DSST Introduction to Computing, or Information Systems and Computer Applications CLEP

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

2600 BC

abacus developed by China

1 Mb

approx. 1 million bits

1 TB

approx. 1 trillion bytes; 1 terabyte

yottabyte

approx. 1,200,000,000,000,000,000,000,000 bytes.

.bin

binary file only readable by a computer

.bmp

bitmap picture

bps

bits per second

System Unit

case that contains all of the components needed for your computer to work

Kernel

Central component of OS; remains in main memory and manages programs not resident in main memory to perform tasks that support applications. Also called a supervisor.

Server

Central computer holding a collection of data and/or apps for providing services to workstations on PCs.

Mainframe Computers

Centralized computer systems used by large organizations. All processing is done on the mainframe, central user. Individual users would access the system using a video terminal. Since terminals are no longer in use, this requires a terminal emulator software. These systems use TUI and Command-line User Interface.

Job redesign

Changing an existing job design

Fiber optic cables

Channel data through light in fiberglass/plastic cables.

Broadband

Channel with high bandwidth; low bandwidth channels are called narrowband.

Operator

Character that indicates an action to be taken on an operand. It's either mathematical (-, *, /) or comparative (<, >, !-)

Semiconductor

Chip made primarily of silicon that receives a charge to hold the data. Uses electrical impulses to read and write.

Service pack

Collection of Microsoft files for security improvements, bug fixes, and software updates.

SQL (Standard Query Language)

Collection of commands that manipulate data; uses DDL and DML.

Physical database

Collection of files that contain the data

DML (Data Manipulation Language)

Collection of instructions used to move/edit items in databases.

Database

Collection of interrelated files on a computer system. Files are organized according to common elements to simplify retrieval.

Telecommunications system

Collection of nodes and links to enable telecommunication (communication at a distance using electrical signals or electromagnetic waves). Examples: telephone network, radio broadcasting system, computer networks, Internet.

Information

Collection of related records

Data warehouse

Collects various databases. A mart is a subsection focusing on a specific set of databases.

Mixed processing

Combines elements from Batch Processing and Transactional Processing.

Object-relational DBMS

Combines elements of the relational DBMS and the object-oriented DBMS. Uses a relational model to describe associations between data tables, but makes it possible to store multimedia objects.

Spiral Model

Combines the waterfall and prototyping models; good for large, complicated processes. The first prototype is 'waterfalled', and then the second one, and so on.

Information System

Combining of users, technology, and processes to complete a specific goal

Network Server

Combo of hardware and software that responds to computational requests from other computers on the network

Firmware

Combo of software and hardware. Like software, it includes instructions for hardware. Actually includes hardware as an actual memory chip, and it consists of permanent software stored into ROM.

Beta test

Comes after the alpha test; a small sampling of the end-user group tests the functionality of newly designed software. Includes usability testing. This test is done by off-site testers.

.csv

Comma separated values - stores tabular data with minimal formatting.

EDI (Electronic Data Interchange)

Commonly used by companies with shipping warehouses. Specifies how information must be exchanged in digital format through a VAN, VPN, or the Internet and determines standards for email, intranet, and extranet use. ANSI is an example.

ISP (Internet Service Provider)

Company that provides access to the Internet, such as Compass, Verizon, AT&T, EarthLink, etc.

Object

Component of a program that knows how to perform certain actions (methods) and how to interact with other elements of the program.

Composite key

Composed of multiple attributes; only a combination of attributes uniquely identifies a record. (e.g. customer ID or phone number).

CSNET

Computer Science Network; formed idea to have multiple networks connected with one main network.

CISC

Computer based on a CPU with a complex instruction set (unlike the RISC).

Internet host

Computer connected to Internet to provide resources to the network

Workstation

Computer connected to a LAN

TUI (Text-based User Interface)

Computer interface in which every menu option in a software application corresponded to a character (e.g. O=Open, F=Find, R=Read, etc.)

Stand-alone computer

Computer not connected to any kind of network

Volunteer distributed computing

Computer processing power available over the Internet when not using their computer. (e.g. SETI@home project)

Application Software

Computer program designed to carry out a specific task; can be characterized as Personal, Workgroup, or Enterprise.

Killer Application

Computer program so useful and popular, it proves the core value of some larger technology. Email was the first ______ for ARPANET and the Internet.

Compiler

Computer program that translates a program (source code) written in a high-level language to the machine language of a computer. It translates source code into machine/compiled code; once that is executed (the program is run), the program processes input to produce output.

Hacker

Computer programmer with advanced knowledge of computers and computer networks

Master computer

Computer unit running controller software. The other units are called 'workers'.

Application server

Computer which runs one application and returns the processed results of requests to the right workstation.

POS (Point of Sale) Terminals

Computer-based devices/systems that allow merchants to process credit cards, track customer purchase habits, and manage inventory. Replaced cash registers.

Office automation systems

Computerize day-to-day office tasks, like email, word processing, voice mail, scheduling, databases, etc.

Token Ring LAN

Computers are connected to form a loop, and use a token to pass a message around the network.

CTS (Carpal tunnel syndrome)

Condition in which pressure on the median nerve through the wrist's bony structure produces pain; can be caused by using computers often.

DHCP (Dynamic Host Configuration Protocol)

Configures network devices so they can communicate on an IP network. Assigns dynamic IP addresses to devices on a network.

WAN (Wide Area Network)

Connects a large area: country(s) or entire world.

Network hub

Connects workstations, broadcasting every packet to all of its ports, resulting at times in delays (latency), due to unnecessary bandwidth usage.

Tree data structure

Consists of a root/parent node, followed by children nodes, followed by leaf nodes. One side is called a branch. If there's only two children, it's called a binary tree.

SCM (Supply Chain Management)

Consists of all that's involved in bringing a product to a customer, starting with the production of the product. Tracks supply/demand, production, marketing, etc.

BAN (Body Area Network)

Consists of wearable computer devices

ERP (Enterprise Resource Planning)

Consolidates all of an organization's processes into one centralized system, facilitating the sharing of info between departments for optimal decision making. Evaluates the company's operations.

Smart Cards

Contain a chip to deduct charges; rapidly replacing coins; FedEx was one of the first places to use them

ROM (Read-Only Memory) Chips

Contain fixed computer start-up instructions, are loaded at the factory, and are nonvolatile. The info on these chips can't be altered by the user.

Program files

Contain operation instructions for specific applications used by a computer

Database index

Contains a list of keys; each key provides a pointer to the record that contains the rest of the fields related to that key. Can organize data in alphabetical or numerical order.

Boot disk

Contains minimal OS files and is often used for troubleshooting/installing a new OS. Also called a bootable floppy disk.

Field

Contains the smallest unit of meaningful data - the basic building block for a structured file or database (e.g. names, address, social security number, etc.) A collection of these makes up a record.

Body

Contents of a data packet

Analog data

Continuous, analogous to actual facts represented - like nature.

EPN (Enterprise Private Network)

Controlled by one organization, connecting multiple locations. Used by places like health networks.

Importing data

Converting data from one format to a format compatible with the program you're currently using

Receiver

Converts signals back into usable info

System software

Coordinates the activities and functions of hardware and software, and controls the operations of computer hardware. Includes Utility Software, Device Drivers, and Firmware. An OS is one example.

Freeware

Copyrighted software available for free.

Lotus 1-2-3

Created by IBM, this was one of the earliest spreadsheet software; largely responsible for the spreadsheet's popularity in the 1980s. But it declined in popularity and was removed from the market in 2013.

ARPANET

Created in 1969, connecting four universities. Used a packet-switching approach, with messages broken into arbitrary packets routed across the network.

TCP (Transmission Control Protocol)

Created in 1974; a document describing it first used the term 'internet' to be short for 'internet working'.

Terminal emulator software

Creates a video terminal interface to the mainframe system but runs with the regular operating system of a desktop computer.

DBA (Database Administrator)

Creates and maintains databases, queries, and reports. Needs to know query languages and how to set user permissions and care for security. Also needs good communication skills and above average critical thinking.

Software Prototyping Model

Creates and tests prototypes of software applications.

CSS (Cascading Style Sheets)

Creates templates that can be applied to multiple HTML documents. The content is organized in an HTML file, but the _____ specifies design elements like layout, color scheme, and fonts. Supported by WYSIWYG. Developed by W3C (World Wide Web Consortium). Composed of a selector and declaration.

Web Developer

Creates, or supervisors the creators of, a website. Will spend a lot of time with marketing and management departments, so needs excellent communication skills.

Looping

Cycling through an instruction set until a condition is met.

Consistent data

Data identical to data in another location within the same database

Online processing

Data is instantly processed as it is entered; more modern data processing method.

Network Layer

Data is sent to the appropriate destination address; error handling, routing, and forwarding is done.

Transport Layer

Data pockets are given headers, including originating and destination addresses; this is required for the completion of data transfer.

Boolean logic

Data type in which each item has a true or false value; works well with binary systems. True is represented with a 1 and false with a 0.

Distributed database

Database consists of multiple, interrelated databases stored at different computer network sites.

Windows registry

Database that maintains a record of installed software and peripheral devices, preferences, and settings. When software and hardware is installed, the information is recorded here.

Presentation Layer

Deals with syntax, formatting, encrypting, and decrypting of data. (e.g. ASCII data could be changed into EBCDIC format)

DPI (dots per inch)

Decides a printer's quality of sharpness in an image

Selector

Decides upon the element to which a rule is applied; (e.g. in h1{color:purple;}, the h1 is the ______.)

Embedded computers

Dedicated to accomplishing a specific task in an appliance or device (like watches and traffic lights). Also called microcontrollers.

Prototype

Demonstrates the main features of the system without all the detailed functionality. Used to identify requirements, demonstrate technical feasibility of proposed systems, and convince people that the system is worth developing. Emphasizes users' feedback.

Dot pitch

Distance measured diagonally between two pixels of the same color on a computer hardware. Sharper images have a lower pitch.

DNS (Domain Name System)

Distributed database comprised of all the websites on the Internet and corresponding IP addresses. No one DNS server contains the entire database.

Switching

Dividing the message in a data packet into smaller parts.

WiFi

Does NOT mean Wireless Fidelity, as is commonly thought

POST (Power On Self Test)

Does a basic check for problems in the computer during bootup, even before the OS gets a chance to start up.

Hierarchical data model

Does not contain redundant elements

Wireless LAN Card

Don't see this, but it connects us to the Internet

DDR

Double-data-rate RAM; versions include ___1, ___2, and currently ___3. Synchronous, with stricter control of signals.

KWS (Knowledge Work System)

Groupware to enhance productivity by delivering task-specific information as needed and associate all automated tools, software agents, and multimedia document references needed for a task. Assists workers in formation and integration of new information in the company.

nonvolatile

data is not lost when the computer is turned off

Header

In a data packet, it includes originating and destination IP addresses, summary info about what type of data is contained in the packet, and info about operations to be performed on the packet.

Record

In a database or spreadsheet, this is made up of fields. (e.g. a ____ may be all the information about a product, and the field is one of those information pieces).

SAN (Storage Area Network)

network of storage devices used in large organizations. Smaller organizations use networked attached storage (NAS). Dedicated to data storage.

.png

portable network graphics

P2P (Peer-to-peer)

In this network architecture, there is no central computer server controlling network activity. Each computer has a special software allowing for communication. This is mostly used for file sharing; when one user downloads a file, there are now two locations from which to download. Napster was one of the earliest, and BitTorrent is a more recent protocol.

WYSIWYG (What You See Is What You Get)

In this software, the editing interface closely resembles how the page will be displayed in a web browser. Requires no HTML knowledge to get started. Examples include Adobe Dreamweaver, iWeb (Apple), Expression Web (Microsoft), NetObjects Fusion (NetObjects), etc.

Power box

Included with system unit, with a cord attaching to your computer

Array

List of values with an index for each value. A two-dimensional array is a table.

Switches

Located at data link layer of OSI model; facilitate the movement of data between segments of a network.

Zip disks

Look like floppy disks, but hold up to 170 times more data.

Terminals

Look like microcomputers, but lack processing capability. When a processing request is inputed from a _______, your request is transmitted to a computer which processes the data and sends the results back to the _______.

TQM (Total Quality Management)

Looks at product quality from customer's perspective and encourages a culture in which quality improves and operating costs decrease.

Coaxial cable

Looks like a cable-TV cable, and has a BNC connector on both ends. Consists of two channels separated by insulation; has an inner copper wire surrounded by insulation and a conducting copper layer surrounding the insulation - the entire cable is encased in plastic.

Dial-up

Low-speed connection over regular phone lines

Generic macro

Macro that can be recorded and executed amongst several software applications. Requires a specialized software app: automation software.

Application macro

Macro that is recorded and executed within a single software application

UNIX

Made by Bell Laboratories in 1969; proprietary multitasking OS with built-in networking capabilities that support multiple users

String data structure

Made of a chain of characters; it can be changed depending on the programming language in use

Motherboard

Main circuit board, containing CPU, memory chips, and connections to the keyboard, mouse, and printer.

Root directory

Main directory of a drive

Desktop

Main interface screen; displays icons

Incremental backups

Make a full backup at regular intervals, while using a separate tape to store the files that change each day after that.

Linked list structure

Makes it more convenient to add or remove nodes, without having to re-order the rest.

Malware

Malicious software; used by attackers to disrupt computer operation.

P2P

Management method in which tasks are divided among all members.

Control unit

Manages all the CPU's activities

OLTP (OnLine Transaction Processing)

Manages data entry and retrieval transactions; supports e-commerce, and other time-critical applications. Used by airlines, banking, supermarkets, and mail order.

Controller software

Manages the resources of the various computers in a distributed computing system, allocating tasks to individual computers and combining the results.

Computer processing

Manipulation of data which transforms data into info

Fragmentation

Occurs when stored files on a hard drive are scattered across noncontiguous sectors, slowing down file retrieval.

iWork

Office suite for Mac OS or iOS for Apple phones. Consists of Pages, Numbers, and Keynote.

Relational database management system

Often based on SQL; every item is stored in a differnet field, so it can be used in various ways. There's an option to hide certain tables from view as well. This system is credited to E.F. Codd.

TIS (Transaction Information Systems)

Often fully integrated with MIS to produce timely reports.

Anti-spyware

Often included in anti-virus software; detects and removes spyware

SCSI (Small Computer System Interface) Drive

Often used by high-performance workstations and servers.

Command-line User Interface

Old computer interface, with a black screen and white, yellow, or green letters. There was no pointing device, and the user had to type in commands. This was the main interface until the Windows and Apple ones came out in the mid-1980s. Consists of commands, parameters, and options.

Binary digit

One bit

Gordon Moore

One of the co-founders of Intel who developed Moore's law, describing the trend that the number of transistors on integrated circuits doubles every two years

IBM (International Business Machines)

One of the largest and most respected outsourcing firms; was originally developed around hardware systems but now is providing services in system development.

Data

One piece of a record

1:m

One-to-many cardinality; e.g. one customer to many orders

1:1

One-to-one cardinality; e.g. one ballot per voter.

Text editors

Only work on plain text without any formatting; often used for source code. Notepad is one example.

Queue data structure

Operates on a (first in, first out) FIFO basis; new elements can be added at the end of the database; removal occurs only at the head.

Data indexing

Optimization of database searching

CODASYL (Conference on Data Systems Language)

Organization founded by the Department of Defense to develop programming languages like the high-level COBOL.

IEEE (Institute of Electrical and Electronics Engineers)

Organization responsible for the development of computer network standards. Sets standards for most types of electrical interfaces.

ICANN (Internet Corporation for Assigned Names and Numbers)

Organization that performs Internet-related tasks; coordinates DNS, IP addresses, and other identifiers so the Internet can run smoothly.

PAN (Personal Area Network)

Organized around one person in one building, with one or more computers, phones, peripherals, etc.

MIS (Management Information Systems)

Organized computer system that gathers data from within and outside the company and processes it so it can be used by management.

HAN (Home Area Network)

PAN in a home, with one wireless connection managed from one computer.

Microcomputers

PCs, including desktops and towers, laptops, and handheld computers.

Hierarchical DBMS

Parent-child like relationship. A 'parent' can have multiple 'children', but a child can only have one parent. (e.g. a catalog might be considered a parent, and the products considered children. One product might be books, which can be divided into further children: fiction and non-fiction).

Meta tags

Part of HTML code of a webpage, invisible to user, providing specific information about the page to the browser.

Central unit

Part of the processor that controls the machine cycle.

Platform

Particular OS and processor model on which a system is based - like Apple Macintosh and Windows platforms.

COPPA (Children's Online Privacy Protection Act)

Passed in 1998 to protect children from the gathering of their personal information without parental consent. Required to be followed by all websites geared toward children under 13.

Management methods

Peer-to-peer (P2P), mainframe, and client/server.

Stylus

Pen-like device that is used to click or write on a touchscreen.

Photo editing software applications

Photoshop (Adobe), PhotoPlus X6, Aperture, GIMP (which is open source)

Hubs

Physical devices that contain multiple ports to connect various devices.

Storage media

Physical materials that provide long-term storage for computer data. (e.g. hard drives and tape backups)

Network Interface Controller

Piece of hardware containing protocols which facilitate communication between devices on a network; also called a "network interface card," "network adapter," or "LAN adapter."

Pseudocode

Plain English version of the detailed steps of a computer program that can be read by non-programmers. Every instruction is written on a new line, and uses some key programming terms like "if" and "else". Used to write algorithms.

Disaster recovery

Plan to protect and recover data lost due to uncontrollable circumstances

Gateways

Point at which networks meet

Hactivism

Political, social, or religious activism taken online; sometimes called cyberterrorism.

POP (Post Office Protocol)

Popular for receiving email; current version is POP3.

.ppt

PowerPoint; later became .pptx

File Locking

Precaution which allows only one user at a time to edit a data file, such as a spreadsheet.

Anti-virus software

Prevents, detects, and removes computer viruses, adware, spyware, Trojan Horses, and worms.

Network resources

Printer, another computer's hard drives, etc.

ANSI (American National Standards Institute)

Private organization that oversees development of standards for products, services, processes, systems, and personnel in the U.S.

Data modeling

Process by which a database of info is compiled. Analyzes the location and type of data and organizes it for streamlined accessibility, taking into account where data is stored and how it is interrelated.

SDLC (Systems Development Life Cycle)

Process of creating systems and the models used to develop them

System Development

Process of defining, designing, testing, and implementing software applications. Also called "software development," "software engineering," or "application development." Typically has 7 basic phases.

Encryption

Process of encoding messages so it can only be viewed by authorized individuals. One key is used to make the message unreadable, and another key is used to decipher it; this is used often in online banking and e-commerce.

Optimization

Process of finding the most computationally efficient algorithms to solve a particular problem.

Video card

Processes images so you can see them on your monitor; higher quality have their own CPU.

Real-time processing

Processes the jobs as it receives them, one at a time

Bot

Program or application that operates automatically over the Internet

Search engine

Program that enables users to locate specific Websites of info on the Internet based on keywords. Has three main components: search form, database, and robot.

Trojan Horse

Program which appears to do something useful for the user, but actually performs other, often malicious, actions. Used mainly for unauthorized remote access, mass-mailing spam, data destruction, file transfer, toll-line dialing, and denial-of-services attacks.

Desktop Publishing Software

Programs for incorporating and arranging graphics and text to produce creative documents that are high-quality and printable.

Systems software

Programs that interact with the computer at a very basic level (like the operating system and compilers).

Netiquette

Proper etiquette for the Internet; it's considered yelling to post in ALL CAPS!

Information Security Analyst

Protects an organization's networks from outside access

UPS (Uninterruptible Power Source)

Protects computers/servers against power spikes and provides power to important machinery during power failures.

SSH (Secure Shell)

Protocol that provides secure network services (like secure remote login) over unsecure networks. Used to run programs on remote systems and move files between systems with encrypted connections.

Telnet

Protocol to access a remote computer through telnet client software. Allows for the control and management of devices like Web services and computers remotely.

Computer Support Specialist

Provides assistance to users having trouble with proper hardware use, software installation, and/or application software problems. Does not require a degree, but needs knowledge in computer processes, application software, and basic hardware components. Also called Technical Support Specialists, Help Desk Technicians, and Support IT Professionals.

SDK (Software Development Kit)

Provides development tools for a specific platform (e.g. Android SDK). Available for free to encourage development.

Dedicated file server

Provides programs and data, but does no processing. Acts as a central storage location.

DBMS (Database Management System)

Purpose is to store and transform data into info to support making decisions; can work with text, numbers, images, multimedia, etc. Has a more rigorous structure to organize data.

.py

Python programming language

Queries

Questions that can be asked on a DBMS to make it possible to find specific info in database and examine relationships.

Primary storage

RAM; memory; temporary data held in computer circuitry, waiting to be processed. Lost when the computer is turned off.

Hard drive

Random access device that can go directly to the requested data.

System clock rate

Rate at which the processor can complete instruction cycles. It is measured in millions of cycles.

Short-range wireless

Reaches from a few centimeters to several meters (e.g. Bluetooth, infrared, Zigbee).

Marc Andreessen

Realized vast public potential of World Wide Web and began trying to create hypermedia, with graphics, sounds, and video - not just text. This led to the first graphical Web browser: NCSA Mosaic.

Print server

Receives print requests from another computer, puts the jobs in a print queue to wait their turn, and then prints them on its printer.

Hotswap

Refers to a computer's ability to allow you to switch out devices (like hard drives) while it is turned on.

Data tampering

Refers to entering false, fabricated, or fraudulent data into the computer or changing/deleting existing data

Network architecture

Refers to how computers are organized in a system and how tasks are allocated between these computers. Can be arranged peer-to-peer, client/server, or mainframe.

ADT (Abstract Data Types)

Refers to items and what it does, but does not detail its inner workings.

Cell Padding

Refers to number of pixels of space that surrounds the content of a table cell

AI (Artificial Intelligence)

Refers to the ability of computers to solve problems and perform tasks once thought to be uniquely human.

Resolution

Refers to the amount of detail - the number of pixels - in an image

Cell Spacing

Refers to the width of the lines that draw the table

Cloud computing

Refers to using an Internet -based application software to complete a given task.

Disk Cleaner

Removes any unnecessary files from your hard disk drive

Binary search

Removes as much of the input data as possible without having to examine each item (e.g. if searching a list of sequential numbers for a certain number, the search will begin in the middle of the list and thus eliminate one-half of the numbers that are incorrect).

EDI

Replaces the faxing and mailing of paper documents by using specific computer record formats based on widely accepted standards. Results in lower labor costs, faster transactions, and fewer errors.

Newgroup

Repository of electronic messages posted by users and managed by the Usenet system (separate from World Wide Web.) Name examples: (soc.art.california, alt.comics.superman). No registration is required; stored info is distributed on a collection of computers instead of a central server; archives are always available; newsreader software is often used to read/post messages.

Gramm-Leach-Bliley Act

Requires businesses to publish a privacy policy stating how the company/organization can use the data it collects from its employees and customers.

Network Administrator

Responsible for the function and maintenance of an organization's network. Lays computer hardware, wires out, sets up user IDs and passwords, and grants permissions for usage.

Undelete utility

Restores deleted files that have not bee overwritten already.

Radio buttons

Round option buttons: can only choose one.

Hotspot

Router/modem to broadcast wireless signals through the area.

Interface software

Running software to interact with the 'cloud'.

Network server software

Runs on a file server

Network client software

Runs on all workstations, handling drive mapping, login info, etc.

Data mining

Scrutinizes data to come up with helpful info

Auxiliary storage

Secondary storage; holds databases, Word docs, and programs not being used. It's nonvolatile.

Disk partition

Section of hard drive treated as a separate storage unit. A single hard drive can be partitioned and labeled with multiple drive letters: drive C might contain the OS, and a partition called D to contain applications and data.

SD

Secure Digital

SHTTP

Secure Hypertext Transfer Protocol; allows browsers to authenticate and encrypt HTTP messages.

SSL (Secure Socket Layer) Protocol

Secure type connection often used for processing credit card transactions - makes sure a third party isn't watching the transaction and that the host is who they're claiming to be.

Serial transmission

Sends bits one at a time

Parallel transmission

Sends whole bytes at a time

Spyware

Small computer program stored on a user's hard drive, that collects user's habits and transmits that info to a third party, without the user's consent.

PDA (Personal Digital Assistant)

Small computer that fits in a hand and has internet and various organizational (calendar, contacts, etc.) capabilities. Sometimes also functions as a cell phone. Uses both ROM and RAM chips and contains a flash memory card slot, as well as a small keyboard and stylus.

Plug In

Small piece of software added to browser to add more functions, such as Acrobat Reader, QuickTime, Flash, RealOne, etc.

Phablet

Smart phone with a size between normal size and Tablet size.

Firewall

Software and hardware set up between an internal computer network and the Internet; a computer network manager sets up rules for the _____ to filter out unwanted intrusions.

IDE (Integrated Development Environment)

Software application for formatting your code, checking syntax, and running/testing/debugging code.

Software as a service

Software available completely online - like Google Docs (which includes word processing, spreadsheets, and presentation applications - also available on the Android phone).

Open-source software

Software for which the source code is released.

Local installation

Software installed on the hardware of a computer

Shareware

Software made available at no cost under certain conditions; trial versions are one example

Groupware

Software that allows several people to collaborate on projects over a network. Works over a LAN or the Internet.

Interference engine

Software that controls the search of the expert system's knowledge base and produces a conclusion

Database engine

Software that makes it possible to access/modify database contents.

Adware

Software that monitors people's Internet activity for the purpose of information-gathering; often used by advertising firms.

Proprietary software

Software that's licensed by the copyright holder under very specific conditions. Also called Closed-source software.

Commercial software

Software that's produced for sale

Digital audio editor

Software to record and edit audio; can mix multiple tracks into one, apply effects, edit sound clips, and convert between formats. Examples: Audacity, Audition (Adobe), Garage Band (Apple), and ProTools (Avid). Digital audio workstations are for professionals.

AutoCAD

Software used for computer-aided design and drafting (CAD) of 2D and 3D designs by architects, engineers, and project managers. Released by Autodesk in 1982; by 1986 was the most popular personal computer design software. Uses polylines and curve fitting.

CAD (Computer Aided Design)

Software used to design products, maps, structures, and civil engineering drawings in 3D.

Repeaters

Strengthen wireless, optical, or electrical signals by amplifying so they can be transmitted farther without being compromised.

SDRAM

Synchronous Dynamic RAM; refresh signal comes when the user is processing some input

World Wide Web

System of interlinked, hypertext documents accessed through the Internet.

Device driver

System software used to control peripheral devices. They are small programs which run in the background and are used by devices like modems, storage devices, mice, keyboards, monitors, printers, sound cards, network cards, etc.

File System

Systematic way to control how info is stored and retrieved. Describes where 1 piece of info ends and the next begins.

volatile

contents are lost when the power is turned off

FAT (File Allocation Table)

Table that the OS maintains on a storage device that provides a map of the clusters that contain each file. Located in disk sector 0. Originally developed for MS-DOS operating system, then for Windows. Supported by most operating systems today. Max file size: 4 GB.

NSFNET (National Science Foundation Network)

This was another network created around the same time as ARPANET, but for schools that couldn't connect to ARPANET. Its enhanced speed attracted many from ARPANET, and it eventually outgrew it and became the Internet.

Downtime

Time that a computer system is not available for use.

Star Topology

Topology in which each computer is connected to a central hub using a point-to-point connection. There is a low startup cost, and it's easy to add nodes - but if the central hub crashes, all the computers crash.

Operand

The character on which the operator acts, such as the 6 and 9 in 6+9=15.

RAM (Random Access Memory)

The computer's main high-speed memory; stores temporary data waiting to be stored, processed, or output. Usually consists of several circuit boards (chips) that plug directly into the computer's system board.

Local resources

The computer's physical resources

1975

The first personal computer came out: the Altair 8800 by Micro Instrumentation and Telemetry Systems. Included an Intel 8080 processor and 256 B of memory. Programs and data were entered using switches; no monitor - so results were read by interpreting a pattern of small red lights.

Mesh Topology

Topology in which every node has a direct point-to-point connection to every other node. It is good at handling high-volume traffic, is robust, and secure (because the data travels a dedicated connection). However, it requires a lot of cables, so it is expensive, and there are many redundant connections since data has multiple paths to travel.

Ring Topology

Topology in which the computers are connected in a circular fashion. The data travels in one direction. It is easy to install and manage, good for handling traffic over long distances, but it is difficult to add nodes and if one computer fails, the whole network fails.

Point-to-Point Topology

Topology in which there is a direct link between two computers. This topology is fast and reliable, but small.

Bus Topology

Topology in which there is one main cable to which all other nodes are directly connected. One of these computers acts as the server. It is easy to connect nodes to the cable at a low cost, but if the cable breaks, all the nodes will crash, so it is hard to troubleshoot.

Tree Topology

Topology that combines multiple star topologies onto a bus. It is flexible. It's a type of hybrid topology.

Hybrid Topology

Topology that uses a combination of 2+ topologies. It is flexible, and the most widely-used today. (e.g. star ring networks, star bus networks like the tree).

Downloading

Transferring data from a remote computer to a local computer.

Adapters and routers

Translate between analog and digital information. (electromagnetic waves are analog; used for wireless communications).

Interpreter

Translates source code line-by-line during execution, resulting in output (there's no compiled code). Every time you want to run a program, the code must be interpreted.

Synchronous protocol

Transmits data at a fixed rate agreed by the sender and receiver. Doesn't need a start and stop bit to show the beginning and end of a byte, since it sends each byte at the rate agreed upon, using a transmitter clock to time information.

Modem card

Transmits data over phone lines

Asynchronous protocol

Transmits data with start and stop bits so the receiving device knows when to 'listen' and when to stop, preventing scrambled data.

Wide area wireless

Travels several kilometers to several thousand kilometers away (e.g. cellular and satellite communications).

Voice Input Systems

Turns spoken words into text

Script kiddie

Type of hacker who uses scripts to break into systems; unlike a professional, they are not knowledgeable about the underlying concepts of hacking.

Cardinality

Types of relationships (table associations) based on how many records in one table are related to how many records in the other table. (is it one-to-one, one-to-many, many-to-one, or many-to-many?)

Computer Network Architect

Typically works with a very large organization to create the internal network; needs critical thinking skills.

URL

Uniform Resource Locator; divided into the Top-Layer Domain Name (.com), the Domain Name (Quizlet), and the Host Name (www.)

Primary keys

Unique pieces of data like SSNs and VINs. Composite _____ require 2+ items to be unique.

USA PATRIOT Act

Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism; allows the FBI to track emails or browsing history without a warrant.

USB

Universal Serial Bus

Structured files

Use a uniform format to store data for each person or thing in the file

Laser Printers

Use heat technology and specialized powder called toner (or another medium) that's heat-sealed onto paper.

Inkjet Printers

Use liquid ink that's sprayed through a printhead onto the paper

Session Layer

Use of applications is begun, managed and ended. Decides between methods of how communications is to be accomplished.

Computer Programmers

Use specialized languages to create computer software

Flash memory

Used by cameras, cells, camcorders, and PCMIA cards (used by laptops). It is a solid state, having no moving parts, and writes data electronically.

Internal Wireless Card

Used by most modern laptops to connect to wireless networks (WIFI)

Parity bit

Used during data transmission for error checking. 8 bits is one byte, and the 8th bit is the _______. If it is even, there's an even number of 1's in the byte. If a data packet is sent with an odd ______, but there is an even number of 1's in the byte, the packet will be rejected by the computer and sent back to the sending computer.

Defragmentation utility

Used to arrange files and store them in contiguous clusters.

Boolean operators

Used to carry out Boolean algebra: "and", "or", and "not."

Presentation Software

Used to create slides for a presentation

Word Processing Software

Used to manipulate a text document

Photo Editing Software

Used to manipulate digital photographs

Database Software

Used to organize data into a structure

Media Players

Used to play music or videos and to organize media files

Operating System Software

Used to process start-up instructions, interpret and communicate between applications software and devices used, and maintain your system.

Key field

Used to sort data. Can also be called a sort key, index, or keyword. Most database applications allow for multiple keys so users can sort records in different ways.

Graphics Software

Used to work with illustrations

Spreadsheet Software

Used to work with numerical values

User Interface design process

User analysis, collecting functionality requirements, information architecture, prototyping, usability testing, and graphical interface design.

Transactional processing

User must manually start tasks, which must be completed in order for the overall process to be successful (e.g. ATM machines, Online Transaction Processing (OLTP)).

Cloud storage

User utilizes an Internet connection to store data files in a distant folder.

Stack data structure

Uses (last in, first out) LIFO basis; elements can be removed and added only to the top of the list

Unicode

Uses 16 bits to represent 65536 characters, including for other languages and special symbols; may soon replace ASCII.

ANSI

Uses 8 bits to represent 256 characters. Also called WIndows-1252. Was the standard for the core fonts supplied with US versions of Microsoft Windows up to and including Windows 95 and WIndows NT 4.

High-level language

Uses English and math symbols in its instructions

Dial-Up Connection

Uses a phone line to temporarily connect to the Internet; the cheapest and slowest way to access Internet. Broadband is faster, constant, and more popular.

Mechanical mouse

Uses a rolling ball

RISC (Reduced Instruction Set Computing) Computer

Uses a small, simplified instructions set that results in very fast processing

RAD (Rapid Application Development)

Uses an iterative process and relies heavily on the use of prototypes. It builds the system one segment at a time, testing each segment as it goes. Variations: agile software development, scrum software development, and extreme programming.

RAID (Redundant Array of Independent Disks)

Uses arrangement of several hard drives that act as a single drive in a computer system, improving the reliability and performance of hard disk drives. Uses at least 2 drives. Original name had "Inexpensive" for the "I".

Cable

Uses coaxial cables to deliver high-speed, broadband Internet access

Wireless sensor network

Uses computing devices at multiple locations to collect data that are processed centrally. Used for weather forecasting and environmental monitoring, and for online games.

Flowcharting

Uses diagrams to represent a process

Virtual Private Network

Uses encryption through lower protocol layers to provide a secure connection through an insecure network.

Virtual Memory

Uses free hard disk space to mimic primary storage (RAM). It is used when a program exceeds its available RAM to store parts of data files or programs until needed - gaining an almost unlimited memory capacity.

Parallel computing system

Uses multiple processors but shared memory resources. Can only add so much processing power. (e.g. quad-core processors and dual-core processors).

PGP (Pretty Good Privacy)

Uses one key to encrypt a message and another key to decrypt it. Public-key encryption is more complex computationally than symmetric (private) key encryption.

Web Scripting

Uses small programs that are executed based on user interaction with a web page. Run in client side and server side.

Distributed Computing System

Uses software to coordinate tasks that are performed on multiple computers simultaneously.

ASCII (American Standard Code for Information Interchange)

Uses standard codes that are represented by binary digits. Developed in 1960s. Uses 7 bits, allowing it to have 128 characters in a binary system (33 of these are non-printing control characters - mostly obsolete - which affect how text and space are processed). This is the data representation code used on most mainframes and microcomputers.

RAID Level 0

Uses striping, but no redundancy; improves performance, but not reliability

CASE (Computer Aided Software Engineering)

Uses structured methods for system development to ensure high quality systems.

Dial-up internet access

Uses telephone lines and a modem to connect at 56k speed. Was standard in 1990s, but is now replaced mostly by high-speed access.

RAID 1

Uses two drives that can duplicate the data storage (disk mirroring); reading performance is improved (but not writing) and has excellent reliability.

Co-sourcing

Using a combination of resources from within the organization and from a third party

Self-sourcing

Using employees with specialized knowledge within the organization

Insourcing

Using information technology resources within the organization

Drive A

Usually a floppy disk.

Push Technology

Utilized by many mobile devices, it allows a web site to automatically download data/files to a device/computer at regular intervals or as it becomes available.

VAN

Value-added network

Solaris

Version of UNIX popular for large websites and e-commerce servers. Made by Sun Microsystems.

Payload

Virus's mission on your computer

Buffer

Waiting area in hard disk where data/programs wait to be processed.

Portal

Website that offers a broad range of information and services, like Yahoo. It is NOT network hardware to connect LANs, as is commonly thought.

Discussion forum

Website where users can view/post electronic messages; uses HTTP protocol; accessed with web browser software; requires registration to post; usually has moderators to ensure messages follow standards; centrally organized; there is no single location to view all groups.

Algorithm

Well-defined procedure that allows a computer to solve a problem; a sequence of unambiguous instructions.

Parallel processing

When a computer performs several tasks simultaneously (e.g. when several processors work together sharing memory on the same task - used in large computer systems designed to keep operating when one CPU fails).

Nodes

When associated with the telecommunications system, refers to to the devices used for communication: telephones, computers, etc.

Sharing a program

When multiple users use one copy of software running on a server; whoever needs the program can run it over the network off of the server's hard drive.

Querying

When users query records to locate and display them.

Plug-and-play

When you plug in a device, it installs by finding a device driver, and then it is ready for use.

Telecommuting

Working from home or while traveling using a computer linked to your place of employment

VBScript (Visual Basic Scripting Edition)

Works for both client-side and server-side scripting

Systems Analyst

Works with stakeholders and managers

ACM (Association for Computing Machinery)

World's largest education and computing society. Major force in advancing the skills and knowledge of ITs. Publishes computer science info, holds seminars, and creates and promotes computer standards.

Internet

Worldwide computer network connecting small networks.

Mac OS X

Written for Intel architecture in 2006; it's easy to use, reliable, and secure. The UNIX-based kernel reduces the errors, glitches, and lack of security.

1621

Year slide rule was invented; in use until calculators came out in 1970s.

1970-1985

Years when the fundamentals of PCs were developed.

Differential backups

You make a full backup at regular intervals, and then make backups of any changed files.

Range

Group of adjacent cells on a spreadsheet.

Virtual Team

Group of individuals working together from dispersed geographic locations whose members telecommute

1993

Mosaic Browser was developed; became a major turning-point for graphical browsers

Relational database

Most common database type; organizes data into rows (records) and columns (fields).

Supercomputers

Most expensive and fastest computers, with thousands of processors. Can process data at several trillion calculations per second.

Numeric data

Stores numbers that represent a count or measurement.

Quad core processor

Single chip containing the circuits for four microprocessors.

Dual core processor

Single chip containing the circuits for two microprocessors.

Flat file

Single table with a large number of records and fields (simple, with little structure, might not even be considered a DBMS at all).

Web Portal

Site used as a launch point for entering the Web. Includes a Web directory and search engine, among other things. Examples: Yahoo, AOL, MSN, etc.

Intranet

Sites in a VPN that are all owned by one organization.

Extranet

Sites in a VPN that are owned by various organizations.

Expansion slot

Slot on motherboard where the user can plug in an expansion card for additional memory or control of peripheral devices. Most PCs have 4-8 such slots. A memory card is an example of an expansion card.

PCMIA slots

Slots in laptops which use PCMIA cards and are often used to add a modem or network card.

Expansion slots

Slots inside computers for peripherals to plug into. Also called jacks and connectors.

Cookies

Small bits of code placed within your browser to track your online activity.

ERM (Entity Relationship Model)

Catalogs data in terms of connectivity and cardinalities (one-to-one, one-to-many, many-many)

Absolute address

Cell address containing a $ character before the column and/or row number. Will not change no matter what cell it is located in.

Relative address

Cell address which will change depending on the cell it is located in.

Referencing

If you use the values of other cells in a formula for a certain cell in a spreadsheet, you are ______.

Software piracy

Illegal copying of copyrighted software

Tags

In HTML, these describe how a particular element should be represented. (e.g: <p>This is a paragraph</p>)

Bus width

Amount of data that the CPU can transfer at a time. Typical bus widths are 8, 16, 32, and 64 bits a time. Often the bottleneck in processing performance.

Registers

In a CPU, these store information both before and after it is processed.

Human Resources Management

Keeps records of the organizations' employees along with their salaries, skills, etc.

File path

Directs a user to the specific location of a file (it's an example of hierarchical file structure). E.g. C:\Users\mypc\Documents\name of document.doc

Digital data

Discreet, broken into limited numbers of elements - like computers.

Accelerated graphics card

Displays images more quickly than a normal card

ALU (Arithmetic Logic Unit)

Area of the CPU optimized to handle math calculations (addition, subtraction, etc.) and logic comparisons (and, not, or, etc.)

.gif

Graphics interchange format

Boolean data type

Can only represent true (1) and false (0) values.

Simplex

Can only transmit or receive, but not both

Konrad Zuse

"Inventor of the computer"; German who developed Z3.

Office Suite

Also called Productivity Suite; collection of software applications that are distributed together and designed to interact with each other.

Software Update

Also called a "patch"

Robot

Also called a crawler, spider, or bot: navigates the Web following hyperlinks to index Web content and store pages. It 'crawls' around the Web looking for new pages/updates; collects mega tag keywords and descriptions to add to database.

Cross-platform applications

Can run on a Windows, Apple, or UNIX operating system.

Executable files

(.exe) Tell the computer how to perform a specific task.

Client-side scripting

(Also called front-end scripting); scripts are executed on the local computer after you have loaded the web page. These are the parts that are automatically part of the web page.

Audio file formats

.aiff (audio interchange file format), .mp3 (Moving Picture Experts Group version 2 audio layer 3), .wav (waveform audio file format), .wma (windows media audio)

Video file formats

.avi (audio video interleave), .mp4 (Moving Picture Experts Group version 4 part 14), .mkv (matroska), .mov (Quicktime), .wmv (windows media video).

megapixel

1 million pixels in a rastor graphic; MP

1 Kb

1024 bits

KB (kilobyte)

1024 bytes

PCMIA (Personal Computer Memory International Association)

16-bit expansion card type for laptops; comes in three types, Type I, Type II, and Type II which vary by thickness.

Clusters

2+ track sectors (intersection of a track and sector on a disk).

Requirements analysis

2nd phase of system development; decides what the system will do and describes its function in detail.

Software design

3rd phase of system development; decides what programs will be needed, how they will interact, and what they will do; chooses a software interface; gathers required data with flowcharts and psuedo-code to develop system logic.

Software coding

4th phase of system development; a programming language is chosen, the design is translated into code, and the user interface is chosen.

Testing and debugging

5th phase of system development; testing phase to see if the system will work; may use prototypes for testing at first.

Installation phase

6th phase of system development; the system is installed and used, and the users are trained on how to use them.

OSI (Open System Interconnection) Model

7-layer process at work within a computer. Layers are: physical, data-link, network, transport, session, presentation, and application.

Maintenance phase

7th and last phase of system development; creates and manages updates for the system.

UTF (Unicode Transformation Format)

8 character eroding system (e.g. the letter "a" is represented by 01100001.)

petabyte

8 quadrillion bytes

Float

Also called a decimal or a double, with two times more storage; a number with a decimal; 'floating point' can control where decimal point is located.

Expert system

Also called a knowledge-based system. It is made for a variety of specific topics, such as identifying a car model. Is an interactive program.

Sequential search

Also called a linear search; searches sequential items until a match is found.

Character String

Also called a string; alphanumeric data; text-based only

Full-duplex

Can send and receive simultaneously.

Half-duplex

Can send and receive, but not simultaneously

COBOL (Common Business-Oriented Language)

A compiled language that is not algebraic; second oldest high-level programming language; developed to allow bankers and clerks to write programs to process checks and accounts in businesses.

Recursive function

A function that repeats itself over and over until stopped.

File compression

A method of removing repetitive elements of a file, causing the file to require less storage space and less time to transmit. To restore the file, have to go through decompression.

LAN (Local Area Network)

A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

Transmission medium

Carries the signal

OCR (Optical Character Recognition)

A scanner converts a page of text into a picture of dots, and then the ____ looks for the text in the picture and inputs the resulting data into a computer.

Byte

A sequence of eight bits processed as a single unit of information

XP (Extreme Programming) Model

A team collaborates on all the SDLC stages, so that various ideas and perspectives can be incorporated. Progress is usually quick.

Vector graphics file formats

AI, EMF, SVG, MWF

Database software applications

Access (Microsoft Office), FileMaker (for Mac), My SQL, Oracle, SAP, dBase

Physical Layer

Accomplished by hubs and repeaters; bits of data are sent and received in the appropriate formats.

Data-link Layer

Accomplished by switches that bridge communication devices; data packets are encoded and decoded.

Security management

Accuracy, integrity, and safety of information resources

Data integrity

Accurate, consistent, and whole; maintained by regular backups, protection from invalid data entry, cross-checking across various parts of the database, etc.

Non-dedicated file server

Acts as both a file server and as a workstation.

Unary operator

Acts on one operand

Binary operator

Acts on two operands

graphics software applications

Adobe Illustrator, Corel Draw, Inkscape, Xara Xtreme (this and Inkscape are open source)

TCP/IP (Transmission Control Protocol/Internet Protocol)

Adopted in 1982 as the communication standard for different networks.

Boot Sector Virus

Affects the first sector of the hard drive, which contains the Master Boot Record (MBR). It is spread primarily by infected floppy disks, but can also affect the boot sectors of hard drives.

Standards

Agreed-upon rules developed by industry authorities to ensure that hardware and software produced by different companies can work together

Server-side scripting

Also called back-end scripting; scripts are executed on the server before the web page is downloaded by a client. (e.g. if you log-in to an account, your input is sent to the server to be checked before downloading your account). These are the parts of the web page that must be refreshed whenever there is a change.

Downward compatibility

Also called backwards compatibility; refers to how an older version of an application can still work on a newer version (e.g. you can open a 2010 Microsoft Office document on a 2013 version).

Raster files

Also called bitmap files; consists of pixels.

Expansion ports

Also called connectors or jacks; any connector that passes data in and out of a peripheral device or computer.

Machine language

Also called machine code; only language directly understood by computers, consisting of only 1's and 0's.

Vectors

Also called paths

Open Office

Also has version called Libre Office; free, open-source office suite through Apache. Consists of Writer, Calc, Impress, and Base.

Bandwidth

Amount of data that can be transmitted in a set period of time; speed of transferring data per second.

Hardware interface

All physical connectors and electronic elements that need to be in place for the computer and connected devices to properly function.

IP Addresses

Allow each computer connected to the network to be identified. Consists of 4 sets of numbers in this form: xxx.xxx.xxx.xxx. But each set can be no more than 255. (e.g. 12.125.52.255).

Enterprise Information Systems

Allow multiple users in different locations to have access to the same functionality. Often used for supply chain management and customer relations.

Site licenses

Allow software to be used on all computers at a specific location

Spreadsheets

Allow users to enter data in rows and columns to create financial schedules and tables arranged as a grid or a display. Can also perform calculations.

What-if analysis

Allows a user to change the contents of a cell and see how it affects the outcome of calculations.

Microwave Wireless Technology

Allows devices within sight of each other (line-of-sight) to communicate; used by space stations, hospitals, telephone companies, etc.

Indexed file structure

Allows management of data at any point in a database and contains an index.

Order entry/invoice system

Allows manipulation of customer orders and keeps track of each order's status. Also creates invoices.

Software framework

Allows programmers and designers to focus on meeting software requirements, because it provides a re-usable design for a system.

Streaming video

Allows users to begin watching a video before downloading completes.

DDS (Decision Support System)

Allows users to create data models of "what-if" scenarios and provides needed tools to examine the data.

Virtual machine technology

Allows users to simulate the hardware and software of one computer architecture on another; you could run Mac OS X, Windows, and Linux all on the same machine.

Financial software

Allows users to track income and expenses, manage checkbooks, create reports, and record tax information

Ethernet Hub

Allows various ethernet devices to connect and act together.

Satellite phone

Allows you to make a phone call anywhere in the world by using two-way communication with satellites. Designed for remote areas, so more expensive and has a larger antennae.

CMS (Content Management Software)

Allows you to publish, edit, and modify online content from a central interface. Used for blogs, news sites, and shopping sites. Wordpress is one example.

Simplex communication

Allows you to transmit or receive, but not both. (e.g. a TV)

Internet Browser Software

Allows you to view the pages of websites on the Internet

Workflow software

Also called "document routing software"; automatically takes a document from one person to the next after getting the necessary approval.

MMI (Man-machine interface)

Also called "human computer interface" or "user interface".

Procedural Programming

Also called "imperative programming" and "structured programming"; uses a list of instructions to tell the computer what to do step-by-step; relies on procedures. Examples: Fortran, COBOL, C, etc.

Procedures

Also called "routines" or "sub-routines".

Client/server

Also called 'tiered'; network clients or workstations request resources/services from the network. One or more servers manage and provide these resources/services. Usually consists of a 2-tier system or a 3-tier system.

Workgroup Applications

Also called Collaborative Software and Groupware; includes electronic communication (email, voicemail, wikis, etc.), electronic conferencing (electronic meeting systems, audio/video conferencing), and coordinating tools (e-calendars, project management systems, online proofing, workflow systems, etc.). Specifically for small groups of people working together on a particular task.

Machine cycle

Also called Fetch and Execute Cycle, or the Instruction cycle - Fetch, Decode, Execute, Share

BPM (Business Process Modeling)

Also called Process Modeling; analyzes and improves currently processes to improve them in quality and efficiency.

Functional Programming

An approach to problem solving that treats every computation as a mathematical function. Relies heavily on recursion. Examples: Erlang, Haskell, Lisp, Scala, etc.

TPS (Transaction Processing System)

An integral part of the inventory system with airlines, ticket sales companies, and online stores; can be integrated with online inventory systems. Is used to access/update a master database that maintains the sales of tickets and has built-in intelligence to prevent double-bookings of seats.

1830

Analytical engine conceived by Charles Babbage; could be programmed with punched cards to carry out calculations. Able to make decisions based on its own computations, such as sequential control, branching, and looping. Wasn't actually built until the London Science Museum succeeded in doing so over 100 years later.

Phishing

And email scam disguised as an official communication from a legitimate website.

File specification

Another name for a path. Consists of the drive, folder, filename, and extension.

Computer resource

Any component required to perform work: the CPU, RAM, storage space, peripherals, etc.

Embedded system

Any electronic system with a CPU that's not a general purpose computer.

Spreadsheet value

Any number used in a calculation

CAATT (Computer-Assisted Audit Tools and Techniques)

Any process of auditing that makes use of computer software. Includes the use of spreadsheets, text editors, and more advanced software packages to perform the task. Special software packages designed for such work include ACI, QDAC, and TopCAATs.

Wildcard

Any special character you use when typing a filename. (e.g. if you search "st*", you'll find all files starting with "st".)

Desktop widget

Appears on desktop; specialized utility that looks like a control and displays info

OOP (Object-Oriented Programming)

Approach to problem solving where all computations are carried out using objects. Examples: Java, Perl, Python, C#

GB (gigabyte)

Approximately 1 billion bytes

MB (megabyte)

Approximately 1 million bytes

.zip

Archive format; compressed files

Servlets

Are platform-independent, server-side modules that fit seamlessly into a Web server framework and can be used to extend the capabilities of a Web server with minimal overhead, maintenance, and support

Drive mapping

Assigning a drive letter to a network device, allowing you to access it as if it were within your own machine.

Hashing

Associates primary keys with items of data, to make data searching more efficient.

Heterogeneous array

Assortment of elements classified within various Abstract Data Types (ADTs) - like string, date, and integer.

File viruses

Attach to programs and run while the program is run, or at a specified time.

Macro virus

Attaches to a file or document; to prevent catching it, should use caution when opening attachments. Most famous example: the Melissa virus.

Biometrics

Automated method of recognizing a person based on behavioral or physiological characteristics; examples: fingerprint recognition, facial recognition, iris recognition, voice analysis, handwriting, signature analysis, and gait analysis.

Batch processing

Automatic processing; processes a group of jobs at the same time

Raster file formats

BMP, GIF, JPEG, PNG, TIFF

Tape backup

Backup made on a magnetic tape

Properties

Bandwidth, cost, reliability

Linux Operating System

Based on UNIX; uses both GUI and command-line interface.

BIOS (Basic Input/Output System)

Basic code to get the computer started. Placed on ROM, so often called ROM _____. Determines what a computer can do without accessing programs from a disk and contains all the code needed for controlling the keyboard, display screen, disk drives, serial communications, etc.Tells the computer how to find the OS and load it into RAM, interpret keyboard commands, and display characters on the monitor.

SMTP (Simple Mail Transfer Protocol)

Basic, text-based protocol that first gained popularity in the 1980s; is now the standard protocol for the transmission of email over the Internet

UPS

Battery which provides power during power failures. Often used by companies in conjunction with their servers so a power outage doesn't result in even a momentary loss of service.

Data packets

Binary data that has been divided into smaller parts to be transmitted over a network. Must have a header and body; sometimes has a footer. Transmitted through TCP/IP, and once received, are compiled into the complete message.

Class

Blueprint (concept) of the objects.

Black-hat hackers

Break into computer systems for damaging purposes

White-hat hackers

Break into networks to reveal potential security breaches so they can be fixed

Striping

Breaking up each disk in the array into units (blocks) of varying size. Block 1 is stored on Disk 1, Block 2 on Disk 2, Block 3 on Disk 1, Block 4 on Disk 2, etc.

ENIAC (Electronic Numerical Integrator Analyzer and Computer)

Built by Americans between 1943 and 1945; weighed 30 tons, was 100 feet long, and 8 feet high.

Spreadsheet function

Built-in formula which performs common calculations.

1970

By this time, all integrated circuits were on the microprocessor; computers with this were considered the 4th generation computers.

STP (Shielded Twisted Pair)

Cables encased in metallic foil, used in Europe

UTP (Unshielded Twisted-Pair)

Cables used in LANs

e-commerce

Can be split into two types: business to business (B2B) and business to consumer (B2C).

Event-controlled Loops

Can be stopped by an external event.

NIC (Network Interface Card)

Can connect to a network by hardwire or by plugging a jack into the ____.

Object-oriented DBMS

Can handle images, audio, and video. Each object will be tagged using the type of image, and other important info.

Keywords

Descriptive terms used to find relevant information

Productivity software

Designed to help people work more efficiently

Application Developer

Designs and creates programs to meet end-users' needs, doing both the system analyst's job and the programmer's job.

Computer Hardware Engineer

Designs new hardware peripherals

Tower

Desktop

Disk scanner software

Detects and corrects certain types of common problems on hard disks, floppies, and CDs. Also searches for and removes unnecessary files (temp files).

Software Developer

Develop software; need excellent verbal and written communication skills

Tim Berners-Lee

Developed Hyper Text Transfer Protocol (HTTP), Web browser software (WWW), and a Web server.

HFS (Hierarchical File System)

Developed by Apple. Windows can read it, but needs additional software to write it.

Colossus Computer

Developed by British to break German codes during WWII.

NTFS (New Technology File System)

Developed by Microsoft as a file system for Windows. Started to replace FAT by mid 1990s; instead of storing a single table to map all the clusters that contain each file, the info is saved in every cluster that helps make up a file. Mac OS can read it, but needs additional software to write it.

Formal standards

Developed by officials in the industry

GPS (Global Positioning System)

Developed by the U.S. Department of Defense under the name of NAVSTAR (Navigation System with Timing and Ranging). Also used for cartography, mining, and telling time.

AppleScript

Developed for Mac OS; uses a natural language metaphor (uses more normal language instead of coding language); best for simple tasks.

UNIX Operating System

Developed in 1960s.

ZIP drives

Developed so quickly that the manufacturer neglected to keep backward compatibility going; the drive hardware for the 250-MB ZIP didn't work for the 100 MB disk, and vice versa.

IP (Internet Protocol)

Developed to make sure data packets arrived correctly at the right destinations.

Computer engineering

Development of computer hardware and software

IETF (Internet Engineering Task Force)

Develops and promotes Internet standards. Goal is to make the internet function better through the evolution of Internet architecture and smooth function. Is made up of an international community.

Antispam software

Develops blacklists of email addresses and Internet domains that are known to be spammers and blocks them; also uses content filtering to examine messages for typical terms/phrases associated with spam. Directs such messages into your junk mail.

Node

Device on a network, including printers, laptops, etc.

Multiplexer

Device that allows a single communications channel to carry data transmissions from many sources at the same time.

Secondary storage

Devices and media that store data permanently - like floppy disks, hard disks, and USB drives.

IM (Instant Messaging)

Different from email because it's in real-time and you can see who is online

DRAM

Dynamic RAM; refreshes frequently

Magnetic Storage

Earliest type of storage on a computer; used tapes, then hard drives, and floppy disks. Each uses the same general process of a read/write head magnetizing material.

Compatible Time-Sharing System

Early email system developed by MIT

AUTODIN (Automatic Digital Network)

Early email system developed by the U.S. Department of Defense

NLE (Non-linear editing)

Editing where content can be accessed randomly and which is non-destructive.

WAP (Wireless Access Point)

Either a hotspot or 3G

System Bus

Electric line that sends and receives data (not used by cache)

Mobile phone

Electronic device to make/receive phone calls over a radio link while moving through an area. Introduced in 1980s, gained popularity in 1990s.

Spam

Electronic junk mail. Spammers collect addresses using automated spiders.

Micropayments

Electronic payments for internet transactions as small as 25 cents, allowing customers to purchase goods and services for very small amounts - like for iTunes.

De facto standards

Emerge through the marketplace and become widely accepted but do not have an official standing

Enterprise-wise systems

Enable businesses to make decisions by evaluating what's happening within the company, consolidating data and the company into databases for ease of assessment.

Pseudo-code

English words set up like coding, describing what a system will do.

Referential Entity Integrity Rule

Ensures primary and foreign keys coordinate.

Worms

Enter a computer and propogate throughout a network; usually don't destroy data, but they do slow down the computer and take up hard disk space. Can spread to other computers without human intervention, unlike viruses. Examples: Melissa and ILOVEYOU email viruses (both took advantage of the macro feature in Microsoft Office documents).

HIPAA (Health Insurance Portability and Accountability Act)

Established standards of privacy for health care data. Also gave people the right to request a copy of their medical records, request modification of their records, and receive privacy policy notices

DDL (Data Definition Language)

Establishes the structure of a database.

CERN

European Organization for Nuclear Research; developed idea for a larger hypertext database with typed links - which became the World Wide Web.

ESS

Executive Support System

ISDN (Integrated Services Digital Network)

Expensive Internet service with a speed of 64-128 Kbps

Fuzzy logic

Expert system takes unsure data, along with the percentage of confidence in your unsure data, and give you an answer along with its percentage of having given you a correct answer.

Qualitative data

Explains the how and why through some type of inspection or viewing of a problem or issue

Vector graphics

Graphics made with points, lines, curves, and shapes. When you zoom up on these graphics, they are still clear. Created with illustration software. Many of these graphics are exported to raster format at high resolution to make them easier to work with.

Boolean expressions

Expressions in a programming language that produce a Boolean value.

BPR (Business Process Reeingerineering)

Extreme rethinking/redesign of business processes. Goal is improvement in areas of customer service, quality, and cost.

Fortran

FORmula TRANslation; designed by John Backus for IBM during the late 1950s; used today for engineering and scientific applications because of the quality of its compilers and numerical libraries.

802 standards

Family of standards for local area networks that concern mainly the physical layer and data link layer in the OSI model.

Z-modem

Fastest transfer protocol for terminals/modems.

Charles Babbage

Father of Computers; English mathematician who conceived the analytical engine.

Foreign key

Field whose values are the same as the primary key of another table

Data structures

Files (info compiled into one element/unit), arrays (collection of individual units in lists/tables), linked lists (arrays easily editable with the use of an extra field called a pointer), records (fields in tables that apply to one unit of data), trees, and tables.

EIM (Employee Internet Management) Software

Filters and monitors employees' Internet usage

1971

First ARPANET email was sent, using the @ symbol.

Feasibility analysis

First phase of system development; decides whether it is worth it to develop the application, creates the initial project plan, and estimates the future budget.

1991

First web page went live on the Internet

Z3

First working, programmable, fully automatic, digital computer; the original was destroyed in WWII.

DoS (Denial of Service) attack

Floods a network with traffic, rendering the network useless to its intended users.

Backup media

Floppy disks, external hard drives, CD-RWs, tapes, flashdrives, etc.

OOAD (Object-oriented analysis and design)

Focuses on the use of items and how they relate to each other. Analysis focuses on learning what a system will do. Design focuses on how it will do that. Uses UML.

Local folder

Folder/directory containing all web pages and other files on a computer

Remote site

Folder/directory containing all web pages and other web files on a web server; place to which these files are uploaded.

IR (Infrared) Wireless Transmission Technology

Follows standards of the IR Data Association. Technology is used for all wireless keyboards/printers. Needs line-of-sight.

ARPA (Advanced Research Projects Agency)

Formed in response to the Sputnik's launch; sought to create a communication network that wouldn't be vulnerable to a nuclear attack.

FOSS

Free and Open Source Software; copylefted to ensure it cannot be sold

Open source

Free to public

FQDN (Fully Qualified Domain Name)

Full name for a web 'domain'.

Programming Paradigms

Fundamentally different approaches to building solutions to specific types of problems

Routers

Gateways between networks; accomplish forwarding of data pockets.

Network devices

Gateways, switches, bridges, hubs, repeaters, and routers.

Perl

General-use language for server-side scripting. Also used as a glue language, connecting different systems together not originally designed to work together; also widely used for database applications.

Network size

Geographic area occupied by computers and network, and the behavior of the computers when data is shared.

Hacking

Getting unauthorized access to computer systems

Analytical graphics

Graphical forms that make numeric data easier to analyze. Also called business graphics. Make sales figures and economic trends easier to understand.

Cyberterrorists

Hack websites to show activists' messages (instead of or in addition to regular content).

Minicomputer

Handles computing for small corporations. Mid-range computers are typically shared for a department to process transactions, access databases, and generate reports. These are smaller than mainframes - but the size of a fridge!

Host computer

Has many terminals letting people use the same computer

Smart phone

Have telephone, email, texting, device integration, picture, video, gaming, and internet access capabilities. Basically mobile computers. Have their own OS and applications.

Selection control structures

Have the computer choose from various actions based on whether a condition is true or false

CIO (Chief Information Officer)

Head of the Information Services department

CIO (Chief Information Office)

Head of the Information Technology/Information Systems departments; typically proposes the need for information technology to a staff who creates the solution within the given budget. Often reports to the CEO, but is rarely involved in the technical decisions or the day-to-day operations.

Utility Programs

Help monitor and configure settings for the Computer, OS, or applications. Examples include backup and data recovery software, antivirus software, disk cleanup, etc.

Boolean logic operators

Help narrow or broaden searches to find more relevant info (e.g. if you search "house training AND tricks", will look for both together. If you search "dog OR canine", will look for either one. If you search "TVs NOT flatscreen", it will not pull up anything mentioning flatscreens.)

Information analysis tools

Help people find logical solutions to problems by letting them make a model of their problem, with flowcharts, spreadsheets, etc.

Utility Software

Helps manage, maintain, and control computer resources. (e.g. antivirus software, backup software, disk tools).

Backup Software

Helps you backup with cloud storage or storage devices. Can make an exact copy of your hard disk.

File manager

Helps you find, rename, move, copy, and delete files or folders; e.g. Windows Explorer

DSL

High-speed Internet connection over regular phone lines

Hardware security

Hinder attackers from gaining access to valuable data; often the features are managed remotely to provide even greater control over sensitive information. (e.g. login/logout features, biometric keyboards, etc.)

Blue-hat hackers

Hired by companies to expose security deficiencies in their systems

Optical devices

Hit market around early 1990s; they're written/read with a laser, are strong, and handle temperature fluctuations well; took several years to be affordable compared to floppy disks.

Primary key

Holds a unique value for each record, like an employee ID number of a social security number. There is only one per table, but it may have more than one attribute.

CMOS memory

Holds data like your computer system configuration but requires a small amount of electricity to retain its data; this power is provided by a small battery on the motherboard.

Flaming

Hostile, insulting reaction on the Internet, common on message boards over controversial topics

HTML

Hypertext Markup Language; used to create structured documents for display in a web browser

1981

IBM created the first true PC with MS-DOS. It became a mass-market product because the design was made available to other manufacturers. Around the mid 1980s, both Apple and Microsoft came out with GUIs.

1954

IBM introduced the 650 - the first mass-produced computer.

John Cocke

IBM research scientist who discovered that only 20% of the instructions on the CISC instruction set did 80% of the work. This discovery led to the development of RISC machines.

Records and fields

In database terminology, refers to rows and columns.

Input devices

Keyboards, mice, microphones, scanners, cameras, etc.

WLAN (Wireless LAN)

LAN that is completely wireless

JavaScript

Language designed to provide interactive Web content. Integrated within HTML and makes webpages dynamic.

Sourcing

Indicates who is responsible for building a system

Proprietary file extensions

Individual to makers. (e.g. WordPerfect documents are .wpd, while Microsoft Word documents are .doc or .docx).

Alpha test

Initial trial run of a new program, system, or hardware within the organization that created it.

Peripheral devices

Input, output, and storage equipment that can be added to a computer to enhance its functionality. A typical computer includes the system and a variety of input, output, and storage devices.

Information-processing cycle

Input, processing, output, storage

I/O

Input/output

Basic network components

Input/output devices (terminals, nodes); telecommunication channels (to transmit and receive data: cables and wireless radio frequencies); telecommunication processors (provide control/support functions and convert analog data to digital); control software (controls functionality and activities of the network); messages (data being transmitted); and protocols.

Data Entry Operator

Inputs data from handwritten sheets; must have typing skills of at least 50 wpm and be ok working alone. Earns little.

WISP (Wireless Internet Service Providers)

Install Wi-Fi technology

Intellectual property

Intangible/non-physical right that's the result of original thought, such as musical, literary, or artistic works

Search form

Interface in which you type a word or phrase you wish to find through your search engine.

ISO (International Organization for Standardization)

International organization that promotes development of standardization in varying fields, including computing and data communications. Developed set of specifications known as OSI reference model that describes how data is sent/received over a network.

DSL (Digital Subscriber Network)

Internet service with a speed of 3-6 Mbps; allows people to talk on the phone and use the internet at the same time because voice and data have different cables.

Twisted-pair cables

Invented by Alexander Graham Bell; consist of 2 copper wires insulated and twisted together, with a RJ-45 connector on both ends.

Semiconductor transistor

Invented in 1926; in 1947 it was developed into a solid state, reliable transistor for computer use. Controls flow of electricity, but only millimeters in size and generated little heat. Computers made with this are considered 2nd generation computers.

Applet

Java program generally run from the command prompt.

VBA (Visual Basic for Application)

Language often used by Microsoft Office macros.

Acceptance test

Last test, performed by end-users, verifying the system is integrated properly and works with actual data.

LCD (Liquid Crystal Display)

Layers of glass, polarized film, and liquid crystal; electrical impulses are sent through, causing the color to be shown and the image to be displayed on the screen

Topology

Layout of interconnections between computers in a network. Examples of layout names: point-to-point, bus, star, ring, mesh, tree, hybrid, etc.

Software License

Legal instrument that governs how the software can be used and distributed

Sound card

Lets you hear from an internal speaker

Full-duplex communication

Lets you transmit and receive at the same time (e.g. telephone lines)

Half-duplex communication

Lets you transmit and receive, but not at the same time (e.g. walkie-talkies).

2-tier system

Level 1 consists of the various clients/workstations (hardware devices which provide end users with access to data or service on the server). Level 2 consists of a server (a computer with more processing speed, memory, and hard disk space; it runs on its own OS).

3-tier system

Level 1 consists of the various clients/workstations. Level 2 consists of an application server. Level 3 consists of a database server which can only handle data requests.

XML (Extensible Markup Language)

Like HTML, but without pre-defined elements. It's a metalanguage: it allows users to describe a markup language to meet specific needs. It has the ability to design new browsers/applications.

LED (Light-emitting Diode)

Like LCD, but with a diode on the back that forces light through the layers for a sharper picture and colors. It lasts longer, too.

V-Model

Like the waterfall model, but arranged in a V-shape, showing the relationship between an early phase and a testing phase. There is a greater emphasis on testing, and testing procedures are developed early on.

Waterfall Model

Linear-sequence life-cycle model; progress is seen as flowing downwards through various phases, sequentially.

NIC

Small circuit board which allows the network to be possible by sending and receiving data.

.jpg

Joint photographic expert group; used where flexibility in file size is important; has built-in, adjustable compression.

Data file

Just holds information (photos, words, numbers) for executables to use.

m:m

Many-to-many cardinality; e.g. more than one product can occur in an order and more than one order can have a product.

m:1

Many-to-one cardinality; e.g. many people vote for one party

MMOGs

Massively Multiplayer Online Games

Transmission media

Material substances that carry energy waves, including data being transferred. Can be wired (twisted-pair cables, coaxial cables, fiber optic cables) or wireless (radio waves, microwaves, infrared waves).

Connection speed

Maximum speed that a modem can communicate with the modems owned by your ISP.

Grey-hat hackers

May hack a system to reveal security risks and then require the company to pay in order to view the evaluation.

VPN (Virtual Private Network)

May use the Internet, but the data is encrypted before being sent

rpm (revolutions per minute)

Measure of how fast a hard drive spins. The higher the ___, the faster it can position a specified sector under the read-write head, and the more quickly it can access data.

MHz

Measure of the speed at which info is processed per second, which is equal to one million.

Quantitative data

Measures how long, or how often, something is occurring through statistical analysis.

Physical Security

Measures that incorporate a wide variety of barriers (doors with access codes, alarm systems, biometric ID, etc.) to keep unauthorized individuals from gaining access to locations that store valuable electronic data.

Transistor

Microscopic switch that controls the flow of electricity based on whether the switch is open (0) or closed (1).

.xls

Microsoft Excel

Tablet computer

Mobile computer where all components are integrated into a single unit. Has bigger screens than smart phones and does not have telephone capabilities. Gained popularity in 2010.

PDA (Personal Digital Assistant)

Mobile device dedicated to managing personal information, like calendar and meeting schedules, address books, to-do lists, email, etc. Was introduced in 1980s, and popular in 1990s until smart phones' rise, but the touchscreen technology and synchronization with other devices was carried into smart phones' technology.

Program control statements

Modify the order in which the computer executes the statements (e.g. "if")

Modem

Modulator-demodulator.

Output devices

Monitors, speakers, printers, etc.

Relational DBMS

Most popular DBMS, first introduced in 1970s; each row refers to a record (entity). Each column refers to a field (attribute). Uses multiple tables to organize data.

Winzip

Most popular file compression software.

Elite hackers

Most proficient in the hacking industry

Kermit

Most reliable transfer protocol for terminals/modems. Good for noisy phone lines.

Network Databases

Most widely used Database Management Systems (DBMS).

Optical Mouse

Mouse with no roller

Zipped files

Multiple files that have been consolidated into one file and compressed to reduce size and download time; they are unzipped as part of the installation process.

Sequential file structure

Must read/write data in a specific order

MAN (Metropolitan Area Network)

Network across a city, region, or college campus, connecting various LANs.

NNTP (Network News Transfer Protocol)

Newsgroup protocol

Linux

Non-proprietary version of UNIX; maintained by volunteer programmers; created in 1991 by Linus Torvalds - a Flemish programmer.

Computer Science

Normally focuses on making computers work more efficiently and effectively.

Hybrid database

Not limited to only one style of data storage; strongest versions use relational (data arranged in rows and columns) and object-oriented (data arranged as objects in classes. Uses hierarchy) models.

1958

Now it was possible to combine several components, like transistors, and the circuitry connecting them on a single piece of silicon - 1st integrated circuit, led to modern computer processors. Computers made with these are considered 3rd generation computers.

Frequency

Number of cycles per second; measured in Hz (hertz)

Binary system

Number system with a base 2; 0 and 1 are the only digits to choose from. To determine how big a number can be expressed, follow the formula 2 to the n power. n = number of bits. So the largest number an 8-bit variable can hold is 255 (have to count 0). This is why an 8-bit video card is limited to displaying 256 colors (no need to count 0 because it's numbering colors, not numbers).

Checksum

Number used to determine if any byte within a program has been changed. Usually used when transmitting data so the receiving computer knows it received the data correctly.

Floating points

Numbers including decimal points

RSI (Repetitive stress injury)

Occurs when groups of muscles are forced through the same repetitive action repeatedly

Tape drive

Sequential access device that retrieves data by starting at the beginning of the tape and reading each record until the required data is forced, causing it to take longer to access data than a hard drive.

Virus signature

Series of bytes unique for a certain virus; acts as an identifier which antivirus software can use.

Macro

Set of computer instructions you can record and execute later as needed. You go through the steps, the step sequence is recorded, you give the sequence a name or shortcut key combination, and when you select the name or shortcut, the computer follows the instructions again. A form of programming that requires no knowledge of coding.

Script

Set of instructions executed under certain conditions

Protocol

Set of rules defining how 2 devices communicate with each other over a computer network.

FTP (File Transfer Protocol)

Set of rules for the transfer of files from one computer to another. A file server is used to upload/download files. Part of TCP/IP.

Benchmarks

Sets of standard processing tasks that measure the performance of computer software/hardware; the results are published online.

Registry

Settings that a Windows computer needs to correctly use its software and hardware devices.

Platter

Several single circular magnetic sheets put together and mounted on a cylinder to make a hard disk. Each _____ has tracks and sectors; read-write heads are used, one for each side of each _____.

Privacy policy

Should detail how information is collected, how that information can be used, and the extent to which the information can be used by third parties.

Task Manager

Shows a list of active processes.

Footer

Shows end of the message in a data packet has been reached, and alerts the user to any error-checking steps that should be taken.

Medium-range wireless

Signals range up to 100 meters away, approximately. (e.g. WiFi)

https:

Signifies a secure connection.

Microprocessor

Silicon chip programmed to perform various tasks on the data it receives

XHTML

Similar to HTML, but written using XML, with predefined elements. Documents written with it must be well-formed and developed according to specific rules; it's case-sensitive and works smoothly with database and workflow applications.

Network DBMS

Similar to the hierarchical DBMS, but it lets a child have more than one parent. This can become complicated.

1982

Simple Mail Transfer Protocol (SMTP) was developed; became the most widely-used email standard.

Flat text file

Simplest type of file; the computer writes straight to it without encoding it in computer language or doing any special kind of formatting.

Neural networks

Simulate the brain and can learn, remember, and even process information. They create their own rules and facts through trial and error using thousands of examples.

Cracker

Someone who intentionally breaches security to break into someone else's computer or network for a malicious purpose

Trap door

Special hole left by the programmer for emergency situations; it can be used by a hacker to enter a system without having to hack each security precaution.

System security monitors

Specialized software packages that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction

Application Layer

Specific to the application used; most directly dealt with by the user. Includes FTP, email, etc.

CAN (Campus Area Network)

Specifically for campuses

Database scheme

Specification of the logical structure of the data stored in the database.

Declaration

Specifies exactly what should be done to the element; (e.g. in h1{color:purple;}, the "color:purple" is the declaration. "Color" is the property, and "purple" is the value.

Syntax

Specifies the sequence and punctuation for command words and parameters.

Transfer Rate

Speed that data is transferred from one device to another.

Fat clients

Stand-alone desktops and laptops that are used as clients. They can run programs on their own and have a local hard drive, so they only use the network for certain tasks.

SQL

Standard Query Language for RDBMS (Relational Database Management System)

UML (Unified Modeling Language)

Standard modeling language to describe elements of a system and how they relate to each other.

Iterative and Incremental Model

Stars with the initial planning phase and ends with deployment, with cyclical interactions in between. Divides functionality into smaller increments, developed, and tested over one or more iterations.

Usenet

Started by US students in 1979. Newsgroups messages are distributed by newsreader programs; most browsers have these programs built in.

Repetition control structures

Statements like "FOR", "WHILE", and "DO WHILE". These cause the same statements to be executed repeatedly until a condition is met.

SRAM

Static RAM; constant and doesn't refresh

MTBF (Mean Time Between Failures)

Statistic measuring a computer component's reliability

1976

Stephen Jobs and Steve Wozniak created Apple 1 with a keyboard, display, and disk storage after experimenting with the Altair 8800. Bill Gates and Paul Allen developed Microsoft about the same time.

Counter-controlled loops

Stopped when a counter in the loop reaches a pre-determined value.

Shared drive

Storage space on one of your organization's central servers. In file management software, looks like any other device and you can copy files to it.

Electronic wallets

Store customers' billing and shipping info on the servers of the store the consumer frequently shops on. Utilized by most major online retailers like Amazon.

Digital files

Store details in binary code

PMPs (Portable Media Players)

Store digital audio, video, and image files on SD cards or in built-in hard drives (as in newer devices).

Short integers

Stored with 16 bits (means you can store up to 2 to the sixteenth power - 65536 unique values).

Long integers

Stored with 32 bits

General accounting system

Stores an organization's financial status and records incoming money, outgoing money, and assets.

CRM (Customer Relationship Management)

Stores and manages info about customers and their relationship with the company, including customer service dealings.

Video memory

Stores images for the graphics card before they are displayed.

e-reader

Tablet computer with the primary purpose being to read books

Transmitter

Takes info and converts it into signals

Outsourcing

Taking a workplace activity once performed inside the organization and moving it outside the organization; when referring to application development, means to use another organization to develop it.

Overclocking

Technique, often used by computer gamers, for increasing the speed of components like the motherboard, memory, processors, and graphic cards. Can cause components to overheat and be damaged - or catch fire.

HTML (HyperText Markup Language)

Tells the Web browser how to display document words and images; uses pre-defined tag pairs.

Cache

Temporarily stores instructions and data that the processor is likely to use frequently. It is lost when the computer power is turned off, but because it is closer to the processor than RAM, it can be accessed more quickly, speeding up processing. L1, L2, and L3 are some examples.

Usability testing

Testing prototypes on actual users; tests efficiency and usability before releasing the final product.

Conditional

Testing to see if a condition is true or false

Input data

Text, images, numbers, sounds

Online Chat

Text-based communication over the Internet in real-time

Vacuum Tubes

The Colossus and ENIAC relied heavily on these; they act like electronic switches that can be turned on and off faster than mechanical switches; but they used up a lot of energy and gave off a lot of heat. Computers made with these are considered 1st generation computers.

Multiprogramming

The OS keeps several jobs in memory simultaneously. The OS selects a job from the job queue and starts executing it; when that job needs to wait for input/output, the CPU is switched to another job.

Word size

The number of bits a processor can process at any one time. The more bits in a 'word', the faster the computer. Modern computers often have word sizes of 16, 32, or 64. A computer with a 64 bit word size will transfer data within the microprocessor at 8 bytes at a time.

Hardware

The physical equipment

Job Design

The process of defining how work will be performed and what tasks will be required to fulfill the position.

Information Privacy

The right to determine when and to what extent info about oneself can be communicated to others

GUI (Graphical User Interface)

The user interface on modern computers

Cyberspace

The world of wired and wireless communication, including Internet, chat rooms, blogs, number-based services, conference calls, and ATMs.

Dumb terminals

These have a monitor, keyboard, and a minimum amount of hardware to connect to the network. All processing is done by the server.

Thin clients

These have their own processor, but may not have a hard drive. Examples include computers at a public library, which run no applications.

3G

Third Generation of mobile communications technologies; has a high bandwidth

Network data model

This is similar to the hierarchical data model, except that an entity can have more than one parent.

Optical Drive

This is where DVDs and CDs go; near the NIC on a laptop; read and written with a laser.

CPU (Central Processing Unit)

This is where most computer processing takes place. When talking about PCs, it is synonymous with the microprocessor. It consists of the control unit, the arithmetic logic unit (ALU), and the registers (high speed storage areas).

GPL (GNU Public License)

This mark on a software product means that the software is open-source.

Pipelining

This technology allows the processor to start executing an instruction before the previous instruction completes, enhancing computer performance.

.exe

executable files - they don't need to be opened with software; used for doing things like downloading applications.

.tif

tagged image format file; used on both PCs and Macs for high quality printable files

Globalization

the increasing movement of goods, services, and capital across national borders.

WIMP

window, icon, menu, and pointer (the most common graphical elements of the GUI)


Ensembles d'études connexes

Trig 7.5: Complex Numbers in Polar Form

View Set

Accounting Fundamentals: Accounts Payable

View Set

Essay: My daughter taught me prison is part of our family story, but not the whole story

View Set

Bone Markings Matching- Anatomy and Physiology

View Set

Chapter 31 Open-Economy Macroeconomics: Basic Concepts

View Set

1.07 Lesson Assessment: History of Anthropology

View Set

Life Insurance Policy Provisions, Riders & Options

View Set