CIST 1001 FINAL EXAM

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Magnetic media

Any storage medium that utilizes magnetic patterns to represent information such as tape drive, floppy diskette, and hard drive.

Privacy section

"term used to describe an individual's anonymity and how safe they feel in a location, Computer privacy refers to information shared with visiting web pages, how that information is used, who that information is shared with, or if that information is used to track users. On startup, anybody who uses the computer will have to select a user account. In this way, each user can keep his/her personal files and settings private.If you wish to protect individual files or folders from access by other users, you can password protect them from within your operating system's file explorer function. If you want to maximize your browser privacy so that other users of the same computer will not be able to view your personal data, you can configure these settings and regularly clear them from your browser's options menu. Lastly, each browser has options for configuring cookie settings. Beyond these configurable settings and options, you can maximize your computer privacy by always closing any customized aspect of your sessions of computer use. On a public computer that is always on, you should sign out of any personal Internet accounts and close any open programs before you leave the computer. On a personal computer, you should also log out of your operating system account or shut down the computer entirely. Closing your sessions in this way will further ensure that your personal data is not visible to the next user."

VPN

A VPN, or virtual private network, is a secure tunnel between your device and the internet. VPNs are used to protect your online traffic from snooping, interference, and censorship.

Convertible tablet -

A convertible laptop is one that has both laptop and tablet functionality. Manufacturers build convertible laptops for users who want the most desirable capabilities of each system: For laptop users: A touch screen and other tablet-style conveniences For tablet users: A PC operating system, keyboard, and other features of a laptop Convertibles -- also called 2-in-1s or, somewhat mistakenly, hybrid laptops (see below) -- are more powerful than tablets yet have more portable functionality than traditional laptops. As a tablet, they offer the same innovative touch screen capabilities users of those devices have come to love.

Disk cache

A disk cache is a mechanism for improving the time it takes to read from or write to a hard disk. Today, the disk cache is usually included as part of the hard disk. A disk cache can also be a specified portion of random access memory (RAM).

Peer-to-peer network (definition & figure -10-7)

A peer-to-peer (P2P) network is a simple, inexpensive network architecture that typically connects fewer than 10 computers. Each computer or mobile device, called a peer, has equal responsibilities and capabilities, sharing hardware (such as a printer), data, or information with other computers and mobile devices on the peer-to-peer network (Figure 10-7). Peer-to-peer networks allow users to share resources and files located on their computers and to access shared resources found on other computers on the network. Peer-to-peer networks do not have a common file server. Instead, all computers can use any of the resources available on other computers on the network. For example, you might set up a P2P network between an Android tablet and a Windows laptop so that they can share files using Bluetooth or so that you can print from the tablet to a printer accessible to all devices on the network. Both wired and wireless networks can be configured as a peer-to-peer network.

Virus signature

A unique string of bits, or the binary pattern, of a virus. The virus signature is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses the virus signature to scan for the presence of malicious code.

1st 2 bullets ON page 554

Accurate information is error free. Inaccurate information can lead to incorrect decisions. For example, consumers assume their credit reports are accurate. If your credit report incorrectly shows past-due payments, a bank may not lend you money for a vehicle or a house. Verifiable information can be proven as correct or incorrect. For example, security personnel at an airport usually request some type of photo identification to verify that you are the person named on the ticket.

levels of cache (L1, L2, L3)

Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access more quickly than it can access regular random access memory (RAM). This memory is typically integrated directly into the CPU chip or placed on a separate chip that has a separate bus interconnect with the CPU. The purpose of cache memory is to store program instructions and data that are used repeatedly in the operation of programs or information that the CPU is likely to need next. The computer processor can access this information quickly from the cache rather than having to get it from computer's main memory. Fast access to these instructions increases the overall speed of the program. L1 and L2 are levels of cache memory in a computer. If the computer processor can find the data it needs for its next operation in cache memory, it will save time compared to having to get it from random access memory. L1 is "level-1" cache memory, usually built onto the microprocessor chip itself. For example, the Intel MMX microprocessor comes with 32 thousand bytes of L1. Level 3 (L3) cache is specialized memory developed to improve the performance of L1 and L2. L1 or L2 can be significantly faster than L3, though L3 is usually double the speed of RAM. With multicore processors, each core can have dedicated L1 and L2 cache, but they can share an L3 cache. If an L3 cache references an instruction, it is usually elevated to a higher level of cache.

Audio output devices

Digital data from audio and video files needs to be turned into something that our ears can hear, and this requires specialized hardware and sophisticated processing. These "audio output devices," take the form of integrated circuits, discrete sound cards or external adapters. Each serves the same ultimate function: to connect our computers to speakers and headphones.

BTW: inventor of relational database model

E.F. Codd

Enterprise user

Hardware: Server; Laptop; Desktop; Industry specific handheld computer; Webcam; Scanner/ Sample Desktop Apps: Spreadsheet; Database; Accounting/ Sample Mobile or Web Apps: Travel; Mapping; Navigation/ Forms of Communication: Messaging; VoIP; FTP; Videoconferincing

How to - 8-4

If you are having trouble accessing programs and files on an optical disc, such as a CD or DVD, you may need to clean the disc or fix scratches on its surface. To avoid the risk of not being able to access a disc because it is dirty, you should clean a disc when you first notice dirt on its surface. The following steps describe how to clean or fix scratches on an optical disc: Cleaning an Optical Disc While holding the disc by its edges, use compressed air to blow excess dust off of its surface. Hold the can of compressed air upright while using it. Use a soft, nonabrasive cloth to gently wipe debris off of the disc's surface. Wipe the disc from the center out to its edges. If any dirt remains on the disc, dip a soft cloth or cotton ball in isopropyl alcohol (or a cleaner designed for optical discs) and then gently wipe the soiled areas. Use a soft cloth to dry the disc's surface or allow it to air dry. You never should insert a wet disc in a computer. Fixing Scratches on an Optical Disc Complete the previous Steps 1 - 4 to clean the disc. If it still contains scratches, follow the remaining steps. As with any maintenance you perform, risks are associated with attempting to fix scratches on an optical disc. For this reason, if possible, you should back up the data on the disc before attempting to fix a scratch. Place a very small amount of rubbing compound (available at a hardware store) on a soft, nonabrasive cloth and rub the compound on the disc from its center outward at the location of the scratch. If rubbing compound is not available, place a small amount of toothpaste (not a gel) on the scratched area and rub from the inside of the disc outward. Test the disc. If you still are experiencing problems because of the scratch(es), consider having a professional remove the scratch.

Resolution

In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis. The sharpness of the image on a display depends on the resolution and the size of the monitor.

Network & site license

License Installation: A Site License allows the GAUSS Software to be installed on a specified number of stand-alone computers at one business or campus location. The Site License does not include other business or campus extensions. Licence Options: Network option for installation on License Server available License Duration: Annual Usage Location: One campus or organization location Use by: For Corporate, Government and Non-Profit End Users, Academic professors, staff and students as applicable for license purchased Included Products: GAUSS and GAUSS Application Module products purchased Number of Users: Sold in increments of 10 users Technical Support: Included Product Maintenance: Included Budget: 3-year price guarantee Other: Off-Site and Home Use option vailable for an additional fee

Malware

Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission. Malware authors use a variety of physical and virtual means to spread malware that infect devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.

Service packs

Many software makers provide free downloadable updates, sometimes called a service pack, to users who have registered and/or activated their software.

invented the internet

Robert Metcalfe

Online UPS

Some companies use duplicate components or duplicate computers to protect against hardware failure. A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail. Airline reservation systems, communications networks, ATMs, and other systems that must be operational at all times use duplicate components, duplicate computers, or fault-tolerant computers.

Coordinating Tasks

The operating system determines the order in which tasks are processed. A task, or job, is an operation the processor manages. Tasks include receiving data from an input device, processing instructions, sending information to an output device, and transferring items from storage to memory and from memory to storage. While waiting for devices to become idle, the operating system places items in buffers. A buffer is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.

ADA

This title requires telephone and Internet companies to provide a nationwide system of interstate and intrastate telecommunications relay services that allows individuals with hearing and speech disabilities to communicate over the telephone. This title also requires closed captioning of federally funded public service announcements. This title is regulated by the Federal Communication Commission.

FTTP

Transfer Rates: 5 Mbps to 300 Mbps FTTP, which stands for Fiber to the Premises, uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location. With FTTP service, an optical terminal at your location receives the signals and transfers them to a router connected to a computer. As the cost of installing fiber decreases, more homes and businesses are expected to choose FTTP.

UNIX

UNIX (pronounced YOU-nix) is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories. Bell Labs (a subsidiary of AT&T) was prohibited from actively promoting UNIX in the commercial marketplace because of federal regulations. Bell Labs instead licensed UNIX for a low fee to numerous colleges and universities, where UNIX obtained a wide following. UNIX was implemented on many different types of computers. In the 1980s, the source code for UNIX was licensed to many hardware and software companies to customize for their devices and applications. As a result, several versions of this operating system exist, each with slightly different features or capabilities.

Virtual reality

Virtual reality (VR) is the use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space. VR involves the display of 3-D images that users explore and manipulate interactively. Using special VR software, a developer creates an entire 3-D environment that contains infinite space and depth, called a VR world (Figure 2-25). A VR world on the web, for example, might show a house for sale where potential buyers walk through rooms in the VR house by sliding their finger on a touch screen or moving an input device forward, backward, or to the side. Users can explore a VR world using a touch screen or their input device. For example, users can explore the inside of the Gemini 7 space capsule, located at the Smithsonian Air and Space Museum in Washington, D.C., from their computer or mobile device. In addition to games and simulations, many practical applications of VR also exist. Science educators create VR models of molecules, organisms, and other structures for students to examine. Companies use VR to showcase products or create advertisements. Architects create VR models of buildings and rooms so that clients can see how a completed construction project will look before it is built.

Video clips - review paragraph after 2nd green line under Consider This

With picture messaging service, users can send photos and audio files, as well as short text messages, to a phone or other mobile device or computer. With video messaging services, users can send short video clips, usually about 30 seconds in length, in addition to all picture messaging services. Smartphones and other mobile devices with picture/video messaging services, also called MMS (multimedia message service), typically have a digital camera built into the device. Users who expect to receive numerous picture/video messages should verify the phone has sufficient memory. Picture/video message services typically provide users these options for sending and receiving messages: Mobile to mobile: Send the picture/video from your mobile device to another mobile device. Mobile to email: Send the picture/video from your mobile device to any email address. If you send a picture message to a phone that does not have picture/video messaging capability, the phone usually displays a text message directing the user to a webpage that contains the picture/video message. Some online social networks allow you to send a picture/video message directly to your online profile.

File compression

Zipped (compressed) files take up less storage space and can be transferred to other computers more quickly than uncompressed files. In Windows, you work with zipped files and folders in the same way that you work with uncompressed files and folders. Combine several files into a single zipped folder to more easily share a group of files.

Processor

the logic circuitry that responds to and processes the basic instructions that drive a computer. The four primary functions of a processor are fetch, decode, execute and writeback.

Database

a collection of data organized in a manner that allows access, retrieval, and use of that data

magnetic stripe card

a credit card, entertainment card, bank card, or other similar cardwith a stripe that contains information that identifies you and the card

Mainframes

a large, expensive, powerful server that can handle hundreds or thousands of connected users simultaneously

Virus

a potentially damaging program that affects a computer or devicce negatively by altering the way it wprks

Information system

a set of hardware, software, data, people, and procedures that work together to produce information. Information systems support daily, short-term, and long-range information requirements of users in a company.

QR code

a square shaped graphic that represents a web address or other information.

Optical reader

a very good application which uses the camera to recognize text and use it. You can use it for contact information, QR codes or words. Also, the application is detecting text in a different language and is translating it for you.

smart card

an alternative to a magnetic strip card , stores data on an intigrated circuit embedded in the card (chip cards and contact less card)

Desktop Publishing Software (DTP)

an application that enables designers to create sophisticated publications that conatin text, graphics, and many colors

OLTP(online transaction processing)

the computer process each transaction as its entered

Memory resident

the kernel is this, it means it remains in memory while the computer or device is running

Capacity

the number of bytes a storage medium can hold

Expert system

info system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making consists of a knowledge base and inference rules

Instant messaging

messages that are deliverd as soon as sent mainly like chat rooms, facebook messages

Touch screen gestures

motion that you make on a touch sscreen with the tip of one or more fingers or your hand like one finger tapping--> press a button; double tap-->run program or app; and more

ARPANET(Pentagon's Advanced Research Progects Agency Network)

network used by the U.S. Department of Defense to build a network that (1) allowed scientist at different physical locations to share information and work together on military and scientific projects and (2) could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack. became functional in September 1969. The original cponsisted of four main computers. by 1984 they had more than 1000 individual computers linked as hosts

USB port

short for universal serial bus port, can connect up to 127 different peripheral devices together with a single connector. Devices that connect to a USB port include the following: card reader, digital camera, external hard drive, game console, joystick, modem, mouse, optical disc drive, portable media player, printer, scanner, smartphone, digital camera, speakers, USB flash drive, and webcam. In addition to computers and mobile devices, you find USB ports in vehicles, airplane seats, and other public locations.

Form

sometimes called a data entry form, is a window on the screen that provides areas for entering or modifying data in a database

Data dictionary

sometimes called a repository, contains data about each file in the database and each field in those files

Artificial intelligence

the application of human intelligence to computers. Can sense a persons actions and reacts appropriately

Cloud computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.


संबंधित स्टडी सेट्स

Developmental Dysplasia of the Hips

View Set

Dietary Guidelines for Americans

View Set

Nature of Man UTHS English final study

View Set

MNGT 482 Chapter 14 Stockholder Rights & Corporate Governance

View Set

Frieda Developmental Psych Ch. 4

View Set

lesson 5.2 Partnerships and Franchises

View Set

PNU 116 PrepU Chapter 8: Communication

View Set