Power BI
The field that has a unique entry for each record in a database is called the?
Primary key
Use the ____________ to see exactly what the printed report will look like before printing.
Print Preview
What is the first step of the system development life cycle (SDLC)?
Problem and Opportunity Identification
List the 6 steps of SDLC
Problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation
Visual Programming Languages
Programming language that uses graphical blocks to represent control elements and variables
Active Server Pages (ASP), JavaServer Pages (JSP), PHP (PHP: Hypertext Preprocessor)
Programming languages used to build websites with interactive capabilities; adapts the HTML page to the user's selections
Rootkit
Programs that allow hackers to gain access to your computer and take almost complete control of it with your knowledge. These programs ares designed to subvert normal login procedures to a computer and hide their operations from normal detection methods
Where to find free e-books?
Project Gutenberg
Report Wizard
Prompts you for input and then uses your answers to generate a customized report.
Intangible personal property
Property that can't be touched-- or potentially even seen-- yet it still has value
Tangible Personal Property
Property that has substance like your smartphone or car
Simple Query Wizard
Provides a step-by-step guide to help you through the query design process.
Layout control
Provides guides to help keep controls aligned horizontally and vertically and give your form a uniform appearance.
Which Access database object enables you to ask questions of the database?
Query
Which tool is used to search for information in a database?
Query
The software holding area for print jobs is called a print ____
Queue
Power BI uses __ to apply artificial intelligence to analyze data, looking for pattersn
Quick insights
RAW files
Records all the original image informations, so it's larger than a compressed JPEG file
You edit several records in an Access table. When should you execute the Save command?
Records are saved automatically; the save command is not required
Intellectual Property (IP)
Refers to products derived from the mind, such as works of art and literature, inventions, and software code
In the sound byte, the printer problem was resolved by
Reinstalling corrupt printer server software
In the sound byte, at the end of the day, a network technician should do all of the following except
Report to your shift supervisor before leaving
Which of the following is NOT a data mining technique
Reporting
For complete access to all visualization tools, you should use which of the following?
Reports
Which of the following statements about reports is false?
Reports are primarily used to modify data
If you own copyright to a work, what do you own?
Reproducing the work, preparing derivative works, distributing the work to the public, public performance, and public display of the work
AND condition
Returns only records that meet all criteria.
OR Condition
Returns records meeting any of the specified criteria.
The _____ topology uses tokens to control data transmission.
Ring
A(n) _____ sends data between two networks.
Router
Which of the following statements is TRUE?
Router firmware should be kept up to date
Referential Integrity
Rules in a database that are used to preserve relationships between tables when records are changed.
Which protocol is used to transmit e-mail over the internet?
SMTP
the protocol used to send email over the internet is
SMTP
used for transmission of e-mail messages across the Internet
SMTP
________ is malware that tries to convince you that your computer is infected with a virus.
Scareware
Give 2 examples of Visual Programming Languages
Scratch and App Inventory
In the acronym HTTPS, the S stands for ________.
Secure
Benefits of Networks
Sharing an Internet connection, sharing printers and other peripherals, sharing files, and common communications (must be running same OS)
SMTP stands for ________.
Simple Mail Transfer Protocol
What is SMTP?
Simple mail transfer protocol (SMTP) is the protocol responsible for sending e-mail messages from an e-mail client to an e-mail server.
Data mart
Small slice of related data from a data warehouse grouped together and separated from the main body of data in the data warehouse so that related sets of data can be analyzed
Patch
Software repair
Network Operating System (NOS)
Software that handles requests for information, Internet Access, and the use of peripherals for network nodes, providing the services necessary for the computers on the network to communicate. Examples include: Windows Server and SUSE Linux Enterprise Server
Network Operating System (NOS)
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.
Malware
Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include: spyware, viruses, worms, and Trojan
Which of the following statements is false (Access)?
Stacked layouts are more common for reports because they use less paper when printed
4G
Stands for 4th Generation. The latest mobile communication standard with faster data transfer rates than 3G
Which of the following is the most commonly used client/server network topology?
Star
Firmware
System software that controls hardware devices
Business Intelligence System
Systems used to analyze and interpret data in order to enable managers to make informed decisions about how best to run a business.
prepares data for transmission providing for error checking and resending lost data
TCP
The main suite of protocols used on the Internet is ________.
TCP/IP
__ is the main suite of protocols used on the Internet?
TCP/IP
The Internet is a WAN
TRUE
Where is the data in a database stored?
Table
Why is it important to establish relationships between tables?
Table relationships join tables together so queries can work with fields from more than one table
A query's specifications as to which tables to include must be entered on the:
Table row of the query design grid
In order to summarize data in a report and override the sort order of the record source you would use:
The Group, Sort, and Total Pane
does the IP address remain the same or can it change automatically
The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.
Which of the following about the Total row in Query design is false?
The Total row applies only to non-numeric fields
Dynamic Decision Making
The ability of a web page to decide how to display itself based on the choices the reader makes
Business Intelligence
The ability to improve business decision making with databases and other fact-based support systems
Plagiarism
The act of copying text or ideas from someone else and claiming them as your own
Pretexting
The act of creating an invented scenario (the pretext) to convince someone to divulge information
Data staging
The act of formatting data from source databases before fitting it into a data warehouse; it consists of three steps: extraction, transformation, and storage.
Computer Forensics
The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime
Executable Program
The binary sequence that instructs the CPU to run the programmer's code
Portability
The capability to move a completed solution easily from one type of computer to another
Resolution
The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen
Local Administration
The configuration and maintenance of the network must be performed on each individual computer attached to the network. Peer-to-Peer (P2P) is an example
Network Architectures (network designs)
The design of a computer network; includes both physical and logical design. Can be classified by the following: the distance between nodes, the way in which the network is managed (or administered), or the set of rules (or protocol) used to exchange data between network nodes
What's the first step in programming?
The first step in programming is to define the problem statement.
Disadvantage of Networks
The initial time it takes to set up the network
Source Code
The instructions programmers write in a higher level language
Internet of Things (IoT)
The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer interaction
Data transfer rate (bandwidth)
The maximum speed at which data can be transmitted between two nodes on a network; measured in megabits per second (Mbps) or gigabits per second (Gbps)
CSMA/CD
The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals; data collision avoidance method
Unshielded twisted pair (UTP) cable
The most popular transmission media option for Ethernet networks. It is composed of four pairs of wires that are twisted around each other to reduce electrical interference
What kind of wire do I use to set up an Ethernet network?
The most popular transmission media option for wired home Ethernet networks is unshielded twisted-pair (UTP) cable
Network topology
The physical or logical arrangement of computers, transmission media (cable), and other network components.
Quarantining
The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files
Release to Manufacturers (RTM)
The point in the release cycle, where, after beta testing, a manufacturer makes changes to the software and releases it to other manufacturers, for installation on new machines, for example
General Availability (GA)
The point in the release cycle, where, after release to manufacturers, software is available for purchase by the public
Phising
The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or SSN or other sensitive information that could lead to identify theft
Programming
The process of translating a task into a series of commands a computer will use to perform that task
Peer-to-Peer (P2P) sharing
The process of users transferring files between computers. Examples being BitTorrent
Objective C
The programming language most often used to program applications to run under OS X
Which of the following information is NOT contained in a packet?
The size (in bytes) of the packet
What are the critical issues to consider when selecting the best language for a specific problem?
The speed, the space requirements, and the amount of staffing on hand
Code editing
The step of programming in which a programmer types the code to be executed
Null
The term uses to describe a blank field.
Which of the following is NOT an advantage of star topology?
They are cheap to expand.
How do I share an Internet connection on an Ethernet network?
To share an Internet connection on an Ethernet network, you need a router.
_______ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks
Top-down design
A system that is designed to help keep track of everyday business activities is a(n)?
Transaction-processing system
Which kind of business information system is used at an operational-level of an organization and helps to keep track of daily activities?
Transaction-processing systems are used to keep track of daily operational-level activities
A network technicians used ghosting software to install multiple programs on multiple lab computers
True
An organizations computer graveyard can be a source for replacement parts
True
Codepin.io provides three panels for users to interact with HTML, CSS, and JavaScript (T/F)
True
In Squarespace, images, text, and pages can all be edited or deleted easily (T/F)
True
In the ring topology, a device grabs the token when it needs to send data.
True
In the ring topology, data flows around the circle in one direction only.
True
When you enter data using an Access form, the data in the underlying table is also updated.
True
________ technology places data packets inside other data packets.
Tunneling
What transmission media is used for normal telephone service?
Twisted-pair cable
Which of the following is NOT a home operating system that supports P2P networking
Unix
What is the most common type of transmission media in wired HOME networks?
Unshielded Twisted Pair cable
What wired transmission is used on a network?
Unshielded Twisted Pair cable, Twister Pair cable, Coaxial cable, Fiber-optic cable
Which of the following is NOT a type of cable used in wired networks?
Unshielded coaxial
Which of the following cables is the most popular transmission media for Ethernet networks?
Unshielded twisted-pair (UTP)
Spam
Unwanted or junk e-mail
As a business grows it needs to?
Use a database management system that can collect and store data from multiple sources
How to secure wireless network?
Use encryption and security protocols, change your network name (SSID), disable SSID broadcast, change default password, create a passphrase, implement media access control, limit your signal range, apply firmware upgrades, disable remote access, keep your router firmware up to date
Document Object Model (DOM)
Used by JavaScript to organize objects and page elements.
Which of the following is NOT an encryption security protocol?
WIP
Analog
Waves that illustrate the loudness of a sound or the brightness of the colors in an image at a given moment in time. Continuous.
A(n) ________ server is used to host an Internet site.
Web
Which server would be included on a network to enable the hosting of a web site?
Web server
Data centralization
When data is maintained in only one file
Urban Legends
When hoaxes become so well known that they're incoroprated into society as true events even though they're false
Data breach
When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data
Data integrity
When the data in a database is accurate and reliable
But, if I include the primary key of one table in the other table, won't I have two primary keys for a record?
When the primary key of one table is included in another table to establish a relationship between the two tables, it is called a foreign key in the related table
One-to-many relationship
When the primary key value in the primary table can match many of the foreign key values in the related table.
Cascade Delete Related Records
When the primary key value is deleted in a primary table, Access will automatically delete all foreign key values in a related table.
Data collision
When two computers send data at the same time and the sets of data collide somewhere in the connection media.
Which of the following are NOT a typical wired network transmission medium?
Wi-Fi
802.11ad is known as?
WiGig (7 gigabits at 60 GHz frequencies)
What is used to indicate a search term can be anywhere in a string of text?
Wildcards
Which of the following is LEAST LIKELY to be an obstacle for a wireless network
Window
What transmission media is used on a wireless network?
Wireless (wi-fi)
Servers
Workhorses of the client/server network
________ is a consortium of organizations that develops web protocols and sets standards.
World Wide Web Consortium/W3C
________ defines the content in terms of the data that is being described rather than how it is to be displayed.
XML
Which of the following is an example of an instant messenger service?
Yahoo Messenger
is there an alternative to remembering IP addresses
Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.
Do I need any special software to use dedicated servers?
Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate
With respect to importing data into Access, which of the following statements is true?
You can assign a primary key while you are importing Excel data.
How do I perform encryption?
You can encrypt messages using private-key encryption. In private-key encryption, only the two parties involved in sending and receiving the message have the code.
Which of the following statements is true (Access)?
You can group records to show a list of properties by state
How does the computer know the IP address of other computers?
Your computer consults a database maintained on a domain name server (DNS) to determine other IP addresses
What are the risks of an unsecured wireless network?
Your wireless network can be piggybacked or hacked
Knowledge Based System
a business intelligence system that provides intelligence that supplements the user's own intellect and makes the decision support system more effective
When the Event element is added to a template in Squarespace, it can be configured to include
a calender
Access Card Reader
a device that reads info from a magnetic strip on the back of a credit-card like access card
In public-key encryption, the two keys—one for coding and one for decoding—are known as ________.
a key pair
When setting up a home network, make sure each node has ____
a network adapter
WAN
a network that covers the greatest distance
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
access card reader/card reader
A wireless __ provides wireless connectivity on an existing ethernet network
access point
Installing a(n) __ on an existing ethernet network will provide wireless connectivity
access point
IPv6 uses 128 bits to assign a: a. data packet to each transmission b. memory address to the CPU c. address to every device connect to the internet d. destination internet address to each e-mail
address to every device connected to the Internet
IPv6 uses 128 bits to assign an
address to every device connected to the internet
the rise of the internet of things has meant
all of the above
Analytics that are automatically collected by a Squarespace site include
all of the above (the traffic to the site.the percentage of users from mobile devices.the most popular content on site.)
A coding community like CodePen can help you learn quickly because
all of these
Form
allows editing of individual records
JSON, JavaScript Object Notation is useful because it
allows web services to exchange information
Squarespace collects data on visitors viewing your site using ________.
analytics
Website _____ provide website owners with reports on website use.
analytics
The Sound Byte suggests a network technician needs all of the following EXCEPT __________.
anger management training
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
antivirus
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
applet
A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.
applet
A school network might use a(n) __ server to distribute software such as Microsoft Office
application
A(n) ____ server acts as a repository for software such as Microsoft Office
application
For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.
attachments
MIME is primarily associated with this feature of e-mail
attachments
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
The main path of the Internet along which data travel the fastest is known as the Internet ________.
backbone
The maximum speed at which data can be transmitted between two nodes on a network is called the ____
bandwidth
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
packet switching send information between two points
by breaking it into small chunks and sending the chunks across different routes
Twisted-pair cable
cable made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)
list of rules that define how to display HTML elements
cascading style sheet
A client/server network is an example of ____ administration
central
client/server
central computer provides information and resources to other computers
Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet
cloud
a server not physically located at a company's site
cloud
The shielded cable with a solid copper core that is more resistant to interference than twisted-pair is known as __ cable
coaxial
encryption is used to
code your email so only one person can decipher it
text file for storing personal preferences pertaining to websites
cookie
MAN
covers a city
Using your computer for non-work activities while you are being paid to work is known as ________.
cyberloafing
using an employer's computer for nonwork activities
cyberloafing
Unnecessary duplication of data in a database is referred to as
data redundancy
Metadata
data that describes other data
A ____ server provides client computers with access to stored information
database
A(n) ____ is a collection of related data that can be stored, organized, and queried.
database
allows client computers to access a database
database
Which of the following is NOT considered metabase?
database name
router
directs data traffic between networks
switch
directs signals to the intended device
A ____ takes place of an IP address because its easier for humans to recall than a long string of numbers
domain name
An IP address in the form 197.169.100.1 is called a(n) ________.
dotted quad
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
When using ________ addressing, a computer is assigned a temporary address from available IP addresses.
dynamic
temporary IP address for a computer that is assigned from a pool of available IP addresses
dynamic addressing
specifically deals with the SMTP communication method
A(n) _____ is a specialized computer with the sole function of storing, processing, and sending email
e-mail server
peer-to-peer
each node can communicate directly with every other node on the network
An IDE is a tool that has support for
editing and debugging
Fiber-optic cable most likely would be used in a business network when?
electrical or magnetic interference is present
Text such as <b>This should be bolded.</b> is an example of an HTML ________
element
In addition to text and images, you can add ________ like a calendar on a Squarespace web page.
elements
A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.
extranet
A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.
false
a multidimensional database uses two dimensions in which to organize data
false
a small slice of data warehouse is called a data mine
false
data warehouses capture data only from one time period
false
if you use an internet cache, then the information displayed in your browser is automatically refreshed
false
instant messaging is secure because of the type of encryption used
false
the term dotted quad means you have four dots in a row in your Java source code
false
A(n) ________ cable contains a glass or plastic core.
fiber-optic
The fastest broadband Internet service is usually
fiber-optic
__ cable transmits data via pulses of light
fiber-optic
A topology can be compared to the __________.
floor plan of a building
A ________ is a visual representation of a process, including the decisions that need to be made along the way.
flowchart
To establish a relationship between two tables, the primary key in one table is associated with the ____ in the other table.
foreign key
A ________ enables Access users to view or enter data one record at a time.
form
A __________ enables Access users to view or enter data one record at a time.
form
Adware and spyware are referred to collectively as ________.
grayware
flaunts expertise to the administrator of a system
grey-hat hacker
Acceptable use policies
guidelines regarding usage of computer systems
________ a website involves writing code in many languages, depending on needs and functionality.
hand coding
switch
handles data traffic between nodes on the same network
exchange of control packets between computers
handshaking
broadband
high speed internet connection
computer system designed to attract unauthorized users
honey pot
A ________ topology uses more than one topology when building a network.
hybrid
Objective C is a language commonly used to create what kind of software?
iOS applications
The most financially damaging cybercrime affecting individuals is ________.
identity theft
Computer helpdesks often prioritize problems based on __________.
importance
Numeric check
in a database, confirms that only numbers are entered in a field
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
All of the following are ways that can infect your computer with a virus EXCEPT ________.
installing a manufacturer's printer driver (or printing a document)
JavaScript
is commonly used to make HTML documents more dynamic; An Internet protocol addressing scheme that makes IP addresses longer, thereby providing more available addresses
HTTPS is different than HTTP because
is is a combination of HTTP and the secure sockets layer (SSL)
A MAC address...
is used for internal identification purposes on a network
used in a common encryption technique
key pair
A ring topology is also known as a(n) ________ topology.
loop
Power BI includes three elements: a desktop applications, a web-based service, and a __
mobile app
The device used to connect a network to the Internet is called a
modem
A(n) ____ database stores data in more than two dimensions.
multidimensional
Two or more computers that are connected via software and hardware so that they communicate with each other is called a(n) ____
network
All modern computing devices have a(n) __ preinstalled that enables them to connect to a wired or wireless network
network adapter
Node
network device
A ____ is any device connected to a network such as a computer, printer, or game console
node
Which language do you need to be familiar with to use Squarespace?
none
Data are sent through a network in bundles called
packets
Which of the following is NOT a virus category?
pharming
Individual Internet users connect to ISPs through a(n) ________.
point of presence (POP)
virus that changes its own code to avoid detection
polymorphic virus
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
possessed
creating a scenario that sounds legitimate enough that someone will trust you
pretexting
The purpose of a token in a token ring network is to ________.
prevent data collisions from occurring
Tokens are used in a token ring network to __________.
prevent data collisions from occurring
The _____ field must be a unique identifier of each record in a database.
primary key
When only the two parties involved in sending a message have the code, this is called ____-key encryption
private
Ethernet
protocol most commonly used on star networks
A(n) ________ server acts as a liaison between an internal network and an external network.
proxy
________ is a text-based approach to documenting an algorithm.
pseudocode
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.
public
In the sound byte, the intern had to reinstall corrupted printer server software And rebuild the print
queue
Wireless network devices use ____ to communicate with each other
radio waves
A ____ would be a good device to install if you need a wireless solution to improve a weak Wi-Fi signal in an area far from the router your home.
range extender
malware on your computer used to convince you that your computer has a virus
scareware
The computer that provides information or resources to the client computers on the network is called a(n) _____
server
the internet is managed by
several non-profit organizations
coaxial cable
single copper wire surrounded by layers of plastic
techniques used to manipulate people into performing actions or divulging confidential information
social engineering
Unwanted, unsolicited e-mail is referred to as ________.
spam
A database _____ organizes data into fields and records.
table
device that absorbs a signal so that it is not reflected back
terminator
In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.
the helpdesk problem database
Hypertext Transfer Protocol Secure (HTTPS)
the internet protocol that ensures data is sent securely over the web
if data is broken into chunks and sent over various routes at the same time, how do you these packets reach their destination
the packets contains destination information in our reassembled when they all reach the destination
Real time processing
the processing of database transactions in which the database is updated while the transaction is taking place
cascading style sheets allow you to quickly change
the rules for applying formatting to an HTML document
Default value
the value a database automatically uses for a field unless the user enters another value
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
theft of services
Ring networks use the ________ method to avoid data collisions.
token
special type of data packet
token
When designing a program, the developer selects a design approach like
top down or object oriented
.com and .edu are examples of a(n) ________.
top-level domain/TLD
Data flows on a(n) __ to get between different points on a network
transmission media
MIME is the protocol that supports sending files as e-mail attachments
true
Your internet service provider has a default DNS server to translate a URL into an IP address
true
A quick way to deploy software to a large number of computers (discussed in this Sound Byte) is to __________.
use "ghosting" software to copy the image of one computer to another
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
A company would use a(n) _____ server to provide internet-based information
web
A(n) ____ server is used to host an internet site
web
delivers HTML documents on request
web
hosts websites that can be accessed via the Internet
web
an "ethical" hacker
white-hat hacker
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
wireless access point/WAP
The Query _____ prompts you step-by-step through the creation of a query.
wizard
A(n) ________ takes advantage of file transport methods to spread on its own.
worm
The internet is primarily funded by a. voluntary contributions b. Google c. your state income taxes d. your federal income taxes
your federal income taxes
the internet is primarily funded by
your federal income taxes
Most often, hackers initiate a DDoS attack by creating and activating ________ computers.
zombie
a computer controlled by a hacker
zombie
Keywords
(1) A specific word a user wishes to query (or look for) in an internet search. (2) A specific word that has a predefined meaning in a particular programming language
Cat
A UTP cable type that provides more than 1 Gbps of throughput
Point of Presence (POP)
A bank of modems, servers, routers, and switches through which Internet users connect to an Internet service provider.
Cable Internet
A broadband service that transmits data over coaxial cables
Enterprise Resource Planning (ERP) Systems
A business intelligence system that accumulates in a central location all information relevant to running a business and makes it readily available to whoever needs it to make decisions
Fiber-optic cable
A cable that transmits data via light waves along glass or plastic fibers
Aggregate function
A calculation performed on an entire column of data which returns a single value. Includes functions such as Sum, Avg, and Count.
Field
A category of information in a database; a category of data; The component of a database in which the database stores each category of information
Classes
A category of input identified in object-oriented analysis; classes are defined by information and actions
Central Administration
A centrally administered network, tasks performed from one computer can affect the other computer on the network
Scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.
Centralized
A characteristic of client/server networks where the server, not the individual nodes, provide services such as data security
Decentralized
A characteristic of peer-to-peer networks where the individual nodes provide services such as data security.
Test Condition
A check to see whether the loop in an algorithm is completed
Program Specification
A clear statement of the goals and objectives of the project. This is apart of Analysis.
Multidimensional database
A database that stores data from different perspectives, called dimensions, and organizes data in cube format
Personal Firewall
A firewall specifically designed for home networks
C++
A programming language, takes C to an object-oriented level
Macro virus
A virus that's distributed by hiding it inside a macro
Time bomb
A virus that's triggered by the passage of time or on a certain date
E-mail virus
A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself
Group of people willing to share experience
Coding community
________ combines HTML, cascading style sheets, and JavaScript.
Dynamic HTML
How is digital text displayed?
E ink and Backlit monitors
What electronic devices are trying to replace books?
E-readers
The terms virus and worm actually mean the same thing.
FALSE
________ cable is the most costly to install.
Fiber-optic
an operating system for network servers
NOS
Which of the following classifications of viruses can change its own code to avoid detection?
Polymorphic
Computer graveyard
Possible source for replacement parts
FTP enables files to be downloaded or uploaded between computers.
TRUE
Property sheet
The location you change settings such as number format and number of decimal places.
Personal Property
Things of value that you own (car or laptop)
Which of the following data-mining techniques is used to determine which data goes together?
affinity grouping
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
Retinal scanning is an example of ________ authentication.
biometric
an unethical hacker
black-hat hacker
A(n) ________ is composed of software programs known as bots, which run autonomously on a large number of zombie computers.
botnet
programs that run on a large number of zombie computers
botnet
A ________ sends data from one collision domain to another.
bridge
data captured from websites as users navigate through a website is called
clickstream data
A(n) ________ program is a computer program that runs on the client computer and requires no interaction with a web server.
client-side
A ________ network can contain servers as well as individual computers.
client/server
When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers
client/server
A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.
cloud
Translating an algorithm into a programming language is called
coding
______ a website by hand involves writing HTML, CSS and JavaScript.
coding
Database
collection of objects
In http://www.pearsonhighered.com, which of the following is the top-level domain?
com
Hybrid Topology
combining multiple topologies into one network
enables users to purchase items over the Internet
commerce
A(n) _____ server handles all messaging between a network and other networks, including internet connectivity
communications
NIC
connects a node to a network
__ are collections of data connected to Power BI from one or several sources
datasets
_____ are points at which a program must choose from a range of different actions based on the value of its current inputs.
decision points
New ______ like calendars can be added to a template in Squarespace.
elements
a program that renders your computer files unusable by compressing them
encryption virus
twisted-pair
made up of copper wires
NIC stands for ________.
network interface card
Using a wireless network without the network owner's permission is known as ________.
piggybacking
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
Most small businesses use ____ database as they are reliable and less costly.
relational
To combine data from more than one table, you need to create a(n) ____ between the tables.
relationship
To use data from two Access tables, you must create a _____ between them.
relationship
__ are collections of visualizations displayed on one or more pages in Power BI
reports
Which topology tends to provide the fairest allocation of network resources?
ring
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
rootkit
Data type (field type)
(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field and prevents the wrong type of data from being entered into the field
Data Types (field type)
(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field that prevents the wrong type of data from being entered into the field
Why is wireless slower than wired?
- Wireless bandwidth is shared among devices. - Wireless signals are more susceptible to interference from magnetic and electrical sources. - Other wireless networks (such as your neighbor's network) can interfere with the signals on your network. - Certain building materials (such as concrete and cinderblock) and metal (such as a refrigerator) can decrease throughput. - Throughput varies depending on the distance between your networking equipment. - Wireless networks usually use specially coded signals to protect their data, whereas wired connections don't protect their signals. This process of coding signals can slightly decrease throughput, although once coded, data travels at usual speeds.
Strong encryption now requires ________-bit keys.
256
Which of the following is NOT a standard for wireless Ethernet networks?
802.11ab
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?
802.11ac
Which of the following is currently the fastest wireless standard?
802.11ac
Gigabit Ethernet (GbE)
802.3. The most commonly used wired Ethernet standard deployed in devices designed for home networks; provides bandwidth of up to 1 Gbps
Operators
A coding symbol that represents a fundamental action of the programming language
Which best describes a data warehouse?
A collection of all the data from an organization's databases
Dataset
A collection of data connections
Database
A collection of data organized as meaningful information that can be accessed, managed, stored, queried, sorted, and reported.
AJAX (Asynchronous JavaScript and XML)
A collection of technologies that allow the creation of web applications that can update information on a page without requiring the user to refresh or leave the page
Dashboard
A collection of visualizations on a single page for sharing
Report
A collection of visualizations on one or more pages
Expression
A combination of elements that produce a value.
Dynamic HTML (DHTML)
A combination of technologies—HTML, cascading style sheets, and JavaScript—used to create lively and interactive websites.
T line
A communications line that carries digital data over twisted-pair wires.
Packet Switching
A communications methodology that makes computer communication efficient; in packet switching, data is broken into smaller chunks called packets.
Internet Service Providers (ISPs)
A company that specializes in providing Internet Access. May be specialized providers, like Juno, or companies that provide other services in addition to Internet access (such as phone and cable television)
Pack analyzer (sniffer)
A computer hardware device or software designed to detect and record digital information being transmitted over a network
Fifth Generation Languages (5GL)
A computer language in which a program is presented as a series of facts or constraints instead of as a specific algorithm; the system of facts can then be queried; considered the most "natural" of languages. Example include: PROgrammingLOGic
Third Generation Language (3GL)
A computer language that uses symbols and commands to help programmers tell the computer what to do, making 3GL languages easier for humans to read and remember; examples include: BASIC, FORTRAN, COBOL, C/C++, and JAVA
Fourth Generation Languages (4GL)
A computer language type that includes database query languages and report generators
Web Server
A computer running a specialized operating system that enables it to host Web pages (and other information) and provide requested Web pages to clients.
Honey pot
A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.
Zombie
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems
Logic bomb
A computer virus that runs when a certain of conditions is met, such as when a program is launched a specific number of times
Relationship
A connection between two tables using a common field.
Data Plan
A connectivity plan or text messaging plan in which data charges are separate from cell phone calling charges and are provided at rates different from those for voice calls
Backups
A copy of a computer file that can be used to replace the original file if it's lost or damaged
Image backup
A copy of an entire computer system, created for restoration purposes
Copyright
A creator's exclusive rights to use a work of intellectual property, such as making copies or selling it
Grey hat hacker
A cross between black and white-- a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security
An illustration of a one-to-many relationship would be:
A customer may have more than one account in an accounts table
What is the difference between a data warehouse and a data mart?
A data warehouse is a large collection of data from multiple sources in an organization and a data mart is data extracted from a data warehouse that pertains to a single component of the business
Report
A database document that outputs meaningful information to its readers.
Form
A database object that is used to add data or edit data in a table.
Structured Query Languages (SQL)
A database programming language used to construct queries to extract data from relational databases; one example of a fourth generation language
Structured Query Language (SQL)
A database programming language used to construct queries to extract data from relational databases; one example of a fourth-generation language
Object-oriented database
A database that stores data in objects rather than in tables
Relational database
A database type that organizes data into related tables based on logical groupings
Theme
A defined set of colors, fonts, and graphics that can be applied to a form or report.
Integrated Development Environment (IDE)
A developmental tool that helps programmers write and test their programs; one IDE can be configured to support many different languages
Node
A device (printer, game console, or router) connected to a network such as a computer, a peripheral (such as a printer), or a communications device (such as a modem)
Network-ready device (internet-ready device)
A device (such as a printer or an external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network
Switch
A device for transmitting data on a network. A switch makes decisions, based on the media access control (MAC) address of the data, as to where the data is to be sent.
Switch
A device for transmitting data on a network. It makes decisions, based on the media access control address of the data, as to where the data is to be sent
Network Navigation Device
A device on a network such as a router or switch that moves data signals around the network
Terminator
A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it
Wireless Range Extender
A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity
E-readers
A device that can display e-text and that has supporting tools like note taking, bookmarks, and integrated dictionaries
Modem
A device that connects a network to the Internet
Network Adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
Network Adapters
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.
Access Point
A device that is connected by a cable to the main router that amplifies a wireless signal to otherwise unreachable locations
Surge Protector
A device that protects computers and other electronic devices from power surges
Router
A device that routes packets of data between two or more networks
Router
A device that routes packets of data between two or more networks.
biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users
biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users.
Bridge
A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.
What is a Database
A digital collection of related data that can be stored, sorted, organized, and queried
Second-level domain
A domain that's directly below a top-level domain. (dropbox.com, dropbox is the domain level)
Smart home
A dwelling in which devices and appliances are automated or controlled by apps
Architecture Neutral
A feature of Java whereby code needs to be compiled only once, after which the code can be run on many different CPUs
Foreign key
A field in one table that is also the primary key of another table.
What is the difference between a record and a field?
A field is a single piece of information in a record
Calculated field
A field that displays the result of an expression rather than data stored in a field.
Primary key
A field that has a value unique to each record
Full backup
A file backup that encompasses all files on a computer Irregardless of whether they have changed since the last backup
Service Message Block (SMB) protocol
A file sharing protocol incorporated into all operating systems that enables users at non-Windows computers to access data in Windows machines
Data files
A file that contains stored data
Selection Filter
A filtering method that displays only records that match selected criteria.
Filter by form
A filtering method that displays records based on multiple criteria.
White hat hacker (ethical hacker)
A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies
Black hat hacker
A hacker who uses his or her knowledge to destroy information or for illegal gain
Bastion Host
A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.
Broadband
A high-speed Internet connection such as cable, satellite, or digital subscriber line (DSL). Has a transmission rate that ranges from 1 to 500 Mbps
Programming Language
A kind of "code" for the set of instructions the CPU knows how to perform
Natural Language Processing (NLP) system
A knowledge-based business intelligence system that enables users to communicate with computer systems using a natural spoken or written language instead of a computer programming language.
Botnet
A large group of software applications (called robots or bots) that run without user intervention on a large number of computers
Metropolitan Area Network (MAN)
A large network designed to provide access to a specific geographical area, such as an entire city. Many U.S. cities are now deploying them to provide Internet access to residents and tourists. Some employ WiMAX wireless technology that extends local Wi-Fi networks across greater distances
Data warehouse
A large-scale collection of data that contains and organizes in one place all the data from an organization's multiple databases.
Which of the following statements is true (Access)?
A last name is an example of a common field to group by
Script
A list of commands (mini-programs or macros) that can be executed on a computer without user interaction
Object
A main component that is created and used to make a database function, such as a table or form.
Encryption virus
A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusuable
Data dictionary (database schema)
A map of a database that defines the features of the fields in the database.
Extensible Markup Language (XML)
A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed
eXtensible Markup Language (XML)
A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed
To function, all networks must include:
A means to connect to the nodes on the network, special hardware devices that allow the nodes to communicate with each other and to send data, and software that allows the network to run
Grouping
A method of summarizing data by the values of a field.
Access method
A method to control which computer is allowed to use transmission media at a certain time.
Total row
A method to display aggregate function results as the last row in Datasheet view of a table or query.
When creating a calculation, which of the following would be identified as an error by Access?
A missing colon in the expression (for example: TotalHours [OTHours]+[RegHours]).
Client/Server Model
A model of network communications where a client device such as a computer, tablet, or smartphone uses browsers to request services from networks that make up the Internet.
Local Area Network (LAN)
A network in which the nodes are located within a small geographical area. Examples include a network in a computer lab at school or at a fast food restaurant
Service Set Identifier (SSID)
A network name that wireless routers use to identify themselves
Secure Sockets Layer (SSL)
A network security protocol that provides for the encryption of data transmitted using the Internet. The current versions of all major web browsers support SSL.
Ethernet Network
A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate
Virtual Private Networks (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations
Virtual Private Network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.
Personal Area Network (PAN)
A network used for communication among devices close to one person, such as smartphones and tablets using wireless technologies such as BlueTooth and Wifi. Hotspots are an example
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.
Comment
A note left by a programmer
AutoNumber
A number that automatically increments each time a record is added.
Field
A piece of information stored in a table, such as a company name or city.
Virus signature
A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software
Function
A predefined computation that performs a complex calculation.
Template
A predefined database that includes professionally designed tables, forms, reports, and other objects.
Intranet
A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
Packet FIltering
A process in which firewalls are configured so that they filter out packets sent to specific logical ports
Network Address Translation (NAT)
A process that firewalls use to assign internal Internet protocol addresses on a network
Normalization
A process to ensure data is organized most efficiently in a database
Inoculation
A process used by antivirus software; compares old and current qualities of files to detect viral activity
System Development Life Cycle (SDLC)
A process used to develop information systems; it consists of the following six steps: problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation
Worm
A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves
Adware
A program that downloads on your computer when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad
Backdoor program
A program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission
Client-side program
A program that runs on the client computer and that requires no interaction with a web server.
Compiler
A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language
Swift
A programming language introduced by Apple for developing for iOS and macOS
C
A programming language originally developed for system programmers
HTML embedded scripting language
A programming language that tucks programming code directly within the HTML of a web page; the most popular example is JavaScript.
Visual Basic (VB)
A programming language used to build a wide range of Windows applications
Caption
A property in a database that enables the field name to display in a more meaningful or readable manner
Dynamic Host Configuration Protocol (DHCP)
A protocol for assigning dynamic internet protocol addresses
Connection-oriented protocol
A protocol for exchanging information that requires two computers to exchange control packets, thereby setting up the parameters of the data-exchange session, before sending packets that contain data. Method is also known as handshaking
Connectionless Protocol
A protocol that a host computer can use to send data over the network without establishing a direct connection with any specific recipient computer.
Pretty Good Privacy (PGP)
A public-key package for encryption available for download on the Internet.
Object Query Language (OQL)
A query language used by many object-oriented databases
Join query
A query used to extract data that's in two or more tables in a database.
Query
A question you ask about the data in your database.
Internet cache
A section of the hard drive that stores information that may be needed again, such as Internet protocol addresses and frequently accessed web pages.
Statements
A sentence in a code
Application server
A server that acts as a repository for application software; Acts as a repository for software such as Microsoft Office
Communications server
A server that handles all communications between the network and other networks, including managing Internet connectivity.
Cloud server
A server that is maintained by a hosting company and that is connected to networks via the Internet
Authentication server
A server that keeps track of who's logging on to the network and which services on the network are available to each user; Keeps track of user logins to the network and which services are available to each user
Database server
A server that provides client computers with access to information stored in a database; Allows client computer to access a database
File server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download
Dedicated server
A server used to fulfill one specific function, such as handling e-mail
E-mail server
A server whose function is to process and deliver incoming and outgoing e-mail; Processes and delivers incoming and outgoing e-mail
Application part
A set of common Access components that can be added to an existing database.
Protocol
A set of rules for conducting communications
Application Programming Interface (API)
A set of software routines that allows one software system to work with another
Algorithm
A set of specific, sequential steps that describe exactly what the computer program must do to complete the required work. This is apart of Making a Plan
Which of the following best describes Power BI?
A set of tools used to analyze data from a variety of sources
Scripting Language
A simple programming language that's limited to performing a set of specialized tasks
Copyleft
A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights
Form view
A simplified user interface primarily used for data entry; does not allow you to make changes to the layout.
Coaxial cable
A single copper wire surrounded by layers of plastic insulation and sheathing; used mainly in cable television and cable Internet service.
Coaxial Cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service
Tile
A single visualization
Java Applet
A small Java-based program
Applet
A small application located on a server; when requested, it downloads to the client
Prototype
A small model of a program built at the beginning of a large project
Macro
A small program that groups a series of commands to run as a single command
Master boot record
A small program that runs whenever a computer boots up
Packet
A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent.
Cookies
A small text file that some websites automatically store on a client computer's hard drive when a user visits the site
Print queue
A software holding area for print jobs. Also called a print spooler.
What is Circos?
A software package that uses a circular layout for visualizing data and information
Firewall
A software program or hardware device designed to prevent unauthorized access to computers or networks
Database Management System (DBMS)Correct Answer
A software system that provides the tools needed to create, maintain, and use a database
Exploit kits
A software toolkit used to take advantage of security weaknesses found in apps or operating systems, usually to deploy malware
Service Packs
A software update
What is an example of a record in the Windows Media Player database?
A song
Token
A special data packet used to pass data on a network
Wireless Network Interface Card (wireless NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access.
Jam Signal
A special signal sent to network nodes alerting them that a data collision has occurred.
Editor
A special tool in an integrated development environment (IDE) that helps programmers as they enter code
Network Attached Storage (NAS) device
A specialized computing device designed to store and manage network data. Examples being AirPort Time Capsule for Apple cpmputers
Database management system (DBMS)
A specially designed application software used to create and manage databases
Query language
A specially designed computer language used to manipulate data in or extract data from a database
Home Area Network (HAN)
A specific type of LAN located in a home. Used to connect all of a home's digital devices, such as computers, peripherals, phones, gaming devices, digital video recorders (DVRs), and televisions
High Definition (HD)
A standard of digital TV signal that guarantees a specific level of resolution and a specfic aspect ratio, which is the rectangular shape of the image
Javascript Object Notation (JSON)
A syntax for exchanging information between computers
Proprietary System
A system having the characteristic of being closed to public access (private), as opposed to an open system.
Open System
A system having the characteristic of being public for access by an interested party; as opposed to a proprietary system
Digital Rights Management (DRM)
A system of access control that allows only limited use of material that has been legally purchased
Bus (linear bus) topology
A system of networking connections in which all devices are connected in sequence on a single cable.
Information System
A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information
Information System
A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information.
Expert System
A system that tries to replicate the decision-making processes of human experts in order to solve specific problems.
Top-down design
A systematic approach in which a problem is broken into a series of high-level tasks
Which database object is used to store data and is organized by fields and records?
A table
Spear phishing
A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data
Control
A text box, button, label, or other tool you use to add, edit, and display the data in a form or report.
Pseudocode
A text-based approach to documenting an algorithm
Debugger
A tool in an IDE that helps programmers analyze a program as it runs
Which statement about a totals query is true?
A totals query may contain several grouping fields and several aggregate fields
Object-oriented analysis
A type of analysis in which programmers first identify all the categories of inputs that are part of the problem the program is meant to solve
Incremental Backup
A type of backup that only backs up files that have changed since the last time files were backed up
Decision Support System (DSS)
A type of business intelligence system designed to help managers develop solutions for specific problems
Transaction Processing System (TPS)
A type of business intelligence system for keeping track of everyday business activities.
Digital Subscriber Line (DSL)
A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmission to share the same line
Loops
A type of decision point in algorithm. In a loop, a question is asked, and if the answer is yes, a set of actions is performed. Once the set of actions has finished, the question is asked again, creating a loop. If the answer to the question is no, the algorithm breaks free of the loop and moves on to the first step that follows the loop
Binary Decisions
A type of decision point in an algorithm that can be answered in one of only two ways: yes (true) or no (false)
Scareware
A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware
Client/server network
A type of network that uses servers to deliver services to computers that are requesting them (clients).
Client/Server Network
A type of network that uses servers to deliver services to computers that are requesting them (clients). They can usually be identified by having 10 or more nodes
Ring (loop) topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.
Server-side program
A type of program that runs on a web server rather than on a computer (PHP and NET).
Keystroke Logger (keylogger)
A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information
Constant
A value that does not change.
Beta Version
A version of the software that's still under development. Many beta versions are available for a limited trial period and are used to help the developers correct any errors before they launch the software on the market
Syntax Errors
A violation of the strict set of rules that define the programming language
Logical port
A virtual communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers
Polymorphic Virus
A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for anti-virus programs to detect the virus
Boot-sector virus
A virus that replicates itself into the master boot record of a flash drive or hard drive
Stealth Virus
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
Internet exchange point (IXP)
A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISPs connect.
Field name
A way of describing the information in the field
Satellite Internet
A way to connect to the Internet using a small satellite dish, which is placed outside the home and is connected to a computer with coaxial cable. The satellite company then sends the data to a satellite orbiting Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer
Totals query
A way to display aggregate data when a query is run.
What are web servers?
A web server is used to host a website so it will be available through the internet
Trademark
A word, phrase, symbol, or design-- or a combination of these-- that uniquely identifies and differentiates the goods (or services) of one party from those of another
Which of the following is a reason to establish a network?
All of the above (to share an Internet connection, to share files, to share peripherals)
Which of the following can be added to a totals query?
All of the above can be added to a totals query
Which of the following cannot be used in a calculated field?
All of these can be used in a calculated field
Second Generation Language (2GL)
Also known as an Assembly Language, it is a computer language that allows programmers to write programs using a set of short, English-like commands that speak directly to the CPU and that give the programmer direct control of hardware resources
What is an example of a database?
Amazon
Where to buy e-boks?
Amazon kindle store, Barnes and Noble NOOK e-bookstore, publishers, textbooks directly from publishers
Repeater
Amplifies signals on long cable runs
Navigation pane
An Access interface element that organizes and lists database objects in a database.
Form
An Access object that simplifies entering, modifying, and deleting table data.
Expression builder
An Access tool that helps you create more complicated expressions.
what is an IP address and where I can find the IP address for my computer
An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."
Wireless ISP
An ISP thar provides service to wireless devices such as smartphones
In the sound byte, the problem with the router port was fixed by
An IT technician
IPv6
An Internet Protocol (IP) addressing scheme that makes IP addresses longer, thereby providing more available addresses
User Datagram Protocol (UDP)
An Internet Protocol that creates data packets across the internet.
Denial-of-service (DoS) attack
An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate user access
Brute force attack
An attempt to access an account by repeatedly trying different passwords.
Distributed denial-of-service (DDos) attack
An automated attack that's launched from more than one zombie computer at the same time
What's an e-mail server?
An e-mail server is a specialized computer that stores, processes, and sends e-mails.
How is an e-mail server different from a communications server?
An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing internet connectivity
Runtime error
An error in a program that occurs when a programmer accidentally writes code that divides by a zero, a mathematical error
Logical Error
An error in a program that produces unintended or undesired output, where the syntax is correct but some other human error has occured
Scope Creep
An ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype
Java
An object-oriented programming language that has a large set of existing classes. It is also architecture neutral, meaning it can work on most computers
What is Hadoop
An open source platform sponsored by the Apache Software Foundation that makes big, complex, and unstructured data easier to manage
Spam filter
An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox
Programmers often use an IDE named ________ to develop apps for Android devices.
Android SDK
Android mobile app development is often performed in which of the following environments?
Android studio using Java
Which of the following would be matched if you use a Selection filter's exact match option for the name Ann?
Ann, ANN, and ann
Cybercrime
Any criminal action perpetrated primarily through the use of a computer
Possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility.
Social Engineering
Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information
Hacker
Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)
Hoax
Anything designed to decieve another person either as a pratical joke or for financial gain
To add a predefined table to an existing database, you should use which of the following?
Application part
What's the best type of server to use when employees need to share software programs (apps)?
Application server
Which of the following best describes Quick Insights?
Artificial intelligence used to analyze data, Generates insights that otherwise might not be noted, and Generates conclusions about data that might already be known
All of the following are suggested guidelines for table design except:
Avoid date arithmetic.
How do I get started on creating a database?
Before creating a database, you need to know the three main components of a database. These include fields, records, and tables
What are the two types of decision points?
Binary and Loops
Most popular languages?
C/C++ and Java. COBOL is used in banking and insurance industries
program that generates distorted text and require that it be typed into a box
CAPTCHA
________ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser.
CGI
The set of instructions that define how to display the HTML elements in your site is a. CSS b. XML c. AJAX d. PHP
CSS
Which panel of CodePen editor would you use to to change the color of headings on the entire web page?
CSS
__ determines the colors and fonts of a web page
CSS
the set of instructions that defines how to display the HTML elements in your site is
CSS
Which of the following is NOT a factor to consider when selecting network cabling?
Cable diameter
Twisted pair cable
Cable made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)
Pmt function
Calculates the loan payment given the rate, number of periods (also known as term), and the present value of the loan (the principal).
Which of the following could not be done using an aggregate function?
Calculating the payment amount of a loan
Which of the following determines how the field names can be made more readable in table and query datasheets?
Caption property
An option that directs Access to automatically update all foreign key values in a related table when the primary key value is modified in a primary table.
Cascade Update Related Fields
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network
Cat 7B
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
Circuit switching
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
Circuit switching
How would you set up your connection so that it connects to a particular wireless network every time you're in the area without requesting any manual intervention?
Click the connection and then click the Connect automatically check box.
Which of the following is NOT a common network topology?
Cluster
_____ cable consists of a single copper wire surrounded by layers of plastic and is commonly used to connect TVs
Coaxial
Split form
Combines two views of the same record source—one section is displayed in a stacked layout and the other section is displayed in a tabular layout.
________ servers are computers that enable users to buy goods and services over the web.
Commerce
when my friend connects to my computer, how is data transferred
Computers communicate efficiently using the communication methodology called packet switching.
but how do computers get the IP address from a domain name
Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.
What types of scams do identity thieves perpetrate?
Counterfeiting existing credit/debit cards, requesting change of address for bank statements, opening new credit/bank accounts, obtaining medical services under your name, and buying a home with a mortgage in your name
protocol that assigns dynamic IP addresses
DHCP
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
DNS
translates a domain name into an IP address
DNS
The ________ defines items on a web page such as graphics, tables, and headers as objects.
DOM
Which of the following is the component of Power BI that is a collection of visuals displayed on a single page and shared with others?
Dashboard
__are collections of visualizations displayed on one page in Power BI and shared with others
Dashboards
List the 3 things that are relevant to creating a useful program (aka the 3 elements of the problem statement
Data (input), information (output), method (process)
Data inconsistency
Data for a record being different in two different lists
Two lists showing different values for the same data in different places of a database is an example of?
Data inconsistency
What kind of processes are used to spot trends in large sets of data?
Data mining is used to analyze large amounts of data to help identify trends
Which of the following statements about a ring topology is TRUE?
Data only flows in one direction
Extracting and reformatting data from each sources so all data is consistent and then storing the data is known as
Data staging
Extracting, transforming, and storing data are processes associated with which of the following?
Data staging
Structured (analytical) data
Data such as "Bill" or "345," as opposed to unstructured data
Information
Data that has been organized or presented in a meaningful fashion; the result, or output that users require at the end of a job
Time-variant data
Data that is not limited to particular time period
What is the term for how fast data moves through networks?
Data transfer rate (also called bandwidth)
A large-scale collection of data that consolidated data from various operational systems is known as a?
Data warehouse
What kind of data is captured in a data warehouse?
Data warehouse data is time-variant, and it gets its data from sources inside and outside the business, as well as from clickstream data from websites
A library book reservation service is a good example of a use for a(n) ________ server.
Database
Which of the following is NOT a common consideration when selecting an appropriate programming language for a project?
Database access
Help desk software
Database where technicians log users problems
Which of the following is NOT an advantage of installing a network in a business?
Decentralization of files and data
Knowledge-based and model management systems are used in which type of business information system?
Decision support systems can be enhanced and made more effective by using knowledge-based and/or model management systems
List the 5 stages of PDLC
Describing the problem, making a plan, coding, debugging, and testing and documentation
Documentation
Description of how the technical details of the software, how the code works, and how the user interacts with the program; in addition, all the necessary user documentation that will be distributed to the program's users
Which of the following views provides you with the most flexibility in modifying forms and reports?
Design view
Cat 6A
Designed for ultrafast Ethernet networks that run at speeds as fast as 10 Gbps
Data type
Determines the type of data that can be entered and the operations that can be performed on that data.
You can find out which network adapters are installed in your system by using the Windows _____ manager utility
Device
What would you use to see what network adapters are installed in your Windows computer?
Device Manager Utility
Mobile Hotspot
Devices that enable you to connect more than one device to the Internet; they require access to a data plan. Most smartphones have this capability built-in
Data-flow diagram
Diagrams that trace all data in an information system from the point at which data enters the system to its final resting place (storage or output). This is apart of design.
Which of the following is NOT a wired broadband Internet connection option?
Dial-up
Multiple Items Form
Displays multiple records in a tabular layout similar to a table's Datasheet view, with more customization options.
What special problems can occur with wireless networks?
Distance from the router, as well as floors, walls, and large metal object s between a device and the router can interfere with wireless connectivity
Cyberloafing (cyberslacking)
Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working
A(n) ________ links a URL to an IP address when a web page is requested.
Domain Name System (DNS) server
________ occur when a website downloads harmful software onto your computer.
Drive-by downloads
For business networks, which of the following is NOT a main cable type?
Duplex
DHTML stands for ________.
Dynamic HyperText Markup Language(dhtml)
Variable
Each input and output item the program manipulates
Label Wizard
Enables you to easily create mailing labels, name tags, and other specialized tags.
Print View
Enables you to see exactly what the report will look like when it is printed.
Filter
Enables you to specify conditions to display only those records that meet certain conditions.
A good way to protect your e-mails is to use __
Encryption
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
Encryption
What steps can be taken to secure a wireless network?
Ensure a firewall is installed and make changes to several settings with your router and on your network
Range check
Ensure that the data entered into the field of a database falls within a certain range of values
Information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering.
A __ system is a large software system that gathers information from all parts of a business and integrates it to make is readily available for decision making
Enterprise resource planning
Which of the following conditions is available through a Selection filter?
Equal condition
How the program should behave if the input data is invalid is part of?
Error handling
Most home networks use the ________ standard
Ethernet
________ is the standard communications protocol used on most client/server networks.
Ethernet
What network standard is used in my home network?
Ethernet Network
Which of the following is NOT true of an Access database?
Every table in a database contains the same number of records as every other table
A P2P network needs specialized network operating system software installed on every node
FALSE
A denial-of-service attack can be used to deny hackers access to a computer system.
FALSE
A logical error can be detected and repaired by the compiler
FALSE
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
FALSE
A stealth virus is designed to infect multiple file types to fool the antivirus software.
FALSE
All viruses cause serious destruction of computer data.
FALSE
An RTM version fo software is often released so users can help debug it
FALSE
An access point connects to the main router wirelessly
FALSE
An encryption virus replicates itself onto a hard drive's master boot record.
FALSE
An international company like Microsoft would use a MAN to connect all of its computers.
FALSE
Client-side programs run on a web server rather than on your computer.
FALSE
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
FALSE
Currently, there are no antivirus programs for mobile devices.
FALSE
Data flows in both directions in a ring network.
FALSE
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
FALSE
HTML is a simple programming language.
FALSE
IPv6 uses six groups of 16-bit numbers.
FALSE
In a client/server network, each network node communicates directly with every other node on the network.
FALSE
Java and JavaScript refer to the same language.
FALSE
JavaScript commands are executed on a server computer.
FALSE
Limiting your signal range does not help increase wireless security
FALSE
MAC addresses and IP addresses are the same thing.
FALSE
MAC addresses are restricted to Macintosh computers.
FALSE
Many programming languages are moving away from the object-oriented paradigm.
FALSE
P2P networks become difficult to manage when they exceed five users.
FALSE
The United States government is in charge of the Internet.
FALSE
WEP is a stronger form of security than WPA
FALSE
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router.
FALSE
When using packet switching, packets are always sent over the same route.
FALSE
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
FALSE
XML technologies allow web pages to change after they have been loaded.
FALSE
You should use the same password for each system or website you need to access.
FALSE
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and National White Collar Crime Center
A Short Text field can store no more than 100 characters.
False
A proxy server is used to host websites on a client/server network
False
A repeater moves data between two networks.
False
AutoNumber data types are generally used for calculation fields such as price.
False
HTML changes the style of all elements on a web page (T/F)
False
If you like the menu settings of one template in Squarespace, you can use it in another template (T/F)
False
In the Sound Byte exploration of Magic Gradient, moving the mouse straight up and down made the background color change wildly
False
In the bus topology, only the device for which a signal is intended can hear the sent data signal.
False
In the sound byte, the intern used a port replicator to determine that there was a defective port
False
It is always best to use natural language queries and quick insights to analyze data in Power BI rather than creating the data analysis model manually in Power BI
False
Which transmission medium transmits data the fastest?
Fiber-optic cable
If files need to be accessible to multiple employees, what type of server should a network include?
File server
What do file servers do?
File servers are used to store and manage files for network users
Program Files
Files that are used in the running of software programs and that do not store data
Which option is used to filter records by using criteria in one or more fields?
Filter by Form
What do banks use to verify your identity?
Finger vein authentication technology
Periodically applying ________ upgrades fixes known problems in the ROM of a router or other networking devices.
Firmware
Control Structure
General term used for a keyword in a programming language that allows the programmer to direct the flow of the program based on a decision
Why is digital format better than analog?
Gives us a simple way to describe sound and light AND it can be reproduced exactly and distributed easily
How is client-side programming done?
HTML embedded scripting language AND applet
Which of the following is NOT true about HTML?
HTML is a fully featured programming language.
What is the current release of HTML?
HTML5
Which of the following was created for the transfer of hypertext documents across the Internet?
HTTP
Which of the following is NOT a typical data source for data warehouses
Hyperlink data
All IP addresses must be registered with the __, which is responsible for allocating IP addresses to network administrators
ICANN
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
ICANN
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
IP
A(n) ________ address is the address that external entities use when communicating with your network.
IP
sends data between computers on the Internet
IP
a computer's identity on the Internet
IP address
a unique identification number that defines each computer, service, or other device that connects to the Internet
IP address
197.169.73.63 is an example of a(n) ________.
IP address, Internet Protocol address, dotted decimal number,dotted quad
The original IP addressing scheme is?
IPv4
The IPv4 protocol is beginning to be replaced by the ________ protocol.
IPv6
The ________ IP addressing scheme uses 128-bit addressing.
IPv6
primary key field
In a database, a field that has a value unique to a record
Query
In a database, a way of retrieving information that defines a particular subset of data; can be used to extract data from one or more tables.
Consistency check
In a database, compares the values of data in two or more fields to see if those values are reasonable
Alphabetic check
In a database, confirms that only textual characters are entered in a field
Completeness check
In a database, ensures that all required fields have been completed
Validation rule
In a database, generally defined as part of the data dictionary and specified in the field properties for each field; violations result in an error message and a suggested action.
Filter
In a database, temporarily displays records that match certain criteria
Passive topology
In a network, a type of topology where the nodes do nothing to move data along the network
Active topology
In a network, a type of topology where the nodes participate in moving data through the network.
Referential integrity
In a relational database, a condition where, for each value in the foreign key table, there's a corresponding value in the primary key table.
Relationship
In a relational database, a link between tables that defines how the data is related; A link between tables that defines how the data is connected
One-to-many relationship
In a relational database, a record appears only once in one table while having the capability of appearing many times in a related table
One-to-one relationship
In a relational database, each record in a table has only one corresponding record in a related table
Many-to-many relationship
In a relational database, records in one table are related to multiple records in a second table, and vice versa
Foreign key
In a relational database, the common field between tables that's not the primary key
____ is the ability of two or more people to communicate in text over the internet in real time
Instant messaging
________ permits two or more people to communicate over the Internet in real time.
Instant messaging
Who developed the Ethernet Protocol?
Institute of Electrical and Electronics Engineers (IEEE)
E-reader advantages include?
Integrated dictionaries, note taking, URL links, cloud bookmarks, e-books and audio can be linked, and magnifying
What sources does a data warehouse get its data from?
Internal sources, external sources, and clickstream data
Fiber-optic service
Internet access that is enabled by transmitting data at the speed of light through glass or plastic fibers
Advance fee fraud
Involves convincing individuals to send money as a "good faith" gesture to enable them to receive larger payments in return
Non-auction/non-delivery scams
Involves running auctions (or sales) of merchandise that does not really exist
Network Administration
Involves tasks such as (1) installing new computers and device, (2) monitoring the network to ensure it's performing efficiently, (3) updating and installing new software on the network, and (4) configuring or setting up proper security for a network
What is the flaw of fingerprint scanning technology?
It can be duplicated
Why is Java is considered an architecture-neutral language?
It can run on many different CPUs with only one compilation
Personal Video ecording
Kodi
The computers in a lab on a floor of a building would be connected using a ________.
LAN
a network in a small geographic area
LAN
Multipartite virus
Literally meaning "multi-part" virus; a type of computer virus that attempts to infect computers using more than one method
How to know what's connecting your to router AND how to determine what's connected to your router
Log in to an account associated with your router's IP address
How can you tell what wireless devices are connected to your router?
Log in to the router's IP address and check the configuration page.
A(n) __ address is the unique physical address of a network adapter
MAC
A(n) ________ address is a specific/unique number for each network adapter.
MAC
The unique number assigned to a network adapter by the manufacturer is referred to as the _____ address
MAC
A key component for data navigation on an internal network is a(n) _________.
MAC address
Each network adapter has a unique physical address called a(n) __ that identifies it
MAC address
Network adapters send data packets based on a(n)?
MAC address
used for internal identification on a network
MAC address
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
links users in a specific geographic area (usually a city)
MAN
Which protocol is used when sending files as attachments by e-mail?
Multipurpose Internet Mail Extensions (MIME)
What would the consequences be to you if your neighbors in an apartment complex inadvertently piggyback on your wireless network, even if they did nothing malicious?
My network would slow down
Power BI uses __ to enable users to use plain English to ask questions about data
Natural Language Queries
A type of data analysis that uses plain English instead of special code or syntax is called:
Natural Language Query
Is one table in a database enough to enter all my information in it and store all the fields?
No, you need to create different tables and categorize data to be stored in them
Is a home network the same kind as the one at the corporation where I work?
No. Most companies use client/server networks. You'll be setting up a P2P network
Do database servers manage the network databases?
Not really. Database servers provide client computers with access to information stored in a database
Which Access data type enables you to store numeric values that need to be calculated?
Number
The ranking of network problems by importance is usually determined by
Number of affected users
public-key package
PGP
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
Packet switching
how do packets travel through the internet
Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.
In the sound byte, the intern used a ____ to diagnose the router problem
Port scanner
A file type that was created for exchanging documents independent of software applications and operating system environment.
Portable Document Format (PDF)
If you need to send a report to a user who does not have Microsoft Office available, which of the following file formats would be the best choice to ensure it can be opened?
Portable Document Format (PDF)
When adding date criteria to the Query Design view, the dates you enter must be delimited by:
Pound signs (#)
Ghosting
Process of copying complete hard drive comtents
MCSE
Professional certification
What file types are used for digital images (digital cameras)
RAW files and JPEG files
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
Radio frequency/RF
Who invented e-mail?
Ray Tomlinson in 1971
Two types of property
Real and Personal
A __ is a type of Information system that tracks transactions
Real-time processing
A report can be made from one or more tables or a query. The object(s) that a report is based on is known as the:
Record source
What are the three main types of databases?
Relational databases, object-oriented databases, and multidimensional databases
Changing the ________ from the default name given by the manufacturer can make it more difficult for hackers to access your network.
SSID
________ means that additional users can easily be added without affecting the performance of the other network nodes.
Scalability
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
Secure Sockets Layer (SSL)
How to publish your own works (digital text)?
Self publish on Amazon Kindle Store (Kindle Direct Publishing), using a company like Smashwords, and using a site like Lulu
If you want to calculate aggregate statistics about graduation rates for students in a college database, which of the following would provide the least useful information if you were to group by it?
Social Security Number
Antivirus software
Software specifically designed to detect viruses and protect a computer and files from harm
Model Management System
Software that assists in building management models in decision support systems; an analysis tool that, through the use of internal and external data, provides a view of a particular business situation for the purposes of decision making.
Device driver
Software that facilitates the communication between a device and the operating system.
Where to publicize your band's music?
Sound Cloud, CD Baby, and ReverbNation
What process does source data need to go through to be useable in a data warehouse?
Source data must go through a process called data staging and be extracted, reformatted, and then stored in a data warehouse
Wide Area Network (WAN)
Spans a large physical distance. The Internet is the largest version if this, which covers the globe. It's also a networked collection of LANs. If a school has multiple campuses located in different towns, each with its own LAN, connecting the LANs of each campus by telecommunications lines allows the users of the LANs to communicate. All the connected LANs would be described as a single WAN
Wildcard
Special character that can represent one or more characters in the criterion of a query.
Multipurpose Internet Mail Extensions (MIME)
Specification for sending files as attachments to e-mail.
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Spooler
One virus called ________ is used to trick users into downloading an infected file to their phones, which enables theft of online banking information.
Spyeye Mobile Banking
________ is a program that gathers information about your surfing habits without your knowledge.
Spyware
A facial-recognition scanner is an example of a biometric authentication device.
TRUE
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
TRUE
A printer connected to a wireless network is considered to be a node on that network
TRUE
A switch acts like a traffic signal on a network
TRUE
A time bomb virus can be triggered on a certain date.
TRUE
A virus signature is a portion of virus code that is unique to a particular computer virus.
TRUE
A worm does NOT require human interaction to spread to other computers.
TRUE
A zombie is another person's computer controlled by a hacker.
TRUE
AJAX allows you to create websites that can refresh without the user taking an action
TRUE
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
TRUE
Creating and spreading online viruses is a cybercrime.
TRUE
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
TRUE
Dynamic IP addressing is accomplished using a DHCP server.
TRUE
Ethical hackers are also known as white-hat hackers.
TRUE
In an active topology, each node helps to move data through a network.
TRUE
Most computers today come with network adapters already installed
TRUE
P2P networks are most commonly used in home networks.
TRUE
Sharing files is a benefit of a network
TRUE
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
TRUE
The tag <i> informs a browser that the text that follows the tag should be italicized.
TRUE
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
TRUE
Transmission media comprise the physical system that data take to flow between devices on the network.
TRUE
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
TRUE
Wireless network connections are slower than wired broadband connections
TRUE
Wireless networks are more vulnerable to attack than wired networks
TRUE
XML and JSON are both common formats for the exchange of information between web services
TRUE
When creating an Access table in Design view, you can add each of the following EXCEPT ________.
Table sizes
HTML tag
Tags that surround and define HTML content (such as and, which indicate bolding)
Two types of Personal Property
Tangible and intangible
Variable Declaration
Tells the operating system that the program needs to allocate storage space in RAM
Which of the following is FALSE about working with templates in Squarespace?
Templates cannot be customized.
Which is NOT a key component of a typical client/server network?
Terminator
Which of the following is the final stage of the program development life cycle (PDLC)?
Testing and Documentation
Electronic text (e-text)
Textual information stored as digital information, so that it can be stored, manipulated, and transmitted by electronic devices
Token method
The access method used by ring networks to avoid data collisions
Backward Compatibility
The accommodation of current devices being able to use previously issued software standard in addition to the current standard
Batch processing
The accumulation of transaction data until a certain point is reached, at which time several transactions are processed at once.
Network Adapter
The device within a computing device that connects it to a network
Electronic Data Interchange (EDI)
The exchange of large amounts of data in a standardized electronic format.
It is more efficient to make a copy of an existing query rather than to create a new query when which of the following is true?
The existing query and the new query use the same tables and fields
Primary key
The field (or combination of fields) that uniquely identifies each record in a table.
Which of the following is TRUE about considerations for choosing programming languages for programs that will be embedded on a chip?
The final program needs to not take up a lot of storage space.
Public key
The key for coding distributed to the public in public-key encryption.
Private Key
The key for decoding retained as private in public-key encryption.
First Generation Language (1GL)
The machine language of a CPU; the sequence of bits that the CPU understands
Internet Backbone
The main pathway of high-speed communications lines over which all Internet traffic flows.
Tunneling
The main technology for achieving a virtual private network; the placement of data packets inside other data packets.
Star topology
The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.
When I attach a file to my e-mail, will SMTP send it to the e-mail server?
The multipurpose Internet mail extensions (MIME) protocol is responsible for sending e-mail file attachments.
How can you recognize an unsecured wireless network?
The network icon will have a warning symbol.
My office has shifted to a client/server network and uses one server in the office—is that sufficient?
The number and types of servers you need depends on the workload your network experiences
Sampling Rate
The number of times per second a signal is measured and converted to a digital value. It is measured in kilobits per second
All of the following statements are true about creating a database except:
The objects provided in a template cannot be modified
Internet Corporation for Assigned Names and Numbers (ICANN)
The organization that registers Internet protocol addresses to ensure they're unique and haven't been assigned to other users
Error Handling
The part of a program statement where programmers describe what the program should do if the input data is invalid or just gibberish
Testing Plan
The part of the problem statement that lists specific input numbers the programmers would typically expect the user to enter; the plan then lists the precise output values that a perfect program would return for those input values
Media Access Control (MAC) address
The physical address, similar to a serial number, of each network adapter
Compilation
The process by which code is converted into machine language-- the language the CPU can understand
Data mining
The process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.
Identity theft
The process by which someone uses personal information about someone else (such as victim's name, address, and SSN) to assume to the victim's identity for the purpose of defrauding another
Encryption
The process of coding e-mail so that only the person with the key to the code (the intended recipient) can decode the message
Piggybacking
The process of connecting to a wireless network without the permission of the owner of the network
Validation
The process of ensuring that data entered into a database is correct (or at least reasonable) and complete.
Method
The process of how a program converts inputs into the correct outputs
Authentication
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network
Program Development Life Cycle (PDLC)
The process of performing a programming project, which consists of five stages: describing the problem, making a plan, coding, debugging, and testing and documentation
Debugging
The process of running a program over and over to find and repair errors and to make sure the program behaves in the way it should
Simple Mail Transfer Protocol (SMTP)
The protocol responsible for sending e-mail along the Internet to its destination; part of the Internet Protocol suite.
Hypertext Transfer Protocol (HTTP)
The protocol that allows files to be transferred from a web server so that you can see them on your computer by using a browser.
Transmission Media
The radio waves or the physical system (cable) that transports data on a network. Can be wired or wireless
Transmission Media
The radio waves or the physical system (cable) that transports data on a network; system which enables the flow of data on a network
Online Transaction Processing (OLTP)
The real-time processing of database transactions online.
A network technician can expect each of the following except
The same challenges every day
Order of operations
The sequence by which operations are performed in a mathematical expression.
Problem Statement
The starting point of programming work; a clear description of what tasks the computer program must accomplish and how the program will execute those tasks and respond to unusual situations
When entering, deleting, or editing input masks:
The table must be in Design view.
Record source
The table or query that supplies the records for a form or report.
Persistence of Information
The tendency for pictures, videos, and narratives to continue to exist in cyberspace even after you delete them
Data redundancy
The unnecessary storing of duplicate data in two or more tables.
Relational algebra
The use of English-like expressions that have variables and operations, much like algebraic equations, to extract data from databases using Structured Query Languages
Digital Convergence
The use of a single unifying device to handle media, Internet, entertainment, and telephony needs
Drive-by-download
The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing the web
What are the different types of databases and which is the most common?
There are relational, object-oriented, and multidimensional databases. Of these, the relational database is most common
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks
How many UTP cables?
Three; Cat 5E, Cat 6, and Cat 6A
How is analog converted to digital?
Through a process called analog-to-digital conversion
__ are elements such as videos, weblinks, and images which can eb added to a power BI dashboard
Tiles
__ day is data that doesn't pertain to on period of time
Time-variant
Coding
Translating an algorithm into a programming language
program that appears to be something useful or desirable
Trojan horse
Microsoft has free online Power BI tools available
True
Switches are used to send data on a specific route through an internal network
True
Shielded twisted-pair (STP) cable
Twisted-pair cable that contains a layer of foil shielded to reduce interference.
What are Alibaba and Panjiva?
Two online business-to-business databases that help to navigate these transactions
Fuzzy logic
Used probabilities to inject experimental learning in knowledge-based systems. Enables the interjection of experiential learning into knowledge-based systems by allowing the consideration of probabilities
Caption property
Used to create a more understandable label than a field name that displays in the top row in Datasheet view and in forms and reports.
Form tool
Used to create data entry forms for customers, employees, products, and other tables.
Report Tool
Used to instantly create a tabular report based on the table or query currently selected.
Comparison Operator
Uses greater than (>), less than (<), greater than or equal to (>=), and less than or equal to (<=), etc. to limit query results that meet these criteria.
Virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device.
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
How do nodes connect to each other?
Via transmission media
Design view
View that enables you to create and modify a table design.
Software Piracy
Violating a software license agreement by copying an application onto more computers than the license agreement permits
Trade Dress
Visual appearance of a product or its packaging, similar to a trade mark. Example: Coca Cola Bottle
Flowchart
Visual diagram of a process, including the decisions that need to be made along the way
Which protocol uses standard internet connections to make phone calls over the internet
VoIP
__ technology is used to make free long-distance calls
VoIP
A(n) ________ is made up of two or more LANs that are miles apart.
WAN
The network architecture that spans the largest physical distance is called a _____
WAN
network of two or more LANs
WAN
How to get free Wi-Fi access?
Websites like Wi-Fi-FreeSpot, apps like WifiGet, and ISPs which may provide free hotspot service
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
White-hat
Can I set up a wireless network at home?
You can have a wireless network only if each node connected to the network has a wireless network adapter attached to it or installed in it.
What else can I store in a field besides text, numeric values, and contents of a calculation?
You can store pictures and video clips using OLE Object fields
What data type can I use for a field if I have to store a page of text?
You can use memo fields. They are text fields that are used to hold long pieces of text
Is there any other safer way to encrypt e-mails?
You can use public-key encryption. In public-key encryption, two keys are created, one key for encoding and the other for decoding.
What server is used to store applications?
You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer
How do I create relationships between tables?
You use primary and foreign key fields to create relationships between tables
How can I share an Internet connection on a wireless network?
You'll need a special router to share an Internet connection on a wireless network.
Field constraint
a property that must be satisfied for an entry to be accepted into the field
Model Release
a release which usually grants the photographer the right to use an image of the model (or subject of the photo) commercially
Print server
a server that manages all client-requested jobs for all printers on a network
Computer Protocol
a set of rules for exchanging electronic information
An applet is a. a small application located on a server computer b. a program distributed by Apple Inc c. a hardware device that encrypts e-mail messages d. a program language used to help create dynamic web pages
a small application located on a server computer
an applet is
a small application located on a server computer
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
algorithm
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
algorithm
in the client/server model, clients are phones or computers and serves are computers
all of the above
If you need a professional-looking website with many features, you can
all of the above (code it by hand.pay a professional web designer.use a web design tool like Squarespace)
acts as a repository for application software
application
The process whereby users prove they have authorization to use a computer network is known as
authentication
To manage authorized connections to internal networks, which server would a client/server network include?
authentication
keeps track of user logins to the network and which services are available to each user
authentication
How would you reply to an e-mail you've received that has multiple recipients, when you only want the sender to see your reply? a) Click Reply to All b) Click Reply c) Click Forward
b) Click Reply
sends data between different collision domains
bridge
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute force attack
Connecting computers in a line on a single cable run is called a(n) _____ topology.
bus
In a ________ topology, all computers are connected in a line on a single cable run.
bus
In a table, if you need to store the extended price (number of units sold times the price per unit) of an order, you would store the data in a ____ field.
calculated
The results of multiplying the Hours field times the Rate field would be store in a(n) ____ field.
calculated
Digital cameras don't use film. Instead, they capture images on electronic sensors called _________ arrays and then convert those images to digital data, series of numbers that represent the color and brightness of millions of points in the image
charge-coupled device (CCD)
Traditional landline telephones use __, which is a dedicated connection between two points that remains active for the duration of transmission
circuit switching
a dedicated connection is formed between two communicating parties
circuit switching
In an object-oriented programming language, ________ are a combination of data fields and methods and model things like network connections, windows, scrollbars.
classes
By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.
classless interdomain routing (CIDR)
Encryption is used to a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the internet more available
code your e-mail so only one person can decipher it
An integrated development environment (IDE) is a ______.
collection of tools that helps programmers write and test their programs
All of the following are types of objects in an Access database EXCEPT ________.
columns
Which server would a client/server network include to control data exchanges with other networks?
communications
Codepen.io has a coding ________ which provides an ability to interact with others and learn from their projects or Pens.
community
A(n) _____ is a program which reads the instructions programmers have written and translates these instructions into binary patterns that will execute commands on the CPU.
compiler
a set of rules for exchanging electronic information
computer protocol
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
computer virus
client
computers on which users accomplish specific tasks and make specific requests
LAN
confined to a small geographic location beyond the home
Collections of data connected to Power BI are known as __?
datasets
A(n) ________ server is a server used to fulfill one specific purpose.
dedicated
In a network, ____ servers preform specific tasks such as handling e-mail or managing files
dedicated
Servers such as print and database are examples of ___ servers that fulfill a specific network function
dedicated
All of the following are extra precautions you can take to secure a wireless network EXCEPT
enable SSID broadcast
Network Adapters _____.
enable nodes in a network to access the network and to communicate with each other
a key pair is a set of two keys used to
encrypt and decrypt an email message
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
_____ is the process of encoding data so that only the person with the key can decode and read the message.
encryption
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
In http://example.gov, what is the second-level domain?
example
Which network cable type is virtually immune to signal interference?
fiber-optic
What type of network media is virtually immune to interference?
fiber-optic cable
A category of information about students, such as their phone numbers, would be stored in a(n) ____.
field
In ________ generation languages, problems are presented as a series of facts or constraints instead of as a specific algorithm.
fifth
A(n) ________ server is a server that stores and manages files for network users.
file
In terms of databases, a table is also referred to as a(n) ____.
file
Which of the following is used to create a temporary subset of data that matches certain criteria?
filter
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
firewall
A ________ keeps your computer safe by determining who is trying to access it.
firewall
A(n) ____ is a hardware or software solution that helps protect your network.
firewall
Installing a(n) ________ is the first step in securing your network from unwanted intruders.
firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
firewall
hardware or software for protecting computers from hackers
firewall
software or hardware that prevents unauthorized entry
firewall
A(n) ________ is a group of data packets that are sent together.
frame
holds multiple data packets
frame
data attached to a photo that indicates when/where the photo was taken
geotag
Wireless Access Point (WAP)
gives wireless devices a sending and receiving connection point to the network
A secure website using SSL encryption will have __ followed by ://www.websitename.com as the protocol in its URL
https
communication between two or more people over the Internet in real time
instant messaging
firmware
instructions in read-online memory
All of the following are considered dedicated servers EXCEPT ____
internal servers
the collection of large national and international network used to establish the internet is called the
internet backbone
A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
intranet
As your wirelessly connected device moves further away from the wireless router, what happens to the signal
it decreases
Which of the following statements about using ghosting software is false
it is difficult to use
All of the following are problems with the bus topology EXCEPT ________.
it is more expensive than star topology
HTTPS is different than HTTP because a. of how it transforms or reformats the data b. it is a combination of HTTP and the secure sockets layer c. it extracts data from source databases d. it stores data in the data warehouse
it is. a combination of HTTP and the Secure Sockets Layer (SSL)
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers/key loggers
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
launch a denial of service (DoS) attack on your computer
Fiber-optic cable transmits signals using
light waves
Which of the following is NOT a database component?
list
A peer-to-peer (P2P) network is an example of ____ administration
local
virus that is triggered when a file is opened or program is started a certain number of times
logic bomb
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
In a database, a text field capable of holding complete paragraphs has a ____ data type.
long text
When you evaluate a template to start your website design, you should
look at the fonts and layout of content.
An example of a first-generation language is?
machine language
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
All of the following are top cybercrimes reported to the IC3 EXCEPT
malware fraud
bandwidth
maximum speed at which data can be transmitted
Dynamic addressing
means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet
The physical address assigned each network adapter is called its ________.
media access control (MAC)
In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of the background.
movement of the mouse
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
multipartite
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
network
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
network
Every device you would like to connect to a network, whether wired or wireless must have a(n) __ installed in it
network adapter
For the nodes on a network to communicate with each other and access the network, each node needs a _____
network adapter
The device that breaks data into packets for transmission on a network is the _________.
network adapter
Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.
network administrators
Client/server networks are controlled by a central server that runs specialized software called a(n) ______.
network operating system (NOS)
IPV6 was needed when IPV4 ________.
no longer had enough unique addresses
A process to ensure that data in a database is organzed most efficiently is called
normalization
The type of database that would be best to store and organize video clips and pictures is which of the following?
object-orriented database
NOS software is needed
on all computers in a client/server network
a customer info table linked to an order table in a business database reflects what type of relationship?
one-to-many
Java is considered to be architecture neutral because it
only needs to be compiled once and can run on many different CPUs
Another name for a sniffer is a(n) ________ analyzer.
packet
Bundled data is referred to as a(n) ____.
packet
data broken into a small segment with an address to which it is sent
packet
method for selectively allowing certain requests to access ports
packet filtering
The communications methodology that computers use to transfer data is called __
packet switching
breaks information down into pieces that can take different paths
packet switching
Packet switching is the communication methodology where data is broken into __ that are sent over various routes at the same time
packets
A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.
passive
A(n) ________ network is often the type of network that is set up in a home or very small business.
peer-to-peer
In a ________ network, each node connected to the network communicates directly with every other node.
peer-to-peer
The most common home network is a?
peer-to-peer network (P2P)
Codepen.io lets users share their work in projects named ________
pens
FBI-related scams involve ________.
people pretending to represent official organizations
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
pharming
The most common kind of pretexting in cyberspace is ________.
phishing
Which of these is NOT one of the three features in a loop?
phrase
Pixel is short for?
picture element
Connecting to a wireless network without the owner's permission is known as ________.
piggybacking
To ensure that there are no duplicate records in a database table, you need to establish a ____.
primary key
When using ________-key encryption, only the message sender and recipient have the code.
private
The _____ encryption, only the two parties involved in sending a message have the code to unlock the message
private-key
used to decode an encrypted message
private-key
Before programmers decide which programming language to use or start writing code, they develop a complete description of the task the program needs to accomplish. This is called a ________.
problem statement
_____ is the process of translating a task into a series of commands a computer will use to perform that task.
programming
Web service
programs that a website uses to make information available to other websites
Providing adequate security on a corporate network involves all of the following issues EXCEPT
proprietary software encryption
A ________ is a set of rules for how information and communication are exchanged.
protocol
set of common rules that control communications among network devices
protocol
WEP and WPA are examples of ________.
protocols that use encryption to protect wireless transmissions
Programmers often begin by constructing a working simulation of the program, called a(n) ________.
prototype
server
provides information and resources to other computers on a network
_____ encryption is the most commonly used encryption on the internet
public-key
In ____ encryption, a key pair is created, where one key is for coding and the other is for decoding
public-key (also known as key pair)
PGP
public-key encryption apckage
The Q in SQL stands for Structured ________ Language.
query
Which device might you use to improve your Wi-Fi signal without using a cable to connect to the router
range extender
Which of the following is a method of inputting data into transaction processing system while the transaction is taking place?
real-time processing
At a minimum, all data packets must contain the __
recipient's address, sender's address, reassembling instructions, and data
A group of related fields is called a ____.
record
The information about a single student would be stored in a ____.
record
The duplication of data in a database is called data _____.
redundancy
programs that allow hackers to gain access to your computer without your knowledge
rootkit
On client/server networks, bridges
route data between two collision domains on a single network
A ________ sends data between two networks.
router
A navigation device that transfers packets of data between two or more networks is called a ______.
router
A(n) ____ is used to send data between a home network and the Internet
router
A(n) ________ can often be equipped to act as a hardware firewall.
router
An example of a network navigation device is a __________.
router
To transfer data packets between two or more networks, a ____ is used.
router
device that sends information between two networks
router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
A(n) ________ virus is a series of commands that is executed without your knowledge.
script
unique domain within another domain
second-level domain
To keep current with fixes to problems, technicians should do all of the following except
seek advanced degrees
SMTP is the set of rules used to a. send e-mail along the internet to its destination b. shrink the amount of space it takes to store e-mail c. encrypt e-mail messages d. make shopping on the internet more available
send e-mail along the Internet to its destination
SMTP is the set of rules used to
send emails along the internet to its destination
CGI scripts are known as ________ programs because these programs run on a web server.
server-side
HAN
services a residence
Which of the following is an advantage of installing a client/server network in a business?
sharing of peripherals
Which of the following is not a report in Squarespace website analytics?
social media likes
Online Analytical Processing (OLAP)
software that provides standardized tools for viewing and manipulating data in a data warehouse
A(n) ________ can help block unwanted, unsolicited e-mail.
spam filter
All of the following are navigation devices to move data around or between networks EXCEPT ________.
spans
sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
spear phishing
transmits information about you, such as your Internet-surfing habits
spyware
Sites like _______ allow you to make high quality websites without any coding.
squarespace
________ is a website that helps you design elegant websites for free.
squarespace
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
star
In the ________ topology, all network devices are connected together through a central switch.
star
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.
static
When a(n) ________ address is assigned to a computer, its IP address will not change.
static
An IP address that does not change and is usually assigned manually by a network administrator is called a __
static address
IP address for a computer does not change
static addressing
A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
stealth
A(n) ________ protects a computer against power surges.
surge protector
All of the following are network topologies EXCEPT ________.
switch
If your router does not have enough wired ports to add more devices, you can install a ________ to add extra ports to your network.
switch
On a network, a(n) ____ helps prevent data packets from colliding with each other
switch
The device that receives data packets and sends them to the intended node on the same network is a(n) _____
switch
makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node
switch
_____ transmit signals only to the devices that need to receive them.
switches
The following are common to all programming languages:
syntax, keywords, and operators
A group fo related records is called a(n) ____.
table
What is the Access object that organizes data into fields and records?
table
The two types of objects responsible for collecting data in Access are ________.
tables and forms
<b> is an example of an HTML ________.
tag
<i> is an example of an HTML ________.
tag
HTML uses _____ to provide a browser instructions on how to display and format the document.
tags
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
The final step in the PDLC is ________.
testing and documentation
throughput
the actual speed of data transfer that is achieved on a network
Artificial Intelligence
the branch of computer science that deal with the attempt to create computers that think like humans
The information in a data packet includes a. that data and the destination b. the data and circuit identifier c. just the data d. different types of information depending on the type of message being sent
the data and the destination
the information in a data packet includes
the data and the destination
what if the IPS's web server cannot locate the IP information on the default DNS server
the default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listing for an entire top level domain
The actual (speed of) data transfer rate is called ____.
throughput
__ are single visualizations found in a Power BI reported or dashboard
tiles
A ________ is a virus that is triggered on a certain date.
time bomb
virus that is triggered by the passage of time or on a certain date
time bomb
A private key is important a. to reboot the system hardware b. to reset your public key if you lose a password c. to decode an encrypted message d. because it enables you to use MIME
to decode an encrypted message
a private key is important
to decode an encrypted message
The physical arrangement of computers, peripherals, and media used to create a network is called network ________.
topology
The physical or logical arrangements of computers, transmission media (cables), and other network components is known as network
topology
The system that data takes to flow between devices on a network is called _________.
transmission media
a query is used to extract a subset of data from a database
true
A very cost effective wired media for an environment with little to no interference is
twisted pair cable
__ is the most cost-effective wired transmission media
twisted pair cable
The most cost effective wired media is ____________.
twisted-pair cable
Most home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
How to see what network adapters are installed in your computer?
use Device Manager utility
You do not need to know how to program to
use Microsoft Word to type text and select various fonts
Rules for creating passwords include all of the following EXCEPT ________.
use a dictionary to find a lengthy word that is easy to remember
When creating a client side web page, you will often
use all three (HTML, CSS, and JavaScript)
PAN
used to communicate among devices near an individual
Input forms
used to control how new data is entered into a shared database
Join Line
used to create a relationship between two tables
Another name for bots is ________.
web robots
Paper Mills
websites that sell prewritten or custom written research papers to students
whens it sufficient to use a list to organize data?
when the data is simple and can be organized in one table
attempts to travel between systems through network connections to spread an infection
worm
Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.
writing computer manuals
A benefit of creating your own reports rather than relying entirely on Natural Language Queries and Quick Insights is __
you know your data and business climate better than artificial intelligence can
You can add images to a Squarespace site from the Getty Images service if
you purchase the images from Getty.