harrahjane.blogspot.com
harrah jane: Quiz 8
http://harrahjane.blogspot.com/2011/08/quiz-8.html
Lunes, Agosto 8, 2011. Refers to the procedures that keep data current. File maintenance procedures include adding records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed. Is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check. That analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Is a group of related fields.
balondozahrra.blogspot.com
My Daily Blog
http://balondozahrra.blogspot.com/2011/07/quiz-6-1.html
Tuesday, July 26, 2011. 1Define system software and identify the two types of system software. 2Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare. 3Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS. Types of System Software:. 2 Windows Server- a brand name for a group of server operating systems released by Microsoft Corporation.
gonzalescharissajane.blogspot.com
Charissa Jane Aquino Gonzales: Quiz No. 7
http://gonzalescharissajane.blogspot.com/2011/07/quiz-no-7_25.html
Charissa Jane Aquino Gonzales. Be happy.Have faith.Godbless! Monday, July 25, 2011. Quiz No. 7. 1 Sending device — initiates instruction to transmit data, instructions, or information. Communications device — connects the sending device to the communications channel. Communications channel — media on which data, instructions, or information travel. Communications device — connects the communications channel to the receiving device. Text messaging allows users to send and receive short text messages.
gonzalescharissajane.blogspot.com
Charissa Jane Aquino Gonzales: Quiz No. 8
http://gonzalescharissajane.blogspot.com/2011/08/quiz-no-8_1731.html
Charissa Jane Aquino Gonzales. Be happy.Have faith.Godbless! Monday, August 8, 2011. Quiz No. 8. 1 Define the term, database, and explain how a database interacts with data. A database is an organized collection of data for one or more purposes, usually in digital form. Is collection of unprocessed items text, numbers, images,video and audio. Is a processed data,organized, meaningful and useful. Refers to the procedures that keep data current. Users add new records to a file when they obtain new data Disc.
balondozahrra.blogspot.com
My Daily Blog
http://balondozahrra.blogspot.com/2011/07/glitterfy_21.html
Thursday, July 21, 2011. Glitterfy.com - Anime Glitter Graphics. Subscribe to: Post Comments (Atom). My Classmate Blog List. Devil May Cry 4. Kristel Joy Kinoc Ogos. :-). Mga Bayani ng Pilipinas. My CompEd 321 Class. My Journey Towards Life. I am what I act. View my complete profile. 160; Quiz 6: . Glitterfy.com - Anime Glitter Graphics. Glitter Graphics MySpace Layouts. Glitterfy.com - Anime Glitter Graphics Gud eve. Glitterfy.com - Anime Glitter Graphics.
balondozahrra.blogspot.com
My Daily Blog
http://balondozahrra.blogspot.com/2011/07/glitter-graphics-myspace-layouts.html
Monday, July 18, 2011. Subscribe to: Post Comments (Atom). My Classmate Blog List. Devil May Cry 4. Kristel Joy Kinoc Ogos. :-). Mga Bayani ng Pilipinas. My CompEd 321 Class. My Journey Towards Life. I am what I act. View my complete profile. 160; Quiz 6: . Glitterfy.com - Anime Glitter Graphics. Glitter Graphics MySpace Layouts. Glitterfy.com - Anime Glitter Graphics Gud eve. Glitterfy.com - Anime Glitter Graphics. Glitterfy.com - SpongeBob Glitter Graphics.
gonzalescharissajane.blogspot.com
Charissa Jane Aquino Gonzales: Quiz No. 9
http://gonzalescharissajane.blogspot.com/2011/08/quiz-no-9_09.html
Charissa Jane Aquino Gonzales. Be happy.Have faith.Godbless! Tuesday, August 9, 2011. Quiz No. 9. 1 Define the term, computer security risks, and briefly describe the types. Of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,. Unethical employee, cyberextortionist, and cyberterrorist. Refers to a computer programmer who is able to create usable computer programs where none previously existed. Break into their employers' computer for a variety of reasons. Some simply want to exp...
balondozahrra.blogspot.com
My Daily Blog
http://balondozahrra.blogspot.com/2011/08/quiz-7-1.html
Monday, August 1, 2011. 1 Discuss the components required for successful communications. 2 Identify various sending and receiving devices. 3 Describe uses of computer communications. 4 List advantages of using a network. 5 Differentiate among client/server, peer-to-peer, and P2P networks. 6 Describe the various network communications standards. 7 Explain the purpose of communications software. 8 Describe various types of lines for communications over the telephone network. 2 Sending and Receiving Devices:.