AB | |
A(n) ________ is a arsenal of data arranged in a manner that permits access, retrieval, and use of that data. You are watching: All of this information is part of a ____ in a database | |
Database administration System | Access is a ________. |
record | A(n) ________ has information around a given person, product, or event. |
field | A(n)________ contains a particular piece of details within a record. |
primary | A field that unique identifies a certain record in a table is called a _______ key. |
datasheet | In _______ view, a table is represented as a arsenal of rows and also columns. |
form | ______ view screens a solitary record in ~ a time. |
redundancy | ______ way storing the same reality in an ext than one place. |
records | The rows in the tables are dubbed ______. |
data type | A ________ indicates the type of data that can be save on computer in a field. |
query | A _______ is simply a question presented in a method Access have the right to process. |
criteria | A ________ is a condition that the documents to be included in a query must satisfy. |
asterisk | A(n) ________ wildcard symbol represents any collection of characters. |
question mark | A(n) _________ wildcard symbol represents any type of individual character. |
grouping | ________ way creating groups of documents that re-superstructure some common characteristics. |
datasheet or form | You can readjust or modify records only in ________ view |
layout | Changing a shaft width alters the ________ of a table |
crosstab | A _______ calculates a statistic for data that is grouped by 2 different varieties of information. |
join line | A ________ is a line that access draws between matching fields in two tables. |
criterion | In a query, a _________ is a problem the documents to be had must satisfy. |
identity theft | ______ a crime in i m sorry an imposter obtains key pieces of an individual information, such as Social defense number, in order come impersonate who else. |
search engines | _________ are substantial databases of internet page papers that have actually been assembled immediately by machine |
google or ask | _____ is an instance of a search engine |
spiders | Search engines compile your databases by use ________ or "robots" ("bots") come crawl with web space from link to link, identifying and also perusing pages. |
best means | A agree for utilizing search engines is ______ of looking the web. |
thousands of responses | A con for find engines is the return of _______to a simple search request. |
top | The goal of find engines is to return the many relevant pages at the ___ of their lists. |
metasearch engine | _______ carry out a quick means of finding out which engines room retrieving the finest results for you in her search. |
Dogpile or mamma | ______ are examples of metasearch engines. |
subject directories | _____ room created and also maintained by human being editors. |
beaucoup or looksmart | ______are examples of subject directories. |
world broad web | WWW stands for _______. |
invisible web | ___ is a large portain the the internet that find engines spiders can not index. |
education | The domain .edu means ______ sites. |
commercial business | The domain .com represents _____ sites. |
U.S. Governmental | The domain .gov stands for ____ sites. |
networks | The domain .net means ___ sites. |
U.S. Non-profit organizations | The domain .org represents _____ sites. |
stop words | ____ room words that numerous search engines DON'T prevent for once searching texts and titles on the web. |
plus sign | Use _______ in front of words to force their inclusion in searchers |
minus sign | Use ______ in front of words to force their exemption in searchers |
quotation marks | Use ______ approximately phrases to ensure they are searched exacting as is, v the words side by next in the very same order. |
lowercase | Type keywords and phrases in ______ to uncover both lower and upper instance versions. |
boolean logic | ______ is a system of reasonable designed to produce far better search results by formulating precise queries. |
NOT | AND, OR, and also _____ are instances of Boolean logic operators. |
404-File not found | This post _______ tells you that the file you seek has actually been moved, removed, or renamed. |
Server Error | This message ____ speak you the server you are attempting to call may be offline, may have actually crashed, or may be really busy. |
Short | Keep emails _____--do no intimidate recipients through too much text. |
subject line | In emails, the vital to getting your messages check out is to create a perfect ________. |
Current antivirus software | Make sure you space not spreading worms and also viruses via email or act together a automobile for spreading spam by utilizing ________. |
huge attachments | In emails, ask before you send _____ so you do not clog up their email. |
one subject | In emails, try to talk about _____ per message to assist make it much less confusing. |
acronyms | In emails, use ______ sparingly due to the fact that not everybody to know what anyone stands for and also they do not save that much time anyway. |
All Caps | In emails, composing in ______ is prefer shouting. |
input | Examples of ______ tools are keyboards, mouse, microphone, and scanner. |
output | Examples of ____ devices are monitor, printer, projector, and speakers. |
spyware | _____ is computer software the is secretly installed onto your computer system as you surf the internet. |
computer virus | ___ is a small software program that is intended come spread type one computer system to one more to interfere v the operation of her computer. |
worm | A ____ sends duplicates of itself by way of a computer system network i m sorry in turn damages the network. |
trojan horse | A_____ is a file that shows up to it is in harmless yet in fact it has actually disguised chin in hopes that a user will open the regimen releasing that is harmful effects.. |
cyberbullying | ______ sending or posting harmful or cruel text or pictures using the web or other interaction devices. |
____ enables people to send messages from their computer system to any kind of other computer in the world. | |
emoticons | ___ are animated faces that express different emotions friend send in e-mails, chat, and instant messaging. |
hacker | _____ is someone that accesses computer information either legally or illegally. |
mouse trapping | ___ is a an approach used by pornography sites wherein a user gets locked in a net site. |
phishing | ___ is an online scam that uses e-mail to fish because that users' private info by imitating legitimate companies. |
spam | ____ is undesirable e-mail from who you carry out not know. |
personal information | To save safe ~ above the Internet, you need to not re-superstructure _________ such as full name or e-mail address. |
do no respond | In keeping safe top top the Internet, _________ to any kind of online interaction that makes you feeling uncomfortable, scared, or confused. |
do not meet | To stay safe making use of the Internet, ________ anyone online without discussing it v parents or guardians--since this is the best danger to her safety. |
Re: | ___ is the subject of the email which should be inserted by you and one that the 9 crucial parts of an email. |
salutation | ____ is the greeting in ~ the top of the email which is among the 9 vital parts of an email. |
discussion board | A(n) _______ is a device which permits groups to interact online. |
plagiarism | ___ is a piece of writing that has actually been replicated from someone else and is presented together being your own work. |
picnik.com | ___ is photo modifying online which permits you to use effects to her photos. |
bit | Between a jpeg and also bit format, the ___ papers are bigger due to the fact that every part in the photo is mapped. |
domain | _____ are provided in url's come identify particular web pages. See more: 13610 N. Black Canyon Highway Phoenix, Az 85029, Pima Medical Institute, Phoenix |
netiquette | _____ describes the rules for online behavior especially in newsgroups, forums and also chat rooms. |
![]() | Create your very own activities |