A _______ is a group of related data that can be stored, sorted, organized, and queried.
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data _______.
Data _______ ensures that the data contained in a database is accurate and reliable.
Data _______ helps to ensure data integrity by maintaining information in only one place.
21 in a database, the term _______ is synonymous with a category of information.
In a database, a group of related records is referred to as a(n) _______.
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) _______ field.
b) short text
c) long text
You can set a _______, which is automatically displayed in a field unless the user enters something different.
a) field type
b) default value
c) numeric check
Which of the following is NOT a likely primary key?
a) Driver’s license number
b) Social Security number
c) Date of birth
d) Student ID number
_______ is used to ensure that data is organized more efficiently.
a) Range checking
d) Consistency checking
_______ databases are the most frequently used electronic databases.
A _______ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
_______ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
a) Database consistency
b) Record integrity
d) Referential integrity
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called _______ data.
Data in a multidimensional database is organized in a _______ format.
A _______ check would be used to restrict the fines for speeding violations from $50 to $250.
A(n) _______ check determines whether a required field such as LastName was filled in
A _______ check compares the values of data in two or more fields to see whether those values are reasonable.
You would use a _______ to temporarily display records of residents of the city of Boston.
b) validation rule
d) field constraint
A(n) _______ is a way of retrieving information from one or more tables that defines a particular subset of data.
c) validation rule
d) field constraint
A _______ displays a subset of data from a table (or tables) based on the specified criteria
a) join query
b) table query
c) select query
d) criteria query
SQL uses _______ to extract records from a database by using English-like expressions that have variables and operations.
a) relational algebra
b) primary keys
c) Boolean algebra
d) foreign keys
_______ involves putting data into an electronic file in a format that another application can recognize.
A data _______ is a large-scare electronic repository of data that contains and organizes all of an organization’s data in one place.
Data staging consists of all of the following steps EXCEPT _______
a) extracting the data
b) transforming the data
c) mining the data
d) storing the data in a warehouse
A(n) _______ is designed to improve communications and help employees complete their routine tasks.
a) office support system (OSS)
b) decision support system (DSS)
c) transaction-processing system (TPS)
d) management information system (MIS
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
Management information systems (MIS) provide reports called _______ reports, which show conditions that are unusual or need attention from users of the system.
The Siri personal assistant application on Apple’s iPhone 5s in an example of a _______.
a) management information system (MIS
b) database management system (DBMS)
c) natural language processing (NLP) system
d) decision support system (DSS)
_______ is the branch of computer science that attempts to create computers that think like humans.
a) Natural language processing
b) Enterprise resource planning
c) Artificial intelligence
d) Expert systems
A _______ is a group of two or more computers or nodes, designed to share information and resources
A _______ network can contain servers as well as individual computers.
In a _______ network, each node connected to the network communicates directly with every other node.
The computers in a lab on a floor of a building would be connected using a _______.
A _______ uses the internet communications infrastructure to build a secure and private network
A(n) _______ server tracks who is logging on to the network as well as which services on the network are available to each user.
A(n) _______ server is a server that stores and manages files for network users.
A print server uses a print _______ as a software holding area for jobs waiting to be printed.
Which of the following is NOT a common network topology?
c) Linear bus
A _______ is a set of rules for how information and communication are exchanged.
Ring networks use the _______ method to avoid data collisions.
b) packet screening
The ends of the cable in a bus network us a(n) _______ to absorb signals so that they are not reflected back to network components that have already received the signals
In a _______ network, data collisions can occur fairly easily because the network is essentially composed of a single cable
Which of the following is the most commonly used client/server network topology?
In an Ethernet network, the signal that is sent to indicate a signal collision is called a _______ signal.
A _______ topology uses more than one topology when building a network.
_______ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
d) Data capacity
Which of the following is NOT a factor to consider when selecting network cabling?
a) Cable diameter
c) Maximum run length
_______ cable is NOT subject to electromagnetic interference or radio frequency interference.
For business networks, which of the following is NOT a main cable type?
Most home networks use _______ cable, which is most susceptible to interference.
d) unshielded twisted-pair
_______ is the standard communications protocol used on most client/server networks.
The physical address assigned to each network adapter is called its _______.
a) network access control (NAC)
b) physical address control (PAC)
c) media access control (MAC)
d) network physical address (NPA)
A(n) _______ address is the address that external entities use when communicating with your network
A _______ sends data from one collision domain to another.
A _______ sends data between two networks
A _______ keeps your computer safe by determining who is trying to access it.
Packet _______ is a form of protection from your computer that looks at each packet that comes into your computer network.
A(n) _______ server is a heavily secured server located between a company’s secure internal network and it firewall.
d) bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a _______.
c) Trojan horse
d) brute force attack
The _______ is responsible for the internet’s domain name system and the allocation of IP addresses.
The main path of the internet along which data travel the fastest is known as the internet _______.
High-speed _______ communication lines use fibre-optics.
Individual Internet users connect to ISPs through a(n) _______
a) User Datagram Protocol (UDP)
b) optical carrier (OC) line
c) point of presence (POP)
d) T line
The main suite of protocols used on the internet is _______.
_______ uses a dedicated connection between to points with the connection remaining active for the duration of the transmission.
a) Circuit switching
b) A closed circuit
c) Packet switching
d) An open circuit
Which of the following information is NOT contained in a packet?
a) The address from where the packet originates
b) The data that are transmitted
c) The size (in bytes) of the packet
A(n) _______ address is a unique number that identifies a computer, server, or device connected to the internet.
A(n) _______ address us a temporary IP address that is assigned from an available pool of IP addresses.
An IP address that does not change and is usually assigned manually by a network administrator is called a _______ address.
IPV6 was needed when IPV4 _______.
a) became too old
b) was revoked
c) was eliminated
d) no longer had enough unique addresses
When checking to see whether a particular name is registered on the internet, your computer accesses a database that is kept on a(n) _______ server.
An IP address in the form of 188.8.131.52 is called a(n) _______.
a) random number
b) sequential access number
c) dotted quad
d) encryption key
In https://www.pearsonhighered.com, which of the following is the top-level domain?
By adding a network prefix to an IP address, supernetting or _______ lets a single IP address represent multiple unique IP addresses.
a) Secure Sockets Layer (SSL)
b) Dynamic Host Configuration Protocol (DHCP)
c) Internet Protocol version 4 (IPv4)
d) classless interdomain routing (CIDR)
Which of the following is NOT a language used in developing websites?
Which of the following was created for the transfer hypertext documents across the internet?
< b > is an example of an HTML _______.
Text such as < b >This should be bolded. is an example of an HTML _______.
_______ defines the content in terms of the data that is being described rather than how it is to be displayed
_______ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser.
A(n) _______ is a small program that resides on server and is designed to be downloaded and run on a client computer
c) CGI scrip
The _______ defines items on the web page as graphics, tables, and headers as objects
Which protocol is used when sending files as attachments by e-mail?
a) User Datagram Protocol (UDP)
b) Post Office Protocol (POP)
c) Multipurpose Internet Mail Extensions (MIME)
d) Simple Mail Transfer Protocol (SMTP)
In public-key encryption, the two keys – one from coding and one for decoding are known as _______.
a) linked keys
c) a key pair
d) code keys
Which of the following is an example of an instant messenger service?
b) Yahoo Messenger
_______ permits two or more people to communicate over the internet in real time.
c) Instant Messaging
Strong encryption now requires _______ -bit keys.