With Computer solution 2024.
A ________ allows a hacker to gain access to your computer and take almost
complete control of it without your knowledge.
Rootkit
A ________ allows visitors to add, remove, or edit its content.
Wiki
A ________ check compares the values of data in two or more fields to see
whether those values are reasonable.
consistency
A ________ check would be used to restrict the fines for speeding violations from
$50 to $250.
range
A ________ displays a subset of data from a table (or tables) based on the
specified criteria.
select Query
A ________ enables the computer to drive the speaker system.
Sound card
A ________ enables your computer to connect to other computers or to the
Internet.
Network Interface Card (NIC)
A ________ is a group of related data that can be stored, sorted, organized, and
queried.
database
A ________ is a network located in your residence that connects to all your digital
devices.
Home Area Network (HAN)
A ________ is a virus that is attached to documents such as Word or Excel files.
Macro virus
A ________ is a virus that is triggered on a certain date.
Time bomb
A ________ is any device connected to a network such as a computer, printer, or
game console.
node
A ________ is named after a housing construction feature that slows the spread
of fires from house to house.
firewall
A ________ relationship indicates that for each record in a table, there is only a
single corresponding record in a related table.
one to one
A ________ uses electronic memory and has no motors or moving parts.
Solid state drive (SSD)
A client/server network is an example of ________ administration
, Central
A computer ________ is two or more computers connected using software and
hardware so that they can communicate with each other.
network
A computer connected to the Internet that asks for data is a ________.
Client
A data ________ is a large-scale electronic repository of data that contains and
organizes all of an organization's data in one place.
warehouse
A first-generation language is ________.
machine language
A keyboard and mouse are examples of ________ devices.
input
A large network designed to provide access to a specific geographic area, such
as a large city, is a ________.
Metropolitan area network (MAN)
A loop decision point consists of three features: an initial value, a set of actions
to be performed, and a(n) ________.
test condition
A main difference between the tablet and the smartphone is the ________.
Screen Size
A network that spans a large physical distance is called a ________.
Wide Area Network (WAN)
Computers use ________ language consisting of 0s and 1s.
Binary
Client/server networks are controlled by a central server that runs specialized
software called a(n) ________.
Network operating system
CAPTCHA stands for ________.
Completely Automated Public Turing-test to tell Computers and Humans Apart
Apple's OS X and Microsoft Windows are examples of ________ software.
Operating system
Apache OpenOffice is an example of a(n) ________ productivity suite.
open source
An integrated development environment (IDE) is a ________.
Collection of tools for programmers
An Internet connectivity plan is also known as a ________ plan.
data
An Apple iPad and a Samsung Galaxy Tab are examples of ________ computers.
tablet
All of the following operating systems support P2P networking EXCEPT
________.
a) Windows
b) Unix