Computing Essentials 2017 Chapters 1-13

¡Supera tus tareas y exámenes ahora con Quizwiz!

DIMM (dual in-line memory module)

An expansion module used to add memory to the system board.

mouse

An input device that controls a pointer that is displayed on the monitor.

A process by which a program is divide into two modules called objects.

(OOP) Objected- oriented programming

Unicode

A 16-bit code designed to support international languages, like Chinese and Japanese.

Shading

A background color or pattern that can be applied to text, tables, or graphics.

enterprise storage system

An organizational strategy to promote efficient and safe use of data across the networks.

general-purpose application

A browser is an example of a:

The ______ mobile operating system was introduced in 2007 and is now owned by Google.

Android

Clip Art

A collection of graphic images that can be inserted into documents, presentations, web pages, and spreadsheets; simple drawings that are included as collections with many software packages.

Monitor

A computer device that presents visual images of text and graphics. (See also display screen)

all-in-one

A desktop computer that has the monitor and system unit housed together in the same case (e.g., Apple's iMac).

tower computer

A desktop system unit placed vertically.

network gateway

A device that allows one LAN to be linked to other LANs or to larger networks.

card reader

A device that interprets the encoded information contained on credit, debit, access, and identification cards.

printer

A device that translates information that has been processed by the system unit and presents the information on paper.

input

Any data or instructions that are used by a computer.

output device

Any hardware used to provide or to create output.

wearable

Apple's Watch is what type of computer?

Format Painter

A feature used to copy the format settings applied to the selected text to other text you want to format the same way.

artificial intelligence (AI)

A field of computer science that attempts to develop computer systems that can mimic or simulate human thought processes and actions.

cache memory

Area of random-access memory (RAM) set aside to store the most frequently accessed information. Cache memory improves processing by acting as a temporary high-speed holding area between memory and the CPU, allowing the computer to detect which information in RAM is most frequently used.

dot pitch

A function of a monitor that is the distance between each pixel. (See also pixel pitch)

Inline Graphic

A graphic that is part of a line of text.

Floating Graphic

A graphic to which text wrapping has been applied, making the graphic independent of text and able to be moved anywhere on the page.

Slot

Area on a system board that accepts expansion cards to expand a computer system's capabilities.

coaxial

A high-frequency transmission cable that delivers television signals as well as connects computers in a network

Ethernet port

A high-speed networking port that allows multiple computers to be connected for sharing files or for high-speed Internet access.

Fifth-generation languages (5GLs) incorporate the concepts of which of the following?

Artificial intelligence.

These second-generation languages use abbreviations or mnemonics that are automatically converted to the appropriate sequence of 1s and 0s.

Assembly

toggle key

A key that turns a feature on or off.

combination key

A key, that when held down in combination with another key, performs an action.

Clip Organizer

A library of art, pictures, sounds, video clips, and animations that all Office applications share.

Tab Leader

A line that appears in front of tabbed text.

Borders

A line that can be added above, below, or to the sides of a paragraph, text, or table cell.

Tab Stop

A location on the horizontal ruler that indicates where to align text.

character encoding standards

Assign unique sequence of bits to each character.

magnetic-card reader

A machine that reads encoded information stored on a thin magnetic strip located on the back of a card.

Indent Maker

A marker on the horizontal ruler that shows the indent settings for the active paragraph.

resolution

A matrix of pixels.

Clip

A media file, such as a graphic, photograph, sound, movie, or animation, that can be inserted into a document.

optical mouse

A mouse that emits and senses light to detect mouse movement.

Style

A named collection of character and paragraph formats that are stored together and can be applied to text to format it quickly.

These tools are also called computer-aided software engineering (CASE) tools. They are used in system analysis to evaluate alternative hardware and software solutions. A. Project management tools B. Automated design tools C. Spreadsheets D. Report generator

Automated design tools

multicore chip

A new type of chip that provides two independent CPUs, allowing two programs to run simultaneously. Also see central processing unit.

organic light organic light- emitting diode(OLED)

A newer technology that has the benefits of lower power consumption and longer battery life as well as thinner displays.

stylus

A pen-like device commonly used with tablet PCs and PDAs.

technical writer

A person who prepares instruction manuals, technical reports, and other scientific or technical documents.

Mini DisplayPort (MiniDP, mDP)

A port that an audiovisual device typically uses to connect large monitors. These ports are used with many Apple Macintosh computers.

external Serial Advanced Technology Attachment (eSATA)

A port that provides very high speed connections for external hard-disk drives, optical disks, and other large secondary storage devices.

This lists the assets, liabilities, and the equity of an organization.

Balance sheet

window

A rectangular area that can contain a document, program, or message

carpal tunnel syndrome

A repetitive strain injury consisting of damage to the nerves and tendons in the hands.

pixel

A series of dots that form images on a monitor. (See also picture elements)

bluetooth

A short-range radio communication standard that transmits data over short distances of up to approximately 33 feet

Bullet

A small graphic symbol used to identify an item in a list.

Notebook

A small, portable system unit that contains electronic components, selected secondary storage devices, and input devices.

musical instrument digital interface (MIDI)

A standard that allows musical instruments to connect to the system using MIDI ports.

Desktop

A system unit that typically contains the system's electronic components and selected secondary storage devices. Input and output devices, such as the mouse, keyboard, and monitor, are located outside the system unit.

liquid crystal display (LCD)

A thin, flat display made up of any number of color or monochrome pixels arrayed in front of a light source or reflector.

Chip

A tiny circuit board etched on a small square of sandlike material called silicon. A chip is also called a silicon chip, semiconductor, or integrated circuit.

Smartphone

A type of cell phone that offers a variety of advanced functionality, including Internet and e-mail.

Left Indent

A type of indent in which the left edge of a paragraph is moved in from the left margin.

Hanging Indent

A type of indent in which the second and following lines of a paragraph are indented more than the first.

ergonomic keyboard

A type of keyboard designed specifically to alleviate wrist strain associated with the repetitive movements of typing.

Tablet

A type of microcomputer that contains a thin system unit, most of which is the monitor. The best-known tablets are Apple's iPad, Motorola's Zoom, and HP's Slate.

Netbook

A type of microcomputer that is smaller, lighter, and less expensive than a notebook computer.

flat-panel monitor

A type of monitor that is much thinner and requires less power to operate than CRTs.

DVI (Digital Video Interface) Port

A type of port that provides a connection to a digital monitor.

VGA (Video Graphic Adapter) port

A type of port that provides a connection to an analog monitor.

dot-matrix printer

A type of printer that forms characters and images using a series of small pins on a print head.

ink-jet printer

A type of printer that sprays ink at high speed onto the surface of paper.

laser printer

A type of printer that uses a laser light beam to produce images with excellent letter and graphics quality.

Font

A typeface or design of a set of characters (letters, numbers, symbols, and punctuation marks).

Point

A unit of measurement for text characters and the space between paragraphs and characters; 1/72 of an inch.

optical scanner

Accepts documents consisting of text and/or images and converts them to machine-readable form.

EBCDIC (Extended Binary Coded Decimal Interchange Code)

Binary coding scheme that is a standard for minicomputers and mainframe computers.

ASCII (American Standard Code for Information Interchange)

Binary coding scheme widely used on all computers, including microcomputers. Eight bits form each byte, and each byte represents one character.

Justify

Alignment in which an item is flush with both the right and left margins.

Right-Align

Alignment in which the item is flush with the left margin.

Left-Align

Alignment in which the the item is flush with the left margin.

Bus

All communication travels along a common connecting cable called a bus or a backbone. As information passes along the bus, it is examined by each device on the system board to see if the information is intended for that device. See bus line and ethernet.

wireless network card

Allows computers to be connected without cables.

Motherboard

Also called a system board; the communications medium for the entire system.

clock speed

Also called clock rate. It is measured in gigahertz, or billions of beats per second. The faster the clock speed, the faster the computer can process information and execute instructions.

Utility suites

BitDefender Norton Utilities ZoneAlarm

topologies

Bus, ring, star, tree, and mesh are five types of network:

Which of the following refers to tools that are used to provide some assistance in designing, coding, and testing software?

CASE

PC card slot

Also known as Personal Computer Memory Card International Association (PCMCIA) card slot. Credit card-sized expansion cards developed for portable computers.

PC card

Also known as Personal Computer Memory Card International Association (PCMCIA) card. Credit card- sized expansion cards developed for portable computers.

Network Interface Card (NIC)

Also known as a network adapter card. They are used to connect a computer to one or more computers forming a communication network whereby users can share data, programs, and hardware.

mainframe

Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.

Center

An alignment in which an item is centered between the margins.

A list of questions helps guide the systems analyst and end user through key issues for the present system.

Checklist

universal serial bus (USB)

Combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high-speed scanners, printers, and video capturing devices.

logical operation

Comparing two pieces of data to see whether one is equal to (=), less than (<), or greater than (>) the other.

crackers

Computer criminals who create and distribute malicious programs.

Digital

Computers are digital machines because they can only understand 1s and 0s. It is either on or off. For example, a digital watch states the exact time on the face, whereas an analog watch has the second hand moving in constant motion as it tells the time.

Port

Connecting socket on the outside of the system unit. Used to connect input and output devices to the system unit.

expansion bus

Connects the CPU to slots on the system board. There are different types of expansion buses such as industry standard architecture (ISA), peripheral component interconnect (PCI), accelerated graphics port (AGP), universal serial bus (USB), and FireWire buses. See system bus.

network adapter card

Connects the system unit to a cable that connects to other devices on the network.

This type of language uses symbols, words, and phrases that instruct a computer how to structure information for display or processing.

Content-markup

Analog

Continuous signals that vary to represent different tones, pitches, and volume.

keyboard

Convert numbers, letters, and special characters that people understand into electrical signals.

scanning devices

Convert scanned text and images into a form that the system unit can process.

An interpreter ________.

Converts and runs the procedural language one statement at a time into machine code.

A compiler ________.

Converts the source code into machine language code.

Cable

Cords used to connect input and output devices to the system unit.

digital versatile disc

DVD stands for:

Which of the following tools present data or information flow within an information system? A. Grid chart B. Decision table C. System flowchart D. Data flow diagram

Data flow diagram

This system is a flexible tool for data analysis, since its reports do not have a fixed format.

Decision support system

A(n) _____ shows the decision rules that apply when certain conditions occur.

Decision table

Which of the following is used to show the rules that apply to a decision when one or more conditions apply? A. System flowchart B. Decision table C. Grid chart D. Checklist

Decision table

graphics coprocessor

Designed to handle requirements related to displaying and manipulating 2-D and 3-D graphic images.

power supply unit

Desktop computers have a power supply unit located within the system unit that plugs into a standard wall outlet, converting AC to DC, which becomes the power to drive all of the system unit components.

A program associated with a device that works with the operating system to allow communication between the device and the rest of the computer system.

Device driver

sound card

Device that accepts audio input from a microphone and converts it into a form that can be processed by the computer. Also converts internal electronic signals to audio signals so they can be heard from external speakers.

graphics card

Device that provides high-quality 3-D graphics and animation for games and simulations.

Problems arising in this approach would spell disaster. A. Direct approach B. Parallel approach C. Phased approach D. Pilot approach

Direct approach

The goal of the _______ utility program is to locate and eliminate unnecessary fragments and rearrange files and unused disk space.

Disk Defragmenter

Bit

Each 1 or 0 is a bit; short for binary digit.

bus line

Electronic data roadway, along which bits travel, connects the parts of the CPU to each other and links the CPU with other important hardware. The common connecting cable in a bus network.

An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.

Exception

Which system presents information in a highly summarized form?

Executive support system (ESS)

Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.

Executive support systems (ESS)

universal serial bus (USB) port

Expected to replace serial and parallel ports. They are faster, and one USB port can be used to connect several devices to the system unit.

Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?

Expert system

A purchase order form pertains to the payroll department.

False

An MIS differs from a TPS in that it creates databases.

False

In case of an unanticipated union strike, the manager in charge of manufacturing might consult the management information system to determine how it will affect production schedules.

False

The executive support system can analyze the effects of events and trends outside the organization.

False

The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output.

False

The marketing department identifies, investigates, and develops new products and services.

False

The research department strictly involves itself only with the creation of finished goods that are tangible.

False

There are three basic decision models used in GDSS: operational, strategic, and financial.

False

virtual memory

Feature of an operating system that increases the amount of memory available to run programs. With large programs, parts are stored on a secondary device like your hard disk. Then each part is read in RAM only when needed.

The ______ utility program makes a copy of files to help protect you from the effects of a disk failure.

File History

system board

Flat board that usually contains the CPU and memory chips connecting all system components to one another.

Font Effect

Font formatting that applies a special effect to text such as small caps or superscript.

Text Wrapping

Formatting applied to a graphic to make it a floating graphic.

Bold

Formatting applied to text to make it thicker and darker.

Italic

Formatting applied to text to make the characters slant to the right.

Text Effect

Formatting that applies a visual effect to text, such as shadow, glow, outline, or reflection.

Character Spacing

Formatting that changes the width or scale of characters, expands or condenses the amount of space between characters, raises or lowers characters, relative to the line of text, and adjusts kerning.

arithmetic operation

Fundamental math operations: addition, subtraction, multiplication, and division.

In the preliminary investigation phase of the systems life cycle, which one of the following tasks would NOT be included? A. Briefly defining the problem B. Suggesting alternative solutions C. Gathering the data D. Preparing a short report

Gathering the data

________ control is the ability to control operations with finger movements, such as swiping, sliding, and pinching.

Gesture

A(n) _____ shows the relationship between input and output documents.

Grid

input device

Hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process.

_______ is an operating system feature that provide(s) online assistance for operating system functions and procedures.

Help

refresh rate

How often a displayed image is updated or redrawn on a monitor.

What documentation shows the income, expenses, and difference between them for a company during a specific time period?

Income statements

RFID (radio-frequency identification) tag

Information chips that are embedded in merchandise to track their location.

joystick

Input device for computer games.

This typically consists of transactions from the transaction processing system.

Internal data

home networks

LAN that allows different computers to share resources, including a common internet connection

_______ convert programming instructions into a language that the computer can process.

Language translators

This is an example of the _______ operating system, which is a powerful alternative to Windows.

Linux

These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.

Machine

As much as 75 percent of the total lifetime cost for an application program is spent on this.

Maintenance

Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers?

Management information system (MIS)

Monitoring system performance is an example of how the operating system ________.

Manages resources

Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?

Marketing

density

Measures how tightly the magnetic charges can be packed next to one another on the disk.

Memory

Memory is contained on chips connected to the system board and is a holding area for data instructions and information (processed data waiting to be output to secondary storage). RAM, ROM, and CMOS are three types of memory chips.

This level of management is involved with tactical planning and implementing the long-term goals within an organization.

Middle management

Who uses management information systems?

Middle-level managers

grayscale

Most common black ink selection in which images are displayed in many shades of gray.

Mac OS X ________ was released in 2012 and designed for desktops and laptops. The functionality is similar to Windows 8.

Mountain Lion

_______ is the ability of the operating system to switch between different applications stored in memory.

Multitasking

_______ operating systems are used to control and coordinate computers that are linked together.

Network

PCI Express (PCIe)

New type of bus that is 30 times faster than PCI bus.

AC adapter

Notebook computers use AC adapters that are typically outside the system unit. They plug into a standard wall outlet, convert AC to DC, provide power to drive the system components, and can recharge batteries.

binary system

Numbering system in which all numbers consist of only two digits: 0 and 1.

This type of software development focuses less on the procedures and more on defining the relationships between previously defined procedures

Object-oriented software development

These systems are used in managing documents, communicating, and scheduling.

Office automation systems

mouse pointer

Often in the form of an arrow, it moves on the screen as the user moves the computer mouse.

expansion slot

Openings on a system board. Users can insert optional devices, known as expansion cards, into these slots, allowing users to expand their systems. See expansion card.

FireWire bus

Operates much like USB buses on the system board but at higher speeds.

______ coordinate computer responses, provide an interface between users and the computer, and run applications.

Operating Systems

Windows utilities

Optimize Drives Disk Cleanup File History

expansion card

Optional device that plugs into a slot inside the system unit to expand the computers' abilities. Ports on the system board allow cables to be connected from the expansion board to devices outside the system unit.

system unit

Part of a microcomputer that contains the CPU. Also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system.

This implementation approach is preferred when there are many people in an organization performing similar operations. A. Direct B. Parallel C. Phased D. Pilot

Pilot

High Definition Multimedia Interface (HDMI)

Port that provides high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.

optical audio connections

Port used to integrate computers into high-end audio and home theatre systems.

In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system

Prepares a preliminary investigation report

These third-generation languages are designed to express the logic that can solve general problems

Procedural

output

Processed data or information.

Creating finished goods and services using raw materials and personnel pertains to which of the following functions?

Production

desktop publishing

Program that allows you to mix text and graphics to create publications of professional quality.

Lower- level lang. are closer to 0s and 1s. Higher-level lang. are closer to the languages of humans.

Programming language generations

presentation graphics

Programs that combine a variety of visual objects to create attractive, visually interesting presentations.

trojan horses

Programs that come into a computer system disguised as something else are called:

operating systems

Programs that coordinate computer resources, provide an interface, and run applications are known as:

spreadsheets

Programs that organize, analyze, and graph numerical data such as budgets and financial reports.

flash memory

RAM chips that retain data even when power is disrupted. Flash memory is an example of solid-state storage and is typically used to store digitized images and record MP3 files.

memory

RAM is a type of:

primary storage

RAM is sometimes referred to as:

digital video camera

Record motion digitally on a disk or in the camera's memory.

read-only memory (ROM)

Refers to chips that have programs built into them at the factory. The user cannot change the contents of such chips. The CPU can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer, for example. Also called firmware.

robot

Robots are computer-controlled machines that mimic the motor activities of living things, and some robots can solve unstructured problems using artificial intelligence.

control unit

Section of the CPU that tells the rest of the computer how to carry out program instructions.

PCMCIA slot

See PC card slot.

Processor

See central processing unit.

GPU (graphics processing unit)

See graphics coprocessor.

main board

See motherboard or system board.

Laptop

See notebook computer and notebook system unit.

Sony/Philips Digital Interconnect Format (S/PDIF)

See optical audio connection.

integrated circuit

See silicon chip.

system chassis

See system unit.

Plug and Play

Set of hardware and software standards developed to create operating systems, processing units, expansion cards, and other devices that are able to configure themselves. When the computer starts up, it will search for the Plug and Play device and automatically configure it to the system.

Semiconductor

Silicon chip through which electricity flows with some resistance.

Handheld

Smallest type of system unit, designed to fit into the palm of one hand.

Socket

Sockets provide connection points on the system board for holding electronic parts.

NIC

Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.

firewall

Special hardware and software used to control access to a corporation's private network is known as a(n):

computer technician

Specialist who installs hardware and software and troubleshoots problems for users.

interactive whiteboard

Specialized devices with a large display connected to a computer or projector (see also digital whiteboard)

digital whiteboard

Specialized devices with a large display connected to a computer or projector (see also interactive whiteboard)

mass storage devices

Specialized high-capacity secondary storage devices designed to meet organizational demands.

Coprocessor

Specialized processing chip designed to improve specific computer operations, such as the graphics coprocessor.

_______ operating systems control a single desktop or laptop computer.

Stand-alone

Boot

Starting or restarting your computer.

Who is responsible for operational matters and monitoring day-to-day events?

Supervisors

A collection of activities and elements organized to accomplish a goal. a.Program b.Information c.System d.Data

System

______ software would control where a word processing program is stored in memory.

System software

A professional who specializes in analyzing and designing business systems is called a(n) ____. a. systems analyst b. project manager c. individual systems developer d. programmer a. Systems Analyst

Systems Analyst

Gathering and analyzing data is part of this phase. a.Systems analysis b.Systems implementation c.Preliminary investigation d.Systems design

Systems analysis

This individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them. A. Network administrator B. Cryptographer C. Systems analyst D. Computer enginee

Systems analyst

Programming is part of which phase of the systems life cycle?

Systems development

During which phase of the systems life cycle are users trained to use the new system? A. Preliminary investigation B. Systems implementation C. Systems development D. Systems maintenanc

Systems implementation

Identify the sixth phase of the systems life cycle. A. Systems maintenance B. Systems development C. Systems design D. Systems analys

Systems maintenance

Which of the following phases of the systems life cycle is considered as the "ongoing process"? A. Systems development B. Systems analysis C. Systems design D. Systems maintenance

Systems maintenance

This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.

Tactical model

ExpressCard

Technology replacing the PC Card to provide a direct connection to the system bus. Also see PC card.

Line Spacing

The amount of space between lines of text.

Paragraph Spacing

The amount of space between paragraphs.

Microprocessor

The central processing unit (CPU) of a microcomputer controls and manipulates data to produce information. The microprocessor is contained on a single integrated circuit chip and is the brains of the system.

online identity

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:

hardware

The keyboard, mouse, display, and system unit are:

Internet

The largest network in the world is [the]:

carrier package

The material that chips are mounted on which then plugs into sockets on the system board.

dots-per-inch (dpi)

The measurement of printer resolution, the more dots-per-inch the better the quality of the image printed.

cathode-ray tube (CRT) monitor

The most common type of monitor that are typically placed directly on the system unit or on the desktop.

Word

The number of bits (such as 16, 32, or 64) that can be accessed at one time by the CPU.

bus width

The number of bits traveling simultaneously down a bus is the bus width.

arithmetic-logic unit (ALU)

The part of the CPU that performs arithmetic and logical operations.

central processing unit (CPU)

The part of the computer that holds data and program instructions for processing the data. The CPU consists of the control unit and the arithmetic-logic unit. In a microcomputer, the CPU is on a single electronic component called a microprocessor chip.

Font Size

The size of characters measured in points.

Kerning

The space between standard combinations of letters.

Indent

The space between the edge of a line of text or a paragraph and the margin.

BIOS (basic input/output system)

The start-up instructions for a computer, including the specifics concerning the amount of RAM and the type of keyboard, mouse, and secondary storage devices connected to the system unit.

Which among the following would not be described in the systems analysis report? A. The current information system B. The requirements for a new system C. The development schedule D. The training requirements for users

The training requirements for users

telephony

The transmission of telephone calls over computer networks.

document

The type of file created by word processors, for example, memos, term papers, and letters.

system bus

There are two categories of buses. One is the system bus that connects the CPU to the system board. The other is the expansion bus that connects the CPU to slots on the system board.

disk caching

This hard-disk performance enhancement anticipates data needs

communication channel

This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.

system

This type of software works with end users, application software, and computer hardware to handle the majority of technical details

silicon chip

Tiny circuit board etched on a small square of sandlike material called silicon. Chips are mounted on carrier packages, which then plug into sockets on the system board.

This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.

Top management

On a hard disk a _______ is a concentric ring.

Track

________ systems help supervisors by generating databases that act as the foundation for other information systems.

Transaction processing

handwriting recognition software

Translates handwritten notes into a form that the system unit can process.

Highlighting

Transparent color that can be applied to a text to draw attention to it.

Accounts payable refers to money the company owes its suppliers for materials and services it has received.

True

CAD/CAM systems use powerful personal computers running special programs that integrate the design and manufacturing activities.

True

Customer profiles, census data, and economic forecasts are examples of external data.

True

Demand reports do not have to be produced on a regular basis.

True

Expert systems capture the knowledge of human experts and store it in a knowledge base.

True

Knowledge workers use specialized information systems, called KWSs, to create information in their area of expertise.

True

Middle-level managers are responsible for tactical planning and the implementation of long-term goals.

True

Office automation systems are designed primarily to support data workers.

True

Supervisors' responsibilities include operational matters.

True

The executive support system helps top-level managers oversee the company's operations and develop strategic plans.

True

The research department identifies, investigates, and develops new products and services.

True

Top-level managers need information both from within the organization and from outside.

True

hotspots

Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities.

flash drives

USB drives are also known as:

Byte

Unit consisting of eight bits. There are 256 possible bit combinations in a byte and each byte represents one character.

secondary

Unlike memory, this type of storage holds data and programs even after electric power to the computer system has been turned off.

parallel processing

Used by supercomputers to run large and complex programs.

FireWire port

Used to connect high-speed printers, and even video cameras, to system unit.

hexadecimal system (hex)

Uses 16 digits to represent binary numbers.

voice recognition system

Uses a microphone, a sound card, and special software to allow users to operate computers and to create documents using voice commands.

cloud computing

Uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet.

_______ perform specific tasks related to managing computer resources.

Utilities

What could you use if you wanted to run two or more applications each requiring a different operating system?

Virtualization

random-access memory (RAM)

Volatile, temporary storage that holds the program and data the CPU is presently processing. It is called temporary storage because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.

legacy port

Was common on microcomputer systems to connect specific types of devices. They have largely been replaced by faster, more flexible ports such as the universal serial bus (USB).

game port

Were used to connect video game controllers and joysticks.

crash

When a read-write head makes contact with the hard disk's surface, it causes a head:

The operating system feature which is a rectangular area for displaying information and running programs.

Window

_______ is the most popular desktop operating system.

Windows

Versions of Windows

Windows 8 Windows 7

The ______mobile operating system was originally developed in 2012 by Microsoft to support a variety of portable devices, including smartphones.

Windows Phone 8

Database

a collection of related data. It is the electronic equivalent of a file cabinet

software suite

a collection of separate application programs bundled together and made available as a group.

computer network

a communication system that connects two or more computers so that they can exchange information and share resources

Network administrator

a computer specialist responsible for efficient network operations and implementation of new networks

system unit

a container that houses most of the electronic components that make up a computer system

network gateway

a device that allows one LAN to be linked to other LANs or connected to the LAN of another office group

coaxial cable

a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core

copyright

a legal concept that gives content creators the right to control use and distribution of their work

Bandwidth

a measurement of the width or capacity of the communication channel

WiMax (Worldwide Interoperability for Microwave Access)

a new standard that extends the range of Wi-Fi networks using microwave connections

Router

a node that forwards or routes data packets from one network to their destination in another network

client

a node that requests and uses resources available from other nodes (unit's personal computer)

server

a node that shares resources with other nodes (application server, communication server)

Linux

a popular open source alternative to Windows

extranet

a private network that connects more than one organization

intranet

a private network within an organization that resembles the Internet

wireless revolution

a revolution that will dramatically affect the way we communicate and use computer technology

directory server

a specialized server that manages resources, such as user accounts, for an entire network

enterprise storage system

a strategy developed by large organizations to promote efficient and safe use of data across the networks within their organizations

network attached storage (NAS)

a type of file server designed for homes and small businesses. NAS is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.

Personal area network (PAN)

a type of wireless network that works within a very small area- immediate surroundings

internet

a way to connect to other people and computers

wireless LAN (WLAN)

a wireless local area network that uses radio frequencies to connect computers and other devices

Eliminating errors in a program is also called ______ the program. a) debugging b) modularizing c) coding d) clarifying

a) debugging

When a program makes a true or false decision, it is an example of a(n) _______ logic structure. a) if-then-else b) do until c) do while d) what-if

a. if-then-else

The __________ structure involves repeating a sequence until a condition is met. a) loop b) sequence c) conditional d) selection

a. loop

The program's processing steps are grouped into logically-related programming statements called a) modules b) unit c) object d) component

a. modules

A(n) __________ is a list of instructions detailing the steps needed to perform a task. a) program b) punch card c) agenda d) plan

a. program

The control structure used to perform a series of statements one after the other is called a) sequential b) selection c) loop d) random

a. sequential

Money collected from or owed by customers is called ________.

accounts receivable

connection devices

act as an interface between the sending and receiving devices and the communication channel

mobile apps

add-on features or programs typically designed for smartphones and tablets

provide user interface

allow users to interact with application programs and computer hardware

desktop publishing programs (page layout programs)

allow you to mix text and graphics to create publications of professional quality

wireless modem (WWAN)

almost all computers today have these modems built in

Electronic Commerce

also known as e-commerce

office suite

also known as office software suites and productivity suites, contain general-purpose application programs that are typically used in a business situation

cloud storage

also known as online storage

cloud

also known as online suite

flash memory

also known as solid-state storage

storage area network (SAN)

an architecture to link remote computer storage devices to computers such that the devices are as available as locally attached drives

pointer

an item on the screen controlled by the mouse that is used to select items such as icons

blog

an online diary or commentary

primary storage

another name for RAM

Real-time operating systems RTOS

another name for embedded operating systems

servers

another name for midrange computers

host

any computer system connected to a network that provides access to its resources

cybercrime

any criminal offense that involves a computer and a network

node

any device that is connected to a network (computer or printer)

Digital versatile discs (DVD)

are the standard optical discs in PCs and can store 4.7 GB

Denial of service (DoS) attack

attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data

phishing

attempts to trick internet users into thinking a fake but official-looking website or email is legitimate

Flowcharts and pseudocode are examples of tools used in the program __________ phase. a) specification b) design c) code d) test

b. design

When a program repeats a portion of software code as long as a certain condition doesn't exist, it's using a(n) _______ structure. a) if-then-else b) do until c) do while d) what-if

b. do until

The actual coding of a program is done by a(n) a) systems analyst b) software engineer c) end-user d) database administrator

b. software engineer

This shows the relationship between input and output documents. a.Investigation report b.Grid chart c.Top-down analysis method d.Checklist

b.Grid

Starting or restarting the computer is called ______ the system.

booting

temporary Internet files

browser cache, contains web page content and instructions for displaying this content

history file

browsers store the locations of sites visited in a:

pits

bumpy areas on the surface of optical discs

electronic commerce

buying and selling goods electronically

A(n) __________ error could be the result of the programmer making an incorrect calculation. a) syntax b) general protection c) logic d) breakpoint

c) logic

Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the a) program tracking log b) project management database c) program specifications document d) management information system

c. program specifications document

The three structures of structured programming are __________. a. sequence, order, and process b. selection, loop and iteration c. sequence, selection, and loop d. if, else, and then

c. sequence, selection, and loop

A program error that violates the grammar rules of the programming language is a(n) _______ error. a) modular b) logic c) syntax d) language

c. syntax

application software

can be described as end user software and is used to accomplish a variety of tasks

Write-once disc

can be written on once, after that the disc can be read many times but cannot be written on or erased

optical discs

can hold over 128 gigabytes of data

embedded operating system

cell phone operating systems

switch

central node that coordinates the flow of data by sending messages directly between sender and receiver nodes

rewritable discs

changeable, portable storage options that are popular for storing and sharing audio, video, and large multimedia presentations

wireless communication

changed the way we communicate with one another

A ______ boot is when you power on a computer that is off.

cold boot

botnet

collection of zombies

Select all of the common names associated with someone who resolves common technical problems faced by computer users.

computer support specialist help-desk technician technical support specialist

zombies

computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for a malicious purpose

mainframe computers

computers that occupy specially wired, air-conditioned rooms. Capable of great processing speeds and data storage

midrange computers

computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. Used by medium-sized companies or departments of large companies to support their processing needs but are now used to support or serve end users for certain applications

privacy

concerns the collection and use of data about individuals

firewall

consists of hardware and software that control access to a company's intranet and other internal networks

twisted-pair cable

consists of pairs of copper wire

program

consists of the step-by-step instructions that tell the computer how to do its work

analog signals

continous electronic waves sent and received by telephones

NOS (network operating systems)

control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources

The first step in implementing a new system is to determine the A. hardware requirements. B. software requirements. C. conversion type. D. best alternative.

conversion type

domain name server (DNS)

converts text-based address to IP address

first-party cookie

cookie that is germinated only by the website you are currently visiting

third-party cookie

cookie that is usually generated by an advertising company that is affiliated with the website you are visiting

manage resources

coordinate memory, processing, storage, and devices

Wide area networks (WAN)

countrywide and worldwide networks

Virtual private networks (VPN)

create a secure private connection between a remote user and an organization's internal network

word processors

create text-based documents and are one of the most flexible and widely used software tools.

worksheet files

created by electronic spreadsheets to analyze things like budgets and to predict sales

presentation files

created by presentation graphics programs to save presentation materials

Document files

created by word processors to save documents such as memos, term papers, and letters

__________ refers to testing by a select group of potential users in the final stage of testing a program. a) Manual testing b) Desk checking c) Attempt at translation d) beta testing

d) beta testing

The actual writing of a program in a programming language is called a) program design b) logic structure c) language translation d) coding

d) coding

In programming, _______ are explanations that tell other programmers what's happening in the software code. a) restrictions b) tables c) documentation d) selections

d. documentation

The programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem. a) grid table b) pseudocode c) algorithm d) flowchar

d. flowchart

information brokers

data gatherers who collect, analyze, and sell personal data

A transaction processing system is also referred to as a ________.

data processing system

file servers

dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.

network architecture

describes how a network is arranged and how resources are coordinated and shared

The first step in the systems design phase is to A. examine the hardware requirements. B. design alternative systems. C. select the best system. D. analyze the data.

design alternative systems.

Solid-state drives (SSDs)

designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data

antispyware

designed to detect and remove various types of privacy threats

The place that provides access to computer resources allowing you to interact with the operating system's graphical user interface.

desktop

______ are specialized programs that allow particular input or output devices to communicate with the rest of the computer system.

device drivers

A _____ provides information or requests input.

dialog box

Read-only discs

discs that cannot be written on or erased by the user- stuff you buy in the store

tab

divide menus into major activity areas

manuals

documents written with procedures by computer specialists

solid-state storage

does not have any moving parts, is more reliable, and requires less power than hard disks. Saves data and information electronically but is not volatile

A _______ works with the operating system to allow communication between the device and the rest of the computer system.

driver

Use Windows Update to update the _____ on your computer.

drivers

communication systems

electronic systems that transmit data from one location to another

the operating system on a smartphone would be ______.

embedded

Virtual private networks (VPN)

encrypt connections between company networks and remote users such as workers connecting from home

big data

ever-growing volume of data

IP address

every computer on the Internet has a unique numeric address called an:

ethernet cables

example of a twisted-pair cable that is often used in networks and to connect a variety of components to a system unit

Fiber-optic service (FiOS)

faster connection than cable or DSL. Is showing up in some areas, but is a new technology and not widely available

Utility programs

file compression diagnostic antivirus backup

Documents, worksheets, programs, and presentations are all examples of _____.

files

Data Manipulation

finding entry into someone's computer network and leaving a prank message

lands

flat areas that represent the 1s and 0s on the disc surface of optical discs

A good way to organize related files is to store them within a ______.

folder

system software

form of software that the computer uses

When a file cannot be saved on a single track across contiguous sectors and has to be broken up into small parts it is said to be ______.

fragmented

scam

fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return

You would run this program on your hard drive to ______ and improve system performance.

free up disk space

icons

graphical elements that represent familiar objects

connectivity

greatly expands the capability and usefulness of information systems

In a GDSS, the ________ is generally the decision maker.

group

When a computer is running virtualiztion software, the operating system for each virtual machine is known as the _______.

guest operating system

storage devices

hardware that reads data and programs from storage media

Fourth general mobile telecommunications (4G)

has begun to replace 3g networks in some areas with providers using LTE connections to provide faster transmission speeds

cyberbullying

he use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

Organizational cloud storage

high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage

electronic profiles

highly detailed and personalized descriptions of individuals

profiles

highly detailed and personalized descriptions of individuals are electronic:

secondary storage

holds data and programs even after electric power to the computer system has been turned off

https

hypertext transfer protocol secure is widely used to protect the transfer of sensitive information

In a graphical user interface a graphical representation for a program, file, or function is called a(n) _____.

icon

Disk Cleanup

identifies and eliminates nonessential files

Rogue Wi-Fi hotspots

imitate free networks to capture any and all information

Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system. A) system definition B) component design C) system maintenance D) implementation

implementation

redundant arrays of inexpensive disks (RAID)

improve performance by expanding external storage, improving access speed, and providing reliable storage

disk caching

improves hard-disk performance by anticipating data needs

history files

include the locations, addresses, of sites that you have recently visited

specialized applications

includes thousands of other programs that tend to be more narrowly focused and used in specific disciplines and occupations

general purpose application

includes word processing programs, spreadsheets, presentation graphics, and database management systems

File compression

increase storage capacity by reducing the amount of space required to store data and programs

IP address

individual numeric address given to every computer on the Internet

The ________ keeps records of the number of each kind of part or finished good in the warehouse.

inventory control system

web bugs

invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge

sectors

invisible wedge-shaped sections that divided each track

TCP/IP (transmission control protocol/internet protocol)

involves identifying sending and receiving devices and breaking information into smaller parts called packets

RAID systems

larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.

run applications

load and run applications

internal hard disk

located inside the system unit. Able to store and retrieve large quantities of information quickly

Optimize Drives

locates and eliminates fragments and rearranges files and unused disk space

File History

makes a copy of all files that are in the libraries, contacts, and favorites and on the desktop

Computer Fraud and Abuse Act

makes it a crime for unauthorized persons to view or damage data using any computer across state lines

Digital Millennium Copyright Act

makes it illegal to deactivate or otherwise disable any anti-piracy technologies including DRM technologies

malware

malicious programs created to damage or disrupt a computer system

capacity

measures how much a particular storage medium can hold

access speed

measures the amount of time required by the storage device to retrieve data and programs

In a graphical user interface, ______ provide a list of options and commands.

menus

tablet and smartphones use _____ type of operating system

mobile OS mobile operating system

wearable

mobile computers like Apple watch that you wear on your body

privacy mode

mode in the browser that ensures that your browsing activity is not recorded on your hard disk

DSL (digital subscriber line)

modem that uses standard phone lines to create a high-speed connection directly to your phone company's offices. usually external and connect with either a USB or ethernet

display

most common type of output device

people

most important part of any information system

Windows

most widely used microcomputer operating system and can run with a variety of different microprocessors

software

name for a program or programs

Metropolitan area network (MAN)

network that spans distances up to 100 miles

Local area networks (LAN)

networks with nodes that are in close physical proximity

mesh network

newest topology and does not use a specific physical layout , rather requires that each node have more than one connection to the other nodes

head crash

occurs when a readwrite head makes contact with the hard disk's surface or with particles on its surface

sending and receiving devices

often a computer or specialized communication device

ADSL service (asymmetrical digital subscriber line)

one of the most widely used types of DSL, much faster than dial-up

Random-access memory (RAM)

one type of memory that holds the program and data that is currently being processed

blogs

online diaries or commentaries

An ______ operating system is one in which users can modify and further develop the code.

open source

The collection of programs that handles many of the technical details related to using a computer is called the ______.

operating system

Select all the types of system software.

operating systems utilities language translators device drivers

standalone operating systems

operating systems used by desktops

network operating systems NOS

operating systems used by networks

spreadsheets

organize, analyze, and graph numeric data such as budgets and financial reports

Android

owned by Google and widely used in many of today's smartphones

Windows Phone 8

owned by Microsoft and used in a variety of portable devices mainly for social networking and instant messaging

microprocessor

part of system unit that controls and manipulates data to produce information

people

part of the information system that includes the end users

memory

part of the system unit that is a holding area for data, instructions, and information

Computer monitoring software

perhaps the most invasive and dangerous type of spyware

Regional managers can compare their regular sales reports with that of the other regional managers by using ________.

periodic reports

desktop computer

personal computer that is small enough to fit on top of or alongside a desk but too big to carry around

laptop computer

personal computers that are portable and lightweight and fit in most briefcases

vector images

photos that are made with geometric shapes or objects

bitmap images

photos that are made with pixels

The operating system is often called the software environment or software _______.

platform

In a graphical user interface, the _____ is used to select items.

pointer

Menus

present commands that are typically displayed in a menu bar at the top of the screen

information

processed facts

Program specification can also be called

program definition or program analysis

virus

program that migrates through networks and operating systems, and attaches themselves to different programs and databases

Database management system (BDMS)

program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.

trojan horses

programs that appear to be harmless, but they contain malicious programs

Presentation graphics

programs that combine a variety of visual objects to create attractive, visually interesting presentations.

operating systems

programs that coordinate computer resources, provide an interface between users and the computer, and run applications

word processors

programs that create text-based documents,

web page editors

programs that provide support for website design and HTML coding

worms

programs that simply replicate themselves over and over again

web authoring programs

programs typically used to create sophisticated commercial websites

Project resources can be scheduled, planned, and controlled using ________.

project managers

Heath Insurance Portability and Accountability Act (HIPAA)

protects medical records

Gramm-Leach Bliley Act

protects personal financial information

Although the development time is shorter, it is sometimes more difficult to manage the project and to control costs with A. rapid applications development. B. prototyping. C. systems analysis. D. systems maintenance.

prototyping.

Dialog boxes

provide additional information and request user input

dialog box

provide information or request input

help

provide online assistance for operating system functions and procedures

buttons

provide shortcuts for quick access to commonly used commands

Cable service

provided by cable television companies using their existing television cables. These connections are usually faster than DSL

DSL service (digital subscriber line)

provided by telephone companies using existing telephone lines to provide high-speed connections

e-mail

provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents

web

provides a multimedia interface to the numerous resources available on the internet

videoconferencing

provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.

secondary storage

provides permanent or nonvolatile storage

texting

provides very efficient direct text communication between individuals using short electronic messages.

This is an outline of the logic of the program you will write.

pseudocode

employee-monitoring software

record virtually everything you do on the computer for the sake of a company

density

refers to how tightly the magnetic charges on a hard disk are packed next to one another

downlink

refers to receiving data from a satellite

mass storage

refers to the tremendous amount of secondary storage required by large organizations

accuracy

related to the responsibility of those who collect data to ensure that the data is correct

access

relates to the responsibility of those who have data to control who is able to use that data

property

relates to who own data

Ribbons

replace menus and toolbars by organizing commonly used commands into a set of tabs. These tabs display command buttons that are the most relevant to the tasks being performed by the user

digital signals

represent the presence or absence of an electronic pulse and are sent and received by computers

plagiarism

representing some other person's work and ideas as your own without giving credit to the original source

Wireless network encryption

restricts access to authorized users on wireless networks

Family Educational Rights and Privacy Act (FERPA)

restricts disclosure of education records

tracks

rings of concentric circles on the platter

protocols

rules for exchanging data between computers

Mac OS

runs on Apple computers

cylinder

runs through each track of a stack of platters

The ________ activity records the customer requests for products or services.

sales order processing

password

secret words or phrases that must be keyed into a computer system to gain access

A file is said to be fragmented when it cannot be saved on a single track across contiguous wedge shaped sections called _______.

sectors

Determining whether the system can be made secure against unauthorized use is part of A. analyzing the data. B. writing the systems design report. C. selecting the best system. D. testing the system.

selecting the best system.

modem

short for modulator-demodulator

Galleries

simplify the process of making a selection from a list of alternatives. This is accomplished by graphically displaying the effect of alternatives before being selected.

window

simply a rectangular area that can contain a document, program, or message.

cookies

small data files that are deposited on your hard disk from websites you have visited

mobile apps

small programs primarily designed for mobile devices

flash memory cards

small solid-state storage devices widely used in portable devices

packets

smaller parts of a message sent separately over the internet and reassembles into the correct order before delivery

tablet

smaller, lighter, and generally less powerful personal computers than laptops. Usually have touch-screens instead of standard keyboards

USB drives

so compact that they can be transported on a key ring

Image editors

specialized graphics programs for editing or modifying digital photographs

mass storage devices

specialized high-capacity secondary storage devices designed to meet organization demands for data storage

Basic categories of operating systems

stand-alone network embedded

ethics

standard of moral conduct

First Generation mobile telecommunications (1G)

started in the 1980s using analog radio signals to provide analog voice transmission service

Second Generation mobile telecommunications (2G)

started in the 1990s using digital radio signals

Third generation mobile telecommunications (3G)

started in the 2000s and provided serves capable of effective connectivity to the internet, marking the beginning of smartphones

Solid-state storage

storage that has no moving parts

peer-to-peer network

strategy of having nodes have equal authority and can act as both clients and servers

client/server networks

strategy of using central servers to coordinate and supply services to other nodes on the network

Specialized suites

suites focus on specific applications

cloud suites

suites that are stored at a server on the Internet and are available anywhere you can access the Internet.

Utility suites

suites that include a variety of programs designed to make computing easier and safer

Cellular service providers

support voice and data transmission to wireless devices using cellular networks

The correct sequence for the five phases in the systems development life cycle (SDLC) process is ________.

system definition requirements analysis component design Implementation system maintenance

_____ software controls where a program is stored in memory, how commands are converted so that the system unit can process them, and where files are saved.

system software

Determining whether the new procedures are actually furthering productivity is part of the A. testing of the new sample phase. B. selecting the best system phase. C. designing of alternatives phase. D. systems audit phase.

systems audit phase.

The costs versus the benefits of designs and the outlines of their effects is presented in the A. systems analysis report. B. preliminary investigation report. C. initialization report. D. systems design report.

systems design report

In a graphical user interface, _____ divide menus into major activity areas.

tabs

uplink

term relating to sending data to a satellite

web authoring

the act of creating a site

media

the actual physical material that holds the data and programs

topology

the arrangement or configuration of a network

broadband

the bandwidth typically used for DSL, cable, and satellite connections to the Internet

privacy

the browser mode that ensures your browsing activity is not recorded

connectivity

the concept related to using computer networks to link people and resources

the Internet of Things (IoT)

the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet

hardware

the equipment that processes the data to create information

application software

the form of software the end user uses

Identity theft

the illegal assumption of someone's identity for the purpose of economic gain

online identity

the information that people voluntary post about themselves online

cloud computing

the internet acts as a cloud of servers that supply applications to clients as a service rather than a product

personal computers (PC)

the least powerful, yet the most widely used and fastest-growing type of computer

supercomputers

the most powerful type of computer. Special, high-capacity computers used by very large organizations. typically used to process massive amounts of data

smartphone

the most widely used handheld computers. cell phones with wireless connections to the Internet and processing capabilities

Microsoft Excel

the most widely used spreadsheet program

Microsoft Word

the most widely used word processor

modulation

the name of the process of converting from digital to analog

Blu-ray discs (Bfs)

the newest form of optical storage designed t store hi def videos, which uses the HD 720 and HD 1080 resolutions

media

the physical material that holds the data and programs

user interface

the portion of the application that allows you to control and to interact with the program

encryption

the process of coding information to make it unreadable except to those who have a special piece of information known as a key

demodulation

the process of converting from analog to digital

computer communications

the process of sharing data, programs, and information between two or more computers

procedures

the rules or guidelines for people to follow when using software, hardware, and data

transfer rate

the speed with which a modem transmits data is called its:

transfer rate

the speed with which modems transmit data, typically measured in megabits per second

pixels

the thousands of dots that form images

access

the three primary privacy issues are accuracy, property, and:

vector

the type of image that consists of geometric shapes

software piracy

the unauthorized copying and/or distribution of software

cyberbullying

the use of the Internet, smartphones, or other devices to send or pot content intended to hurt or embarrass another person

NIC (network interface cards)

these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter

data transmission specifications

these are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel

secondary storage devices

things like hard-disk drive, data and programs that can be retained after the computer has been shut off

illusion of anonymity

thinking that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy

proxy server

this is a server that all communications between the company's internal networks and the outside world have to pass through

optical

this type of storage uses pits and lands to represent 1s and 0s

specialized applications

thousands of other programs that are more narrowly focused on specific disciplines and occupations

CD, DVD, BD

three types of optical discs

DRM

to prevent copyright violations, corporations often use:

star network

topology in which each device is connected directly to a central network switch

tree network

topology in which each device is connected to a central node, either directly or through one or more other devices

bus network

topology in which each device is connected to a common cable called a backbone, and all communications travel alongside.

ring network

topology in which each device is connected to two other devices

On a hard disk a ________ is a concentric ring.

track

The final step of the implementation phase of the systems life cycle is to A. develop documentation. B. train the users. C. select the conversion type. D. write the implementation report.

train the users.

input devices

translate data and programs that humans can understand into a form that the computer can process

output devices

translate the processed information from the computer into a form that humans can understand

fiber-optic cable

transmits data as pulses of light through tiny tubes of glass

keyboard and mouse

two most common input devices

keystroke logger

type of computer monitoring software that records every activity and keystroke made on a computer system, including red card numbers, passwords, and emails

app store

typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge

toolbars

typically appear below the menu bar and include small graphic elements called buttons that provide shortcuts for quick access to commonly used commands

Database files

typically created by database management programs to contain highly structured and organize data

hard disks

typically use to store programs and very large data files

web authoring programs

typically used to create sophisticated commercial sites

data

unprocessed facts

optical discs

use laster technology to store data and programs

hard disk

use rigid metallic platters that are tacked one on top of another

external hard drives

use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk

digital right management (DRM)

used by corporations to control access to electronic media and files

graphical user interface (GUI)

used by most general-purpose applications because it displays graphical elements called icons to represent familiar objects

Unix

used by servers on the Web, mainframe computers and powerful microcomputers

communication devices

used for a personal computer to routinely communicate with other computer systems located as near as the next office or as far away as halfway around the world using the Internet

voiceband (low bandwidth)

used for standard telephone communications

iOS

used in iPhone, iPod Touch, and iPad

medium band

used in special leased lines to connect to midrange computers and mainframes as well as to transmit data over long distances

Illustration programs

used to create and edit vector images

spyware

used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet

Tabs

used to divide the ribbon into major activity areas

Video editors

used to edit videos to enhance quality and appearance.

The means for a user to interact with application programs and computer hardware describes the _____.

user interface

optical disc drives

uses a laser that projects a tiny beam of light to read the disc

Wi-Fi

uses high-frequency radio signals to transmit data

microwave

uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication, only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances

infrared

uses infrared light waves to communicate over short distances

Global positioning system (GPS)

uses location information to uniquely determine the geographic location of a device

Cellular

uses multiple antennae to send and receive data within relatively small geographic regions

satellite

uses orbiting satellites about 22,000 miles above the earth as microwave relay stations

satellite connection service

uses satellites to provide wireless connections, slower than DSL and cable, but are available almost everywhere

dictionary attack

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account

cloud computing

uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet

cable modem

uses the same coaxial cable as the television, creates a high-speed connection using USB or Ethernet

dial-up services

using existing telephones and telephone modems to connect to the internet

_____ are specialized programs to make computing easier.

utilities

When a computer is running virtualization software, it is operating as though it were two or more separate and independent computers known as

virtual machines

Utility suites often provide programs that will protect your system from dangerous programs called computer ______.

viruses

strategy

way of coordinating the sharing of information and resources

compact discs (CD)

were the first widely available optical format for PC users with 700 MB of storage

software

what controls hardware?

mistaken identity

when the electronic profile of one person is switched with another

modem

widely used communication device that modifies audio, video, and other types of data into a form that can be transmitted across the Internet

broadband

widely used for DSL, cable, and satellite connections to the Internet

general-purpose applications

widely used programs in all career areas

baseband

widely used to connect individual computers that are located close to one another

Video game design software

will help you organize your thoughts and guide you through the game design process including character development and environmental design

hotspots

wireless access points that provide internet access

Intrusion detection system (IDS)

work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic

system software

works with end users, application software, and computer hardware to handle the majority of technical details

The final task in the design phase of the systems life cycle is to A. select the best design. B. design alternative systems. C. write a systems design report. D. examine hardware requirements.

write a systems design report.

Freedom of Information Act

you are entitled to look at your records held by government agencies by law


Conjuntos de estudio relacionados

Evaluating the Six Trigonometric Functions Quiz

View Set

Entrepreneurship Exam #1 Study Guide

View Set

Chapter 3: Relational Database Model

View Set

Dental Management Ch. 14: Diabetes Mellitus

View Set

Chapter 25: Taxation of international transactions

View Set

Chapter 58 Iggy Practice Questions, Chapter 18 Iggy Practice Questions, Chapter 55 Iggy Practice Questions, Chapter 45 Iggy Practice Questions, Chapter 24 Iggy Practice Questions -Integumentary, Chapter 54 Iggy Practice Questions, Chapter 14 Iggy Pra...

View Set

Chapter 25 the reproductive system

View Set

Chapter 2 biomechanics questions

View Set