The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location pointed to by box B.
A ____ IP address is one which can be accessed by packets on the Internet.
The disadvantage of WAP-enabled devices is their ____
replaced analog technology with digital technology and added support for text messages
In the accompanying figure, the type of signal represented by B is a(n) ____
The elapsed time for data to make a round trip from point A to point B and back is called
is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow seamless handoff between one tower and another
A group of computers temporarily networked to download a file is a _
The accompanying figure represents a virtual private network. In this figure, D points to ____ data.
The accompanying figure represents a virtual private network. In this figure, E points to
The accompanying figure represents a virtual private network. In this figure, B points to a(n)
Messaging and chat protocols include all of the following EXCEPT
The octets in an IP address correspond to a ____.
_ technologies support digital transmission for both voice and data.
The accompanying figure represents a virtual private network. In this figure, A points to ____ data
3G technologies have speeds ranging from 200 Kbps to ____
To set up free VoIP, you and the people you communicate with can install free VoIP clients such as
An Ethernet-compatible network standard designated as IEEE 802.16 is ____.
The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box A.
The average “survival time” for an unprotected computer to remain uncompromised is only
Sending computer data over a ____ system required a voiceband modem to convert digital data into audible signals
Both a. and b.
Interim 4G technologies such as ____ have been deployed since 2009
You need your own domain name if ____
you have your own Web site
The accompanying figure represents a virtual private network. In this figure, C points to a(n) ____ server.
BitTorrent can be used to distribute ____
all of the above
In the accompanying figure, the type of signal represented by A is a(n) ___
Some ISDN providers offer a service called ____, which remains connected to an ISP as long as the computer and terminal adapter are on.
Satellite Internet service and TV service requires ____
a satellite dish and a modem
Sharing files on a LAN or the Internet requires open
Most Internet servers have an easy to remember name that is known as a(n)
A communications ____ is described as a virtual device because it is not a physical circuit or mechanism
Network service providers include ____.
all of the above
Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is ____
DSL uses ____ to transmit data.
The Internet began with a project called ___
The rate of data arriving at your computer is
is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.
Prefixes such as http://, www, and ftp: correspond to _
A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection
The accompanying figure is a screenshot of FileZilla, in which the ____ of the transfer is indicated by box C
VoIP software is sometimes referred to as a(n) ____ client
is a valid top-level domain
In the accompanying figure, C points to ___
the Internet backbone
The rate of data that is transmitted from your computer to the Internet is ____
Every domain name corresponds to a unique IP address that has been entered into the
domain name system
wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas
A communication protocol that provides Internet access from handheld devices is
The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n)
For instant messaging, ____ are the people in a participant's list who are currently online
The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network
There are estimated to be more than ____ users of the Internet
The accompanying figure represents the connection of your computer to the Internet; the router marked B should belong to a(n)
The speed for satellite Internet service is
faster downstream than upstream
A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL
VoIP systems are offered by companies such as
all of the above
You can install personal VPN software such as ___
all of the above
Portable Internet access includes all of the following EXCEPT
Examples of 3G technologies include_
all of the above
The ability to easily move your Internet service from one location to another is considered ____ Internet service
An ISP may provide ____ services
all of the above
Domain names are assigned by
One important security precaution is to install a(n)
You can use a service called ____ to reformat Web pages to fit on a small screen
The use of automated software to locate computers that are vulnerable to unauthorized access is a port _
Cable Internet service needs ____
circuitry to handle Ethernet protocols and a cable modem
are intended to work within LANs to monitor and direct packets being transported from one device to another
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed
HTTP is classified as a ____ protocol because it maintains no record of previous interactions and handles each request based entirely on information that comes with it
An HTTP exchange takes place over a pair of _
Which of the following is a Web resource?
any of the above
Which of the following may pose a threat to your computer’s security and/or your privacy?
all of the above
When a Web page author includes meta keywords, like “sex,” that have little to do with the information on the page, the author is engaging in __
A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser
In the URL found in the accompanying figure, showbiz is a ____.
Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings
Examples of Uniform Resource Identifiers include _
all of the above
A(n) ____ is client software that displays Web page elements and handles links between pages
Which of the following technologies are used to create a secure connection between a client computer and a Web site?
all of the above
Both SSL and its successor, ____, are protocols that encrypt data traveling between a client computer and an HTTP server
Server-side scripts can be written using _
all of the above
In an e-mail message, such as the one found in the accompanying figure, the recipient’s e-mail address and the message subject are found in the ____
HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site
In addition to using search engines, you can also find Web-based information using a(n) ____ engine that searches a series of other search engines and compiles the search results
A(n) ____ is a type of utility software that captures unsolicited e-mails before they reach your inbox
Flash ____ can collect and store personal data, such as a user’s name or the user’s progress in a game
In the URL found in the accompanying figure, .htm is the ____.
____ is the most frequently used HTTP method.
A podcast is an audio file that is distributed through downloads or the use of a(n)
In the URL found in the accompanying figure, http is the ____
Web protocol standard
A(n) ____ certificate is an electronic attachment to a file that verifies the identity of its source
In the URL found in the accompanying figure, www.cnn.com is the
Web server name
Some search engines use a program called a Web ____ that combs the Web to gather data that is representative of the contents of Web pages
Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address
allow a Web site to store information on the client computer for later retrieval.
A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop
An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called
software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware
Junk e-mail messages may use ____ to monitor the number of people who view the e-mail. That data is collected and sometimes used to determine the direction of marketing campaigns
Webmail allows you to use a(n) ____ to access and view your e-mail messages
Which of the following statements is NOT true?
Web pages that provide a secure connection start with httpx: instead of http
A(n) ____ is a compiled computer program that can be referenced from within an HTML document, downloaded, installed on your computer, and executed within the browser window
The ____ wildcard character allows a search engine to find pages with any derivation of a basic word
When you use a search engine, it stores all of the following information about your query EXCEPT ____
Incoming mail can be stored on a ____ server until it is downloaded to the inbox on your hard disk
PayPal is an example of a(n) ____ payment system
For HTTP, ____ usually are associated with port 80 on the client and server.
When using an application like the one shown in the accompanying figure, you can access a Web page by clicking a(n) ____ or by typing a URL
When working with ____ mail, make sure your antivirus software is checking incoming messages
Applications written in the Java programming language are called Java
A(n) ____ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.
HTML conversion utility
A(n) ____ helps you find information by searching the Web for pages that meet your query specifications
A(n) ____ is a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions
_ provides tools specifically designed to enter and format Web page text, graphics, and links.
Web authoring software
e-commerce occurs when businesses sell to governments
A ____ is a collaborative Web site that can be accessed and edited by anyone who wants to contribute to it
schemes redirect users to fake sites by poisoning a domain name server with a fake IP address
Search engine ____ software is designed to pull keywords from a Web page and store them in a database
A search engine’s ____ looks for your search terms in the search engine’s indexed database and returns a list of relevant Web sites
To avoid becoming a spam victim, you should ___
use a disposable e-mail address when you register for online sites
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it
A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser
__ has supplanted Netscape as the dominant browser for the PC platform
To use local e-mail you must install e-mail ____ software on your computer
A Web server’s response to a browser’s request includes an HTTP ____ that indicates whether the browser’s request could be fulfilled
Often, Web page authors include a(n) ____ keyword in a header section of a Web page when it is created to describe the page contents
When you purchase a used digital camera directly from the owner on an online auction, you are participating in ____ e-commerce
_ e-commerce involves one enterprise buying goods or services from another enterprise
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web
When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.
An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.
You just sent an e-mail message to your co-worker that includes the following message body:MARY-CAN YOU PLEASE TELL ME WHEN YOU WILL HAVE THE REPORTS COMPLETED?Why might your coworker be offended by the message?
In terms of netiquette, you were shouting.
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information
Which of the following is NOT a Boolean operator
You can query by ____ using a fill-in form, like the one shown in the accompanying figure
With a(n) ____ database, the database is stored on several different computers, on multiple networks, or in different geographical locations
The goal of normalization is to minimize data ____
A field ____ is a template that adds the correct formatting as data is entered
A field ____ rule is a specification that the database designer sets up to filter the data entered into a particular field.
To provide a quality database interface, a designer might
arrange fields in a logical order
The ____ Web publishing process generates customized Web pages as needed.
A ____ validates an entry by searching for the same data in a file or database table
Which of the following SQL operators can be used to omit records from a search by specifying a not-equal relationship?
The accompanying figure shows a(n) ____ document.
In SQL terminology, creating a relationship between tables is referred to as ____ tables
allows decision makers to look for relationships between multiple data dimensions
In an object database, an attribute is
equivalent to a field in a relational database
A ____ update changes data in more than one record at a time.
Which of the following SQL operators designates records that meet either one of a set of two criteria or both?
__ refers to a branch of data mining that focuses on predicting future probabilities and trends
The ____ operator specifies that both of the search criteria must be true for the record to be selected
Databases are NOT vulnerable to ____
Which of the following does NOT have the potential to add doubt about the veracity of database data?
Relationships between record types can be graphically depicted using a(n)
The ____ database model uses a mesh-like structure, which allows for the definition of many-to-many relationships
Database ____ software is designed to manage billions of records and several hundred transactions per second
A technique called ____ Web publishing is a simple way to display the data in a database by converting a database report into an HTML document, which can be displayed as a Web page by a browser.
Which of the following is NOT a guideline for creating a template for reports?
Present as much information as possible
are detailed specifications for an SQL command.
If a single data management tool can be used to maintain many different files and databases, it must support data
What SQL command removes a record from a table?
The data accessed by data mining and other analysis techniques is often stored in a data
What is the SQL command used to introduce a brand-new database or table?
____ is a markup language that allows field tags, data, and tables to be incorporated into a Web document.
refers to the number of associations that can exist between two record types
The ____ data type is used to store true/false or yes/no data using minimal storage space
A table's ____ order is the order in which records are stored on disk
___ is a query language.
Which of the following is NOT true of XML?
XML documents are optimized for many operations you customarily associate with databases such as fast sorts and updates.
A CGI script can be written in all of the following EXCEPT
Criminals have become sophisticated in the use of all of the following EXCEPT ____ to access data stored on personal computers
In the world of databases, a(n) ____ refers to a collection of data fields.
A(n) ____ allows you to create, update, and administer a relational database.
A database ____ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key
____ can block unauthorized users and limit activities of authorized users.
Dynamic Web publishing relies on a program or script, referred to as a(n) ____ program, that acts as an intermediary between your browser and a DBMS.
A record ____ contains data about a particular entity.
Surveys show that as many as ____ of businesses never change the standard administrator password for a DBMS
Which of the following can be used to delineate the data entry area in a user interface?
all of the above
A ____ establishes which fields and records a particular user may access
A ____ data type usually provides a variable-length field into which users can enter comments.
A(n) ____ is an association between data that is stored in different record types
A(n) ____ file uses a uniform format to store data for each person or thing in the file
What would be an appropriate data type to choose for a fixed-length field designed to hold a person’s name?
text data type
A ____ contains the outline or general specifications for a report, including such elements as the report title, fields to include, fields to subtotal/total, and report format specifications
The two tables shown in the accompanying figure are ____ by the CustomerNumber field.
A fixed-length field contains a predetermined number of ____
In the broadest definition, a(n) ____ is a collection of information.
Data ____ means that data are separate from the programs used to manipulate the data