File
Format
Electronic Commerce
No Recovery
Letter
Database
100

What is the file format of a Word 2016 document

.docx

100

A type of electronic commerce that involves the sale of a product or service from one business to another.

Business-to-business (B2B)

100

Person who gains unauthorized access to a computer system for the fun and challenge of it.

Hacker

100

All parts of the letter begin at the left margin. No lines are indented or centered. Block format can be used on either business or personal business letters.

block format letter

100

Details and information about the database.

Properties

200

Excel file format for workbooks

.xlsx

200

A type of electronic commerce that involves the sale of a product or service to the general public or end-users.

Business-to-consumer (B2C)

200

A program that is not a virus but is a carrier of virus(es). The most common Trojan horses appear as free computer games, screen savers, or antivirus programs. Once downloaded they locate and disable existing virus protection and then deposit the virus.

Trojan horse

200

Report layout option available when grouping records that displays the fields in a row and column format with the field names displayed as column heads; the grouped field displays in the left-most column but on the same row as the first record for the grouping.

block layout

200

Defines rules and standards for all data in a database. There are five database models: hierarchical, network, relational, multidimensional, and object-oriented.

model

300

Adobe Acrobat Document

.pdf

300

Handheld, book-sized device that displays text and graphics.

E-book reader

300

Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.

Virus

300

Customized list that includes a combination of numbers, letters, or bullets.

multilevel list

300

Software package used to set up, or structure, a database such as an inventory list of supplies. It also provides tools to edit, enter, and retrieve data from the database.

manager

400

The Windows feature that combines files and/or folders into one compressed folder.

.zip

400

Transmission of electronic messages over the Internet.

Electronic mail

400

Virus that doesn’t attach itself to programs and databases but fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.

Worm

400

Space between letters in a proportional font.

Kerning

400

containing highly structured and organized data created by database management programs.

file

500

Microsoft PowerPoint Presentaton

.pptx

500

Network in which nodes can act as both servers and clients.

Peer-to-peer (P2P)

500

A computer infected by a virus, worm, or Trojan horse that allows it to be remotely controlled for malicious purposes.

Zombie

500

A series of letters automatically added to a file name that identifies the type of file.

file name extension

500

To organize, manage, and retrieve data. DBMS programs have five subsystems: DBMS engine, data definition, data manipulation, applications generation, and data administration. An example of a database management system is Microsoft Access. See also Database manager.

management system

M
e
n
u