CTA Chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

RAM provides what type of storage?

temporary or volatile storage

creating and knowingly spreading a virus is a very serious crime and federal offense punishable under what Act?

the Computer Fraud and Abuse Act

The primary difference between A PAN, LAN, MAN, AND WAN is what?

the geographic range

What is the disadvantage of Peer-to-peer (P2P)?

the lack of security controls or other common management functions (for this reason, few businesses use this type of network to communicate sensitive information)

what is reading?

the process of accessing information from secondary storage.

what is writing?

the process of saving information to the secondary storage device

the single most dramatic change in connectivity and communcitations in the past decade has been....

the widespread use of mobile devices like smartphones and tablets within wireless Internet connectivity

What do home network allow?

they allow different computers to share resources including a common Internet connection

What is the advantage of Peer-to-peer (P2P)?

they are easy and inexpensive (often free) to set up and use

Why are Cylinders necessary for a hard disk platter?

they differentiate files stored on the same track and sector of different platters

Besides being within laptops, smartphones, and GPS's, what other kind of application do FLASH MEMORY CARDS have?

they provide removable storage

can be used to transmit information without your knowledge.

web bugs example: when a user opens an email containing a web bug, information is sent back to the source of the bug

This access point interrupts incoming radio frequencies and routes communications to the appropriate devices.

wireless access point or base station

all communications pass through the networks centrally located _____________

wireless access point or base station

Almost all computers have this type of built in modem.

wireless modem

encompasses various technologies that control access to electronic media and files.

digital rights management (DRM)

to prevent copyright violations, corporations often use what?

digital rights management (DRM)

computers send and receive ___________. These represent the presence or absence of an electronic pulse.

digital signals

This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable or it can be wireless

Communication channel

call attention to unusual events. An example is a sales report that shows certain items are selling significantly above or be;ow marketing department forecasts.

Exception reports

compared to a coaxial cable, it is lighter, faster, and more reliable at transmitting data. It is rapidly replacing twisted pair cable telephone lines

Fiber- optic cable

this database is like hierarchical except a child node may have more than one parent in a many-to-many relationship; additional connections are called pointers!

Network database

expansion cards located within the system that connect the computer to a network. Sometimes referred to as a LAN adaptor

Network interface cards (NIC)

Malicious Programs created by crackers are known as what?

maleware

these things are especially designed to damage or disrupt a computer system

maleware

specialized high- capacity secondary storage devices designed to meet organizational demands for data storage

mass storage devices

a list of instructions for a computer to follow is known as a what?

program

another name for program specification...

program definition or program analysis

consists of a written description of the program and the procedures for running it.

program documentation

designed to ensure that the program operates correctly, efficiently, and effectively

program maintenance

the rules for exchanging data between computers are known as...

protocol

to build a model or prototype that can be modified before the actual system is installed

protoyping

central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.

switch

a collection of activities and elements organized to accomplish a goal

system

a six-phase problem-solving procedure that makes up the systems life cycle

systems analysis and design

cyber crimes cost over $______________ a year.

$400 billion

Several factors affect how data is transmitted. These factors include ____________ and ____________.

- Bandwidth -protocols

In the systems development phase, ____________ and _________ are acquired and tested.

- hardware -software

The 1's and 0's in an optical disc are represented by flat areas called _____________ and bumpy areas called ___________ on the discs surface.

-lands -pits

What are the 5 basic functions of an organization? Describe them.

1) Accounting- records all financial activity from billing customers to paying employees 2) Marketing- plans, prices, promotes, sells, and distributes the organizations goods and services 3) Human Resources- focuses on people--- hiring, training, promoting 4) Production- actually creates finished goods and services using raw materials and personnel 5) Research- identifies, investigates, and develops new products and services

What are the 3 types of privacy? describe them.

1) Accuracy- relates to the responsibility of those who collect data to ensure that the data is correct 2) Property- relates to who owns the data 3) Access- relates to the responsibility of those who have data to control who is able to use the data.

What are the 2 ways in which data is processed? describe them.

1) Batch processing- data is collected over time and then processed later all at one time (batched) 2) Real- time processing (online processing)- data is processed at the same time the transaction occurs. Direct access storage devices make real time processing possible

PrimaryTechnologies used for wireless connections are...

1) Bluetooth 2) Wifi 3) Microwave 4) WiMax 5) Celular 6) satellite connections

What are the 5 Topologies?

1) Bus network 2) Ring Network 3) Star Network 4) Tree Network 5) Mesh Network

What are the 3 widely known optical discs?

1) CD 2) DVD 3) Blu- ray discs

what are the 5 subsystems of a DBMS? describe them.

1) DBMS engine- provides a bridge = between logical and physical data views 2) Data definition subsystem- defines the logical structure of a database using data dictionary pr schema 3) Data manipulation subsystem- provides tools for data maintenance and data analysis; tools include query by example and structured query language 4) Application generation subsystem- provides tools for creating data entry forms with specialized programing languages 5) Data administration subsystem- manages the data-base

What are the 3 commonly used types of modems:

1) DSL 2) cable 3) wireless

What are the 3 performance Enhancements for Hard Disks?

1) Disk Caching 2) redundant arrays of inexpensive disks 3) File Compression/ Decompression

4 applications that depend on computer communications include:

1) Email- fast, efficient alternative to traditional mail by sending and receiving electronic documents 2) Texting- provides very efficient direct text communication between individuals using sort electronic messages 3) Videoconferencing- provides a very low cost alternative to long distance telephone calls using electronic voice and video delivery 4) Electronic commerce- buying and selling goods electronically

Some of the mass storage devices that support the enterprise storage system include:

1) File Servers- computers with large storage capacities that provide users access to fast storage and retrieval data 2)Network attached storage (NAS)- a type of file server designed for homes and small business. It is less expensive, easier to set up, and easier to manage than most file servers. However it does not include powerful management tools and features found on large scale file servers. 3) RAID systems- a device that enhance security by constantly making backup copies of files moving across the organizations networks. 4) Organizational cloud storage- High speed internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage

what are the 4 types of databases? describe them.

1) Individual (personal computer) database- used by one person 2) company database- stored on central server; accessed by multiple people 3)distributed databases- spread out geographically; accessed by communications links 4) Commercial databases (information utilities and data banks)- Enormous; for particular subjects

What are the 4 important characteristics of secondary storage? explain them.

1) Media: the physical material that hods the data and programs 2) Capacity: measures how much a particular storage medium can hold 3) Storage Device: hardware that reads data and programs from storage media. Most also write to storage media 4) Access Speed: measures the amount of time required by the storage device to retrieve data and programs

Two systems to support information workers include:

1) Office automation systems- support data workers. Focus on managing documents, communicating, and scheduling. 2) Knowledge work systems- use OAS systems. They create information for their areas expertise.

What are the 6 phases that make up the systems analysis and design? describe them.

1) Preliminary investigation- identifying organizations problems or needs and summarizing in short report 2) Systems analysis- studying present system in depth, specifying new requirements, and documenting findings 3) systems design- designing new or alternative system to meet new requirements and creating a design report 4) Systems development- acquiring , developing, and testing needed hardware and software 5) systems implementation- installing new system and training people 6) Systems maintenance- periodically evaluating and updating systems as needed

Each of the optical discs has three basic formats which include:

1) Read Only (ROM) 2) Write Once (R for recordable) 3) Rewritable (RW for rewritable or RAM)

what are the 4 basic elements of a communication system?

1) Sending and receiving data 2) Connection devices 3) Data transmission specifications 4) Communication channel

What are the 3 basic types of Decision Models? describe them.

1) Strategic Models- assist top level managers in long range planning, such as stating company objectives or planning plant locations 2) Tactical Models- help middle class management control the works of the organization, such as financial planning and sales promotion planning. 3) Operational Models- help lower level management accomplish the organizations day to day activities, such as evaluating and maintaining quality control

What are the 3 levels of management? Describe them.

1) Supervisors- manage and monitor the employees or workers. They have responsibility relating to operational matters 2) Middle Management- deal with control, planning, and decision making. They implement the long term goals of the organization 3) Top Management- concerned with long range planning. They need information that will help them plan the future growth and direction of the organization

What are the information needs of each level of management?

1) Top Level- need summary information describing the overall operations of the business. they need to forecast and plan for long range 2) Middle level- need summarized information (weekly or monthly reports). they ned to develop the budget projections and to evaluate the performance of supervisors 3) Supervisors- need detailed, very current, day-to-day information on their units so that they can keep operations running smoothly.

Describe the information flow of the 3 levels of management.

1) Top level- both vertical and horizontal 2) Middle- both vertical and horizontal 3) Supervisors- primarily vertical

What are the 4 structured programming techniques? describe them.

1) Top-Down program design- major processing steps called program modules are identified 2) Pseudocode- an outline of the logic of the program you will write 3) Flowcharts- program charts are graphic representations of the steps necessary to solve a programming problem. 4) Logic Structures- arrangements of programing statements. The 3 types include: 1) sequential: one program statement followed by another 2) Selection (IF-THEN-ELSE): when a decision must be made 3) Repetition (loop)- when a process is repeated until condition is true

Large Organizations typically have formal names for the systems designed to collect and use the data. The most common names include: (4)

1) Transaction Processing System (TPS) 2) Management Information System (MIS) 3) Decision Support System (DSS) 4) Executive Support System (ESS)

Physical connections use a solid medium to connect sending and receiving devices. These connections include...(3)

1) Twisted pair 2) Coaxial 3) Fiber-optic cables

The disadvantages of cloud storage include:

1) access speed- the data transfer rate is dependent upon the speed of our internet connection, which most likely is not as fast as a user's internal network 2) file security- users are dependent upon the cloud service's security procedures, which may not be as effective as your own

What are the 5 groups that data is organized into? describe them.

1) character- the most basic logical element, consisting of individual numbers, letters, and special characters 2) field- next level, consulting of a set of related characters for example, a persons last name. A data field represents an attribute (description ot characteristic) of some entity (person, place, thing, or object) 3) Record- a collection of related fields, for example, a payroll record consisting of fields of data relating to one employee 4) Table- a collection of related records; for example, a payroll table consisting of all the employee records 5) database- an integrated collection of related tables; for example, a personnel database contains all related employee tables

What are 2 of the most common network strategies?

1) client/ server networks 2) Peer-to-peer (P2P)

electronic profiles raise man important issues including:

1) collecting public, but personal identifying information 2) spreading information without personal consent 3) spreading inaccurate information

What are the 2 categories of Communication channels?

1) connects sending and receiving devices by providing a physical connection, such as a wire or cable 2) wireless

typically, digital rights management (DRM) is used to....

1) control the number of devices that can access a given file 2) limit the kinds of devices that can access a file

What are the disadvantages of Client/ server networks? (2)

1) cost of installation 2) maintence

What are the 3 tasks of the preliminary investigation phase?

1) defining the problem- 2) Suggesting Alternative Systems 3) Preparing a Short Report

What are the 5 methods for testing for syntax and logic errors? describe them.

1) desk checking method (code review)- careful reading of a printout of the program 2) manual testing- using a calculator and sample data to test for correct programming logic 3) Attempt at translation- running the program using a translator program to identify syntax errors 4) Testing sample data- running the program and testing the program for logic errors using sample data 5) testing by users (beta testing)- final step in which potential users try the program and provide feedback

What are the 4 ways to convert? describe them

1) direct approach- abandoning the old system and staring up the new system (can be very risky) 2) Parallel approach- running the old and new system side by side until the new system proves its worth; very low risk; however, very expensive; not generally recommended 3) pilot approach- converting only one part of the organization to the new system until the new system proves its worth; recommended for situations with many people performing similar operations 4) phased approach- gradually implementing the new system to the entire organization; less risky but more expensive than parallel conversion; recommended for situations with many people performing different operations.

What are the three tasks of the systems design?

1) economic feasibility - cost vs. benefits (time for system to pay for itself) 2) technical feasibility- hardware and software reliability; available training. 3) operational feasibility- will the system work within the organization?

What are the 3 tasks of the System analysis phase?

1) gathering data- helpful to use organization chart 2) analyzing the data- helpful to use top down analysis, grid charts, and system flowcharts. 3) Documenting Systems Analysis-

What are the 5 principal database models?

1) hierarchical 2) network 3) relational 4) multidimensional 5) object-oriented

What are the essential features of transmission control protocol/internet protocol (TCP/IP)?

1) identifying sending and receiving devices 2) breaking information into small parts, or packets, for transmission across the Internet

two important security concerns in databases include:

1) illegal use of data 2) unauthorized access

What are the 2 basic types of hard disks?

1) internal 2) external

Some flash memory cards are used within devices such as....

1) laptops 2) smartphones 3) GPS Navigation systems

starts with core program functionality and expands until the customers is satisfied with the results.

Agile development

The benefits of cloud storage include:

1) maintenance- the cloud service will take care of disk fragmentation, back-ups, encryption, and security 2) Hardware upgrades- the cloud service will never run out of disk space and can replace failed hard disks without interruption to the user 3) File sharing and collaboration- users can share documents, spreadsheets, and files with other users from anywhere wth an Internet connection

There are a number of specialized terms that describe computer networks. There terms include (10)....

1) node 2)client 3) server 4) directory server 5) hot 6) router 7) switch 8) network interface cards (NIC) 9) Network operating systems (NOS) 10)Network administrator

What are the 5 tasks of Program specification (program definition or program analysis)?

1) program objectives 2) desired output 3) input data 4) processing requirements 5) program specification

The 6 step procedure for creating programs includes... (describe them)

1) program specification- defining objects, inputs, outputs, and processing requirements 2) program design- creating a solution using structured programing tools and techniques such as top down, program design, pseudocode, program flowcharts, and logic structures 3) Program code- writing or coding the program using a programming language 4) Program Test- testing or debugging the program by looking for syntax and logical errors 5) program documentation- ongoing process throughout the programing process 6) program maintenance- periodically evaluating programs for accuracy, efficiency, standardization, and ease of use and modifying program code as needed

Two alternatives for the systems life cycle include:

1) prototyping 2) rapid applications developments (RAD)

what are 2 ways to acquire software?

1) purchasing "off the shelf packaged software" 2) designing custom programs

What are 4 advantages of databases?

1) sharing data 2) improved security 3) reduced data redundancy 4) higher data integrity

2 examples of flash memory cards being used to provide removable storage include...

1) storing images captured from digital cameras and then transferring the images to desktop and other computers. 2) used in digital media players like iPod's to store and play music and video files

What are the advantages of Client/server networks? (2)

1) the ability to handle very large networks 2) the availability of powerful network management software to monitor and control network activities

What are the 4 parts of Decision Support System (DSS)? Describe them.

1) user- someone who has to make decisions 2) system software- essentially the operating system-- programs designed to work behind the scenes to handle detailed operating procedures. 3) data- stored in a database and consists of two kinds... 1) internal: data from within the organization 2) external: data gather from outside the organization 4) Decision Models- give the DSS its analytical capabilities.

People who use program documentation include: (3)

1) users- who need to know how to use the program 2) operators- who need to know how to excavate the program and how to recognize the errors 3) Programmers- who may need to update and maintain the program in the future

What are the 3 types of maleware?

1) viruses 2) worms 3) Trojan horses

List the 4 categories of bandwidth:

1) voiceband (also known as low bandwidth) 2) medium band 3) broadband 4) baseband

Cyber-crimes can take many forms including:

1)creation of malicious programs 2) denial service attacks 3) rouge WiFi hotspots 4) data manipulation 5) identity theft 6) Internet scams 7) Cyber-bulling

It is estimated that over _________ billion smartphones are in use worldwide.

1.5 billion

optical discs can hold over ______________ gigabytes of data

128

explain the 4 different generations of cellular networks.

1st generation mobile telecommunications (1G)- started in the 1980's using analog radio signals to provide analog voice transmission service 2nd generation mobile telecommunications (2G)- started in the 1990's using digital radio signals 3rd generation mobile telecommunications (3G)- started in the 2000's and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones 4th generation mobile telecommunications (4G)- has begun to replace 3G networks in some areas with providers using LTE (Long Term Evolution) connection to provide faster transmission speeds

Bluetooth transmits data over short distances of approximately ____________ ft.

33 feet

DVD's can store up to ______ GB (7 times the capacity of CDs)

4.7 GB

cyber crimes affect over _______ people.

400 million

consists of hardware and software that control access to a company's intranet and other internal networks.

A Firewall

one of the most widely used types of DSL

ADSL (asymmetric digital subscriber line)

once the system is operational, the system analysts performs a ____________ by comparing the new system to its original design specifications.

systems audit

To document and communication the finding of the Systems design, a _________________ is prepared for higher management.

systems design report

After each packet is sent separately over the Internet, what happens next?

At the receiving end, the packets are reassembled into the correct order.

list the overall financial conditions of an organization. They include assets, liabilities, and how much an organizations owned by the owners.

Balance sheet

bandwidth that is widely used to connect individual computers that are located close to one another. It is able to support high-speed transmission. Though, is can only carry a single signal at a time.

Baseband

the newest form of optical disc storage designed to store hi def (high definition) video

Blue- ray discs (BD's)

The most popular personal area Network (PAN) is....

Bluetooth (max range of around 33 feet)

is a short range radio connections standard that transmits data over short distances of up to approximately 33 feet

Bluetooth (used for wireless headphones, printer connections, and handheld devices) Communcation

bandwidth that is widely sued for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use a single broad connection for high speed data transfer.

Boradband

Topology where each device is connected to a common cable or backbone, and all communications travel along this cable

Bus network

this type of optical discs stores about 700 MB of storage

CD

optical discs that store music are known as...

CDs

uses multiple cell towers (antennae) to send and receive data within relativity small geographic regions. Most cell phones and mobile devices use these networks

Cellular Communcation

support voice and data transmission to wireless devices using cellular networks.

Cellular service providers (including Verizon, AT&T, Sprint, and T-Mobile)

general definitions (part of object oriented database)

Classes

network strategy that uses central servers to coordinate and supply services to other nodes on the network. the server provides access to resources such as web pages, databases, application software, and hardware.

Client/server networks

an essential element of every communications system that carry the data from one computer to another.

Communications channel

What was the first widely avaible optical format for PC users?

Compact discs (CD's)

used frequently to compress files on DVD's, CD's, and flash drives as well. Also helps to speed up transmission of files from one computer to another

Compression Files

what act makes it a crime for unauthorized persons to view data using any computer across state lines

Computer Fraud and Abuse Act

the most invasive and dangerous type of spyware

Computer monitoring software

these act as an interface between the sending and receiving devices and the communication channel. They convert outgoing messages into packets that can travel across the communication channel. They also reverse the process for incoming messages

Connection devices

the process of changing to the new systems and training people.

systems implementation (conversion)

consists of a systems audit followed by periodic evolution

systems maintenance

showing up in some areas, this is a new technology that is not widely available. Current providers include Google and Verizon (speeds faster then DSL and cable)

Fiber-optic service (FiOS)

a modem that uses standard phone lines to create a high-speed connection directly to your phone company's office. These devices are usually external and connect to the systems unit using either a USB or an Ethernet port.

DSL (digital subscriber line)

optical discs that store movies or software are known as....

DVDs

These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel

Data Transmission specifications

Transaction Processing System (TPS) are also known as...

Data processing systems (DPS)

concerned with protecting software and data from unauthorized tampering or damage.

Data security

provides a flexible tool for analysis. It helps middle class mangers and others in the organization analyze a wide range of problems, such as the effect of events and rends outside the organization. Like MIS, it draws on the detailed data of the transaction processing system

Decision Support System (DSS)

the process of converting from analog to digital

Demodulation

what attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data?

Denial of Service attack (DoS)

provided by telephone compaines usuing existing telephone lines to provide high speed conection. (must faster then dial up)

Digital subscriber line (DSL) service

the standard optical discs in PCs

Digital versatile discs (DVDs)

improves hard-disk performance by using cache anticipating data needs. Acts as a temporary high-speed holding area between a secondary storage device and the CPU

Disk Caching

the most common standard is known as ....

Ethernet

LANs using Ethernet are sometimes referred to as ____________.

Ethernet LANs

a cable that are often used in networks and to variety of comments to the system unit.

Ethernet cables

protects email messages as they move across the Internet

Email encryption

many employers check their employees electronic mail and computer files using what?

Employee-monitoring software

also known as the executive information system (EIS), this is an easy to use system that presents information in a very highly summarized form. It helps top level managers oversee the company's operations and develop strategic plans. It combines the databases generated from the TPS and the reports generated from the MIS with external data.

Executive Support System (ESS)

a type of artificial intelligence that uses a database to provide assistance to users.

Expert Systems/ knowledge based systems

another name for knowledge based systems

Expert systems

increases storage capacity by reducing the amount of space required to store data and programs

File Compression and File Decompression

protects sensitive fils by encrypting them before they are stored on a hard drive

File encryption

another name for a USB drive is a ____________.

Flash Drive

Solid- State Storage provides access to _______________________, also known as solid- state storage.

Flash Memory

offers a combination of features of RAM and ROM. Like RAM it can be updated and like ROM it does not lose information when a computer is turned off.

Flash Memory

small solid-state storage devices widely used in portable devices.

Flash Memory Cards

Under what act are you entitled to look at your records held by government agencies (portions may be delated for national security reasons)?

Freedom of Information Act

devices that use that information to uniquely determine the geographic location of the device

Global positioning system (GPS)

reliable, detect obvious and common errors, and are well documented. The best way to create them is to write structured programs.

Good programs

protects personal finance information

Gramm-Leach-Biley Act

restricts disclosure of educational records

Family Educational Rights and Privacy Act (FERPA)

Use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk. Because they are easily removed, they are useful to protect or secure sensitive information

External Hard drives

a private network that connects more than one organization. Used to allow suppliers and others limited access to their networks.

Extranet

True or False: File Compression is limited to hard-disk systems.

False, File Compression is NOT limited to hard-disk systems

True or False: All spyware goes detected

False, a lot of spyware goes undetected because they user is unaware it is there.

true or false: Trajan Horses are viruses

False, they are NOT viruses

save files by altering the magnetic charges of the disk's surface to represent 1's and 0's

Hard Disks

Because Hard Disks are sensitive thin instruments, a ___________ could occur.

Head Crash

occurs when a read-write head makes contact with the hard disk's surface of with particles on its surface (exs: smoke particles, fingerprints, dust, or human hair)

Head Crash

Protects medical records

Health Insurance Portability and Accountability Act (HIPAA)

uses nodes to link and structure fields and records; entires may have one parent node with several child nodes in a one-to-many relationship

Hierarchical database

________________ include locations, or address pf sites that you have recently visited.

History Files

Common key fields (primary keys) include:

ID numbers and driver's license numbers

Every computer on the Internet has a unique numeric address called a ______________.

IP Address (Internet protocol address)

________ can be used to trace internet activities to their origin allowing computer security experts and law enforcement officers to investigate computer crimes.

IP Address's

one of the fastest growing crimes in the country and can financially devastate its victim.

Identity Theft

the illegal assumption of someones identity for the purpose of economic gain.

Identity Theft

used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances. This bandwidth id capable of very high speed data transfer.

Medium Band

Google Chrome's Privacy Mode is known as...

Incognito Mode

distribute, communicate, and create information. they are the organizations administrative assistants, clerks, engineers, and scientists.

Information Workers

Unlike radio waves, __________ uses infrared light waves to communicate over short distances.

Infrared

Solid- state drives (SSD's) are designed to be connected where?

Inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data.

work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic.

Instruction detection systems (IDS)

Many organizations today employ ______________ to support effective communication within and between organizations using intranets and extranets.

Internet Technologies

a private network within an organization that resembles the internet.

Intranet

the field in a record that uniquely identifies each record

Key field (primary key)

What does LTE stand for?

Long Term Evolution

maleware is short for what?

Malicious software

summarizes the detailed data of the transaction processing system in standard reports for middle- level managers. Such reports might include weekly sales and production schedules.

Management Information System (MIS)

the tremendous amount of secondary storage required by large organizations

Mass Storage

This Topology is the newest type and does not use a specific physical layout (such as a star or a tree). Rather, this network requires that each node have more than one connection to the other nodes. The resulting pattern is a mesh.

Mesh Network

spanning distances up to 100 miles, these networks are frequently used as links between office building that are located throughout a city.

Metropolitan area networks (MAN)

What is the most widely used project manager?

Microsoft Project

uses high frequency radio waves. It sometimes referred to as line-of-sight communication because it only travel in a straight line. They can only be transmitted over short distances

Microwave communication

the name of the process of converting from digital to analog

Modulation

the word modem is short for what?

Modulator- demodulator

this type of database extends two- dimensional relational tables to three or more demsoins, sometimes called a data cube!!!

Multidimensional database

a computer specialist responsible for efficient network operations and implementation of new members

Network Administor

control and coordinate the activities of all computers and other devices on a network (these activities include: electronic communication and the sharing of information and resources)

Network Operating systems (NOS)

describes the physical arrangement of a network

Network Topology

describes how a network is arranged and how resources are coordinated and shared.

Network architecture

this type of database stores data, instructions, and unstructured data. Data is organized using classes, objects, attributes, and methods.

Object- Oriented database

focuses less on procedures and more on defining relationships between previously defined procedures or objects.

Object- oriented software development

include locating and correcting errors, improving usability, and standardizing software.

Operations

In this type of technology, a laser beam alters the surface of a plastic or metallic disc to represent data.

Optical Disc Technology

In this strategy, nodes have equal authority and can act as both clients and servers.

Peer-to-peer (P2P)

the new system is periodically evaluated to ensure that it is operating efficiently. This is known as...

Periodic Evaluation

reports that are produced at regular intervals --- weekly, monthly, or quarterly

Periodic reports

concerned with protecting hardware from any possible human damage and natural disasters

Physical Security

RAM is sometimes referred to as what?

Primary Storage

___________ concerns the collection and use of data about individuals.

Privacy

Safari's Privacy Mode is known as...

Private Browsing

consists of specifying 5 tasks related to objectives, outputs, inputs, requirements, and documentation.

Program specification (program definition or program analysis)

a 6 step procedure for creating programs

Programming (software development)

what instructs a computer to perform specific operations?

Programming Langauges

programs designed to schedule, plan, and control project resources.

Project Managers

Before data can be processed or a program can run, it must be in ____________.

RAM

holds or stores data and programs that the CPU is presently processing

RAM (random access memory)

uses powerful development software, small specialized teams, and highly trained personnel. Typically, the development costs more. However, the time is much less and the quantity is often larger

Rapid Applications Development (RAD)

discs that cannot be written on or erased by the user

Read Only (ROM) exs: CD's, DVDs, Blu-Ray

improve performance by expanding external storage, improving access speed, and providing reliable storage. They are linked and inexpensive

Redundant array's of inexpensive disks (RAID)

discs similar to write-once discs except that the disc surface is not permanently altered when data is recorded

Rewritable ex: storing and sharing audio, video, and large multi media presentations

Topology where each device is connected to two other devices, forming a ring. When a message is sent, it is passed around he ring until it reaches the intended destination

Ring Network

imitate free networks at restaurants, coffee shops, etc.

Rogue WiFi hotpots

uses satellites orbiting about 22,000 miles above the earth as microwave relay stations.

Satellite communications

uses satellites to provide wireless connections. While slower the DSL and cable, they are available almost anywhere using a satellite- receiving disk.

Satellite connection services

hey originate messages in the form of data, information, and/or instructions (ex: a computer)

Sending and receiving data

unlike hard disks which rotate and have read/write heads that move in and out, ________________________ devices have no moving parts.

Solid- State Storage

When a head crash occurs, the surface of the disk is scratched. This causes what?

Some or all of the data to be destroyed

Topology where each device is connected to a central network switch. Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. This network is the most widely used today.

Star Network

an architecture to link remote computer storage devices, such as enterprise storage systems, to a computer such that the devices are as available as locally attached drives

Storage Area Network (SAN)

a way of coordinating the sharing of information and resources.

Strategy

Violations of the rules of programming language

Syntax Errors

In a _______________, data is collected about the present system. The focus is on determining the requirements for a new system.

System analysis

In what phase does a new or alternative information system get designed?

Systems design

One of the most common infrared devices is the ________

T.V. remote control

optical carrier (OC) have largly replaced what?

T1 lines that could be combined to form higher- capacity options known as T3 or DS3 lines

Whenever you visit a website, these files are saved by your browser. If you leave a site and then return later, these files are used to quickly redisplay web content

Temporary Internet Files (browser cache)

makes it illegal to deactivate or otherwise disable any anti piracy technologies including DRM technoliges. the act also establishes that copies of commercial programs may not be legally resold or given away. It further makes it a crime to sell or use programs or devices that are used to illegally copy software.

The Digital Millennium Copyright Act

What is the widest of al WAN's?

The Internet (spans the entire globe)

What is one way that File Compression programs do there job?

They search for repeating patterns, leaving enough tokens so that the original can be rebuilt or decompressed (these programs shrink them to a quarter of their original size)

programs that appear to be harmless, however, contain Malicious programs

Trajan Horses

record day-to-day transactions, such as customer bills, orders, inventory levels, and product output. It helps supervisors by generating databases that at as the foundation for the other information systems

Transaction Processing System (TPS)

Topology where each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes, and so forth, forming a treelike structure. This network, also known as a hierarchical network, is used to share corporate wide data.

Tree Network

Trojan horses secretly install a virus on the computer system.

True

True or False: Disk Caching requires a combination of hardware and software.

True

True or False: RAID is often used by Internet servers and large organizations because the storage capability, fast access speed, and high reliability.

True

True or False: SSD's are more expensive and generally have a lower capacity than hard disks

True

True or False: USB drives/Flash Drives are some compact that they can be transported on a key ring.

True

consists of pairs of copper wire that are twisted togther. (both telephone lines and Ethernet Cables use this)

Twisted Pair

these drives connect directly to a computers USB port to transfer files and can have captivities from 1 GB to 256 GB

USB Drives/Flash Drives

a term relating to sending data to a satellite

Uplink

encrypt connections between company networks and remote users such as workers connecting from home. this connection creates a secure virtual connection to a company LAN across the Internet

Virtual Private Networks (VPNs)

create a secure private connection between remote user and an organization's internal network. Special VPN protocols create the equivalent of a dedicated line between a user's home or laptop computer and a company sever.

Virtual private networks (VPN)

programs that migrate through networks and operating systems attaching themselves to different programs and databases altering and or delating files.

Viruses

used for standard telephone communication. Personal computers with telephone modems and dial up service use this bandwidth. While effecting for transmitting documents, it is too slow for many types of transmission, including high quality video and audio.

Voiceband

what is the most widely sued wireless network encryption for home wireless networks?

WPA2 (WiFi protected Access)

another name for a wireless modem is...

WWAN (wireless wide area network)

secures web transactions, especially financial transactions.

Website encryption

uses high- frequency radio signals to transmit data

Wi-Fi (wireless fidelity) Commmuncation

a new standard that extends the range of wifi networks using microwave connecitons

WiMax (worldwide interoperability for microwave access) Communcation

countrywide and worldwide networks that provide access to regional service (MAN) providers and typically span greater than 100 miles.

Wide area networks (WANs)

a wireless local area network is typically referred to as a _____________.

Wireless LAN (WLAN)

uses radio frequencies to connect computer and other devices

Wireless LAN (WLAN)

restricts access to authorized users on wireless networks

Wireless Network Encryption

a computer infected by a virus, worm, or trojan horse is known as a....

Zombie

a computer criminal who creates and distributes malicious programs.

a cracker

What is the key to a SAN?

a high speed network, connecting individual computers to mass storage devices

a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or sending their time and money for little or no return

a scam

refers to money the company owes it suppliers for material snd services it has received

accounts payable

recorded money received from or owed by customers

accounts receivable activity

simply a scam using the internet

an internet scam

Optical Discs are read by what? How does this object read them?

an optical disc drive reads the discs using a laser that projects a tiny beam of light on these areas

telephones typicall send and receive ______________, which are continuous electronic waves.

analog signals

programs designed to detect and remove various types of privacy threats

anti-spyware or spy removal programs

the data fields an objet posses (part of object oriented database)

attributes

a measurement of the width or capacity of the communication

bandwidth

Using secondary storage devices, data and programs can what?

be retained after the computer has been shut off

the ever-growing volume of data is often referred to as....

big data

devices such as finger scanning or eye scanning

biometric scanning

some optical discs, referred to as double-sided discs, containing information on....

both sides and need to be flipped over to read the other side

a collection of zombie computers is known as a....

botnet or robot network

harness the combined power of zombies for Malicious activities like password cracking or sending junk mail.

botnet or robot network

another name for Temporary Internet Files is...

browser cache

How do user interact with Expert Systems/ knowledge based systems?

by describing a particular situation or problem. the expert takes the inputs and searched the known base until a solution or recommendation is formulated.

How is secondary storage accomplished?

by writing files to and reading files from secondary storage devices

a modem that uses the same coaxial cable as your television. It connects to the systems unit using either a USB or an Ethernet port.

cable modem

provided by cable television companies using their existing television cables. (these connections are usually faster then DSL)

cable service

what do mass storage devices allow large organizations to do?

centralize their maintenance and security of data, thereby reducing costs and personnel

a node that requests and uses resources available from other nodes

client

_____________ is when the interent acts as a "cloud" of servers that supply applications to clients as a service rather than a product.

cloud computing

a high frequency transmission cable, replaces the multiple wires of telephone lines with a single solid copper core

coaxial cable

used to deliver television signals as well as to connect computers in a network

coaxial cable

writing a program is known as what?

coding

electronic systems that transmit data from one location to another

communication systems

the process of sharing data, programs, and information between two or more computers

computer communications

guidelines for the morally acceptable use of computers in our society

computer ethics

a communication system that connects two or more computers so they can exchange information and share resources.

computer network

provide automation and assistance in program design, coding, and testing.

computer- aided software development (CASE)

a concept related to using computer networks to link people and resources

connectivity

acquiring hardware involves what?

consideration for future company growth, existing networks, communication capabilities, and training.

systems implementation is also known as what?

conversion

small data files that re deposited on your hard disk from websites you have visited . Based on your browser's settings, these can be accepted or blocked.

cookies

a legal concept that gives content creators the right to control use and distribution of their work

copyright

the use of the Internet to send or post content intended to hurt or embarrass another person

cyber bullying

any criminal offense that involves a computer and a network

cybercrime or computer crime

A ____________ runs through each track of a stack of platters.

cylinder

finding entry into someones computer network and leaving a prankster message is known as what?

data manipulation

a technique for searching and exploring databases for related information and patterns

data mining

data warehouses support what?

data mining

The Information Workers who are involved with the distribution and communication of information are known as what?

data workers

computer professionals who help define processing rights

database administrators (DBA's)

the software for creating, modifying, and gaining access to the database

database management system (DBMS)

DBMS programs are designed to work wit specific data structures or _________________.

database models

these models define rules and standards for all the data in the database.

database models

a collection of integrated data- logically related files and records

datebase

a process of testing and eliminating errors in a program

debugging

the opposite of a periodic report. It is produced on request.

demand report

refers to how tightly these charges can be packed next to one another on a hard disk

desnity

using existing telephone's and telephone modems to connect to the internet.

dial-up service

uses software to try thousands of common words sequently in an attempt to gain unauthorized access to a user's account

dictionary attack

most large organization have ______________ describing ways to continue operating until normal computer operations can be restored.

disaster recovery plans

what converts a text-based address into a numeric IP address?

domain name server (DNS)

refers to receiving data from a satellite

downlink

Using publicly available databases and in many cases nonpublic databases, information resellers create ___________.

electronic profiles

highly detailed and personalized descriptions of individuals

electronic profiles

the process of coding information to make it unreadable except to those who have a special piece of information known as a encryption key or simply a key.

encryption

most large organizations have established a strategy called _________ to promote efficient and safe use of data across the networks within their organizations

enterprise storage system

this type of hard disk provides slower access and typically connect to a USB or Thunderbolt port on the system unit and are easily removed.

external

transmits data as pules of light through tiny tubes of glass

fiber-optic cable

act as a security buffer between a corporation's private network and all external networks, including the internet

firewall

a cookie that is generated (and then read) only be the website you are currently visiting.

first party cookie

keeps track of all summaries of all the foregoing transactions

general ledger

Some DSS's are specifically designed to support more than one or a tea, of decision makers. These systems are known as _________________.

group decision support systems (GDSS)

someone who gains access to our computer that contains information about us

hacker

LANs used by individuals in their homes and apartments are known as...

home networks

any computer system connected to a network that provides access to its resources

hot

wireless access points that provide Internet access are widely available in public places such as coffee shops, colleges, and bookstores. These access points are known as ______________ and typically use Wi-Fi technology.

hotspots

what is the most widely used protocol?

https

a ___________ previously filled the purpose of a switch by sending a received message to all connected nodes, rather then just the intended node.

hub

https is known as a what?

hyper transfer protocol secure

the concept that people think that because they are using their own computer and are selective about disclosing their names or other personal information that little can be done to invade their personal privacy is known as...

illusion of anonymity

transfer rate is measured how?

in millions of bites per second (Mbps)

show a company's financial performance (income expenses, and the difference between them for a specific time period)

income statements

a vast industry of data gatherers is known as ___________________ now exists that collects, analyzes, and sells personal data

information resellers or information brokers

where is an internal hard disk located?

inside the unit system

While __________ hard disks have fast access, they have a fixed amount of storage and cannot be easily removed from the system unit

internal

keeps records of the number of each kind of part or finished good in the warehouse

inventory control system

___________ in different files can be used to integrate the data in a database

key fields (primary keys)

tables can be connected (related ) to other tables by what?

key fields (primary keys)

A type of Computer monitoring software that records every activity and keystroke made on your computer system (this includes credit card numbers, passwords, and email messages)

keystroke logger

The database known as ___________ contains facts and rules to relate these facts distilled from a human expert.

knowledge base

The Information Workers who are involved with the creation of information are known as...

knowledge workers

networks with nodes that are in close physical proximity-- within the same building for instance-- are called....

local area networks (LAN's)

incorrect calculations or producers

logic errors

instructions for retrieving or manipulating attribute values (part of object oriented database)

methods

when an electronic profile of one person is switched with another this is known as .....

mistaken identity

To convert digital signals to analog signals and vice vera, you need a ______________.

modem

enables personal computers to communicate across different media, including telephone wires, cable lines, and radio waves.

modem

a device that allows one LAN to be linked to other LANs or to larger networks

network gateway

any device that is connected to the internet (ex: computer, printer, or data storage)

node

Object-oriented programming (OOP) is a process by which a program is divided into modules called ________________.

objects

specific instances of a class that can contain both data and instructions to manipulate the data (part of object oriented database)

objects

The most common types of trojan horse appear where?

on free computer games and free screensaver programs that can be downloaded from the Internet.

the information that people voluntarily post about themselves online

online identity

Before information is sent across the Internet, it is reformatted or broken down into small parts called _________.

packets

_________________ help you create a strong password.

password managers

secret words or phrases that must be keyed into a computer system to gain access

passwords

software updates are known as what?

patches

activity concerned with calculating employee paychecks

payroll

these networks make it possible for wireless devices to interact with each other.

personal area Network (PAN)

a type of wireless network that works within a very small area (your immediate surroundings)

personal area Network (PAN) -they connect cell phones to head sets and key boards to computers

a technique often used by internet scammers is _____________.

phishing

attempts to trick Internet users into thinking fake but official looking website or e-mail is legitimate.

phishing

representing some other person's work an ideas as your own without giving credit to the original source

plagerism

one who plagerizes is a ....

plagiarists

determines the need for a new information system

preliminary investigation

a mode that ensures that your browsing activity is not recorded on your hard disk

privacy mode

databases offer a great opportunity for increased _____________; however, security is always a concern.

productivity

By evaluating the source and the content of each communication, the ______________ decides whether it is safe to let a articular message or file pass into or out of the organization's network.

proxy server

all communications between a company's internal network and the outside world pass through what?

proxy server

a form that shows the name if the company supplying the material or service and what is being purchased

purchase order

the buying of materials and services is known as what?

purchasing

Most wireless connections use what to communicate?

radio waves

Unlike hard disks which use magnetic charges to represent 1's and 0's, optical discs use _____________.

reflected light

A table and its data are called a.....

relation

data is stored in tables (relations); related tables must have a common data item (key field).

relational database

Hard Disks use _________________ that are stacked one on top of another.

rigid metallic platters

a node that forwards or routes data packets from one network to their destination in another network

router

records the customers requests for the company's products or services

sales order processing activity

Provides permanent or nonvoliate storage

secondary storage

Each track on a Hard Disk platter is divided into invisible wedge-shaped sections called ____________.

sectors

_______________ involves protecting individuals and organizations form theft and danger

security

provide a collection of utility programs designed to protect your privacy and security while you are on the web

security suites

a node that shares resources with other nodes (they perform specialized tasks...depending on the task they may be called an application server, communication sever, database server, file server, printer server, or a web server)

server

Like internal storage, external storage has a fixed amount of storage. HOWEVER...

since since each removable port can be easily replaced by another removable hard disk, a single port on the system unit can provide access to an unlimited amount of storage.

the unauthorized copying and/or distribution of software

software privacy

significant patches are called...

software updates

a wide range of programs that are designed to secretly record and report an individual's activities on the Internet

spyware

the most dangerous type of privacy threat comes in the form of what?

spyware

cloud computing provides what?

storage, also known as online storage

In programing design, a solution is designed using preferably ____________________.

structured programming techniques

What do internal hard disks do?

they store and retrieve large qualities of information quickly. They are used to store programs and data files. (ex: they store major applications such as Word and Excel)

a cookie that is usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next

third party cookie

hyper transfer protocol secure (https) is widely used to what?

to proetct the transfer of sensitive information

third party cookies are also known as ___________ because they are used by the advertising company to keep track of your web activity as you move from one site to the next

tracking cookies

rings of concentric circles on the Hard Disk platter are known as what?

tracks

The speed with which modems transmit data varies. This speed is known as...

transfer rate

TCP/IP stands for what?

transmission control protocol/internet protocol

True or False: Lower level generations are closer to 1's and 0's and higher level are closer to the language of humans

true

True or False: The name Blu- ray comes form a special blue-colored resolutions

true

true or false: worms can carry viruses

true

In a SAN system, the ______________________ provides the file system for storing data, but the SAN provides the disk space for data.

users computer

how is the new system tested?

using sample data

How do Hard Disks store and organize files?

using tracks, sectors, and cylinders

computer systems that allow people located at various geographic locations to communicate and have in-person meetings

videoconferencing systems

The amount of light reflected on an optical discs determines what?

weather the area represent 1's or 0's

invisible images or HTML code hidden within a web page or email message

web bugs

programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed down or stopped.

worms

unlike a virus, ____________ typically do not attach itself to a program or alter and/or delate files.

worms

discs that can be written once. After that, the disc can be read many times but cannot be written or erased

write- once ex: CD-R (used for storing family photos), DVD-R (used to store home movies)


Conjuntos de estudio relacionados

MTG 315: Ch 9 (Market Segmentation, Targeting & Positioning)

View Set

Marketing Ch5, Marketing Chapter 6

View Set