• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/102

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

102 Cards in this Set

  • Front
  • Back
Every domain name corresponds to a unique IP address that has been entered into a ____.
domain name server
Prefixes such as http://, www, and ftp: correspond to ____.
protocols
Domain names are assigned by ____.
ICANN
The rate of data that is transmitted from your computer to the Internet is ____.
Upstream speed
Cable Internet service needs ____.
Circuitry to handle Ethernet protocols and a cable modem
The rate of data arriving at your computer is ____.
downstream speed
The Internet began with a project called __________.
ARPANET
A(n) ___________ address is a unique identifying number assigned to each computer connected to the internet.
IP
When your computer connects to the Internet from home, your __________ uses DHCP to assign a temporary address to your computer for as long as it remains connected.
ISP
The _____________ name is an identifying name by which host computers on the internet are familiarly known such as google.com.
domain
An Ethernet-compatible network standard designed as IEEE 802.16 is ___________.
WiMAX
The Internet ____________ is a network of high-capacity communication links that provides the main routes for data traffic across the Internet.
backbone
The top-level domain for most schools and universities is ____________.
edu
A high-speed digital Internet connection that uses existing telephone lines, requiring close proximity to a switching station is called ____________.
DSL
An alternative internet connection from home besides dial-up, satellite, or DSL that also provides television service is __________.
cable
A WiFi ____________ is an area in which the public can access a WiFi network that offers internet service. An example is hotel, coffee shop, airport, etc.
hotspot
____________ is a communications protocol that provides internet access from handheld devices such as cellphones.
WAP
The latest cellphone technology is advertised to be ________G.
4
A ___________ computing system is a network of computers harnessed together to perform processing tasks. The systems can be public or private. An example is SETI@home.
grid
_____________ is a protocol that provides a way to transfer files form one computer to another over a TCP/IP network.
ftp
_____________ address translation is the process your router uses to keep track of packets and their corresponding private and public IP addresses.
network
You just got cable internet service. Your computer is connected to a router, which you connect to the cable modem. The instructions provided by the cable company tell you to make sure _____________ is activated so that you can get a dynamic IP address.
DHCP
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a static IP address, and you’ll want to register a(n) ____________ name.
domain
You are going to be the telecommuting two days a week, so your corporate information technology department has given you instructions to use the company _________ private network.
virtual
The primary protocol suite responsible for message transmission on the Internet is _____
TCP/IP
A technology in which a broadband Internet connection is used to place telephone calls is called Voice over __
IP
One of the most common ways of gaining unauthorized access to a network is by looking for open ___________ on a computer.
ports
A _________ IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.
private
A podcast is an audio file that is distributed through downloads or the use of a feed, such as ____.
RSS
A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser.
Web site
The process of accessing Web sites is sometimes referred to as ____.
surfing
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.
cache
A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
cookie
HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site.
forms
A(n) ____ certificate is an electronic attachment to a file that verifies the identity of its source.
digital
Some search engines use a program called a Web ____ that combs the Web to gather data that is representative of the contents of Web pages.
crawler
Often, Web page authors include a(n) ____ keyword in a header section of a Web page when it is created to describe the page contents.
meta
The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.
*
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
B2C
When you purchase a used digital camera directly from the owner on an online auction, you are participating in ____ e-commerce.
C2C
____ e-commerce involves one enterprise buying goods or services from another enterprise.
B2B
Which of the following technologies are used to create a secure connection between a client computer and a Web site?
SSL TLS S-HTTP
The term ____________________ was first used in the mid-1960s to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read.
hypertext
Web ____________________ software provides tools specifically designed to enter and format Web page text, graphics, and links.
authoring
The term search ____________________ popularly refers to a Web site that provides a variety of tools to help you find information.
engine
A ____ is a collaborative Web site that can be accessed and edited by anyone who wants to contribute to it(ex. Wikipedia)
wiki
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
HTTP
Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information.
mining
The goal of normalization is to minimize data ____.
redundancy
____ is a query language.
SQL
A(n) ____________________ refers to a collection of data fields about one entity--a person, place, thing, or event.
record
A(n) ____________________ database stores data in a collection of related tables.
relational
Each column of a relational database table is equivalent to a(n) ____________________.
field
The ____ determines what type of values can be entered for a field.
data type
When designing a database, you need to identify the ____ that will be required.
fields
A primary key that consists of more than one field is called a ____ key.
composite
Storing the same data field in multiple tables is called data ____.
redundancy
Elsa is creating the Supplier Location field, which includes major companies and their Web site addresses. What data type should she use for this field?
Hyperlink
If a table is defined with a primary key, Access will require you to enter a value for the key when adding a record in a process known as ____.
entity integrity
Using ____, you give Access an example of the information you are requesting; Access then retrieves the information that precisely matches your example.
QBE
Each ____ in the design grid contains specifications about a field you use in a query.
column
In order to delete a record in a table, you must first ____.
delete any related records in a subdatashee
The U.S. Census Bureau held a competition to find a way to tabulate the 1890 census. The Hollerith Tabulating Machine won. The company is now known as _____.
IBM
The first digital electronic computer to use vacuum tubes instead of switches was the _______
ABC
The general-purpose digital electronic computer designed to calculate trajectory tables for the U.S. Army was the ________.
UNIVAC
Computers characterized by their use of vacuum tubes are considered _______ generation.
first
Computers characterized by their use of transistors are considered ________ generation.
second
The first commercially successful minicomputer was the ______.
PDP-8
Computers characterized by their use of microprocessors are ______ generation.
fourth
The first commercial microcomputer was the MITS _______. It was sold in kit form for $ 395 for hobbyists.
altair
The first general-purpose microprocessor was the Intel ______.
4004
A systems _________ investigate the requirements of a business or organization, its employees, and its customers in order to plan and implement new or improved customer service.
analyst
A person who designs, codes, and tests computer programs is a _______.
computer programmer
A person who creates documentation for large programming projects is a technical ________.
writer
Careers in computer ________ focus on the design of the computer hardware.
engineering
A computer language that uses 0s and 1s for programming is called _________ language.
machine
The first electronic spreadsheet was _________.
VisiCalc
A database ______________ analyzes a company's data to determine the most effective way to collect and store it.
administrator
A ________ specialist/administrator plans,installs, and maintains one local area networks. Also provide network accounts and access rights to approved users.
network
A ____ designer creates, tests, posts, and modifies pages on a Website.
web
The type of manual calculator first used in ancient Rome, Greece, India, China, and Japan is called a/n ____.
abacus
The electronic device used to decode messages encrypted by the Germans was the ____.
COLOSSUS
The popularity of PCs was in large part brought about by the ____.
Internet
A set of testing conducted by a team of off-site testers is called ____.
beta testing
The ____ tier of the computer industry consists of large companies.
first
The ____ tier of the computer industry consists of companies falling below the cutoff for identifiable market share.
second
The ____ Act enhances the authority of Law enforcement agents to prevent various terrorist acts such as monitoring electronic communication without a warrant.
USA Patriot
The ____ Act makes it a criminal offense to knowingly access a computer without authorization.
Computer Fraud and Abuse
The ____ Act establishes an agency to monitor threats to the communication infrastructure.
Homeland Security
Software engineers tend to focus on ____.
developing
A ____ language uses command words and grammar based on human language.
high-level
A ____ language typically includes commands specific to a particular CPU or microprocessor family.
low-level
Assembly languages are considered ____-generation languages.
second
When high-level languages were originally conceived in the 1950s, they were dubbed ____-generation languages.
third
Languages which most closely resemble human languages are ____-generation languages.
fourth
A ____ error occurs when an instruction does not follow the grammar of the programming language.
syntax
A ____ error occurs when a program fails to perform as intended due to an error in the design of the program.
logic
Some ____ errors result from instructions the computer cannot execute.
run-time
During ____ execution, the first instruction in the program is executed first, followed by the second.
sequential
A ____ control structure tells a computer what to do based on whether a condition is true or false.
selection
The first widely used, standardized procedural computer language was ____.
FORTRAN
A form is used to ____.
enter, edit, and view records in a database