Rows
Records
Fields
Columns
Analysis, design, testing, programming
Design, testing, analysis, programming
Design, programming, testing, analysis
Analysis, design, programming, testing
Worksheets
Table
Form
Modules
Option 5
Child, Parent
Parent, Child
Row, Column
Grandparent, Parent
Spreadsheet
List
Worksheet
Relational Database
Unique Identifier
Primary Key
Foreign Key
Macro Key
Manage software on computer
Manage hardware on computer
Manage all hardware & software on computer
Provide a visual interface for users to manage hardware and software.
Partitioning
Division
Configuring
Segmenting
Add new hardware.
See a list of all the hardware devices installed on your computer (use this to change the properties of any device).
Adjust the resolution of your monitor, change Windows themes, and change background theme/image for your desktop.
Change what appears regarding notifications and quick start buttons.
UNIX
Linux
Firefox
Windows
The service applet
The system applet
The performance tab of the Task Manager
The process tab of the Task Manager
Application Software
System Software
Utility Software
User
Freeware
Open-source software
Shareware
Macros
Open-source software
Freeware
Shareware
System software
A BOT
Spyware
Logic bomb
Worm
LAN
WAN
MAN
WLAN
Have the same interests
Are placed in the same location in an office
Are associated by an organizational need
Have the same computers
Two
Five
Three
Four
Assessing the Disaster Recovery Plan
By evaluating the implementation plan
From personal observation
By evaluating the implementation plan and from personal observation
Data should be stored on its own volume
Data should be mixed in with program files
Data should be stored on local hard drives
Data should be stored on removable media
The Network Administrator
The IT Manager
The Security Auditor
All users in an organization
Use utility software in conjunction with staff education
Use an anti-virus
Use a firewall
Be careful of the websites you visit
Scanning all removable disks or CDs to be used by users
Obtaining and distributing the latest signature files
Vetting the web sites that users visit to check for viruses
Using a network ‘sniffer’ to check that packets of data do not contain virus signatures
When the system is least busy.
At 2AM local time.
On boot up.
Any time before 6AM local time.
The class of user
The organizational guidelines
The group to which the user belongs
Local group policy
Wait!
Here's an interesting quiz for you.