| A | B |
| database | A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. |
| Database Management System | Access is a ________. |
| record | A(n) ________ contains information about a given person, product, or event. |
| field | A(n)________ contains a specific piece of information within a record. |
| primary | A field that uniquely identifies a particular record in a table is called a _______ key. |
| datasheet | In _______ view, a table is represented as a collection of rows and columns. |
| form | ______ view displays a single record at a time. |
| redundancy | ______ means storing the same fact in more than one place. |
| records | The rows in the tables are called ______. |
| data type | A ________ indicates the type of data that can be stored in a field. |
| query | A _______ is simply a question presented in a way Access can process. |
| criteria | A ________ is a condition that the records to be included in a query must satisfy. |
| asterisk | A(n) ________ wildcard symbol represents any collection of characters. |
| question mark | A(n) _________ wildcard symbol represents any individual character. |
| grouping | ________ means creating groups of records that share some common characteristics. |
| datasheet or form | You can change or edit records only in ________ view |
| layout | Changing a column width changes the ________ of a table |
| crosstab | A _______ calculates a statistic for data that is grouped by two different types of information. |
| join line | A ________ is a line that Access draws between matching fields in two tables. |
| criterion | In a query, a _________ is a condition the records to be included must satisfy. |
| identity theft | ______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else. |
| search engines | _________ are huge databases of web page files that have been assembled automatically by machine |
| google or ask | _____ is an example of a search engine |
| spiders | Search engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages. |
| best means | A pro for using search engines is ______ of searching the web. |
| thousands of responses | A con for search engines is the return of _______to a simple search request. |
| top | The goal of search engines is to return the most relevant pages at the ___ of their lists. |
| metasearch engine | _______ provide a quick way of finding out which engines are retrieving the best results for you in your search. |
| Dogpile or mamma | ______ are examples of metasearch engines. |
| subject directories | _____ are created and maintained by human editors. |
| beaucoup or looksmart | ______are examples of subject directories. |
| world wide web | WWW stands for _______. |
| invisible web | ___ is a large portain of the Web that search engines spiders can not index. |
| education | The domain .edu stands for ______ sites. |
| commercial business | The domain .com stands for _____ sites. |
| U.S. governmental | The domain .gov stands for ____ sites. |
| networks | The domain .net stands for ___ sites. |
| U.S. non-profit organizations | The domain .org stands for _____ sites. |
| stop words | ____ are words that many search engines DON'T stop for when searching texts and titles on the web. |
| plus sign | Use _______ in front of words to force their inclusion in searchers |
| minus sign | Use ______ in front of words to force their exclusion in searchers |
| quotation marks | Use ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order. |
| lowercase | Type keywords and phrases in ______ to find both lower and upper case versions. |
| boolean logic | ______ is a system of logic designed to produce better search results by formulating precise queries. |
| NOT | AND, OR, and _____ are examples of Boolean logic operators. |
| 404-File not found | This message _______ tells you that the file you seek has been moved, removed, or renamed. |
| Server Error | This message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy. |
| Short | Keep emails _____--do not intimidate recipients with too much text. |
| subject line | In emails, the key to getting your messages read is to write a perfect ________. |
| Current antivirus software | Make sure you are not spreading worms and viruses via email or act as a vehicle for spreading spam by using ________. |
| huge attachments | In emails, ask before you send _____ so you do not clog up their email. |
| one subject | In emails, try to talk about _____ per message to help make it less confusing. |
| acronyms | In emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway. |
| All Caps | In emails, writing in ______ is like shouting. |
| input | Examples of ______ devices are keyboards, mouse, microphone, and scanner. |
| output | Examples of ____ devices are monitor, printer, projector, and speakers. |
| spyware | _____ is computer software that is secretly installed onto your computer as you surf the internet. |
| computer virus | ___ is a small software program that is intended to spread form one computer to another to interfere with the operation of your computer. |
| worm | A ____ sends copies of itself by way of a computer network which in turn harms the network. |
| trojan horse | A_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects.. |
| cyberbullying | ______ sending or posting harmful or cruel text or images using the internet or other communication devices. |
| e-mail | ____ allows people to send messages from their computer to any other computer in the world. |
| emoticons | ___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging. |
| hacker | _____ is someone who accesses computer information either legally or illegally. |
| mouse trapping | ___ is a technique used by pornography sites where a user gets locked in a web site. |
| phishing | ___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies. |
| spam | ____ is unwanted e-mail from someone you do not know. |
| personal information | To keep safe on the Internet, you should not share _________ such as full name or mailing address. |
| do not respond | In keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused. |
| do not meet | To stay safe using the Internet, ________ anyone online without discussing it with parents or guardians--since this is the biggest danger to your safety. |
| Re: | ___ is the subject of the email which must be inserted by you and one of the 9 key parts of an email. |
| salutation | ____ is the greeting at the top of the email which is one of the 9 key parts of an email. |
| discussion board | A(n) _______ is a tool which allows groups to communicate online. |
| plagiarism | ___ is a piece of writing that has been copied from someone else and is presented as being your own work. |
| picnik.com | ___ is photo editing online which allows you to apply effects to your photos. |
| bit | Between a jpeg and bit format, the ___ files are bigger because every part in the picture is mapped. |
| domain | _____ are used in url's to identify particular web pages. |
| netiquette | _____ describes the rules for online behavior especially in newsgroups, forums and chat rooms. |