task
stringlengths 37
71
| input
stringlengths 0
2.6k
| output
stringlengths 1
4.09k
| options
sequence | pageTitle
stringlengths 25
141
| outputColName
stringlengths 1
1.03k
| url
stringlengths 41
153
| wdcFile
stringlengths 71
73
|
---|---|---|---|---|---|---|---|
a20dd16f_Pharm_Flashcards___Cram_com__serostim_genotropin | what are 4 uses for vasopresin? [serostim genotropin] | polyuria/polydipsea hypernatremia bedtime desmopressin for nocturnal enuresis esophageal variceal bleeding | [] | Pharm Flashcards - Cram.com | serostim genotropin | http://www.cram.com/flashcards/pharm-2057741 | 41/1438042989018.40_20150728002309-00284-ip-10-236-191-2_375861360_0.json |
a20dd16f_Pharm_Flashcards___Cram_com__serostim_genotropin | what is conivaptan? [serostim genotropin] | a vasopressin antagonist that acts at the V1 and V2 receptors | [] | Pharm Flashcards - Cram.com | serostim genotropin | http://www.cram.com/flashcards/pharm-2057741 | 41/1438042989018.40_20150728002309-00284-ip-10-236-191-2_375861360_0.json |
a20dd16f_Pharm_Flashcards___Cram_com__serostim_genotropin | what can conivaptan be used for? [serostim genotropin] | treat hyponatremia associated with elevated levels of vasopressin | [] | Pharm Flashcards - Cram.com | serostim genotropin | http://www.cram.com/flashcards/pharm-2057741 | 41/1438042989018.40_20150728002309-00284-ip-10-236-191-2_375861360_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] heredity [1] | What is passing of traits from parent to offspring? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] alleles [1] | What are the different forms of a trait that a gene may have called? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] genetics [1] | What is the study of how traits are inherited through the interactions of alleles? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] hybrid [1] | What is an offspring that was given different genetic information for a trait from each parent called? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] dominant [1] | What is the trait that covers over another form of that trait. | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] recessive [1] | What is the trait that is covered over by another form of that trait? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] Gregor Mendel [1] | Who is the scientist that used the scientific method that resulted in the first recorded study of how traits pass from one generation to the next? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] Punnett square [1] | What is a tool used to predict results in genetics? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] genotype [1] | What is an organisms genetic makeup? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] phenotype [1] | What is the way an organism looks and behaves? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] homozygous [1] | What do you call an organism with two alleles that are the same? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] heterozygous [1] | What do you call an organism that has two different alleles for a trait? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] incomplete dominance [1] | What do you call it when the offspring of two homozygous parents show an intermediate phenotype? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] polygenic inheritance [1] | What do you call it when a group of gene pairs act together to produce a trait? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] sex-linked gene [1] | What do you call an allele inherited on a sex chromosome? (which can cause genetic disorders such a color blindness) | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
721f0054____Ch__5_Flashcards___Cram_com__1 | [2] genetic engineering [1] | What do you call biological and chemical methods to change the arrangement of a gene's DNA? | [] | Gr. 7 Life Sci., Ch. 5 Flashcards - Cram.com | 1 | http://www.cram.com/flashcards/gr-7-life-sci-ch-5-911730 | 41/1438042989510.73_20150728002309-00118-ip-10-236-191-2_373665291_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an illegal act involving acts [Computer Security Risk] | Computer Crime | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | online or internet based illegal acts [Computer Security Risk] | Cybercrime | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | someone who accesses a computer or network illegally [Computer Security Risk] | hacker | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | a hacker that has the intent of destroying data or stealing information [Computer Security Risk] | cracker | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | a cracker that does not have technical skills and knowledge [Computer Security Risk] | script kiddle | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | people hired to break into a computer or network [Computer Security Risk] | corporate spies | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | someone who uses email as a vehicle for extortion [Computer Security Risk] | cyberextortionist | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | programs altering a computer without the user knowing [Computer Security Risk] | malware | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | destructive event or prank the program is intended to deliver [Computer Security Risk] | payload | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | organization or person you believe will not send you a virus on purpose [Computer Security Risk] | Trusted source | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks usually for nefarious purposed [Computer Security Risk] | botnet | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | a compromised computer that is unknownly controlled by an outside source [Computer Security Risk] | zombie | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail [Computer Security Risk] | DoS | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network [Computer Security Risk] | Back Door | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network [Computer Security Risk] | Spoofing | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | the use of a computer or its data for unapproved or possibly illegal activities [Computer Security Risk] | Unauthorized Use | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | use of a computer or network without permission [Computer Security Risk] | Unauthorized Access | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | program that verifies user input between human and computer input [Computer Security Risk] | CAPTCHA | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an item you must carry to gain access to a computer or computer security [Computer Security Risk] | Possessed Object | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | authenticates a person's identity by translating a personnal characteristic code and then compares it to the stored digital code [Computer Security Risk] | Biometric Device | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | the discovery collection and analysis of evidence found on computers and networks [Computer Security Risk] | Digital Forensics | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | the act of stealing computer equipment [Computer Security Risk] | hardware theft | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | act of defacing or destroying computer equipment [Computer Security Risk] | hardware vandalism | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program. [Computer Security Risk] | software theft | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | right to use a software [Computer Security Risk] | license agreement | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | occurs when someone steals personal or confidential information [Computer Security Risk] | information theft | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | process of converting readable data into unreadable characters to prevent unauthorized access [Computer Security Risk] | encryption | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | decipher into readable form [Computer Security Risk] | decrypt | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | set of stpes that can convert readable plaintext into unreadable ciphertext [Computer Security Risk] | encryption algorithm | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | programmed formula that the originator of the data uses to encrypt the plaintext and recipient of the data users to decrypt the cyphertext [Computer Security Risk] | encryption key | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | readable data [Computer Security Risk] | plaintext | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | encrypted code that a person or organization attaches to an electronic message to verify the identity of the message sender [Computer Security Risk] | digital signature | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | contains information such as the user'sname, the issuing CA's name and signature, and theserial number of the certificate [Computer Security Risk] | Digital Certificate | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an authorized person or a company that issues and verifies digital certificates [Computer Security Risk] | Certificate Authority | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | prolonged malfunction of a computer [Computer Security Risk] | system failure | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | uses special electrical componentns to provide a stable current flow to the computer and other electronic equipment [Computer Security Risk] | surge protector | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | (uninterruptable power supply) device that contains surge protection circuits and one or more batteries that can provide power during a loss of power [Computer Security Risk] | UPS | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | duplicate file, program, or disk that can be used if the original is lost, damaged or destroyed [Computer Security Risk] | backup | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | restore files by copying the backed up files to their original location on the computer [Computer Security Risk] | restore | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | repetitive strain injury; an injury or disorder of the muscles, nerves, tendons, lagaments, and joints [Computer Security Risk] | RSI | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | computer vision syndrome: computer health related issue for prolonged use [Computer Security Risk] | CVS | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace [Computer Security Risk] | Ergonomics | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | occurs when the computer consumes one's entire social life [Computer Security Risk] | Computer Addiction | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | moral guidelines that govern the use of computers abd information sciences [Computer Security Risk] | Computer Ethics | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | believes that allowing even the slightest alteration could lead to misinterpretation [Computer Security Risk] | National Press Photographers | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | creators are entitled for their work [Computer Security Risk] | intellectual property rights | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | gives authors and artists exclusive rights to duplicate, publish, and sell their materials [Computer Security Risk] | copyright | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | involves reducing the electricity and environmental waste while using a computer [Computer Security Risk] | green computing | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | government program to help reduce the amount of electricity used by computers and related devices [Computer Security Risk] | Energy Star Program | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | refers to the right of individuals and comanies to denny or restrict the collection and use of info about them [Computer Security Risk] | information privacy | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | your information of a database [Computer Security Risk] | electronic profile | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | small text file that a Web server stores on your computer [Computer Security Risk] | cookie | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | program placed on a computer without the user's knowledge that secretly collects info [Computer Security Risk] | spyware | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | program that displays an online advertisement in a banner or pop-up window on Web pages, email messages, or other internet services [Computer Security Risk] | Adware | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | an unsolicited e-mail messgae or newsgroup posting sent to multiple recipients or newsgroups at once [Computer Security Risk] | Spam | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | a scam in which a perpetruder sends an official looking em-mail message that attempts to obtain your personal info [Computer Security Risk] | Phishing | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | scam, similar to phishing, where a perpetruder attempts to obtain your personal and financial info [Computer Security Risk] | Pharming | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | gaining unauthorized access or obtaining confidential info by taking advantage of the trusting nature of some visctims and the nivety of others [Computer Security Risk] | Social engineering | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | process of restricting access to certain material on the wenb [Computer Security Risk] | Content filtering | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
e1eeb60f_10_Vocab_Flashcards___Cram_com__Computer_Security_Risk | use of computers to observe, record, and review an employees use of a computer, including e-mails, keyboard activity, and web sites visited [Computer Security Risk] | employee monitering | [] | Comp Info Science CH 10 Vocab Flashcards - Cram.com | Computer Security Risk | http://www.cram.com/flashcards/comp-info-science-ch-10-vocab-1561286 | 41/1438042986451.45_20150728002306-00168-ip-10-236-191-2_375995329_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | IN THE FETUS, THE HOLE BETWEEN THE ATRIA IN WHICH BLOOD CIRCULATES [TRUE] | FORAMEN OVALE | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | THE DUCTUS ARTERIOSUS [TRUE] | DUCT BETWEEN AORTA AND PULMONARY TRUNK | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | IN UTERO, BLOOD BYPASSES _______ AND GOES DIRECTLY TO ____________. [TRUE] | LUNGS AORTA | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | CONNECTS PLACENTA AND ILIAC ARTERIES OF BABY AND CARRIES WASTES AND CO2 TO PLACENTA AND MOTHER [TRUE] | UMBILICL ARTERIES | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | PICK UP FOOD AND O2 FROM PLACENTA AND BRING IT TO FETUS [TRUE] | UMBILICAL VEINS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | CONNECT INSIDE THE BODY TO THE DUCTUS VENOSUS [TRUE] | UMBILIICAL VEINS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | CARRIES FOOD AND O2 UP TO THE LIVER AND THEN CONNECTS TO INFERIOR VENA CAVA [TRUE] | DUCTUS VENOSUS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | WHEN DOES THE FORAMEN OVALE DISAPPEAR? ONCE IT DISAPPEARS, IT BECOMES A DEPRESSION CALLED? [TRUE] | DISAPPEARS WITHIN 9 MONTHS BECOMES A DEPRESSION IN THE HEART CALLED THE FOSSA OVALIS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | DUCTUS ARTERIOSUS WITHERS AND BECOMES WHAT? [TRUE] | LIGAMENTUM ARTERIOSUM | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | THE DUCTUS VENOSUS ATROPHIES AND BECOMES THE LIGAMENTUM VENOSUM. WHAT FUNCTION DOES THE LIGAMENTUM VENOSUM HAVE? [TRUE] | IT'S A PIECE OF TISSUE THAT HELPS HOLD THE LIVER IN PLACE. | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | UMBILICAL VEINS WITHER AND BECOME LIGAMENTUM TERES. WHAT IS THEIR FUNCTION? [TRUE] | HOLD LIVER IN PLACE | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | UMBILICAL ARTERIES BECOME WHAT? WHAT IS THEIR FUNCTION? [TRUE] | SUPERIOR VESICAL ARTERIES SUPPLY BLOOD TO BLADDER. | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | SURFACTANT [TRUE] | A MIXTURE OF SURFACE-ACTIVE PHOSPHOLIPDS, WHICH ARE CRITICAL FOR ALVEOLAR STABILITY. IT IS PRODUCED IN UTERO AT 28-32 WEEKS, BUT PEAKS AT 35 | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | LECITHIN AND SPHINGOMYELIN [TRUE] | PHOSPHOLIPIDS THAT COMPRISE SURFACTANT | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | WHICH PHOSPHOLIPID IS PRODUCED IN GREATER AMOUNTS IN THE NEWBORN L OR S? [TRUE] | L - 2:1 RATIO | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | IF A BABY IS BORN BEFORE THE L/S RATIO IS 2:1, WHAT ARE THE POTENTIAL PROBLEMS? [TRUE] | THE BABY WILL HAVE VARYING DEGREES OF RESPIRATORY DISTRESS. | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | WHAT 2 RADICAL CHANGES MUST TAKE PLACE FOR THE LUNGS TO FUNCTION IMMEDIATELY AFTER BIRTH? [TRUE] | PULMONARY VENTILATION MUST BE ESTABLISHED THROUGH LUNG EXPANSION FOLLOWING BIRTH. A MARKED INCREASE IN THE PULMONARY CIRCULATION MUST OCCUR. | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | INITIATION OF BREATHING OCCURS BECAUSE OF WHAT 4 PROCESSES? [TRUE] | MECHANICAL EVENTS - BEING BORN VAGINALLY SQUEEZES FLUID FROM BODY CHEMICAL STIMULI - THE GASP OF AIR ELEVATES PCO2 AND DECREASES PH AND PO2 THERMAL STIMULI - THE CHANGE IN TEMP. FROM UTERO TO BIRTH STIMULATES RESPIRATIONS SENSORY STIMULI - PHYSICAL AND SENSORY STIMULI INVOLVED IN THE BIRTHING PROCESS HELP RESPIRATION BEGIN. | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | NEWBORNS ARE OBLIGATE MOUTH BREATHERS - TRUE OR FALSE? [TRUE] | FALSE. THEY ARE NOSE BREATHERS AND IT'S VERY IMPT. TO KEEP NOSE AND THROAT FREE OF OBSTRUCTIONS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | IT IS NORMAL FOR NEWBORN TO HAVE RAPID BREATHS WITH PERIODS OF APNEA, BUT WHEN IS APNEA ABNORMAL [TRUE] | MORE THAN 20 SEC. OF APNEA IS ABNORMAL | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
1900e79a_g_Test_2_Flashcards___Cram_com__TRUE | THE 3 COMPONENTS OF FETAL CIRCULATION [TRUE] | DUCTUS ARTERIOSUS FORAMEN OVALE DUCTUS VENOSUS | [] | Maternity Nursing Test 2 Flashcards - Cram.com | TRUE | http://www.cram.com/flashcards/maternity-nursing-test-2-563910 | 41/1438042986451.45_20150728002306-00107-ip-10-236-191-2_368387424_0.json |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.