Ist 195 final
Online banking is an example of what type of e-commerce?
B2C
Continuous low power connection, no need to pair With a device, does not waste your battery, indoor GPS alternative
BLE (bluetooth low energy)
require line of sight to read, can only identify one type of item, can only read individually, can't be updated, can't be read if the code is damaged or dirty, require manual tracking and can be human error
Barcode
broadcasts a UUID every 100 milliseconds, immediate, have to be within a few feet, radio transmitters (not accurate)-- can absorb different media ex Disney key
Beacons
came from bitcoin, any digital transaction limitless possibilities, no longer need a centralized clearing house to manage transactions, uses a distributed ledger to verify transactions, uses cryptocurrency-- CANT GO BACK AND CHANGE
Blockchain
Attention your brand gets across all social medial over specific time period; impressions, likes, shares
Brand Awareness
Contained on a microprocessor, brain of the computer, rated by clock speed.
CPU (central processing units)
part of RAM, provides faster data accessing and processing capabilities than RAM
CPU memory cache
Cascade Style Sheet// separates content from style// formats the content
CSS
Known as GDPR (EU general data protection regulation) law for California
California Consumer Privacy Act (CCPA)
2018 breaches that compromised users on facebook, facebook wanted to know who peoples friends were and would give it to amazon and Microsoft which would allow them to get their emails just off their friends
Cambridge Analytica (facebook)
resists disclosure of educational records
Family educational rights and privacy act (FERPA)
(attributes) every table consists of fields, first name, last name, email
Fields (in class)
A large, expensive, powerful computer that can hand billion of transactions per day-- heavy in the banking community
Mainframe
________ computers are not nearly as powerful as supercomputers, but are capable of great processing speeds and data storage and occupy specially wired, air-conditioned rooms.
Mainframe
means all info (bits and bytes) are packed into small things-- internet is called a ____ switch network
Packets
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________.
Parallel processing
------ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
Phishing
________ operating systems control a single desktop or laptop computer.
Stand alone
Hides a message inside something else making it not obvious
Steganography
Which of the following is not a system software program type?
Storage
type of data that is highly organized and manageable; excel files
Structured data
Which of the following is not a type of scanning device?
Stylus
In this phase of the systems life cycle, the new information system is installed, and people are trained to use it.
Systems implementation
Transmission control protocol-- guarantees delivery of data-- parent protocol
TCP
IPv6
A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion.
Responsibility of those who collect data
Accuracy
Which of the following is not malware?
Ad-Aware
SDLC Design Phase
Aquire hardware and software if necessary, develop details of system
how people make money off open source?
As a developer and as a consult
Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.
executive support systems (ESS)
A LAN set up for a household's personal use is called a ________ network.
home
________ are graphic representations for a program, type of file, or function.
icons
These programs are used to create and edit vector images
illustration programs
What documentation shows the income, expenses, and difference between them for a company during a specific time period?
income statements
A(n) ________ database is a collection of integrated files primarily used by just one person.
individual
In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server.
individual
Effective operation within any organization requires an efficient and coordinated flow of ________ throughout the organization.
information
analysis-- what is likely to happen in the future based off what happened in the past
predictive analysis
the collection of data about individuals
privacy
The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as ________ rights.
processing
A ________ is a list of instructions for the computer to follow to accomplish the task of processing data into information.
program
Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.
program flowcharts
Software is another name for ________.
programs
relates to who owns the data
property
All communications between a company's internal networks and the outside world pass through this server.
proxy
permissionless, means everyone can participate and contribute to the ledger
public chains
The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL).
query-by-example
Hybrid data; email, forms and tweets
semi-structured data
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
sending and receiving devices
Has more power than a PC and has multiple types like Web, Mail, Game, and file
server
WIndows server, Mac OS server, Unix, Linux
server OS
looking in store and buying online
showrooming
The most widely used handheld computers are ________.
smartphones
Why open source?
social benefits, freedom, security, community
Programming is also called ________ development.
software
<html> <head><title></title></head> <body></body> </html>
structure of a document
_______ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.
structured
four major types of data
structured, unstructured, semi-structured, geospatial
An important aspect of the preliminary investigation phase is to ________.
suggest alternative solutions
The fastest and most powerful computer that processes a quadrillion instructions per day-- used by the national government and NASA
supercomputer
is one key (key that locks and unlocks door), not as secure, but it is faster
symmetric cryptosystems
What are the two major software types?
system software and application software
The ________, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
system unit
Gathering and analyzing data is part of this phase
systems analysis
The ________ report describes the current information system, the requirements for a new system, and a possible development schedule.
systems analysis
athering and analyzing data is part of this phase.
systems analysis
A(n) ________ is a collection of related records.
table
________ make up the basic structure of a relational database with columns containing field data and rows containing record information.
tables
When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility.
technical
volatile
temporary
The title element defines text that will display on the title bar of the web browser, Important for search optimization
title tag
SDLC operation, support and security phase
to provide ongoing assistance for an information system and its users after the system is implemented
This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.
top management
________ systems help supervisors by generating databases that act as the foundation for other information systems.
transaction processing
4 principles of WCAG
. Perceivable: presentable to users 2. Operable: all functionality available from a keyboard 3. Understandable 4. Robust: can be interpreted by a wide variety of user agents (those with disabilities) including assistive technology.
1956, it is an IBM supercomputer, 5mg of storage and was about a ton, with a cost of 160000
305 RAMAC
Cellular services use ________ to provide wireless connectivity to the Internet for smartphones.
3G and 4G cellular networks
A(n) ________-bit-word computer can access 8 bytes of information at a time.
64
Bits and Bytes
8 bits= 256 values, or one byte
________ programs guard your computer system against viruses or other damaging programs that can invade your computer system.
Antivirus
IaaS (Infrastructure as a Service)
A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers.
Transistor
A small electronic device used in a circuit as an amplifier or switch.
responsible for promoting ethical conduct Among computing professionals by publishing the ACM code of ethics
ACM
americans with disabilities act—forbids discrimination on the basis of a physical or mental disability if the individual can perform "essential function" of the job.-- 1990
ADA
1969-- times a or war-- how do you get continuous communication--Stanford, UCLA, UC Santa Barbra, and U of Utah all 4 were on this internet and if 1 network went down, the others wouldn't
ARPANET
Responsibility of those who control and use the data
Access
Elastic compute cloud (Iaas or Paas) provides resizable compute capacity in cloud and reduces time
Amazon EC2
SaaS (Software as a Service)-- secure durable and scannable, low cost
Amazon S3
Simple Storage Service (SaaS) - fixed amount
Amazon S3
UNIX
An operating system originally conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974, the UNIX code was rewritten in the standard programming language C. Today there are various commercial versions of UNIX.
a Buisness activity that creates value with the assistance of networking and telecommunication technology, conducting Buisness through virtual meetings and is bigger than commence
Buisness
The processing speed of a microprocessor is typically represented by its ________.
Clock Speed
users can have access to applications or computing resources from anywhere through connected devices
Cloud computing
The actual connecting or transmission medium that carries the message in a communication system is called the ________.
Communication channel
________ indicates a monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.
Contrast ratio
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
Cookies
multicore processor-- Mac OS and windows
Cores
is crypted message that is all jumbled up - Cryptography uses "keys" • A key is a piece of information used in the scrambling process - Methods for transforming information in order to hide its content • Substitution - • Transposition - • Concealment - • Frequency count - the amount of times letters appear (EX. the letter "e" appears 12% of the time while "x" is .2% of the time)
Cryptography
________ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Cyberbullying
A service that uses existing phone lines to provide high-speed connections is called ________.
DSL
________ uses standard telephone lines to provide high-speed connections.
DSL
Once data is in the warehouse, then you can make a dashboard; pulling all data form and excel sheet and a variety of other places. example: side arm sports
Dashboard
contains attributes and characteristics for all tables (metadata)-- table name, attribute name, type, length, key
Data dictionary
a tool that graphically shows the flow of data in a system
Data flow diagram
how a database is organized
Database schema
a large interconenctive data place that has a variety of systems-- taking data that is typically scattered throughout many apps and systems in a variety of formats
Datawarehouse
Synchronized records-- every participant keeps a copy of these transactions and they are secure by encryption to prevent tampering- can't change the past
Decentralized Ledger
separating the values in each row with a specific character- most spreadsheet or database apps are able to import or export data in a delimited format
Delimited files
Attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data
Denial of Service (DoS)
Analysis that says what happened and why
Descriptive analysis
Window, Mac OS X, Unix , linux, Chrome OS
Desktop OS
In many application programs, this feature is used to provide information or request input.
Dialog boxes
________ provide additional information and request user input.
Dialog boxes
________ cash is the Internet's equivalent to traditional cash.
Digital
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
Digital Millennium Copyright Act
another name (allious) for an IP address getting routed to a server
Domain Names
Product review/ tech review, customer references, legal review, market analysis
Due Diligence
Made the RDBMS in 1970
E. F. Codd
________ systems are also known as knowledge-based systems.
Expert
considerations of a person
Facebook algorithms: Predictions
Generated only by websites you are visiting
First party cookies
Your own data straight from the most valuable source; existing marketing campaigns, website analytics
First party data
when a primary key of one table is used in another table to build a relationship in the second table
Foreign key
formula: 4+3 Function: Sum()
Formula vs functions
Start and shut down a computer/ manage memory/ establish an internet connection/ automatically update
Functions of operating systems
Friends and family, loan, angel investor, crowdfunding, venture capital
Funding options
256 color pixels used for clip art and low res photos but is small in file size
GIF
a popular tool used to plan and schedule the time relationships among project activities
Gantt chart
includes info on positions
Geospatial Data
Protects personal finance info
Gramm leach Bililey act
________ is the component of the information system that is described as the equipment that processes data to create information.
Hardware
The head element contains information about the Web page. Important for search engine optimization
Heading tags
Protects medical records
Health instance portability and accountability act (HIPAA)
Created the Mark 1 in 1944-- Harvard Professor
Howard aiken
HTML stands for
Hypertext Markup Language
HTML stands for ________.
Hypertext Markup Language
Responsible for managing and coordinating the domain name system, delegates control over each TLD to a domain name registry
ICANN
cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed
IaaS
________ is the illegal assumption of someone's identity for the purposes of economic gain.
Identity theft
Create- use of sensors to gather info, Communicate- transfer from one place to another, Aggregate- gather info from one of more sources at one or more time, analyze- look for patterns, act- create change
Information Value loop
spread of fake news
Information Warefare
Russian linked propaganda tied to the 2016 presidential election, more than 140 million users were exposed.
Internet research agency
supports millions of color pixels and is used for photos. Largest file size
JPEG
1991-- Linus Torvald- resembles UNIX but was developed independently- open source software
Linux
Which of the following is not a popular cloud suite or online office suite?
Lotus Symphony
________ ports are a special type of port for connecting musical instruments to a sound card.
MIDI
A free web based distance learning program designed for the participation of large numbers of geographically dispersed students
MOOC (Massive open online course)
1944-- one go the first computers analogue (digital)- massive device and very slow-- made my howard Aiken
Mark 1
Google android and apple OS
Mobile OS
Java, Objective C, JavaScript, Swift
Mobile languages
Number of transistors on an integrated circuit doubles every two years and cost decreases-- made in 1965 by Gordon Moore
Moore's Law
These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.
Multitouch
uses same frequency as RFID high frequency-- usually requires communication within 5 cm, 2 way communication-- Apple Pay
NFC ( Near- field communications)
the study of manipulating matter on an atomic/ molecular level
Nanotechnology
________ operating systems are used to control and coordinate computers that are linked together.
Network
as small as a GIF but offers a lot more color options. A high res photo w transparency
PNG
the enforcement body of title IX-Educational institutions are required to accommodate students with disabilities. They can lose federal funding for not abiding (violating Section 504).
Office of civil rights
_____ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization.
Operational
Laptops and desktops used by one person at a time
PC (personal computer)
enables someone to summarize a lot of data
Pivot Tables
________ do not use streaming technology and are used to download media files to your computer.
Podcasts
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:
Presentation software
a unique field for each table (student ID number)
Primary Key
network made of unknown participants
Private chains
the process of planning, scheduling, and controlling the activities during system development
Project management
what data do we have can we use it how can we drive value from date what other data should be have
Questions to ask about data
Which of the following is not an example of secondary storage?
RAM
Which of the following will not retain data after the computer is turned off?
RAM
Which one of the following is not considered a form of secondary storage?
RAM
Hold data that CPU is currently processing; volatile and is lost when computer is turned off
RAM (random Access memory)
can be read without a line of sight, multiple tags can be read at the same time, can cope with harsh environments, can identify a specific item, new info can be over written, can be tracked so there is no human error
RFID (diff than barcodes)
a system which transmits the identity of an object or person wirelessly using radio waves
RFID Technology ( radio frequency identification)
Malicious software that encrypts your computers data and ransoms the password to the user
Ransomware
Trade data sets with a partner- doesn't come from many sources and you don't have to pay
Second party data
(rows) collection of related fields in the database
Records
1st formal law that supported equality & rights of individuals with disabilities
Rehabilitation act of 1973
data is organized in tables related by common fields; most widely used database model; identify the purpose, determine the tables and fields, assign the fields to a table and reorganize as needed to minimize redundancy-- data storage, data transformation, security management
Relational Database Model (RDBMS)
SDD V HDD
SDD is faster HDD is larger
title tag is important
SEO
Secure Sockets Layer Transport Layer Security encrypts data, defines route fo packets to take
SSL/TLS
computing environment where an Internet server hosts and deploys applications
SaaS
distribution model-- software hosted by a service provider and licensed for the use by the user-- Fast
SaaS (software as a service)
PHP, ASP.Net, JavaScript, Ruby, Python
Server Side
________ are cell phones with wireless connections to the Internet.
Smartphones
A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch-sensitive screen, is called a ________.
Tablet
IPv4
The dominant protocol for routing traffic on the Internet-- ran out of domains
________ systems help supervisors by generating databases that act as the foundation for other information systems.
Transaction processing
All of the following are true of DVD-ROM drives except:
They are also known as erasable optical discs.
Generated by an advertising company that is affiliated with the website you are visiting-- also called tracking cookies
Third party cookies
These are used by advertisers to keep track of your web activity as you move from one site to the next.
Third party cookies
you pay a broker in exchange for data collected from broad sources
Third party data
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver
Trojan horses
5 Gbit/s Universal Serial Bus
USB 3
More than 100,000 characters Universal Character Set Includes ASCII
USB- C
1991-- Mark Weiser-- constant availability and completely connected- exists everywhere- computers are widespread and readily available, seem to be everywhere
Ubiquitous computing
Most popular Linux version, main goal is security, makes money off support
Ubuntu
________, also known as mini notebooks, are lighter and thinner with longer battery life than most laptops
Ultrabooks
structure is not formally defined or anticipated; images, audio and video
Unstructured Data
analysis of data
Velocity
uncertainty
Veracity
________ are used to edit videos to enhance quality and appearance.
Video Editors
________ memory uses the hard drive to substitute for RAM.
Virtual
________ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
Virtual private networks
takes a computer and virtualizes it so it looks like multiple computers-- green option
Virtualization
how much you have
Volume
The 4 V's of Big Data
Volume, Velocity, Variety, Veracity
1967-- encourage and promote the protection of intellectual property throughout the world
WIPO
This version of the web evolved to support more dynamic content creation and social interaction.
Web 2.0
An international community that develops open standards to ensure long-term growth of the web.
Web Content accessibility guidelines
WiMax stands for ________.
Worldwide Interoperability for Microwave Access
open wireless standard to provide a foundation for the IoT, Nonprofit, Promoted as: reliable, low power, scalable, secure, and global
Zigbee
information system
a set of hardware, software, data, people, and procedures that work together to produce information
4 main computing functions
accept input, process input, produce output, storage
The size, or ________, is measured by the diagonal length of a monitor's viewing area
active display area
battery powered, improved operating range, cost more, range is greater than
active tags 100 meters
3D printers, also known as ________, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.
additive manufacturing
add all times a post was shared, divide by followers, multiply by 100
amplification rate
A(n) ________ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
app
add up the number of likes on a post, divide by followers, multiple by 100
applause rate
uses 2 keys - is more secure - Public and Private key • Public key - give to anyone • Private key - key that is hidden
asymmetric cyrptosystem
a broad term for datasets so large or complex that traditional data processing applications are inadequate
big data
Caesar shift, number as a key, words as a key
caesar ciphers
The most basic logical element of data is a ________.
character
Integrated circuits typically are mounted on ________, which are then plugged into the system board.
chip carriers
Apple's Mail and Microsoft's Outlook are examples of a ________.
client based email system
HTML, CSS, JavaScript
client side
_______ computing provides access to software, programs, and data from anywhere through an Internet connection.
cloud
With ________, or online storage, you can access your files from any computer with an Internet connection.
cloud storage
One of the six steps of programming is writing the program, also called ________.
coding
Access to these databases is offered to the public or selected outside individuals, for a fee.
commercial databases
if excel is red, you are under with money, if green, you are above with money-- allows you to set rules for cell formatting
conditional formatting
SDLC Analysis Phase
conduct preliminary investigation, preform detailed analysis activities: study current system, determine user requirements, recommend solution
SDLC Implementation Phase
construct the new or modified system and then deliver it
These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.
coprocessors
This is a legal concept that gives content creators the right to control use and distribution of their work.
copyright
This type of computer criminal creates and distributes malicious programs.
cracker
A type of specialty processor devoted exclusively to protecting your privacy.
cryptoprocessor
When evaluating a website's content, whether or not the information is up to date is considered part of the ________ element.
currancy
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
dictionary attack
________ show the data or information flow within an information system; the data is traced from its origin through processing, storage, and output.
data flow diagrams
________ is concerned with protecting software and data from unauthorized tampering or damage
data security
Information collected by an organization from a variety of external and internal databases is stored in this special type of database.
data warehouse
unscrambling information to restore it to its original form
decrypting
types of analytics
descriptive, predictive, prescriptive and discovery
types of operating systems
desktop, server, mobile
Which of these is not an example of solid-state storage?
digital versatile disc
analysis where you find something important out
discovery analysis
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
disk caching
________ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.
disk caching
In a(n) ________ database, not all the data in a database is physically located in one place.
distributed
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?
eSATA
infrastructure and data that allow one or more types of online or electronic transactions
ecommerce
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
employee monitoring software
scrambling information so it isn't readable until decrypted
encryption
how they decide what add pops up, facebook says that the typical person has about 1500 stories that could show up time you visit your feed , can show up faster than one can consume it
facebook algorithm
heavy favor activity, more people share- the more relevant, reacting: happy sad, look at active and passive activity
facebook algorithm: Signals
How much content
facebook algorithm: inventory
In a network database, a node may be reached through more than one path with the help of ________.
pointers
"Wiki" comes from the Hawaiian word for ________.
fast
A(n) ________ is a group of related characters.
field
________ programs scan files for ways to reduce the amount of required storage.
file compression
Program ________ graphically present the detailed sequence of steps needed to solve a programming problem.
flow charts
people logging into a server
game server
A network ________ is a device that allows one LAN to be linked to other LANs or to larger networks.
gateway
involves reducing the electricity consumed and environmental waste generated when using a computer; strategies 1) recycle 2)use energy efficient hardware 3)extend life of the computer 4)virtual computing
green computing
A(n) ________ decision support system is used to support collective work.
group
________ use(s) rigid metallic platters to store programs and very large data files.
hard disks
A ________ occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface.
head crash
In a(n) ________ database, any action on one element immediately affects the elements related to it.
hierarchical
Tracks are divided into invisible wedge-shaped sections called ________.
sectors
collect and sell personal data-- largest one is Acxiom: go out and buy data to get info and buying public records and create a profile so you can look up specific features
information brokers
People that collect and sell personal data are called ________.
information resellers
If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________.
integrity
how data is used from chips and sensors to drive various Buisness processes, enable new applications and service customers
internet of things
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
internet scam
________ printers use a technology similar to that used in a photocopying machine.
laser
This type of error could be the result of the programmer making an incorrect calculation.
logic
This logic structure involves repeating a sequence as long as a certain condition remains true.
loop
why move to cloud computing?
lower cost for operations, better compete and address market demands, lower downtime; high performing applications, always up to date, security
email and gmail has to have many web names in this server
mail server
Most organizations spend more time and money on the systems ________ phase than on any of the other phases.
maintenance
software designed to infiltrate or damage a computer system without the owners consent (virus and worms)
malware
Pricing, promoting, selling, and distributing the organization's goods and services pertain to which of the following functions?
marketing
A ________ network topology does not use a specific physical layout, but requires that each node have more than one connection to the other nodes.
mesh
Twitter is an example of what type of site?
microblog
Which among the following is considered a line-of-sight communication medium?
microwave
Special web browsers, called ________ browsers, are designed to run on portable devices such as smartphones and tablets.
mobile
Add-on programs for a variety of mobile devices, including smartphones and tablets.
mobile apps
main circuit board of the system unit; controls communication for the entire computer; all the components, and device connect to the motherboard
motherboard
don't just rely on usernames and passwords- passwords are compromised at all times-- something you know, something you have, something you do
multi factor authentication
In a(n) ________ database, a node may be reached through more than one path with the help of pointers
network
Windows Server is an example of a(n) ________ operating system.
network
This device enables connectivity between two LANS or a LAN and a larger network.
network gateway
Storage that retains its data after the power is turned off is referred to as ________.
nonvolatile storage
non- volatile
not temporary
Which of the following is true about an internal hard disk?
often stores the operating system
when someones code is published and people can fix it up and don't have to pay
open source
Activities in the program maintenance area fall under two categories: ________ and changing needs.
operations
hree common storage options discussed in your text are hard disk, ________, and solid-state storage
optic disk
doesn't need a battery for power, activates itself and transmits data using power generated by radio waves from the RFID reader, usually less then 3 meters
passive tags
Hard disks store and organize files using all the following, except ________.
paths
A ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.
personal
In general, the pilot and ________ approaches are the most favored conversion approaches.
phased
planning, analysis, design, implementation, Operation support and security
phases of SDLC (system development life cycle)
________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.
phishing
The scenario wherein many files about the same person exist across different departments within an organization is called data ________.
redundancy
This type of database is organized into many tables with common data items (key fields) linking the tables to one another.
relational
SDLC Planning Phase
review project requests, prioritize project requests, allocate resources, form project development team
These organize commonly used commands into sets of related activities.
ribbons
The ________ activity records the customer requests for products or services.
sales order processing
A ________ engine is a specialized program that assists you in locating information on the web and the Internet.
search
The ________ compares your entry against its database and returns the result, a list of sites on that topic.
search engine
a civil rights law prohibiting discrimination against individuals with disabilities by federally assisted programs or activities
section 504
Requires that the federal government provide individuals with disabilities access to electronic information and information technology at a level comparable to that enjoyed by others
section 508
HTTP (Hypertext Transfer Protocol)
the protocol used for transmitting web pages over the Internet, web browser communications with the server
Which among the following would not be described in the systems analysis report?
the training requirements for users
________ printers are widely used with ATMs.
thermal
________ is a term relating to sending data to a satellite.
uplink
Simple Mail Transfer Protocol (SMTP)
used to send outgoing email
An external hard disk _______.
usually connects to a USB or Thunderbolt port
different forms of data
variety
migrate through networks and attach to different programs
virus
The five types of personal computers are: desktops, laptops, tablets, smartphones, and ________.
wearable
________ email systems do not require an email program to be installed on your computer.
web based
Looking online and buying in store
web rooming
a lot of people can use this server at once
web server
________ allow computers to be connected without cables.
wireless network cords
fills the computer with self replicating info
worms
In the URL "http://www.simnetonline.com," what is the domain name?
www.simnetonline.com