A(n) ________ is a arsenal of data organized in a manner that enables accessibility, retrieval, and usage of that information.

You are watching: A(n) ____ contains information about a given person, product, or event.

Database Management SystemAccess is a ________.
recordA(n) ________ contains indevelopment around a offered person, product, or event.
fieldA(n)________ has a details piece of information within a document.
primaryA area that uniquely identifies a details record in a table is called a _______ essential.
datasheetIn _______ watch, a table is represented as a arsenal of rows and also columns.
form______ check out displays a solitary record at a time.
redundancy______ implies storing the exact same fact in even more than one location.
recordsThe rows in the tables are dubbed ______.
information typeA ________ indicates the type of information that can be stored in a area.
queryA _______ is simply a question presented in a method Access can procedure.
criteriaA ________ is a condition that the documents to be contained in a query should fulfill.
asteriskA(n) ________ wildcard symbol represents any type of collection of characters.
question markA(n) _________ wildcard symbol represents any individual character.
grouping________ indicates developing teams of records that share some prevalent features.
datasheet or formYou can adjust or edit records just in ________ view
layoutChanging a column width changes the ________ of a table
crosstabA _______ calculates a statistic for information that is grouped by two different forms of indevelopment.
join lineA ________ is a line that Access draws between equivalent fields in two tables.
criterionIn a query, a _________ is a problem the records to be consisted of need to accomplish.
identification theft______ a crime in which an imposter obtains vital pieces of personal indevelopment, such as Social Security number, in order to impersonate someone else.
search engines_________ are huge databases of web web page papers that have actually been assembled automatically by machine
google or ask_____ is an example of a search engine
spidersSearch engines compile their databases by employing ________ or "robots" ("bots") to crawl through web room from attach to link, identifying and perusing peras.
ideal meansA pro for utilizing search engines is ______ of searching the web.
hundreds of responsesA con for search engines is the return of _______to a simple search request.
topThe goal of search engines is to rerotate the many appropriate peras at the ___ of their lists.
metasearch engine_______ provide a quick method of finding out which engines are retrieving the finest outcomes for you in your search.
Dogpile or mamma______ are examples of metasearch engines.
subject directories_____ are developed and also maintained by human editors.
beaucoup or looksmart______are examples of topic directories.
human being wide webWWW represents _______.
invisible web___ is a huge portain of the Web that search engines spiders can not index.
educationThe domajor .edu represents ______ sites.
commercial businessThe domain .com means _____ sites.
U.S. governmentalThe domain .gov represents ____ sites.
networksThe doprimary .net stands for ___ sites.
UNITED STATE non-profit organizationsThe domain .org stands for _____ sites.
speak words____ are words that many type of search engines DON'T soptimal for as soon as looking messages and titles on the internet.
plus signUse _______ in front of words to pressure their inclusion in searchers
minus signUse ______ in front of words to force their exemption in searchers
quotation marksUse ______ approximately phrases to encertain they are searched exacting as is, through the words side by side in the very same order.
lowercaseType keywords and phrases in ______ to find both lower and also top case versions.
boolean logic______ is a mechanism of logic designed to develop much better search results by formulating precise queries.
NOTAND, OR, and _____ are examples of Boolean logic operators.
404-File not foundThis message _______ tells you that the file you seek has actually been relocated, rerelocated, or renamed.
Server ErrorThis message ____ tells you the server you are attempting to call may be offline, may have actually cramelted, or may be extremely busy.
ShortKeep emails _____--execute not intimiday recipients with also much message.
subject lineIn emails, the vital to getting your messages check out is to create a perfect ________.
Current antivirus softwareMake certain you are not spanalysis worms and also viruses through email or act as a auto for spreading spam by utilizing ________.
expensive attachmentsIn emails, ask prior to you sfinish _____ so you do not clog up their email.
one subjectIn emails, try to talk about _____ per message to help make it much less confutilizing.
acronymsIn emails, use ______ sparingly considering that not everybody knows what everyone means and also they execute not save that a lot time anyway.
All CapsIn emails, composing in ______ is prefer shouting.
inputInstances of ______ gadgets are key-boards, computer mouse, microphone, and also scanner.
outputExamples of ____ devices are monitor, printer, projector, and also speakers.
spyware_____ is computer software that is secretly set up onto your computer as you surf the internet.
computer virus___ is a small software application routine that is intfinished to spread create one computer to one more to interfere with the procedure of your computer system.
wormA ____ sends out duplicates of itself by way of a computer network which consequently hurts the netoccupational.
trojan horseA_____ is a document that appears to be harmless however in reality it has actually disguised itself in wishes that a user will open the program releasing its harmful results..
cyberbullying______ sfinishing or posting harmful or cruel message or images making use of the internet or other communication devices.
e-mail____ permits world to send messperiods from their computer to any kind of various other computer in the world.
emoticons___ are animated deals with that expush different emovements you sfinish in e-mails, chat, and also prompt messaging.
hacker_____ is someone who accesses computer system indevelopment either legally or illegally.
computer mouse trapping___ is an approach supplied by pornography sites wright here a user gets locked in a internet site.
phishing___ is an digital scamera that provides e-mail to fish for users' private indevelopment by imitating legitimate suppliers.
spam____ is unwanted e-mail from someone you execute not know.
personal informationTo keep safe on the Net, you must not share _________ such as full name or mailing deal with.
do not respondIn keeping safe on the Net, _________ to any digital interaction that makes you feel uncomfortable, scared, or puzzled.
execute not meetTo remain safe using the Web, ________ anyone virtual without pointing out it via parents or guardians--given that this is the biggest peril to your safety.
Re:___ is the topic of the email which must be inserted by you and also one of the 9 crucial components of an email.
salutation____ is the greeting at the peak of the email which is just one of the 9 vital components of an email.
discussion boardA(n) _______ is a tool which enables groups to connect digital.
plagiarism___ is a item of creating that has actually been copied from someone else and is presented as being your very own occupational.
picnik.com___ is photo editing and enhancing digital which enables you to apply impacts to your photos.
bitBetween a jpeg and bit format, the ___ documents are bigger because eexceptionally part in the photo is mapped.
domain_____ are offered in url's to identify specific internet pperiods.

See more: Can We Make The Colors Of The Rainbow Lab Answers, Data & Results

netiquette_____ explains the rules for virtual habits especially in newsgroups, forums and chat rooms.
Create your own activities