____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu
reuse and modify existing objects
Which of the following is not a utility function like the ones shown in the accompanying figure?
(controlling the keyboard;managing files;viewing images; uninstlling programs)
controlling the keyboard
Which statement does not apply to the database approach?
-Programs are easier and faster to develop than with a file processing system
-it increases the data's integrity
-it allows nontechnical users to access and maintain data
-it requires less memory than file processing systems
it requires less memory than file processing systems
As shown in the accompanying figure, in large companies, users write a formal request for a new or modified information system, which is called a request for system services, or ____ request.
A ____ is a collection of data organized in a manner that allows access, retrieval, and use of that data.
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.
Apple's latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
Project ____ is the process of planning, scheduling, and then controlling the activities during system development
Which of the following statements is not true of file processing systems?
the records in one file relate to the records in other files
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project.
a _______ filter is a program that warns or blocks you from potentially fraundulent or suspicious Web sites.
A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network.
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file.
23Computer ____ are the moral guidelines that govern the use of computers and information systems
Which is NOT a major activity of the planning phase, shown in the accompanying figure?
study how the current system works
A data ____ contains data about each file in the database and each field within those files
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files.
A communications ____ is a transmission medium on which the data, instructions, or information travels.
.A(n) ____ line is any of several types of long-distance digital telephone lines that carry multiple signals over a single communications line.
information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
A ____ is a Web application that combines services from two or more sources, creating a new application.
One member of a project team is the ____, who manages and controls the budget and schedule of the project.
A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.
The amount of data, instructions, or information that can travel over a communications channel sometimes is called the ____.
___ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.
A(n) ____ is a communications device that connects multiple computers or routers together and transmits data to its correct destination on the network.
___ is a query language, an example of which is shown in the accompanying figure, that allows users to manage, update, and retrieve data.
A P2P network, like the one in the accompanying figure, sometimes is called a(n) ____ network.
__is a special formatting language that programmers use to format documents for display on the Web.
A ____ is a wireless network that provides Internet connections to mobile computers and other devices
A(n) ____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
On a ____ network like the one in the accompanying figure, all of the computers and devices on the network connect to a central device.
A database ____ decides on the proper placement of fields, defines the relationship among data, and identifies users' access privileges.
In a database file, like the one shown in the accompanying figure, a ____ key field uniquely identifies each record in a file.
. A ____ interface controls how you enter data and instructions and how information is displayed on the screen
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
____ software is mass-produced, copyrighted, or prewritten software available for purchase.
. In a typical file ____ system, each department or area within an organization has its own set of files.
The core of a(n) ____ cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.
A network ____, like the one shown in the accompanying figure, refers to the layout of the computers and devices in a communications network.
___ is a server outside a company's network that controls which communications pass into the company's network.
a proxy server
____ means the operating system automatically configures new devices as you install them
plug and play
____, or 802.16, is a newer network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.
As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.
To convert an assembly language source program into machine language, programmers use a program called a(n) ____.
___ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
As shown in the accompanying figure, a ____ controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information.
All of the following are common ways computers become infected with malware, except ___
installing a software package form a cd
Many systems implement access controls using a two-phase process called ____.
identification and authentication
. ____ is the process of comparing data with a set of rules or values to find out if the data is correct.
. To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one shown in the accompanying figure, which gives users the right to use the software
In the accompanying figure, a data ____ is a collection of related records stored on a storage medium such as a hard disk or optical disc