Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
In a customer database, a customer's surname would be keyed into a(n) ________ field.
________ is perusing data in a database as if looking through pages in a notebook.
In a database table, a ________ is all the information related to one person, product, or event
________ processing is used when a college accumulates course registrations and processes them at the same
time in one large set.
Producing paychecks twice a month is an example of ________ processing
Database technology increases privacy threats due to all of the following technologies EXCEPT:
Arranging all customer records in customer number order is an example of
One example of a GIS is ________.
The number of newspapers sold on May 30 would be kept in a ________ field
A database that stores data in "cubes" rather than tables is known as a(n) ________ database.
One example of a PIM is ________.
In many organizations, address books and appointment calendars have been replaced by
In an object- oriented database, every object is an instance of a
database management system
A large corporation would use a ________ to keep records for employees and customers along with all of its
An ordered list of selected records and fields printed in an easy-to-read format is known as a
A computerized ________ is a good comparison to a database
Most businesses today use a ________ approach in employing database servers.
In a database, a ________ field shows results of calculations performed on data in other numeric fields
Relational databases may eventually be replaced by
the power and features are similar to C# and Java
All of the following are advantages of SQL EXCEPT
The process of ________ would be used when sending data from a database to a word processor so that mailing
labels could be produced
________ is a newer, powerful data description language used to construct Web pages as well as access and query databases using the Internet.
In 2005, Google agreed to allow the ________ government to censor certain searches made by their citizens
a 1 followed by 100 zeroes.
Google is a play on the term googol, which means
counting the number of times the key word or phrase appeared on the page
Prior to Google, early search engines ranked Web pages by
When looking for a specific customer in a large credit card database, ________ is more efficient than browsing
The following is an example of a ________ language:
Select Student_ID From Students Where Credits>= 46
Information from the database cannot be printed.
All of the following are true statements about databases EXCEPT
Software for organizing storage and retrieval of information is a(n)
When a person uses language such as ordinary English to query a database, it is known as a(n) ________
data warehouses are inexpensive.
All of the following are true statements regarding data warehouses EXCEPT:
The view that allows several records at a time to be viewed is
A(n) ________ combines data tables with demographic information.
A collection of information stored in an organized form on a computer is a(n)
The act of obtaining data about an individual and then using that data to impersonate them is known as
This search engine is the most visited site on the planet:
finding and extracting hidden predictive information from the data in large databases.
Data mining is
data is more secure.
All of the following are benefits of record matching EXCEPT
The kind of information a field can hold is determined by
Database programs can do all of the following EXCEPT:
PIMs are popular among people with
processes a query from a client and then sends the answer back to the client
In a client/server environment, the server
A program that enables users to work with one file at a time is a(n) ________ manager
The challenging part of using databases is retrieving information in a
For a customer database, a good choice of key field would be
Database technology has given us convenience in gathering data; however at the same time, many times it takes
Most current databases are ________ databases, where data from more than one table can be linked
A ________ manipulates data in a large collection of tables and cross references those tables.
Bringing data from a word processing program into a database program is known as
The Children's Online Privacy Protection Act requires Internet-based businesses to obtain parental consent
before collecting information from children ________ years of age and younger.
getting off a boat or plane or train
rude and crude
frighten or dishearten
Cruelest ruler to Jews, tried to destroy them. 600 anti-Jewish laws. Abolished Jewish government, censored Jewish books, banned traditional clothing. Draft Jewish boys into the army-Cantonists. Made Pale of Settlement smaller. Opened schools for Jews, tried to trick them into converting.
Mendele Mocher Sforim
Chaim Nachman Bialik
moved in a stealthy manner
user is connecting to a network through a phone line, television cable, or wireless link.
Remote access means that a(n)
Wireless networks are faster than wired networks.
All of the following statements are true EXCEPT
One example of a synchronous method of communication is
In the 1970s, Xerox developed ________, which continues to be a popular networking architecture.
A ________ network is a tunnel through the Internet that uses encryption and other security measures to keep
out unauthorized users.
A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web
________ uses high bandwidth connections to communicate multimedia over wireless networks, but lacks true
A(n) ________ cable uses light waves to transmit multimedia and voice data
All of the following are essential components of every computer system EXCEPT:
Networks that use electrical lines are sometimes called ________.
A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an
A broadband connection could be any of the following EXCEPT:
The rules for how data is exchanged between devices is known as a(n)
The first part of a URL refers to the ________ that must be used to access information, for example http.
T3 connections transmit data at this speed:
A(n) ________ signal is represented by a continuous wave.
A personal area network is possible because of the wireless technology known as
A(n) ________ uses radio waves to carry information at high speed.
The system of satellites used to determine any position on the Earth is known as
promotes independence so users have exclusive control over their own data and applications.
All of the following are advantages of using a computer network EXCEPT that it
________ are hardware devices or software programs that direct messages as they travel between networks.
The device or program that forwards messages between networks is known as a
wireless LAN connections.
Wi-Fi refers to
A(n) ________ network is often used to set up a temporary communications system that requires no centralized
Graphical bodies used to represent a person in a virtual meeting place are known as
Internet connections that work through the same network of coaxial cables that deliver television signals work
through a ________ modem
A worldwide public newsgroup available on the Internet is
do not have to be online at the same time.
Asynchronous communication is when the sender and recipient
________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or
________ helps block unauthorized access to a computer.
If one attempts to send a message to an email address which does not exist, it will return to you, or ________
A(n) ________ broadcasts messages to all devices connected to a LAN.
A hard-wired Internet connection through a LAN is called a(n) ________ connection.
________ refers to the quantity of data that can be transmitted through a communication medium in a given
amount of time.
no one in particular
The Internet is controlled by ________.
The .gov domain might be used by ________.
host computer in an educational domain.
In the e-mail address firstname.lastname@example.org, "sou" is the
In the email address email@example.com, "bowles" is the ________.
A(n) ________ server maintains look-up tables that map domain names to IP addresses.
IPv6 is supported on all machines
Which of the following is NOT a true statement about IPv6?
When radio or TV broadcasts are streaming at the same time they are happening, it is called
All of the following domains are open to anyone without restriction EXCEPT ________
Every host computer on the Internet has a(n) ________.
World peace keeping organization set up after WWI to prevent another world war.
Hitler’s National Socialist German Workers’ Party – a fascist organization
State has more power than people. Strong central government headed by powerful dictator – individuals have no rights.
Book Hitler wrote in prison – the basis of his philosophy. Proclaims Aryans (blonde/blue eyed – master race)
Other races unfit, contaminated, should either serve Germans or be exterminated.
American foreign policy which emphasized a focus on domestic matters and a modest foreign policy – not wanting to join the League of Nations or participate in foreign wars
Prime Minister of Britain during WWII. He was a great inspiration to Britain and the Allies.
“Night of Broken Glass” November 1938 – attacks on thousands of Jews, synagogues businesses after 17 year old Jew killed a minor diplomat in Paris. Many murdered, sent to camps
Lightening war – German attack on Poland on Sept 1 1939 – moved very fast – also overran Europe very quickly - using a combination of armored attack and air assault in Europe.
Government who did not really have power of their own. – e.g. Vichy government in Paris who collaborated with the Nazis in WWII
Britain France Soviet Union – later US joined Allies (main Allies – there were 26)
Because of food shortages people were only allowed limited quantities of food – e.g. something like this - you could only have one pound of butter a month.
Britain retreats in shock from France in 1940 because Germans are attacking– grass roots rescue of British troops over English channel in little boats – equipment abandoned.
an order of a government prohibiting the export of arms
the closing off of a place, like a port, harbor, or city, by hostile ships or troops to prevent anyone leaving or coming in.
The French people and forces who continued to fight for the Allies after France was occupied by Axis powers.
Sign up for free and study better.
Get started today!