________ _____________ providers are companies that provide users access to the World Wide Web. (Topic 4)
Federal courts have established a system for electronic fili…
Federal courts have established a system for electronic filing called __________ ___________ /________ ________ ___________ (CM/ECF). (Topic 4)
_____________ computer databases are very powerful tool, cap…
_____________ computer databases are very powerful tool, capable of performing complex searches and calculations. (Topic 7)
A ____________ can be entered or changed by typing it in the…
A ____________ can be entered or changed by typing it in the property bar or typing it in a cell or by selecting the cell. (Topic 6)
When a file is saved, a file _____________ is added to the…
When a file is saved, a file _____________ is added to the end of the file name to identify the format in which the file has been saved. (Topic 5)
____________ are programs designed to limit access to a comp…
____________ are programs designed to limit access to a computer or computer networked system. (Topic 3)
The______ ________ is a method for transmitting a large file…
The______ ________ is a method for transmitting a large file in a compressed format. (Topic 4)
When choosing a secure ________________, it should include a…
When choosing a secure ________________, it should include a combination of letters, numbers, and symbols. (Topic 3)
Work product doctrine ____________ __________ protect docume…
Work product doctrine ____________ __________ protect documents prepared in the normal operation of the client’s business. (Topic 2)
In setting up _______________ features on a database, the n…
In setting up _______________ features on a database, the need to protect information must be balanced against the need for access to the information. (Topic 7)