Term
| Microsoft Access is an example of ________ in an information system. |
|
Definition
| database management system |
|
|
Term
| Management information system’s (MIS) ________ include programs developed in-house. |
|
Definition
|
|
Term
| The output of an information system is ________. |
|
Definition
|
|
Term
| A typical PDA includes a(n) ________. |
|
Definition
|
|
Term
| The purpose of an information system’s ________ component is generating the most useful type of information for making decisions. |
|
Definition
|
|
Term
| A(n) _______ is a type of memory that stores data sequentially. |
|
Definition
|
|
Term
| ________ computer languages are machine independent and are called high-level languages. |
|
Definition
|
|
Term
| Transistor was the major technology used during the _______ generation of hardware. |
|
Definition
|
|
Term
| An operating system (OS) is: |
|
Definition
| a set of programs for controlling and managing computer hardware and software. |
|
|
Term
| A _______ is the size of a character. |
|
Definition
|
|
Term
| Extended ASCII data code allows representation of: |
|
Definition
|
|
Term
| _______ is information in its original form. |
|
Definition
|
|
Term
| A data _______ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. |
|
Definition
|
|
Term
| _______ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table. |
|
Definition
|
|
Term
| Data in a data warehouse can be differentiated from data in a database in that the former _______. |
|
Definition
| comes from a variety of sources |
|
|
Term
| A _______ operation searches data in a table and retrieves records based on certain criteria. |
|
Definition
|
|
Term
| A database _______ is responsible for data storage, manipulation, and retrieval. |
|
Definition
|
|
Term
| The _______ approach to a distributed DBMS has each site store a copy of the data in the organization’s database. |
|
Definition
|
|
Term
| In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities. |
|
Definition
|
|
Term
| _______ has created decency concerns, because these e-mails often contain explicit language or nudity. |
|
Definition
|
|
Term
| Amazon.com uses _______ to provide customized book recommendations based on past purchases. |
|
Definition
|
|
Term
| You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup. This action is ________. |
|
Definition
|
|
Term
| In the context of the important concepts regarding Web and network privacy, ________ is a method for binding all the parties to a contract. |
|
Definition
|
|
Term
| _______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure. |
|
Definition
|
|
Term
| _______ is the process of capturing and recording network traffic. |
|
Definition
|
|
Term
| Which of the following is a biometric security measure? |
|
Definition
|
|
Term
| A(n) _______ is software that acts as an intermediary between two systems. |
|
Definition
|
|
Term
| _______ means that computers and networks are operating and authorized users can access the information they need. |
|
Definition
|
|
Term
| Which of the following is a type of access control? |
|
Definition
|
|
Term
| Typically, an organization leases the media used for a VPN on a(n) _______ basis. |
|
Definition
|
|
Term
| In a bus topology, _______ are used at each end of the cable to absorb the signal. |
|
Definition
|
|
Term
| The amount of data that can be transferred from one point to another in one second is called _______. |
|
Definition
|
|
Term
| The _______ layer of the OSI model specifies the electrical connections between computers and the transmission medium, and is primarily concerned with transmitting binary data, or bits over a communication network |
|
Definition
|
|
Term
| A hierarchical topology is also called a _______ topology. |
|
Definition
|
|
Term
| Another name for a network interface card is a(n) _______. |
|
Definition
|
|
Term
| A(n) ____ is the address of a document or site on the Internet. |
|
Definition
|
|
Term
| ____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature. |
|
Definition
|
|
Term
| Google.com, Bing.com, and Ask.com are examples of ____. |
|
Definition
|
|
Term
| A(n) ____ is a type of Web site that allows users to add, delete, and sometimes modify content. |
|
Definition
|
|
Term
| In the URL, http://www.csub.edu/~hbidgoli/books.html, ____ represents the name of the directory in which files are stored. |
|
Definition
|
|