A | B |
Microsoft Office Access 2007 is usually referred to as _____. | Access |
Database is a collection of data organized in a way that allows _____ of the data. | Access, Retrival, and Use |
The rows in the tables are called _____. | Records |
When a record has an entry that is unique to it, such as a customer number, this field is called a(n) _____. | Primary Key, Unique Identifier |
A _____ indicates the type of data that can be stored in a field. | Data Type |
The _____ data type can store a variable amount of text or combination of text and numbers. | Memo |
The _____ is the name assigned to a file when it is saved. | File Name |
File names can be a maximum of _____ characters long including the file extension. | 255 |
Navigation pane, Ribbon and Mini toolbar are part of the _____. | Access Window |
Object tabs for the open objects appear at the _____ of the work area. | Top |
A _____ is simply a question presented in a way that Access can process. | Query |
A _____ is a condition that the records to be included in a query must satisfy. | Criterion |
_____ is a field whose data type is text. | Text Data |
_____ are symbols that represent any character or combination of characters. | Wildcards |
A(n) _____ wildcard symbol represents any collection of characters. | Asterisk |
A(n) _____ wildcard symbol represents any individual character. | Question Mark |
_____ is a small software program that is intended to spread from one computer to another to interfere with the operation of your computer. | Computer Virus |
______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else. | Identity Theft |
Search engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages. | Spiders |
_____ is computer software that is secretly installed onto your computer as you surf the internet. | Spyware |
A_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects.. | Trojan Horse |
A ____ sends copies of itself by way of a computer network which in turn harms the network. | Worm |
_____ is someone who accesses computer information either legally or illegally. | Hacker |
___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies. | Phishing |
____ is unwanted e-mail from someone you do not know. | Spam |
In keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused. | Do Not Respond |
A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. | Database |
A(n) ________ contains information about a given person, product, or event. | Record |
A(n)________ contains a specific piece of information within a record. | Field |
A field that uniquely identifies a particular record in a table is called a _______ key. | Primary |
In _______ view, a table is represented as a collection of rows and columns. | Datasheet |
A ________ indicates the type of data that can be stored in a field. | Datatype |
A _______ is simply a question presented in a way Access can process. | Query |
A ________ is a condition that the records to be included in a query must satisfy. | Criteria |
Changing a column width changes the ________ of a table | Layout |
A ________ is a line that Access draws between matching fields in two tables. | Join Line |
_________ are huge databases of web page files that have been assembled automatically by machine | Search Engines |
_____ is an example of a search engine | Google |
A con for search engines is the return of _______to a simple search request. | Thousands of Responses |
The goal of search engines is to return the most relevant pages at the ___ of their lists. | Top |
_____ are created and maintained by human editors. | Subject Directories |
______ is an example of metasearch engines. | Mamma |
______ is a example of subject directories. | Beaucoup |
WWW stands for _______. | World Wide Web |
___ is a large portain of the Web that search engines spiders can not index. | Invisible Web |
Use _______ in front of words to force their inclusion in searches. | Plus Sign |
The domain .edu stands for ______ sites. | Education |
The domain .com stands for _____ sites. | Commercial |
The domain .gov stands for ____ sites. | Governmental |
The domain .net stands for ___ sites. | Networks |
The domain .org stands for _____ sites. | U.S. non-profit organizations |
Use ______ in front of words to force their exclusion in searches. | Minus Sign |
Use ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order. | Quotation Marks |
Type keywords and phrases in ______ to find both lower and upper case versions. | Lowercase |
______ is a system of logic designed to produce better search results by formulating precise queries. | Boolean Logic |
AND, OR, and _____ are examples of Boolean logic operators. | Not |
This message _______ tells you that the file you seek has been moved, removed, or renamed. | 404-File not found |
This message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy. | Server Error |
_____ are used in url's to identify particular web pages. | Domains |
The * commonly is used for text in major eye-catching areas of the publication. | Main Color |
* refers to the number of panels in a brochure. | Page Size |
A * is a semi-transparent graphic, visible in the background on the printed page. | Watermark |
A * , or pamphlet, is a high-quality document with lots of color and graphics, created for advertising purposes. | Brochure |
In Publisher, watermarks are created on a * , which is a background area similar to the header and footer area in traditional word processing software. | Master Page |
A * is text and graphics that print at the top of each page in a document. | Header |
The * is a group of objects that you can place in your publications, including mastheads and sidebars. | Design Gallery |
To resize an object in Publisher, select the object, then drag a *. | Handle |
A * is an excerpt from the main article to highlight the ideas or to attract readers. | Pull Quote |
If a story has 2 pages, the second page will have a * notice. | Continued From |
A * is a small piece of text, set off with a box or graphic, and placed beside an article. | Sidebar |
Each story will include a * , which is a short phrase printed at the top of a story, usually in a bigger font than the story. | Headline |
Publisher uses the term * , to mean text that is contained within a single text box or a chain of linked text boxes. | Story |
A * is a series of paragraphs, each beginning with a bullet symbol. | Bulleted List |
When you * , you increase the magnification of an object to facilitate viewing and editing. | Zoom In |
The * is a blinking vertical bar that indicates where text will be inserted in a text box. | Insertion Point |
A * is a special window with buttons, boxes, lists and links to help you perform specific tasks. | Task Pane |
* are the gray, dotted lines surrounding an object. | Boundaries |
* , displayed in blue, assist you in organizing content into columns and rows. | Grid Guides |
Microsoft Publisher 2007 is a powerful * program that assists in designing and producing publications. | Desktop Publisher |
_____ describes the rules for online behavior especially in newsgroups, forums and chat rooms. | Netiquette |
___ is a piece of writing that has been copied from someone else and is presented as being your own work. | Plagiarism |
A(n) _______ is a tool which allows groups to communicate online. | Discussion Board |
____ is unwanted e-mail from someone you do not know. | Spam |
___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging. | Emoticons |
____ allows people to send messages from their computer to any other computer in the world. | E-Mail |
______ sending or posting harmful or cruel text or images using the internet or other communication devices. | Cyberbullying |
Examples of ____ devices are monitor, printer, projector, and speakers. | Output |
Examples of ______ devices are keyboards, mouse, microphone, and scanner. | Input |
In emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway. | Acronyms |