This type of language consists of simple English like statements to specify to print or store
The amount of data instruction and info that can travel over a communications channel is called_________
the band width
This type of backup is a backup plan in which all data is backed up when a change is made
continuous back up
A check out clerk with this type of privileges to the email accounts in a discount warehouse data base could view them but not change them
read only access
A measure of how well compute hardware or software can grow to meet increasing performance demands
This type of data base stores documents such as schedules, calendars, manuals, memos, and reports
A personal ____ is a utility program that protects a personal computer from un authorized access
Sometimes a company uses a ____ which allows customers or suppliers access to part of its intra-net
An applied science devoted to incorporating comfort, efficiency and comfort into design of the work place
Internet advertising firms often use this type of software to collect info about users web browsing habits
Microwave transmissions called ___ sometimes involve sending signals from one microwave station to another
Computer viruses such as worms Trojans, etc. are _____ that alter the computer programs without the users knowing
Digital ______ is a branch of science that deals with the recovery and investigation of material found in digital devices, often in relation to computer crime.
A typical enterprise consists of hundreds operating entities called _____ which include departments, centers, and divisions
What are the benefits to using a database vs. a file processing system
easy access, reduces data redundancy and development time
A technique users use to make their network/internet transmission to look legitimate to a computer victim or network
With this users invest in stocks, options, bonds, treasuries, etc. without using a broker
_____ are small terminal like computers that relay mostly on a server for data storage and processing
enables wireless interconnections of access points in a network, allows a wireless network to be expanded using multiple access points
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
A(n) ____ network, the most recent network standard, conforms to the government security standards and uses more sophisticated encryption techniques than WPA.
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
Computer Matching and Privacy Protection Act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.