A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data.

You are watching: A field is also called a ____.

Database Management SystemAccess is a ________.
recordA(n) ________ contains information about a given person, product, or event.
fieldA(n)________ contains a specific piece of information within a record.
primaryA field that uniquely identifies a particular record in a table is called a _______ key.
datasheetIn _______ view, a table is represented as a collection of rows and columns.
form______ view displays a single record at a time.
redundancy______ means storing the same fact in more than one place.
recordsThe rows in the tables are called ______.
data typeA ________ indicates the type of data that can be stored in a field.
queryA _______ is simply a question presented in a way Access can process.
criteriaA ________ is a condition that the records to be included in a query must satisfy.
asteriskA(n) ________ wildcard symbol represents any collection of characters.
question markA(n) _________ wildcard symbol represents any individual character.
grouping________ means creating groups of records that share some common characteristics.
datasheet or formYou can change or edit records only in ________ view
layoutChanging a column width changes the ________ of a table
crosstabA _______ calculates a statistic for data that is grouped by two different types of information.
join lineA ________ is a line that Access draws between matching fields in two tables.
criterionIn a query, a _________ is a condition the records to be included must satisfy.
identity theft______ a crime in which an imposter obtains key pieces of personal information, such as Social Security number, in order to impersonate someone else.
search engines_________ are huge databases of web page files that have been assembled automatically by machine
google or ask_____ is an example of a search engine
spidersSearch engines compile their databases by employing ________ or "robots" ("bots") to crawl through web space from link to link, identifying and perusing pages.
best meansA pro for using search engines is ______ of searching the web.
thousands of responsesA con for search engines is the return of _______to a simple search request.
topThe goal of search engines is to return the most relevant pages at the ___ of their lists.
metasearch engine_______ provide a quick way of finding out which engines are retrieving the best results for you in your search.
Dogpile or mamma______ are examples of metasearch engines.
subject directories_____ are created and maintained by human editors.
beaucoup or looksmart______are examples of subject directories.
world wide webWWW stands for _______.
invisible web___ is a large portain of the Web that search engines spiders can not index.
educationThe domain .edu stands for ______ sites.
commercial businessThe domain .com stands for _____ sites.
U.S. governmentalThe domain .gov stands for ____ sites.
networksThe domain .net stands for ___ sites.
U.S. non-profit organizationsThe domain .org stands for _____ sites.
stop words____ are words that many search engines DON'T stop for when searching texts and titles on the web.
plus signUse _______ in front of words to force their inclusion in searchers
minus signUse ______ in front of words to force their exclusion in searchers
quotation marksUse ______ around phrases to ensure they are searched exacting as is, with the words side by side in the same order.
lowercaseType keywords and phrases in ______ to find both lower and upper case versions.
boolean logic______ is a system of logic designed to produce better search results by formulating precise queries.
NOTAND, OR, and _____ are examples of Boolean logic operators.
404-File not foundThis message _______ tells you that the file you seek has been moved, removed, or renamed.
Server ErrorThis message ____ tells you the server you are attempting to contact may be offline, may have crashed, or may be very busy.
ShortKeep emails _____--do not intimidate recipients with too much text.
subject lineIn emails, the key to getting your messages read is to write a perfect ________.
Current antivirus softwareMake sure you are not spreading worms and viruses via email or act as a vehicle for spreading spam by using ________.
huge attachmentsIn emails, ask before you send _____ so you do not clog up their email.
one subjectIn emails, try to talk about _____ per message to help make it less confusing.
acronymsIn emails, use ______ sparingly since not everybody knows what everyone stands for and they do not save that much time anyway.
All CapsIn emails, writing in ______ is like shouting.
inputExamples of ______ devices are keyboards, mouse, microphone, and scanner.
outputExamples of ____ devices are monitor, printer, projector, and speakers.
spyware_____ is computer software that is secretly installed onto your computer as you surf the internet.
computer virus___ is a small software program that is intended to spread form one computer to another to interfere with the operation of your computer.
wormA ____ sends copies of itself by way of a computer network which in turn harms the network.
trojan horseA_____ is a file that appears to be harmless but in reality it has disguised itself in hopes that a user will open the program releasing its harmful effects..
cyberbullying______ sending or posting harmful or cruel text or images using the internet or other communication devices.
e-mail____ allows people to send messages from their computer to any other computer in the world.
emoticons___ are animated faces that express different emotions you send in e-mails, chat, and instant messaging.
hacker_____ is someone who accesses computer information either legally or illegally.
mouse trapping___ is a technique used by pornography sites where a user gets locked in a web site.
phishing___ is an online scam that uses e-mail to fish for users' private information by imitating legitimate companies.
spam____ is unwanted e-mail from someone you do not know.
personal informationTo keep safe on the Internet, you should not share _________ such as full name or mailing address.
do not respondIn keeping safe on the Internet, _________ to any online communication that makes you feel uncomfortable, scared, or confused.
do not meetTo stay safe using the Internet, ________ anyone online without discussing it with parents or guardians--since this is the biggest danger to your safety.
Re:___ is the subject of the email which must be inserted by you and one of the 9 key parts of an email.
salutation____ is the greeting at the top of the email which is one of the 9 key parts of an email.
discussion boardA(n) _______ is a tool which allows groups to communicate online.
plagiarism___ is a piece of writing that has been copied from someone else and is presented as being your own work.
picnik.com___ is photo editing online which allows you to apply effects to your photos.
bitBetween a jpeg and bit format, the ___ files are bigger because every part in the picture is mapped.
domain_____ are used in url's to identify particular web pages.

See more: Why Was The French Government Bankrupt In 1787, Chapter 23 Causes Of The French Revolution 2

netiquette_____ describes the rules for online behavior especially in newsgroups, forums and chat rooms.
Create your own activities