Final Exam, Ch 10,11,12,13
The main path of the Internet along which data travels the fastest is known as the Internet ________
Backbone
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
Beta
The process that converts program code into machine language is called ________.
Compilation
File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet.
False
The United States government is the sole country in charge of the Internet.
False
Web applications are programs that a website uses to make information available to other websites.
False
Which of the following provides a visual representation of the patterns of an algorithm?
Flowchart
Data ________ means that the data contained in a database is accurate and reliable
Integrity
The computers in a lab on a floor of a building would be connected using a _______
LAN
The capability of moving a completed programming solution easily from one type of computer to another is known as ____
Portability
What is the first step of the system development life cycle (SDLC)?
Problem and Opportunity Identification
________ is the process of translating a task into a series of commands that a computer will use to perform the task.
Programming
_______ databases are the most commonly used electronic databases.
Relational
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
True
Cloud service providers often host file servers for customers
True
Java is architecture neutral
True
Service packs are also known as software updates.
True
The majority of Internet communications follow the client/server model of network communications.
True
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
_______ is the branch of computer science that attempts to create computers that think like humans.
artificial intelligence
_______ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
bandwidth
A ________ network can contain servers as well as individual computers.
client/server
________ are the conditions that users can set in a query to identify the specific records they want to return.
criteria
A ________ is an organized collection of data
database
You can set a ________, which is automatically displayed in a field unless the user enters something different.
default value
Data redundancy ensures that the data contained in the database is accurate and reliable.
false
When creating a calculated field, all values in the expression must come from an existing table field.
false
Wildcards can be applied to all data types in the query criteria
false
Within an Access table, each row is a field and each column is called a record.
false
In a database, the term ________ is synonymous with a category of data
field
In a table, a ________ is used for each single piece of information for every record, such as a first or last name.
field
A(n) ________ server is a server that stores and manages files for network users.
file
A ________ topology uses more than one type of topology when building a network.
hybrid
Data that is accurate, timely, and organized in a useful manner is ________.
information
_______ permits two or more people to communicate over the Internet in real time.
instant messaging
IPv6 was introduced when IPv4 _______
no longer had enough unique addresses
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
one-to-one
Division by zero is a ________ error that is caught when the program executes
runtime
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
select query
_______ is the process of arranging data in a specific order based on the value in a field.
sorting
Which of the following fields is a likely primary key in a student information record?
student id number
When designing a new database, the first question users should ask themselves is _______
what question should this database be able to answer?
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
Dynamic
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
False
Client-side programs run on a web server rather than on your computer
False
Which of the following would not be considered a possessed object?
password
In a ________ network, each node connected to the network communicates directly with every other node
peer-peer
The ________ key refers to the unique field that identifies each record
primary
A network ________ is a set of rules for how information and communications are exchanged.
protocol
It is not common for a user to need to see all data in all tables which is why creating a ________ allowing a user to get a subset of data is so beneficial.
query
A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250.
range
In a table, a ________ contains all of the categories of data pertaining to one person, place, event, thing, or idea.
record
To connect two or more tables that have common fields, a user will need to establish and define the table _______
relationships
An object or item's Property Sheet is where you can make precise changes to the characteristics of the object or item.
true
If you make changes to the structure of a table, you will be prompted to save the table when closing it.
true
In a relational database, tables are linked through common fields.
true
It is common that a database may have several tables where a user will need to establish relationships.
true
Typically, tables are not stored with the data sorted, but instead use queries to sort the data used within forms and reports.
true
Users can apply the OR condition to a single field
true
When users enter currency values as criteria, they do NOT need to type the dollar sign.
true