BCIS 5-13

Ace your homework & exams now with Quizwiz!

Which of the following is not an example of a factor used in multi-factor authentication?

A password

What option automatically deletes records in related tables that match the primary key?

Cascade Delete Related Records

Which of the following is not a type of UTP cable you would use in a wired Ethernet network?

Cat 7B

Match each of the following terms to its definition:

Circuit Switching: a dedicated connection is formed between two communication parties PGP: public-key package Handshaking: exchange control packets between computers Packet switching: breaks info down into pieces that can take different paths ICANN: allocates IP addresses

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

Circuit switching

Which of the following is not a common network topology?

Cluster

________ is the standard communications protocol used on most client/server networks.

Ethernet

Every keystroke and every mouse click creates an action, or ________, in the respective device.

Event

Mobile hotspots let you tether only one device to the Internet at one time.

False

Most instant messaging services provide a high level of encryption for their messages.

False

Most wired home networks use Cat 7 cable.

False

Multi-factor authentication requires three of four possible authentication factors.

False

Multi-factor authentication requires three of four possible factors be demonstrated before authorization is granted.

False

Naming a table carefully is very important because it is the only way to describe what data that table contains.

False

One function of a communication server is to process and deliver incoming and outgoing e-mail.

False

Patents last for a period of 30 years from the date the patent is filed.

False

The control unit is one component of the ________.

CPU

Which of the following is not a major factor to consider when selecting network cabling?

Cable diameter

Peer-to-peer networks are considered centralized networks.

False

Text you add to the criteria row in a query is case sensitive, so be careful or you may get unexpected results.

False

The AND operator will give you the most results in a query.

False

The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.

False

The information in a data mart spans an entire enterprise.

False

The terms deep web and dark web can be used interchangeably.

False

The use of field headings without row references in a structured formula is called a qualified reference.

False

UTP cable has foil shielding.

False

Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.

False

WEP is a stronger form of security than WPA.

False

When connecting to the Internet, the acronym POP stands for Post Office Protocol.

False

When using Access, the text of the Declaration of Independence would be stored in a short text field.

False

When your computer runs out of RAM, the operating system borrows space from the CPU.

False

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

False

XML technologies allow web pages to change after they have been loaded.

False

You always know when you are using a database.

False

You can only sort records by one field.

False

You should use the same password for each system or website you need to access.

False

YouTube is the entity legally responsible for its content, rather than the person who uploaded the content.

False

"lastName" is an example of ________.

Camel case

Which of the following is not a characteristic of a table?

Can contain multiple ranges

In Microsoft Access, when you have the field name FirstName display as First Name, you are changing what field property?

Caption

Which of the following organizations research new Internet technologies to improve its capabilities?

Internet Engineering Task Force

Which of the following is not a common network architecture type?

Intraoffice area network (IAN)

What is not true about the Compact and Repair Database utility?

It can be set up to run automatically when a database is closed.

Which is not a reason someone might risk violating a copyright?

It is hard to prove the copyright in court.

Which of the following is not true about machine learning?

It is the opposite of Natural language processing.

All of the following are terms related to part of the boot process except ________.

JSON

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Jam

Which table style option is useful to display aggregated data when it is checked?

Last Column

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

MAC

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

File ________ provides an organizational structure to the files and folders on your storage device.

Management

A ________ check would be used in a field to restrict the fines for speeding violations so that they fall between $50 and $250.

Range

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.

Referential integrity

Which field property dictates whether the completeness check will trigger an error?

Required

Match each of the following terms to its definition:

Resolution: number of data points used to capture an image. Digital: data encoded as zeros and ones Analog: continuous sound of light waves CCD: electronic sensor used in digital cameras Codec: a rule that squeezes audio and video info into less space

A ________ sends information between two networks.

Router

Match each of the following TCP/IP suite protocols to its definition:

SMTP: used for transmission of e-mail messages across the Internet DHCP: protocol that assigns dynamic IP addresses HTTP: Tranfers data from servers to browsers TCP: prepares data for transmission providing for error checking and resending lost data IP: sends data between computers on the Internet

Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

Sampling rate

Match each of the following terms to its definition:

Server: provides information and resources to other computers on a network Client: computer on which users accomplish specific tasks and make specific requests Network: two or more computers connected together so they can communicate Piggybacking: unauthorized connection to a wireless network Node: a computer, peripheral, or communication device on a network

Which chart type is a visual "dashboard" of your data?

Sparkline

Which of the following does not influence a CPU's processing power?

Speed of the motherboard

________ is a program that gathers information about your surfing habits without your knowledge.

Spyware

Which of the following is the most commonly used client/server network topology?

Star

Which of the following fields is a likely primary key in a student information record?

Student ID Number

Match each of the following terms to its definition:

Switch: makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node Firewall: software or hardware that prevents unauthorized entry to a network Router: device that sends info between two networks Bridge: sends data between different collision domains on a single network Packet: data broken into a small segment with an address to which it is sent

The main suite of protocols used for transmitting data on the Internet is ________.

TCP/IP

Which of the following is not a conditional formatting option?

Table format

What does the Digital Living Network Alliance standardize?

The convergence of devices.

When you have frozen rows and columns, what happens when you press the Ctrl+Home combination?

The first unfrozen cell becomes the active cell

How long do current U.S. laws grant copyright protection?

The life of the author (creator) plus 70 years

A primary key can be a combination of several fields.

True

A switch acts like a traffic signal on a network.

True

A system restore point is a snapshot of your entire computer system's settings.

True

A virus signature is a portion of virus code that is unique to a particular computer virus.

True

A worm does not require human interaction to spread to other computers.

True

An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.

True

An application server acts as a repository for application software.

True

Cloud service providers often host file servers for customers.

True

Computer forensics is used to collect evidence for use in courtrooms.

True

Creating a database from a template can help you get started more quickly.

True

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

True

Each of the four numbers in a dotted decimal number is referred to as an octet.

True

Each root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.

True

FTP enables files to be downloaded or uploaded between computers.

True

Facts cannot be copyrighted.

True

In an Access database, a filter is limited to extracting data from a single table.

True

In an employee database, an employee's ID number, last name, first name, company position, address, city, state, and Zip Code make up a record.

True

Network attached storage devices can be set up to automatically backup data on a computer and save it on the network attached storage device.

True

NoSQL databases are good for unstructured data.

True

One advantage of establishing relationships between tables is so you can combine fields from more than one table in a query or report.

True

P2P networks are most commonly used in home networks.

True

P2P networks become difficult to administer when they have large numbers of users.

True

Personal firewalls can close open logical ports and make your computer invisible to other computers on the Internet.

True

Real-time processing means that transactions are updated when they occur.

True

Rows and/or columns which have been deleted in a data table can be brought back with the Undo command.

True

TCP uses a three-way handshake to establish a connection.

True

The Cascade Update Related Fields checkbox is irrelevant if the primary key has an AutoNumber field type.

True

The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.

True

The OpenPgP encryption protocol stands for Open Pretty Good Privacy.

True

The dark web is a well-concealed part of the deep web.

True

The downside of using a wireless range extender over an access point is that it shares the wireless connection and can potentially slow the entire network.

True

The foil sheath on a STP cable is there to help cut down on interference.

True

The majority of Internet communications follow the client/server model of network communications.

True

To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

True

When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be recreated.

True

When several people need access to a database, a dedicated database server can be the solution.

True

When you use the Freeze Panes option you freezing both columns and rows.

True

Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.

True

Wireless network connections are usually slower than wired broadband connections.

True

You can freeze as many columns and rows at the same time as you desire.

True

You should always check the terms of use document before using any copyrighted material on a website.

True

Your online reputation consists of the information available about you in cyberspace.

True

What transmission media is used for normal telephone service?

Twisted-pair cable

Which of the following is not a home operating system that supports P2P networking?

Unix

The main path of the Internet along which data travels the fastest is known as the Internet ________.

backbone

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

What is the name of the massive public online ledger which records the time and amount of every finalized cryptocurrency transaction?

block chain

A(n) ____virus replicates itself onto a hard drive's master boot record.

boot-sector

A ________ sends data from one collision domain to another.

bridge

In which topology are all computers connected in sequence on a single cable?

bus

A client/server network is an example of ________ administration.

central

Data ________ helps to ensure data integrity by maintaining information in only one place.

centralization

Running the Disk Cleanup utility is a quick way to ________.

clear out temporary Internet files

A ________ network can contain servers as well as individual computers.

client/server

Which of the following are the smallest segments within a sector on a hard drive?

cluster

A ________ check compares the values of data in two or more fields to see whether those values are reasonable.

consistency

Data in a multidimensional database is organized in a ________ format.

cube

The ________ consists of anonymously hosted websites that are mostly used for illegal activities.

dark web

Big data analytics is usually associated with ________ services.

data warehouse

A ________ is a collection of related data that can be stored, sorted, organized, and queried.

database

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs.

digital convergence

An IP address in the form 197.169.100.1 is called a(n) ________.

dotted quad

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

dynamic

To assign a field size of 12 to a field in a table you would ________.

enter 12 in the Field Size property of that field

Management information systems (MIS) provide ________ reports, which show conditions that are unusual or need attention from users of the system.

exception

Android is an open source operating system for network servers.

false

As long as you pick the correct chart you can mix numeric value systems, such as dollars and number of units sold.

false

Cache memory is a form of ROM.

false

In Windows 10, then is a limit of 25 virtual desktops that a user can create.

false

RAID 0 automatically duplicates your data and saves it on two identical drives.

false

RAM memory is a type of nonvolatile storage that holds the critical startup instructions.

false

Registers are areas of memory that are located close to the CPU.

false

The File History utility only keeps the most recent version of a file.

false

The collection of commands that a specific CPU can execute is called the instruction language for that system.

false

The hard drive's seek time is the time it takes a storage device to locate its stored data and make it available for processing,

false

The taskbar is the primary working area on the screen.

false

When configuring a home network, make sure all computers and peripherals are turned on before turning on the modem/router.

false

When you create a chart Excel automatically creates the chart on its own sheet and labels it Chart1.

false

A(n) ________ server is a server that stores and manages files for network users.

file

Which utility temporarily removes redundancies in a file to reduce the file size?

file compression

The location of a file is specified by its ________.

file path

You would use a ________ in an Access database to temporarily display records of residents for the city of Boston.

filter

Viruses, adware, and spyware are referred to collectively as ________.

grayware

When setting up a home network, make sure each node ________.

has a network adapter

A ________ topology uses more than one type of topology when building a network.

hybrid

A(n) ________ backup makes a copy of all changes since the last backup.

incremental

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

information assurance

Data ________ means that the data contained in a database is accurate and reliable.

integrity

Using a wireless network without the network owner's permission is known as ________.

piggybacking

________ is a technique that allows the CPU to work on more than one instruction at the same time.

pipelining

Google ________ is an online store that can be used for self-publishing books.

play

Individual Internet users connect to ISPs through a(n) ________.

point of presence (POP)

All of the following activities may infect your computer with a virus except ________.

printing a document

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.

root

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

A ________ displays a subset of data from a table (or tables) based on the specified criteria.

select query

A ________ uses electronic memory and has no motors or moving parts.

solid-state drive

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

An application programming interface (API) is ________.

the code the application software uses to take advantage of code written by others

Cache memory levels are based on proximity to ________.

the processor

One type of CAPTCHA is ________.

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website

A ________ is a virus that is triggered on a certain date.

time bomb

The Apple logo would be considered a(n) ________.

trademark

Every computer has an operating system.

true

File Explorer is Windows's main program to find, manage and view files.

true

In Windows, you can monitor CPU utilization in Task Manager.

true

Installing a device driver can sometimes cause system instability.

true

Level 1 cache usually contains the least amount of storage of the cache memory levels.

true

Most computers today come with network adapters already installed.

true

Multitasking is when one user can do multiple processes at the same time.

true

Pie charts can only display one data series.

true

SSD drives can make a huge difference in the amount of time it takes your computer to boot up.

true

Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive.

true

SuperFetch is part of the Windows memory management system.

true

The authentication process involves the verification of a user's login name and password.

true

Wireless networks are more vulnerable to attack by hackers than wired networks.

true

You can use System Restore to return your system's settings back to a specific date when everything was working properly.

true

What is a website that allows an instructor to upload a paper to check for plagiarism?

turnitin.com

Most wired home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

Nontraditional data in object-oriented databases such as audio clips, video clips, pictures, and very large documents are called ________ data.

unstructured

Which of the following ports is not considered to be exclusively a video port?

usb

RAM is an example of ________ storage.

volatile

A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

worm

MS-DOS is an example of a menu-driven interface.

False

In the URL http://www.pearsonhighered.com, which of the following is the top-level domain?

.com

Which of the following is not a video file extension?

.jpg

If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

802.11ac

Which of the following is not a standard for wireless Ethernet networks?

802.11zx

According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can greatly increase your computer's performance.

90%

Which of the following is not a valid comparison operator?

=>

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which of the following, when included, distorts the effectiveness of charting data points?

Aggregates

What field property would allow the user to enter two quote marks with nothing between them ("") into a field with a Short Text data type?

Allow Zero Length

Which is not one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

What allows you to add components to an existing database, rather than creating an entire new database?

Application parts

Which of the following is not a type of user interface?

Application programming interface (API)

________ is the branch of computer science that attempts to create computers that think like humans.

Artificial intelligence

Match each of the following terms to its definition:

Copyleft: granting of certain rights to a work while retaining other rights Sampling rate: number of times an analog wave is measured Trademark: allows McDonalds to protect its logo Fair use: allows people to use portions of a copyrighted work for specific purposes Digital rights management: allows only limited use of legally purchased materials

To protect a movie, what category of intellectual property would be used?

Copyright

To what does the @ symbol refer in a structured reference?

Current row

Using your computer for non-work activities while you are being paid to work is known as ________.

Cyber loafing

What is a system of access control that allows only limited use of material that has been legally purchased?

DRM

In Datasheet view, what does a pencil symbol to the left of a record indicate?

Data in that record has not been saved yet.

What field property would you use to automatically enter "PA" in a state field?

Default value

Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?

Defragment and Optimize Drives

Match each of the following terms to its definition:

Defragment and Optimize: repositions related pieces of files on the hard disk to improve access time Task Manager: lists all the programs being used and indicates their status System Restore: brings system back to a previously stable state File History, File Recover: backs up important files, makes a complete mirror image of your current computer setup Disk Cleanup: removes unnecessary files from the hard drive

Which of the following views would you use to view or modify a table's structure?

Design

Which of the following is not a broadband Internet connection option?

Dial-up

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

FBI and National White Collar Crime Center

A full backup and an image backup are the same thing.

False

A knowledge-based system is an analysis tool that, using internal and external data, provides a view of a particular business situation for the purposes of decision making.

False

A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

A summary report generated by an MIS provides a list of the transactions that occurred during a specified time period.

False

Access requires that common fields be named exactly the same.

False

All viruses cause serious destruction of computer data.

False

Although you can link to external data, it is not recommended.

False

An access point connects to the main router wirelessly.

False

An international company like Microsoft would use a MAN to connect all of its computers.

False

As long as your data is accurate there is no real need to print preview your reports.

False

Before you freeze panes make sure the active cell is one row above and one column to the left of the rows and columns you want to freeze.

False

Cable TV is a two-way service with signals coming to and from your TV to the cable provider.

False

Client-side programs run on a web server rather than on your computer.

False

Currently, there are no antivirus programs for mobile devices.

False

Data breaches are always intentional.

False

Data redundancy ensures that the data contained in the database is accurate and reliable.

False

Detail forms are used to control how new data is entered into a database.

False

Digital currency cannot be sent anonymously.

False

Employees' last name would usually make an appropriate primary key field.

False

Even if panes are frozen pressing Ctrl+Home will still make A1 the active cell.

False

Facebook Connect is one of the most popular instant messaging services.

False

Full backups back up all your data, but not your applications.

False

HTML is an acronym for Highly Textual Markup Language.

False

Hot wallets are much safer than cold wallets.

False

IPv6 uses six groups of 16-bit numbers.

False

In a relational database, when two tables have a common field, the link between the tables is known as a hyperlink.

False

In terms of video resolution, HD stands for highly digitized.

False

Intangible personal property has no value.

False

It is impossible to create a data table from random, unorganized data.

False

Java and JavaScript refer to the same language.

False

JavaScript uses the Device Object Model to organize the objects and page elements.

False

Limiting your signal range does not help increase wireless network security.

False

Match each of the following terms to its definition:

Fiber-optic cable: made up of plastic or glass and transmits data at extremely fast speeds Twisted-pair cable: made up of multiple copper wires Coaxial cable: single copper wire surrounded by layers of plastic Peer-to-peer network: each node can communicate directly with every other node on the network Client/server network: central computer provides info and resources to other computers

In a database, the term ________ is synonymous with a category of data.

Field

Match each of the following terms to its definition:

Field: a category of info in a database Database: a collection of related data that can be stored, sorted, organized and queried Record: a group of related fields Table: a group of related records Primary key: a field that has a unique to each record

The ________ Windows utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage location.

File History

Most users enter information into a database through the use of a ________.

Form

Which chart element cannot be chosen from the Chart Elements dialog box?

Format Back Wall

High-performance video graphics cards often use ________ memory.

GDDR5

Match each of the following terms to its definition:

GUI: type of user interface in macOS and Microsoft Windows 10 Thrashing: the condition of excessive paging Desktop: primary work area Pin: place an application tile on the Start screen or icon on the taskbar POST: checks hardware at startup

Which type of hackers break into systems for the thrill or to show off their skills.

Gray-hat

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

ICANN

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

IP

A(n) ________ address is the address that external entities use when communicating with your network.

IP

Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?

Image

What field property increases the speed at which searches can be performed?

Indexed

A violation of the holder's rights is known as copyright ________.

Infrigement

What field property insures that all phone numbers have a consistent look?

Input mask

________ permits two or more people to communicate over the Internet in real time.

Instant messaging

The rule of thumb that predicts that the number of transistors on a CPU will double every two years is called ________ Law.

Moore's

A ________ is any device connected to a network such as a computer, printer, or game console.

Node

In the task pane, what does a diagonal white triangle next to a chart category indicate?

None of the category's options are displayed.

________ is used to ensure that data is organized most efficiently in a database.

Normalization

Match each of the following terms to its definition:

Office support: assists employees in day-to-day tasks and comm Natural language: comm with a computer systems using a natural spoken language Managment Info System: provides managers with timely and accurate info Enterprise Resource Planning: software system that integrates multiple system data sources and ties together the various processes of an organization

Which of the following is the online storage system affiliated with Microsoft?

OneDrive

Which of the following is not another term for cryptocurrency?

Online currency

The two major types of system software programs are utility programs and the ________.

Operating System

Instead of writing a term paper, some people cheat and purchase one from a(n) ________.

Paper mill

Which of the following is not a computer virus category?

Pharming

The process of determining which applications and tiles are on the Start Menu is called ________.

Pinning

Which of the following is not a permanent storage option?

Random access memory

Which of the following information is not contained in a packet sent over the Internet?

The size (in bytes) of the packet

Which of the following is not true about e-books?

They are always PDF file format.

What is not true about field names?

They can begin with a space

What is not true about database relationships?

They tend to increase the overall file size of a database.

Ring networks use the ________ method to avoid data collisions.

Token

Deleted files on a Mac computer are moved to the ________.

Trash

Match each of the following terms to its meaning:

Trojan horse: program that appears to be something useful or desirable Pretexting: creating a scenario that sounds legitimate enough that someone will trust you Cookie: text file for storing personal preferences pertaining to websites Botnet: programs that run on a large number of zombie computers Time Bomb: virus that is triggered by the passage of time on a certain date

A database schema (dictionary) defines the name, data type, and length of each field in the database.

True

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

Which field property helps a user know why an entry error was generated?

Validation Text

Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.

Virtual memory

The network architecture that spans the largest physical distance is called a ________.

WAN

A data ________ is a large-scale collection of data that contains and organizes all of an organization's data in one place.

Warehouse

Which of the following is an example of an instant messaging service?

WhatsApp

When does copyright protection begin?

When a work is created and fixed into a digital or physical form

What is a good rule to follow to avoid plagiarism?

When in doubt, cite your source.

Cars often have ________ connectivity.

Wi-fi and bluetooh

If you want to access your home network from your distant garage, a ________ might help boost the signal.

Wireless range extender

What should you not select when selecting data for a chart?

Worksheet titles

________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

XML

What is true about adding a new field to the right side of an existing data table?

You can add it to the right of the data table and Excel will extend the table to include the new field.

A(n) ________ chip converts sound waves from a voice into a digital signal.

analog-to-digital converter

Which of the following two operating systems are used most frequently on tablets?

android and IOS

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

applet

When your hard drive has to wait for the correct sector to spin to the read/write head, the delay is known as ________.

latency

Match each of the following terms to its meaning:

latency: time needed for corrector sector to spin sectors: pie-shaped wedges on the surface tracks: concentric circles on a hard drive seek time: time required for the read/write platter: round, thin places of metal within

A packet analyzer is a program that can enable a hacker to do all of the following except ________.

launch a denial of service (DoS) attack on your computer

Where does the primary axis display on a Combo chart?

left side

The physical address assigned to each network adapter is called its ________ address.

media access control (MAC)

When referring to hard drives, access time is measured in ________.

milliseconds

Data staging consists of all of the following steps, except ________.

mining the data

Siri, the personal assistant application on Apple's iPhone, is an example of a ________.

natural language processing (NLP) system

Routers and switches are example of network ________ devices.

navigation

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

For the nodes on a network to communicate with each other and access the network, each node needs a ________.

network adapter

IPv6 was introduced when IPv4 ________.

no longer had enough unique addresses

A ________ is any device connected to a network such as a computer, printer, or game console.

node

A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.

one-to-one

Data are sent through a network in bundles called ________.

packets

C:\Windows\System32\drivers\etc\protocol is an example of a file ________.

path

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.

pharming


Related study sets

Biology 12-4.1E Divisions of the Nervous System

View Set

ThermoFluids Tutorial/Midterm/Practice Exam Problems

View Set

Chapter 31 - The child with a metabolic condition

View Set

Chloroplast structure and function

View Set

6A, 6B Grammar test. Intermediate

View Set