| A | B |
| Microsoft Office Access 2007 is usually referred to as _____. | Access |
| Database is a collection of data organized in a way that allows _____ of the data. | Access, Retrival, and Use |
| The rows in the tables are called _____. | Records |
| When a record has an entry that is unique to it, such as a customer number, this field is called a(n) _____. | Primary Key, Unique Identifier |
| A _____ indicates the type of data that can be stored in a field. | Data Type |
| The _____ data type can store a variable amount of text or combination of text and numbers. | Memo |
| The _____ is the name assigned to a file when it is saved. | File Name |
| File names can be a maximum of _____ characters long including the file extension. | 255 |
| Navigation pane, Ribbon and Mini toolbar are part of the _____. | Access Window |
| Object tabs for the open objects appear at the _____ of the work area. | Top |
| A _____ is simply a question presented in a way that Access can process. | Query |
| A _____ is a condition that the records to be included in a query must satisfy. | Criterion |
| _____ is a field whose data type is text. | Text Data |
| _____ are symbols that represent any character or combination of characters. | Wildcards |
| A(n) _____ wildcard symbol represents any collection of characters. | Asterisk |
| A(n) _____ wildcard symbol represents any individual character. | Question Mark |
| _____ is a small software program that is intended to spread from one computer to another to interfere with the operation of your computer. | Computer Virus |
| ______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else. | Identity Theft |
| Search engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages. | Spiders |
| _____ is computer software that is secretly installed onto your computer as you surf the internet. | Spyware |
| A_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects.. | Trojan Horse |
| A ____ sends copies of itself by way of a computer network which in turn harms the network. | Worm |
| _____ is someone who accesses computer information either legally or illegally. | Hacker |
| ___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies. | Phishing |
| ____ is unwanted e-mail from someone you do not know. | Spam |
| In keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused. | Do Not Respond |
| A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. | Database |
| A(n) ________ contains information about a given person, product, or event. | Record |
| A(n)________ contains a specific piece of information within a record. | Field |
| A field that uniquely identifies a particular record in a table is called a _______ key. | Primary |
| In _______ view, a table is represented as a collection of rows and columns. | Datasheet |
| A ________ indicates the type of data that can be stored in a field. | Datatype |
| A _______ is simply a question presented in a way Access can process. | Query |
| A ________ is a condition that the records to be included in a query must satisfy. | Criteria |
| Changing a column width changes the ________ of a table | Layout |
| A ________ is a line that Access draws between matching fields in two tables. | Join Line |
| _________ are huge databases of web page files that have been assembled automatically by machine | Search Engines |
| _____ is an example of a search engine | Google |
| A con for search engines is the return of _______to a simple search request. | Thousands of Responses |
| The goal of search engines is to return the most relevant pages at the ___ of their lists. | Top |
| _____ are created and maintained by human editors. | Subject Directories |
| WWW stands for _______. | World Wide Web |
| ___ is a large portain of the Web that search engines spiders can not index. | Invisible Web |
| Use _______ in front of words to force their inclusion in searches. | Plus Sign |
| The domain .edu stands for ______ sites. | Education |
| The domain .com stands for _____ sites. | Commercial |
| The domain .gov stands for ____ sites. | Governmental |
| The domain .net stands for ___ sites. | Networks |
| The domain .org stands for _____ sites. | U.S. non-profit organizations |
| Use ______ in front of words to force their exclusion in searches. | Minus Sign |
| Use ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order. | Quotation Marks |
| Type keywords and phrases in ______ to find both lower and upper case versions. | Lowercase |
| ______ is a system of logic designed to produce better search results by formulating precise queries. | Boolean Logic |
| AND, OR, and _____ are examples of Boolean logic operators. | Not |
| This message _______ tells you that the file you seek has been moved, removed, or renamed. | 404-File not found |
| This message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy. | Server Error |
| _____ are used in url's to identify particular web pages. | Domains |
| A * is a semi-transparent graphic, visible in the background on the printed page. | Watermark |
| A * is a series of paragraphs, each beginning with a bullet symbol. | Bulleted List |
| When you * , you increase the magnification of an object to facilitate viewing and editing. | Zoom In |
| The * is a blinking vertical bar that indicates where text will be inserted in a text box. | Insertion Point |
| ___ is a piece of writing that has been copied from someone else and is presented as being your own work. | Plagiarism |
| A(n) _______ is a tool which allows groups to communicate online. | Discussion Board |
| ____ is unwanted e-mail from someone you do not know. | Spam |
| ___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging. | Emoticons |
| ____ allows people to send messages from their computer to any other computer in the world. | E-Mail |
| ______ sending or posting harmful or cruel text or images using the internet or other communication devices. | Cyberbullying |
| Examples of ____ devices are monitor, printer, projector, and speakers. | Output |
| Examples of ______ devices are keyboards, mouse, microphone, and scanner. | Input |
| In emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway. | Acronyms |