Package deal
ISTM 210 EXAM PACKAGE DEAL
ISTM 210 EXAM PACKAGE DEAL
[Show more]ISTM 210 EXAM PACKAGE DEAL
[Show more]what are alternate names for a table and its rows and columns in access? - Answer-- table= entity 
- row= record 
- column= field (titled with field names) 
primary key field - Answer-uniquely identifies each record among all other records in a database 
like a UIN to a student 
foreign key - Answer...
Preview 2 out of 12 pages
Add to cartwhat are alternate names for a table and its rows and columns in access? - Answer-- table= entity 
- row= record 
- column= field (titled with field names) 
primary key field - Answer-uniquely identifies each record among all other records in a database 
like a UIN to a student 
foreign key - Answer...
Pie chart - compare parts of a whole 
line chart - compare an item over time, shows trends in data 
column charts - compare different (or same) categories over time 
Stacked column charts - column chart but with columns broken into subcategories 
Date formatted as general - date(left) 
time (right) ...
Preview 2 out of 5 pages
Add to cartPie chart - compare parts of a whole 
line chart - compare an item over time, shows trends in data 
column charts - compare different (or same) categories over time 
Stacked column charts - column chart but with columns broken into subcategories 
Date formatted as general - date(left) 
time (right) ...
What amount of employees steal information? - Answer-59% 
What amount of funds are stolen and never recovered? - Answer-68% 
What is one way of preventing online identity theft? - Answer-Use your credit card when purchasing 
things online 
What do hackers look for? - Answer-Storage space, processing...
Preview 3 out of 25 pages
Add to cartWhat amount of employees steal information? - Answer-59% 
What amount of funds are stolen and never recovered? - Answer-68% 
What is one way of preventing online identity theft? - Answer-Use your credit card when purchasing 
things online 
What do hackers look for? - Answer-Storage space, processing...
Each computer has its own _____ address - Answer-Unique 
What is the address we used? - A 
Individuals create storage locations called_______ on these computers and files - Answer-Subdirectories 
Where do you put files so that everyone can see them? - Answer-Public Folder 
How does your browser find...
Preview 2 out of 8 pages
Add to cartEach computer has its own _____ address - Answer-Unique 
What is the address we used? - A 
Individuals create storage locations called_______ on these computers and files - Answer-Subdirectories 
Where do you put files so that everyone can see them? - Answer-Public Folder 
How does your browser find...
<h#></h#> - Heading - Starts a section, smaller number is larger text (1-6) 
<p></p> - Starts and ends a paragraph 
<ul></ul> - Bullet (unordered) list 
<li></li> - List item 
<hr /> - Horizontal rule; no closing tag; can be measured in width or ...
Preview 3 out of 16 pages
Add to cart<h#></h#> - Heading - Starts a section, smaller number is larger text (1-6) 
<p></p> - Starts and ends a paragraph 
<ul></ul> - Bullet (unordered) list 
<li></li> - List item 
<hr /> - Horizontal rule; no closing tag; can be measured in width or ...
Allows you to automatically populate cells in a worksheet - Answer-Fill Feature 
Allows you to complete a pattern within a range of cells - Answer-Series Feature 
Allows you to lock rows and columns when you navigate through a data table - Answer-Freeze Pain 
Feature 
Allows information on the table...
Preview 2 out of 13 pages
Add to cartAllows you to automatically populate cells in a worksheet - Answer-Fill Feature 
Allows you to complete a pattern within a range of cells - Answer-Series Feature 
Allows you to lock rows and columns when you navigate through a data table - Answer-Freeze Pain 
Feature 
Allows information on the table...
Computer Security is concerned with - Answer-risk management, confidentiality, integrity and the 
availability of the electronic information that is processed and stored within a computing system 
Risk Management - Answer-includes the recognition, consequences, and assessment of risk to a 
computer...
Preview 2 out of 11 pages
Add to cartComputer Security is concerned with - Answer-risk management, confidentiality, integrity and the 
availability of the electronic information that is processed and stored within a computing system 
Risk Management - Answer-includes the recognition, consequences, and assessment of risk to a 
computer...
Chapter 11 Prometheus - Answer-Learning Forms 
What are databases best at doing? - Answer-Storing data 
What is Microsoft access? - Answer-A database application 
What is the company prometheus pulls a lot of data from and what does it do? - Answer-QuickStove, 
LLC, a small company that sells emerge...
Preview 2 out of 6 pages
Add to cartChapter 11 Prometheus - Answer-Learning Forms 
What are databases best at doing? - Answer-Storing data 
What is Microsoft access? - Answer-A database application 
What is the company prometheus pulls a lot of data from and what does it do? - Answer-QuickStove, 
LLC, a small company that sells emerge...
Computer Network - Answer-two or more computers connected together to communicate and share 
resources 
Server - Answer-Central Computer in a network 
Clients - Answer-computers connected to a server 
Node - Answer-every device connected to a network 
Peripheral Device - Answer-printer, scanner, etc...
Preview 2 out of 12 pages
Add to cartComputer Network - Answer-two or more computers connected together to communicate and share 
resources 
Server - Answer-Central Computer in a network 
Clients - Answer-computers connected to a server 
Node - Answer-every device connected to a network 
Peripheral Device - Answer-printer, scanner, etc...
Google, DropBox, and Microsoft are company examples of what type of providers? - Answer-Cloud 
Service Providers (CSP) 
Using data visualization instead of _______________________, makes business programming much 
easier to understand. - Answer-Structured Query Language (SQL) 
Business Intelligence ...
Preview 3 out of 28 pages
Add to cartGoogle, DropBox, and Microsoft are company examples of what type of providers? - Answer-Cloud 
Service Providers (CSP) 
Using data visualization instead of _______________________, makes business programming much 
easier to understand. - Answer-Structured Query Language (SQL) 
Business Intelligence ...
Phinney's Fav formula - CONCATENATE 
CONCATENATE function - CONCATENATE (text1,[text2],...) - combines blocks of text 
SEARCH function - NOT case sensitive 
COUNT function - A function that determines how many cells in a range contain a number. 
Workbook - excel file that stores all information, ca...
Preview 2 out of 9 pages
Add to cartPhinney's Fav formula - CONCATENATE 
CONCATENATE function - CONCATENATE (text1,[text2],...) - combines blocks of text 
SEARCH function - NOT case sensitive 
COUNT function - A function that determines how many cells in a range contain a number. 
Workbook - excel file that stores all information, ca...
Two or more computers connect together - Answer-Network 
The purpose of a computer network is to ________________________ and 
__________________________ resources. - Answer-communicate, share 
Plugged into the motherboard and allows a network cable to be plugged in - Answer-Network Interface 
Contr...
Preview 2 out of 12 pages
Add to cartTwo or more computers connect together - Answer-Network 
The purpose of a computer network is to ________________________ and 
__________________________ resources. - Answer-communicate, share 
Plugged into the motherboard and allows a network cable to be plugged in - Answer-Network Interface 
Contr...
Computer Security - concerned with risk management, confidentiality, integrity, and the 
availability of the electronic information that is processed and stored within a computing system 
risk management - includes the recognition, consequences, and assessment of risk to a 
computer's assets, and d...
Preview 3 out of 17 pages
Add to cartComputer Security - concerned with risk management, confidentiality, integrity, and the 
availability of the electronic information that is processed and stored within a computing system 
risk management - includes the recognition, consequences, and assessment of risk to a 
computer's assets, and d...
Year telegraphs were invented - 1837 
Used homing pigeons in the 1840s to quickly get accurate business information - Paul Reuters 
The most important factor of Business Information Technology - People 
The four factors of successful implementation of business technology - People, tools, best 
pract...
Preview 2 out of 11 pages
Add to cartYear telegraphs were invented - 1837 
Used homing pigeons in the 1840s to quickly get accurate business information - Paul Reuters 
The most important factor of Business Information Technology - People 
The four factors of successful implementation of business technology - People, tools, best 
pract...
Information Technology - the study, design, development, implementation, support, and 
management of computer-based information systems, particularly software and hardware. 
End-Users - People that use computers 
Competency - The knowledge that enables a person to understand something, in this case,...
Preview 2 out of 13 pages
Add to cartInformation Technology - the study, design, development, implementation, support, and 
management of computer-based information systems, particularly software and hardware. 
End-Users - People that use computers 
Competency - The knowledge that enables a person to understand something, in this case,...
Who used carrier pigeons to get news and stocks from Belgium to Germany? - Answer-Reuters 
What was the first way the world connected? - Answer-The Telegraph 
The study, design, development, implementation, support, and management of computer-based 
information systems, particularly software and har...
Preview 2 out of 14 pages
Add to cartWho used carrier pigeons to get news and stocks from Belgium to Germany? - Answer-Reuters 
What was the first way the world connected? - Answer-The Telegraph 
The study, design, development, implementation, support, and management of computer-based 
information systems, particularly software and har...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $19.39. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
73918 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now