A | B |
database | A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. |
Database Management System | Access is a ________. |
record | A(n) ________ contains information about a given person, product, or event. |
field | A(n)________ contains a specific piece of information within a record. |
primary | A field that uniquely identifies a particular record in a table is called a _______ key. |
datasheet | In _______ view, a table is represented as a collection of rows and columns. |
form | ______ view displays a single record at a time. |
redundancy | ______ means storing the same fact in more than one place. |
records | The rows in the tables are called ______. |
data type | A ________ indicates the type of data that can be stored in a field. |
query | A _______ is simply a question presented in a way Access can process. |
criteria | A ________ is a condition that the records to be included in a query must satisfy. |
asterisk | A(n) ________ wildcard symbol represents any collection of characters. |
question mark | A(n) _________ wildcard symbol represents any individual character. |
grouping | ________ means creating groups of records that share some common characteristics. |
datasheet or form | You can change or edit records only in ________ view |
layout | Changing a column width changes the ________ of a table |
crosstab | A _______ calculates a statistic for data that is grouped by two different types of information. |
join line | A ________ is a line that Access draws between matching fields in two tables. |
criterion | In a query, a _________ is a condition the records to be included must satisfy. |
identity theft | ______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else. |
search engines | _________ are huge databases of web page files that have been assembled automatically by machine |
google or ask | _____ is an example of a search engine |
spiders | Search engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages. |
best means | A pro for using search engines is ______ of searching the web. |
thousands of responses | A con for search engines is the return of _______to a simple search request. |
top | The goal of search engines is to return the most relevant pages at the ___ of their lists. |
metasearch engine | _______ provide a quick way of finding out which engines are retrieving the best results for you in your search. |
Dogpile or mamma | ______ are examples of metasearch engines. |
subject directories | _____ are created and maintained by human editors. |
beaucoup or looksmart | ______are examples of subject directories. |
world wide web | WWW stands for _______. |
invisible web | ___ is a large portain of the Web that search engines spiders can not index. |
education | The domain .edu stands for ______ sites. |
commercial business | The domain .com stands for _____ sites. |
U.S. governmental | The domain .gov stands for ____ sites. |
networks | The domain .net stands for ___ sites. |
U.S. non-profit organizations | The domain .org stands for _____ sites. |
stop words | ____ are words that many search engines DON'T stop for when searching texts and titles on the web. |
plus sign | Use _______ in front of words to force their inclusion in searchers |
minus sign | Use ______ in front of words to force their exclusion in searchers |
quotation marks | Use ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order. |
lowercase | Type keywords and phrases in ______ to find both lower and upper case versions. |
boolean logic | ______ is a system of logic designed to produce better search results by formulating precise queries. |
NOT | AND, OR, and _____ are examples of Boolean logic operators. |
404-File not found | This message _______ tells you that the file you seek has been moved, removed, or renamed. |
Server Error | This message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy. |
Short | Keep emails _____--do not intimidate recipients with too much text. |
subject line | In emails, the key to getting your messages read is to write a perfect ________. |
Current antivirus software | Make sure you are not spreading worms and viruses via email or act as a vehicle for spreading spam by using ________. |
huge attachments | In emails, ask before you send _____ so you do not clog up their email. |
one subject | In emails, try to talk about _____ per message to help make it less confusing. |
acronyms | In emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway. |
All Caps | In emails, writing in ______ is like shouting. |
input | Examples of ______ devices are keyboards, mouse, microphone, and scanner. |
output | Examples of ____ devices are monitor, printer, projector, and speakers. |
spyware | _____ is computer software that is secretly installed onto your computer as you surf the internet. |
computer virus | ___ is a small software program that is intended to spread form one computer to another to interfere with the operation of your computer. |
worm | A ____ sends copies of itself by way of a computer network which in turn harms the network. |
trojan horse | A_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects.. |
cyberbullying | ______ sending or posting harmful or cruel text or images using the internet or other communication devices. |
e-mail | ____ allows people to send messages from their computer to any other computer in the world. |
emoticons | ___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging. |
hacker | _____ is someone who accesses computer information either legally or illegally. |
mouse trapping | ___ is a technique used by pornography sites where a user gets locked in a web site. |
phishing | ___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies. |
spam | ____ is unwanted e-mail from someone you do not know. |
personal information | To keep safe on the Internet, you should not share _________ such as full name or mailing address. |
do not respond | In keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused. |
do not meet | To stay safe using the Internet, ________ anyone online without discussing it with parents or guardians--since this is the biggest danger to your safety. |
Re: | ___ is the subject of the email which must be inserted by you and one of the 9 key parts of an email. |
salutation | ____ is the greeting at the top of the email which is one of the 9 key parts of an email. |
discussion board | A(n) _______ is a tool which allows groups to communicate online. |
plagiarism | ___ is a piece of writing that has been copied from someone else and is presented as being your own work. |
picnik.com | ___ is photo editing online which allows you to apply effects to your photos. |
bit | Between a jpeg and bit format, the ___ files are bigger because every part in the picture is mapped. |
domain | _____ are used in url's to identify particular web pages. |
netiquette | _____ describes the rules for online behavior especially in newsgroups, forums and chat rooms. |