IFT 100 Tech in Action (Chapter 1-13)
flash memory
"Portable, nonvolatile memory."
Secure Sockets Layer
A network security protocol that provides for the encryption of data transmitted using the Internet (s --> https)
Secure Sockets Layer (SSL)
A network security protocol that provides for the encryption of data transmitted using the Internet. The current versions of all major web browsers support SSL.
virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.
Swift
A new programming language introduced by Apple for developing for iOS and OS X.
comment
A note left by a programmer in the program code to explain the purpose of a section of code, to indicate the date the program was written, or to include other important information about the code so that other programmers can more easily understand and update it.
decision point
A place where a program must choose from a list of actions based on the value of a certain input.
intranet
A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
proxy server
A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
application server
A server that acts as a repository for application software.
print server
A server that manages all client-requested printing jobs for all printers on a network.
database server
A server that provides client computers with access to information stored in databases.
keywords
A set of words that have predefined meanings for a particular language.
service pack
A software update.
token
A special data packet used to pass data in a ring topology network.
wireless network interface card (wireless NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access.
jam signal
A special signal sent to network nodes alerting them that a data collision has occurred.
editor
A special tool in an integrated development environment (IDE) that helps programmers as they enter code.
editor
A special tool that helps programmers as they enter the code, highlighting keywords and alerting them to typos.
digital signal processor
A specialized chip included in the cell phone to handle the compression work.
high definition
A standard of digital TV signal that guarantees a specific level of resolution and a specific aspect ratio, which is the rectangular shape of the image.
Internet Society
Professional membership group that provides leadership for the orderly growth and development of the Internet.
If you want to change the amount of space set aside on your hard drive for deleted files, what should you do?
Right-click the Recycle Bin, choose Properties, and adjust the allocated amount.
If you do not want the Delete File dialog box to appear each time you delete a file, what should you do?
Right-click the Recycle Bin, choose Properties, and clear the Display delete confirmation dialog check box.
Although it might not be a good idea, how do you turn off the Recycle Bin so that files you delete from your hard drives are permanently gone, without having to manually empty the Recycle Bin?
Right-click the Recycle Bin, choose Properties, and select the Do Not Move Files to the Recycle Bin. Remove Files Immediately When Deleted check box.
The ____ topology uses tokens to control data transmission
Ring
Which protocol is used to transmit e-mail over the internet?
SMTP
MetaSearch Engines
Search other engines rather than individual websites (ie DogPile)
domain name
Simply a name that takes the place of an IP address, making it easier for people to remember.
Network
Simply two or more computers that are connected via software and hardware so they can communicate with each other
Desktop Computer
Single Location use (Stationary) and usually come with a system unit
What do you call the output of a Processing Language Project?
Sketch
Social Commerce
Subset of e-commerce that uses social networking to assist in marking and purchase products
tethering
Approach which makes sure that as long as you have a 3G signal, your computer can access the Internet even when it tells you there are no available wireless networks. Several smartphones offer this capability.
__________ is a microcontroller popular in the Maker Movement.
Arduino
Which of the following statements is TRUE?
Arduino boards are inexpensive.
Spear Phishing Emails
Are sent to people known to be customers of a company and have a much greater chance of successfully getting people to reveal information or data
Crowdfunding
Asking for small donations from a large number of people, often using the Internet; a style of generating capital start a business through social media (ie Kickstarter)
Where would you enter the email address for a person whom you do not want the recipient to know you are including with the message?
Bcc: line
classless interdomain routing (CIDR)
Because the unique IP addressing system offers only a fixed number of IP addresses, a different addressing scheme known as classless interdomain routing (CIDR) allows a single IP address to represent several unique IP addresses by adding a network prefix (a slash and a number) to the end of the last octet.
beta version
Before its final commercial release, software is often provided free or at a reduced cost in a beta version to certain test sites or to interested users. By providing users with a beta version of software, programmers can collect information about the remaining errors in the code and make a final round of revisions before officially releasing the program.
Computer Literate
Being familiar enough with computers that a user knows how to use them and understands their capabilities and limitations
Who was the Founders of Microsoft
Bill Gates and Paul Allen
A(n) ______ decision point is answered in one of two ways: yes (true) or no (false)
Binary
Which is NOT one of the three features in a loop?
Binary decision
Bits vs Bytes
Binary digits/Bits - 0 and 1 Bytes: Combination of eight binary digits
Which of these is an optical storage device?
Blu-ray drive
When you wish to send an email message to multiple parties, you enter their addresses in the To: line separated by which of the following?
Commas
High-defined multimedia interface (HDMI) Port
Compact audio-video interface that allows both HD video and uncompressed digital audio to be carried on one cable
Peripheral Device
Component that connects with computer (ie. Monitor or Keyboard)
Fiber-optic cable
Composed of glass or plastic fiber.
Freeware
Copyrighted software for free
Electrical Switches
Devuces inside computer that flipped between the two states of 1 and 0, on and off (1 = On, 0 = Off)
When packets are sent through the Internet, all data packets are sent through the same route.
False
DDR5
Faster data transfer rate
original IP addressing scheme
IPv4
Domain Name
Identifies a host
negative acknowledgment (NAK)
If the packet is unreadable (damaged in transit), then Y sends a negative acknowledgment (NAK) to X, indicating the packet was not received in understandable form. X then retransmits that packet.
Stopping Virus Execution
If the software detects a virus signature or suspicious activity, such as the launch of an unknown macro, it stops the execution of the file and notifies you. Quarantined (delete or fix)
if else
In C++, a binary decision in the code where the program can follow one of two paths: If the decision is made one way, the program follows one path; if made the other way (else), the program follows another path.
element
In HTML, a pair of tags and the text between them.
For
In Visual Basic, programmers use the keyword For to implement a loop; after the keyword For, an input or output item is given a starting value, and then the statements in the body of the loop are executed.
Next
In Visual Basic, programmers use the keyword Next to implement a loop; when the Next command is run, the program returns to the For statement and increments the value of the input or output item by 1 and then runs a test cycle.
passive topology
In a network, a type of topology where the nodes do nothing to move data along the network.
active topology
In a network, a type of topology where the nodes participate in moving data through the network.
open system
In an open system, its design would be made public for access by any interested party.
positive acknowledgement (ACK)
In data exchange, the confirmation sent from one computer or system to another saying that the computer has received a data packet that it can read.
behaviors
In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.
data
In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.
methods
In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.
classes
In object-oriented analysis, the categories of inputs that are part of the problem the program is trying to solve are called classes.
derived class
In object-oriented analysis, the modified class.
base class
In object-oriented analysis, the original class.
Aggregator
Locates all RSS series to which you've subscriped and automaticallt downloads new content to your computer
File Path
Location of file
Host
Location that maintians the computers that store the web files
Phishing
Lures internet user to reveal personal information
Network adapters send data packets based on a(n)
MAC address
Which of the following specifications is used to simplify attachments to e-mail messages?
MIME
protocol used for sending attachments with e-mail
MIME
Processing is an open source platform developed by ________ to make programming available to artists.
MIT
Solid-State Drive (SSD)
No moving parts --> more efficient, run without noise, emits little heat and requires low power
Will SMTP keep my e-mails safe?
No, SMTP cannot keep your e-mails safe, but there are other security measures like encryption that can keep your e-mails safe.
Do instant messaging (IM) services use secure data transmission software to provide security of data exchanged?
No, most instant messaging services don't use secure data transmission software. Hence it is not safe to exchange important data over IM.
Once compilation is done, is the program finished?
No, programmers still need to test the code to see whether the program behaves as it should.
Turing Machine
Not real machine, hypothetical model that mathematically defined a mechanical procedure (algorithm) By Alan Turing (1936)
Data Breach
Occurs when information is copied, transmitted or viewed by individuals who isn't authorized to handle the data
Pharming
Occurs when malicious code is planted on computer either by virus or website. Alters browser ability to find pages or directed to bogus sites
Plagiarism
Occurs when you use someone else's idea or words and represent them as your own
Hexadecimal Notation
Power of 16 (0-9 as well as A-F)
Single Core vs Dual Core
Processing Paths that processor had Single: One instruction at a time Dual: Two instruction at a time
field
a field where a category of information in a database is stored. Fields are displayed in columns.
data dictionary (database schema)
a file that defines the name, data type, and length of each field in the database.
Cache Memory
a form of random access memory that is more accessible to the CPU than regular RAM
A macro is __________.
a small computer program
decision support system (DSS)
a system designed to help managers develop solutions for specific problems.
transaction-processing system (TPS)
a system used to keep track of everyday business activities (such as sales of products).
Ethical decisions in business affect which of the following?
all stakeholders
XML and JSON
allow web services to exchange information.
Which computer was touted as the first personal computer?
altair
IPv6 uses 32 bits to assign
an address to every device connected to the internet
data type (field type)
an attribute of a data field that determines what type of data can be stored in the database field or memory location.
Scope Creep
an ever-changing set of requests from clients for additional features as they wait longer to see a working prototype
The System Image utility creates an image of your operating system, program files, and data files to __________.
an external hard drive
field name
an identifying name assigned to each field in a database.
database administrator (database designer)
an individual trained in the design, construction, and maintenance of databases.
database query
an inquiry the user poses to a database to extract a meaningful subset of data.
The Sound Byte suggests a network technician needs all of the following EXCEPT __________.
anger management
A(n) ____ server acts as a repository for software such as Microsoft Office.
application
acts as a repository for software such as Microsoft Office
application server
ALL cellphones
are computers
The main paths of the Internet
are known collectively as the Internet backbone; which is a collection of large national and international networks.
Private-key encryption and public-key encryption
are the two basic types of encryption.
Logical Ports
are virtual communication gateways or paths that allow a computer to organize requests of information (webpage download/email route)
Flow Charts
are visual diagrams of a process including the decisions that need to be made along the way
Which of the following is NOT one of the basic functions of malware?
backdoor control of your computer
Incremental(Partial) Backup
backing only files that have changed or have been created since the last backup (saves time)
Which of the following is used to increase security on a client/server network?
bastion host
Windows Firewalldoes all of the following EXCEPT__________.
blocks spam
Viruses that load from USB drives left connected to computers when computers are turned on are known as
boot-sector viruses
A __________ is specifically designed to transfer data between collision domains.
bridge
Pop-ups
can be legitimate and increase the functionality of the originating site
Which of the following is an advantage of installing a client/server network in a business?
centralization of network security protection
When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers.
client/server
Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet.
cloud
Where to store backups
cloud, external drives, Network-attached storage (NAS) - drive connected to a network of computers instead of one
Encryption is used to
code your e-mail so only one person can decipher it
voip
communication services over public internet rather than over telephone network
The __________is often the only device on the network connected to the Internet.
communications server
In the client-server model, clients are phones or computers and servers are
computers hosting web pages. computers that are storehouses for files. computers with software allowing you to make purchases.
In the Sound Byte, we examined a program called Tickle where the programmer used the draw() routine to ______.
find the mouse position and move the text "tickle" by a random amount
Software designed to close logical ports in your computer is known as a(n)
firewall
What should you do if you spot unethical behavior at your workplace?
follow company procedures for reporting
Ergonomics is an important consideration
for all computing devices
referential integrity
for each value in foreign key of one table, there is a corresponding value in the primary key of the related table.
Processor
in a smartphone is not as fast or high-powered as a PC
binary large object (BLOB)
in databases, a type of object that holds extremely large chunks of data in binary form; this data is usually video clips, pictures, or audio clips.
relationship
in relational databases, the link between tables that defines how the data are related.
Data ________ ensures that the data contained in a database is accurate and reliable
integrity
All of the following are considered dedicated servers EXCEPT ____
internal servers
System
is a collection of pieces working together to achieve a common goal
DHTML
is a combination of technologies-HTML, cascading style sheets, and JavaScript.
System Repair
is a copy of files that you can use to boot your computer in case of Windows error
Trojan Horse
is a program that appears to be something useful or desirable, like a game or screen saver, but while it runs it does something in the background without your knowledge
Unethical behavior
is different from illegal behavior
Which of the following is NOT a major type of cybercrime reported to the IC3?
malware fraud
breaks information down into pieces that can take different paths
packet switching
A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.
passive
The easiest way to automate a task in Word is to __________.
perform the task while recording a macro
Examples of hacker threats to your computer include all of the following EXCEPT __________.
pharming
Which is NOT a tool hackers use to gain access to and take control of your computer?
phishing software
Geotaging
piece of data that attaches location information onto pictures. Uses Longitude and Latitude
Monitor screens are made up of millions of tiny dots known as
pixels
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
The field of psychology that theorizes that happiness results from ethical living is known as
positive psychology
GPS
powerful navigation aid
When an OS processes tasks in a priority order, it is known as
preemtive multitasking
Transmission Control Protocol (TCP)
prepares data for transmission and provides for error checking and re-sending of lost data
User Datagram Protocol (UDP)
prepares data for transmission; lacks resending capabilities
The purpose of a token in a token ring network is to ____
prevent data collisions from occuring
Tokens are used in a token ring network to ________.
prevent data collisions from occurring
When only the two parties involved in sending a message have the code, this is called ____-key encryption
private
The _____ encryption, only the two parties involved in sending a message have the code to unlock the message
private-key
Before the decide which programming language to use or start writing code, programmers first develop a complete description of the task the program needs to accomplish, called the ____
problem statement
In VBA, a macro is called a __________.
procedure
Network Address Translation (NAT)
process to assign internal IP Addresses on the network
An interaction in Processing is the result of an action between the computer and the ______.
program
Backdoor program/rootkits
programs that allow hackers to gain access to your computer and take control without your knowledge
Providing adequate security on a corporate network involves all of the following except
proprietary software lockout
In the URL https://www.whitehouse.gov/blog, which part is considered the protocol?
protocol
A ____________ is designed to send information between two networks.
router
A hardware firewall is often built into a(n) __________.
router
A(n) ____ sends data between two networks
router
SMTP is
the protocol responsible for sending e-mail through the Internet.
Gibson Research Corp. grc.com
website that tests your computers vulnerability shieldsUP and Leaktest
When is it sufficient to use a list to organize data?
when the data is simple and can be organized in one table
method
The process of how a program converts inputs into the correct outputs.
Sector
Track is futher broken down into pie-shaoped wedges
one-to-one relationship
a database relationship in which one record in a data table has only one related record in another data table.
many-to-many relationship
a database relationship in which one record in a database table (A) can have many related records in another table (B), and any record in table B can have many related records in table A.
documentation
Description of the technical details of the software, how the code works, and how the user interacts with the program; in addition, all the necessary user documentation that will be distributed to the program's users.
Cat 6 cable
Designed to achieve data transfer rates that support a gigabit Ethernet Network
Multipartite
Designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.
User Interface
Desktop, icons, and menus that let you communicate with your computer
ASC II Code
Developed as the standard for computers from different manufacturers to exchange data (1963)
Control Program for Microcomputers (CP/M)
Developed by Gary Kildall OS designed for INtel 8080 chip
New Network Scheme
Developed with multiple paths so if one communication path is destroyed, the rest of the network would still be able to communicate (1964)
Before you can work with macros in Word or Excel, the __________ tab must be available.
Developer
Affective Computing
Developing systems that can recognize and stimulate human emotions (ie MACH)
Nonvolatile storage
Devices for permanent storage of instructions and data when the computer is powered off
data-flow diagrams
Diagrams that trace all data in an information system from the point at which data enters the system to its final resting place (storage or output).
Multimedia Software
Digital image- and video-editing software, digital audio software, and other specialty software required to produce computer games, animations and movies
An extranet allows for the exchange of large amounts of business data in a standardized electronic format.
False
Bus topology networks are becoming the most common type of network due to its efficiency.
False
Each of the four numbers in a dotted decimal number in an IP address is referred to as a quartet.
False
HTML is a monogramming language
False
HTML tags cannot be nested within each other
False
In a bus topology, only the device for which a signal is intended can hear the sent data signal
False
In private-key encryption, two keys are created-one for coding and one for decoding.
False
Switches are used to route data between two different networks
False
The Internet Society pays for a large portion of the Internet's infrastructure and funds research and development for new technologies.
False
The main advantage of a ring topology is that the failure of one computer does not affect the entire network
False
The three main cable types used in business networks are twisted-pair, coaxial, and electromagnetic cable.
False
Apple II
Featured color monitor, sound, and game paddles Had 4 KB of RAM Operating System on ROM Optional Floppy Disk to load programs (1977)
Information Technology (IT)
Field of study focused on the management and processing of information and the automatic retrieval of information
In ____ generation languages, problems are presented as a series of facts or constraints instead of as a specific algorithm
Fifth
Accounting Software
Help small business owners manage their finances more efficiently by providing tools for tracking accounts recievale and accounts payable
Personal Information Manager (PIM) Software
Helps you manage e-mails, contacts, calenders and tasks all in one place (ie EverNote)
Privacy
Hiding something and not being disturbed by others
DDR4
High-Performance Video Graphics
System Unit
Holds all the physical parts of the computer together, including the computer's processor (the brains), its memory, and the many circuit boards that help the computer function
Power Supply
Housed inside the system unit, transforms the wall voltage to the voltages required by computer chips
Ergonomics
How a user sets up his or her computer and other equipment to minimize risk or injury or discomfort
Clock Speed
How quickly the processor can work
Difference Engine
Huge Steam-powered mechanical calculator that Babbage designed to print astromnomical tables
HTML stands for _____
Hypertext Markup Language
What does HTML stand for?
Hypertext Markup Language
Commodore PET
IBM First PC (1977) Popular in Europe
All IP addresses must be registered with the _____, which is responsible for allocating IP addresses to network adminstrators
ICANN
Which of the following is NOT a TCP/IP protocol?
ICANN
SMTP, DHCP, and FTP are TCP/IP protocols
ICANN is the Internet Corporation for Assigned Names and Numbers.
A(n) ______ is a development tool that helps programmers write, compile, and test their programs.
IDE
IM (Instant Messaging) vs Texting
IM: Way to communicate in real time over the internet, was primary means to chatting with friends in real time --> Person has to be online Texting: You can do over a period of time --> not needing automatic response or even being online b/c messages saves
197.169.73.63 is an example of a(n) _____
IP address
Unique identification number identifying each computer, service, or other internet connected device
IP address
Internet Corporation for Assigned Names and Numbers (ICANN)
IP addresses must be registered with the ICANN, which is responsible for allocating IP addresses to network administrators, just as the U.S. Postal Service is responsible for assigning zip codes to geographic areas.
The original IP addressing scheme created in the early 1980's is called ____
IPv4
hexadecimal notation
IPv6 uses 8 groups of 16-bit numbers, referred to as hexadecimal notation (hex for short).
Paging
If the data or instruction in the swap file are needed later, the OS swaps them back into active RAM and replaces them in then hard drive's swap file with less active data or instruction
inheritance
In object-oriented analysis, the ability of a new class to automatically pick up all the data and methods of an existing class and then extend and customize those to fit its specific needs.
reusability
In object-oriented analysis, the ability to reuse existing classes from one project for another project.
public key
In public-key encryption, the key for coding is generally distributed as a public key.
key pair
In public-key encryption, two keys, known as a key pair, are created.
public-key encryption
In public-key encryption, two keys, known as a key pair, are created. You use one key for coding and the other for decoding. The key for coding is generally distributed as a public key.
Smartphone Memory.
In smartphones, ROM is used to hold the OS. Other phone data is stored in separate internal memory chips. For memory needs beyond the built-in memory chips, some smartphones use removable SD flash cards.
ROM
In smartphones, the OS is stored in the...
if else
In the programming language C++, the binary decision asking, for example, whether you worked enough hours to qualify for overtime pay would use the keywords if else. At this point in the code, the program can follow one of two paths: If you indicated through your input that you worked fewer than or equal to eight hours, it takes one path; if not (else), it follows another.
for
In the programming language Visual Basic, programmers use the keywords For and Next to implement a loop. After the keyword For, an input or output item is given a starting value. Then the statements, or "sentences," in the body of the loop are executed. When the command Next is run, the program returns to the For statement and increments the value of the input or output item by 1.
Which of the following can record information you type, such as passwords and credit card information?
Keystroke logger
How much is a Byte?
Kilobyte (KB): 1,000 bytes Megabyte (MB): 1 million bytes Gigabyte (GB): 1 billion bytes Terabyte (TB): 1 trillion bytes Petabyte (PB): 1,000 terabytes
Malicious Websites
Known as a drive-by download
Which of the following is NOT an HTML section?
LINK
Beginners All-Purpose Symbolic Instruction Code (Basic)
Language that beginning programming student sound easily learn (Revolutionized software industry)
Botnet
Large group of software programs (robots/bots) that runs autonomously on zombie computers
Parallel Processing
Large network of computers, with each computer working on a portion of the same problem simultaneously (Divide Task)
Internet
Largest computer network in the world Develop in 1950 during the Cold War (1958)
First Generation
Last to use vacuum tubes to store data
4G
Latest service standard and offer the fastest data-accessed speeds over cell-phone networks
Tax Preparation Software
Let you prepare you state and federal tax on you own (ie Turbo Tax)
Multiuser Operating System (Network Operating System)
Lets more than user access the computer system at a time by handling and prioritizing request from multiple users
Drawing Software (Illustration Software)
Lets you create or edit 2-D, line based or original non-photographic drawings, animations and illustration (ie Adobe Illustrator)
Input Device
Lets you enter data (ie text, images and sound)
System Restore
Lets you roll your system back to a specific date when everything was working properly
Levels of Cache
Level 1: Built on CPU chip Level 2: Located on CPU or slightly further away on a separate chip Level 3: Right before data gets to RAM
Concurrent License
Limit the number of users accessing the software at any given time
Second Generation
Limited Transistors
An example of an open source OS is
Linux
Greyware
Most malware are intrusive, annoying or objectionable online programs that are downloaded to your computer when you install or use other online content such as a free program game or utility.
Mouse
Mouse: Input device used to enter user responses and commands Optical Mouse: Use an internal sensor or laser to detect the mouse's movement --> sensor sends signals to the computer, telling it where to move the pointer on the screen
Green Computing (Green IT)
Movement to encourage environmentally sustainable computing --> reduce overall carbon footprint of a company through strategic use of computing resources and environmentally friendly computing devices
Read/Write Head
Moves from outer edge of the spinning platter to the center, as frequently as 50 times per second, to retrieve (read) and record (write) the magnetic data to and from the hard drive platter
Streaming Media
Multimedia (audio and video) that is fed continuously fed to the browser to avoid waiting for the entire file to download completely before listening to or watching it
MIME stands for
Multipurpose internet mail extensions
UNIX
Multiuser, multitasking OS that is used as a netowrk OS, although it can be found on PCs
Breadcrumb Trail
Navigation aid that shows users the path they have taken to get to a web page or where the page is located within the website
wireless Internet service provider (or wireless ISP)
Needed to connect your smartphone to the Internet, just as you have an Internet service provider (ISP) for Internet access for your desktop or notebook computer.
What are the advantages of networking?
Networking enables one computer to send information to and receive information from another. A network enables the sharing of devices such as printers, scanners, fax machines, storage devices, and so on.
What was the first state to ban the use of a handheld phone while driving?
New York
Web 2.0
New collaborative, user created web, sometimes classified as social web, in which user is also a participant
Positive Psychology
New focus in field of psychology --> discover cause of happiness and applying them to everyday life
Which of the following characteristics of an email message should cause suspicion?
No Subject line
All-in-one computer
No System Unit b/c computer houses both the memory and processor (ie Apple iMac) --> Some come with monitor being touchscreen
Do database servers manage the network databases?
Not really. Database servers provide client computers with access to information stored in a database.
Word Size
Number of bits a computer can work on at a time
All data stored in computer is stored as
Numbers or bits
data
Numbers, words, pictures, or sounds that represent facts, figures, or ideas; the raw input that users have at the start of a job.
Smartphone use __________ display screens.
OLED
Disk Operating System (DOS)
OS that controlled the first Apple computers
reusability
Object-oriented analysis forces programmers to think in general terms about their problem, which tends to lead to more general and reusable solutions. An important aspect of object-oriented design is that it leads to reusability.
Unintentional Data Breaches
Occur when companies controlling data inadvertently allow it to be seen by unauthorized parties
Power Surge
Occur when electrical current is supplied in excess of normal voltage
Intentional Data Breaches
Occur when hackers break into digital systems to steal data
IPv4
Offers a fixed number of IP addresses.
Logical Port Blocking
Often configured to ignore requests that originate from the internet asking for access to certain ports.
short message service (SMS)
Often just called text messaging—is a technology that allows you to send short text messages (comprising up to 160 characters) over mobile networks.
documentation
Once testing is completed, but before the product is officially released, the work of documentation is still ahead. At this point, technical writers create internal documentation for the program that describes the development and technical details, how the code works, and how the user interacts with the program
After programmers finish coding, what do they do next?
Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler.
Thunderbolt Ports
One Thunderbolt port can allow to connect up to six different peripherals to you computer
binary decisions
One decision point that appears often in algorithms is like a "fork in the road" or a branch because it can be answered in one of only two ways: yes (true) or no (false).
Menu -Driven Interface
One in which you choose commands from menus displayed on the screen
Command-Drive Interface
One in which you enter to communicate with the computer system
Transmission Control Protocol(TCP)
One of the original two protocols developed for the Internet.
And how do I transfer files from a smartphone to my regular computer?
One way you can transfer your data from your smartphone to a computer is by using a USB cable.
And how do I transfer files from a smartphone to my regular computer?
One way you can transfer your data from your smartphone to a computer is by using a cloud storage service.
Two Primary types of System Software
Operating System Utility System
Windows
Operating environemnt that incorporstes a user-friendly, visual interface like the one that was first introduced with Apple's OS
Number System
Organized plan for representing a number
File Transfer Protocol (FTP)
Original design was to transfer files from a computer to a web server Today, often used when you have large files to upload or download
Projector
Output device for project images from you computing device onto a wall or viewing screen
Speakers
Output device for sound
Different types of (printers)
Output device that creates copies you can touch Nonimpact Printer: Inkjet printer sprays ink or uses laser beams to transfer marks onto paper Impact Printer: Tiny hammer-like keys that strike paper through an inked ribbon to make marks on the paper
All of the following are wireless technologies EXCEPT __________.
PDP-11
Which is NOT a common protocol used on the Internet?
PGP
public-key encryption package
PGP
Clock Speed
Pace measured in Gigahertz
How do packets travel through the Internet?
Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.
Element
Pair of tags and text between them.
Arithmetic Logic Unit (ALU)
Part of CPU designed to perform mathematical operations
web services
Part of the Microsoft .NET Framework, programs that a website uses to make information available to other websites.
Who are the founders of Microsoft?
Paul Allen Bill Gates
Stakeholders
People or entities who are affected by the operations of a business
Whistle-Blowers
People who report business to regulatory agencies for committing illegal acts, or who expose unethical (but still legal) acts committed by their employers by publicizing unethical behavir through various media outlets
CPU Usage
Percentage of time your CPU is working
Multitask
Perform more than one process at a time
Power-On Self-Test (POST)
Performs is to ensure that essential peripheral devices are attached and operational
Which of the following is a common language used to create CGI scripts?
Perl
Drive Bay
Permanent Storage device are located in your desktop or laptop computer in a space
network administrator
Person who maintains networks for businesses.
Classified Networks
Personal Area Network (PAN) Local Area Network (LAN) Home Area Network (HAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)
Apple I
Personal Computer and formation of Apple Company (1976)
Xerox
Photocopier manufacutreer designed own personal computer
Cloud Storage for Large Media Files:
Photos and videos tend to be large files. Cloud storage services like MediaFire and ADrive feature free accounts with large data capacity and good social media sharing tools.
Port
Place through which a peripheral device attached ti the computer so that data can be exchanged between it and the operating system
Bookmarks/Favorites
Places a marker of the site's URL in an easily retrievavle list in your browser's toolbar
decision points
Places where the program must choose from an array of different actions based on the value of its current inputs.
Platter
Plate
The Mac OS was the first commercially available OS to incorporate
Point and click technology
Optical Media
Portable strorage devices that use laser or light to read from, and even write to Cds, DVDs, or Blu-ray discs
What's on the motherboard?
Ports Memory (Ram) slots CPU sockets Expansion Slots Expansions Cards (Adapter Slot) - Circuit boards that provide additionally functionality Sound Card - Provides connection for speakers and microphone Video Card - Provides a connection for the monitor
If you forget to turn off your monitor when you aren't using it, which power scheme would be best to use?
Power Saver scheme
Binary Number System (Binary-2 number system)
Power of 2 --> On and Off
Database Software
Powerful application that let you store and organize data (ie Microsoft Access)
Word for MS-DOS --> Word Perfect
Precursor for Microsoft Word
Transmission Control Protocol
Prepares data for transmission and provides for error checking and resending of lost data.
Desktop
Primary working area
What manages all client-requested printing jobs for all printers on a network?
Print server
What web browser feature would be particularly useful when using public computers?
Privacy Browsing
System Evaluation
Process of looking at a computer's subsystem, what they do and how they perform to determine whether the computer system has the right hardware component to do what the user ultimately wants it to do
Data Mining
Process of searching huge amounts of data with the hope of finding a pattern (ie CVS tries to do with Coupons)
programming
Process of translating a task into a series of commands a computer will use to perform that task.
Assistive/Adaptive Technology
Products, devices, equipment, or software that are used to maintain, increase, or improve the functional capabilities of individuals with disabilities
PDLC stands for ______
Program development life cycle
Operating System (OS)
Program that controls how your computer system functions (ie. Manages Hardware --> provides a mean by which users can interact with the computer)
Course Management Software
Program that provodes traditional classroom tools (ie BlackBoard)
Compiler
Program that translate English instructions into Computer language
object-oriented analysis
Programmers first identify all of the categories of inputs that are part of the problem the program is trying to solve.
object
Programmers may need to create several different examples of a class. Each of these examples is an object.
comment
Programmers often insert a comment (or remark) into program code to explain the purpose of a section of code, to indicate the date they wrote the program, or to include other important information about the code so that fellow programmers can more easily understand and update it should the original programmer no longer be available.
remark
Programmers often insert a comment (or remark) into program code to explain the purpose of a section of code, to indicate the date they wrote the program, or to include other important information about the code so that fellow programmers can more easily understand and update it should the original programmer no longer be available.
visual programming language
Programming language that uses graphical blocks to represent control elements and variables.
Active Server Pages (ASP)
Programming language used to build websites with interactive capabilities; adapts an HTML page to the user's selections.
JavaServer Pages (JSP)
Programming language used to build websites with interactive capabilities; adapts the HTML page to the user's selections.
PHP (Hypertext Preprocessor)
Programming language used to build websites with interactive capabilities; adapts the HTML page to the user's selections.
programming language
Programming languages are (somewhat!) readable by humans but then are translated into patterns of 1s and 0s to be understood by the CPU.
Image-Editing Software
Programs for editing photos (ie Photoshop)
Productivity Suite
Programs that let you perform various tasks required everyday lfie
What are keystroke loggers?
Programs that record everything that is typed on a computer and stores it in a file to be retrieved later.
Electronic Communications Privacy Act (ECPA) 1986
Prohibits unauthorized monitoring of electronic communications interpreted by courts in favor of employers
Other Large Business Software
Project Management: Creates schedule charts to plan and track specific task and to coordinate resources Customer Relationship Management (CRM): Stores sales and clients contact information in one central database Enterprise Resource Planning (ERP): Controls many "back office" operations and processing functions (ie HR) E-Commerce: Facilities websites creations and hosting services, shopping cart setup, and credit-card processing services CAD Vertical Market
Two main types of software (ran on computer)
Proprietary (Commercial) Software: Software bought (Microsoft Office) Open Source Software: Free software that is available with few licensing and copyright restrictions
HTTP (Hypertext Transfer Protocol)
Protocol that allows files to be transferred from web server
Windows 10
Provides an interface optimized for touchscreen devices and is designed to run across all devices
File Management
Provides an organizational structure to make your computer more orgainzed and efficent
Hyperthreading
Provides quicker processing of information by enabling a new set of instruction to start executing before the previous set has finsihed
Hyperthreading
Provides quicker processing of information by enabling a new set of instructions to start executing before the previous set has finished.
What is the expression of the steps of an algorithm using English-like statements that focus on logic, not syntax?
Pseudocode
______ is a text-based approach to documenting an algorithm.
Pseudocode
Copyright Violation
Punishable by law Occurs when you use another person's material for your own personal economic benefit or when you take awy from the economic benefit of the orginator
Overclocking
Push hardware to perform faster
CPU Names
Qualcomm, Snapdragon, and Apple A7
The software holding area for print jobs is called a print ____
Queue
Which of these is located on the motherboard?
RAM
Ram vs Rom
RAM (Random Access Memory): Place in computer where programs and data that the computer is currently using, are stored --> deleted once turn off computer Volatile Storage: Temporary ROM (Read Only Memory): Holds all instruction the computer needs to start up when it's powered on --> won't get erased Nonvolatile Storage: Permanent
Smartphones store their operating system software in ________.
ROM
Email (Electronic Mail)
Ray Tomlinson Program to send email over the ARPANET and develop the "user@host" convention (1972) A writtent message sent or recieved over the Inernet still remains the most widely used form of communication on the Internet
Bio-metric Authentication device
Reads a unique personal characteristic such as fingerprint
Disk Defragmentation
Rearranges fragmented data so that related file pieces are unified
2013 IC3
Received 263,000 complaints related to internet crime
CPU Usage Graph
Records your CPU usage for the past minute
After deletion, your files are stored in the __________.
Recycle Bin
Which of the following is the best tool to use to fix the color of somebody's eyes in a digital photograph?
Red Eye
encryption
Refers to the process of coding your e-mail so that only the person with the key to the code (the intended recipient) can decode (or decipher) and read the message.
Digital video-editing software
Refine you videos (ie Apple Final Cut Pro)
Who created the Internet?
Robert Cailliau and Tim Bernes-Lee Basic architecture of the web and created the first web browser, software that lets you display and interact with text and other media (1991)
Network Navigation Devices
Router or a switch, faciliatate and control the flow of data through a network
What distinguishes a router from some of the other network components?
Routers make connections between networks like your home network and the Internet.
Satellite Broadband
Rural area or mountain where DSL, Cable and fiber optic is unaviavle or too expensive
store and forward
SMS delivers messages to the appropriate mobile device using ... technology
_________ is the protocol responsible for sending e-mail through the Internet.
SMTP
protocol responsible for sending e-mail along the internet to its destination
SMTP
The protocol used to send e-mail over the Internet is
SMTP.
The _____ protocol is used by commerce servers to protect information from being intercepted by hackers
SSL
Satellite Internet
Satilite dish which is places outside your hosue and connected to your computer with a coaxial cable
_______ means that more users can be added to a network easily without affecting the performance of the other network nodes.
Scalability
Windows Defender
Scans system for spyware or unwanted software
Difference between Tablet & Smartphone
Screen Size
The two main components of Windows Action Center are __________ and __________.
Security, Maintenance
machine language
See first-generation language (1GL).
assembly language
See second-generation language (2GL).
IP
Sends data between computers on the Internet.
Output Device
Sends processed data out of your computer in the form of text, pictures, sound or video
cloud server
Servers that are maintained by hosting companies and are connected to networks via the Internet.
System Software
Set of programs that enables your computer's hardware devices and application software to work together (ie. OS)
Application Software
Set of programs you use in a computer to help you carry out task (ie. Write Research Paper and Create Spreadsheet)
Redundant Array of Independent Disks (RAID)
Set strategies for using more than one drive in a system
Which of the following features makes Bluetooth different from other wireless technologies?
Short-distance wireless capabilities
Which of the following is NOT a cause of power surges and spikes?
Shutting down the computer incorrectly
What is SMTP?
Simple mail transfer protocol (SMTP) is the protocol responsible for sending e-mail messages from an e-mail client to an e-mail server.
Sleep Mode vs Hibernate
Sleep: All data is stored in RAM where its quickly accessible when you restart you computer (Short Term) Hibernate: Similar to sleep except that your data is stored on your hard drive instead of your RAM ad your computer is powered off (Long Term)
Cache Memory
Small block of memory located directly next to the CPU, acts as holding places for recently or frequently used instructions or data that the CPU access frequently
Dual Inline Memory Module
Small circuit board that hold several memory chips
Memory Modules (Memory Cards)
Small circuit boards that hold a series of RAM chip and fit into special slots on the motherboard (
memory modules or memory cards
Small circuit boards that hold a series of RAM chips and fit into special slots on the motherboard
Utility Program
Small program that eorforms many of the general housekeeping tasks fro your computer, such as system maintence and file compression
Packet
Small segment of data transmitted via a network.
Tracking Cookies
Small text files stored on your computer.
Microprocessors
Small, yet powerful chip that contains a central processing unit (CPU)
Clusters
Smallest segments within the sectors
System Restore Point
Snapshot of your entire system's setting is generate prior to certain event, such as installing or updating software, or automatically once a week if no other restore point were created in that time
Intelligent Personal Assistants
Software Agents respond to voice commands and then use you input, access the Internet, and location-aware service to perform various tasks (ie Siri and Cortana)
Plug and Play (PnP)
Software and hardware standard designed to facilitate the installation of new hardware in PCs by inlcuding in the OS the drivers these devices need in order to run
When a vendor hosts software on a website and you don't need to install the software on your device, this is known as
Software as a Service
device driver
Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed.
network operating system (NOS)
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.
Network Operating System (NOS)
Software that handles the request for information, Internet Access, and the use of peripherials for the rest of the network node, providing the services necessary for the computers of the network to communicate
Malware
Software that has a malicious intent. Adware spyware and virus
Synchronization:
The process of updating your data so the files on your smartphone and computer are the same is called synchronizing.
peer-to-peer (P2P) sharing
The process of users transferring files between computers.
Objective C
The programming language most often used to program applications to run under OS X.
Which of the following statements about whole house surge protection is FALSE?
The protectors must be replaced every two years.
simple mail transfer protocol (SMTP)
The protocol responsible for sending e-mail along the Internet to its destination.
Hypertext Transfer Protocol(HTTP)
The protocol that allows files to be transferred from a web server so that you can see them on your computer by using a browser.
transmission media
The radio waves or the physical system (cable) that transports data on a network.
Event
The result of an action, such as a keystroke, mouse click, or signal to the printer, in the respective device to which the operating system responds
Virtual Memory
The rpocess of optimizing RAM storage by borrowing hard drive space
Software
The set of computer programs or instructions that tells the computer what to do and enables it to perform different task
problem statement
The starting point of programming work.
problem statement
The starting point of programming work; a clear description of what tasks the computer program must accomplish and how the program will execute those tasks and respond to unusual situations.
code editing
The step in which a programmer physically types the code into the computer.
code editing
The step of programming in which a programmer types the code to be executed.
What is Bluesnarfing, and how can you prevent it?
The unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. To prevent Bluesnarfing, set the Bluetooth device to hidden, invisible, or nondiscoverable mode.
What is Bluebugging, and how can you prevent it?
The unauthorized act of remotely accessing someone's phone. A hacker who successfully Bluebugs your phone can access your Internet connection, make calls from your phone number, listen in on your conversations, and change entries in your calendar and contact list. Turn off your device's Bluetooth capability when you are not using it.
digital convergence
The use of a single unifying device to handle media, Internet, entertainment, and telephony needs; expressed in the range of devices now on the market.
telephony
The use of equipment to provide voice communications over a distance.
telephony
The use of equipment to provide voice communications over a distance; has shifted from an analog science to a digital one.
root DNS server
There are 13 root DNS servers maintained throughout the Internet. Each root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.
What are some examples of common, everyday uses of networks?
There are many types of networks surrounding us including the Internet, automatic teller machines (ATMs), and local phone lines.
set of actions
There are three important features to look for in a loop: the second is a set of actions that will be performed.
initial value
There are three important features to look for in a loop; this is the first - a beginning point.
test condition
There are three important features to look for in a loop; this is the third -- a check to see whether the loop is completed.
Which of the following is NOT an advantage of star networks?
They are cheap to expand.
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks.
Which of the following statements about macros is FALSE?
They can perform a maximum of five steps.
proprietary system
This proprietary or private system model was the norm for Internet protocol.
Access Time
Time it takes a storage device to locate its stored data and make it available for processing is faster than optical drives
RAID 0
Time it takes to write file cuts in half --> spread data across two physical drives
Apple Backup
Time macing detects when external drive is connected
What is the purpose of a firewall?
To protect your computer from Internet intrusion.
American Standard Code for Information Interchange (ASCII)
To represent each letter or character as an 8-bit (1 byte) binary code
What do ring networks use to avoid data collisions?
Token method
Web 2.0
Tools and web-based services that emphasizes online collaboration and sharing among users
Audio-Editing Software
Tools that make egiting audio files as easy as editing text files
data-flow diagrams
Trace all data in an information system from the point at which data enters the system to its final resting place (storage or output).
Ethernet Port
Transfer data at speeds up to 10,000 Mbps
Hypertext Transfer Protocol (HTTP) and HTTP secure (HTTPS)
Transfers Hypertext Markup Language (HTML) data from servers to browsers; HTTPS is an encrypted protocol for secure transmissions
Replacement for Vacuum Tubes
Transistors: Electrical switches built out of layer of special type of material called semiconductor (controls electricity or act as an insulator) Integrated Circuits: Tiny regions of semiconductor material that supports a huge number of transistors
interpreter
Translates the source code into an intermediate form, line by line.
coding
Translating an algorithm into a programming language is the act of coding.
coding
Translating an algorithm into a programming language.
TCP/IP stands for
Transmission Control Protocol/Internet Protocol
Internet Backbone
Transmission lines with the fastest speeds
Which of the following enables hackers to take control of your PC from another computer?
Trojan Horse
A VPN uses the public Internet communications infrastructure to build a secure, private network among various locations.
True
An e-mail server usually routes all its traffic to and from the server through a communications server.
True
An optical carrier (OC) line is a high-speed fiber optic line that forms the backbone of the internet
True
Client/server networks are generally more secure than P2P networks
True
DHTML is a combination of technologies-HTML, cascading style sheets, and JavaScript.
True
Facial recognition and palm prints can be defined as biometric authentication devices.
True
HTML files have the .htm or .html file extension
True
HTML is controlled by the World Wide Web Consortium
True
IPv6 uses 128-bit addressing instead of 32-bit addressing.
True
In ring topology, a device grabs the token when it needs to send data.
True
In the ring topology, data flows around the circle in one direction only.
True
In tunneling, data packets are placed inside other data packets.
True
JavaScript is the most popular embedded scripting language.
True
MIME is the protocol that supports sending files as e-mail attachments
True
More personnel are usually required to maintain business networks than stand-alone computers.
True
Most home networks use unshielded twisted-pair cable that does not have foil shielding
True
Most modern operating systems include some type of NOS functionality
True
Network topology refers to the physical or logical arrangement of computers, transmission media, and other network components.
True
The W3C is a consortium of organizations that sets standards and develops protocols for the web.
True
The text between <B> and </B> will appear on a web page in bold
True
Your internet service provider has a default domain name server to translate a URL into an IP address
True
shielded twisted-pair (STP)cable
Twisted-pair cable that contains a layer of foil shielded to reduce interference.
Client/Server Network
Type of network that uses servers to deliever services to computer and that requesting them (clients)
Who built and operates the Global Positioning System?
U.S. Department of Defense
Which of the following provides the best protection when running a mission-critical application?
UPS
What was the first state to ban texting while driving?
Washington
analog
Waves that illustrate the loudness of a sound or the brightness of the colors in an image at a given moment in time.
Netscape
Web Browser that closed in 1998 after Microsoft became too strong
Wiki
Web application that allows users to add, remove or edit its content (ie Google Drive and Wikipedia)
Where are your files stored when you use cloud storage?
Your files are stored by a storage provider on the Internet.
________ can be used to launch denial-of-service attacks.
Zombies
Smartphones use
a CPU and Interface so powerful that they can take on many of the same tasks as much more expensive computers: Video conferencing, recording and editing HD video, and broadcasting live-streaming video.
internet was created to provide
a and b (a common communication means for all computers, a secure form of communications.)
database
a collection of related data that can be easily stored, sorted, organized, and queried.
record
a collection of related fields in a database.
Core
a complete processing section from a CPU embedded into on physical chip
numeric check
a data validation routine that confirms that only numbers are entered in a database field.
Most smartphones come with a standard collection of software that includes all of the following EXCEPT:
a database
text field
a database field that can hold any combination of alphanumeric data (letters or numbers) and is most often uses to hold text.
join query
a database query that links (or joins) two database tables using a common field in both tables and extracts the relevant data from each.
one-to-many relationship
a database relationship in which one record in a data table can have many related records in another data table.
relation
a database table that contains related data.
relational database
a database that organizes data in table format by logically grouping similar data into relations (or tables) that contain related data.
multidimensional database
a database that stores data in multiple dimensions and is organized in a cube format.
object-oriented database
a databse that stores data in objects, not in tables.
Processing is available to download from the processing.org website for _______.
a donation
date field
a field in a database that holds date data such as birthdays, due dates, and so on.
object field
a field in a database that holds objects such as pictures, video clips, or entire documents.
hyperlink field
a field in a database that stores hyperlinks to Web pages.
numeric field
a field in a database that stores numbers.
input form
a form that provides a view of the data fields to be filled in a database, with approporate labels to assiat database users in populating the database.
Bluetooth is named after __________.
a king who unified two countries
query language
a language used to retrieve and display records. A query language consits of its own vocabulary and sentence structure, used to frame the requests.
data warehouse
a large-scale electronic repository of data that contains and organizes in one place all the data related to an organization.
One typical characteristic depicted in a day in the life of a technician would be __________.
a lot of face-to-face interaction with people
analog to digital converter
a microphone feeds the sound waves into a chip inside the recording device
computational field (computed field)
a numeric field in a database that is filled as the result of a computation.
completeness check
a process that ensures that all databse fields defined as "required" have data entered into them.
Spooler
a program that helps coordinate all print jobs currently being sent to the printer indicates the print is available
object query language (OQL)
a query language that is used to extract information from an object-oriented database.
select query
a query that displays a subset of data from a table based on the criteria the user specifies.
detail report
a report generated with data from a database that shows the individual transactions that occurred during a cetain time period.
exception report
a report that shows conditions that are unusual or that need attention by users of a system.
summary report
a report that summairzes data in some fashion (such as a total of the day's concession sales at an amusement park). Also known as a summary data report.
validation rule
a rule that is set up in a database to alert the user to possible wrong entries.
Cellular Network
a set of cells make up a cellular network. Each cell is a geographic area centered on a base transceiver station.
knowledge-based system
a support system that provides additional intelligence that supplements the user's own intellect and makes a decision support system (DSS) more effective.
office support system (OSS)
a system (such as Microsoft Office) designed to assist employees in accomplishing their day-to-day tasks and to improve communications.
expert system
a system designed to replicate the decision-making processes of human experts to solve specific problems.
GPS technology uses __________.
a system of satellites
natural language processing (NLP) system
a system that enables users to communicate with computer systems using a natural spoken or written language as opposed to using computer programming languages.
information system
a system that includes data, people, procedures, hardware, and software and that is used to gather and analyze information.
management information system (MIS)
a system that provides timely and accurate information that enables managers to make critical business decisionsl.
memo field
a text field in a database that is used to hold long pieces of text.
data staging
a three-step process: extracting data from source databases, transforming (reformatting) the data, and storing the data in a data warehouse.
range check
a type of data validation used in databases to ensure that a value entered falls within a specified range (such as requiring a person's age to fall in a range of between 1 and 120).
fuzzy logic
a type of logic that allows the interjection of experiential learning into an equation by considering probabilities.
model manamgement system
a type of software that assists in building management models in decision support systems (DSSs).
database management system (DBMS)
a type of specially designed application software (such as Oracle or Microsoft Access) that interacts with the user, other applications, and the databse to capture and analyze data.
digital convergence
ability to view the same multimedia content from different types of devices. (interaction across multiple devices)
File History
access system repair backup and system restore by clicking recovery link
Star topology is considered a(n) __________ topology.
active
A(n) ____ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
algorithm
A(n) _____ is a set of specific, sequential steps that describe in natural language exactly what a computer program must do to complete its task
algorithm
Which of the following describes an IP address?
all of the ablove (dotted quad, identifies website, identifies computers connected to internet)
data inconsistency
any difference in data in lists caused when data exists in multiple lists and not all lists are updated when a piece of data changes.
field constraint
any property that must be satisfied for an entry to be accpeted into the database field.
external data source
any source not owned by the company that owns a decision support system, such as customer demographic data purchased from third parties.
Creating web pages with HTML requires _____
any text editor such as Microsoft Notepad
OS X is the operating system developed by ________
apple
To ensure only authorized users are logging onto a network, which server would a client/server network include?
authentication
To manage authorized connections to the internal network, which server would a client/server network include?
authentication
Keeps track of user logins to the network and which services are available to each user
authentication server
Correctly entering the user ID and password on your college network is an example of
authentication.
A Trojan horse is an example of a(n) __________ program.
backdoor
A(n) ____ transfers data between collision domains
bridge
enterprise resource planning (ERP) system
broad-based software system that integrates multiple data sources and ties together the various processes of an enterprise to enable information to flow more smoothly.
Connecting computers on a single line is called a(n) ____ topology
bus
In a ____ topology, all computers are connected in a line on a single cable run
bus
In a(n) ____________ topology, all computers are connected in sequence on a single cable.
bus
Packet switching sends information between two points
by breaking it into small chunks and sending the chunks across different routes.
Computer help desks often prioritize problems based on __________.
by importance
the help desk database are ranked
by importance
Mobile Switching Center
ca is passed from station central location
Polymorphic
changes its own code or rewrites itself to avoid detection. Infects .exe files
analog to digital converter chip
changes your voice's sound waves into digital signals
Data captured from websites as users navigate through a website is called?
clickstream data
A computer connected to the Internet that asks for data is a(n) ________
client
A(n) _____ server handles all messaging between a network and other networks, including internet connectivity.
communications
alphabetic check
confirms that only textual characters are entered in a database field.
Pairing is the process of __________.
connecting Bluetooth devices to one another
The default DNS server
contacts one of the root DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain. Your ISP's default DNS server receives the information from the master DNS server. It then stores that information for further reference and passes it on to the ISP web server as well as communicates the appropriate IP address to your computer.
Closing tags differ from opening tags in that they include a(n) __________ at the beginning of the tag.
forward slash (/)
data centralization
having all data in one central location (usually a database). Data centralization helps ensure data integrity by requiring data to be updated only in one place if the data changes.
Firewalls __________.
help keep hackers from targeting your computer
With very few commands in Processing, you can create intricate pieces of art that may include all of the following EXCEPT:
holograms
A cascading style sheet is a list of rules that defines which of the following?
how to display HTML elements
file extension
htm
A good website for learning about HTML code is ____
htmlgoodies.earthweb.com
A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n)
image backup
table (file)
in database terminology, a group of related records. Also called a file.
Information system
includes data, people, procedures, hardware, and software that help in planning and decision making
clickstream data
information captured about each click that users make as they navigate a Web site.
The collection of large national and international network providers used to establish the internet is called the ____
internet backbone
Program specification
is a clear statement of the goals and objectives of the project
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.
system development life cycle(SDLC)
A process used to develop information systems; it consists of the following six steps: problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation.
Basic Input/Basic System (BIOS)
A program that manages the exchange of data between the OS and all the input and output devices attached to the system
client-side program
A program that runs on the client computer and that requires no interaction with a web server.
compiler
A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language.
compiler
A program that understands both the syntax of the programming language and the exact structure of the central processing unit and its machine language.
C
A programming language originally developed for system programmers.
HTML embedded scripting language
A programming language that tucks programming code directly within the HTML of a web page; the most popular example is JavaScript.
Visual Basic (VB)
A programming language used to build a wide range of Windows applications.
C++
A programming language; takes C to an object-oriented level.
octet
A reference to each of the four numbers in a dotted decimal number internet protocol address, so called because each number would have eight numerals in binary form.
What is a repeater?
A repeater connects multiple Ethernet segments. Each signal on a segment is listened to by the device and then repeated by the repeater. This is used to increase the diameter of a network.
What is a router?
A router is an advanced networking component that can divide a single network into two logically separate networks.
codec
A rule, implemented in either software or hardware, which squeezes a given amount of audio and video information into less space.
JavaScript
A scripting language that's often used to add interactivity to web pages; often used for creating Dynamic HTML effects.
loop
A second decision point that often appears in algorithms is a repeating loop. In a loop, a question is asked, and if the answer is yes, a set of actions is performed.
Internet cache
A section of the hard drive that stores information that may be needed again, such as Internet protocol addresses and frequently accessed web pages.
statement
A sentence in a code.
Hypertext Markup Language (HTML)
A series of tags that define how elements on a website should be displayed in a browser.
communications server
A server that handles all communications between the network and other networks, including managing Internet connectivity.
cloud server
A server that is maintained by a hosting company and that is connected to networks via the Internet.
authentication server
A server that keeps track of who is logging on to the network and which services on the network are available to each user.
authentication server
A server that keeps track of who's logging on to the network and which services on the network are available to each user.
domain name system (DNS) server
A server that maintains a database of domain names and converts domain names to Internet protocol addresses.
print server
A server that manages all client requested printing jobs for all printers on a network, which helps client computers to complete more productive work by relieving them of printing duties.
file server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download.
file server
A server that stores and manages files for network users.
dedicated server
A server used to fulfill one specific function, such as handling e-mail.
e-mail server
A server whose sole function is to process and deliver incoming and outgoing e-mail.
e-mail server
A server with the sole function to process and deliver incoming and outgoing e-mail.
multimedia message service (MMS)
A service that allows users to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.
Cloud storage
A service that provides storage for data files on the Internet (the "cloud") so as to make files easy accessible on any device connected to the Internet.
Near Field Communication (NFC)
A set of communication protocols that enable devices to communicate with each other when they are held in close proximity. NFC is commonly used for mobile payment.
Personal Ethics
A set of formal or informal ethical principles you use to make decisions in your life
Search Engines
A set of programs that search the web for keywords and then returns a list for the sites on which the keywords are found
protocol
A set of rules for exchanging communications.
computer protocol
A set of rules for exchanging electronic information.
Surround-Sound System
A set of speakers and audio processing that envelops the listener with a 360 degree field of sound
algorithm
A set of specific, sequential steps that describe exactly what the computer program must do to complete the required work.
algorithm
A set of specific, sequential steps that describe in natural language exactly what the computer program must do to complete its task.
scripting language
A simple programming language that's limited to performing a set of specialized tasks.
copyleft
A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights.
Coaxial Cable
A single copper cable wire surrounded by layers of plastic insulation, metal sheathing and a plastic jacket; used mainly in cable television and cable Internet service
coaxial cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.
beta version
A version of the software that's still under development. Many beta versions are available for a limited trial period and are used to help the developers correct any errors before they launch the software on the market.
electronic ink (E ink)
A very crisp, sharp grayscale representation of text achieved by using millions of microcapsules with white and black particles in a clear fluid.
syntax error
A violation of the strict set of rules that define the programming language.
Internet exchange point (IXP)
A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISPs connect.
What are web servers?
A web server is used to host a website so it will be available through the Internet.
Argumentative Reality (AR) vs Virtual Reality (VR)
AR: A combination of our normal sense of the objects around us with an overlay of information displayed VR: Creates an artificial environment that is immersive and interactive
Backward Compatibility
Ability of current devices to use earlier standards in addition to the current standard
What are the maximum voltages handled by outlet surge protectors and surge arrestors?
About 6,000 volts for an outlet protector and about 20,000 volts for an arrestor.
Vacuum Tubes
Acts as switched by allowing or blocking the flow of electrical current
Throughput
Actual speed of data transfer that is achieved
Once debugging is done, can the created software program be released?
Actually, after debugging, the last step is to test and document the program.
Once I've defined my problem statement, can I start coding?
Actually, after defining the problem statement, the next step in a programming project is for programmers to translate the programs into an algorithm.
What happens after programmers create an algorithm?
After programmers create an algorithm, they select a programming language and translate the algorithm into that language.
GA (general availability)
After the RTM is issued, the product is in GA (or general availability) and can be purchased by the public.
Software License (End User License Agreement (EULA))
Agreement between you (user) and software company
Which of the following statements about pop-ups is FALSE?
All pop-ups are annoying and useless.
statements
All programming languages have a formal syntax that programmers must follow when creating code statements, which are sentences in a code.
RAID 1
All the data written in one drive is instantly mirrored and written in second drive
Video Memory
All video systems include their own RAM
Other types of speciality printers
All-in-one: Combines function or printer, scanner, copier, and fax into one machine A large format printer: Generates oversize images such as professional graphics, high resolution photographs, banners, posters, and infographics that require more sophisticated color detail (12 different inks) Thermal Printer: Melting wax-based ink onto ordinary paper or by burning dots onto specially coated paper
Voice Recognition Software
Allows you to control your computing devices by speaking into the device's mic instead of using a keyboard or mouse
Simulations Programs
Allows you to experience or control the software as if it were an actual event
Virtual Desktop
Allows you to organize groups of windows into differnt displays
assembly language
Also known as an assembly language. Assembly languages allow programmers to write their programs using a set of short, English-like commands that speak directly to the CPU and give the programmer direct control of hardware resources.
second-generation language (2GL)
Also known as an assembly language. Assembly languages allow programmers to write their programs using a set of short, English-like commands that speak directly to the CPU and give the programmer direct control of hardware resources.
What is an IP address and where I can find the IP address for my computer?
An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."
IPv6
An IP addressing scheme developed by the IETF to make IP addresses longer.
Internet Protocol version 6 (IPv6)
An IP addressing scheme developed by the Internet Engineering Task Force (IETF) to make IP addresses longer, thereby providing more available IP addresses. IPv6 uses 8 groups of 16-bit numbers, referred to as hexadecimal notation (hex for short).
wireless Internet service provider (wireless ISP)
An ISP that provides service to wireless devices such as PDA/smartphones.
wireless Internet service provider (wireless ISP)
An ISP that provides service to wireless devices such as smartphones.
data plan
An Internet connectivity plan or text messaging plan.
syntax
An agreed-on set of rules defining how a language must be structured.
syntax
An agreed-upon set of rules defining how a language must be structured.
Which step in the program development cycle involves designing a set of steps to solve a problem?
An algorithm
What are authentication servers?
Authentication servers keep track of who is logging on to the network.
File History Utility
Automatically creates duplicated of your libraries, desktop, contacts, and favorites and copy it to another storage device such as external hard drive
Hollerith Tabulating Machine
Automatically read data that had been punched onto small punch cards, speeding up the tabulation process Develop by Herman Hollerith (1890)
Human Motivation
Autonomy: Freedom to work without constant direction and control Mastery: Feeling of confidence and excitement from seeing your own skills progress Purpose: Understanding that you are working fro something larger than yourself
To prevent work from being lost during a power failure, make sure your Office applications are configured to use __________.
Autosave
Which of the following HTML sections contains the text and graphics that are displayed in the browser window?
BODY
Blog vs Video Blog
Blog: Personal Log or Journal posted on the Web Vlog: Blog that uses video as the primary content Splog: Artifically fake blogs sites filled with fake articles or stolen text
All of the following are potential sources of surges EXCEPT __________.
Bluetooth connection
Which of the following statements about Bluetooth is FALSE?
Bluetooth has high power consumption.
section in an HTML document that displays text and graphics in a browser
Body
Tagging/Social Bookmarking
Bookmarking your favorite websites, but instead if saving it t your browser for only you to see, you can share it with others
White-Hat (ethical) Hacker
Breaks into systems for non malicious reasons (check vulnerabilities)
Black-Hat Hacker
Breaks into systems to destroy information or illegal gain
Webcast
Broadcast of audio or video content over the Internet
Internet Explorer
Browser that intergrated web functionalut into Microsoft Office application
Desktop Publishing Software (DTP)
Business requires need for publication --> Allows professionals to design books and other publication that require complex layouts
Three types of (E-Commerce)
Business-to-Consumers (B2C): Transaction between business and consumers Business-to-Business (B2B): Transaction between business Consumer-to-Consumer (C2C): Transaction between consumers
How can you tell that a macro is no longer recording?
By the red light in the status bar.
Root Directory
C: drive is the top of the filling structure of your
Which type of software is used to make 3-D models
CAD
Two of the most popular methods of designing programs that execute on a server and give a web page more sophisticated capabilities are ASP.NET and ____________.
CGI
Core
CPU contains the parts of the CPU requried for processing
Smartphones have...
CPU, memory, input/output, its own OS, its own app software.
data collision avoidance method
CSMA/CD
twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
Twisted-pair Cable
Cables made of copper wires that are twisted tofether are each other and are surrounded by a plastic jacket (ie Traditonal Home Phone wire)
T line
Carries digital data over twisted-pair wires.
Task Manager
Check on the program or to exit the nonresponsive program
Pinning
Choose which application are visible on the Start menu
Forms a dedicated connection between two communicating parties
Circuit switching
How would you reply to an email message you've received that has multiple recipients, all of whom you would like to see your reply?
Click Reply All
If you want to get rid of only files that have been in the Recycle Bin for a long time you should open the Recycle Bin, choose View, Details, and then what?
Click the Date Deleted header to put the objects in order of date. Select all the objects deleted prior to a certain date. Press or click Delete. Click Yes.
Start Menu
Clicking Windows icon (or Start Button) on the left corner of the screen or by pressing the Windows key on the keyboard
Difference in CPU
Clock Speed Multiple Cores Amount Cache Memory
Cloud Storage:
Cloud storage refers to services, like Dropbox, that store your files on the Internet (in the "cloud") instead of storing them only on local devices. Storing your data in the cloud allows you to access it fromalmost any computing device that is connected to the Internet.
Cold Boot vs Warm Boot
Cold Boot: Powering computer from a computer turned off state, such as when you start you computer in the morning Warm Boot: Restarting system while it's powered
Instruction Set
Collection of commands that a specific CPU can execute
Folder
Collection of files
File
Collection of program instructions or data that is stored and treated as a single unit
Crisis-Mapping Tool
Collects information from different social media and then maps them, instantly making the information publicly available (ie Ushahidi)
Microsoft Account
Combination of an email address and a password
Solid State Hybrid Drive (SSDH)
Combination of both a mechinalal hard drive and SSD into a single device --> offer a very small Storage Space, but huge impact on boot time
Cognitive Surplus
Combination of leisure time and the tools to be creative
Dynamic HTML
Combination of technologies used to create lively and interactive websites.
hybrid topology
Combining multiple topologies into one network.
Unshielded Twisted-Pair (UTP) cable
Composed of 4 pairs of wires that are twisted around each other to reduce electrical interference
source code
Comprises the instructions programmers have written in the higher-level language, and translate the source code directly into machine language—the binary patterns that will execute commands on the CPU.
Virus
Computer program that attaches itself to another computer program (host) and attempts to spread to other computers
Client
Computer that ask for data
Havard Mark I
Computer used by the US Navy for ballisitic nd gunnery calculations --> could ass, subtractc, multiply and divide Howard Aiken and Grace Hopper (1944)
Fourth-Generation Computers
Computer with Microprocessors
Alto
Computer with Word Processor, based on the What you see is what you get principle, that integrated a file management system with directories and folders
Third-Generation
Computer with early integrated-circuit
Hard Disk Drive (HDD)
Computer's primary device for permanent storage of software and documents (Nonvolatile)
When my friend connects to my computer, how is data transferred?
Computers communicate efficiently using the communication methodology called packet switching.
But how do computers get the IP address from a domain name?
Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.
commerce server
Computers that host software that enables users to buy goods and services over the web.
Copyleft
Concept of redistrubting modifies open source software under the same terms as the original software
Mobile Broadband
Connect your to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access
Piggybacking
Connecting to a wireless network without the owners permission
USB Port
Connects input and output devices to the computer
Front side bus (FSB)
Connects the processor CPU in your computer to the system memory
Crowdsourcing
Consumers checking in with the voice of the crowd before making a purchase
Registry
Contins all the different configuaration (settings) used by the OS and by other application
CPU composed of two units
Control Unit: Coordinates the activities of all the other computer components Arithmetic Logic Unit (ALU): Responsible for performing all the arethemitic calculation
analog-to-digital converter chip
Converts analog signals into digital signals.
analog-to-digital converter chip
Converts your voice's sound waves into digital signals.
Full Installation
Copies all the most commonly used files and programs from the distribution disc to your computer's hard drive
Backups
Copies of files that you can use to replace the originals if they're lost or damaged
Shielded twisted-pair (STP)
Copper wire cabling with a foil shielding to reduce interference.
Presentation Software
Create a slideshow (ie Microsoft Powerpoint)
Word Processing Software
Create and edit documents (ie Microsoft Word)
Computer-Aided Design (CAD)
Create automated designs, technical drawings, and 3-D model visualization
Which tool would you use if you wanted to trim a half-inch from the left side of a digital photograph?
Crop
Grey-Hat Hacker
Cross between black/white illegally break into systems to flaunt to admin or to sell services to repair
acts like an IP address phone book for computers
DNS server
Users with __________ are more susceptible to the dangers from the Internet.
DSL and cable modems
VisiCalc
Dan Bricklin and Bob Frankston (1978) First Spreadsheet Program (1)
Tracks
Data is recorded on hard discs in concentric circle
Which of the following statements about ring topology is TRUE?
Data only flows in one direction
Packets
Data sent through a network in bundles
information
Data that has been organized or presented in a meaningful fashion; the result, or output that users require at the end of a job.
Packets
Data travels in pieces identified by IP to identify computers. Reached they are reassembled into cohesive messages
Data vs Information
Data: Representation of a fact, a figure or idea (Ex. Number, Words, Picture or even Sound) Information: Data that has been organized or presented in a meaningful fashion
Which step in the program development cycle is the process of detecting errors in a program?
Debugging
Custom Installation
Decide the features you want to be installed on your hard drive --> save space
What are decision points?
Decision points are points at which the program must choose from different actions, based on the value of its current inputs.
Not necessary to do before installing beta software
Defragging the hard drive
Live Bookmarks
Deliever contents updates to you as soon as they become available using RSS, the same technology that updates blogs and podcats
Which of the following enables hackers to use your computer to launch attacks against other sites?
Denial-of-service (DOS) attack agent
data types
Describe the kind of data that is being stored at the memory location.
Moore's Law
Describes the pace at which centeral processing units (CPUs) improvement
Virus Signature
is a portion of the virus code that unique to a particular computer virus. Software scans files for these signatures when they're opened/executed and identifies infected files and the type of virus infecting them.
TCP/IP
is a suite of protocols used to route packets over the Internet, not encrypt files. The suite is named after the original two protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The suite actually comprises many protocols like user datagram protocol (UDP), file transfer protocol (FTP), Telnet, hypertext transfer protocol (HTTP), secure HTTP (S-HTTP), and simple mail transfer protocol (SMTP).
The ranking of network problems by importance is usually determined by the ________.
number of affected users
The ranking of network problems by importance is usually determined by ____
number of users affected
NOS software is needed
on all computers in a client/server network.
In private-key encryption
only the two parties involved in sending the message (not the server) have the code. This can be a simple shift code where letters of the alphabet are shifted to a new position. The main problem with private-key encryption is key security. If someone steals a copy of the code, the code is broken.
Apple's OS X and Microsoft Windows are examples of ________ software.
operating system
Which of the following is NOT an output device?
optical mouse
Spam Filter
option you can select in your email account that places known or suspected spam into folder
The communications methodology that computers use to transfer data is called _____
packet switching
Packet Analyzer (Sniffer)
program deployed that looks or sniffs each packet through the internet
To complete pairing a headset to your cell phone, you enter a passkey, which is __________.
provided by the headset manufacturer
The two basic types of encryption are private- and ____________ key encryption.
public-
In ____ encryption, a key pair is created, where one key is for coding and the other is for decoding
public-key
_____ encryption is the most commonly used encryption on the internet
public-key
The Processing IDE provides the ability to do all of the following EXCEPT ________.
publish
To remain current with fixes to problems, the Sound Byte suggests that technicians should do all of the following EXCEPT ________.
pursue an advanced degree
Bluetooth uses __________ waves to transmit data signals over short distances.
radio
At a minimum, all data packets must contain the _____
recipient's address, sender's address, reassembling instructions, and data.
a long string of numbers
recorded sound waves are stored in CD/DVD in the format of signals represented as...
Each of the four numbers in a dotted decimal number in an IP address is
referred to as an octet.
Each of these is a basic type of a touch screen, EXCEPT
reflective
Which system of ethics states there is no universal moral truth?
relativism
A brute force attack is an attempt to access an account by:
repeatedly trying different passwords.
On client/server networks, bridges
route data between two collision domains on a single network.
An example of a network navigation device is a __________.
router
A virus can infect your system through all of the following, EXCEPT ________.
saving files to the cloud
Why are P2P networks not usually installed in businesses?
security is stronger on client/server networks
Updates that you can download to fix possible security issues are called __________.
security patches
MIME is a protocol that's used when you're
sending an e-mail that has a file attached.
Internet Protocol (IP)
sends data between computers on the internet
You can combine Arduino with _______ and motors so that when the microcontroller receives input, it makes something happen with the motors.
sensors
The add-on boards which connect to you Arduino and give it additional functionality such as a touch screen are ______.
shields
data mart
small slices of a data warehouse.
Adware
software that displays sponsored ads in a section of your browser window or pop-up
Firewall
software/hardware designed to protect computers from hackers. Named after housing construction feature that slows fire from house to house. Also blocks logical ports and keeps computer network address secure
Disadvantages of VoIP
some people regard sound quality and reliability issues as VoIP primary disadvantages using at home loss of service is power lost security risks
A macro name can contain any of the following characters EXCEPT __________.
spaces
All of the following are navigation devices to move data around or between networks EXCEPT _____
spans
digital signal processor
specialized chip included in the cell phone to handle compression work
In a ____________ network, failure of one computer does not affect other computers on the network.
star
In the ____ topology, devices are connected together through a central switch.
star
Which type of network topology is most popular?
star
manually assigned IP address
static IP
An IP address that does not change and is usually assigned manually by a network administrator is called a ____
static address
IP address for a computer does not change
static addressing
SMS
store-and-forward technology
HTML5
supports powerful multimedia effects.
All of the following are network topologies EXCEPT ____
switch
directs signals to the intended device
switch
____ are called smart hubs, because the retransmit signals only to the devices that need to receive them
switches
________ software helps run the computer and coordinates instructions between other software and the hardware devices
system
which of the following is not considered an accessibility utility?
system restore
Which of the following is NOT considered metadata?
table name
Each element in HTML documents are marked with ____
tags
When using a bus topology, to prevent signals from bouncing back to computers that have already received the signal, a __________ is used.
terminator
Which of the following describes copyleft?
terms enabling redistributing open source software
The final step in the PDLC is ______
testing and documentation
After creating a macro, you can use it by selecting the macro name and then clicking __________.
the Run button in the Macros dialog box
The information in a data packet includes
the To address, From address, data, and reassembly instructions
default value
the calue a databse will use for a field unless the user enters another value.
In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.
the help desk problem database
online transaction processing (OLTP)
the immediate processing of user requests or transactions.
field size
the maximum number of characters (or numbers) that a filed in a databse can contain.
structured query language (SQL)
the most popular database query language today.
JavaScript is
the most popular embedded scripting language.
foreign key
the primary key of another database table that is included for purposes of establishing relationships with another table.
batch processing
the process of accumulating transaction data until a certain point is reached, then processing those transactions all at once.
consistency check
the process of comparing the value of data in a databse field against established parameters to determine whether the value is reasonable.
validation
the process of ensuring that data entered into a database is correct (or at least reasonable) and complete.
data integrity
the process of ensuring that the data contained in a databse is accurate and reliable.
sort
the process of organizing a database into a particular order.
export
the process of putting data into an electronic file in a format that another application can understand.
nomalization
the process of recording data only once in a database to reduce data redundancy.
query
the process of requesting information form a database.
real-time processing
the process of updating a database (or information system) immediately as changes are made.
Cascading style sheets allow you to quickly change
the rules for applying formatting to an HTML document.
A network technician can expect each of the following EXCEPT ____
the same challenges every day
artificial intelligence (AI)
the science that attempts to produce computers that display the same type of reasoning and intelligence that humans do.
Machine Language
the series of steps a central processing unit goes through when it performs a program instruction
Seek Time
the time it takes for the read/write heads to move over the surface of the disk, moving to the correct track
primary key (key filed)
the unique field that each database record in a table must have.
relational algebra
the use of English-like expressions that have variables and operations, much like algebraic equations.
Makers are people who want to build ______.
their own solutions to problems
When packets reach their destination
they are reassembled by the receiving computer.
When packets reach their destination:
they are reassembled by the receiving computer.
special data packet
token
The different array of computers, peripherals, and media is called network _____
topology
Data-flow diagrams
trace all data in an information system from the point at which data enters the system to its final resting place (storage or output)
Which invention replaced vacuum tubes in computers?
transistor
Which components are a characteristic of second-generation computers?
transistors
To qualify as a power spike, the increase in the normal flow of electricity must last __________ nanoseconds or less.
two
In public-key encryption
two keys are created-one for coding and one for decoding.
The text between <U> and </U> will be ______ when displayed on a web page
underlined
UPS stands for __________.
uninterruptible power supply
A quick way to deploy software to a large number of computers is to __________.
use "ghosting" software to copy the image of one computer to another
Ethernet Network
uses Ethernet protocol as the means by which nodes on the network communicate
bluetooth
uses radio waves to transmit data signals over short distances
A surge protector protects your computer from high-level surges by __________.
using the excess current to melt a fuse in the surge protector, which stops the current from continuing into your computer
Cyberloafing/Cyberslacking
using your computer for non work activities while your being paid to do your job
A new feature in Windows 10 that is used to organize open windows into task-specific groups is called
virtual desktops
Which ethical philosophy states that morals are internal?
virtue ethics
Google's Now and Apple's Siri use _______ to assist smartphone users.
voice recognition
A company would use a(n) _____ server to provide internet-based information.
web
A(n) ____ server is used to host an internet site
web
Hosts websites that can be accessed via the internet
web server
data redundancy
when the same data exists in more than one place in a database.
Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.
writing computer manuals
When you enter a domain name into a web browser
your computer converts the domain name into an IP address by consulting a database maintained on a DNS server, which functions like a phone book for the Internet. Your ISP's web server has a default DNS server that it goes to when it needs to translate a domain name into an IP address. Your ISP or network administrator defines the default DNS server.
RAM
your computer's temporary storage space; the computer's short term memory
A computer controlled by a hacker is called a __________.
zombie
A computer that a hacker has gained control of in order to launch DoS attacks is known as a ________ computer.
zombie
Structured Query Language (SQL) Structured Query Language (SQL)
is a database programming language that is an example of a fourth-generation language (4GL). Many other database query languages and report generators are also 4GLs.
fourth-generation language (4GL) Structured Query Language (SQL)
is a database programming language that is an example of a fourth-generation language (4GL). Many other database query languages and report generators are also 4GLs.
Base Transceiver Station
is a large communication tower with antennas, amplifiers, receivers, and transmitters.
JAD (Joint Application Development)
is a methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops called JAD sessions.
test condition
A check to see whether the loop in an algorithm is completed.
program specification
A clear statement of the goals and objectives of the project.
Instant messaging is secure because of the type of encryption used
False
Most instant messaging services use a high level of encryption.
False
Network operating systems need to be installed only on one client computer in order to "talk" to the entire network.
False
PGP is a private-key encryption package available for download.
False
Static addressing is more common than dynamic addressing.
False
Special Memory storage built into the CPU
Registers (Storage)
Which of the following household devices does NOT need power surge protection?
Remote control
connection-oriented protocol
Requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data.
SMTP
Responsible for sending e-mail to its destination.
Kernel (Supervisor Program)
Responsiblie for managining the processor and all other components of the computer system
Intellectual Property
Result of someone's creativity and knowledge which is protected by copyright laws and documented by copyrights, patents and trademarks
Jacquard Loom
Revolutionized the fabric industry by creating a machine that automated the weaving of complex patterns Developed by Joseph Jacquard
____ addressing means that the IP address for a computer never changes and is most likely manually assigned by a network administrator
Static
Clock Cycle
Steady beats ("ticks") of system clock
Who was the Founders of Apple
Steve Jobs and Steve Wozniak
Coaxial cable
Still used in some manufacturing facilities where machinery creates heavy electrical interference.
Cloud Computing
Storing Data, files an application on the web and being able to access and manipulate these files and applications from any Internet-connect device
Directory
Structure composed of drives, libraries, folders, subfolders and files
The S in SQL stands for ____ Query Language.
Structured
Ethics
Study of general nature of morals and the specific moral choice individuals make
smartphone
"A device that combines the functionality of a cell phone, a PMP, and a PDA into one unit."
base transceiver station
"A large communications tower with antennas, amplifiers, and receivers/transmitters."
codec
"A rule, implemented in either software or hardware, which squeezes a given amount of audio and video information into less space."
wide area network (WAN)
A network made up of local area networks (LANs) connected over long distances.
flowcharts
A visual representation of the patterns the algorithm comprises.
What do file servers do?
File servers are used to store and manage files for network users.
Home Network
Personal firewall
Microprocessor Chip
Small Chip containing millions of transitiors --> functions as CPU
Firmware
System software that controls hardware devices
metadata
data that describes other data.
closing tag
</U>
Opening HTML tags are enclosed within ____
<>
Which of the following is a header tag?
<H4>
Opening tag
<P>
Which of the following is NOT an HTML tag?
<R>
HTML tags are enclosed in __________.
<greater than and less than brackets>
The beginning and ending of paragraphs are marked by the ___ and ____ tags
<p> and </p>
What is a denial of service attack?
A DOS attack is an attempt to make a computer resource unavailable to its intended users, such as preventing an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
C#
A Microsoft programming language developed to compete with Java.
point of presence (POP)
A bank of modems, servers, routers, and switches through which Internet users connect to an Internet service provider.
Point of presence
A bank of modems, servers, routers, and switches through which many users can connect to an ISP simultaneously.
initial value
A beginning point.
What are benchmarks?
A benchmark is a score given by smartphone reviewers to measure overall system performance of the smartphone processor after comparing competing smartphones.
What is a bridge?
A bridge connects two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic.
fiber-optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibers.
Fiber-Optic Cable
A cable that transmits data at clsoe to the speed of light along glass or plastic fibers
class
A category of input identified in object-oriented analysis; classes are defined by information and actions.
mobile switching center
A central location that receives cell phone requests for service from a base station.
centralized
A characteristic of client/ server networks where the server, not the individual user, coordinates data security.
scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.
decentralized
A characteristic of peer-to-peer networks where the individual user coordinates data security.
OneDrive
A cloud storage service provided by Microsoft.
MediaFire
A cloud storage service that features large amounts of free storage and tools for sharing files on social media.
iCloud
A cloud storage/synchronization service provided by Apple.
operator
A coding symbol that represents a fundamental action of the programming language.
Software Suite
A collection of software programs bundled together as package
AJAX (Asynchronous JavaScript and XML)
A collection of technologies that allow the creation of web applications that can update information on a page without requiring the user to refresh or leave the page.
Dynamic HTML (DHTML)
A combination of technologies—HTML, cascading style sheets, and JavaScript—used to create lively and interactive websites.
fifth-generation language (5GL)
A computer language in which a problem is presented as a series of facts or constraints instead of as a specific algorithm; the system of facts can then be queried; considered the most "natural" of languages.
Assembly Language
A computer language that allows programmers to write programs
second-generation language (2GL)
A computer language that allows programmers to write programs using a set of short, English-like commands that speak directly to the central processing unit and that give the programmer direct control of hardware resources; also called assembly language.
third-generation language (3GL)
A computer language that uses symbols and commands to help programmers tell the computer what to do, making 3GL languages easier for humans to read and remember; examples of 3GL languages include BASIC, FORTRAN, COBOL, C/C++, and JAVA.
fourth-generation language (4GL)
A computer language type that includes database query languages and report generators.
web server
A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.
honey pot
A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.
netbook
A computing device that runs a full-featured operating system but weighs two pounds or less.
Server
A computter that recieves the request and reurns the data to the client
handshaking
A connection-oriented protocol requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data. This process is referred to as handshaking.
local area network (LAN)
A network in which the nodes are located within a small geographic area.
Service Set Identifier (SSID)
A network name that runs on a web server rather than on a computer
How many states ban handheld phones for all ages?
14
Global Positioning System (GPS)
"A system of 21 satellites (plus 3 working spares), built and operated by the U.S. military, that constantly orbit the earth. They provide information to GPS-capable devices to pinpoint locations on the earth."
cellular phone (cell phone)
"A telephone that operates over a wireless network. Cell phones can also offer Internet access, text messaging, personal information management (PIM) features, and more."
Internet tablet
"A very light, portable computing device without a keyboard."
multimedia message service (MMS)
"An extension of short message service (SMS) that enables messages that include text, sound, images, and video clips to be sent from a cell phone or PDA to other phones or e-mail addresses."
Central Processing Unit (CPU)
"Brains" of the computer b/c it controls all the functions performed by the computer's other components and processes all the commands issues to it by software instruction
resolution
"The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen."
keyword
(1) A specific word a user wishes to query (or look for) in an Internet search. (2) A specific word that has a predefined meaning in a particular programming language.
data type (field type)
(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field and prevents the wrong type of data from being entered into the field.
browsing
(1) the process of viewing database records. (2) the process of "surfing" the Web.
VoIP
(Voice over Internet Protocol).
Network Administration
- Installing new computers and devices - Monitoring the network to ensure it is performing efficiently - Updating and installing new software on the network - Configuring or setting up proper security for a network
Utilitarianism
-Actions judged solely by consequence -Action generate greater happiness are judged to be better than actions that lead to unhappiness (Group>Individual)
Deontology (Duty Based)
-Focus on adherence to moral duties and rights -Morals should apply to everyone equally
Relativism
-No universal moral truth -Moral principles dictated by cultural tastes and customs
Pipelining
-Technique that allows CPU to work on more than one instruction at the same time --> Boost CPU performance -Requires more transistors and more complicated hardware design
So that it can be recognized as a web page, you should save your Notepad document with a(n) __________ extension.
.htm or .html
Closing HTML tags include the additional __ character
/
What is a gigabyte?
1 billion bytes
System Development Life Cycle (SDLC) six steps
1) Problem/Opportunity Identification 2) Analysis 3) Design 4) Development 5) Testing & Installation 6) Maintenance & Evaluation
Software Updates
1)Install automatically 2)Check for updates 3)Recommended updates 4)Microsoft update
Identify the two methods for diverting the extra voltage to ground.
1)Metal oxide varistor (MOV): When voltage is below a certain level, the electrons in the semiconductors flow in such a way as to create a very high resistance. When the voltage exceeds that level, the electrons behave differently, creating a much lower resistance. When voltage is too high, an MOV can conduct a lot of current to eliminate the extra voltage. 2)Gas discharge arrestor: The electrical power is strong enough to ionize the gas, making it a very effective conductor. It passes on current to the ground line until the voltage reaches normal levels, and then becomes a poor conductor again.
Appropriate Websites for Research
1. Authority 2. Bias 3. Relevance 4. Audience 5. Links
Identifying Personal Ethics
1. Describe Yourself 2. Key Beliefs 3. External Influence 4. Consider Why 5. Statement of Value
Multimedia and Educational Software
1. Drawing Software 2. Educational and Reference Software 3. App Creation Software 4. Digital Audio Software 5. Digital Image- and Video- Software
Machine Cycle (Processing Cycle)
1. Fetch 2. Decode 3. Execute 4. Store
File Transfer and Synchronization
1. File Transfer: You can transfer data between a smartphone and your computer in a number of ways including through a micro SD card, a USB connector, or wirelessly. 2. Synchronization: The process of updating your data so the files on your smartphone and computer are the same is called synchronizing.
Four major functions of a Computer
1. Input - gather data or allows users to enter data 2. Process - Manipulates, calculates, or organizes that data into information 3. Output - It displays data and information in a form suitable for the user 4.Storage - Saves data and information for later use
Helpful Search Strategies
1. Search Phrases ("") 2. Search within specific websites 3. Use wild card (*)
Benefits of Networks
1. Sharing an Internet connection 2. Sharing printers and other peripherals 3. Sharing Files 4. Common Communication
A GPS device can accurately pinpoint your location within __________.
10 feet
Which of the following is considered to be a photo-quality resolution for a 4"x6" digital photograph that will be printed in the newspaper?
1280x960
Which of the following is a typical IP address?
197.169.72.74
Lotus 1-2-3
1983 (2)
Microsoft Excel
1985 still in use today (Application Software) (3)
Wireless option to Satellite Broadband
3G or 4G
How many states ban texting for all ages?
44
WiGig
802.11ad
Super WiFi (White WiFi)
802.11af
Low Power WiFi
802.11ah
Ethernet is similar to what IEEE standard?
802.3
three-way handshake
A connection-oriented protocol requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data. This process is referred to as handshaking. TCP uses a process called a three-way handshake to establish a connection.
data plan
A connectivity plan or text messaging plan in which data charges are separate from cell phone calling charges and are provided at rates different from those for voice calls.
Structured Query Language (SQL)
A database programming language used to construct queries to extract data from relational databases; one example of a fourth-generation language.
circuit switching
A dedicated connection is formed between two points (such as two people on telephones), and the connection remains active for the duration of the transmission.
integrated development environment (IDE)
A developmental tool that helps programmers write and test their programs; one IDE can be configured to support many different languages.
integrated development environment (IDE)
A developmental tool that helps programmers write, compile, and test their programs.
switch
A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent.
Switch
A device for transmitting data on a network. Switch makes decisions, based on the media access control address of the data, as to where the data is to be sent
Terminator
A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.
terminator
A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it.
e-reader
A device that can display e-text and that has supporting tools, like note taking, bookmarks, and integrated dictionaries.
network adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.
Bridge
A device that is used to send data between different collision domains, depending on where the recipient device is located.
access card reader
A device that reads information from a magnetic strip on the back of a credit card-like access card.
Router
A device that routes packets of data between two or more networks
router
A device that routes packets of data between two or more networks.
biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users.
bridge
A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.
hexadecimal digit
A digit with 16 possible values: 0-9 and A-F.
What is the difference between a DOS and a DDOS?
A distributed denial-of-service (DDOS) attack uses multiple compromised systems to flood the bandwidth or resources of a targeted system, such as a web server.
architecture neutral
A feature of Java whereby code needs to be compiled only once, after which the code can be run on many different CPUs.
Which of the following does NOT pose a potential threat to your computer?
A firewall
Which step in the program development cycle maps out the logic and processes?
A flowchart
Voice over Internet Protocol (VoIP)
A form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long- distance calls.
Wireless Markup Language (WML)
A format for writing content viewed on a cellular phone or personal digital assistant (PDA) that is text-based and contains no graphics.
bastion host
A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.
optical carrier (OC) line
A high-speed fiber-optic line.
programming language
A kind of "code" for the set of instructions the central processing unit knows how to perform.
base transceiver station
A large communications tower with antennas, amplifiers, and receivers/transmitters.
base transceiver station
A large communications tower with antennas, amplifiers, receivers, and transmitters.
cascading style sheet
A list of rules that defines in one single location how to display HTML elements.
Cascading style sheet
A list of rules that defines in one single location how to display HTML.
eXtensible Markup Language (XML)
A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed.
Common Gateway Interface (CGI)
A method of designing programs that provides a methodology by which a browser can request a program file be executed instead of just being delivered to the browser.
access method
A method to control which computer is allowed to use transmission media at a certain time.
client/server model
A model of network communications where a client device such as a computer, tablet, or smartphone uses browsers to request services from networks that make up the Internet.
network prefix
A slash and a number at the end of the last octet. The network prefix identifies how many of the possible 32 bits in a traditional IP address are to be used as the unique identifier, leaving the remaining bits to identify the specific host.
Java applet
A small Java-based program.
applet
A small application located on a server; when requested, the applet is downloaded to the client.
Integrated Circuit
A small chip capable of containing thousands of tranisitors Developed by Jack Kilby (1958)
prototype
A small model of a program built at the beginning of a large project.
portable media player (PMP)
A small portable device (such as an iPod) that enables you to carry your MP3s or other media files around with you.
packet (data packet)
A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent.
Touch Pad or Trackpad
A small, touch-sensitive area at the base of the keyboard
print queue
A software holding area for print jobs. Also called a print spooler.
print queue
A software holding area for print jobs. When the print server receives a job (a printing request) from a client computer, it puts the job into a print queue on the print server.
Distributed or Grid Computing
A software system in which components located on networked computers interact to achieve a common goal
digital signal processor
A specialized chip that processes digital information and transmits signals very quickly.
multipurpose Internet mail extensions (MIME)
A specification introduced in 1991 to simplify attachments to e-mail messages. All e-mail client software now uses this protocol to attach files.
Graphics Double Date Rate 5 (GDDR5)
A standard of video memory
Head Crash
A stoppage of the hard drive that often results in data loss
VBScript
A subset of Visual Basic, used to introduce dynamic decision making into web pages.
global positioning system (GPS)
A system of 21 satellites (plus 3 working spares), built and operated by the U.S. military, that constantly orbit the earth. The satellites provide information to GPS-capable devices to pinpoint locations on the earth.
digital rights management (DRM)
A system of access control that allows only limited use of material that has been legally purchased.
bus (linear bus) topology
A system of networking connections in which all devices are connected in sequence on a single cable.
information system
A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information.
top-down design
A systematic approach in which a problem is broken into a series of high-level tasks.
Voice over Internet Protocol (VoIP)
A technology that facilitates making telephone calls across the Internet instead of using conventional telephone lines.
cellular (cell) phone
A telephone that operates over a mobile network. Cell phones can also offer Internet access, text messaging, personal information management (PIM) features, and more.
pseudocode
A text-based approach to documenting an algorithm.
debugger
A tool in an integrated development environment that helps programmers analyze a program as it runs.
Pretty Good Privacy (PGP)
A tried-and-true public-key encryption package available for download; public-key encryption is the most commonly used encryption on the Internet.
object-oriented analysis
A type of analysis in which programmers first identify all the categories of inputs that are part of the problem the program is meant to solve.
binary decision
A type of decision point in an algorithm that can be answered in one of only two ways: yes (true) or no (false).
loop
A type of decision point in an algorithm. In a loop, a question is asked, and if the answer is yes, a set of actions is performed. Once the set of actions has finished, the question is asked again, creating a loop. If the answer to the question is no, the algorithm breaks free of the loop and moves on to the first step that follows the loop.
client/server network (server-based network)
A type of network that uses servers to deliver services to computers that are requesting them (clients).
ring (loop) topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.
server-side program
A type of program that runs on a web server rather than on a computer.
Bluetooth (technology)
A type of wireless technology that uses radio waves to transmit data over short distances (approximately 3-300 feet depending on power); often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.
Bluetooth technology
A type of wireless technology that uses radio waves to transmit data over short distances (approximately 30 feet for Bluetooth 1 and 60 feet for Bluetooth 2). Often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.
dotted decimal number (or dotted quad)
A typical IP address is expressed as follows: 197.169.73.63
IP address
A unique identification number that defines each computer, service, or other device that connects to the Internet.
rapid application development (RAD)
An alternative program-development method; instead of developing detailed system documents before they produce the system, developers first create a prototype, then generate system documents as they use and remodel the product.
Beta Version
An application that is still underdevelopment
extranet
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it.
brute force attack
An attempt to access an account by repeatedly trying different passwords.
What's an e-mail client and e-mail server?
An e-mail client is an e-mailing application (such as Microsoft Outlook) from which an e-mail message is sent, and an e-mail server is a specialized computer that stores, processes, and sends e-mails.
How is an e-mail server different from a communications server?
An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.
HyperText Transfer Protocol Secure
An encrypted protocol for secure transmissions.
private-key encryption
An encryption where only the two parties involved in sending the message have the code.
runtime error
An error in a program that occurs when a programmer accidentally writes code that divides by zero, a mathematical error.
logical error
An error in a program that produces unintended or undesired output, where the syntax is correct but some other human error has occurred.
scope creep
An ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype.
Semantic Web (Web 3.0)
An evolving extensuon of the web in which data is defines in such a way to make it more easily processed by computers
object
An example of a class in object-oriented analysis.
Sound Card
An expanision card that attaches to the motherboard inside your system unit
Network Interface Card (NIC)
An expanision card that enables a computer to connect other computers or to a cable moderm to faciliatate a hogh-speed Internet connetion
multimedia message service (MMS)
An extension of SMS; allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.
What is an IDE?
An integrated development environment (IDE) is a development tool that helps programmers write, compile, and test their programs.
Java
An object-oriented programming language that has a large set of existing classes.
system development life cycle (SDLC)
An organized process (set of steps) to ensure that development proceeds in an orderly fashion.
Transport Layer Security (TLS)
An updated extension of Secure Sockets Layer.
Computer Forensics
Analyzes computer systems with specific techniques to gather potential legal evidence
Web Server
Ancomputer that hosts a website you're requesting - so you can see it on your computer
runtime error
Another kind of error caught when the program executes is a runtime error. That kind of forbidden operation generates a runtime error message.
Cybercrime
Any criminal action perpetrated primarily through the use of a computer
possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility.
Hardware
Any part of a computer you can physically touch
Multimedia
Anything that involves one or more forms of media plus text
Which computer first stored its operating system in ROM?
Apple II
A school network might use a(n) _____ server to store software such as Microsoft Office.
Application
Two main types of software (computer has)
Application Software: Software you use to do task (Everyday) System Software: Helps run computer and coordinate instruction between application software and computers hardware (ie OS)
Factor affect quality of a monitor
Aspect Ratio: Width to Height proportion of a monitor (Normal 4:3, HD 16:9) Resolution: Clearness or sharpness of the image, reflects the number of pixels on the screen Contrast Ratio: Difference in light intensity between brightest white and darkest black a monitor can produce Viewing Angle: Distance in degrees from which you can move to the side or a monitor before the image degrades Brightness: Greatest amount of light showing when the monitor is displaying pure white Response Time: Time it takes for pixels to change color
Cookie File
Assigns an ID to your computer intended to make your return more efficient or geared interests. Contains browsing habits, ads you opened, products you looked at, time and location.
positive acknowledgment (ACK)
Assume that two systems, X and Y, have established a connection. When Y receives a data packet that it can read from X, it sends back a positive acknowledgment (ACK). If X does not receive an ACK in an appropriate period of time, it resends the packet.
Which type of server is designed to keep track of who is logging on to the network and which network services are available?
Authentication
_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user
Authentication
What unintentional denial of service happened in March 2014?
DigitalGlobe launched a crowdsourcing service on which users could help search for the missing Malaysia Airlines Flight 370 in satellite images. The response overwhelmed the company's servers.
Network-ready devices
Directly to a network, either though a wired or wireless connection
Touch Screen
Display screen that respond to commands initiated by touching them with finger or stylus
Graphics Processing Unit (GPU)
Displaying graphics demands a lot of computational work fro the CPU
Taskbar
Displays open and favorite application for easy access
Different types of (monitor) or display screen
Displays text, graphics and videos as soft copies --> only seen on screen Liquid Crystal Display (LCD): Flat-panel monitor, is light and energy efficient Light-Emitting Diode (LED): More energy efficient and better color accuracy and thinner panels then LCD Legacy Technology (CRT): Computing device that use techniques, parts and methods that are no longer popular Organic Light-Emitting Diode display (OLED): Organic compounds that produce light when exposed to an electric current --> doesn't need backlight to function leads to less power draw and smaller display
Network Architecture
Distance between Nodes on a network
Cookies
Do not go through hard drive in search of info only what you supply in forms (personal data). Does not pose a security threat its virtually impossible to hide a virus/malicious software
JavaScript uses the ____________ Model to organize the objects and page elements on a web page.
Document Object.
connectionless protocol
Does not require any type of connection to be established or maintained between two computers that are exchanging information.
Passwords
Don't use easily deduces components Use at least 14 characters Don't use words in dictionary Use mix of upper/lowercase and symbols Never tell anyone or write where someone can see it Change your password often Don't use the same password
When using ____ addressing, your computer is assigned an address from an available pool of IP addresses
Dynamic
____ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the internet
Dynamic
dynamic host configuration protocol (DHCP)
Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP), which belongs to the TCP/IP protocol suite. DHCP takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
Node
Each device connected to a network
variable
Each input and each output item that the program manipulates, also known as a variable, needs to be announced early in the program so that memory space can be set aside.
variable
Each input and output item the program manipulates.
Peer-to-Peer (P2P) Network
Each node connected on the network can communicate directly with every other node on the network
Which of the following browsers was introduced with Windows 10?
Edge
Transmission Media
Either wired or wireless; establish a communication channel between the nodes on a network
What allows the exchange of large amounts of business data in a standardized electronic format?
Electronic data interchange
Audio MIDI Interface
Electronics standard that allows different kinds of electronic instrucments to communicate with each other with computers
File Transfer Protocol
Enables files to be downloaded to a computer or uploaded to other computers.
Telnet
Enables users to login to a remote computer and work on it as if they were sitting in front of it.
information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering.
protocol most commonly used on star networks
Ethernet
Interrupt Handler
Every device has its own type of interrupt, which associates with a special numerical code that prioritize the request
How often to backup
Every time you make changes Image-weekly or after new software installed
Macintosh
Everything Lisa was and then some and about a third of the price
cellular phone (or cell phone)
Evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device. Cell phones offer all of the features available on a traditional telephone system, including automatic redial, call timers, and voice mail capabilities.
Video Card (Video Adapter)
Expanision Card that's installed inside the system unit to translate binary data into the images you view on your moitor
The Internet Crime Complaint Center (IC3) is a partnership between the ________
FBI and National White Collar Crime Center
4 Common Categories for cybercrime
FBI related scams Identity Theft Non auction/Non Delivery of Merchandise Advance Fee Fraud
Device Driver
Facilitates communication between the device and the OS
A communications server is used to host websites on a client/server network
False
A database server acts as a repository for application software.
False
A repeater moves data between two networks
False
fifth-generation language (5GL)
Fifth-generation languages are considered the most "natural" of languages. In a 5GL, a problem is presented as a series of facts or constraints instead of as a specific algorithm. The system of facts can then be queried (asked) questions.
What do most smartphones use to highlight and select information on the touch-sensitive screen?
Fingers or a stylus
Windows __________ helps to block viruses and worms from reaching your computer and logs successful and unsuccessful attempts to connect to it.
Firewall
Packet Filtering
Firewall can be configured so they filter out packets sent to specific logical ports
Osborne
First "portable" Computer Weight 24.5 pounds 5-inch scrreen 64 kilobytes of RAM Preinstalled spreadsheet and word processing software (1981)
Analytical Engine
First Automatic Calculator Developed by Charles Babbage (1834)
Z1
First Mechanical Calculator Developed Konrad Zuse (1936)
Windows 95
First Microsoft OS designed to be principally a GUI OS
Altair 8800
First Personal Computer - 256 bytes of memory, no keyboard or monitor, switches in the front entering data and Light on front indication result of code (1975)
Mosaic
First Web Browser (1993)
Word Star
First Word processing application (1979)
Pascalene
First accurate mechanical calcualtor Blaise Pascal (1642)
Universal Automatic Computer (UNIVAC)
First commercially successfully electronic digital computer --> operated on magnetic tape
Atanasoff-Berry Computer (ABC)
First electrically powered digital computer --> first to use vacuum tubes, instead of the mechanical switches used in older computer to store data Develop by John Atanasoff (1939)
File Name
First path of a file --> generally the name you assign to the file when you save it
Lisa
First successful PC that used GUI
Storage Devices
Flash Drive (Thumb Drive): SSD flash memory storing information on an internal memory chip Flash Card Memory: SD card inside different devices Optical Drive: Hardware that uses laser or light to Read from and maybe even write to CDs, DVDs, or Blu-Ray disc Compact Discs/Digital Video Discs: Originally created for audio (DVDs hold 14 times more than CDs) Blu-Ray: Holds up to 50 GB of data
Extensions (File Type)
Follow the file name and a period or dot
All of the following are sections of a web page EXCEPT ___
Foot
MS-DOS
For IBM computers
interpreter
For a programming language, translates the source code into an intermediate form, line by line; each line is then executed as it's translated.
Network Adapter
For the different nodes on a network to communicate with each other and access the network
Podcast
Form of digital media comprised of a series of audio or video files that are distributed over the Internet
Really Simple Syndication (RSS)
Formats that sends the latest content of the podcast series automatically to aggregtor
CMYK
Four Color printing process (Cyan, Magenta, Yellow and Key --> Black)
Webcam
Front-facing camera that attaches to a desktop computer or is built into a devices
Geolocation
GPS chips to calculate your exact location
control structure
General term used for a keyword in a programming language that allows the programmer to direct the flow of the program based on a decision.
Which of these is NOT an example of potentially harmful software that a hacker could install to gain control of your computer?
Ghost
How is processor speed measured?
Gigahertz: Billions of machine cycles per second
Connectivity Port
Gives access to networks and the Internet
wireless access point (WAP)
Gives wireless devices a sending and receiving connection point to the network.
GPS stands for __________.
Global Position Services
Divine-Command Theory
God is all-knowing and sets morals standards
frame
Groups of data packets that are sent together in a package.
If you want your name to appear in the title bar of the browser window when the web page displays, you should put it in the ____ section.
HEAD
Which HTML section contains elements that are not displayed in a browser when viewing a web page?
HEAD
Zombie
Hacker that controls a computer. Often used to launch denial-of-service attacks on other computers
communication server
Handles all communications between the network and other networks, including managing Internet connectivity.
Iphone Keyboard
Has more than 40 languages
packet screening
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network.
Which of the following possible negative aspects of working as a technician was NOT discussed in the Sound Byte?
Having to work mandatory overtime
next
In the programming language Visual Basic, programmers use the keywords For and Next to implement a loop. After the keyword For, an input or output item is given a starting value. Then the statements, or "sentences," in the body of the loop are executed. When the command Next is run, the program returns to the For statement and increments the value of the input or output item by 1.
information system
Includes data, people, procedures, hardware, and software.
Project Management Tools
Incorporte tasks and calenders sot he indiviidual components as well as the entire project can sta on schedule
feature phones
Inexpensive cell phones with modest processors, simple interfaces, and, often, no touch screens.
Spyware Transmits
Information about you i.e. habits to the owner of the program so that the information can be used for marketing purposes
Internet data is transmitted in packets, and routers use some of the information in a packet to route the data to the correct recipient. List the four packet components mentioned on the website.
Information on the sender's address, the receiver's address, the package's place in the entire message, and how the receiving computer can be sure that the package arrived intact.
List two examples of configuration table information.
Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic
Prevention of future infection
Inoculation records key attributes about files (size/date created) and keeps statistics in safe place
Scanners
Input Devices to input images
Different types of (Microphones)
Input device that lets you capture sound waves and transfer them to digital format on your computer Close Talk: Hands-Free or Attach Headset Omnidirectional: Picks up sound equally well from all directions Unidirectional: Picks up sound from only one direction Clip-On: Clips to cloths or Available wireless
Stylus
Input device that looks like a pen and that you use to tap commands or draw on a screen
____ is the ability of two or more people to communicate in text over the internet in real time
Instant messaging
Program
Instruction set --> provides a with a mean for us to interact with and use the computer
What does IDE stand for?
Integrated Development Environment
derivative work
Intellectual property that is based on an original work but is modified in some way.
Internet of Things (IoT)
Interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer interaction
Internal Hard Drive vs External Hard Drive
Internal Hard Drive: Reside in system unit and usually holds all permanent stored programs and data External Hard Drive: Similar storage capacities, but resides outside the system unit and connect to the computer via port
System Clock
Internal clock (metronome) keeping steady beat and controlling when the CPU moves to the next stage of processing
Which one of the following organizations provides direction for the maintenance and development of Internet protocols?
Internet Architecture Board
IC3
Internet Crime Complaint Center-Partnership between FBI and National White Collar Crime Center (NW3C)
Smartphone Features:
Internet access, Personal information management (PIM), voice recording, Play/organize music, GPS, Digital image and video capture, computing power to run programs like word processing or even video-editing software.
The ____________ is a collection of large national and international networks.
Internet backbone
Which of the following is a private network setup by a business that's used exclusively by a select group of employees and suppliers?
Intranet
TRS-80
Introduce Radio Shack Monochrome Display 4 KB RAM Circuitry is hidden under keyboard 10,000 units in first month
Advanced Research Projects Agency (ARPA)
Invented Internet Created by 4 node-network (UCLA, Standford, UC Santa Barbara and University of Utah) Fathers of Internet - Vinton Cerf and Robert Kahn (1969)
Pretexting
Involves creating a scenario that sounds legit enough that someone will trust you
CyberBullying
Involves the use of digital technology to bully another
Scareware
Is a type of malware that downloads onto your computer and tries to convince you that your computer is infected, pop-ups, banners.
What was the importance of the Turing machine to today's computers?
It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM.
Which of the following statements about HTML is FALSE?
It is a programming language, like Java.
What is a surge arrestor?
It is a unit that is installed near the electric meter, where the power lines run to a building. This protects all the circuits in the house or office from a certain range of voltage surges.
Which of the following statements about Windows Defender is FALSE?
It prevents denial of service (DOS) attacks.
What does creating a restore point do?
It saves the settings of the computer exactly as they are when the restore point is created.
What happens when the Recycle Bin gets full?
It starts permanently deleting its oldest files to make space for new ones.
Collaborative Consumption
Joining together as a group to use a specific product more efficiently
Three categories of apps
Local Apps: Computing device (No Internet needed) --> Microsoft Office Mobile Apps: Computing device (Constant Internet connection) Web-Based Apps: Software as a Service (SaaS) --> vendor hosts the software over the Internet without having to install it on computer
all of the following are examples of network operating systems EXCEPT
MS-DOS
Real-Time Operating System
Machinery that performs a repeptive series of specific tasks in an exact amount of time
Which of the following statements about macros is FALSE?
Macros can only be used one time.
Motherboard
Main circuit board that contains the central electronic components of the computer (located in system unit)
System Files
Main files of the OS
TCP/IP (Transmission Control Protocol (TCP) and Internet Protocol (IP))
Main suite of protocols used is TCP/IP. The suite is named after the original two protocols that were developed for the Internet: the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
Other types of Computers
Mainframe: Large, expensive computer that supports many users at once simultaneously --> big Businesses Super computer: Designed to do perform complex calculations extremely rapidly --> Weather forecast and Atomic energy research Embedded Computer: Self contained computer devices that have their own programming and typically don't receive input from you or interact with other systems (ie Drones) Smartphones: A device with features of a computer including wide assortment of apps, media players, high-quality camera and web connectivity
Switch
Makes decisions as to where the data is to be sent and rebroadcasts it to the appropriate network node.
Financial Planning Software
Manage daily finances (ie Mint)
Three main functions of an operating system
Manages the computer hardware --> processor, memory and storage device as we as peripheral device such as a printer
Control Unit
Manages the switched inside the CPU
processing
Manipulating or organizing data into information.
Do I have to pay for cloud storage services?
Many cloud storage services, like Dropbox, offer free accounts that feature limited amounts of storage.
IBM PC
Marketed to businesses and consumers 64 KB to 256 KB of RAM Floppy disk drives optional Hard Drive not supported by early models (1981)
Arduino was developed by ___________.
Massimo Banzi
Bandwidth (Data Transfer Speed)
Maximum speed at which data can be transmission between two nodes on a network
inheritance
Means that a new class can automatically pick up all of the data and methods of an existing class, and then extend and customize those to fit its own specific needs.
static addressing
Means that the IP address for a computer never changes and is most likely assigned manually by a network administrator or ISP.
CPU Benchmarks
Measurement used to compare performance between processors
If you want to store large collections of media and easily share them with friends and family, what service should you consider if you want free cloud storage?
MediaFire
Define the following Ethernet terms:
Medium: Usually fiber-optic or twisted pair cabling used to provide a path for electronic signals Segment: A single-shared medium Node: A device that attaches to a segment; also called a station Frame: Short messages the nodes use to communicate; variably sized chunks of information
What happened on June 25, 2009, that caused Google to think it was under a DDOS attack?
Michael Jackson died on this day and a spike in searches related to him was so big that it was thought to be a DDOS attack.
All of the following are examples of software suites EXCEPT
Microsoft One-Note
Which of the following is an example of an e-mail client?
Microsoft Outlook
The easiest way to create a web page is to use __________.
Microsoft Word
Pixels
Monitor Screen are made up of millions of tiny dots
Keystroke Logger (Key logger)
Monitors keystrokes with intent of stealing passwords, login id's, or credit card information
SuperFetch
Monitors the applications you use the most and preloads them into your system memory so that they'll be ready to be used when you want them
Virtue Ethics
Morals are internal Strive to be a person that behaves well spontaneously
Swap File (Page File)
More RAM is needed, the OS Swaps out from RAM the data or instruction that haven't recently been used and moves them to a temporary storage area on the hard drive
What was the name of the first web browser?
Mosaic
debugger
Most IDEs include a tool called a debugger that helps programmers dissect a program as it runs. The debugger pauses the program while it is executing and allows the programmer to examine the values of all the variables.
Free Cloud Storage:
Most cloud storage providers, such as Dropbox, iCloud, and OneDrive, feature free accounts with limited amounts of storage and limited features. You can always increase your storage capacity and gain access to more tools by paying a subscription fee for a premium account.
QWERTY Keyboard
Most common keyboard layout
ID Theft
Most financially damaging
Which network is a combination of two or more LANs connected together over long distances?
WAN
What is a car whisperer, and how can you combat it?
Software that intercepts a hands-free Bluetooth conversation in a car. It enables an attacker to speak to the driver as well as eavesdrop on a conversation and receive audio from a Bluetooth-enabled car stereo. One can try to change the security code (passkey), but many devices use 0000 and cannot be changed.
Web Browser
Software that lets you locate, view, and navigate the web
Spreadsheet Software
Software that lets you make calculations and perform numerical analyses (ie Microsoft Excel)
microbrowser
Software that makes it possible to access the Internet from a PDA/smartphone.
Output
Speaker, LCD or OLED
network operating system (NOS)
Special software that needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
e-mail servers
Specialized computers whose sole function is to store, process, and send e-mail.
Home Network Server
Specialized devices designed to store files, share files across the network, and back up files on computer connected to the netwrok
Network-Attached Storage (NAS)
Specialized devices designed to stroe and manage all network data
Hyperlinks
Specially coded elements that let you jump from one web page to another within the same webiste or to another site altogether
Vertical Market Software
Specific industry, such as property management software for real estate professionals
Keywords
Specific words you wish to look for or query
Multipurpose Internet Mail Extensions (MIME)
Specification for sending files as attachments to e-mail.
System Requirement
Specify the minimum recommended standars for the operating system, processor, primary memory (RAM), and hard drive capacity
Three Components to Search Engines
Spider: Constantly collects data Indexer Program: Organizes the data into a large database Search Engine Software: Searches indexed data, pulling out relevant informatuon according to search
gigabit Ethernet
Standard Ethernet network (802.3)
Wireless Fidelity (WiFi)
Standard wireless Ethernet networks --> 802.11ac
JSON
Stands for Javascript Object Notation; a syntax for exchanging information between computers.
World Wide Web (www)
Subtext of the Internet that is connected via hypertext
Top-level Domain
Suffix in the domian name after the dot (ie com or net)
The two major antivirus companies featured in the Sound Byte are __________.
Symantec and McAfee
Types of viruses 1)Boot-Sector 2)Logic Bombs/Time bombs 3)Worm 4)Script/Macro 5)Email 6)Encrytion
Symptoms 1) Existing program disappears 2)Browser goes to unknown page 3)Old messages, pop-ups, images 4)Data files corrupt 5)Program stops working 6)Shuts down unexpectedly
The __________ utility allows you to create a copy of your entire hard drive on an external hard drive.
System Image
Minimum set of recommened statnard for a program is known as
System Requirements
Base-10 number system (Decimal Notation)
System you use to represent all of the numeric values you use each day (0-9 <-- 10 digits) using power of 10
Windows 8 Backup
System-Image backup utility-file history
_____ is the main suite of protocols used on the internet
TCP/IP
The main suite of Internet protocols used to transmit data is called
TCP/IP.
Different types of Portable Computers
Tablet Computer: Integrated into a flat multitouch-sensitive screen, Uses onscreen virtual keyboard --> can connect seperate keyboard (ie. IPad or Microsoft Surface) Laptop or Notebook Computer: Keyboard, Monitor, and other devices integrated into single compact case (ie. MacBook Pro) Ultrabook: Full-featured (lightweight) --> low powers processors and SSD to reduce size and weight to extend battery life (ie. MacBook Air) 2-in-1 PC: Similar to Laptop, but monitor can swivels and fold flat --> Conventional laptop and tablet computer with touch screen Chromebook: Google OS and designed to be connected on the Internet at all times --> Storage in cloud instead of local hard drive
HTML tags
Tags that surround and define HTML content (such as <b> and </b>, which indicate bolding).
Dynamic Host Configuration Protocol (DHCP)
Takes a pool of IP addresses and shares them with hosts on a network on an as-needed basis
short message service (SMS)
Technology that enables short text messages (up to 160 characters) to be sent over mobile networks.
Quick Response (QR) code
Technology that lets the any piece of print in the real world host a live link to online information and video content
variable declaration
Tells the operating system that the program needs to allocate storage space in RAM.
Stealth
Temporary erases code from files where they reside or hide in the active memory
Other Examples of Educational and Reference Software
Test Prep Simulation Instructional Trip Planning Home Design and Improvement Course Management Brain Training Genealogy
electronic text (e-text)
Textual information stored as digital information so that it can be stored, manipulated, and transmitted by electronic devices.
Uncompressed audio file
WAV
Does the IP address remain the same or can it change automatically?
The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.
Static addressing
The IP address for a computer never changes.
user datagram protocol (UDP)
The Internet Protocol is responsible only for sending packets on their way. The packets are created by either the TCP or the user datagram protocol (UDP).
Hypertext Transfer Protocol Secure (HTTPS)
The Internet protocol that ensures data is sent securely over the web.
Preemptive Multitasking
The OS process the task assigned a higher priority before processing a task assigned a low priority
dynamic decision making
The ability of a web page to decide how to display itself based on the choices the reader makes.
token method
The access method used by ring networks to avoid data collisions.
machine language
The actual machine language of a CPU, the sequence of bits (1s and 0s) that the CPU understands.
first-generation language (1GL)
The actual machine language of a CPU; the sequence of bits (1s and 0s) that the CPU understands.
Physical Memory
The amount of RAM actaully sitting on the memory modules in your computer
Physical memory
The amount of RAM that is actually sitting on memory modules in your computer
Application Programming Interface (API)
The application software needs in orfer to interact with the CPU
Path Separator
The backslash character (\), used by Windows
mobile switching center
The base transceiver station passes the request to a central location.
executable program
The binary sequence that instructs the CPU to run their code.
executable program
The binary sequence that instructs the central processing unit to run the programmer's code.
portability
The capability to move a completed solution easily from one type of computer to another.
resolution
The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen.
operators
The coding symbols that represent the fundamental actions of the language.
Platform
The combination of a computer's operating system and processor. The two most common platform tyopes are the PC and the Apple
packet switching
The communications methodology that makes computer communication efficient.
logical errors
The compiler only can make sure that the specific rules of the language are followed, that all of the keywords are spelled correctly, and that the operators being used are meaningful to that language. These logical errors in the problem are caught only when the program executes.
ubiquitous computing
The condition in which computing is so woven into the fabric of everyday life that it becomes indistinguishable from it.
What if the ISP's web server cannot locate the IP information on the default DNS server?
The default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.
Digital Divide
The discrepancy between those who have access to the opportunities and knowledge that computers and the Internet and those who don't
electronic data interchange (EDI)
The exchange of large amounts of data in a standardized electronic format.
What's the first step in programming?
The first step in programming is to define the problem statement.
dotted decimal number (dotted quad)
The form of an Internet protocol address, where sets of numerals are separated by decimals, i.e., 197.169.73.63.
control structures
The general term used for keywords in a programming language that allow the programmer to control (redirect) the flow of the program based on a decision.
Path (Subdirectory)
The information after each slash
source code
The instructions programmers write in a higher-level language.
Binary Language
The language computers use to process data into information, consisting of only the values 0 and 1
first-generation language (1GL)
The machine language of a central processing unit (CPU); the sequence of bits that the CPU understands.
Internet backbone
The main pathway of high-speed communications lines over which all Internet traffic flows.
tunneling
The main technology for achieving a virtual private network; the placement of data packets inside other data packets.
RTM (release to manufacturer)
The manufacturer will make changes before releasing the product to other manufacturers, for installation on new machines for example. That point in the release cycle is called RTM (or release to manufacturers).
CSMA/CD
The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals.
What does synchronization mean?
The process of updating your data so that the files on your smartphone and computer are the same is called synchronization.
Components of Smartphones.
The most fully featured and powerful cellular phones are put in the smartphone category. Like any other computer, a smartphone includes a processor, an operating system, memory, input and output devices, and ports 1. Processors: There are several popular smartphone processors on the market today. 2. Operating Systems: The Android OS, Windows Phone, and iPhone operating systems are the most popular. 3. Input Devices: The input devices are primarily a microphone and touchpad. Some phones offer both a touch screen and a built-in keyboard. And a smartphone's digital camera is also an input device, capturing photos and video. 4. Output Devices: The output devices include a speaker and either a liquid crystal display (LCD) or OLED (organic light-emitting diode) display.
smartphone
The most fully featured and powerful cellular phones.
star topology
The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.
When I attach a file to my e-mail, will SMTP send it to the e-mail server?
The multipurpose Internet mail extensions (MIME) protocol is responsible for sending e-mail file attachments.
My office has shifted to a client/server network and uses one server in the office—is that sufficient?
The number and types of servers you need depends on the workload your network experiences.
sampling rate
The number of times per second a signal is measured and converted to a digital value. Sampling rates are measured in kilobits per second.
Internet Protocol version 4 (IPv4)
The original IP addressing scheme created in the early 1980s.
base class
The original class is called the base class, and the new, modified class is called the derived class,
derived class
The original class is called the base class, and the new, modified class is called the derived class,
If data is broken into chunks and sent over various routes at the same time, how do these packets reach their destination?
The packets contain destination information and are reassembled when they all reach the destination.
testing plan
The part of a problem statement that lists specific input numbers the program would typically expect the user to enter.
error handling
The part of a problem statement where programmers describe what the program should do if the input data is invalid or just gibberish.
testing plan
The part of the problem statement that lists specific input numbers the programmers would typically expect the user to enter; the plan then lists the precise output values that a perfect program would return for those input values.
error handling
The part of the problem statement where programmers must describe what the program should do if the input data is invalid or just gibberish.
CPU usage
The percentage of time that your CPU is working
media access control (MAC) address
The physical address, similar to a serial number, of each network adapter.
network topology
The physical or logical arrangement of computers, transmission media (cable), and other network components.
release to manufacturers (RTM)
The point in the release cycle, where, after beta testing, a manufacturer makes changes to the software and releases it to other manufacturers, for installation on new machines, for example.
general availability (GA)
The point in the release cycle, where, after release to manufacturers, software is available for purchase by the public.
compilation
The process by which code is converted into machine language—the language the CPU can understand
compilation
The process by which code is converted into machine language—the language the central processing unit can understand.
program development life cycle (PDLC)
The process each programming project follows through several stages from conception to final deployment.
Boot Process
The process for loading the operating system (OS) into random access memory (RAM) when the computer is turned on 1. CPU activates BIOS 2. Power-on self-test 3. Load OS to RAM 4. Configuration
authentication
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.
program development life cycle (PDLC)
The process of performing a programming project, which consists of five stages: describing the problem, making a plan, coding, debugging, and testing and documentation.
debugging
The process of running a program over and over to find and repair errors and to make sure the program behaves in the way it should.
What is Bluejacking, and how can you prevent it?
The process of sending a business card to someone within close proximity, hoping the contact will be allowed and an unauthorized connection will be made. To prevent Bluejacking, set the Bluetooth device to hidden, invisible, or nondiscoverable mode.
programming
The process of translating a task into a series of commands a computer will use to perform that task.
synchronizing (or syncing)
The process of updating data on portable devices (such as a cell phone or iPod) and a computer so that they contain the same data.
syncing (or synchronizing)
The process of updating data on portable devices (such as a cell phone or iPod) and computer so that they contain the same data.
synchronizing
The process of updating your data so that the files on your cell phone and computer are the same.
Latencry (Rotational Delay)
Waiting Time
What's a URL and it's parts?
URL (Uniform Resource Locator): Inital access to a particular website by type in unique address Protocol --> http Domain Name --> Website Name Top-Level Domain --> com, net and gov Path or Subdirectory --> rest of the information following domain
Electronic Numerical Integrator & Computer (ENIAC)
US government - sponsored machine developed to calculate the setting used for weapons Developed by John W. Mauchly and J. Presper Ecker (1944)
To program your Arduino, you'll use an Arduino IDE and upload the code to your Arduino via ________.
USB
Distributions (Distros)
Underlying Linux kernel (the code that provides Linux's basic functionality) and special modification to the OS, and may also include additional open source Software
Which of the following statements is false?
Unethical behavior is always illegal
The _____ is a great Arduino for first-time Makers.
Uno
Spam
Unwanted junk or emails
Spam
Unwanted or junk-email find information either list purchase or with software that looks for e-mail addresses on the internet
Spim
Unwanted or unsolicited instant messages
Spyware
Unwanted piggyback program that usually downloads with other software you install from the internet and runs in the background
Solid State Drive (SSD)
Use electronic memory and has no mechanical motors or moving parts --> offer incredible fast access time
Document Object Model (DOM)
Used by JavaScript to organize objects and page elements.
Unshielded twisted-pair cable (UTP)
Used by most home networks.
Simple Mail Transfer Protocol (SMTP)
Used for transmission of e-mail messages across the internet
web server
Used to host a website so it will be available through the Internet.
service packs
Users often uncover problems in a program even after its commercial release to the public. These problems are addressed with the publication of software updates or service packs. Users can download these software modules to repair errors identified in the program code.
software updates
Users often uncover problems in a program even after its commercial release to the public. These problems are addressed with the publication of software updates or service packs. Users can download these software modules to repair errors identified in the program code.
Graphical User Interface (GUI)
Uses icons to represent programs and actions, allowed users to interact with computers more easily (Point and Click Technology)
Bluetooth
Uses radio waves to transmit data signals over short distances (approximately 30 feet for Bluetooth 1 and 60 feet for Bluetooth 2 and 3).
Bluetooth
Uses radio waves to transmit data signals over short distances (less than 100 feet for Bluetooth 4).
third-generation language (3GL)
Uses symbols and commands to help programmers tell the computer what to do. This makes 3GL languages easier for humans to read and remember.
Unicode
Using 16 bits instead of 8 bits --> represents the alphabets of all modern and historic language and notational systems (1,115,00 code points and 96,000 unique charcters)
Cloud Storage
Using a service that keeps your files on the Internet rather then storing you files solely on a local device
Hacktivism
Using computers and computer networks ina subversive way to promote they are overwhelmed and legitimate used can't access the site
virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device.
Social Networking
Using the web to communicate and share information among your firend and other
Reset this PC
Utility program in Windows 10 attempts to diagnose and fix errors in your windows system fiiles that are causing your computer behave imporpoerly
Video Graphics Array (VGA) and Digital Video Interface (DVI)
VGA and DVI two ports on older LCD monitor connects like HDMI now
Authentication
Verification of login name and password
Big Data
Very large data sets that are analyzed to reveal patterns, trends and associations
TCP/IP Protocol
Vinton Cerf and Robert Kahn developed a set of communication rules that allows different types of computers to communicate (1973) IP Protocol (Dotted Quad or Dotted Decimal) - Set of four groups of numbers separated by periods --> computer connected to the Internet identify each other
Software Piracy
Violation a software license agreement by copying an application onto more computers than the license argreement permits
syntax error
Violation of the strict, precise set of rules that define the language.
VBA stands for __________.
Visual Basic for Applications
flowchart
Visual diagram of a process, including the decisions that need to be made along the way.
Which protocol uses standard internet connections to make phone calls over the internet
VoIP
____ technology is used to make free long-distance calls
VoIP
technology used to transmit phone calls over the internet
VoIP
A network consisting of two LANs separated by great physical distances is known as a:
WAN
Different types of email system
Web-Based Email: Managed with you web browers= and allows you to access your email from the web (ie gmail) Email Client: Need to be installed on your computer --> Open program, emails download to computer (ie Microsoft Outlook)
Social Media
Websites or apps allow user to create and share content and/or participate in social networking with each other
Social Media
Websites or apps that allow uses to create and share content and/or particpate in scoial netowrking with others
What is the difference between a power surge and a power spike?
When a power increase lasts 3 nanoseconds or more, it is a power surge. When a power increase lasts only 1 or 2 nanoseconds, it is a power spike.
Smartphone Processors.
When comparing processors, keep in mind processor speed and performance reviews (called benchmarks). Benchmarking reviews measure overall system performance. Reviewers run the same task on competing smartphones and compare the time it takes to complete the task.
Volatile storage
When the power is off, the data stored in RAM is cleared out.
data collision
When two computers send data at the same time and the sets of data collide somewhere in the connection media.
DNS (domain name system)
When you enter the URL in your browser, your computer must convert the URL to an IP address. To do this, your computer consults a database that is maintained on a DNS (domain name system) server that functions like a phone book for the Internet.
private key
When you receive the message, you use your private key to decode it. You are the only one who ever possesses the private key, and therefore it is highly secure. The keys are generated in such a way that they can work only with each other.
Interrupt
When you tell your computer to print your document, the printer generates a unique signal that tells the OS that it's in need of immediate help
What is the name of the Microsoft software that enables you to edit video?
Windows Movie Maker
If your system becomes unstable, you can reset it to a configuration from a past date by using __________.
Windows System Restore
Disk Cleanup
Windows utility that removes unnecessary file form your hard drive
Bluetooth Technology
Wireless transmissions standard that lets you connect devices
packet (or data packet)
With packet switching, data is broken into smaller chunks (each one called a packet or a data packet) that are sent over various routes at the same time.
second-level domain
Within each top-level domain are many second-level domains. A second-level domain needs to be unique within its own top-level domain but not necessarily unique to all top-level domains.
You can create a sophisticated online resume by using Microsoft ____
Word
Boolean Operators
Words such as AND, NOT, and OR that describe the relationship between keyworkds in a search
What was the first word processing application?
Wordstar
The standards to ensure uniformity of HTML around the world are set by the__________.
World Wide Web Consortium
Which of the following is NOT a mobile operating system?
XOS
Is there an alternative to remembering IP addresses?
Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.
Do I need any special software to use dedicated servers?
Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.
How do I perform encryption?
You can encrypt messages using private-key encryption. In private-key encryption, only the two parties involved in sending and receiving the message have the code.
Can you add more memory to a smartphone once you've bought one?
You can expand smartphone memory in some smartphones by using flash memory cards.
Thrashing
You can manually change this setting to increase the amount of hard drive speace allocated, but eventually your computer will become sluggish as it is forced to page more often
File Transfer:
You can transfer data between a smartphone and your computer in a number of ways including through a micro SD card, a USB connector, or wirelessly via Bluetooth or cloud services.
Is there any other safer way to encrypt emails?
You can use public-key encryption. In public-key encryption, two keys are created, one key for encoding and the other for decoding.
Can you tell me which of the smartphone operating systems is better?
You could use Windows, Android, or iOS depending on which OS you were most comfortable working with.
Smartphone Sychronization:
You need a wireless internet service provider to connect a smartphone to the Internet. Once connected to the Internet, your smartphone can take advantage of cloud storage services for transferring files and synchronizing your phone with your computer.
Smartphones and the Internet.
You need a wireless internet service provider to connect a smartphone to the internet.
What server is used to store applications?
You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.
How does the computer know the IP addresses of other computers?
Your computer consults a database maintained on a domain name server to determining other IP addresses.
The packets
contain destination information and are reassembled when they reach the destination. Packet contents vary depending on the protocol being followed. At a minimum, all packets must contain an address to which the packet is being sent, the address from where the packet originates, reassembling instructions if the original data was split between packets, and the data that is being transmitted.
synchronize
coordinate information on a PDA smartphone and PC
The Processing language was developed to make programming more accessible to ______.
creative and artistic people
When packets are sent through the Internet
data packets are sent through different routes to reach the destination.
structured (analytical) data
data that can be identified and classified as discrete bits of information (such as a name or phone number). Unstructured data includes nontraditional data such as audio clips (including MP3 files), video clips, and pictures that must be viewed in their entirety rather than in discrete segments.
time-variant data
data that doesn't all pertain to one period of time-for ex., data in a data warehouse.
A ____ server provides client computers with access to stored information
database
allows client computers to access a database
database server
The process of finding and correcting errors is called ____
debugging
Which of the following is not an advantage of installing a network in a business?
decentralization of files and data
_______ are points at which a program must choose from a range of different actions based on the value of its current inputs.
decision points
A(n)____________ server is used to fulfill one specific function on a network.
dedicated
In a network, ____ servers preform specific tasks such as handling e-mail or managing files.
dedicated
Servers such as print and database are examples of ___ servers that fulfill a specific network function
dedicated
Podcasts enable you to _______
deliver audio/video files via RSS
Denial-of-service (DoS) attack
denied access because a hacker is repeatedly making a request of that computer through a computer they have taken over as a zombie
Which ethical theory focuses on adherence to moral duties and rights?
deontology
Special programs that facilitate communication between a device and the OS are called
device drivers
The ethical theory that states that deities are all-knowing and set moral truth is
divine command theory
Most instant messaging services
do not use a high level of encryption.
Most IM services
do not use encryption for IM messages, and the secure data transmission software used on e-mail does not work with IM programs. Therefore, it is not a good idea to send sensitive information using instant messaging because it is susceptible to interception and possible misuse by hackers.
A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers.
domain name
used in place of an IP address
domain name
changeable IP address
dynamic IP
IP address for a computer is assigned from a pool of available IP addressed
dynamic addressing
A(n) _____ is a specialized computer with the sole function of storing, processing, and sending email
e-mail server
processes and delivers incoming and outgoing e-mail
e-mail server
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer
email client
File Transfer Protocol (FTP)
enables files to be downloaded to a computer or uploaded to other computers
A Trojan horse __________.
enables hackers to remotely control your PC as if they were sitting in front of it
A good way to protect your e-mails is to use _____
encryption
_____ is the process of encoding data so that only the person with the key can decode and read the message.
encryption
process of encoding an e-mail so that only the recipient can read it
encryption
The Binary sequence that instructs the CPU to run the code is called a(n) _____
executable program
Which of the following devices could NOT be connected using Bluetooth technology?
external Blu-ray drive
FBI Website
fbi.gov/about-us/investigate/cyber
In a database, the term ________ is synonymous with a category of information
field
Mac OS
first commercially available OS to incorporate the ability to interact with the computer with user-friendly point-and-click technology
A ____ is a visual representation of a process, including the decisions that need to be made along the way.
flowchart
Data in a ring topology network __________.
flows in one direction only
WML
format used to create web content for cell phones and smartphones
Dynamic addressing
is a temporary IP address assigned to you by your ISP from an available pool of IP addresses. It is assigned by the dynamic host configuration protocol (DHCP) each time you log on to the Internet. IP addresses can also be assigned statically. Static addressing means that the IP address for a computer never changes and is most likely assigned manually by a network administrator.
An IP address
is a unique identification number assigned to each computer, server, or device connected to the Internet. A typical IP address is expressed as a series of numbers separated by decimal points, such as 197.169.73.63, and is called a dotted decimal number. Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for allocating IP addresses to network administrators. To find your IP address, go Google and type "what is my IP."
Digital Living Network Alliance (dlna.org)
is an organization working to standardize different kinds of appliances and network devices used in our homes.
Social Engineering
is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
Input
is microphone and touch pad, digital camera
dynamic addressing
is more common than static addressing.
An e-mail client
is not a computer but rather the e-mailing application (such as Microsoft Outlook) from which an e-mail is sent. An e-mail server is not e-mailing software but rather a specialized computer that stores, processes, and sends e-mails. All e-mail has to pass through e-mail servers.
The multipurpose Internet mail extensions (MIME) protocol
is responsible for sending e-mail file attachments. The MIME specification was introduced in 1991 to simplify attachments to e-mail messages. All e-mail client software now uses this protocol for attaching files. E-mail is still being sent in text, but the e-mail client using the MIME protocol now handles the encoding and decoding of e-mail file attachments for users.
A domain name
is simply a name that takes the place of an IP address, making it easier for people to remember it. Yahoo.com and Aol.com are domain names. Domains are organized by level. The portion of the domain name after the dot is the top-level domain (TLD), such as .com. Within the top-level domain are many second-level domains, such as Amazon.com and Microsoft.com.
Smartphone OS
is stored in ROM
Packet switching
is the communications methodology that makes computer communication efficient. In packet switching, data is broken into smaller chunks called packets, which are sent over various routes at the same time. Packet switching doesn't require that a dedicated communications circuit be maintained.
data mining
is the process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.
HTTPS is different than HTTP because
it is a combination of HTTP and the Secure Sockets Layer (SSL)
Which of the following statements about using ghosting software is false?
it is difficult to use
All of the following are problems with the bus topology EXCEPT ____
it is expensive
All of the following are weaknesses of the bus topology EXCEPT __________.
it is expensive to implement
It can be difficult to fix a wireless connectivity problem because __________.
it might be difficult to replicate the problem
On what is Processing based?
java
Which of the following database systems uses artificial intelligence?
knowledge-based system
digital rights management free
legally free music
A microcontroller is a type of CPU that has ______ functionality.
limited
in a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field.
long text
Arduino programs generally run in a(n) ________, looking for input pins and making decisions to send through the output pins based on the input received..
loop
Bluetooth devices communicate at __________ bandwidths.
low
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
Adware and spyware are examples of __________.
malware
Image backup or system backup
means that all system, apps, and data files are backed up. Ensures you capture changes to apps such as updates. Makes exact copy
All of the following network topologies were discussed in the Sound Byte EXCEPT __________.
mesh
Search engines that search other search engines are called
metasearch engines
Using applications on smartphones and tablets to buy and sell products is known as ________ commerce.
mobile
Hacker
most commonly defined as anyone who unlawfully breaks into a computer system
All of the following would be likely candidates for Bluetooth connectivity EXCEPT a ________.
mouse
Multishirking
multiple non work tasks at same time
network device
node
inkjet printers and laser printers are examples of
nonimpact
unstructured data
nontraditional database data such as audio clips (including MP3 files), video clips, pictures, and extremely large documents. Data of this type is known as a binary large object (BLOB) because it is actually in binary form.