Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
102 Cards in this Set
- Front
- Back
Every domain name corresponds to a unique IP address that has been entered into a ____.
|
domain name server
|
|
Prefixes such as http://, www, and ftp: correspond to ____.
|
protocols
|
|
Domain names are assigned by ____.
|
ICANN
|
|
The rate of data that is transmitted from your computer to the Internet is ____.
|
Upstream speed
|
|
Cable Internet service needs ____.
|
Circuitry to handle Ethernet protocols and a cable modem
|
|
The rate of data arriving at your computer is ____.
|
downstream speed
|
|
The Internet began with a project called __________.
|
ARPANET
|
|
A(n) ___________ address is a unique identifying number assigned to each computer connected to the internet.
|
IP
|
|
When your computer connects to the Internet from home, your __________ uses DHCP to assign a temporary address to your computer for as long as it remains connected.
|
ISP
|
|
The _____________ name is an identifying name by which host computers on the internet are familiarly known such as google.com.
|
domain
|
|
An Ethernet-compatible network standard designed as IEEE 802.16 is ___________.
|
WiMAX
|
|
The Internet ____________ is a network of high-capacity communication links that provides the main routes for data traffic across the Internet.
|
backbone
|
|
The top-level domain for most schools and universities is ____________.
|
edu
|
|
A high-speed digital Internet connection that uses existing telephone lines, requiring close proximity to a switching station is called ____________.
|
DSL
|
|
An alternative internet connection from home besides dial-up, satellite, or DSL that also provides television service is __________.
|
cable
|
|
A WiFi ____________ is an area in which the public can access a WiFi network that offers internet service. An example is hotel, coffee shop, airport, etc.
|
hotspot
|
|
____________ is a communications protocol that provides internet access from handheld devices such as cellphones.
|
WAP
|
|
The latest cellphone technology is advertised to be ________G.
|
4
|
|
A ___________ computing system is a network of computers harnessed together to perform processing tasks. The systems can be public or private. An example is SETI@home.
|
grid
|
|
_____________ is a protocol that provides a way to transfer files form one computer to another over a TCP/IP network.
|
ftp
|
|
_____________ address translation is the process your router uses to keep track of packets and their corresponding private and public IP addresses.
|
network
|
|
You just got cable internet service. Your computer is connected to a router, which you connect to the cable modem. The instructions provided by the cable company tell you to make sure _____________ is activated so that you can get a dynamic IP address.
|
DHCP
|
|
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a static IP address, and you’ll want to register a(n) ____________ name.
|
domain
|
|
You are going to be the telecommuting two days a week, so your corporate information technology department has given you instructions to use the company _________ private network.
|
virtual
|
|
The primary protocol suite responsible for message transmission on the Internet is _____
|
TCP/IP
|
|
A technology in which a broadband Internet connection is used to place telephone calls is called Voice over __
|
IP
|
|
One of the most common ways of gaining unauthorized access to a network is by looking for open ___________ on a computer.
|
ports
|
|
A _________ IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
|
private
|
|
A podcast is an audio file that is distributed through downloads or the use of a feed, such as ____.
|
RSS
|
|
A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser.
|
Web site
|
|
The process of accessing Web sites is sometimes referred to as ____.
|
surfing
|
|
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.
|
cache
|
|
A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
|
cookie
|
|
HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site.
|
forms
|
|
A(n) ____ certificate is an electronic attachment to a file that verifies the identity of its source.
|
digital
|
|
Some search engines use a program called a Web ____ that combs the Web to gather data that is representative of the contents of Web pages.
|
crawler
|
|
Often, Web page authors include a(n) ____ keyword in a header section of a Web page when it is created to describe the page contents.
|
meta
|
|
The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.
|
*
|
|
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
|
B2C
|
|
When you purchase a used digital camera directly from the owner on an online auction, you are participating in ____ e-commerce.
|
C2C
|
|
____ e-commerce involves one enterprise buying goods or services from another enterprise.
|
B2B
|
|
Which of the following technologies are used to create a secure connection between a client computer and a Web site?
|
SSL TLS S-HTTP
|
|
The term ____________________ was first used in the mid-1960s to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read.
|
hypertext
|
|
Web ____________________ software provides tools specifically designed to enter and format Web page text, graphics, and links.
|
authoring
|
|
The term search ____________________ popularly refers to a Web site that provides a variety of tools to help you find information.
|
engine
|
|
A ____ is a collaborative Web site that can be accessed and edited by anyone who wants to contribute to it(ex. Wikipedia)
|
wiki
|
|
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
|
HTTP
|
|
Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information.
|
mining
|
|
The goal of normalization is to minimize data ____.
|
redundancy
|
|
____ is a query language.
|
SQL
|
|
A(n) ____________________ refers to a collection of data fields about one entity--a person, place, thing, or event.
|
record
|
|
A(n) ____________________ database stores data in a collection of related tables.
|
relational
|
|
Each column of a relational database table is equivalent to a(n) ____________________.
|
field
|
|
The ____ determines what type of values can be entered for a field.
|
data type
|
|
When designing a database, you need to identify the ____ that will be required.
|
fields
|
|
A primary key that consists of more than one field is called a ____ key.
|
composite
|
|
Storing the same data field in multiple tables is called data ____.
|
redundancy
|
|
Elsa is creating the Supplier Location field, which includes major companies and their Web site addresses. What data type should she use for this field?
|
Hyperlink
|
|
If a table is defined with a primary key, Access will require you to enter a value for the key when adding a record in a process known as ____.
|
entity integrity
|
|
Using ____, you give Access an example of the information you are requesting; Access then retrieves the information that precisely matches your example.
|
QBE
|
|
Each ____ in the design grid contains specifications about a field you use in a query.
|
column
|
|
In order to delete a record in a table, you must first ____.
|
delete any related records in a subdatashee
|
|
The U.S. Census Bureau held a competition to find a way to tabulate the 1890 census. The Hollerith Tabulating Machine won. The company is now known as _____.
|
IBM
|
|
The first digital electronic computer to use vacuum tubes instead of switches was the _______
|
ABC
|
|
The general-purpose digital electronic computer designed to calculate trajectory tables for the U.S. Army was the ________.
|
UNIVAC
|
|
Computers characterized by their use of vacuum tubes are considered _______ generation.
|
first
|
|
Computers characterized by their use of transistors are considered ________ generation.
|
second
|
|
The first commercially successful minicomputer was the ______.
|
PDP-8
|
|
Computers characterized by their use of microprocessors are ______ generation.
|
fourth
|
|
The first commercial microcomputer was the MITS _______. It was sold in kit form for $ 395 for hobbyists.
|
altair
|
|
The first general-purpose microprocessor was the Intel ______.
|
4004
|
|
A systems _________ investigate the requirements of a business or organization, its employees, and its customers in order to plan and implement new or improved customer service.
|
analyst
|
|
A person who designs, codes, and tests computer programs is a _______.
|
computer programmer
|
|
A person who creates documentation for large programming projects is a technical ________.
|
writer
|
|
Careers in computer ________ focus on the design of the computer hardware.
|
engineering
|
|
A computer language that uses 0s and 1s for programming is called _________ language.
|
machine
|
|
The first electronic spreadsheet was _________.
|
VisiCalc
|
|
A database ______________ analyzes a company's data to determine the most effective way to collect and store it.
|
administrator
|
|
A ________ specialist/administrator plans,installs, and maintains one local area networks. Also provide network accounts and access rights to approved users.
|
network
|
|
A ____ designer creates, tests, posts, and modifies pages on a Website.
|
web
|
|
The type of manual calculator first used in ancient Rome, Greece, India, China, and Japan is called a/n ____.
|
abacus
|
|
The electronic device used to decode messages encrypted by the Germans was the ____.
|
COLOSSUS
|
|
The popularity of PCs was in large part brought about by the ____.
|
Internet
|
|
A set of testing conducted by a team of off-site testers is called ____.
|
beta testing
|
|
The ____ tier of the computer industry consists of large companies.
|
first
|
|
The ____ tier of the computer industry consists of companies falling below the cutoff for identifiable market share.
|
second
|
|
The ____ Act enhances the authority of Law enforcement agents to prevent various terrorist acts such as monitoring electronic communication without a warrant.
|
USA Patriot
|
|
The ____ Act makes it a criminal offense to knowingly access a computer without authorization.
|
Computer Fraud and Abuse
|
|
The ____ Act establishes an agency to monitor threats to the communication infrastructure.
|
Homeland Security
|
|
Software engineers tend to focus on ____.
|
developing
|
|
A ____ language uses command words and grammar based on human language.
|
high-level
|
|
A ____ language typically includes commands specific to a particular CPU or microprocessor family.
|
low-level
|
|
Assembly languages are considered ____-generation languages.
|
second
|
|
When high-level languages were originally conceived in the 1950s, they were dubbed ____-generation languages.
|
third
|
|
Languages which most closely resemble human languages are ____-generation languages.
|
fourth
|
|
A ____ error occurs when an instruction does not follow the grammar of the programming language.
|
syntax
|
|
A ____ error occurs when a program fails to perform as intended due to an error in the design of the program.
|
logic
|
|
Some ____ errors result from instructions the computer cannot execute.
|
run-time
|
|
During ____ execution, the first instruction in the program is executed first, followed by the second.
|
sequential
|
|
A ____ control structure tells a computer what to do based on whether a condition is true or false.
|
selection
|
|
The first widely used, standardized procedural computer language was ____.
|
FORTRAN
|
|
A form is used to ____.
|
enter, edit, and view records in a database
|