1-__________requires lawyers to use their best skills in presenting a case but avoid destroying, falsifying, or tampering...
Question:
1-__________requires lawyers to use their best skills in presenting a case but avoid destroying, falsifying, or tampering with evidence.
2-The recent 2006 amendments to the ________ have had an impact on technology in the practice of law.
3-Digital communications create new security and ________ issues for the legal team.
4-___________ is the temporary computer memory that stores work in progress.
5-Software used to perform a specific function or set of related functions such as word processing, preparing presentations, or electronic spreadsheets are _________ __________ programs.
6-Document properties of data and information, such as the date the document was created or document's author, which access should be restricted isreferred to as ________________.
7-The ____________ procedure when installing new software is to retain a backup copy, disconnect from the network completely, and turn off or close all other programs
8-The______ ________ is a method for transmitting a large file in a compressed format.
9-_________ _________ feature allows a user to create multiple mailings by automatically combining a document, such as a form letter, with a list of recipients.
10-_________________ _______________ allows you to view your strategy byseeingall the changes that have been made in a single document.
11-Federal courts have established a system for electronic filingcalled __________ ___________ /________ ________ ___________ (CM/ECF).
12-The main purpose for ___________ is to provide a national index of federal cases. (
13-A database in a law firm contains ________ information.
14-A ____________ can be entered or changed by typing it in the property bar or typing it in a cell or by selecting the cell.
15-Table, field, and record are ________________ terms used in electronic database programs.
16-The person responsible to ensure every member is compliant with ethical rules is the ____________ ________________.
17-Documents prepared for internal investigations and audits are protected based on ______________ ____________ doctrine.
18-Work product doctrine ____________ __________ protect documents prepared in the normal operation of the client's business.
19-___________ is the ethical obligation to not mislead the court or opposing counsel with false statements of law or facts.
20-When working with ____________ ____________ technologists the legal team must confirm ownership of graphic or other creative work, check for system compatibility, and speak the language of the technologist in defining the project.
21-Inadvertent disclosure of confidential information admissibility depends on ________ __________ before and after the disclosure.
22-__________ _____________ is using the Internet to conduct meetings and share documents.
23-Confidentiality is an ___________ obligation while privilege is a rule of _______________. (
24-__________ are minimally accepted standards of conduct within a profession
25-The _________________ exception allows the attorney to waive the attorney-client privilege.
26-Every _____________ of the legal team must follow the rules of ethical behavior in the legal profession?
27-_______ _____________ allows members of the legal team working on cases out of the office to connect with the office file server to retrieve documents, work on them, and send them to the legal team anywhere in the world.
28-An ________ __________ license agreement is an agreement with the software vendor that authorizes and specifies the terms for the legal use of the software
29-A CPU is the computer chip that ________ data making it possible to perform numerous tasks.
30-A ________ is a device for connecting multiple computer devices.
31-A _________ can be a specialized computing device that routes messages.
32-______________ _____________ is a program that works in the background performing routine tasks related to the operation of the computer.
33-____________ are programs designed to limit access to a computer or computer networked system.
34-The ________ computer is any combination of workstations electronically connected, usually with a central computer that acts as a server on which files and data are stored for access to all other computers and shared software.
35-The ______-_________ completes the address after a few letters of the address are typed.
36-________ requirements allow the computer to function with one program open at a time, but it may not run as fast as desired.
37-________ _____________ providers are companies that provide users access to the World Wide Web.
38-________ is a matter of buying software written for the type of computer used.
39-________ provides instructions to the computer hardware to perform specific tasks, such as preparing documents, sorting information, performing computations, and creating and presenting graphic displays.
40-________ software provides the basic instructions for starting up the computer and processing the basic input and output activity.
41-A ________ can be used to totally restrict access or to limit the ability to edit or change the document. (
42-An increasing number of _____________ jurisdictions have established procedures for the electronic filing of documents.
43-A _____________ is a preset, predesigned page, such as a pleading layout with line numbers.
44-A _______________ law office is a law practice that exists entirely online.
45-In virtual law practice, confidentiality issues arise because clients may send or receive information from ___________ places.
46-In some states, a virtual law office can cause ethical issues if the lawyer does not have a __________ address in the state where he or she is licensed.
47-The ________________ command completely replaces the previous file with the same name without warning
48-When a file is saved, a file _____________ is added to the end of the file name to identify the format in which the file has been saved.
49-When choosing a secure ________________, it should include a combination of letters, numbers, and symbols.
50- ________________ is used to protect data, only those with a secret code can enter the database to access information.
51-Where a client has only paper documents, these can be converted to electronic documents using a _________________.
52-In a spreadsheet, a ___________, is the box at the intersection of a row and column.
53-A ______________ is a repository of information of all types that can be sorted and presented in a meaningful manner
54-A _________ is a horizontal set of cells in a spreadsheet.
55-Rows, columns, cells, formula bars, and workbooks and all are parts of a ____________________ program
56-Although many spreadsheet templates are available for download, the user should always check for ________ before downloading or installing them.
57-In a database, the information in a horizontal row that provides information about one item or person is known as a ______________.
58-In a law firm, the electronic database took the place of file _________________ cards.
59-In setting up _______________ features on a database, the need to protect information must be balanced against the need for access to the information.
60-Microsoft offers a number of online ________ as a resource for learning and using electronic spreadsheets.
61-Microsoft suite spreadsheets have the ability to control access by removing _____________ and using passwords.
62-The ______________ step in creating a basic spreadsheet is to decide what you want the spreadsheet to show or calculate
63-The first step in creating a client database is to _________________ what pieces of information need to be collected about each client.
64-_____________ computer databases are very powerful tool, capable of performing complex searches and calculations.
65-A file structure defined by the original creating application is called a _______ __________ format.
66-____________ software is a method of backing up data.
67-File _________________ software reduces the file size without loss of data.
68-___________ technology is an application that converts documents to a format that allows for searching.
69-Removing information from a document is called _____________ .
70-______ is a graphic image file without metadata.
FILL UP BLANK SPACES
Financial Accounting and Reporting a Global Perspective
ISBN: 978-1408076866
4th edition
Authors: Michel Lebas, Herve Stolowy, Yuan Ding