DSST Introduction to Computing, or Information Systems and Computer Applications CLEP
2600 BC
abacus developed by China
1 Mb
approx. 1 million bits
1 TB
approx. 1 trillion bytes; 1 terabyte
yottabyte
approx. 1,200,000,000,000,000,000,000,000 bytes.
.bin
binary file only readable by a computer
.bmp
bitmap picture
bps
bits per second
System Unit
case that contains all of the components needed for your computer to work
Kernel
Central component of OS; remains in main memory and manages programs not resident in main memory to perform tasks that support applications. Also called a supervisor.
Server
Central computer holding a collection of data and/or apps for providing services to workstations on PCs.
Mainframe Computers
Centralized computer systems used by large organizations. All processing is done on the mainframe, central user. Individual users would access the system using a video terminal. Since terminals are no longer in use, this requires a terminal emulator software. These systems use TUI and Command-line User Interface.
Job redesign
Changing an existing job design
Fiber optic cables
Channel data through light in fiberglass/plastic cables.
Broadband
Channel with high bandwidth; low bandwidth channels are called narrowband.
Operator
Character that indicates an action to be taken on an operand. It's either mathematical (-, *, /) or comparative (<, >, !-)
Semiconductor
Chip made primarily of silicon that receives a charge to hold the data. Uses electrical impulses to read and write.
Service pack
Collection of Microsoft files for security improvements, bug fixes, and software updates.
SQL (Standard Query Language)
Collection of commands that manipulate data; uses DDL and DML.
Physical database
Collection of files that contain the data
DML (Data Manipulation Language)
Collection of instructions used to move/edit items in databases.
Database
Collection of interrelated files on a computer system. Files are organized according to common elements to simplify retrieval.
Telecommunications system
Collection of nodes and links to enable telecommunication (communication at a distance using electrical signals or electromagnetic waves). Examples: telephone network, radio broadcasting system, computer networks, Internet.
Information
Collection of related records
Data warehouse
Collects various databases. A mart is a subsection focusing on a specific set of databases.
Mixed processing
Combines elements from Batch Processing and Transactional Processing.
Object-relational DBMS
Combines elements of the relational DBMS and the object-oriented DBMS. Uses a relational model to describe associations between data tables, but makes it possible to store multimedia objects.
Spiral Model
Combines the waterfall and prototyping models; good for large, complicated processes. The first prototype is 'waterfalled', and then the second one, and so on.
Information System
Combining of users, technology, and processes to complete a specific goal
Network Server
Combo of hardware and software that responds to computational requests from other computers on the network
Firmware
Combo of software and hardware. Like software, it includes instructions for hardware. Actually includes hardware as an actual memory chip, and it consists of permanent software stored into ROM.
Beta test
Comes after the alpha test; a small sampling of the end-user group tests the functionality of newly designed software. Includes usability testing. This test is done by off-site testers.
.csv
Comma separated values - stores tabular data with minimal formatting.
EDI (Electronic Data Interchange)
Commonly used by companies with shipping warehouses. Specifies how information must be exchanged in digital format through a VAN, VPN, or the Internet and determines standards for email, intranet, and extranet use. ANSI is an example.
ISP (Internet Service Provider)
Company that provides access to the Internet, such as Compass, Verizon, AT&T, EarthLink, etc.
Object
Component of a program that knows how to perform certain actions (methods) and how to interact with other elements of the program.
Composite key
Composed of multiple attributes; only a combination of attributes uniquely identifies a record. (e.g. customer ID or phone number).
CSNET
Computer Science Network; formed idea to have multiple networks connected with one main network.
CISC
Computer based on a CPU with a complex instruction set (unlike the RISC).
Internet host
Computer connected to Internet to provide resources to the network
Workstation
Computer connected to a LAN
TUI (Text-based User Interface)
Computer interface in which every menu option in a software application corresponded to a character (e.g. O=Open, F=Find, R=Read, etc.)
Stand-alone computer
Computer not connected to any kind of network
Volunteer distributed computing
Computer processing power available over the Internet when not using their computer. (e.g. SETI@home project)
Application Software
Computer program designed to carry out a specific task; can be characterized as Personal, Workgroup, or Enterprise.
Killer Application
Computer program so useful and popular, it proves the core value of some larger technology. Email was the first ______ for ARPANET and the Internet.
Compiler
Computer program that translates a program (source code) written in a high-level language to the machine language of a computer. It translates source code into machine/compiled code; once that is executed (the program is run), the program processes input to produce output.
Hacker
Computer programmer with advanced knowledge of computers and computer networks
Master computer
Computer unit running controller software. The other units are called 'workers'.
Application server
Computer which runs one application and returns the processed results of requests to the right workstation.
POS (Point of Sale) Terminals
Computer-based devices/systems that allow merchants to process credit cards, track customer purchase habits, and manage inventory. Replaced cash registers.
Office automation systems
Computerize day-to-day office tasks, like email, word processing, voice mail, scheduling, databases, etc.
Token Ring LAN
Computers are connected to form a loop, and use a token to pass a message around the network.
CTS (Carpal tunnel syndrome)
Condition in which pressure on the median nerve through the wrist's bony structure produces pain; can be caused by using computers often.
DHCP (Dynamic Host Configuration Protocol)
Configures network devices so they can communicate on an IP network. Assigns dynamic IP addresses to devices on a network.
WAN (Wide Area Network)
Connects a large area: country(s) or entire world.
Network hub
Connects workstations, broadcasting every packet to all of its ports, resulting at times in delays (latency), due to unnecessary bandwidth usage.
Tree data structure
Consists of a root/parent node, followed by children nodes, followed by leaf nodes. One side is called a branch. If there's only two children, it's called a binary tree.
SCM (Supply Chain Management)
Consists of all that's involved in bringing a product to a customer, starting with the production of the product. Tracks supply/demand, production, marketing, etc.
BAN (Body Area Network)
Consists of wearable computer devices
ERP (Enterprise Resource Planning)
Consolidates all of an organization's processes into one centralized system, facilitating the sharing of info between departments for optimal decision making. Evaluates the company's operations.
Smart Cards
Contain a chip to deduct charges; rapidly replacing coins; FedEx was one of the first places to use them
ROM (Read-Only Memory) Chips
Contain fixed computer start-up instructions, are loaded at the factory, and are nonvolatile. The info on these chips can't be altered by the user.
Program files
Contain operation instructions for specific applications used by a computer
Database index
Contains a list of keys; each key provides a pointer to the record that contains the rest of the fields related to that key. Can organize data in alphabetical or numerical order.
Boot disk
Contains minimal OS files and is often used for troubleshooting/installing a new OS. Also called a bootable floppy disk.
Field
Contains the smallest unit of meaningful data - the basic building block for a structured file or database (e.g. names, address, social security number, etc.) A collection of these makes up a record.
Body
Contents of a data packet
Analog data
Continuous, analogous to actual facts represented - like nature.
EPN (Enterprise Private Network)
Controlled by one organization, connecting multiple locations. Used by places like health networks.
Importing data
Converting data from one format to a format compatible with the program you're currently using
Receiver
Converts signals back into usable info
System software
Coordinates the activities and functions of hardware and software, and controls the operations of computer hardware. Includes Utility Software, Device Drivers, and Firmware. An OS is one example.
Freeware
Copyrighted software available for free.
Lotus 1-2-3
Created by IBM, this was one of the earliest spreadsheet software; largely responsible for the spreadsheet's popularity in the 1980s. But it declined in popularity and was removed from the market in 2013.
ARPANET
Created in 1969, connecting four universities. Used a packet-switching approach, with messages broken into arbitrary packets routed across the network.
TCP (Transmission Control Protocol)
Created in 1974; a document describing it first used the term 'internet' to be short for 'internet working'.
Terminal emulator software
Creates a video terminal interface to the mainframe system but runs with the regular operating system of a desktop computer.
DBA (Database Administrator)
Creates and maintains databases, queries, and reports. Needs to know query languages and how to set user permissions and care for security. Also needs good communication skills and above average critical thinking.
Software Prototyping Model
Creates and tests prototypes of software applications.
CSS (Cascading Style Sheets)
Creates templates that can be applied to multiple HTML documents. The content is organized in an HTML file, but the _____ specifies design elements like layout, color scheme, and fonts. Supported by WYSIWYG. Developed by W3C (World Wide Web Consortium). Composed of a selector and declaration.
Web Developer
Creates, or supervisors the creators of, a website. Will spend a lot of time with marketing and management departments, so needs excellent communication skills.
Looping
Cycling through an instruction set until a condition is met.
Consistent data
Data identical to data in another location within the same database
Online processing
Data is instantly processed as it is entered; more modern data processing method.
Network Layer
Data is sent to the appropriate destination address; error handling, routing, and forwarding is done.
Transport Layer
Data pockets are given headers, including originating and destination addresses; this is required for the completion of data transfer.
Boolean logic
Data type in which each item has a true or false value; works well with binary systems. True is represented with a 1 and false with a 0.
Distributed database
Database consists of multiple, interrelated databases stored at different computer network sites.
Windows registry
Database that maintains a record of installed software and peripheral devices, preferences, and settings. When software and hardware is installed, the information is recorded here.
Presentation Layer
Deals with syntax, formatting, encrypting, and decrypting of data. (e.g. ASCII data could be changed into EBCDIC format)
DPI (dots per inch)
Decides a printer's quality of sharpness in an image
Selector
Decides upon the element to which a rule is applied; (e.g. in h1{color:purple;}, the h1 is the ______.)
Embedded computers
Dedicated to accomplishing a specific task in an appliance or device (like watches and traffic lights). Also called microcontrollers.
Prototype
Demonstrates the main features of the system without all the detailed functionality. Used to identify requirements, demonstrate technical feasibility of proposed systems, and convince people that the system is worth developing. Emphasizes users' feedback.
Dot pitch
Distance measured diagonally between two pixels of the same color on a computer hardware. Sharper images have a lower pitch.
DNS (Domain Name System)
Distributed database comprised of all the websites on the Internet and corresponding IP addresses. No one DNS server contains the entire database.
Switching
Dividing the message in a data packet into smaller parts.
WiFi
Does NOT mean Wireless Fidelity, as is commonly thought
POST (Power On Self Test)
Does a basic check for problems in the computer during bootup, even before the OS gets a chance to start up.
Hierarchical data model
Does not contain redundant elements
Wireless LAN Card
Don't see this, but it connects us to the Internet
DDR
Double-data-rate RAM; versions include ___1, ___2, and currently ___3. Synchronous, with stricter control of signals.
KWS (Knowledge Work System)
Groupware to enhance productivity by delivering task-specific information as needed and associate all automated tools, software agents, and multimedia document references needed for a task. Assists workers in formation and integration of new information in the company.
nonvolatile
data is not lost when the computer is turned off
Header
In a data packet, it includes originating and destination IP addresses, summary info about what type of data is contained in the packet, and info about operations to be performed on the packet.
Record
In a database or spreadsheet, this is made up of fields. (e.g. a ____ may be all the information about a product, and the field is one of those information pieces).
SAN (Storage Area Network)
network of storage devices used in large organizations. Smaller organizations use networked attached storage (NAS). Dedicated to data storage.
.png
portable network graphics
P2P (Peer-to-peer)
In this network architecture, there is no central computer server controlling network activity. Each computer has a special software allowing for communication. This is mostly used for file sharing; when one user downloads a file, there are now two locations from which to download. Napster was one of the earliest, and BitTorrent is a more recent protocol.
WYSIWYG (What You See Is What You Get)
In this software, the editing interface closely resembles how the page will be displayed in a web browser. Requires no HTML knowledge to get started. Examples include Adobe Dreamweaver, iWeb (Apple), Expression Web (Microsoft), NetObjects Fusion (NetObjects), etc.
Power box
Included with system unit, with a cord attaching to your computer
Array
List of values with an index for each value. A two-dimensional array is a table.
Switches
Located at data link layer of OSI model; facilitate the movement of data between segments of a network.
Zip disks
Look like floppy disks, but hold up to 170 times more data.
Terminals
Look like microcomputers, but lack processing capability. When a processing request is inputed from a _______, your request is transmitted to a computer which processes the data and sends the results back to the _______.
TQM (Total Quality Management)
Looks at product quality from customer's perspective and encourages a culture in which quality improves and operating costs decrease.
Coaxial cable
Looks like a cable-TV cable, and has a BNC connector on both ends. Consists of two channels separated by insulation; has an inner copper wire surrounded by insulation and a conducting copper layer surrounding the insulation - the entire cable is encased in plastic.
Dial-up
Low-speed connection over regular phone lines
Generic macro
Macro that can be recorded and executed amongst several software applications. Requires a specialized software app: automation software.
Application macro
Macro that is recorded and executed within a single software application
UNIX
Made by Bell Laboratories in 1969; proprietary multitasking OS with built-in networking capabilities that support multiple users
String data structure
Made of a chain of characters; it can be changed depending on the programming language in use
Motherboard
Main circuit board, containing CPU, memory chips, and connections to the keyboard, mouse, and printer.
Root directory
Main directory of a drive
Desktop
Main interface screen; displays icons
Incremental backups
Make a full backup at regular intervals, while using a separate tape to store the files that change each day after that.
Linked list structure
Makes it more convenient to add or remove nodes, without having to re-order the rest.
Malware
Malicious software; used by attackers to disrupt computer operation.
P2P
Management method in which tasks are divided among all members.
Control unit
Manages all the CPU's activities
OLTP (OnLine Transaction Processing)
Manages data entry and retrieval transactions; supports e-commerce, and other time-critical applications. Used by airlines, banking, supermarkets, and mail order.
Controller software
Manages the resources of the various computers in a distributed computing system, allocating tasks to individual computers and combining the results.
Computer processing
Manipulation of data which transforms data into info
Fragmentation
Occurs when stored files on a hard drive are scattered across noncontiguous sectors, slowing down file retrieval.
iWork
Office suite for Mac OS or iOS for Apple phones. Consists of Pages, Numbers, and Keynote.
Relational database management system
Often based on SQL; every item is stored in a differnet field, so it can be used in various ways. There's an option to hide certain tables from view as well. This system is credited to E.F. Codd.
TIS (Transaction Information Systems)
Often fully integrated with MIS to produce timely reports.
Anti-spyware
Often included in anti-virus software; detects and removes spyware
SCSI (Small Computer System Interface) Drive
Often used by high-performance workstations and servers.
Command-line User Interface
Old computer interface, with a black screen and white, yellow, or green letters. There was no pointing device, and the user had to type in commands. This was the main interface until the Windows and Apple ones came out in the mid-1980s. Consists of commands, parameters, and options.
Binary digit
One bit
Gordon Moore
One of the co-founders of Intel who developed Moore's law, describing the trend that the number of transistors on integrated circuits doubles every two years
IBM (International Business Machines)
One of the largest and most respected outsourcing firms; was originally developed around hardware systems but now is providing services in system development.
Data
One piece of a record
1:m
One-to-many cardinality; e.g. one customer to many orders
1:1
One-to-one cardinality; e.g. one ballot per voter.
Text editors
Only work on plain text without any formatting; often used for source code. Notepad is one example.
Queue data structure
Operates on a (first in, first out) FIFO basis; new elements can be added at the end of the database; removal occurs only at the head.
Data indexing
Optimization of database searching
CODASYL (Conference on Data Systems Language)
Organization founded by the Department of Defense to develop programming languages like the high-level COBOL.
IEEE (Institute of Electrical and Electronics Engineers)
Organization responsible for the development of computer network standards. Sets standards for most types of electrical interfaces.
ICANN (Internet Corporation for Assigned Names and Numbers)
Organization that performs Internet-related tasks; coordinates DNS, IP addresses, and other identifiers so the Internet can run smoothly.
PAN (Personal Area Network)
Organized around one person in one building, with one or more computers, phones, peripherals, etc.
MIS (Management Information Systems)
Organized computer system that gathers data from within and outside the company and processes it so it can be used by management.
HAN (Home Area Network)
PAN in a home, with one wireless connection managed from one computer.
Microcomputers
PCs, including desktops and towers, laptops, and handheld computers.
Hierarchical DBMS
Parent-child like relationship. A 'parent' can have multiple 'children', but a child can only have one parent. (e.g. a catalog might be considered a parent, and the products considered children. One product might be books, which can be divided into further children: fiction and non-fiction).
Meta tags
Part of HTML code of a webpage, invisible to user, providing specific information about the page to the browser.
Central unit
Part of the processor that controls the machine cycle.
Platform
Particular OS and processor model on which a system is based - like Apple Macintosh and Windows platforms.
COPPA (Children's Online Privacy Protection Act)
Passed in 1998 to protect children from the gathering of their personal information without parental consent. Required to be followed by all websites geared toward children under 13.
Management methods
Peer-to-peer (P2P), mainframe, and client/server.
Stylus
Pen-like device that is used to click or write on a touchscreen.
Photo editing software applications
Photoshop (Adobe), PhotoPlus X6, Aperture, GIMP (which is open source)
Hubs
Physical devices that contain multiple ports to connect various devices.
Storage media
Physical materials that provide long-term storage for computer data. (e.g. hard drives and tape backups)
Network Interface Controller
Piece of hardware containing protocols which facilitate communication between devices on a network; also called a "network interface card," "network adapter," or "LAN adapter."
Pseudocode
Plain English version of the detailed steps of a computer program that can be read by non-programmers. Every instruction is written on a new line, and uses some key programming terms like "if" and "else". Used to write algorithms.
Disaster recovery
Plan to protect and recover data lost due to uncontrollable circumstances
Gateways
Point at which networks meet
Hactivism
Political, social, or religious activism taken online; sometimes called cyberterrorism.
POP (Post Office Protocol)
Popular for receiving email; current version is POP3.
.ppt
PowerPoint; later became .pptx
File Locking
Precaution which allows only one user at a time to edit a data file, such as a spreadsheet.
Anti-virus software
Prevents, detects, and removes computer viruses, adware, spyware, Trojan Horses, and worms.
Network resources
Printer, another computer's hard drives, etc.
ANSI (American National Standards Institute)
Private organization that oversees development of standards for products, services, processes, systems, and personnel in the U.S.
Data modeling
Process by which a database of info is compiled. Analyzes the location and type of data and organizes it for streamlined accessibility, taking into account where data is stored and how it is interrelated.
SDLC (Systems Development Life Cycle)
Process of creating systems and the models used to develop them
System Development
Process of defining, designing, testing, and implementing software applications. Also called "software development," "software engineering," or "application development." Typically has 7 basic phases.
Encryption
Process of encoding messages so it can only be viewed by authorized individuals. One key is used to make the message unreadable, and another key is used to decipher it; this is used often in online banking and e-commerce.
Optimization
Process of finding the most computationally efficient algorithms to solve a particular problem.
Video card
Processes images so you can see them on your monitor; higher quality have their own CPU.
Real-time processing
Processes the jobs as it receives them, one at a time
Bot
Program or application that operates automatically over the Internet
Search engine
Program that enables users to locate specific Websites of info on the Internet based on keywords. Has three main components: search form, database, and robot.
Trojan Horse
Program which appears to do something useful for the user, but actually performs other, often malicious, actions. Used mainly for unauthorized remote access, mass-mailing spam, data destruction, file transfer, toll-line dialing, and denial-of-services attacks.
Desktop Publishing Software
Programs for incorporating and arranging graphics and text to produce creative documents that are high-quality and printable.
Systems software
Programs that interact with the computer at a very basic level (like the operating system and compilers).
Netiquette
Proper etiquette for the Internet; it's considered yelling to post in ALL CAPS!
Information Security Analyst
Protects an organization's networks from outside access
UPS (Uninterruptible Power Source)
Protects computers/servers against power spikes and provides power to important machinery during power failures.
SSH (Secure Shell)
Protocol that provides secure network services (like secure remote login) over unsecure networks. Used to run programs on remote systems and move files between systems with encrypted connections.
Telnet
Protocol to access a remote computer through telnet client software. Allows for the control and management of devices like Web services and computers remotely.
Computer Support Specialist
Provides assistance to users having trouble with proper hardware use, software installation, and/or application software problems. Does not require a degree, but needs knowledge in computer processes, application software, and basic hardware components. Also called Technical Support Specialists, Help Desk Technicians, and Support IT Professionals.
SDK (Software Development Kit)
Provides development tools for a specific platform (e.g. Android SDK). Available for free to encourage development.
Dedicated file server
Provides programs and data, but does no processing. Acts as a central storage location.
DBMS (Database Management System)
Purpose is to store and transform data into info to support making decisions; can work with text, numbers, images, multimedia, etc. Has a more rigorous structure to organize data.
.py
Python programming language
Queries
Questions that can be asked on a DBMS to make it possible to find specific info in database and examine relationships.
Primary storage
RAM; memory; temporary data held in computer circuitry, waiting to be processed. Lost when the computer is turned off.
Hard drive
Random access device that can go directly to the requested data.
System clock rate
Rate at which the processor can complete instruction cycles. It is measured in millions of cycles.
Short-range wireless
Reaches from a few centimeters to several meters (e.g. Bluetooth, infrared, Zigbee).
Marc Andreessen
Realized vast public potential of World Wide Web and began trying to create hypermedia, with graphics, sounds, and video - not just text. This led to the first graphical Web browser: NCSA Mosaic.
Print server
Receives print requests from another computer, puts the jobs in a print queue to wait their turn, and then prints them on its printer.
Hotswap
Refers to a computer's ability to allow you to switch out devices (like hard drives) while it is turned on.
Data tampering
Refers to entering false, fabricated, or fraudulent data into the computer or changing/deleting existing data
Network architecture
Refers to how computers are organized in a system and how tasks are allocated between these computers. Can be arranged peer-to-peer, client/server, or mainframe.
ADT (Abstract Data Types)
Refers to items and what it does, but does not detail its inner workings.
Cell Padding
Refers to number of pixels of space that surrounds the content of a table cell
AI (Artificial Intelligence)
Refers to the ability of computers to solve problems and perform tasks once thought to be uniquely human.
Resolution
Refers to the amount of detail - the number of pixels - in an image
Cell Spacing
Refers to the width of the lines that draw the table
Cloud computing
Refers to using an Internet -based application software to complete a given task.
Disk Cleaner
Removes any unnecessary files from your hard disk drive
Binary search
Removes as much of the input data as possible without having to examine each item (e.g. if searching a list of sequential numbers for a certain number, the search will begin in the middle of the list and thus eliminate one-half of the numbers that are incorrect).
EDI
Replaces the faxing and mailing of paper documents by using specific computer record formats based on widely accepted standards. Results in lower labor costs, faster transactions, and fewer errors.
Newgroup
Repository of electronic messages posted by users and managed by the Usenet system (separate from World Wide Web.) Name examples: (soc.art.california, alt.comics.superman). No registration is required; stored info is distributed on a collection of computers instead of a central server; archives are always available; newsreader software is often used to read/post messages.
Gramm-Leach-Bliley Act
Requires businesses to publish a privacy policy stating how the company/organization can use the data it collects from its employees and customers.
Network Administrator
Responsible for the function and maintenance of an organization's network. Lays computer hardware, wires out, sets up user IDs and passwords, and grants permissions for usage.
Undelete utility
Restores deleted files that have not bee overwritten already.
Radio buttons
Round option buttons: can only choose one.
Hotspot
Router/modem to broadcast wireless signals through the area.
Interface software
Running software to interact with the 'cloud'.
Network server software
Runs on a file server
Network client software
Runs on all workstations, handling drive mapping, login info, etc.
Data mining
Scrutinizes data to come up with helpful info
Auxiliary storage
Secondary storage; holds databases, Word docs, and programs not being used. It's nonvolatile.
Disk partition
Section of hard drive treated as a separate storage unit. A single hard drive can be partitioned and labeled with multiple drive letters: drive C might contain the OS, and a partition called D to contain applications and data.
SD
Secure Digital
SHTTP
Secure Hypertext Transfer Protocol; allows browsers to authenticate and encrypt HTTP messages.
SSL (Secure Socket Layer) Protocol
Secure type connection often used for processing credit card transactions - makes sure a third party isn't watching the transaction and that the host is who they're claiming to be.
Serial transmission
Sends bits one at a time
Parallel transmission
Sends whole bytes at a time
Spyware
Small computer program stored on a user's hard drive, that collects user's habits and transmits that info to a third party, without the user's consent.
PDA (Personal Digital Assistant)
Small computer that fits in a hand and has internet and various organizational (calendar, contacts, etc.) capabilities. Sometimes also functions as a cell phone. Uses both ROM and RAM chips and contains a flash memory card slot, as well as a small keyboard and stylus.
Plug In
Small piece of software added to browser to add more functions, such as Acrobat Reader, QuickTime, Flash, RealOne, etc.
Phablet
Smart phone with a size between normal size and Tablet size.
Firewall
Software and hardware set up between an internal computer network and the Internet; a computer network manager sets up rules for the _____ to filter out unwanted intrusions.
IDE (Integrated Development Environment)
Software application for formatting your code, checking syntax, and running/testing/debugging code.
Software as a service
Software available completely online - like Google Docs (which includes word processing, spreadsheets, and presentation applications - also available on the Android phone).
Open-source software
Software for which the source code is released.
Local installation
Software installed on the hardware of a computer
Shareware
Software made available at no cost under certain conditions; trial versions are one example
Groupware
Software that allows several people to collaborate on projects over a network. Works over a LAN or the Internet.
Interference engine
Software that controls the search of the expert system's knowledge base and produces a conclusion
Database engine
Software that makes it possible to access/modify database contents.
Adware
Software that monitors people's Internet activity for the purpose of information-gathering; often used by advertising firms.
Proprietary software
Software that's licensed by the copyright holder under very specific conditions. Also called Closed-source software.
Commercial software
Software that's produced for sale
Digital audio editor
Software to record and edit audio; can mix multiple tracks into one, apply effects, edit sound clips, and convert between formats. Examples: Audacity, Audition (Adobe), Garage Band (Apple), and ProTools (Avid). Digital audio workstations are for professionals.
AutoCAD
Software used for computer-aided design and drafting (CAD) of 2D and 3D designs by architects, engineers, and project managers. Released by Autodesk in 1982; by 1986 was the most popular personal computer design software. Uses polylines and curve fitting.
CAD (Computer Aided Design)
Software used to design products, maps, structures, and civil engineering drawings in 3D.
Repeaters
Strengthen wireless, optical, or electrical signals by amplifying so they can be transmitted farther without being compromised.
SDRAM
Synchronous Dynamic RAM; refresh signal comes when the user is processing some input
World Wide Web
System of interlinked, hypertext documents accessed through the Internet.
Device driver
System software used to control peripheral devices. They are small programs which run in the background and are used by devices like modems, storage devices, mice, keyboards, monitors, printers, sound cards, network cards, etc.
File System
Systematic way to control how info is stored and retrieved. Describes where 1 piece of info ends and the next begins.
volatile
contents are lost when the power is turned off
FAT (File Allocation Table)
Table that the OS maintains on a storage device that provides a map of the clusters that contain each file. Located in disk sector 0. Originally developed for MS-DOS operating system, then for Windows. Supported by most operating systems today. Max file size: 4 GB.
NSFNET (National Science Foundation Network)
This was another network created around the same time as ARPANET, but for schools that couldn't connect to ARPANET. Its enhanced speed attracted many from ARPANET, and it eventually outgrew it and became the Internet.
Downtime
Time that a computer system is not available for use.
Star Topology
Topology in which each computer is connected to a central hub using a point-to-point connection. There is a low startup cost, and it's easy to add nodes - but if the central hub crashes, all the computers crash.
Operand
The character on which the operator acts, such as the 6 and 9 in 6+9=15.
RAM (Random Access Memory)
The computer's main high-speed memory; stores temporary data waiting to be stored, processed, or output. Usually consists of several circuit boards (chips) that plug directly into the computer's system board.
Local resources
The computer's physical resources
1975
The first personal computer came out: the Altair 8800 by Micro Instrumentation and Telemetry Systems. Included an Intel 8080 processor and 256 B of memory. Programs and data were entered using switches; no monitor - so results were read by interpreting a pattern of small red lights.
Mesh Topology
Topology in which every node has a direct point-to-point connection to every other node. It is good at handling high-volume traffic, is robust, and secure (because the data travels a dedicated connection). However, it requires a lot of cables, so it is expensive, and there are many redundant connections since data has multiple paths to travel.
Ring Topology
Topology in which the computers are connected in a circular fashion. The data travels in one direction. It is easy to install and manage, good for handling traffic over long distances, but it is difficult to add nodes and if one computer fails, the whole network fails.
Point-to-Point Topology
Topology in which there is a direct link between two computers. This topology is fast and reliable, but small.
Bus Topology
Topology in which there is one main cable to which all other nodes are directly connected. One of these computers acts as the server. It is easy to connect nodes to the cable at a low cost, but if the cable breaks, all the nodes will crash, so it is hard to troubleshoot.
Tree Topology
Topology that combines multiple star topologies onto a bus. It is flexible. It's a type of hybrid topology.
Hybrid Topology
Topology that uses a combination of 2+ topologies. It is flexible, and the most widely-used today. (e.g. star ring networks, star bus networks like the tree).
Downloading
Transferring data from a remote computer to a local computer.
Adapters and routers
Translate between analog and digital information. (electromagnetic waves are analog; used for wireless communications).
Interpreter
Translates source code line-by-line during execution, resulting in output (there's no compiled code). Every time you want to run a program, the code must be interpreted.
Synchronous protocol
Transmits data at a fixed rate agreed by the sender and receiver. Doesn't need a start and stop bit to show the beginning and end of a byte, since it sends each byte at the rate agreed upon, using a transmitter clock to time information.
Modem card
Transmits data over phone lines
Asynchronous protocol
Transmits data with start and stop bits so the receiving device knows when to 'listen' and when to stop, preventing scrambled data.
Wide area wireless
Travels several kilometers to several thousand kilometers away (e.g. cellular and satellite communications).
Voice Input Systems
Turns spoken words into text
Script kiddie
Type of hacker who uses scripts to break into systems; unlike a professional, they are not knowledgeable about the underlying concepts of hacking.
Cardinality
Types of relationships (table associations) based on how many records in one table are related to how many records in the other table. (is it one-to-one, one-to-many, many-to-one, or many-to-many?)
Computer Network Architect
Typically works with a very large organization to create the internal network; needs critical thinking skills.
URL
Uniform Resource Locator; divided into the Top-Layer Domain Name (.com), the Domain Name (Quizlet), and the Host Name (www.)
Primary keys
Unique pieces of data like SSNs and VINs. Composite _____ require 2+ items to be unique.
USA PATRIOT Act
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism; allows the FBI to track emails or browsing history without a warrant.
USB
Universal Serial Bus
Structured files
Use a uniform format to store data for each person or thing in the file
Laser Printers
Use heat technology and specialized powder called toner (or another medium) that's heat-sealed onto paper.
Inkjet Printers
Use liquid ink that's sprayed through a printhead onto the paper
Session Layer
Use of applications is begun, managed and ended. Decides between methods of how communications is to be accomplished.
Computer Programmers
Use specialized languages to create computer software
Flash memory
Used by cameras, cells, camcorders, and PCMIA cards (used by laptops). It is a solid state, having no moving parts, and writes data electronically.
Internal Wireless Card
Used by most modern laptops to connect to wireless networks (WIFI)
Parity bit
Used during data transmission for error checking. 8 bits is one byte, and the 8th bit is the _______. If it is even, there's an even number of 1's in the byte. If a data packet is sent with an odd ______, but there is an even number of 1's in the byte, the packet will be rejected by the computer and sent back to the sending computer.
Defragmentation utility
Used to arrange files and store them in contiguous clusters.
Boolean operators
Used to carry out Boolean algebra: "and", "or", and "not."
Presentation Software
Used to create slides for a presentation
Word Processing Software
Used to manipulate a text document
Photo Editing Software
Used to manipulate digital photographs
Database Software
Used to organize data into a structure
Media Players
Used to play music or videos and to organize media files
Operating System Software
Used to process start-up instructions, interpret and communicate between applications software and devices used, and maintain your system.
Key field
Used to sort data. Can also be called a sort key, index, or keyword. Most database applications allow for multiple keys so users can sort records in different ways.
Graphics Software
Used to work with illustrations
Spreadsheet Software
Used to work with numerical values
User Interface design process
User analysis, collecting functionality requirements, information architecture, prototyping, usability testing, and graphical interface design.
Transactional processing
User must manually start tasks, which must be completed in order for the overall process to be successful (e.g. ATM machines, Online Transaction Processing (OLTP)).
Cloud storage
User utilizes an Internet connection to store data files in a distant folder.
Stack data structure
Uses (last in, first out) LIFO basis; elements can be removed and added only to the top of the list
Unicode
Uses 16 bits to represent 65536 characters, including for other languages and special symbols; may soon replace ASCII.
ANSI
Uses 8 bits to represent 256 characters. Also called WIndows-1252. Was the standard for the core fonts supplied with US versions of Microsoft Windows up to and including Windows 95 and WIndows NT 4.
High-level language
Uses English and math symbols in its instructions
Dial-Up Connection
Uses a phone line to temporarily connect to the Internet; the cheapest and slowest way to access Internet. Broadband is faster, constant, and more popular.
Mechanical mouse
Uses a rolling ball
RISC (Reduced Instruction Set Computing) Computer
Uses a small, simplified instructions set that results in very fast processing
RAD (Rapid Application Development)
Uses an iterative process and relies heavily on the use of prototypes. It builds the system one segment at a time, testing each segment as it goes. Variations: agile software development, scrum software development, and extreme programming.
RAID (Redundant Array of Independent Disks)
Uses arrangement of several hard drives that act as a single drive in a computer system, improving the reliability and performance of hard disk drives. Uses at least 2 drives. Original name had "Inexpensive" for the "I".
Cable
Uses coaxial cables to deliver high-speed, broadband Internet access
Wireless sensor network
Uses computing devices at multiple locations to collect data that are processed centrally. Used for weather forecasting and environmental monitoring, and for online games.
Flowcharting
Uses diagrams to represent a process
Virtual Private Network
Uses encryption through lower protocol layers to provide a secure connection through an insecure network.
Virtual Memory
Uses free hard disk space to mimic primary storage (RAM). It is used when a program exceeds its available RAM to store parts of data files or programs until needed - gaining an almost unlimited memory capacity.
Parallel computing system
Uses multiple processors but shared memory resources. Can only add so much processing power. (e.g. quad-core processors and dual-core processors).
PGP (Pretty Good Privacy)
Uses one key to encrypt a message and another key to decrypt it. Public-key encryption is more complex computationally than symmetric (private) key encryption.
Web Scripting
Uses small programs that are executed based on user interaction with a web page. Run in client side and server side.
Distributed Computing System
Uses software to coordinate tasks that are performed on multiple computers simultaneously.
ASCII (American Standard Code for Information Interchange)
Uses standard codes that are represented by binary digits. Developed in 1960s. Uses 7 bits, allowing it to have 128 characters in a binary system (33 of these are non-printing control characters - mostly obsolete - which affect how text and space are processed). This is the data representation code used on most mainframes and microcomputers.
RAID Level 0
Uses striping, but no redundancy; improves performance, but not reliability
CASE (Computer Aided Software Engineering)
Uses structured methods for system development to ensure high quality systems.
Dial-up internet access
Uses telephone lines and a modem to connect at 56k speed. Was standard in 1990s, but is now replaced mostly by high-speed access.
RAID 1
Uses two drives that can duplicate the data storage (disk mirroring); reading performance is improved (but not writing) and has excellent reliability.
Co-sourcing
Using a combination of resources from within the organization and from a third party
Self-sourcing
Using employees with specialized knowledge within the organization
Insourcing
Using information technology resources within the organization
Drive A
Usually a floppy disk.
Push Technology
Utilized by many mobile devices, it allows a web site to automatically download data/files to a device/computer at regular intervals or as it becomes available.
VAN
Value-added network
Solaris
Version of UNIX popular for large websites and e-commerce servers. Made by Sun Microsystems.
Payload
Virus's mission on your computer
Buffer
Waiting area in hard disk where data/programs wait to be processed.
Portal
Website that offers a broad range of information and services, like Yahoo. It is NOT network hardware to connect LANs, as is commonly thought.
Discussion forum
Website where users can view/post electronic messages; uses HTTP protocol; accessed with web browser software; requires registration to post; usually has moderators to ensure messages follow standards; centrally organized; there is no single location to view all groups.
Algorithm
Well-defined procedure that allows a computer to solve a problem; a sequence of unambiguous instructions.
Parallel processing
When a computer performs several tasks simultaneously (e.g. when several processors work together sharing memory on the same task - used in large computer systems designed to keep operating when one CPU fails).
Nodes
When associated with the telecommunications system, refers to to the devices used for communication: telephones, computers, etc.
Sharing a program
When multiple users use one copy of software running on a server; whoever needs the program can run it over the network off of the server's hard drive.
Querying
When users query records to locate and display them.
Plug-and-play
When you plug in a device, it installs by finding a device driver, and then it is ready for use.
Telecommuting
Working from home or while traveling using a computer linked to your place of employment
VBScript (Visual Basic Scripting Edition)
Works for both client-side and server-side scripting
Systems Analyst
Works with stakeholders and managers
ACM (Association for Computing Machinery)
World's largest education and computing society. Major force in advancing the skills and knowledge of ITs. Publishes computer science info, holds seminars, and creates and promotes computer standards.
Internet
Worldwide computer network connecting small networks.
Mac OS X
Written for Intel architecture in 2006; it's easy to use, reliable, and secure. The UNIX-based kernel reduces the errors, glitches, and lack of security.
1621
Year slide rule was invented; in use until calculators came out in 1970s.
1970-1985
Years when the fundamentals of PCs were developed.
Differential backups
You make a full backup at regular intervals, and then make backups of any changed files.
Range
Group of adjacent cells on a spreadsheet.
Virtual Team
Group of individuals working together from dispersed geographic locations whose members telecommute
1993
Mosaic Browser was developed; became a major turning-point for graphical browsers
Relational database
Most common database type; organizes data into rows (records) and columns (fields).
Supercomputers
Most expensive and fastest computers, with thousands of processors. Can process data at several trillion calculations per second.
Numeric data
Stores numbers that represent a count or measurement.
Quad core processor
Single chip containing the circuits for four microprocessors.
Dual core processor
Single chip containing the circuits for two microprocessors.
Flat file
Single table with a large number of records and fields (simple, with little structure, might not even be considered a DBMS at all).
Web Portal
Site used as a launch point for entering the Web. Includes a Web directory and search engine, among other things. Examples: Yahoo, AOL, MSN, etc.
Intranet
Sites in a VPN that are all owned by one organization.
Extranet
Sites in a VPN that are owned by various organizations.
Expansion slot
Slot on motherboard where the user can plug in an expansion card for additional memory or control of peripheral devices. Most PCs have 4-8 such slots. A memory card is an example of an expansion card.
PCMIA slots
Slots in laptops which use PCMIA cards and are often used to add a modem or network card.
Expansion slots
Slots inside computers for peripherals to plug into. Also called jacks and connectors.
Cookies
Small bits of code placed within your browser to track your online activity.
ERM (Entity Relationship Model)
Catalogs data in terms of connectivity and cardinalities (one-to-one, one-to-many, many-many)
Absolute address
Cell address containing a $ character before the column and/or row number. Will not change no matter what cell it is located in.
Relative address
Cell address which will change depending on the cell it is located in.
Referencing
If you use the values of other cells in a formula for a certain cell in a spreadsheet, you are ______.
Software piracy
Illegal copying of copyrighted software
Tags
In HTML, these describe how a particular element should be represented. (e.g: <p>This is a paragraph</p>)
Bus width
Amount of data that the CPU can transfer at a time. Typical bus widths are 8, 16, 32, and 64 bits a time. Often the bottleneck in processing performance.
Registers
In a CPU, these store information both before and after it is processed.
Human Resources Management
Keeps records of the organizations' employees along with their salaries, skills, etc.
File path
Directs a user to the specific location of a file (it's an example of hierarchical file structure). E.g. C:\Users\mypc\Documents\name of document.doc
Digital data
Discreet, broken into limited numbers of elements - like computers.
Accelerated graphics card
Displays images more quickly than a normal card
ALU (Arithmetic Logic Unit)
Area of the CPU optimized to handle math calculations (addition, subtraction, etc.) and logic comparisons (and, not, or, etc.)
.gif
Graphics interchange format
Boolean data type
Can only represent true (1) and false (0) values.
Simplex
Can only transmit or receive, but not both
Konrad Zuse
"Inventor of the computer"; German who developed Z3.
Office Suite
Also called Productivity Suite; collection of software applications that are distributed together and designed to interact with each other.
Software Update
Also called a "patch"
Robot
Also called a crawler, spider, or bot: navigates the Web following hyperlinks to index Web content and store pages. It 'crawls' around the Web looking for new pages/updates; collects mega tag keywords and descriptions to add to database.
Cross-platform applications
Can run on a Windows, Apple, or UNIX operating system.
Executable files
(.exe) Tell the computer how to perform a specific task.
Client-side scripting
(Also called front-end scripting); scripts are executed on the local computer after you have loaded the web page. These are the parts that are automatically part of the web page.
Audio file formats
.aiff (audio interchange file format), .mp3 (Moving Picture Experts Group version 2 audio layer 3), .wav (waveform audio file format), .wma (windows media audio)
Video file formats
.avi (audio video interleave), .mp4 (Moving Picture Experts Group version 4 part 14), .mkv (matroska), .mov (Quicktime), .wmv (windows media video).
megapixel
1 million pixels in a rastor graphic; MP
1 Kb
1024 bits
KB (kilobyte)
1024 bytes
PCMIA (Personal Computer Memory International Association)
16-bit expansion card type for laptops; comes in three types, Type I, Type II, and Type II which vary by thickness.
Clusters
2+ track sectors (intersection of a track and sector on a disk).
Requirements analysis
2nd phase of system development; decides what the system will do and describes its function in detail.
Software design
3rd phase of system development; decides what programs will be needed, how they will interact, and what they will do; chooses a software interface; gathers required data with flowcharts and psuedo-code to develop system logic.
Software coding
4th phase of system development; a programming language is chosen, the design is translated into code, and the user interface is chosen.
Testing and debugging
5th phase of system development; testing phase to see if the system will work; may use prototypes for testing at first.
Installation phase
6th phase of system development; the system is installed and used, and the users are trained on how to use them.
OSI (Open System Interconnection) Model
7-layer process at work within a computer. Layers are: physical, data-link, network, transport, session, presentation, and application.
Maintenance phase
7th and last phase of system development; creates and manages updates for the system.
UTF (Unicode Transformation Format)
8 character eroding system (e.g. the letter "a" is represented by 01100001.)
petabyte
8 quadrillion bytes
Float
Also called a decimal or a double, with two times more storage; a number with a decimal; 'floating point' can control where decimal point is located.
Expert system
Also called a knowledge-based system. It is made for a variety of specific topics, such as identifying a car model. Is an interactive program.
Sequential search
Also called a linear search; searches sequential items until a match is found.
Character String
Also called a string; alphanumeric data; text-based only
Full-duplex
Can send and receive simultaneously.
Half-duplex
Can send and receive, but not simultaneously
COBOL (Common Business-Oriented Language)
A compiled language that is not algebraic; second oldest high-level programming language; developed to allow bankers and clerks to write programs to process checks and accounts in businesses.
Recursive function
A function that repeats itself over and over until stopped.
File compression
A method of removing repetitive elements of a file, causing the file to require less storage space and less time to transmit. To restore the file, have to go through decompression.
LAN (Local Area Network)
A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.
Transmission medium
Carries the signal
OCR (Optical Character Recognition)
A scanner converts a page of text into a picture of dots, and then the ____ looks for the text in the picture and inputs the resulting data into a computer.
Byte
A sequence of eight bits processed as a single unit of information
XP (Extreme Programming) Model
A team collaborates on all the SDLC stages, so that various ideas and perspectives can be incorporated. Progress is usually quick.
Vector graphics file formats
AI, EMF, SVG, MWF
Database software applications
Access (Microsoft Office), FileMaker (for Mac), My SQL, Oracle, SAP, dBase
Physical Layer
Accomplished by hubs and repeaters; bits of data are sent and received in the appropriate formats.
Data-link Layer
Accomplished by switches that bridge communication devices; data packets are encoded and decoded.
Security management
Accuracy, integrity, and safety of information resources
Data integrity
Accurate, consistent, and whole; maintained by regular backups, protection from invalid data entry, cross-checking across various parts of the database, etc.
Non-dedicated file server
Acts as both a file server and as a workstation.
Unary operator
Acts on one operand
Binary operator
Acts on two operands
graphics software applications
Adobe Illustrator, Corel Draw, Inkscape, Xara Xtreme (this and Inkscape are open source)
TCP/IP (Transmission Control Protocol/Internet Protocol)
Adopted in 1982 as the communication standard for different networks.
Boot Sector Virus
Affects the first sector of the hard drive, which contains the Master Boot Record (MBR). It is spread primarily by infected floppy disks, but can also affect the boot sectors of hard drives.
Standards
Agreed-upon rules developed by industry authorities to ensure that hardware and software produced by different companies can work together
Server-side scripting
Also called back-end scripting; scripts are executed on the server before the web page is downloaded by a client. (e.g. if you log-in to an account, your input is sent to the server to be checked before downloading your account). These are the parts of the web page that must be refreshed whenever there is a change.
Downward compatibility
Also called backwards compatibility; refers to how an older version of an application can still work on a newer version (e.g. you can open a 2010 Microsoft Office document on a 2013 version).
Raster files
Also called bitmap files; consists of pixels.
Expansion ports
Also called connectors or jacks; any connector that passes data in and out of a peripheral device or computer.
Machine language
Also called machine code; only language directly understood by computers, consisting of only 1's and 0's.
Vectors
Also called paths
Open Office
Also has version called Libre Office; free, open-source office suite through Apache. Consists of Writer, Calc, Impress, and Base.
Bandwidth
Amount of data that can be transmitted in a set period of time; speed of transferring data per second.
Hardware interface
All physical connectors and electronic elements that need to be in place for the computer and connected devices to properly function.
IP Addresses
Allow each computer connected to the network to be identified. Consists of 4 sets of numbers in this form: xxx.xxx.xxx.xxx. But each set can be no more than 255. (e.g. 12.125.52.255).
Enterprise Information Systems
Allow multiple users in different locations to have access to the same functionality. Often used for supply chain management and customer relations.
Site licenses
Allow software to be used on all computers at a specific location
Spreadsheets
Allow users to enter data in rows and columns to create financial schedules and tables arranged as a grid or a display. Can also perform calculations.
What-if analysis
Allows a user to change the contents of a cell and see how it affects the outcome of calculations.
Microwave Wireless Technology
Allows devices within sight of each other (line-of-sight) to communicate; used by space stations, hospitals, telephone companies, etc.
Indexed file structure
Allows management of data at any point in a database and contains an index.
Order entry/invoice system
Allows manipulation of customer orders and keeps track of each order's status. Also creates invoices.
Software framework
Allows programmers and designers to focus on meeting software requirements, because it provides a re-usable design for a system.
Streaming video
Allows users to begin watching a video before downloading completes.
DDS (Decision Support System)
Allows users to create data models of "what-if" scenarios and provides needed tools to examine the data.
Virtual machine technology
Allows users to simulate the hardware and software of one computer architecture on another; you could run Mac OS X, Windows, and Linux all on the same machine.
Financial software
Allows users to track income and expenses, manage checkbooks, create reports, and record tax information
Ethernet Hub
Allows various ethernet devices to connect and act together.
Satellite phone
Allows you to make a phone call anywhere in the world by using two-way communication with satellites. Designed for remote areas, so more expensive and has a larger antennae.
CMS (Content Management Software)
Allows you to publish, edit, and modify online content from a central interface. Used for blogs, news sites, and shopping sites. Wordpress is one example.
Simplex communication
Allows you to transmit or receive, but not both. (e.g. a TV)
Internet Browser Software
Allows you to view the pages of websites on the Internet
Workflow software
Also called "document routing software"; automatically takes a document from one person to the next after getting the necessary approval.
MMI (Man-machine interface)
Also called "human computer interface" or "user interface".
Procedural Programming
Also called "imperative programming" and "structured programming"; uses a list of instructions to tell the computer what to do step-by-step; relies on procedures. Examples: Fortran, COBOL, C, etc.
Procedures
Also called "routines" or "sub-routines".
Client/server
Also called 'tiered'; network clients or workstations request resources/services from the network. One or more servers manage and provide these resources/services. Usually consists of a 2-tier system or a 3-tier system.
Workgroup Applications
Also called Collaborative Software and Groupware; includes electronic communication (email, voicemail, wikis, etc.), electronic conferencing (electronic meeting systems, audio/video conferencing), and coordinating tools (e-calendars, project management systems, online proofing, workflow systems, etc.). Specifically for small groups of people working together on a particular task.
Machine cycle
Also called Fetch and Execute Cycle, or the Instruction cycle - Fetch, Decode, Execute, Share
BPM (Business Process Modeling)
Also called Process Modeling; analyzes and improves currently processes to improve them in quality and efficiency.
Functional Programming
An approach to problem solving that treats every computation as a mathematical function. Relies heavily on recursion. Examples: Erlang, Haskell, Lisp, Scala, etc.
TPS (Transaction Processing System)
An integral part of the inventory system with airlines, ticket sales companies, and online stores; can be integrated with online inventory systems. Is used to access/update a master database that maintains the sales of tickets and has built-in intelligence to prevent double-bookings of seats.
1830
Analytical engine conceived by Charles Babbage; could be programmed with punched cards to carry out calculations. Able to make decisions based on its own computations, such as sequential control, branching, and looping. Wasn't actually built until the London Science Museum succeeded in doing so over 100 years later.
Phishing
And email scam disguised as an official communication from a legitimate website.
File specification
Another name for a path. Consists of the drive, folder, filename, and extension.
Computer resource
Any component required to perform work: the CPU, RAM, storage space, peripherals, etc.
Embedded system
Any electronic system with a CPU that's not a general purpose computer.
Spreadsheet value
Any number used in a calculation
CAATT (Computer-Assisted Audit Tools and Techniques)
Any process of auditing that makes use of computer software. Includes the use of spreadsheets, text editors, and more advanced software packages to perform the task. Special software packages designed for such work include ACI, QDAC, and TopCAATs.
Wildcard
Any special character you use when typing a filename. (e.g. if you search "st*", you'll find all files starting with "st".)
Desktop widget
Appears on desktop; specialized utility that looks like a control and displays info
OOP (Object-Oriented Programming)
Approach to problem solving where all computations are carried out using objects. Examples: Java, Perl, Python, C#
GB (gigabyte)
Approximately 1 billion bytes
MB (megabyte)
Approximately 1 million bytes
.zip
Archive format; compressed files
Servlets
Are platform-independent, server-side modules that fit seamlessly into a Web server framework and can be used to extend the capabilities of a Web server with minimal overhead, maintenance, and support
Drive mapping
Assigning a drive letter to a network device, allowing you to access it as if it were within your own machine.
Hashing
Associates primary keys with items of data, to make data searching more efficient.
Heterogeneous array
Assortment of elements classified within various Abstract Data Types (ADTs) - like string, date, and integer.
File viruses
Attach to programs and run while the program is run, or at a specified time.
Macro virus
Attaches to a file or document; to prevent catching it, should use caution when opening attachments. Most famous example: the Melissa virus.
Biometrics
Automated method of recognizing a person based on behavioral or physiological characteristics; examples: fingerprint recognition, facial recognition, iris recognition, voice analysis, handwriting, signature analysis, and gait analysis.
Batch processing
Automatic processing; processes a group of jobs at the same time
Raster file formats
BMP, GIF, JPEG, PNG, TIFF
Tape backup
Backup made on a magnetic tape
Properties
Bandwidth, cost, reliability
Linux Operating System
Based on UNIX; uses both GUI and command-line interface.
BIOS (Basic Input/Output System)
Basic code to get the computer started. Placed on ROM, so often called ROM _____. Determines what a computer can do without accessing programs from a disk and contains all the code needed for controlling the keyboard, display screen, disk drives, serial communications, etc.Tells the computer how to find the OS and load it into RAM, interpret keyboard commands, and display characters on the monitor.
SMTP (Simple Mail Transfer Protocol)
Basic, text-based protocol that first gained popularity in the 1980s; is now the standard protocol for the transmission of email over the Internet
UPS
Battery which provides power during power failures. Often used by companies in conjunction with their servers so a power outage doesn't result in even a momentary loss of service.
Data packets
Binary data that has been divided into smaller parts to be transmitted over a network. Must have a header and body; sometimes has a footer. Transmitted through TCP/IP, and once received, are compiled into the complete message.
Class
Blueprint (concept) of the objects.
Black-hat hackers
Break into computer systems for damaging purposes
White-hat hackers
Break into networks to reveal potential security breaches so they can be fixed
Striping
Breaking up each disk in the array into units (blocks) of varying size. Block 1 is stored on Disk 1, Block 2 on Disk 2, Block 3 on Disk 1, Block 4 on Disk 2, etc.
ENIAC (Electronic Numerical Integrator Analyzer and Computer)
Built by Americans between 1943 and 1945; weighed 30 tons, was 100 feet long, and 8 feet high.
Spreadsheet function
Built-in formula which performs common calculations.
1970
By this time, all integrated circuits were on the microprocessor; computers with this were considered the 4th generation computers.
STP (Shielded Twisted Pair)
Cables encased in metallic foil, used in Europe
UTP (Unshielded Twisted-Pair)
Cables used in LANs
e-commerce
Can be split into two types: business to business (B2B) and business to consumer (B2C).
Event-controlled Loops
Can be stopped by an external event.
NIC (Network Interface Card)
Can connect to a network by hardwire or by plugging a jack into the ____.
Object-oriented DBMS
Can handle images, audio, and video. Each object will be tagged using the type of image, and other important info.
Keywords
Descriptive terms used to find relevant information
Productivity software
Designed to help people work more efficiently
Application Developer
Designs and creates programs to meet end-users' needs, doing both the system analyst's job and the programmer's job.
Computer Hardware Engineer
Designs new hardware peripherals
Tower
Desktop
Disk scanner software
Detects and corrects certain types of common problems on hard disks, floppies, and CDs. Also searches for and removes unnecessary files (temp files).
Software Developer
Develop software; need excellent verbal and written communication skills
Tim Berners-Lee
Developed Hyper Text Transfer Protocol (HTTP), Web browser software (WWW), and a Web server.
HFS (Hierarchical File System)
Developed by Apple. Windows can read it, but needs additional software to write it.
Colossus Computer
Developed by British to break German codes during WWII.
NTFS (New Technology File System)
Developed by Microsoft as a file system for Windows. Started to replace FAT by mid 1990s; instead of storing a single table to map all the clusters that contain each file, the info is saved in every cluster that helps make up a file. Mac OS can read it, but needs additional software to write it.
Formal standards
Developed by officials in the industry
GPS (Global Positioning System)
Developed by the U.S. Department of Defense under the name of NAVSTAR (Navigation System with Timing and Ranging). Also used for cartography, mining, and telling time.
AppleScript
Developed for Mac OS; uses a natural language metaphor (uses more normal language instead of coding language); best for simple tasks.
UNIX Operating System
Developed in 1960s.
ZIP drives
Developed so quickly that the manufacturer neglected to keep backward compatibility going; the drive hardware for the 250-MB ZIP didn't work for the 100 MB disk, and vice versa.
IP (Internet Protocol)
Developed to make sure data packets arrived correctly at the right destinations.
Computer engineering
Development of computer hardware and software
IETF (Internet Engineering Task Force)
Develops and promotes Internet standards. Goal is to make the internet function better through the evolution of Internet architecture and smooth function. Is made up of an international community.
Antispam software
Develops blacklists of email addresses and Internet domains that are known to be spammers and blocks them; also uses content filtering to examine messages for typical terms/phrases associated with spam. Directs such messages into your junk mail.
Node
Device on a network, including printers, laptops, etc.
Multiplexer
Device that allows a single communications channel to carry data transmissions from many sources at the same time.
Secondary storage
Devices and media that store data permanently - like floppy disks, hard disks, and USB drives.
IM (Instant Messaging)
Different from email because it's in real-time and you can see who is online
DRAM
Dynamic RAM; refreshes frequently
Magnetic Storage
Earliest type of storage on a computer; used tapes, then hard drives, and floppy disks. Each uses the same general process of a read/write head magnetizing material.
Compatible Time-Sharing System
Early email system developed by MIT
AUTODIN (Automatic Digital Network)
Early email system developed by the U.S. Department of Defense
NLE (Non-linear editing)
Editing where content can be accessed randomly and which is non-destructive.
WAP (Wireless Access Point)
Either a hotspot or 3G
System Bus
Electric line that sends and receives data (not used by cache)
Mobile phone
Electronic device to make/receive phone calls over a radio link while moving through an area. Introduced in 1980s, gained popularity in 1990s.
Spam
Electronic junk mail. Spammers collect addresses using automated spiders.
Micropayments
Electronic payments for internet transactions as small as 25 cents, allowing customers to purchase goods and services for very small amounts - like for iTunes.
De facto standards
Emerge through the marketplace and become widely accepted but do not have an official standing
Enterprise-wise systems
Enable businesses to make decisions by evaluating what's happening within the company, consolidating data and the company into databases for ease of assessment.
Pseudo-code
English words set up like coding, describing what a system will do.
Referential Entity Integrity Rule
Ensures primary and foreign keys coordinate.
Worms
Enter a computer and propogate throughout a network; usually don't destroy data, but they do slow down the computer and take up hard disk space. Can spread to other computers without human intervention, unlike viruses. Examples: Melissa and ILOVEYOU email viruses (both took advantage of the macro feature in Microsoft Office documents).
HIPAA (Health Insurance Portability and Accountability Act)
Established standards of privacy for health care data. Also gave people the right to request a copy of their medical records, request modification of their records, and receive privacy policy notices
DDL (Data Definition Language)
Establishes the structure of a database.
CERN
European Organization for Nuclear Research; developed idea for a larger hypertext database with typed links - which became the World Wide Web.
ESS
Executive Support System
ISDN (Integrated Services Digital Network)
Expensive Internet service with a speed of 64-128 Kbps
Fuzzy logic
Expert system takes unsure data, along with the percentage of confidence in your unsure data, and give you an answer along with its percentage of having given you a correct answer.
Qualitative data
Explains the how and why through some type of inspection or viewing of a problem or issue
Vector graphics
Graphics made with points, lines, curves, and shapes. When you zoom up on these graphics, they are still clear. Created with illustration software. Many of these graphics are exported to raster format at high resolution to make them easier to work with.
Boolean expressions
Expressions in a programming language that produce a Boolean value.
BPR (Business Process Reeingerineering)
Extreme rethinking/redesign of business processes. Goal is improvement in areas of customer service, quality, and cost.
Fortran
FORmula TRANslation; designed by John Backus for IBM during the late 1950s; used today for engineering and scientific applications because of the quality of its compilers and numerical libraries.
802 standards
Family of standards for local area networks that concern mainly the physical layer and data link layer in the OSI model.
Z-modem
Fastest transfer protocol for terminals/modems.
Charles Babbage
Father of Computers; English mathematician who conceived the analytical engine.
Foreign key
Field whose values are the same as the primary key of another table
Data structures
Files (info compiled into one element/unit), arrays (collection of individual units in lists/tables), linked lists (arrays easily editable with the use of an extra field called a pointer), records (fields in tables that apply to one unit of data), trees, and tables.
EIM (Employee Internet Management) Software
Filters and monitors employees' Internet usage
1971
First ARPANET email was sent, using the @ symbol.
Feasibility analysis
First phase of system development; decides whether it is worth it to develop the application, creates the initial project plan, and estimates the future budget.
1991
First web page went live on the Internet
Z3
First working, programmable, fully automatic, digital computer; the original was destroyed in WWII.
DoS (Denial of Service) attack
Floods a network with traffic, rendering the network useless to its intended users.
Backup media
Floppy disks, external hard drives, CD-RWs, tapes, flashdrives, etc.
OOAD (Object-oriented analysis and design)
Focuses on the use of items and how they relate to each other. Analysis focuses on learning what a system will do. Design focuses on how it will do that. Uses UML.
Local folder
Folder/directory containing all web pages and other files on a computer
Remote site
Folder/directory containing all web pages and other web files on a web server; place to which these files are uploaded.
IR (Infrared) Wireless Transmission Technology
Follows standards of the IR Data Association. Technology is used for all wireless keyboards/printers. Needs line-of-sight.
ARPA (Advanced Research Projects Agency)
Formed in response to the Sputnik's launch; sought to create a communication network that wouldn't be vulnerable to a nuclear attack.
FOSS
Free and Open Source Software; copylefted to ensure it cannot be sold
Open source
Free to public
FQDN (Fully Qualified Domain Name)
Full name for a web 'domain'.
Programming Paradigms
Fundamentally different approaches to building solutions to specific types of problems
Routers
Gateways between networks; accomplish forwarding of data pockets.
Network devices
Gateways, switches, bridges, hubs, repeaters, and routers.
Perl
General-use language for server-side scripting. Also used as a glue language, connecting different systems together not originally designed to work together; also widely used for database applications.
Network size
Geographic area occupied by computers and network, and the behavior of the computers when data is shared.
Hacking
Getting unauthorized access to computer systems
Analytical graphics
Graphical forms that make numeric data easier to analyze. Also called business graphics. Make sales figures and economic trends easier to understand.
Cyberterrorists
Hack websites to show activists' messages (instead of or in addition to regular content).
Minicomputer
Handles computing for small corporations. Mid-range computers are typically shared for a department to process transactions, access databases, and generate reports. These are smaller than mainframes - but the size of a fridge!
Host computer
Has many terminals letting people use the same computer
Smart phone
Have telephone, email, texting, device integration, picture, video, gaming, and internet access capabilities. Basically mobile computers. Have their own OS and applications.
Selection control structures
Have the computer choose from various actions based on whether a condition is true or false
CIO (Chief Information Officer)
Head of the Information Services department
CIO (Chief Information Office)
Head of the Information Technology/Information Systems departments; typically proposes the need for information technology to a staff who creates the solution within the given budget. Often reports to the CEO, but is rarely involved in the technical decisions or the day-to-day operations.
Utility Programs
Help monitor and configure settings for the Computer, OS, or applications. Examples include backup and data recovery software, antivirus software, disk cleanup, etc.
Boolean logic operators
Help narrow or broaden searches to find more relevant info (e.g. if you search "house training AND tricks", will look for both together. If you search "dog OR canine", will look for either one. If you search "TVs NOT flatscreen", it will not pull up anything mentioning flatscreens.)
Information analysis tools
Help people find logical solutions to problems by letting them make a model of their problem, with flowcharts, spreadsheets, etc.
Utility Software
Helps manage, maintain, and control computer resources. (e.g. antivirus software, backup software, disk tools).
Backup Software
Helps you backup with cloud storage or storage devices. Can make an exact copy of your hard disk.
File manager
Helps you find, rename, move, copy, and delete files or folders; e.g. Windows Explorer
DSL
High-speed Internet connection over regular phone lines
Hardware security
Hinder attackers from gaining access to valuable data; often the features are managed remotely to provide even greater control over sensitive information. (e.g. login/logout features, biometric keyboards, etc.)
Blue-hat hackers
Hired by companies to expose security deficiencies in their systems
Optical devices
Hit market around early 1990s; they're written/read with a laser, are strong, and handle temperature fluctuations well; took several years to be affordable compared to floppy disks.
Primary key
Holds a unique value for each record, like an employee ID number of a social security number. There is only one per table, but it may have more than one attribute.
CMOS memory
Holds data like your computer system configuration but requires a small amount of electricity to retain its data; this power is provided by a small battery on the motherboard.
Flaming
Hostile, insulting reaction on the Internet, common on message boards over controversial topics
HTML
Hypertext Markup Language; used to create structured documents for display in a web browser
1981
IBM created the first true PC with MS-DOS. It became a mass-market product because the design was made available to other manufacturers. Around the mid 1980s, both Apple and Microsoft came out with GUIs.
1954
IBM introduced the 650 - the first mass-produced computer.
John Cocke
IBM research scientist who discovered that only 20% of the instructions on the CISC instruction set did 80% of the work. This discovery led to the development of RISC machines.
Records and fields
In database terminology, refers to rows and columns.
Input devices
Keyboards, mice, microphones, scanners, cameras, etc.
WLAN (Wireless LAN)
LAN that is completely wireless
JavaScript
Language designed to provide interactive Web content. Integrated within HTML and makes webpages dynamic.
Sourcing
Indicates who is responsible for building a system
Proprietary file extensions
Individual to makers. (e.g. WordPerfect documents are .wpd, while Microsoft Word documents are .doc or .docx).
Alpha test
Initial trial run of a new program, system, or hardware within the organization that created it.
Peripheral devices
Input, output, and storage equipment that can be added to a computer to enhance its functionality. A typical computer includes the system and a variety of input, output, and storage devices.
Information-processing cycle
Input, processing, output, storage
I/O
Input/output
Basic network components
Input/output devices (terminals, nodes); telecommunication channels (to transmit and receive data: cables and wireless radio frequencies); telecommunication processors (provide control/support functions and convert analog data to digital); control software (controls functionality and activities of the network); messages (data being transmitted); and protocols.
Data Entry Operator
Inputs data from handwritten sheets; must have typing skills of at least 50 wpm and be ok working alone. Earns little.
WISP (Wireless Internet Service Providers)
Install Wi-Fi technology
Intellectual property
Intangible/non-physical right that's the result of original thought, such as musical, literary, or artistic works
Search form
Interface in which you type a word or phrase you wish to find through your search engine.
ISO (International Organization for Standardization)
International organization that promotes development of standardization in varying fields, including computing and data communications. Developed set of specifications known as OSI reference model that describes how data is sent/received over a network.
DSL (Digital Subscriber Network)
Internet service with a speed of 3-6 Mbps; allows people to talk on the phone and use the internet at the same time because voice and data have different cables.
Twisted-pair cables
Invented by Alexander Graham Bell; consist of 2 copper wires insulated and twisted together, with a RJ-45 connector on both ends.
Semiconductor transistor
Invented in 1926; in 1947 it was developed into a solid state, reliable transistor for computer use. Controls flow of electricity, but only millimeters in size and generated little heat. Computers made with this are considered 2nd generation computers.
Applet
Java program generally run from the command prompt.
VBA (Visual Basic for Application)
Language often used by Microsoft Office macros.
Acceptance test
Last test, performed by end-users, verifying the system is integrated properly and works with actual data.
LCD (Liquid Crystal Display)
Layers of glass, polarized film, and liquid crystal; electrical impulses are sent through, causing the color to be shown and the image to be displayed on the screen
Topology
Layout of interconnections between computers in a network. Examples of layout names: point-to-point, bus, star, ring, mesh, tree, hybrid, etc.
Software License
Legal instrument that governs how the software can be used and distributed
Sound card
Lets you hear from an internal speaker
Full-duplex communication
Lets you transmit and receive at the same time (e.g. telephone lines)
Half-duplex communication
Lets you transmit and receive, but not at the same time (e.g. walkie-talkies).
2-tier system
Level 1 consists of the various clients/workstations (hardware devices which provide end users with access to data or service on the server). Level 2 consists of a server (a computer with more processing speed, memory, and hard disk space; it runs on its own OS).
3-tier system
Level 1 consists of the various clients/workstations. Level 2 consists of an application server. Level 3 consists of a database server which can only handle data requests.
XML (Extensible Markup Language)
Like HTML, but without pre-defined elements. It's a metalanguage: it allows users to describe a markup language to meet specific needs. It has the ability to design new browsers/applications.
LED (Light-emitting Diode)
Like LCD, but with a diode on the back that forces light through the layers for a sharper picture and colors. It lasts longer, too.
V-Model
Like the waterfall model, but arranged in a V-shape, showing the relationship between an early phase and a testing phase. There is a greater emphasis on testing, and testing procedures are developed early on.
Waterfall Model
Linear-sequence life-cycle model; progress is seen as flowing downwards through various phases, sequentially.
NIC
Small circuit board which allows the network to be possible by sending and receiving data.
.jpg
Joint photographic expert group; used where flexibility in file size is important; has built-in, adjustable compression.
Data file
Just holds information (photos, words, numbers) for executables to use.
m:m
Many-to-many cardinality; e.g. more than one product can occur in an order and more than one order can have a product.
m:1
Many-to-one cardinality; e.g. many people vote for one party
MMOGs
Massively Multiplayer Online Games
Transmission media
Material substances that carry energy waves, including data being transferred. Can be wired (twisted-pair cables, coaxial cables, fiber optic cables) or wireless (radio waves, microwaves, infrared waves).
Connection speed
Maximum speed that a modem can communicate with the modems owned by your ISP.
Grey-hat hackers
May hack a system to reveal security risks and then require the company to pay in order to view the evaluation.
VPN (Virtual Private Network)
May use the Internet, but the data is encrypted before being sent
rpm (revolutions per minute)
Measure of how fast a hard drive spins. The higher the ___, the faster it can position a specified sector under the read-write head, and the more quickly it can access data.
MHz
Measure of the speed at which info is processed per second, which is equal to one million.
Quantitative data
Measures how long, or how often, something is occurring through statistical analysis.
Physical Security
Measures that incorporate a wide variety of barriers (doors with access codes, alarm systems, biometric ID, etc.) to keep unauthorized individuals from gaining access to locations that store valuable electronic data.
Transistor
Microscopic switch that controls the flow of electricity based on whether the switch is open (0) or closed (1).
.xls
Microsoft Excel
Tablet computer
Mobile computer where all components are integrated into a single unit. Has bigger screens than smart phones and does not have telephone capabilities. Gained popularity in 2010.
PDA (Personal Digital Assistant)
Mobile device dedicated to managing personal information, like calendar and meeting schedules, address books, to-do lists, email, etc. Was introduced in 1980s, and popular in 1990s until smart phones' rise, but the touchscreen technology and synchronization with other devices was carried into smart phones' technology.
Program control statements
Modify the order in which the computer executes the statements (e.g. "if")
Modem
Modulator-demodulator.
Output devices
Monitors, speakers, printers, etc.
Relational DBMS
Most popular DBMS, first introduced in 1970s; each row refers to a record (entity). Each column refers to a field (attribute). Uses multiple tables to organize data.
Winzip
Most popular file compression software.
Elite hackers
Most proficient in the hacking industry
Kermit
Most reliable transfer protocol for terminals/modems. Good for noisy phone lines.
Network Databases
Most widely used Database Management Systems (DBMS).
Optical Mouse
Mouse with no roller
Zipped files
Multiple files that have been consolidated into one file and compressed to reduce size and download time; they are unzipped as part of the installation process.
Sequential file structure
Must read/write data in a specific order
MAN (Metropolitan Area Network)
Network across a city, region, or college campus, connecting various LANs.
NNTP (Network News Transfer Protocol)
Newsgroup protocol
Linux
Non-proprietary version of UNIX; maintained by volunteer programmers; created in 1991 by Linus Torvalds - a Flemish programmer.
Computer Science
Normally focuses on making computers work more efficiently and effectively.
Hybrid database
Not limited to only one style of data storage; strongest versions use relational (data arranged in rows and columns) and object-oriented (data arranged as objects in classes. Uses hierarchy) models.
1958
Now it was possible to combine several components, like transistors, and the circuitry connecting them on a single piece of silicon - 1st integrated circuit, led to modern computer processors. Computers made with these are considered 3rd generation computers.
Frequency
Number of cycles per second; measured in Hz (hertz)
Binary system
Number system with a base 2; 0 and 1 are the only digits to choose from. To determine how big a number can be expressed, follow the formula 2 to the n power. n = number of bits. So the largest number an 8-bit variable can hold is 255 (have to count 0). This is why an 8-bit video card is limited to displaying 256 colors (no need to count 0 because it's numbering colors, not numbers).
Checksum
Number used to determine if any byte within a program has been changed. Usually used when transmitting data so the receiving computer knows it received the data correctly.
Floating points
Numbers including decimal points
RSI (Repetitive stress injury)
Occurs when groups of muscles are forced through the same repetitive action repeatedly
Tape drive
Sequential access device that retrieves data by starting at the beginning of the tape and reading each record until the required data is forced, causing it to take longer to access data than a hard drive.
Virus signature
Series of bytes unique for a certain virus; acts as an identifier which antivirus software can use.
Macro
Set of computer instructions you can record and execute later as needed. You go through the steps, the step sequence is recorded, you give the sequence a name or shortcut key combination, and when you select the name or shortcut, the computer follows the instructions again. A form of programming that requires no knowledge of coding.
Script
Set of instructions executed under certain conditions
Protocol
Set of rules defining how 2 devices communicate with each other over a computer network.
FTP (File Transfer Protocol)
Set of rules for the transfer of files from one computer to another. A file server is used to upload/download files. Part of TCP/IP.
Benchmarks
Sets of standard processing tasks that measure the performance of computer software/hardware; the results are published online.
Registry
Settings that a Windows computer needs to correctly use its software and hardware devices.
Platter
Several single circular magnetic sheets put together and mounted on a cylinder to make a hard disk. Each _____ has tracks and sectors; read-write heads are used, one for each side of each _____.
Privacy policy
Should detail how information is collected, how that information can be used, and the extent to which the information can be used by third parties.
Task Manager
Shows a list of active processes.
Footer
Shows end of the message in a data packet has been reached, and alerts the user to any error-checking steps that should be taken.
Medium-range wireless
Signals range up to 100 meters away, approximately. (e.g. WiFi)
https:
Signifies a secure connection.
Microprocessor
Silicon chip programmed to perform various tasks on the data it receives
XHTML
Similar to HTML, but written using XML, with predefined elements. Documents written with it must be well-formed and developed according to specific rules; it's case-sensitive and works smoothly with database and workflow applications.
Network DBMS
Similar to the hierarchical DBMS, but it lets a child have more than one parent. This can become complicated.
1982
Simple Mail Transfer Protocol (SMTP) was developed; became the most widely-used email standard.
Flat text file
Simplest type of file; the computer writes straight to it without encoding it in computer language or doing any special kind of formatting.
Neural networks
Simulate the brain and can learn, remember, and even process information. They create their own rules and facts through trial and error using thousands of examples.
Cracker
Someone who intentionally breaches security to break into someone else's computer or network for a malicious purpose
Trap door
Special hole left by the programmer for emergency situations; it can be used by a hacker to enter a system without having to hack each security precaution.
System security monitors
Specialized software packages that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction
Application Layer
Specific to the application used; most directly dealt with by the user. Includes FTP, email, etc.
CAN (Campus Area Network)
Specifically for campuses
Database scheme
Specification of the logical structure of the data stored in the database.
Declaration
Specifies exactly what should be done to the element; (e.g. in h1{color:purple;}, the "color:purple" is the declaration. "Color" is the property, and "purple" is the value.
Syntax
Specifies the sequence and punctuation for command words and parameters.
Transfer Rate
Speed that data is transferred from one device to another.
Fat clients
Stand-alone desktops and laptops that are used as clients. They can run programs on their own and have a local hard drive, so they only use the network for certain tasks.
SQL
Standard Query Language for RDBMS (Relational Database Management System)
UML (Unified Modeling Language)
Standard modeling language to describe elements of a system and how they relate to each other.
Iterative and Incremental Model
Stars with the initial planning phase and ends with deployment, with cyclical interactions in between. Divides functionality into smaller increments, developed, and tested over one or more iterations.
Usenet
Started by US students in 1979. Newsgroups messages are distributed by newsreader programs; most browsers have these programs built in.
Repetition control structures
Statements like "FOR", "WHILE", and "DO WHILE". These cause the same statements to be executed repeatedly until a condition is met.
SRAM
Static RAM; constant and doesn't refresh
MTBF (Mean Time Between Failures)
Statistic measuring a computer component's reliability
1976
Stephen Jobs and Steve Wozniak created Apple 1 with a keyboard, display, and disk storage after experimenting with the Altair 8800. Bill Gates and Paul Allen developed Microsoft about the same time.
Counter-controlled loops
Stopped when a counter in the loop reaches a pre-determined value.
Shared drive
Storage space on one of your organization's central servers. In file management software, looks like any other device and you can copy files to it.
Electronic wallets
Store customers' billing and shipping info on the servers of the store the consumer frequently shops on. Utilized by most major online retailers like Amazon.
Digital files
Store details in binary code
PMPs (Portable Media Players)
Store digital audio, video, and image files on SD cards or in built-in hard drives (as in newer devices).
Short integers
Stored with 16 bits (means you can store up to 2 to the sixteenth power - 65536 unique values).
Long integers
Stored with 32 bits
General accounting system
Stores an organization's financial status and records incoming money, outgoing money, and assets.
CRM (Customer Relationship Management)
Stores and manages info about customers and their relationship with the company, including customer service dealings.
Video memory
Stores images for the graphics card before they are displayed.
e-reader
Tablet computer with the primary purpose being to read books
Transmitter
Takes info and converts it into signals
Outsourcing
Taking a workplace activity once performed inside the organization and moving it outside the organization; when referring to application development, means to use another organization to develop it.
Overclocking
Technique, often used by computer gamers, for increasing the speed of components like the motherboard, memory, processors, and graphic cards. Can cause components to overheat and be damaged - or catch fire.
HTML (HyperText Markup Language)
Tells the Web browser how to display document words and images; uses pre-defined tag pairs.
Cache
Temporarily stores instructions and data that the processor is likely to use frequently. It is lost when the computer power is turned off, but because it is closer to the processor than RAM, it can be accessed more quickly, speeding up processing. L1, L2, and L3 are some examples.
Usability testing
Testing prototypes on actual users; tests efficiency and usability before releasing the final product.
Conditional
Testing to see if a condition is true or false
Input data
Text, images, numbers, sounds
Online Chat
Text-based communication over the Internet in real-time
Vacuum Tubes
The Colossus and ENIAC relied heavily on these; they act like electronic switches that can be turned on and off faster than mechanical switches; but they used up a lot of energy and gave off a lot of heat. Computers made with these are considered 1st generation computers.
Multiprogramming
The OS keeps several jobs in memory simultaneously. The OS selects a job from the job queue and starts executing it; when that job needs to wait for input/output, the CPU is switched to another job.
Word size
The number of bits a processor can process at any one time. The more bits in a 'word', the faster the computer. Modern computers often have word sizes of 16, 32, or 64. A computer with a 64 bit word size will transfer data within the microprocessor at 8 bytes at a time.
Hardware
The physical equipment
Job Design
The process of defining how work will be performed and what tasks will be required to fulfill the position.
Information Privacy
The right to determine when and to what extent info about oneself can be communicated to others
GUI (Graphical User Interface)
The user interface on modern computers
Cyberspace
The world of wired and wireless communication, including Internet, chat rooms, blogs, number-based services, conference calls, and ATMs.
Dumb terminals
These have a monitor, keyboard, and a minimum amount of hardware to connect to the network. All processing is done by the server.
Thin clients
These have their own processor, but may not have a hard drive. Examples include computers at a public library, which run no applications.
3G
Third Generation of mobile communications technologies; has a high bandwidth
Network data model
This is similar to the hierarchical data model, except that an entity can have more than one parent.
Optical Drive
This is where DVDs and CDs go; near the NIC on a laptop; read and written with a laser.
CPU (Central Processing Unit)
This is where most computer processing takes place. When talking about PCs, it is synonymous with the microprocessor. It consists of the control unit, the arithmetic logic unit (ALU), and the registers (high speed storage areas).
GPL (GNU Public License)
This mark on a software product means that the software is open-source.
Pipelining
This technology allows the processor to start executing an instruction before the previous instruction completes, enhancing computer performance.
.exe
executable files - they don't need to be opened with software; used for doing things like downloading applications.
.tif
tagged image format file; used on both PCs and Macs for high quality printable files
Globalization
the increasing movement of goods, services, and capital across national borders.
WIMP
window, icon, menu, and pointer (the most common graphical elements of the GUI)