the physical address assigned each network adapter is called its ___.
a data ___ is a large-scale electronic repository of data that contains and organizes all of an organizations data in one place
a loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ___.
a ____ is a group of related data that can be stores, sorted, organized, and queried.
a ___ is a set of rules for how information and communication are exchanged
a ___ keeps your computer safe by determining who is trying to access it.
a ___ network can contain servers as well as individual computers
a ___ sends data between 2 networks
a ___ sends data from one collision domain to another
a ___ uses the internet communications infrastructure to build a secure and private network
a(n) ____ address is temporary IP address that is assigned from an available pool of IP addresses
a(n)___ address is a unique number that identifies a computer, server, or device connected to the internet
a(n)____ address is the address that external entities use when communicating to your network
a(n)___ is a way of retrieving information from one or more tables that defines a particular subset of data
a(n)___ is designed to improve communications and help employees complete their routine tasks.
a(n)___ server is a heavily secured server located between a company’s secure internal network and its firewall
a(n)___ server tracks who is logging on to the network as well as which services on the network are available to each user.
an integrated development environment (IDE) is a ____.
collection of tools that helps programmers write and test their programs
an IP address that does not change and is usually assigned manually by a network administrator is called a ___ address.
configuring an account to disable itself after a set of number of login attempts using invalid password is a method of countering a ___.
brute force attack
data staging consists of all of the following steps, EXCEPT ___.
mining the data
data ____ensures that the data contained in a database is accurate and reliable
if a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ____.
in a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ____ processing.
in a ___network, data collisions can occur fairly easily because the network is essentially composed of a single cable
in a ____ network, each node connected to the network communicates directly with every other node
in an Ethernet network, the signal that is sent to indicate a signal collision is called a ___ signal.
in public-key encryption, the two keys- one for coding and one for decoding- are known as ___.
a key pair
IPV6 was needed when IPV4 ____.
no longer had
management information systems (MIS) provided reports called ___ reports, which show conditions that are unusual or need attention from users of the system
ring networks use the ___ method to avoid data collisions
SQL is an example of a ___.
the capability of moving a completed programming solution easily from one type of computer to another is known as ___.
the computers in a lab on a floor of a building would be connected using a ____.
the first-generation language is ___.
the main path of the internet along which data travel the fastest is known as the Internet ____.
the main suite of protocols used on the internet is ___.
the process that converts program code into machine language is called ___.
the set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ___.
the Siri personal assistant application on Apple’s iPhone 5s is an example of a ___.
the ____ is responsible for the Internet’s domain system and allocation of IP addresses
translating an algorithm into a programming language is called ___.
what is the first step of the system development life cycle (SDLC)?
problem and opportunity
which of the following information is NOT contained in a packet?
size in bytes of packet
which of the following is NOT a common network topology?
which of the following is NOT a likely primary key?
date of birth
which of the following is the most commonly used client/server network topology?
which of the following provides a visual representation of the patterns of an algorithm?
which protocol is used when sending files as attachments by email?
___ databases are the most frequently used electronic databases.
___ is the branch of computer science that attempts to create computers that think like humans
_____ is the process of translating a task into a series of commands that a computer will use to perform the task
___ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
___ permits two or more people to communicate over the Internet in real time.
T or F: data-flow diagrams trace all data in an information system from the point at which data enter the system to their final resting places.
T or F:one IDE can often be configured to support many different languages
T or F:an employee’s ID number, name, company position, address, city, state, and zip code make up a record
T or F:employees’ last names would usually make an appropriate primary-key field
T or F:a database schema defines the name, data type, and length of each field in the database
T or F:in a client/server network, each node communicates directly with every other node on the network
T or F:a compiler translates the source code into an intermediate form, line by line
T or F:in an active topology, each node helps to move through a network
T or F:MAC addresses and IP addresses are the same thing
T or F:IPv6 uses 6 groups of 16-bit numbers
T or F:LinkedIn is one of the most popular instant messaging services
T or F:file transfer protocol (FTP_ is used to transmit email messages across the Internet
matching: can be answered in only two ways (for example, yes/no)
matching: managing what a program should do if input data are invalid
matching: translates source code line by line into an intermediate form
matching: text-based approach to documenting an algorithm
matching:a field that has value unique to each record
matching: a collection of related data that can be stored, sorted, organized, and queried
matching: a category of information in a database
matching: provides manager with timely and accurate information
management information system (MIS)
matching: communicates with computer systems using a natural spoken or written language
natural language processing (NLP)
matching: assists employees in day-to-day tasks and communication
office support system (OSS)
matching: helps managers develop solutions for specific problems
decision support system (DSS)
matching: computer system designed to attract unauthorized users
matching: set of common rules that control communications among network devices
matching: device that absorbs a signal so that it is not reflected back
matching: special type of data packet
matching: data broken into a small segment with an address to which it is sent
matching: sends data between different collision domains
matching: makes decisions as the where data are to be sent and rebroadcasts them to the appropriate node
matching: device that sends information between two networks
matching: protocol that signs dynamic IP addresses
matching: used for transmission of email messages across the internet
matching: transfers data from servers to browsers
matching: an operating system for network servers
matching: adapter card that connects a computer to a network
matching: translates a domain name into an IP address