Advertisement Upgrade to remove ads

____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

spoofing

A user of a relational database refers to a record as a ____.

row

As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu

reuse and modify existing objects

Which of the following is not a utility function like the ones shown in the accompanying figure?
(controlling the keyboard;managing files;viewing images; uninstlling programs)

controlling the keyboard

A(n) ____ is an internal network that uses Internet technologies.

intranet

Which statement does not apply to the database approach?
-Programs are easier and faster to develop than with a file processing system
-it increases the data's integrity
-it allows nontechnical users to access and maintain data
-it requires less memory than file processing systems

it requires less memory than file processing systems

As shown in the accompanying figure, in large companies, users write a formal request for a new or modified information system, which is called a request for system services, or ____ request.

project

A ____ is a collection of data organized in a manner that allows access, retrieval, and use of that data.

database

Application software developed by the user or at the user's request is called ____ software

custom

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.

maintenance

Apple's latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.

os x

Project ____ is the process of planning, scheduling, and then controlling the activities during system development

management

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints

rsi

Which of the following statements is not true of file processing systems?

the records in one file relate to the records in other files

The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project.

proposal

a _______ filter is a program that warns or blocks you from potentially fraundulent or suspicious Web sites.

Phishing

A ____ is the destructive event or prank malware is intended to deliver

payload

A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network.

administrator

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file.

compression

23Computer ____ are the moral guidelines that govern the use of computers and information systems

ethics

Which is NOT a major activity of the planning phase, shown in the accompanying figure?

study how the current system works

A data ____ contains data about each file in the database and each field within those files

dictionary

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files.

cleanup

To defragment a disk means to ____.

reorganize it

A communications ____ is a transmission medium on which the data, instructions, or information travels.

channel

.A(n) ____ line is any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line.

t-carrier

information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

privacy

A ____ is a Web application that combines services from two or more sources, creating a new application.

mashup

.A ____ is a request for specific data from the database.

query

One member of a project team is the ____, who manages and controls the budget and schedule of the project.

leader

Which is NOT a major activity of detailed analysis?

prioritize the projects requests

A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.

server

Which of the following is not a scripting language?

html

A ____ is a connection within the data in a database.

relationship

Which of the following is not an example of a biometric device?

smart card

Bluetooth, UWB, Wi-Fi, and WiMAX communications technology use ____.

broadcast radio signals

The amount of data, instructions, or information that can travel over a communications channel sometimes is called the ____.

bandwidth

___ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.

intrusion

A(n) ____ is a communications device that connects multiple computers or routers together and transmits data to its correct destination on the network.

router

___ is a query language, an example of which is shown in the accompanying figure, that allows users to manage, update, and retrieve data.

sql

A P2P network, like the one in the accompanying figure, sometimes is called a(n) ____ network.

file sharing

__is a special formatting language that programmers use to format documents for display on the Web.

html

if an antivirus program cannot remove an infection, it often ____.

quarantines the infected files

A ____ is a wireless network that provides Internet connections to mobile computers and other devices

hot spot

A(n) ____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

biometric

When a company uses a ____ approach, this enables many programs and users share data.

database

On a ____ network like the one in the accompanying figure, all of the computers and devices on the network connect to a central device.

star

A database ____ decides on the proper placement of fields, defines the relationship among data, and identifies users' access privileges.

analyst

Which is the fastest type of line?

atm

Which of the following is not an operating system function?

word processing

In a database file, like the one shown in the accompanying figure, a ____ key field uniquely identifies each record in a file.

primary

. A ____ interface controls how you enter data and instructions and how information is displayed on the screen

user

A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.

form

____ software is mass-produced, copyrighted, or prewritten software available for purchase.

packaged

. In a typical file ____ system, each department or area within an organization has its own set of files.

processing

The core of a(n) ____ cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.

fiber-optic

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.

uninstaller

A network ____, like the one shown in the accompanying figure, refers to the layout of the computers and devices in a communications network.

topology

___ is a server outside a company's network that controls which communications pass into the company's network.

a proxy server

____ means the operating system automatically configures new devices as you install them

plug and play

A(n) ____ is a set of components that interact to achieve a common goal.

system

____, or 802.16, is a newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.

wimax

As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.

spam

a user of a relational database refers to a file as a __

table

To convert an assembly language source program into machine language, programmers use a program called a(n) ____.

assembler

___ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

antivirus program

___ is the collection and summarization of data and information.

documentation

As shown in the accompanying figure, a ____ controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information.

server

All of the following are common ways computers become infected with malware, except ___

installing a software package form a cd

the purpose of memory ___ is to optimize the use of R

management

Many systems implement access controls using a two-phase process called ____.

identification and authentication

. ____ is the process of comparing data with a set of rules or values to find out if the data is correct.

validation

. To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one shown in the accompanying figure, which gives users the right to use the software

license

A(n) ____ is a working model of the proposed system.

prototype

In the accompanying figure, a data ____ is a collection of related records stored on a storage medium such as a hard disk or optical disc

file

A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

user name

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set