____ 26. In the accompanying figure, the items marked C represent ____.
a.
a cell
c.
records
b.
fields
d.
items
____ 27. To find a particular record or group of records in a database, you use a(n) ____.
a.
find
c.
inquiry
b.
query
d.
search
____ 28. You can use the results from a search on a database in all of these ways EXCEPT to ____.
a.
print reports
c.
convert formats
b.
export data
d.
create records
____ 29. ____ queries are questions stated in a language such as English, rather than an esoteric query language.
a.
Natural language
c.
QBE
b.
Keyword
d.
Notational
____ 30. ____ searches are simply a collection of words relevant to a search.
a.
Natural language
c.
QBE
b.
Keyword
d.
Notational
____ 31. ____ simply requires you to fill out a form with the type of data you want to locate in a database.
a.
Natural language modification
c.
QBE
b.
Keyword searching
d.
Notational resonance
____ 32. Popular presentation software products include all of the following EXCEPT ____.
a.
Microsoft PowerPoint
c.
LibreOffice Impress
b.
iWork Keynote
d.
Movie Maker
____ 33. Web applications are ____.
a.
installed locally and run on the Web
c.
installed on the Web and run locally
b.
accessed and run on the Web
d.
all of the above
____ 34. Mobile apps ____.
a.
are usually small
c.
often cost less than $5.00, or are even free
b.
typically are sold through an App store
d.
all of the above
____ 35. iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.
a.
protocol breach
c.
android
b.
factory reset
d.
jailbreak
____ 36. The process of overcoming limitations imposed by mobile service providers on a mobile device is called ____.
a.
jailbreaking
c.
breaching