Which of the following data-mining techniques is used to determine which data goes
together?
Give this one a try later!
affinity grouping
,A customer information table linked to an orders table in a business database reflects
which type of relationship?
Give this one a try later!
one-to-many
A process to ensure that data in a database is organized most efficiently is called
Give this one a try later!
normalization
Is there any other safer way to encrypt e-mails?
Give this one a try later!
You can use public-key encryption. In public-key encryption, two keys are
created, one key for encoding and the other for decoding
If files need to be accessible to multiple employees, what type of server should a
network include?
Give this one a try later!
, File server
Which of the following is a method of inputting data into a transaction-processing
system while the transaction is taking place?
Give this one a try later!
real-time processing
IPv6 uses 128 bits to assign a(n)
Give this one a try later!
address to every device connected to the internet
When I attach a file to my e-mail, will SMTP send it to the e-mail server?
Give this one a try later!
The multipurpose Internet mail extensions (MIME) protocol is responsible
for sending e-mail file attachments
Antivirus software prevents infection by recording key attributes about your files and
checking to see if they change over time in a process called
Give this one a try later!
together?
Give this one a try later!
affinity grouping
,A customer information table linked to an orders table in a business database reflects
which type of relationship?
Give this one a try later!
one-to-many
A process to ensure that data in a database is organized most efficiently is called
Give this one a try later!
normalization
Is there any other safer way to encrypt e-mails?
Give this one a try later!
You can use public-key encryption. In public-key encryption, two keys are
created, one key for encoding and the other for decoding
If files need to be accessible to multiple employees, what type of server should a
network include?
Give this one a try later!
, File server
Which of the following is a method of inputting data into a transaction-processing
system while the transaction is taking place?
Give this one a try later!
real-time processing
IPv6 uses 128 bits to assign a(n)
Give this one a try later!
address to every device connected to the internet
When I attach a file to my e-mail, will SMTP send it to the e-mail server?
Give this one a try later!
The multipurpose Internet mail extensions (MIME) protocol is responsible
for sending e-mail file attachments
Antivirus software prevents infection by recording key attributes about your files and
checking to see if they change over time in a process called
Give this one a try later!