A(n) ________ is a arsenal of data arranged in a manner that permits access, retrieval, and use of that data.

You are watching: All of this information is part of a ____ in a database

Database administration SystemAccess is a ________.
recordA(n) ________ has information around a given person, product, or event.
fieldA(n)________ contains a particular piece of details within a record.
primaryA field that unique identifies a certain record in a table is called a _______ key.
datasheetIn _______ view, a table is represented as a arsenal of rows and also columns.
form______ view screens a solitary record in ~ a time.
redundancy______ way storing the same reality in an ext than one place.
recordsThe rows in the tables are dubbed ______.
data typeA ________ indicates the type of data that can be save on computer in a field.
queryA _______ is simply a question presented in a method Access have the right to process.
criteriaA ________ is a condition that the documents to be included in a query must satisfy.
asteriskA(n) ________ wildcard symbol represents any collection of characters.
question markA(n) _________ wildcard symbol represents any type of individual character.
grouping________ way creating groups of documents that re-superstructure some common characteristics.
datasheet or formYou can readjust or modify records only in ________ view
layoutChanging a shaft width alters the ________ of a table
crosstabA _______ calculates a statistic for data that is grouped by 2 different varieties of information.
join lineA ________ is a line that access draws between matching fields in two tables.
criterionIn a query, a _________ is a problem the documents to be had must satisfy.
identity theft______ a crime in i m sorry an imposter obtains key pieces of an individual information, such as Social defense number, in order come impersonate who else.
search engines_________ are substantial databases of internet page papers that have actually been assembled immediately by machine
google or ask_____ is an instance of a search engine
spidersSearch engines compile your databases by use ________ or "robots" ("bots") come crawl with web space from link to link, identifying and also perusing pages.
best meansA agree for utilizing search engines is ______ of looking the web.
thousands of responsesA con for find engines is the return of _______to a simple search request.
topThe goal of find engines is to return the many relevant pages at the ___ of their lists.
metasearch engine_______ carry out a quick means of finding out which engines room retrieving the finest results for you in her search.
Dogpile or mamma______ are examples of metasearch engines.
subject directories_____ room created and also maintained by human being editors.
beaucoup or looksmart______are examples of subject directories.
world broad webWWW stands for _______.
invisible web___ is a large portain the the internet that find engines spiders can not index.
educationThe domain .edu means ______ sites.
commercial businessThe domain .com represents _____ sites.
U.S. GovernmentalThe domain .gov stands for ____ sites.
networksThe domain .net means ___ sites.
U.S. Non-profit organizationsThe domain .org represents _____ sites.
stop words____ room words that numerous search engines DON'T prevent for once searching texts and titles on the web.
plus signUse _______ in front of words to force their inclusion in searchers
minus signUse ______ in front of words to force their exemption in searchers
quotation marksUse ______ approximately phrases to ensure they are searched exacting as is, v the words side by next in the very same order.
lowercaseType keywords and phrases in ______ to uncover both lower and upper instance versions.
boolean logic______ is a system of reasonable designed to produce far better search results by formulating precise queries.
NOTAND, OR, and also _____ are instances of Boolean logic operators.
404-File not foundThis post _______ tells you that the file you seek has actually been moved, removed, or renamed.
Server ErrorThis message ____ speak you the server you are attempting to call may be offline, may have actually crashed, or may be really busy.
ShortKeep emails _____--do no intimidate recipients through too much text.
subject lineIn emails, the vital to getting your messages check out is to create a perfect ________.
Current antivirus softwareMake sure you space not spreading worms and also viruses via email or act together a automobile for spreading spam by utilizing ________.
huge attachmentsIn emails, ask before you send _____ so you do not clog up their email.
one subjectIn emails, try to talk about _____ per message to assist make it much less confusing.
acronymsIn emails, use ______ sparingly due to the fact that not everybody to know what anyone stands for and also they do not save that much time anyway.
All CapsIn emails, composing in ______ is prefer shouting.
inputExamples of ______ tools are keyboards, mouse, microphone, and scanner.
outputExamples of ____ devices are monitor, printer, projector, and speakers.
spyware_____ is computer software the is secretly installed onto your computer system as you surf the internet.
computer virus___ is a small software program that is intended come spread type one computer system to one more to interfere v the operation of her computer.
wormA ____ sends duplicates of itself by way of a computer system network i m sorry in turn damages the network.
trojan horseA_____ is a file that shows up to it is in harmless yet in fact it has actually disguised chin in hopes that a user will open the regimen releasing that is harmful effects..
cyberbullying______ sending or posting harmful or cruel text or pictures using the web or other interaction devices.
e-mail____ enables people to send messages from their computer system to any kind of other computer in the world.
emoticons___ are animated faces that express different emotions friend send in e-mails, chat, and instant messaging.
hacker_____ is someone that accesses computer information either legally or illegally.
mouse trapping___ is a an approach used by pornography sites wherein a user gets locked in a net site.
phishing___ is an online scam that uses e-mail to fish because that users' private info by imitating legitimate companies.
spam____ is undesirable e-mail from who you carry out not know.
personal informationTo save safe ~ above the Internet, you need to not re-superstructure _________ such as full name or e-mail address.
do no respondIn keeping safe top top the Internet, _________ to any kind of online interaction that makes you feeling uncomfortable, scared, or confused.
do not meetTo stay safe making use of the Internet, ________ anyone online without discussing it v parents or guardians--since this is the best danger to her safety.
Re:___ is the subject of the email which should be inserted by you and one that the 9 crucial parts of an email.
salutation____ is the greeting in ~ the top of the email which is among the 9 vital parts of an email.
discussion boardA(n) _______ is a device which permits groups to interact online.
plagiarism___ is a piece of writing that has actually been replicated from someone else and is presented together being your own work.
picnik.com___ is photo modifying online which permits you to use effects to her photos.
bitBetween a jpeg and also bit format, the ___ papers are bigger due to the fact that every part in the photo is mapped.
domain_____ are provided in url's come identify particular web pages.

See more: 13610 N. Black Canyon Highway Phoenix, Az 85029, Pima Medical Institute, Phoenix

netiquette_____ describes the rules for online behavior especially in newsgroups, forums and also chat rooms.
Create your very own activities