The term "open source" means that the source code of the...
Bits are grouped into 8-bit chunks called ___________.
A(n) ______________ contains the URL of the Web page to find when the...
Server farms are used when the _______________.
A byte is a _____________.
Which of the following is true about virtual private networks?
SQL is a(n) ________________.
__________ is the process of converting a poorly structured table into...
When you buy an operating system for your personal computer, you are...
A client-server application that requires nothing more than a browser...
A _________ is a computing device that prevents unauthorized network...
Which of the following terms refers to a collection of servers?
Which of the following is a program used to create, process, and...
________________ communications are secure, even though they are...
Virtualization is the process where _______________.
Metadata are _____________.
DBMS products are broadly classified into _______________.
Each entity has a unique attribute called ______________.
Bits are used for computer data because they ________________.
Which of the following is a program that controls the computer's...
Which of the following is a developmental task of a database...
Which of the following is a function of an ISP?
Which of the following is likely to be used by organizations with...
To run a program or process data, the computer first transfers the...
Which of the following is an example of a closed source project?
In which of the following cases is a user using the internet, but not...
A(n) is a set of rules that two communicating devices follow
_______________ are programs that run on a server-tier computer and...
Which of the following is nonvolatile in nature?
A ________ is equivalent to 1,024 bytes.
Which of the following is true of N:M relationships?
The application layer of the TCP/IP protocol architecture...
A _____________ is a collection of forms, reports, queries, and...
Entities have ______ that describe the characteristics of the entity.
Which of the following statements is true about UTP cables?
A ___________ is a column or group of columns that identifies a unique...
A network of computers that appears to operate as an integrated whole...
The various computers and printers on a LAN are connected to a...
Which of the following is an example of vertical-market software?
A(n) __________ uses the internet or other internet to create the...
Packet-filtering firewalls perform all of the following except...
Which of the following is one of the functions of an application...
Which of the following protocols guarantees a secure transmission?
Ronald runs both Windows 7 and Linux on his desktop computer. The...
________________ are commands that the CPU can process that may be...
The connection between the VPN client and the VPN server is called...
Which of the following statements is true of firmware?
The operating system employs _________ so that users can run multiple...
Every table in a normalized database has a ______________.
A(n) _____________ is a piece of a message that is handled by programs...
The ____________ problem is unique in a multi-user database...
Which of the following is most likely to be the last-choice...
Development costs of an information system include _______________.
Minimum cardinalities are
The __________________ layer of the TCP/IP protocol architecture is...
The hardware component that connects a printer's circuitry to the...
_____________ is the process of converting a data model into tables,...
Which of the following is an example of cloud computing?
The IEEE 802.3 and 802.11 protocols _______________.
Which of the following is an example of a database product?
In a database system, a _____________ is the smallest piece of data.
Which of the following is true for the TCP/IP protocol architecture?
A hospital is using a software to analyze treatment regimen and...