Give this one a try later!
hypertext markup language
A(n) _____ diagram depicts a database's entities and their relationships.
Give this one a try later!
entity-relationship
A map of a database is called a__________
,Give this one a try later!
schema
Environmental responsibility involves:
Give this one a try later!
Buying green
Saving trees
Saving energy
Workers in many organizations operate in a(n) _____ environment in which software and
data storage are provided by the Internet; the services are run on another
organization's computer hardware, and both software and data are easily accessed.
Give this one a try later!
cloud computing
The study and practice of using computing resources efficiently and with a worldly
perspective is _________.
Give this one a try later!
green computing
, There are several ways to protect the anonymity of your data and your electronic
communications. What is not a method used for protection?
Proxy server
Encryption
Phishing
Strong Password
Give this one a try later!
Phishing
Web site owners generally prefer more rather than less traffic. Excessive traffic,
however, designed to immobilize a
Web site can be caused by:
EDI
DoS
EFT
HTTPS
Give this one a try later!
DoS
The 1986 _____ provides the same protection that covers mail and telephone
communications to electronic
communications such as voice mail.
Give this one a try later!