Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

With ____ users type or send short messages on a mobile device


This is a coffee house or restraint that provides internet to its customers

cyber café

A type of communications device that connects the device to the communications channel


A file server does what?

stores and manages files

A collection of data organized in a manner that controls access to that data

data base

This type of language consists of simple English like statements to specify to print or store

query language

This type of cable consist of one or more twisted pair wires bundled together

twisted pair cable

The amount of data instruction and info that can travel over a communications channel is called_________

the band width

This type of backup is a backup plan in which all data is backed up when a change is made

continuous back up

A check out clerk with this type of privileges to the email accounts in a discount warehouse data base could view them but not change them

read only access

This is processed data that is organized and useful


A measure of how well compute hardware or software can grow to meet increasing performance demands

scale ability

Validation ___ reduce data entry errors


This type of data base stores documents such as schedules, calendars, manuals, memos, and reports

brute ware

To make collaboration possible among employees uses a document ____ system


A computer ___ risk is any action that can cause a loss of info, etc


Software___ is the unauthorized and illegal duplication of software


A personal ____ is a utility program that protects a personal computer from un authorized access

personal firewall

A system ___ is the prolonged malfunction of a computer


Up-time is a measure of what?


Sometimes a company uses a ____ which allows customers or suppliers access to part of its intra-net


An applied science devoted to incorporating comfort, efficiency and comfort into design of the work place


This type of server as a complete computer server on a single card

blade server

Internet advertising firms often use this type of software to collect info about users web browsing habits

spy ware

Someone who uses email as a vehicle for extortion

cyber extortion

This allows users to share documents with each other in real time

online meeting

Microwave transmissions called ___ sometimes involve sending signals from one microwave station to another

fixed wireless

Many businesses use this to limit employee's web access

content filtering

A blank is a numeric password either assigned by a company or selected by a user


Computer viruses such as worms Trojans, etc. are _____ that alter the computer programs without the users knowing


A modem that sends digital data and information on phone lines


Digital ______ is a branch of science that deals with the recovery and investigation of material found in digital devices, often in relation to computer crime.


A typical enterprise consists of hundreds operating entities called _____ which include departments, centers, and divisions

functional units

What are the benefits to using a database vs. a file processing system

easy access, reduces data redundancy and development time

Computer _____ occurs when a computer consumes someone's entire social life


A technique users use to make their network/internet transmission to look legitimate to a computer victim or network


With this users invest in stocks, options, bonds, treasuries, etc. without using a broker

online trading

_____ are small terminal like computers that relay mostly on a server for data storage and processing

thin clients

enables wireless interconnections of access points in a network, allows a wireless network to be expanded using multiple access points

distribution syestem

The practice of sharing computing resources such as servers and storage devices


____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.


A(n) ____ network, the most recent network standard, conforms to the government security standards and uses more sophisticated encryption techniques than WPA.


A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.

script kindle

A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).


A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.

over voltage

The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.

Computer Matching and Privacy Protection Act

The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.

Electronic Communications Privacy Act (ECPA)

A ____ is the unit of energy a surge protection device can absorb before it can be damaged.


One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.

web bug

Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.


Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording