CIS Exam #4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Mixed Reference

A combination of relative and absolute reference.

Machine Language

A first-generation language (1GL) is the actual machine language of a CPU, the sequence of bits (1s and 0s) that the CPU understands.

Source Code

A text listing of commands to be compiled or assembled into an executable computer program.

IP Address

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

Markup Languages

Are designed for the processing, definition and presentation of text. This language specifies code for formatting, both the layout and style, within a text file. The code used to specify the formatting are called tags. HTML is an example of a widely known and used _____.

Backbone

As a "network of networks." The internet is similar to the U.S. highway system, where smaller roads feed into larger, faster highways. The main paths of the internet, along which data travels the fastest, are known collectively as the internet _____. The internet _____ is a collection of large national and international networks, most of which are owned by commercial, educational, or government organizations. These _____ providers, have the fastest high-speed connections.

Hybrid Topology

Because each topology has its own unique advantages, topologies are often combined to construct business networks. Combining multiple topologies into one network is known as constructing a _____. For instance, fair allocation of resources may be critical for reservation clerks at an airline (thereby requiring a ring network), but the airline's purchasing department may require a star topology.

Elements

Blocks of HTML documents are surrounded by pairs of HTML tags such as <b> and </b>, which indicate bolding). HTML tags surround and define HTML content. Each pair of tags and the text between them are collectively referred to as an _____. The _____ are interpreted by the browser, and appropriate effects are applied to the text. The following is an _____ from an HTML document: <i> This should be italicized. </i> The browser would display this _____ as: This should be italicized.

Copying Relative Formulas

By default, all cell references are relative references. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2. Relative references are especially convenient whenever you need to repeat the same calculation across multiple rows or columns.

DOM Document Object Model

Just as cascading style sheets organize and combine the attributes of objects on a web page, JavaScript uses the _____ to organize the objects and page elements. The _____ defines every item on a web page-including graphics, tables, and headers-as an object. Then with _____, similar to cascading style sheets, web developers can easily change the look and feel of these objects.

Cell Names

Select the cell, range of cells, or nonadjacent selections that you want to name. Click the Name box at the left end of the formula bar. Name box. Type the name that you want to use to refer to your selection. Names can be up to 255 characters in length.

Control Structures

The general term used for keywords in a programming language that allow the programmer to direct the flow of the program based on a decision.

HTTP Hyper Text Transfer Protocol

Was created especially for the transfer of _____ documents across the internet. Recall that _____ documents are documents in which text is linked to other documents or media.

Jam Signal

When 2 nodes (#1 and #2) begin transmitting data signals at the same time, signals collide, and a node on the network (#3) detects the collision. Node #3 then sends a special signal called a _____ to all network nodes, alerting them that a collision has occurred. The original nodes (#1 and #2) then stop transmitting and wait a random amount of time before retransmitting their data signals.

DNS Domain Name System

When you enter a URL in your browser, your computer converts the URL to an IP address. To do this, your computer consults a database maintained on a _____ Server that functions like a phone book for the internet.

5GL Fifth Generation Languages

are considered the most "natural" of languages. In a ( ) a problem is presented as a series of acts or constraints instead of as a specific algorithm. The system of facts can then be queried (asked) questions. PROLOG (PROgrammingLOGic) is an example. A PROLOG can be a list of family relationships and rules such as "Mike is Sally's Brother."

Router

A ______ is designed to send information between two networks. To accomplish this, the _____ must look at higher-level network addresses (such as IP addresses), not MAC addresses. When the _____ notices data with an address that doesn't belong to a device on the network from which it originated, it sends the data to another network to which it is attached or out to the Internet.

OC Optical Carrier Line

A backbone is typically a high-speed fiber-optic line, designated as an OP line. _____ lines come in a range of speeds, from 0.052 Gbps for _____-1 to the fastest _____-768, which runs at almost 40 Gbps.

IDE Integrated Development Environment

A developmental tool that helps programmers write and test their programs. It can often be configured to support many different languages. Ex: IDE jGRASP working with Java Code.

Copying Mixed References

A mixed cell reference is either an absolute column and relative row or absolute row and relative column. When you add the $ before the column letter you create an absolute column or before the row number you create an absolute row. For example, $A1 is absolute for column A and relative for row 1, and A$1 is absolute for row 1 and relative for column A. If you copy or fill the formula across rows or down columns, the relative references adjust, and the absolute ones don't adjust.

Firewall

A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Pie Chart

A pie chart shows each data point as a proportion to the whole data series. The pie chart displays as a circle, or "pie," where the entire pie represents the total value of the data series. Each slice represents a single data point. The larger the slice, the larger percentage that data point contributes to the whole. Use a pie chart when you want to convey percentage. Unlike column, bar, and line charts that typically chart multiple data series, pie charts represent a single data series only.

Compiler

A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language. It can "read" the source code, which comprises the instructions programmers have written in the higher-level language and can translate the source code directly into machine language - the binary patterns that will execute commands on the CPU. You can learn more about the details of the binary number system in the Technology in Focus section, "Under the Hood."

Looping

A second decision point that often appears in algorithms is a repeating loop. In a loop, a question is asked, and if the answer is yes, a set of actions is performed. Once the set of actions has finished, the question is asked again, creating a loop. As long as the answer to the question is yes, the algorithm continues to loop around and repeat the same set of actions. When the answer to the question is no, the algorithm breaks free of the _____ and moves on to the first step that follows the loop.

Key Pairs

A set of 2 linked data items; a key, which is a unique identifier for some item of data, and the value, which is either the data that is identified or a pointer to the location of that data. _____ are frequently used in lookup tables, hash tables and configuration files.

IF Statement

A string of commands that determine whether a condition is met or not. Just like a yes-no question, if the specified condition is true, Excel returns one user-determined value and, if false, It returns another. The IF statement is also known as a logical formula: IF, then, else. If something is true, then do this, else/otherwise do that. For example, if it's raining, then close the windows, else/otherwise leave the windows open. The syntax (or sentence structure; that is, the way the commands are organized in the formula) of an Excel IF statement is: =IF(logic_test, value_iftrue, value_if_false). IF statements are used in all programming languages, and although the syntax may vary slightly, the function provides the same results.

Ethernet

A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. Most widely installed Local Area Network. _____ is a standard way to connect computers on a network over a wired connection.

Cell Name Editing

After entering data in a cell, you may need to change it. For example, you may want to edit a label to make it more descriptive, such as changing a label from OKC Office Systems Information to OKC Office Systems Pricing Information. Furthermore, you might realize a digit is missing from a value and need to change 500 to 5000. 1. Click the cell. 2. Click in the Formula Bar or press F2 to put the cell in edit mode. The insertion point displays on the right side of the data in the cell when you press F2. 3. Make changes to the content in the cell. 4. Click or press Enter.

Bandwidth

Also defined as the amount of data that can be transmitted in a fixed amount of time. For digital devices, the _____ is usually expressed in bits per seconds(bps) or bytes per second. For analog devices, the _____ is expressed in cycles per second, or Hertz (Hz).

TCP/IP Transmission Control Protocol and Internet Protocol

Although many protocols are available on the internet, the main suite of protocols used is _____. The suite is named after the original two protocols that were developed for the internet: the _____. Although most people think that the _____ suite consists of only two protocols, it actually comprises many interrelated protocols.

Copying Absolute Identifiers

An absolute cell reference provides a constant reference to a specific cell. When you copy a formula containing an absolute cell reference, the cell reference in the copied formula does not change, regardless of where you copy the formula. An absolute cell reference appears with a dollar sign before the column letter and row number, such as $B$4.

Range

An essential skill any Excel user should know is how to determine the range of values in Excel. The difference between the highest and lowest figures in a group of data - the range - can be valuable in accurate decision making, budgeting, and forecasting. A range refers to a group of adjacent or contiguous cells in a worksheet. A range may be as small as a single cell or as large as the entire worksheet. It may consist of a row or part of a row, a column or part of a column, or multiple rows or columns, but will always be a rectangular shape, as you must select the same number of cells in each row or column for the entire range.

Runtime Error

Another kind of error caught when the program executes is a _____. For example, it's easy for a programmer to accidentally write code that occasionally divides by zero, a big "no-no" mathematically. That kind of forbidden operation generates a _____ message.

Peer-to-Peer

Aside from the smallest networks - such as _____ networks, which are typically used in homes and small businesses-the majority of computer networks are based on the client/server model of computing. Recall that a _____ network, each node connected to the network communicates directly with every other node rather than using a server to exercise central control over the network. Many tasks that individual users must handle on a _____ network can be handled centrally at the server in a client/server network. Client/server networks are said to be centralized. _____ networks, on the other hand, are decentralized. _____ networks become difficult to administer when they're expanded beyond 10 users. Each computer may require updating if there are changes to the network, which isn't efficient with large numbers of computers.

Brute force attack

Attempting to access an account by repeatedly trying different passwords is known as a _____. To prevent these attacks from succeeding, network administrators often configure accounts so that they'll disable themselves after a set number of login attempts using invalid passwords have been made

Beta Version

Before its final commercial release, software is often provided free or at a reduced cost in a ______ to certain test sites or to interested users. By providing users with a ________ of software, programmers can collect info. about remaining errors in the code and make a final round of revisions before officially releasing the program. Often, popular software packages like Microsoft Windows and Microsoft Office are available for free ______ download for months before the official public release.

Date Calculations

Calculating the number of days using Excel is pretty simple. Just use a formula to subtract the later date from the earlier date. For example, if cell A1 contains 1-Jan-2004 and cell A2 contains 03-March-2004, you simply enter the formula =A2-A1 in cell A3 to get the number of days. At first the result may look strange. Excel assigns serial numbers to dates. The date January 1, 1900 is the equivalent to the number 1. The number 2 is the equivalent of January 2, 1990 and so on. Basically, Excel adds 1 to every serial number as each day passes. Therefore the newer the date, the bigger the equivalent serial number. For example, assume today is January 1, 2018, and you graduate on May 6, 2018. To determine how many days until graduation, subtract today's date from the graduation date. Excel uses the serial numbers for these dates (43101 and 43226) to calculate the difference of 125 days. The TODAY function displays the current date in a cell. Excel updates the TODAY function results when you open or print the workbook. The TODAY function does not require arguments, but you must include the parentheses. If you omit the parentheses, Excel displays #NAME? In the cell with a green triangle in the top-left corner of the cell. When you click the cell, an error icon appears that you can click for more information. =TODAY(). The NOW function uses the computers clock to display the current date and military time that you have last opened the workbook. The date and time will change every time the workbook is opened. Like the TODAY function, the NOW function does not require arguments, but you must include the parentheses. Omitting the parentheses creates a #NAME? error. =NOW().

XML Extensible Markup Language

Describes the content in terms of what data is being described rather than how it's to be displayed. Instead of being locked into standard tags and formats for data, users can build their own markup languages to accommodate particular data formats and needs. ______ custom packages: MathML, X3D, MusicXML.

Flowchart Shapes

Diamond [Binary Decision;A yes/no question will be asked here. Rectangle [Process;Series of steps of work will be done here]. Parallelogram [Input/Output;Data will be read (input) or printed (output)]. Oval [Terminate;Seen at the end of the program]. Directed Line [Direction of Flow;Shows the path to follow to the next executable instruction].

Portability

Higher-level programming languages have the capability to easily produce a program that will run on differently configured CPUs. For example, if programmers wrote directly in the assembly language for an Intel i7 CPU, they would have to rewrite the program completely if they wanted it to run on a Sun workstation with the SPARC T5CPU. Thus, higher-level programming languages offer _____ - the capability to move a completed solution easily from one type of computer to another.

Tags

In information systems, a _____ is a keyword or term assigned to a piece of information such as an internet bookmark, digital image, database record, or computer file. This kind of metadata helps describe an item and allows it to be found again by browsing or searching.

4GL Fourth Generation Languages

Include database query languages and report generators. Structured Query Language (SQL) is a database programming language that is an example of this. The following SQL command would check a huge table of data on the employees and build a new table showing all those employees who worked overtime.

POP Point of Presence

Individual internet users enter an ISP through a _____, which is a bank of modems, servers, routers, and switches which many users can connect to an ISP simultaneously. ISPSs maintain multiple ______ throughout the geographic area they serve.

VPN Virtual Private Network

Intranets and Extranets often use _____ to keep information secure. A _____ uses the public internet communications infrastructure to build a secure, private network among various locations. Although WANs can be set up using private leased communications lines, these lines are expensive and tend to increase in price as the distance between points increases. VPNs use special security technologies and protocols that enhance security, a private leased line.

Packet screening

Involves having an external screening router examining incoming data packets to ensure that they originated from or are authorized by valid users on the internal network. Unauthorized or suspect packets are discarded by the firewall before they reach the network. _____ also can be configured for outgoing data to ensure that requests for information to the Internet are from legitimate users.

Protocol

It is a set of rules for exchanging communications. Although many people think that Ethernet is a type of network topology, it's actually a communications _____. Therefore, an Ethernet network could be set up using almost any type of physical topology.

Authentication

It is the process whereby users prove they have authorization to use a computer network. For example, correctly entering the user ID and password on your college network proves to the network that you have authorized access. The access is authorized because the ID was generated by a network administrator when you became an authorized user of the network.

PMT Arguments

One of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. PMT(rate,nper,[fv],[type]). The PMT function syntax has the following arguments: Rate-Required. The interest rate for the loan. Nper-Required. The total number of payments for the loan. Pv-Required. The present value, or the total amount that a series of future payments is worth now;also known as the principal. Fv-Optional. The future value, or a cash balance you want to attain after the last payment is made. If fv is omitted, it is assumed to be 0 (zero), that is, the future value of a loan is 0. Type-Optional. The number 0(zero) or 1 indicates when payments are due.

Inheritance

Programmers must study the relationships between objects. Hierarchies of objects can be built quickly in object-oriented languages using this mechanism. _____ means that a new class can automatically pick up all the data and methods of an existing class and then can extend and customize those to fit its own specific needs.

Visual Basic

Prototypes for Windows applications are often coded in Microsoft _____, a powerful programming language used to build a wide range of Windows applications. One strength of _____ is its simple, quick interface, which is easy for a programmer to learn use. It has grown from its roots in the language BASIC (short for Beginner's All-purpose Symbolic Instruction Code) to become a sophisticated and full-featured object-oriented language.

Flowchart

Provides a visual representation of the patterns the algorithm comprises. Specific shape symbols.

MIME Multipurpose Internet Mail Extensions

SMTP was designed to handle text messages. When the need arose to send files by e-mail, the _____ specification was introduced. All e-mail client software now uses this protocol to attach files. E-mail is still sent as text, but the email client using the _____ protocol now handles the encoding and decoding for the users. When attaching a file, your e-mail client transparently encodes and decodes the file for transmission and receipt.

Spooler

Software that manages sending jobs to the printer. When an application prints a document, the formatted output is stored on disk, and the print _____ feeds the print images to the printer in the background at slower printing speeds.

Date Values

The Excel DATEVALUE function converts a date represented as text into a proper Excel date. For example, the formula=DATEVALUE("12/31/2015") returns a serial number in the Excel date system that represents December 31, 2015. Proper Excel dates are more useful than text dates since they can be directly manipulated with formulas and pivot tables to create summaries and perform other date-based analysis.

Column Identifiers

The column index number is the column number in the lookup table that contains the return values. A worksheet contains columns and rows, with each column and row assigned a heading. Columns are assigned alphabetical headings from columns A to Z, continuing from AA to AZ, and then from BA to BZ, until XFD, which is the last of the possible 16,384 columns

ICANN Internet Corporation for Assigned Names and Numbers

The numeric zip code is the unique postal identification for a specific geographic area. IP addresses must be registered with _____ to ensure they're unique and haven't been assigned to other users. _____ is responsible for allocating IP addresses to network administrators.

Function Syntax

The syntax of an Excel or Google Spreadsheet function refers to the layout and order of the function and its arguments. A function in Excel and Google Spreadsheets is a built-in formula and all functions begin with the equal sign (=) followed by the function's name - such as IF, SUM, COUNT or ROUND.

Encryption

This refers to the process of coding your e-mail so that only the person with the key to the code (the intended recipient) can decode or decipher the message. There are 2 basic types: 1. Private-key 2. Public-key. In private-key, only the 2 parties involved in sending the message have the code. In public-key, two keys known as a key pair, are created. You use one key for coding and the other for decoding.

Circuit Switching

This has been used since the early days of the telephone for establishing communication. In _____, a dedicated connection is formed between two points (such as two people on phones), and the connection remains active for the duration of the transmission. This method of communication is important when communications must be received in the order in which they're sent, like phone conversations. When applied to computers, however, _____ is inefficient.

Bridge

This is a device that's used to send data between different collision domains, depending on where the recipient device is located. For Ex: Signals received by the bridge from Collision Domain A are forwarded to Collision Domain B only if the destination computer is located in that domain.

Star Network

This is a local area network LAN in which all nodes (workstations or other devices) are directly connected to a common central computer. Every workstation is indirectly connected to every other through the central computer. In some star networks, the central computer can also operate as a workstation.

Top-down Design

This is a systematic approach in which a problem is broken into a series of high-level tasks. In _____, programmers apply the same strategy repeatedly, breaking each task into successively more detailed subtasks. They continue until they have a sequence of steps that are close to the types of commands allowed by the programming language they'll use for coding.

Bus network or Bus Topology

This is an arrangement in a local area network (LAN) in which each node (workstation or other device) is connected to a main cable or link called the bus. The illustration shows a _____ with five nodes. All computers are connected in sequence on a single cable. This topology has largely become legacy technology bc star topologies are more efficient on Ethernet networks, and a ______ isn't designed to easily support wireless connections. However, _____ are still found in some manufacturing facilities where groups of computer-controlled machines are connected.

CGI Common Gateway Interface

This makes a web page more interactive. Most browser requests merely result in a file being displayed in your browser. To make a website interactive, you may need to run a program that performs a certain action (such as gathering a name and address and adding it to a database). The _____ provides a methodology by which your browser can request that a program file be executed instead of just being delivered to the browser. This enables functionality beyond thee simple display of information.

XML eXtensible Markup Language

This markup language enables designers to define their own data-based tags, making it much easier for a program running on a server computer (a web service) to transfer the key information on its page to another site. When websites communicate with humans, HTML works well because the formatting it controls is important. People respond immediately to the visual styling of textual information; its layout, color, size, and font design all help to transfer the message of the page to the reader. With _____, groups can agree on standard systems of tags that represent important data elements. For example, the _____ tags <stock> and </stock> might delimit key stock quote information.

Java Applet

This program doesn't care which CPU, OS, or user interface is running on the machine on which it lands. This is possible because the target computer runs a Java Virtual Machine (VM) software that can explain to the Java program how to function on any specific system. A Java VM installed with Microsoft Internet Explorer, for example, allows Internet Explorer to execute any _____ (small java-based program) it encounters on the internet.

Bastion host

To increase security even further, most large networks add a _____, which is heavily secured server located on a special perimeter network between the company's secure internal network and the firewall. To external computers, the _____ gives the appearance of being the internal network sever. Hackers can waste a lot of time and energy attacking the bastion host. However, if the hacker breaches the _____ server, the internal network isn't vulnerable because the _____ isn't on the internal network.

Network Wire Types

Twisted-pair cable consist of pairs of copper wires twisted around each other and covered by a protective sheath (jacket). The twists are important bc they cause the magnetic fields that form around the copper wires to intermingle, making them less susceptible to outside interference. The twists also reduce the amount of crosstalk interference. If the twisted-pair cable contains a layer of foil shielding to reduce interference, it's called shielded-twisted-pair (STP cable). Most home networks use unshielded twisted-pair (UTP cable) that doesn't have the foil shielding. UTP cable is more susceptible to interference than STP cable. Coaxial cable consists of 4 main components: 1. A core (usually copper) is in the very center and is used for transmitting the signal. 2. A solid layer of nonconductive insulating material (usually a hard, thick plastic) surrounds the core. 3. A layer of braided metal shielding covers the insulation to reduce interference with signals traveling in the core. 4. An external jacket of lightweight plastic covers the internal cable components to protect them from damage. Fiber-optic cable is composed of the following: 1. A glass (or plastic) fiber (or a bundle of fibers called a core) through which the data is transmitted 2. A protective layer of glass or plastic cladding is wrapped around the core to protect it. 3. For additional protection, it has an outer jacket (sheath), which is often made of a durable material such as Kevlar (the substance used to make bulletproof vests).

IF Function Results

Use the IF function, one of the logical functions, to return one value if a condition is true and another value if it's false. For example: =IF(A2>B2,"OverBudget","OK"). The IF function is one of the most popular functions in Excel, and it allows you to make logical cparisons between a value and what you expect. In its simplest form, the IF function says: IF(Something is True, then do somomething, otherwise do something else). So an IF statement can have 2 results. The 1st result is if your comparison is True, the 2nd is if your comparison is False.

Order of Math Operations

When more than one operator is included in a formula, evaluation of the formula follows a set procedure, called the order of operations. The order of operations requires that the following operations be evaluated in order from highest to lowest: 1. Parenthetical information (anything in parentheses) 2. Exponentiation 3. Multiplication and Division- evaluated from left to right if both operators are present in a formula. 4. Addition and Subtraction - evaluated from left to right if both operators are present in a formula. The order of operations are rules that control the sequence in which arithmetic operations are performed, which affects the result of the calculation.

Copying Functions

When you copy a formula, the cell references may change based on the type of cell reference that you use. 1. Select the cell that contains the formula that you want to copy. 2. On the Home tab, in the Clipboard group, click Copy. 3. Do one of the following: To paste the formula and any formatting, on the Home tab, in the Clipboard group, click Paste. Or to paste the formula only, on the Home tab, in the Clipboard group, click Paste, click Paste Special, and then click Formulas. 4. Verify that the cell references in the formula produce the result that you want. If necessary, switch the type of reference by doing the following: 5. A. Select the cell that contains the formula. B. In the formula bar select the reference that you want to change. C. Press F4 to switch between the combinations. The following table summarizes how a reference type updates if a formula that contains the reference is copied 2 cells down and 2 cells to the right

IPV6 Internet Protocol Version 6

is an IP addressing scheme developed by the IETF to make IP addresses longer, thereby providing more available IP addresses. _____ uses 128-bit addressing instead of 32-bit addressing. An _____ address would have the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. Each digit is a hexadecimal digit.

Moving Relative Formulas

You can move and copy text and numbers between cells, but when it comes to copying formulas, beware of a few gotchas. When you move or copy a formula, Excel automatically changes the cell references to work with the new location. That's because, by default, cell references in formulas are relative references.

Website

You use HTML do design this. Most common scripting language for ----- is javascript which makes web pages very interactive.

Lookup Functions

You use one of these functions when you need to look in a single row or column and find a value from the same position in a second row or column. For example, let's say you know the part number for an auto part, but you don't know the price. You can use the LOOKUP function to return the price in cell H2 when you enter the auto part number in cell H1. Use VLOOKUP to search one row or column, or to search multiple rows and columns (like a table). It's a much improved version of LOOKUP.


Kaugnay na mga set ng pag-aaral

Art Appreciation, Midterm Images

View Set

Chapter 5: Final Consumers and Their Buying Behavior

View Set

Ch. 10 sociology; Race, Ethnicity, and Racism

View Set

SA_20190319_Solar Jets Cause Standing Waves in Earth's Magnetic Field

View Set

Financial Acct Chapter 2 WileyPlus

View Set