systems determine whether or not the person attempting access is actually who he or she claims to be.
advocates of __ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
increasingly, USB security keys, also called USB security ___-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features - are being used.
is a type of scam that uses spoofed domain names to obtain personnel information for use in fraudulent.
repeated threats or other harrassment carried out online between adults is refferred to as
melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ___, which appears as asterisks on the screen as it is being entered.
one of the first items that melissa installed was a(n) ___, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
intrusion prevention system (IPS)
melissa also decided to use an (n) ___, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occuring and block them.
occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
after the objectives, intended audience, and basic content to be included in a ___ have been determined, the structure and layout of the site can be designed.
multimedia refers to web sites containing more than one type of media-typically sound, video, or animation, in addition to text and images.
although broadband internet use is becoming the norm, there are still individuals using __ internet connections.
with a streaming audio file, only small portion of the audio file is initially downloaded and ___, and then the audio file can begin playing while the remainder of the file downloads simultaneously.
when a markup language is used, markup ___ are inserted around the web page content to identify where elements are to be displayed and how they should look when displayed.
web site development
once a web site has been carefully designed, it is time to create it. this process is called ___.
some of the most popular web site authoring programs are microsoft expression web and ___.
in the "about us" section of the web site, the doctor wants to include a photo of her office. she should save this image in the ___ format.
once andrea has recorded her music in an audio file, she would need to use a ___ method to reduce the size of the file before making it available through her web site.
one of the first steps in designing a multimedia application or web sit should be determining the primary objectives of the site and the intended ___.
for long web pages, you can include a(n) ___ at the top of the page that allows users to jump to a particular section of the document.
The newest version of HTML under development is ___ and is designed to replace the current versions of HTML and XHTML.
although some people are hesitant to send their ___ over the internet, it is by far the most common payment method used for online purchases.
web sites can be designed and developed in-house; instead, businesses have to outsource these tasks to a professional web development company.
the collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) ___.
because of the low overhead costs associated with ___, new e-commerce businesses can enter the marketplace relatively inexpensively.
some ___ (VOD) services (like Netflix) offer monthly subscriptions for ulimited movie rental downloads.
___ (owned by ebay) is an online payment service that allows individuals to transfer money easily from their online payment account to someone else's.
site-specific digital wallets
___ store checkout information in the customer's account for use with purchases on that site only.
to reassure customers, all e-commerce sites should develop and display a ___ policy stating how collected customer information will be used.
___ are special HTML or XHTML codes that provide information about a Web page and that are inserted into a webpage's code at the time the page is created.
the goal of ___ is for our web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a web search using keywords related to your site or business.
digital coupon consist of codes-typically called ___ that are entered into the appropiate location on a checkout page to deduct the coupon amount from a purchase total.
each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and tranfers it to the ___.
are typically interactive and provide information on demand whenever a decision needs to be made.
some ___ are designed to take the place of human experts, while others are designed to assist them.
geographic information system
A(n) ___ (GIS) is an information system that combines geographic information (such as maps and topology and terrain data) with other types of data in order to provide a better understanding of the relationships among the data.
according to the bureau of labor statistics, two of the top five projected fastest growing careers in the united states through 2016 are __.
A(n) ___ codes system software, fine-tunes operating system performance, and performs other systems software-related tasks.
A(n) ___ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
collaborative (workgroup) computing
the various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ___, and telecommuting.
an inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ___ management system (WMS).
artificial intelligence systems that attempt to imitate the way a human brain works are called ___.
when a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ___.
systems that link and are used by multiple enterprises-such as a business and its suppliers and other business paartners- are often called ___ systems.
when the data in a decision table is expressed in a tree format, it is called a (n)___.
describe the types of objects in a system and list the class name, as well as the attributes and methods used with that class.
if an application is going to need to interact with existing programs, it will likely be coded in the same ___ as those other programs.
the property that makes 4GLs easier to use is that they are ___, rather than th procedural third-generation languages.
in a(n) ___program, variables can be accessed and their value changed from any module in the program, as appropriate.
is the process of writing the actual program steps in the proper format for a particular programming language.
although there is no precise definition of ___, they are even further from machine language than fourth-generation languages, and, therefore, are much easier to use.
much of the coding in a ___ programming language consists of mouse clicks to select instructions and issue commands to the program.
programming focuses on the step-by-step instructions that tell the computer what to do to solve a problem.
in a computer program, ___ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.
a ___ is used to illustrate when, how, and in what order the statements in a computer program, module, or method are performed.
do until structure
with the ___, the instructions in the loop are repeated as long as a certain condition is false.
a(n) ___ occurs when a do while condition never becomes false or a do until condition never becomes true.
a(n) ___ is designed for a specific programming language and translates programs written in that language in to machine language so it can be executed.
programmers often use temporary dummy print statements - print statement that are temporarily inserted into the code- to help locate a ___.
programs created for mass distribution often have two stages of testing: an internal onsite test and one or more rounds of outside tests (called ___).
application lifecycle management
(ALM) is a broad term to describe creating and managing an application throughout its entire lifecycle-from design through testing.
Java is currently on the most popular programming languages and has replaced ___ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.
unified modeling language
(UML) is a set of standard notations that is widely used for modeling object-oriented programs.
at the end of the preliminary debugging process, the original programmer-or, preferably, someone else-runs the program with extensive ___ data to try to find any additional errors remaining in the program.
common business oriented language is a structured programming language designed for business transaction processing.
hashing procedures usually result in two or more records being assigned the same storage address, an event known as a ___.
one advantage of the ___ architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.
in determining the location where specific data is to be stored in a(n) ___, factors such as communications cost, response time, storage cost, and security are key considerations.
objects stored in an ___ can be retrieved using queries, such as with a(n) object query language (OQL)-an object-oriented version of SQL,
a ___ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.
one of the properties that can be assigned to a field is a(n) ___ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.
___ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.
with ___, the computer uses each record's primary key field and a mathematical formula called hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.
one of the simplest hashing algorithms involves dividing the primary key field by a particular ___.
if a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ___.
web-based database requests are received by the web server, which then converts the request into a database query and passes it on to the database server with the help of software called ___.
a(n) ___ is a specific field in a database table that uniquely identifies the records in that table.
in response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available ___.
at the present time, ___ procedures are confusing and time consuming, and they do not always work well.
a growing illegal use of computer monitoring software is the use of a keystroke logging system by ___.
to comply with truth-in-advertising laws, a(n) ___ e-mail address included in a unsolicited e-mail must be working address.
___ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
___ met with significant objection to its Beacon advertising service. Beacon introduced in late 2007, was designed to track members' web purchases and other web activities on more than 40 partner sites and share those purchases and activities with the user's friends.
by ___, you instruct companies you do business with that they cannot share your personal data with third parties.
___ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
by ___ businesses and consumers about the legal use of software and the possible negative consequences associate with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
law enforcement agencies contend that ___ systems and public video surveillance are no different than the many private video surveillance systems in place today.
___ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime prevention purposes.
___ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
employees who reveal wrong doing within an organization to the public or to authorities are referred to as ___.
the ___, such as the ones surronding executives at enron, tyco international, and worldcom, involved lies, fraud, deception, and other illegal and unethical behavior.
___ is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidently arrive at the site when trying to type the URL of the legitimate site.
is new option for taking your legally purchased movies with you on your computer or portable digital media player.
people who refer to written documents while working on their PCs should use ___ to keep their documents close to their monitors.
a(n) is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
___ is a specialized agency of the united nations and attempts to resolve international commerical disputes about intellectual property between private parties.
a ___ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.
to catch people who are sharing movies illegally on the internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and the identifies the responsible individual by using ___ of the computer being used to share the movie.
in additon to being annoying and a waste of time, ___ bog(s) down e-mail systems and clog user's inboxes.
a conditiion known as carpal tunnel syndrome has been linked to the repetitive finger movements made when using a keyboard.