IT final
Which of the following is used to insert a line break?
<br />
To create separate paragraphs, the content for each paragraph must exist within its own _____.
<p> ... </p>
Which of the following is true about copyrights?
A composer automatically has copyrights to any piece of music he or she writes.
An example of a record in a database is:
All of the data about one specific thing, such as an individual employee.
The ____ Act regulates how Web sites can collect information from minors and communicate with them.
Children's Online Privacy Protection
__________ software can be used for asset tracking, inventory control, order entry, resource scheduling, and video collections.
Database
With the B2B business model, consumers sell directly to other consumers, such as via an online auction site.
FALSE
Netiquette refers to:
Informal rules of behavior for the Internet.
Structured Query Language is the name of a(n):
Language used for information retrieval in relational databases.
Which of the following is a free, open source scripting language?
PHP
A field whose value uniquely identifies each record in a table is called a(n):
Primary key.
A recipient uses which of the following to read an encrypted message?
Private key
One way to reduce the occurrence of carpal tunnel syndrome it to:
Take frequent breaks when you are working at a keyboard.
A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformats a hard disk.
Trojan horse
A(n) ______ is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.
Web filter
A ___________ is the person responsible for designing, developing and maintaining a website.
Webmaster
Which of the following is not a logic error?
You type ADN where you should have typed AND.
_____________ is the use of the internet and other electronic technologies through which business communicates and negotiates with customers.
e-commerce
To keep a message from being understood by anyone who intercepts it, you should:
encrypt it
____________ hardware is hardware that can change its architecture and behavior dynamically by autonomously interacting with its environment.
evolvable
If an <img> element does not include height and width attributes, then the ToolTip will be empty when the user moves the mouse over the image.
false
Longer passwords provide less security than shorter ones.
false
A column in a database in which customer names are stored would be referred to as a
field
Which of the following is not related to intellectual property rights?
gelmark
A (n) ______ translates and executes one statement at a time.
interpreter
An if-then-else statement uses which type of control structure?
selection
When programmers violate the rules of a programming language, ____ errors result.
syntax
Using someone else's identity to purchase goods or services or perform other transactions is called identity theft.
true
Virtualization is the practice of sharing or pooling computer resources, such as servers and storage devices.
true