When data changes in multiple list and list are not updated, this causes data inconsistency
2. Granting an outside organization access to internet web pages is often implemented using a
extranet
3. The code that relational database management systems use to perform their database task is
refer to as SQL
4. Data integrity means that the data contained in the database is accurate and reliable
5. The IBM made the first electronic computer in 1953
6. Control panel is used for increasing and decreasing the speed of the cursor of mouse
7. The .mpeg is the format of a movie file
8. The memory address sent from the CPU to the main memory over a set of wires is called address
bus
9. The enhanced keyboard contains 101 keys
10. Cache memory is a part of main memory
11. The central host computer or file server in a star network maintains control with its connecting
devices through polling
12. The integration of all kinds of media such as audio, video, voice, graphics and text into one
coherent presentation combined is called multimedia
13. A technique for searching special databases, called data warehouses, looking for related
information and patterns is called data mining
14. Batch processing is a technique in which a number of similar items or transactions are processed
in groups or batches during a machine run
15. A program which helps create written documents and lets you go back and make corrections as
necessary word processor
16. A place that a user can create to store files- folder
17. Start or restart the computer-boot
18. A blinking indicator that shows you where your next action will happen-cursor
19. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things
within programs- menu bar
20. The command used to remove text or graphics from a document. The information is then stored
on a clipboard so you can paste it- cut
21. A removable magnetic disc that holds information-hard drive
22. A command to get a file you worked on from the memory where it was stored-open
23. To move down a page in a document-scroll
24. A program that works like a calculator for keeping track of money and making budgets-
spreadsheet
25. All of the following are examples of real security and privacy risks EXCEPT- spam.
26. A process known as data mining is used by large retailers to study trends.
27. Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
28. The ability to recover and read deleted or damaged files from a criminal computer is an example
of a law enforcement specialty called- computer forensics.
29. Surgeons can perform delicate operations by manipulating devices through computers instead of
manually. This technology is known as- robotics.
2. Granting an outside organization access to internet web pages is often implemented using a
extranet
3. The code that relational database management systems use to perform their database task is
refer to as SQL
4. Data integrity means that the data contained in the database is accurate and reliable
5. The IBM made the first electronic computer in 1953
6. Control panel is used for increasing and decreasing the speed of the cursor of mouse
7. The .mpeg is the format of a movie file
8. The memory address sent from the CPU to the main memory over a set of wires is called address
bus
9. The enhanced keyboard contains 101 keys
10. Cache memory is a part of main memory
11. The central host computer or file server in a star network maintains control with its connecting
devices through polling
12. The integration of all kinds of media such as audio, video, voice, graphics and text into one
coherent presentation combined is called multimedia
13. A technique for searching special databases, called data warehouses, looking for related
information and patterns is called data mining
14. Batch processing is a technique in which a number of similar items or transactions are processed
in groups or batches during a machine run
15. A program which helps create written documents and lets you go back and make corrections as
necessary word processor
16. A place that a user can create to store files- folder
17. Start or restart the computer-boot
18. A blinking indicator that shows you where your next action will happen-cursor
19. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things
within programs- menu bar
20. The command used to remove text or graphics from a document. The information is then stored
on a clipboard so you can paste it- cut
21. A removable magnetic disc that holds information-hard drive
22. A command to get a file you worked on from the memory where it was stored-open
23. To move down a page in a document-scroll
24. A program that works like a calculator for keeping track of money and making budgets-
spreadsheet
25. All of the following are examples of real security and privacy risks EXCEPT- spam.
26. A process known as data mining is used by large retailers to study trends.
27. Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems.
28. The ability to recover and read deleted or damaged files from a criminal computer is an example
of a law enforcement specialty called- computer forensics.
29. Surgeons can perform delicate operations by manipulating devices through computers instead of
manually. This technology is known as- robotics.
0 Comments