Java Games: Flashcards, matching, concentration, and word search.

Exam Review Netiquette, Access and PowerPoint 2013

AB
Microsoft Office Access 2007 is usually referred to as _____.Access
Database is a collection of data organized in a way that allows _____ of the data.Access, Retrival, and Use
The rows in the tables are called _____.Records
When a record has an entry that is unique to it, such as a customer number, this field is called a(n) _____.Primary Key, Unique Identifier
A _____ indicates the type of data that can be stored in a field.Data Type
The _____ data type can store a variable amount of text or combination of text and numbers.Memo
The _____ is the name assigned to a file when it is saved.File Name
File names can be a maximum of _____ characters long including the file extension.255
Navigation pane, Ribbon and Mini toolbar are part of the _____.Access Window
Object tabs for the open objects appear at the _____ of the work area.Top
A _____ is simply a question presented in a way that Access can process.Query
A _____ is a condition that the records to be included in a query must satisfy.Criterion
_____ is a field whose data type is text.Text Data
_____ are symbols that represent any character or combination of characters.Wildcards
A(n) _____ wildcard symbol represents any collection of characters.Asterisk
A(n) _____ wildcard symbol represents any individual character.Question Mark
_____ is a small software program that is intended to spread from one computer to another to interfere with the operation of your computer.Computer Virus
______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else.Identity Theft
Search engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages.Spiders
_____ is computer software that is secretly installed onto your computer as you surf the internet.Spyware
A_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects..Trojan Horse
A ____ sends copies of itself by way of a computer network which in turn harms the network.Worm
_____ is someone who accesses computer information either legally or illegally.Hacker
___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies.Phishing
____ is unwanted e-mail from someone you do not know.Spam
In keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused.Do Not Respond
A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data.Database
A(n) ________ contains information about a given person, product, or event.Record
A(n)________ contains a specific piece of information within a record.Field
A field that uniquely identifies a particular record in a table is called a _______ key.Primary
In _______ view, a table is represented as a collection of rows and columns.Datasheet
A ________ indicates the type of data that can be stored in a field.Datatype
A _______ is simply a question presented in a way Access can process.Query
A ________ is a condition that the records to be included in a query must satisfy.Criteria
Changing a column width changes the ________ of a tableLayout
A ________ is a line that Access draws between matching fields in two tables.Join Line
_________ are huge databases of web page files that have been assembled automatically by machineSearch Engines
_____ is an example of a search engineGoogle
A con for search engines is the return of _______to a simple search request.Thousands of Responses
The goal of search engines is to return the most relevant pages at the ___ of their lists.Top
_____ are created and maintained by human editors.Subject Directories
WWW stands for _______.World Wide Web
___ is a large portain of the Web that search engines spiders can not index.Invisible Web
Use _______ in front of words to force their inclusion in searches.Plus Sign
The domain .edu stands for ______ sites.Education
The domain .com stands for _____ sites.Commercial
The domain .gov stands for ____ sites.Governmental
The domain .net stands for ___ sites.Networks
The domain .org stands for _____ sites.U.S. non-profit organizations
Use ______ in front of words to force their exclusion in searches.Minus Sign
Use ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order.Quotation Marks
Type keywords and phrases in ______ to find both lower and upper case versions.Lowercase
______ is a system of logic designed to produce better search results by formulating precise queries.Boolean Logic
AND, OR, and _____ are examples of Boolean logic operators.Not
This message _______ tells you that the file you seek has been moved, removed, or renamed.404-File not found
This message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy.Server Error
_____ are used in url's to identify particular web pages.Domains
A * is a semi-transparent graphic, visible in the background on the printed page.Watermark
A * is a series of paragraphs, each beginning with a bullet symbol.Bulleted List
When you * , you increase the magnification of an object to facilitate viewing and editing.Zoom In
The * is a blinking vertical bar that indicates where text will be inserted in a text box.Insertion Point
___ is a piece of writing that has been copied from someone else and is presented as being your own work.Plagiarism
A(n) _______ is a tool which allows groups to communicate online.Discussion Board
____ is unwanted e-mail from someone you do not know.Spam
___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging.Emoticons
____ allows people to send messages from their computer to any other computer in the world.E-Mail
______ sending or posting harmful or cruel text or images using the internet or other communication devices.Cyberbullying
Examples of ____ devices are monitor, printer, projector, and speakers.Output
Examples of ______ devices are keyboards, mouse, microphone, and scanner.Input
In emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway.Acronyms


Bay City Central High School
Bay City, MI

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities