IFT 100 Tech in Action (Chapter 1-13)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

flash memory

"Portable, nonvolatile memory."

Secure Sockets Layer

A network security protocol that provides for the encryption of data transmitted using the Internet (s --> https)

Secure Sockets Layer (SSL)

A network security protocol that provides for the encryption of data transmitted using the Internet. The current versions of all major web browsers support SSL.

virtual private network (VPN)

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.

Swift

A new programming language introduced by Apple for developing for iOS and OS X.

comment

A note left by a programmer in the program code to explain the purpose of a section of code, to indicate the date the program was written, or to include other important information about the code so that other programmers can more easily understand and update it.

decision point

A place where a program must choose from a list of actions based on the value of a certain input.

intranet

A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

proxy server

A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).

application server

A server that acts as a repository for application software.

print server

A server that manages all client-requested printing jobs for all printers on a network.

database server

A server that provides client computers with access to information stored in databases.

keywords

A set of words that have predefined meanings for a particular language.

service pack

A software update.

token

A special data packet used to pass data in a ring topology network.

wireless network interface card (wireless NIC)

A special network adapter card that allows a computing device to connect to a network using wireless access.

jam signal

A special signal sent to network nodes alerting them that a data collision has occurred.

editor

A special tool in an integrated development environment (IDE) that helps programmers as they enter code.

editor

A special tool that helps programmers as they enter the code, highlighting keywords and alerting them to typos.

digital signal processor

A specialized chip included in the cell phone to handle the compression work.

high definition

A standard of digital TV signal that guarantees a specific level of resolution and a specific aspect ratio, which is the rectangular shape of the image.

Internet Society

Professional membership group that provides leadership for the orderly growth and development of the Internet.

If you want to change the amount of space set aside on your hard drive for deleted files, what should you do?

Right-click the Recycle Bin, choose Properties, and adjust the allocated amount.

If you do not want the Delete File dialog box to appear each time you delete a file, what should you do?

Right-click the Recycle Bin, choose Properties, and clear the Display delete confirmation dialog check box.

Although it might not be a good idea, how do you turn off the Recycle Bin so that files you delete from your hard drives are permanently gone, without having to manually empty the Recycle Bin?

Right-click the Recycle Bin, choose Properties, and select the Do Not Move Files to the Recycle Bin. Remove Files Immediately When Deleted check box.

The ____ topology uses tokens to control data transmission

Ring

Which protocol is used to transmit e-mail over the internet?

SMTP

MetaSearch Engines

Search other engines rather than individual websites (ie DogPile)

domain name

Simply a name that takes the place of an IP address, making it easier for people to remember.

Network

Simply two or more computers that are connected via software and hardware so they can communicate with each other

Desktop Computer

Single Location use (Stationary) and usually come with a system unit

What do you call the output of a Processing Language Project?

Sketch

Social Commerce

Subset of e-commerce that uses social networking to assist in marking and purchase products

tethering

Approach which makes sure that as long as you have a 3G signal, your computer can access the Internet even when it tells you there are no available wireless networks. Several smartphones offer this capability.

__________ is a microcontroller popular in the Maker Movement.

Arduino

Which of the following statements is TRUE?

Arduino boards are inexpensive.

Spear Phishing Emails

Are sent to people known to be customers of a company and have a much greater chance of successfully getting people to reveal information or data

Crowdfunding

Asking for small donations from a large number of people, often using the Internet; a style of generating capital start a business through social media (ie Kickstarter)

Where would you enter the email address for a person whom you do not want the recipient to know you are including with the message?

Bcc: line

classless interdomain routing (CIDR)

Because the unique IP addressing system offers only a fixed number of IP addresses, a different addressing scheme known as classless interdomain routing (CIDR) allows a single IP address to represent several unique IP addresses by adding a network prefix (a slash and a number) to the end of the last octet.

beta version

Before its final commercial release, software is often provided free or at a reduced cost in a beta version to certain test sites or to interested users. By providing users with a beta version of software, programmers can collect information about the remaining errors in the code and make a final round of revisions before officially releasing the program.

Computer Literate

Being familiar enough with computers that a user knows how to use them and understands their capabilities and limitations

Who was the Founders of Microsoft

Bill Gates and Paul Allen

A(n) ______ decision point is answered in one of two ways: yes (true) or no (false)

Binary

Which is NOT one of the three features in a loop?

Binary decision

Bits vs Bytes

Binary digits/Bits - 0 and 1 Bytes: Combination of eight binary digits

Which of these is an optical storage device?

Blu-ray drive

When you wish to send an email message to multiple parties, you enter their addresses in the To: line separated by which of the following?

Commas

High-defined multimedia interface (HDMI) Port

Compact audio-video interface that allows both HD video and uncompressed digital audio to be carried on one cable

Peripheral Device

Component that connects with computer (ie. Monitor or Keyboard)

Fiber-optic cable

Composed of glass or plastic fiber.

Freeware

Copyrighted software for free

Electrical Switches

Devuces inside computer that flipped between the two states of 1 and 0, on and off (1 = On, 0 = Off)

When packets are sent through the Internet, all data packets are sent through the same route.

False

DDR5

Faster data transfer rate

original IP addressing scheme

IPv4

Domain Name

Identifies a host

negative acknowledgment (NAK)

If the packet is unreadable (damaged in transit), then Y sends a negative acknowledgment (NAK) to X, indicating the packet was not received in understandable form. X then retransmits that packet.

Stopping Virus Execution

If the software detects a virus signature or suspicious activity, such as the launch of an unknown macro, it stops the execution of the file and notifies you. Quarantined (delete or fix)

if else

In C++, a binary decision in the code where the program can follow one of two paths: If the decision is made one way, the program follows one path; if made the other way (else), the program follows another path.

element

In HTML, a pair of tags and the text between them.

For

In Visual Basic, programmers use the keyword For to implement a loop; after the keyword For, an input or output item is given a starting value, and then the statements in the body of the loop are executed.

Next

In Visual Basic, programmers use the keyword Next to implement a loop; when the Next command is run, the program returns to the For statement and increments the value of the input or output item by 1 and then runs a test cycle.

passive topology

In a network, a type of topology where the nodes do nothing to move data along the network.

active topology

In a network, a type of topology where the nodes participate in moving data through the network.

open system

In an open system, its design would be made public for access by any interested party.

positive acknowledgement (ACK)

In data exchange, the confirmation sent from one computer or system to another saying that the computer has received a data packet that it can read.

behaviors

In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.

data

In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.

methods

In object-oriented analysis, classes are further defined by information (data) and actions (methods or behaviors) associated with the class.

classes

In object-oriented analysis, the categories of inputs that are part of the problem the program is trying to solve are called classes.

derived class

In object-oriented analysis, the modified class.

base class

In object-oriented analysis, the original class.

Aggregator

Locates all RSS series to which you've subscriped and automaticallt downloads new content to your computer

File Path

Location of file

Host

Location that maintians the computers that store the web files

Phishing

Lures internet user to reveal personal information

Network adapters send data packets based on a(n)

MAC address

Which of the following specifications is used to simplify attachments to e-mail messages?

MIME

protocol used for sending attachments with e-mail

MIME

Processing is an open source platform developed by ________ to make programming available to artists.

MIT

Solid-State Drive (SSD)

No moving parts --> more efficient, run without noise, emits little heat and requires low power

Will SMTP keep my e-mails safe?

No, SMTP cannot keep your e-mails safe, but there are other security measures like encryption that can keep your e-mails safe.

Do instant messaging (IM) services use secure data transmission software to provide security of data exchanged?

No, most instant messaging services don't use secure data transmission software. Hence it is not safe to exchange important data over IM.

Once compilation is done, is the program finished?

No, programmers still need to test the code to see whether the program behaves as it should.

Turing Machine

Not real machine, hypothetical model that mathematically defined a mechanical procedure (algorithm) By Alan Turing (1936)

Data Breach

Occurs when information is copied, transmitted or viewed by individuals who isn't authorized to handle the data

Pharming

Occurs when malicious code is planted on computer either by virus or website. Alters browser ability to find pages or directed to bogus sites

Plagiarism

Occurs when you use someone else's idea or words and represent them as your own

Hexadecimal Notation

Power of 16 (0-9 as well as A-F)

Single Core vs Dual Core

Processing Paths that processor had Single: One instruction at a time Dual: Two instruction at a time

field

a field where a category of information in a database is stored. Fields are displayed in columns.

data dictionary (database schema)

a file that defines the name, data type, and length of each field in the database.

Cache Memory

a form of random access memory that is more accessible to the CPU than regular RAM

A macro is __________.

a small computer program

decision support system (DSS)

a system designed to help managers develop solutions for specific problems.

transaction-processing system (TPS)

a system used to keep track of everyday business activities (such as sales of products).

Ethical decisions in business affect which of the following?

all stakeholders

XML and JSON

allow web services to exchange information.

Which computer was touted as the first personal computer?

altair

IPv6 uses 32 bits to assign

an address to every device connected to the internet

data type (field type)

an attribute of a data field that determines what type of data can be stored in the database field or memory location.

Scope Creep

an ever-changing set of requests from clients for additional features as they wait longer to see a working prototype

The System Image utility creates an image of your operating system, program files, and data files to __________.

an external hard drive

field name

an identifying name assigned to each field in a database.

database administrator (database designer)

an individual trained in the design, construction, and maintenance of databases.

database query

an inquiry the user poses to a database to extract a meaningful subset of data.

The Sound Byte suggests a network technician needs all of the following EXCEPT __________.

anger management

A(n) ____ server acts as a repository for software such as Microsoft Office.

application

acts as a repository for software such as Microsoft Office

application server

ALL cellphones

are computers

The main paths of the Internet

are known collectively as the Internet backbone; which is a collection of large national and international networks.

Private-key encryption and public-key encryption

are the two basic types of encryption.

Logical Ports

are virtual communication gateways or paths that allow a computer to organize requests of information (webpage download/email route)

Flow Charts

are visual diagrams of a process including the decisions that need to be made along the way

Which of the following is NOT one of the basic functions of malware?

backdoor control of your computer

Incremental(Partial) Backup

backing only files that have changed or have been created since the last backup (saves time)

Which of the following is used to increase security on a client/server network?

bastion host

Windows Firewalldoes all of the following EXCEPT__________.

blocks spam

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses

A __________ is specifically designed to transfer data between collision domains.

bridge

Pop-ups

can be legitimate and increase the functionality of the originating site

Which of the following is an advantage of installing a client/server network in a business?

centralization of network security protection

When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers.

client/server

Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet.

cloud

Where to store backups

cloud, external drives, Network-attached storage (NAS) - drive connected to a network of computers instead of one

Encryption is used to

code your e-mail so only one person can decipher it

voip

communication services over public internet rather than over telephone network

The __________is often the only device on the network connected to the Internet.

communications server

In the client-server model, clients are phones or computers and servers are

computers hosting web pages. computers that are storehouses for files. computers with software allowing you to make purchases.

In the Sound Byte, we examined a program called Tickle where the programmer used the draw() routine to ______.

find the mouse position and move the text "tickle" by a random amount

Software designed to close logical ports in your computer is known as a(n)

firewall

What should you do if you spot unethical behavior at your workplace?

follow company procedures for reporting

Ergonomics is an important consideration

for all computing devices

referential integrity

for each value in foreign key of one table, there is a corresponding value in the primary key of the related table.

Processor

in a smartphone is not as fast or high-powered as a PC

binary large object (BLOB)

in databases, a type of object that holds extremely large chunks of data in binary form; this data is usually video clips, pictures, or audio clips.

relationship

in relational databases, the link between tables that defines how the data are related.

Data ________ ensures that the data contained in a database is accurate and reliable

integrity

All of the following are considered dedicated servers EXCEPT ____

internal servers

System

is a collection of pieces working together to achieve a common goal

DHTML

is a combination of technologies-HTML, cascading style sheets, and JavaScript.

System Repair

is a copy of files that you can use to boot your computer in case of Windows error

Trojan Horse

is a program that appears to be something useful or desirable, like a game or screen saver, but while it runs it does something in the background without your knowledge

Unethical behavior

is different from illegal behavior

Which of the following is NOT a major type of cybercrime reported to the IC3?

malware fraud

breaks information down into pieces that can take different paths

packet switching

A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.

passive

The easiest way to automate a task in Word is to __________.

perform the task while recording a macro

Examples of hacker threats to your computer include all of the following EXCEPT __________.

pharming

Which is NOT a tool hackers use to gain access to and take control of your computer?

phishing software

Geotaging

piece of data that attaches location information onto pictures. Uses Longitude and Latitude

Monitor screens are made up of millions of tiny dots known as

pixels

Which of the following classifications of viruses can change its own code to avoid detection?

polymorphic

The field of psychology that theorizes that happiness results from ethical living is known as

positive psychology

GPS

powerful navigation aid

When an OS processes tasks in a priority order, it is known as

preemtive multitasking

Transmission Control Protocol (TCP)

prepares data for transmission and provides for error checking and re-sending of lost data

User Datagram Protocol (UDP)

prepares data for transmission; lacks resending capabilities

The purpose of a token in a token ring network is to ____

prevent data collisions from occuring

Tokens are used in a token ring network to ________.

prevent data collisions from occurring

When only the two parties involved in sending a message have the code, this is called ____-key encryption

private

The _____ encryption, only the two parties involved in sending a message have the code to unlock the message

private-key

Before the decide which programming language to use or start writing code, programmers first develop a complete description of the task the program needs to accomplish, called the ____

problem statement

In VBA, a macro is called a __________.

procedure

Network Address Translation (NAT)

process to assign internal IP Addresses on the network

An interaction in Processing is the result of an action between the computer and the ______.

program

Backdoor program/rootkits

programs that allow hackers to gain access to your computer and take control without your knowledge

Providing adequate security on a corporate network involves all of the following except

proprietary software lockout

In the URL https://www.whitehouse.gov/blog, which part is considered the protocol?

protocol

A ____________ is designed to send information between two networks.

router

A hardware firewall is often built into a(n) __________.

router

A(n) ____ sends data between two networks

router

SMTP is

the protocol responsible for sending e-mail through the Internet.

Gibson Research Corp. grc.com

website that tests your computers vulnerability shieldsUP and Leaktest

When is it sufficient to use a list to organize data?

when the data is simple and can be organized in one table

method

The process of how a program converts inputs into the correct outputs.

Sector

Track is futher broken down into pie-shaoped wedges

one-to-one relationship

a database relationship in which one record in a data table has only one related record in another data table.

many-to-many relationship

a database relationship in which one record in a database table (A) can have many related records in another table (B), and any record in table B can have many related records in table A.

documentation

Description of the technical details of the software, how the code works, and how the user interacts with the program; in addition, all the necessary user documentation that will be distributed to the program's users.

Cat 6 cable

Designed to achieve data transfer rates that support a gigabit Ethernet Network

Multipartite

Designed to infect multiple file types in an effort to fool the antivirus software that is looking for it.

User Interface

Desktop, icons, and menus that let you communicate with your computer

ASC II Code

Developed as the standard for computers from different manufacturers to exchange data (1963)

Control Program for Microcomputers (CP/M)

Developed by Gary Kildall OS designed for INtel 8080 chip

New Network Scheme

Developed with multiple paths so if one communication path is destroyed, the rest of the network would still be able to communicate (1964)

Before you can work with macros in Word or Excel, the __________ tab must be available.

Developer

Affective Computing

Developing systems that can recognize and stimulate human emotions (ie MACH)

Nonvolatile storage

Devices for permanent storage of instructions and data when the computer is powered off

data-flow diagrams

Diagrams that trace all data in an information system from the point at which data enters the system to its final resting place (storage or output).

Multimedia Software

Digital image- and video-editing software, digital audio software, and other specialty software required to produce computer games, animations and movies

An extranet allows for the exchange of large amounts of business data in a standardized electronic format.

False

Bus topology networks are becoming the most common type of network due to its efficiency.

False

Each of the four numbers in a dotted decimal number in an IP address is referred to as a quartet.

False

HTML is a monogramming language

False

HTML tags cannot be nested within each other

False

In a bus topology, only the device for which a signal is intended can hear the sent data signal

False

In private-key encryption, two keys are created-one for coding and one for decoding.

False

Switches are used to route data between two different networks

False

The Internet Society pays for a large portion of the Internet's infrastructure and funds research and development for new technologies.

False

The main advantage of a ring topology is that the failure of one computer does not affect the entire network

False

The three main cable types used in business networks are twisted-pair, coaxial, and electromagnetic cable.

False

Apple II

Featured color monitor, sound, and game paddles Had 4 KB of RAM Operating System on ROM Optional Floppy Disk to load programs (1977)

Information Technology (IT)

Field of study focused on the management and processing of information and the automatic retrieval of information

In ____ generation languages, problems are presented as a series of facts or constraints instead of as a specific algorithm

Fifth

Accounting Software

Help small business owners manage their finances more efficiently by providing tools for tracking accounts recievale and accounts payable

Personal Information Manager (PIM) Software

Helps you manage e-mails, contacts, calenders and tasks all in one place (ie EverNote)

Privacy

Hiding something and not being disturbed by others

DDR4

High-Performance Video Graphics

System Unit

Holds all the physical parts of the computer together, including the computer's processor (the brains), its memory, and the many circuit boards that help the computer function

Power Supply

Housed inside the system unit, transforms the wall voltage to the voltages required by computer chips

Ergonomics

How a user sets up his or her computer and other equipment to minimize risk or injury or discomfort

Clock Speed

How quickly the processor can work

Difference Engine

Huge Steam-powered mechanical calculator that Babbage designed to print astromnomical tables

HTML stands for _____

Hypertext Markup Language

What does HTML stand for?

Hypertext Markup Language

Commodore PET

IBM First PC (1977) Popular in Europe

All IP addresses must be registered with the _____, which is responsible for allocating IP addresses to network adminstrators

ICANN

Which of the following is NOT a TCP/IP protocol?

ICANN

SMTP, DHCP, and FTP are TCP/IP protocols

ICANN is the Internet Corporation for Assigned Names and Numbers.

A(n) ______ is a development tool that helps programmers write, compile, and test their programs.

IDE

IM (Instant Messaging) vs Texting

IM: Way to communicate in real time over the internet, was primary means to chatting with friends in real time --> Person has to be online Texting: You can do over a period of time --> not needing automatic response or even being online b/c messages saves

197.169.73.63 is an example of a(n) _____

IP address

Unique identification number identifying each computer, service, or other internet connected device

IP address

Internet Corporation for Assigned Names and Numbers (ICANN)

IP addresses must be registered with the ICANN, which is responsible for allocating IP addresses to network administrators, just as the U.S. Postal Service is responsible for assigning zip codes to geographic areas.

The original IP addressing scheme created in the early 1980's is called ____

IPv4

hexadecimal notation

IPv6 uses 8 groups of 16-bit numbers, referred to as hexadecimal notation (hex for short).

Paging

If the data or instruction in the swap file are needed later, the OS swaps them back into active RAM and replaces them in then hard drive's swap file with less active data or instruction

inheritance

In object-oriented analysis, the ability of a new class to automatically pick up all the data and methods of an existing class and then extend and customize those to fit its specific needs.

reusability

In object-oriented analysis, the ability to reuse existing classes from one project for another project.

public key

In public-key encryption, the key for coding is generally distributed as a public key.

key pair

In public-key encryption, two keys, known as a key pair, are created.

public-key encryption

In public-key encryption, two keys, known as a key pair, are created. You use one key for coding and the other for decoding. The key for coding is generally distributed as a public key.

Smartphone Memory.

In smartphones, ROM is used to hold the OS. Other phone data is stored in separate internal memory chips. For memory needs beyond the built-in memory chips, some smartphones use removable SD flash cards.

ROM

In smartphones, the OS is stored in the...

if else

In the programming language C++, the binary decision asking, for example, whether you worked enough hours to qualify for overtime pay would use the keywords if else. At this point in the code, the program can follow one of two paths: If you indicated through your input that you worked fewer than or equal to eight hours, it takes one path; if not (else), it follows another.

for

In the programming language Visual Basic, programmers use the keywords For and Next to implement a loop. After the keyword For, an input or output item is given a starting value. Then the statements, or "sentences," in the body of the loop are executed. When the command Next is run, the program returns to the For statement and increments the value of the input or output item by 1.

Which of the following can record information you type, such as passwords and credit card information?

Keystroke logger

How much is a Byte?

Kilobyte (KB): 1,000 bytes Megabyte (MB): 1 million bytes Gigabyte (GB): 1 billion bytes Terabyte (TB): 1 trillion bytes Petabyte (PB): 1,000 terabytes

Malicious Websites

Known as a drive-by download

Which of the following is NOT an HTML section?

LINK

Beginners All-Purpose Symbolic Instruction Code (Basic)

Language that beginning programming student sound easily learn (Revolutionized software industry)

Botnet

Large group of software programs (robots/bots) that runs autonomously on zombie computers

Parallel Processing

Large network of computers, with each computer working on a portion of the same problem simultaneously (Divide Task)

Internet

Largest computer network in the world Develop in 1950 during the Cold War (1958)

First Generation

Last to use vacuum tubes to store data

4G

Latest service standard and offer the fastest data-accessed speeds over cell-phone networks

Tax Preparation Software

Let you prepare you state and federal tax on you own (ie Turbo Tax)

Multiuser Operating System (Network Operating System)

Lets more than user access the computer system at a time by handling and prioritizing request from multiple users

Drawing Software (Illustration Software)

Lets you create or edit 2-D, line based or original non-photographic drawings, animations and illustration (ie Adobe Illustrator)

Input Device

Lets you enter data (ie text, images and sound)

System Restore

Lets you roll your system back to a specific date when everything was working properly

Levels of Cache

Level 1: Built on CPU chip Level 2: Located on CPU or slightly further away on a separate chip Level 3: Right before data gets to RAM

Concurrent License

Limit the number of users accessing the software at any given time

Second Generation

Limited Transistors

An example of an open source OS is

Linux

Greyware

Most malware are intrusive, annoying or objectionable online programs that are downloaded to your computer when you install or use other online content such as a free program game or utility.

Mouse

Mouse: Input device used to enter user responses and commands Optical Mouse: Use an internal sensor or laser to detect the mouse's movement --> sensor sends signals to the computer, telling it where to move the pointer on the screen

Green Computing (Green IT)

Movement to encourage environmentally sustainable computing --> reduce overall carbon footprint of a company through strategic use of computing resources and environmentally friendly computing devices

Read/Write Head

Moves from outer edge of the spinning platter to the center, as frequently as 50 times per second, to retrieve (read) and record (write) the magnetic data to and from the hard drive platter

Streaming Media

Multimedia (audio and video) that is fed continuously fed to the browser to avoid waiting for the entire file to download completely before listening to or watching it

MIME stands for

Multipurpose internet mail extensions

UNIX

Multiuser, multitasking OS that is used as a netowrk OS, although it can be found on PCs

Breadcrumb Trail

Navigation aid that shows users the path they have taken to get to a web page or where the page is located within the website

wireless Internet service provider (or wireless ISP)

Needed to connect your smartphone to the Internet, just as you have an Internet service provider (ISP) for Internet access for your desktop or notebook computer.

What are the advantages of networking?

Networking enables one computer to send information to and receive information from another. A network enables the sharing of devices such as printers, scanners, fax machines, storage devices, and so on.

What was the first state to ban the use of a handheld phone while driving?

New York

Web 2.0

New collaborative, user created web, sometimes classified as social web, in which user is also a participant

Positive Psychology

New focus in field of psychology --> discover cause of happiness and applying them to everyday life

Which of the following characteristics of an email message should cause suspicion?

No Subject line

All-in-one computer

No System Unit b/c computer houses both the memory and processor (ie Apple iMac) --> Some come with monitor being touchscreen

Do database servers manage the network databases?

Not really. Database servers provide client computers with access to information stored in a database.

Word Size

Number of bits a computer can work on at a time

All data stored in computer is stored as

Numbers or bits

data

Numbers, words, pictures, or sounds that represent facts, figures, or ideas; the raw input that users have at the start of a job.

Smartphone use __________ display screens.

OLED

Disk Operating System (DOS)

OS that controlled the first Apple computers

reusability

Object-oriented analysis forces programmers to think in general terms about their problem, which tends to lead to more general and reusable solutions. An important aspect of object-oriented design is that it leads to reusability.

Unintentional Data Breaches

Occur when companies controlling data inadvertently allow it to be seen by unauthorized parties

Power Surge

Occur when electrical current is supplied in excess of normal voltage

Intentional Data Breaches

Occur when hackers break into digital systems to steal data

IPv4

Offers a fixed number of IP addresses.

Logical Port Blocking

Often configured to ignore requests that originate from the internet asking for access to certain ports.

short message service (SMS)

Often just called text messaging—is a technology that allows you to send short text messages (comprising up to 160 characters) over mobile networks.

documentation

Once testing is completed, but before the product is officially released, the work of documentation is still ahead. At this point, technical writers create internal documentation for the program that describes the development and technical details, how the code works, and how the user interacts with the program

After programmers finish coding, what do they do next?

Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler.

Thunderbolt Ports

One Thunderbolt port can allow to connect up to six different peripherals to you computer

binary decisions

One decision point that appears often in algorithms is like a "fork in the road" or a branch because it can be answered in one of only two ways: yes (true) or no (false).

Menu -Driven Interface

One in which you choose commands from menus displayed on the screen

Command-Drive Interface

One in which you enter to communicate with the computer system

Transmission Control Protocol(TCP)

One of the original two protocols developed for the Internet.

And how do I transfer files from a smartphone to my regular computer?

One way you can transfer your data from your smartphone to a computer is by using a USB cable.

And how do I transfer files from a smartphone to my regular computer?

One way you can transfer your data from your smartphone to a computer is by using a cloud storage service.

Two Primary types of System Software

Operating System Utility System

Windows

Operating environemnt that incorporstes a user-friendly, visual interface like the one that was first introduced with Apple's OS

Number System

Organized plan for representing a number

File Transfer Protocol (FTP)

Original design was to transfer files from a computer to a web server Today, often used when you have large files to upload or download

Projector

Output device for project images from you computing device onto a wall or viewing screen

Speakers

Output device for sound

Different types of (printers)

Output device that creates copies you can touch Nonimpact Printer: Inkjet printer sprays ink or uses laser beams to transfer marks onto paper Impact Printer: Tiny hammer-like keys that strike paper through an inked ribbon to make marks on the paper

All of the following are wireless technologies EXCEPT __________.

PDP-11

Which is NOT a common protocol used on the Internet?

PGP

public-key encryption package

PGP

Clock Speed

Pace measured in Gigahertz

How do packets travel through the Internet?

Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.

Element

Pair of tags and text between them.

Arithmetic Logic Unit (ALU)

Part of CPU designed to perform mathematical operations

web services

Part of the Microsoft .NET Framework, programs that a website uses to make information available to other websites.

Who are the founders of Microsoft?

Paul Allen Bill Gates

Stakeholders

People or entities who are affected by the operations of a business

Whistle-Blowers

People who report business to regulatory agencies for committing illegal acts, or who expose unethical (but still legal) acts committed by their employers by publicizing unethical behavir through various media outlets

CPU Usage

Percentage of time your CPU is working

Multitask

Perform more than one process at a time

Power-On Self-Test (POST)

Performs is to ensure that essential peripheral devices are attached and operational

Which of the following is a common language used to create CGI scripts?

Perl

Drive Bay

Permanent Storage device are located in your desktop or laptop computer in a space

network administrator

Person who maintains networks for businesses.

Classified Networks

Personal Area Network (PAN) Local Area Network (LAN) Home Area Network (HAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)

Apple I

Personal Computer and formation of Apple Company (1976)

Xerox

Photocopier manufacutreer designed own personal computer

Cloud Storage for Large Media Files:

Photos and videos tend to be large files. Cloud storage services like MediaFire and ADrive feature free accounts with large data capacity and good social media sharing tools.

Port

Place through which a peripheral device attached ti the computer so that data can be exchanged between it and the operating system

Bookmarks/Favorites

Places a marker of the site's URL in an easily retrievavle list in your browser's toolbar

decision points

Places where the program must choose from an array of different actions based on the value of its current inputs.

Platter

Plate

The Mac OS was the first commercially available OS to incorporate

Point and click technology

Optical Media

Portable strorage devices that use laser or light to read from, and even write to Cds, DVDs, or Blu-ray discs

What's on the motherboard?

Ports Memory (Ram) slots CPU sockets Expansion Slots Expansions Cards (Adapter Slot) - Circuit boards that provide additionally functionality Sound Card - Provides connection for speakers and microphone Video Card - Provides a connection for the monitor

If you forget to turn off your monitor when you aren't using it, which power scheme would be best to use?

Power Saver scheme

Binary Number System (Binary-2 number system)

Power of 2 --> On and Off

Database Software

Powerful application that let you store and organize data (ie Microsoft Access)

Word for MS-DOS --> Word Perfect

Precursor for Microsoft Word

Transmission Control Protocol

Prepares data for transmission and provides for error checking and resending of lost data.

Desktop

Primary working area

What manages all client-requested printing jobs for all printers on a network?

Print server

What web browser feature would be particularly useful when using public computers?

Privacy Browsing

System Evaluation

Process of looking at a computer's subsystem, what they do and how they perform to determine whether the computer system has the right hardware component to do what the user ultimately wants it to do

Data Mining

Process of searching huge amounts of data with the hope of finding a pattern (ie CVS tries to do with Coupons)

programming

Process of translating a task into a series of commands a computer will use to perform that task.

Assistive/Adaptive Technology

Products, devices, equipment, or software that are used to maintain, increase, or improve the functional capabilities of individuals with disabilities

PDLC stands for ______

Program development life cycle

Operating System (OS)

Program that controls how your computer system functions (ie. Manages Hardware --> provides a mean by which users can interact with the computer)

Course Management Software

Program that provodes traditional classroom tools (ie BlackBoard)

Compiler

Program that translate English instructions into Computer language

object-oriented analysis

Programmers first identify all of the categories of inputs that are part of the problem the program is trying to solve.

object

Programmers may need to create several different examples of a class. Each of these examples is an object.

comment

Programmers often insert a comment (or remark) into program code to explain the purpose of a section of code, to indicate the date they wrote the program, or to include other important information about the code so that fellow programmers can more easily understand and update it should the original programmer no longer be available.

remark

Programmers often insert a comment (or remark) into program code to explain the purpose of a section of code, to indicate the date they wrote the program, or to include other important information about the code so that fellow programmers can more easily understand and update it should the original programmer no longer be available.

visual programming language

Programming language that uses graphical blocks to represent control elements and variables.

Active Server Pages (ASP)

Programming language used to build websites with interactive capabilities; adapts an HTML page to the user's selections.

JavaServer Pages (JSP)

Programming language used to build websites with interactive capabilities; adapts the HTML page to the user's selections.

PHP (Hypertext Preprocessor)

Programming language used to build websites with interactive capabilities; adapts the HTML page to the user's selections.

programming language

Programming languages are (somewhat!) readable by humans but then are translated into patterns of 1s and 0s to be understood by the CPU.

Image-Editing Software

Programs for editing photos (ie Photoshop)

Productivity Suite

Programs that let you perform various tasks required everyday lfie

What are keystroke loggers?

Programs that record everything that is typed on a computer and stores it in a file to be retrieved later.

Electronic Communications Privacy Act (ECPA) 1986

Prohibits unauthorized monitoring of electronic communications interpreted by courts in favor of employers

Other Large Business Software

Project Management: Creates schedule charts to plan and track specific task and to coordinate resources Customer Relationship Management (CRM): Stores sales and clients contact information in one central database Enterprise Resource Planning (ERP): Controls many "back office" operations and processing functions (ie HR) E-Commerce: Facilities websites creations and hosting services, shopping cart setup, and credit-card processing services CAD Vertical Market

Two main types of software (ran on computer)

Proprietary (Commercial) Software: Software bought (Microsoft Office) Open Source Software: Free software that is available with few licensing and copyright restrictions

HTTP (Hypertext Transfer Protocol)

Protocol that allows files to be transferred from web server

Windows 10

Provides an interface optimized for touchscreen devices and is designed to run across all devices

File Management

Provides an organizational structure to make your computer more orgainzed and efficent

Hyperthreading

Provides quicker processing of information by enabling a new set of instruction to start executing before the previous set has finsihed

Hyperthreading

Provides quicker processing of information by enabling a new set of instructions to start executing before the previous set has finished.

What is the expression of the steps of an algorithm using English-like statements that focus on logic, not syntax?

Pseudocode

______ is a text-based approach to documenting an algorithm.

Pseudocode

Copyright Violation

Punishable by law Occurs when you use another person's material for your own personal economic benefit or when you take awy from the economic benefit of the orginator

Overclocking

Push hardware to perform faster

CPU Names

Qualcomm, Snapdragon, and Apple A7

The software holding area for print jobs is called a print ____

Queue

Which of these is located on the motherboard?

RAM

Ram vs Rom

RAM (Random Access Memory): Place in computer where programs and data that the computer is currently using, are stored --> deleted once turn off computer Volatile Storage: Temporary ROM (Read Only Memory): Holds all instruction the computer needs to start up when it's powered on --> won't get erased Nonvolatile Storage: Permanent

Smartphones store their operating system software in ________.

ROM

Email (Electronic Mail)

Ray Tomlinson Program to send email over the ARPANET and develop the "user@host" convention (1972) A writtent message sent or recieved over the Inernet still remains the most widely used form of communication on the Internet

Bio-metric Authentication device

Reads a unique personal characteristic such as fingerprint

Disk Defragmentation

Rearranges fragmented data so that related file pieces are unified

2013 IC3

Received 263,000 complaints related to internet crime

CPU Usage Graph

Records your CPU usage for the past minute

After deletion, your files are stored in the __________.

Recycle Bin

Which of the following is the best tool to use to fix the color of somebody's eyes in a digital photograph?

Red Eye

encryption

Refers to the process of coding your e-mail so that only the person with the key to the code (the intended recipient) can decode (or decipher) and read the message.

Digital video-editing software

Refine you videos (ie Apple Final Cut Pro)

Who created the Internet?

Robert Cailliau and Tim Bernes-Lee Basic architecture of the web and created the first web browser, software that lets you display and interact with text and other media (1991)

Network Navigation Devices

Router or a switch, faciliatate and control the flow of data through a network

What distinguishes a router from some of the other network components?

Routers make connections between networks like your home network and the Internet.

Satellite Broadband

Rural area or mountain where DSL, Cable and fiber optic is unaviavle or too expensive

store and forward

SMS delivers messages to the appropriate mobile device using ... technology

_________ is the protocol responsible for sending e-mail through the Internet.

SMTP

protocol responsible for sending e-mail along the internet to its destination

SMTP

The protocol used to send e-mail over the Internet is

SMTP.

The _____ protocol is used by commerce servers to protect information from being intercepted by hackers

SSL

Satellite Internet

Satilite dish which is places outside your hosue and connected to your computer with a coaxial cable

_______ means that more users can be added to a network easily without affecting the performance of the other network nodes.

Scalability

Windows Defender

Scans system for spyware or unwanted software

Difference between Tablet & Smartphone

Screen Size

The two main components of Windows Action Center are __________ and __________.

Security, Maintenance

machine language

See first-generation language (1GL).

assembly language

See second-generation language (2GL).

IP

Sends data between computers on the Internet.

Output Device

Sends processed data out of your computer in the form of text, pictures, sound or video

cloud server

Servers that are maintained by hosting companies and are connected to networks via the Internet.

System Software

Set of programs that enables your computer's hardware devices and application software to work together (ie. OS)

Application Software

Set of programs you use in a computer to help you carry out task (ie. Write Research Paper and Create Spreadsheet)

Redundant Array of Independent Disks (RAID)

Set strategies for using more than one drive in a system

Which of the following features makes Bluetooth different from other wireless technologies?

Short-distance wireless capabilities

Which of the following is NOT a cause of power surges and spikes?

Shutting down the computer incorrectly

What is SMTP?

Simple mail transfer protocol (SMTP) is the protocol responsible for sending e-mail messages from an e-mail client to an e-mail server.

Sleep Mode vs Hibernate

Sleep: All data is stored in RAM where its quickly accessible when you restart you computer (Short Term) Hibernate: Similar to sleep except that your data is stored on your hard drive instead of your RAM ad your computer is powered off (Long Term)

Cache Memory

Small block of memory located directly next to the CPU, acts as holding places for recently or frequently used instructions or data that the CPU access frequently

Dual Inline Memory Module

Small circuit board that hold several memory chips

Memory Modules (Memory Cards)

Small circuit boards that hold a series of RAM chip and fit into special slots on the motherboard (

memory modules or memory cards

Small circuit boards that hold a series of RAM chips and fit into special slots on the motherboard

Utility Program

Small program that eorforms many of the general housekeeping tasks fro your computer, such as system maintence and file compression

Packet

Small segment of data transmitted via a network.

Tracking Cookies

Small text files stored on your computer.

Microprocessors

Small, yet powerful chip that contains a central processing unit (CPU)

Clusters

Smallest segments within the sectors

System Restore Point

Snapshot of your entire system's setting is generate prior to certain event, such as installing or updating software, or automatically once a week if no other restore point were created in that time

Intelligent Personal Assistants

Software Agents respond to voice commands and then use you input, access the Internet, and location-aware service to perform various tasks (ie Siri and Cortana)

Plug and Play (PnP)

Software and hardware standard designed to facilitate the installation of new hardware in PCs by inlcuding in the OS the drivers these devices need in order to run

When a vendor hosts software on a website and you don't need to install the software on your device, this is known as

Software as a Service

device driver

Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed.

network operating system (NOS)

Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.

Network Operating System (NOS)

Software that handles the request for information, Internet Access, and the use of peripherials for the rest of the network node, providing the services necessary for the computers of the network to communicate

Malware

Software that has a malicious intent. Adware spyware and virus

Synchronization:

The process of updating your data so the files on your smartphone and computer are the same is called synchronizing.

peer-to-peer (P2P) sharing

The process of users transferring files between computers.

Objective C

The programming language most often used to program applications to run under OS X.

Which of the following statements about whole house surge protection is FALSE?

The protectors must be replaced every two years.

simple mail transfer protocol (SMTP)

The protocol responsible for sending e-mail along the Internet to its destination.

Hypertext Transfer Protocol(HTTP)

The protocol that allows files to be transferred from a web server so that you can see them on your computer by using a browser.

transmission media

The radio waves or the physical system (cable) that transports data on a network.

Event

The result of an action, such as a keystroke, mouse click, or signal to the printer, in the respective device to which the operating system responds

Virtual Memory

The rpocess of optimizing RAM storage by borrowing hard drive space

Software

The set of computer programs or instructions that tells the computer what to do and enables it to perform different task

problem statement

The starting point of programming work.

problem statement

The starting point of programming work; a clear description of what tasks the computer program must accomplish and how the program will execute those tasks and respond to unusual situations.

code editing

The step in which a programmer physically types the code into the computer.

code editing

The step of programming in which a programmer types the code to be executed.

What is Bluesnarfing, and how can you prevent it?

The unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. To prevent Bluesnarfing, set the Bluetooth device to hidden, invisible, or nondiscoverable mode.

What is Bluebugging, and how can you prevent it?

The unauthorized act of remotely accessing someone's phone. A hacker who successfully Bluebugs your phone can access your Internet connection, make calls from your phone number, listen in on your conversations, and change entries in your calendar and contact list. Turn off your device's Bluetooth capability when you are not using it.

digital convergence

The use of a single unifying device to handle media, Internet, entertainment, and telephony needs; expressed in the range of devices now on the market.

telephony

The use of equipment to provide voice communications over a distance.

telephony

The use of equipment to provide voice communications over a distance; has shifted from an analog science to a digital one.

root DNS server

There are 13 root DNS servers maintained throughout the Internet. Each root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.

What are some examples of common, everyday uses of networks?

There are many types of networks surrounding us including the Internet, automatic teller machines (ATMs), and local phone lines.

set of actions

There are three important features to look for in a loop: the second is a set of actions that will be performed.

initial value

There are three important features to look for in a loop; this is the first - a beginning point.

test condition

There are three important features to look for in a loop; this is the third -- a check to see whether the loop is completed.

Which of the following is NOT an advantage of star networks?

They are cheap to expand.

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks.

Which of the following statements about macros is FALSE?

They can perform a maximum of five steps.

proprietary system

This proprietary or private system model was the norm for Internet protocol.

Access Time

Time it takes a storage device to locate its stored data and make it available for processing is faster than optical drives

RAID 0

Time it takes to write file cuts in half --> spread data across two physical drives

Apple Backup

Time macing detects when external drive is connected

What is the purpose of a firewall?

To protect your computer from Internet intrusion.

American Standard Code for Information Interchange (ASCII)

To represent each letter or character as an 8-bit (1 byte) binary code

What do ring networks use to avoid data collisions?

Token method

Web 2.0

Tools and web-based services that emphasizes online collaboration and sharing among users

Audio-Editing Software

Tools that make egiting audio files as easy as editing text files

data-flow diagrams

Trace all data in an information system from the point at which data enters the system to its final resting place (storage or output).

Ethernet Port

Transfer data at speeds up to 10,000 Mbps

Hypertext Transfer Protocol (HTTP) and HTTP secure (HTTPS)

Transfers Hypertext Markup Language (HTML) data from servers to browsers; HTTPS is an encrypted protocol for secure transmissions

Replacement for Vacuum Tubes

Transistors: Electrical switches built out of layer of special type of material called semiconductor (controls electricity or act as an insulator) Integrated Circuits: Tiny regions of semiconductor material that supports a huge number of transistors

interpreter

Translates the source code into an intermediate form, line by line.

coding

Translating an algorithm into a programming language is the act of coding.

coding

Translating an algorithm into a programming language.

TCP/IP stands for

Transmission Control Protocol/Internet Protocol

Internet Backbone

Transmission lines with the fastest speeds

Which of the following enables hackers to take control of your PC from another computer?

Trojan Horse

A VPN uses the public Internet communications infrastructure to build a secure, private network among various locations.

True

An e-mail server usually routes all its traffic to and from the server through a communications server.

True

An optical carrier (OC) line is a high-speed fiber optic line that forms the backbone of the internet

True

Client/server networks are generally more secure than P2P networks

True

DHTML is a combination of technologies-HTML, cascading style sheets, and JavaScript.

True

Facial recognition and palm prints can be defined as biometric authentication devices.

True

HTML files have the .htm or .html file extension

True

HTML is controlled by the World Wide Web Consortium

True

IPv6 uses 128-bit addressing instead of 32-bit addressing.

True

In ring topology, a device grabs the token when it needs to send data.

True

In the ring topology, data flows around the circle in one direction only.

True

In tunneling, data packets are placed inside other data packets.

True

JavaScript is the most popular embedded scripting language.

True

MIME is the protocol that supports sending files as e-mail attachments

True

More personnel are usually required to maintain business networks than stand-alone computers.

True

Most home networks use unshielded twisted-pair cable that does not have foil shielding

True

Most modern operating systems include some type of NOS functionality

True

Network topology refers to the physical or logical arrangement of computers, transmission media, and other network components.

True

The W3C is a consortium of organizations that sets standards and develops protocols for the web.

True

The text between <B> and </B> will appear on a web page in bold

True

Your internet service provider has a default domain name server to translate a URL into an IP address

True

shielded twisted-pair (STP)cable

Twisted-pair cable that contains a layer of foil shielded to reduce interference.

Client/Server Network

Type of network that uses servers to deliever services to computer and that requesting them (clients)

Who built and operates the Global Positioning System?

U.S. Department of Defense

Which of the following provides the best protection when running a mission-critical application?

UPS

What was the first state to ban texting while driving?

Washington

analog

Waves that illustrate the loudness of a sound or the brightness of the colors in an image at a given moment in time.

Netscape

Web Browser that closed in 1998 after Microsoft became too strong

Wiki

Web application that allows users to add, remove or edit its content (ie Google Drive and Wikipedia)

Where are your files stored when you use cloud storage?

Your files are stored by a storage provider on the Internet.

________ can be used to launch denial-of-service attacks.

Zombies

Smartphones use

a CPU and Interface so powerful that they can take on many of the same tasks as much more expensive computers: Video conferencing, recording and editing HD video, and broadcasting live-streaming video.

internet was created to provide

a and b (a common communication means for all computers, a secure form of communications.)

database

a collection of related data that can be easily stored, sorted, organized, and queried.

record

a collection of related fields in a database.

Core

a complete processing section from a CPU embedded into on physical chip

numeric check

a data validation routine that confirms that only numbers are entered in a database field.

Most smartphones come with a standard collection of software that includes all of the following EXCEPT:

a database

text field

a database field that can hold any combination of alphanumeric data (letters or numbers) and is most often uses to hold text.

join query

a database query that links (or joins) two database tables using a common field in both tables and extracts the relevant data from each.

one-to-many relationship

a database relationship in which one record in a data table can have many related records in another data table.

relation

a database table that contains related data.

relational database

a database that organizes data in table format by logically grouping similar data into relations (or tables) that contain related data.

multidimensional database

a database that stores data in multiple dimensions and is organized in a cube format.

object-oriented database

a databse that stores data in objects, not in tables.

Processing is available to download from the processing.org website for _______.

a donation

date field

a field in a database that holds date data such as birthdays, due dates, and so on.

object field

a field in a database that holds objects such as pictures, video clips, or entire documents.

hyperlink field

a field in a database that stores hyperlinks to Web pages.

numeric field

a field in a database that stores numbers.

input form

a form that provides a view of the data fields to be filled in a database, with approporate labels to assiat database users in populating the database.

Bluetooth is named after __________.

a king who unified two countries

query language

a language used to retrieve and display records. A query language consits of its own vocabulary and sentence structure, used to frame the requests.

data warehouse

a large-scale electronic repository of data that contains and organizes in one place all the data related to an organization.

One typical characteristic depicted in a day in the life of a technician would be __________.

a lot of face-to-face interaction with people

analog to digital converter

a microphone feeds the sound waves into a chip inside the recording device

computational field (computed field)

a numeric field in a database that is filled as the result of a computation.

completeness check

a process that ensures that all databse fields defined as "required" have data entered into them.

Spooler

a program that helps coordinate all print jobs currently being sent to the printer indicates the print is available

object query language (OQL)

a query language that is used to extract information from an object-oriented database.

select query

a query that displays a subset of data from a table based on the criteria the user specifies.

detail report

a report generated with data from a database that shows the individual transactions that occurred during a cetain time period.

exception report

a report that shows conditions that are unusual or that need attention by users of a system.

summary report

a report that summairzes data in some fashion (such as a total of the day's concession sales at an amusement park). Also known as a summary data report.

validation rule

a rule that is set up in a database to alert the user to possible wrong entries.

Cellular Network

a set of cells make up a cellular network. Each cell is a geographic area centered on a base transceiver station.

knowledge-based system

a support system that provides additional intelligence that supplements the user's own intellect and makes a decision support system (DSS) more effective.

office support system (OSS)

a system (such as Microsoft Office) designed to assist employees in accomplishing their day-to-day tasks and to improve communications.

expert system

a system designed to replicate the decision-making processes of human experts to solve specific problems.

GPS technology uses __________.

a system of satellites

natural language processing (NLP) system

a system that enables users to communicate with computer systems using a natural spoken or written language as opposed to using computer programming languages.

information system

a system that includes data, people, procedures, hardware, and software and that is used to gather and analyze information.

management information system (MIS)

a system that provides timely and accurate information that enables managers to make critical business decisionsl.

memo field

a text field in a database that is used to hold long pieces of text.

data staging

a three-step process: extracting data from source databases, transforming (reformatting) the data, and storing the data in a data warehouse.

range check

a type of data validation used in databases to ensure that a value entered falls within a specified range (such as requiring a person's age to fall in a range of between 1 and 120).

fuzzy logic

a type of logic that allows the interjection of experiential learning into an equation by considering probabilities.

model manamgement system

a type of software that assists in building management models in decision support systems (DSSs).

database management system (DBMS)

a type of specially designed application software (such as Oracle or Microsoft Access) that interacts with the user, other applications, and the databse to capture and analyze data.

digital convergence

ability to view the same multimedia content from different types of devices. (interaction across multiple devices)

File History

access system repair backup and system restore by clicking recovery link

Star topology is considered a(n) __________ topology.

active

A(n) ____ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.

algorithm

A(n) _____ is a set of specific, sequential steps that describe in natural language exactly what a computer program must do to complete its task

algorithm

Which of the following describes an IP address?

all of the ablove (dotted quad, identifies website, identifies computers connected to internet)

data inconsistency

any difference in data in lists caused when data exists in multiple lists and not all lists are updated when a piece of data changes.

field constraint

any property that must be satisfied for an entry to be accpeted into the database field.

external data source

any source not owned by the company that owns a decision support system, such as customer demographic data purchased from third parties.

Creating web pages with HTML requires _____

any text editor such as Microsoft Notepad

OS X is the operating system developed by ________

apple

To ensure only authorized users are logging onto a network, which server would a client/server network include?

authentication

To manage authorized connections to the internal network, which server would a client/server network include?

authentication

Keeps track of user logins to the network and which services are available to each user

authentication server

Correctly entering the user ID and password on your college network is an example of

authentication.

A Trojan horse is an example of a(n) __________ program.

backdoor

A(n) ____ transfers data between collision domains

bridge

enterprise resource planning (ERP) system

broad-based software system that integrates multiple data sources and ties together the various processes of an enterprise to enable information to flow more smoothly.

Connecting computers on a single line is called a(n) ____ topology

bus

In a ____ topology, all computers are connected in a line on a single cable run

bus

In a(n) ____________ topology, all computers are connected in sequence on a single cable.

bus

Packet switching sends information between two points

by breaking it into small chunks and sending the chunks across different routes.

Computer help desks often prioritize problems based on __________.

by importance

the help desk database are ranked

by importance

Mobile Switching Center

ca is passed from station central location

Polymorphic

changes its own code or rewrites itself to avoid detection. Infects .exe files

analog to digital converter chip

changes your voice's sound waves into digital signals

Data captured from websites as users navigate through a website is called?

clickstream data

A computer connected to the Internet that asks for data is a(n) ________

client

A(n) _____ server handles all messaging between a network and other networks, including internet connectivity.

communications

alphabetic check

confirms that only textual characters are entered in a database field.

Pairing is the process of __________.

connecting Bluetooth devices to one another

The default DNS server

contacts one of the root DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain. Your ISP's default DNS server receives the information from the master DNS server. It then stores that information for further reference and passes it on to the ISP web server as well as communicates the appropriate IP address to your computer.

Closing tags differ from opening tags in that they include a(n) __________ at the beginning of the tag.

forward slash (/)

data centralization

having all data in one central location (usually a database). Data centralization helps ensure data integrity by requiring data to be updated only in one place if the data changes.

Firewalls __________.

help keep hackers from targeting your computer

With very few commands in Processing, you can create intricate pieces of art that may include all of the following EXCEPT:

holograms

A cascading style sheet is a list of rules that defines which of the following?

how to display HTML elements

file extension

htm

A good website for learning about HTML code is ____

htmlgoodies.earthweb.com

A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n)

image backup

table (file)

in database terminology, a group of related records. Also called a file.

Information system

includes data, people, procedures, hardware, and software that help in planning and decision making

clickstream data

information captured about each click that users make as they navigate a Web site.

The collection of large national and international network providers used to establish the internet is called the ____

internet backbone

Program specification

is a clear statement of the goals and objectives of the project

Open Systems Interconnection (OSI)

A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.

system development life cycle(SDLC)

A process used to develop information systems; it consists of the following six steps: problem and opportunity identification, analysis, design, development, testing and installation, and maintenance and evaluation.

Basic Input/Basic System (BIOS)

A program that manages the exchange of data between the OS and all the input and output devices attached to the system

client-side program

A program that runs on the client computer and that requires no interaction with a web server.

compiler

A program that understands both the syntax of the programming language and the exact structure of the CPU and its machine language.

compiler

A program that understands both the syntax of the programming language and the exact structure of the central processing unit and its machine language.

C

A programming language originally developed for system programmers.

HTML embedded scripting language

A programming language that tucks programming code directly within the HTML of a web page; the most popular example is JavaScript.

Visual Basic (VB)

A programming language used to build a wide range of Windows applications.

C++

A programming language; takes C to an object-oriented level.

octet

A reference to each of the four numbers in a dotted decimal number internet protocol address, so called because each number would have eight numerals in binary form.

What is a repeater?

A repeater connects multiple Ethernet segments. Each signal on a segment is listened to by the device and then repeated by the repeater. This is used to increase the diameter of a network.

What is a router?

A router is an advanced networking component that can divide a single network into two logically separate networks.

codec

A rule, implemented in either software or hardware, which squeezes a given amount of audio and video information into less space.

JavaScript

A scripting language that's often used to add interactivity to web pages; often used for creating Dynamic HTML effects.

loop

A second decision point that often appears in algorithms is a repeating loop. In a loop, a question is asked, and if the answer is yes, a set of actions is performed.

Internet cache

A section of the hard drive that stores information that may be needed again, such as Internet protocol addresses and frequently accessed web pages.

statement

A sentence in a code.

Hypertext Markup Language (HTML)

A series of tags that define how elements on a website should be displayed in a browser.

communications server

A server that handles all communications between the network and other networks, including managing Internet connectivity.

cloud server

A server that is maintained by a hosting company and that is connected to networks via the Internet.

authentication server

A server that keeps track of who is logging on to the network and which services on the network are available to each user.

authentication server

A server that keeps track of who's logging on to the network and which services on the network are available to each user.

domain name system (DNS) server

A server that maintains a database of domain names and converts domain names to Internet protocol addresses.

print server

A server that manages all client requested printing jobs for all printers on a network, which helps client computers to complete more productive work by relieving them of printing duties.

file server

A server that stores and manages files for network users or that acts as a storehouse for files that users can download.

file server

A server that stores and manages files for network users.

dedicated server

A server used to fulfill one specific function, such as handling e-mail.

e-mail server

A server whose sole function is to process and deliver incoming and outgoing e-mail.

e-mail server

A server with the sole function to process and deliver incoming and outgoing e-mail.

multimedia message service (MMS)

A service that allows users to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.

Cloud storage

A service that provides storage for data files on the Internet (the "cloud") so as to make files easy accessible on any device connected to the Internet.

Near Field Communication (NFC)

A set of communication protocols that enable devices to communicate with each other when they are held in close proximity. NFC is commonly used for mobile payment.

Personal Ethics

A set of formal or informal ethical principles you use to make decisions in your life

Search Engines

A set of programs that search the web for keywords and then returns a list for the sites on which the keywords are found

protocol

A set of rules for exchanging communications.

computer protocol

A set of rules for exchanging electronic information.

Surround-Sound System

A set of speakers and audio processing that envelops the listener with a 360 degree field of sound

algorithm

A set of specific, sequential steps that describe exactly what the computer program must do to complete the required work.

algorithm

A set of specific, sequential steps that describe in natural language exactly what the computer program must do to complete its task.

scripting language

A simple programming language that's limited to performing a set of specialized tasks.

copyleft

A simplified licensing scheme that enables copyright holders to grant certain rights to a work while retaining other rights.

Coaxial Cable

A single copper cable wire surrounded by layers of plastic insulation, metal sheathing and a plastic jacket; used mainly in cable television and cable Internet service

coaxial cable

A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.

beta version

A version of the software that's still under development. Many beta versions are available for a limited trial period and are used to help the developers correct any errors before they launch the software on the market.

electronic ink (E ink)

A very crisp, sharp grayscale representation of text achieved by using millions of microcapsules with white and black particles in a clear fluid.

syntax error

A violation of the strict set of rules that define the programming language.

Internet exchange point (IXP)

A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISPs connect.

What are web servers?

A web server is used to host a website so it will be available through the Internet.

Argumentative Reality (AR) vs Virtual Reality (VR)

AR: A combination of our normal sense of the objects around us with an overlay of information displayed VR: Creates an artificial environment that is immersive and interactive

Backward Compatibility

Ability of current devices to use earlier standards in addition to the current standard

What are the maximum voltages handled by outlet surge protectors and surge arrestors?

About 6,000 volts for an outlet protector and about 20,000 volts for an arrestor.

Vacuum Tubes

Acts as switched by allowing or blocking the flow of electrical current

Throughput

Actual speed of data transfer that is achieved

Once debugging is done, can the created software program be released?

Actually, after debugging, the last step is to test and document the program.

Once I've defined my problem statement, can I start coding?

Actually, after defining the problem statement, the next step in a programming project is for programmers to translate the programs into an algorithm.

What happens after programmers create an algorithm?

After programmers create an algorithm, they select a programming language and translate the algorithm into that language.

GA (general availability)

After the RTM is issued, the product is in GA (or general availability) and can be purchased by the public.

Software License (End User License Agreement (EULA))

Agreement between you (user) and software company

Which of the following statements about pop-ups is FALSE?

All pop-ups are annoying and useless.

statements

All programming languages have a formal syntax that programmers must follow when creating code statements, which are sentences in a code.

RAID 1

All the data written in one drive is instantly mirrored and written in second drive

Video Memory

All video systems include their own RAM

Other types of speciality printers

All-in-one: Combines function or printer, scanner, copier, and fax into one machine A large format printer: Generates oversize images such as professional graphics, high resolution photographs, banners, posters, and infographics that require more sophisticated color detail (12 different inks) Thermal Printer: Melting wax-based ink onto ordinary paper or by burning dots onto specially coated paper

Voice Recognition Software

Allows you to control your computing devices by speaking into the device's mic instead of using a keyboard or mouse

Simulations Programs

Allows you to experience or control the software as if it were an actual event

Virtual Desktop

Allows you to organize groups of windows into differnt displays

assembly language

Also known as an assembly language. Assembly languages allow programmers to write their programs using a set of short, English-like commands that speak directly to the CPU and give the programmer direct control of hardware resources.

second-generation language (2GL)

Also known as an assembly language. Assembly languages allow programmers to write their programs using a set of short, English-like commands that speak directly to the CPU and give the programmer direct control of hardware resources.

What is an IP address and where I can find the IP address for my computer?

An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."

IPv6

An IP addressing scheme developed by the IETF to make IP addresses longer.

Internet Protocol version 6 (IPv6)

An IP addressing scheme developed by the Internet Engineering Task Force (IETF) to make IP addresses longer, thereby providing more available IP addresses. IPv6 uses 8 groups of 16-bit numbers, referred to as hexadecimal notation (hex for short).

wireless Internet service provider (wireless ISP)

An ISP that provides service to wireless devices such as PDA/smartphones.

wireless Internet service provider (wireless ISP)

An ISP that provides service to wireless devices such as smartphones.

data plan

An Internet connectivity plan or text messaging plan.

syntax

An agreed-on set of rules defining how a language must be structured.

syntax

An agreed-upon set of rules defining how a language must be structured.

Which step in the program development cycle involves designing a set of steps to solve a problem?

An algorithm

What are authentication servers?

Authentication servers keep track of who is logging on to the network.

File History Utility

Automatically creates duplicated of your libraries, desktop, contacts, and favorites and copy it to another storage device such as external hard drive

Hollerith Tabulating Machine

Automatically read data that had been punched onto small punch cards, speeding up the tabulation process Develop by Herman Hollerith (1890)

Human Motivation

Autonomy: Freedom to work without constant direction and control Mastery: Feeling of confidence and excitement from seeing your own skills progress Purpose: Understanding that you are working fro something larger than yourself

To prevent work from being lost during a power failure, make sure your Office applications are configured to use __________.

Autosave

Which of the following HTML sections contains the text and graphics that are displayed in the browser window?

BODY

Blog vs Video Blog

Blog: Personal Log or Journal posted on the Web Vlog: Blog that uses video as the primary content Splog: Artifically fake blogs sites filled with fake articles or stolen text

All of the following are potential sources of surges EXCEPT __________.

Bluetooth connection

Which of the following statements about Bluetooth is FALSE?

Bluetooth has high power consumption.

section in an HTML document that displays text and graphics in a browser

Body

Tagging/Social Bookmarking

Bookmarking your favorite websites, but instead if saving it t your browser for only you to see, you can share it with others

White-Hat (ethical) Hacker

Breaks into systems for non malicious reasons (check vulnerabilities)

Black-Hat Hacker

Breaks into systems to destroy information or illegal gain

Webcast

Broadcast of audio or video content over the Internet

Internet Explorer

Browser that intergrated web functionalut into Microsoft Office application

Desktop Publishing Software (DTP)

Business requires need for publication --> Allows professionals to design books and other publication that require complex layouts

Three types of (E-Commerce)

Business-to-Consumers (B2C): Transaction between business and consumers Business-to-Business (B2B): Transaction between business Consumer-to-Consumer (C2C): Transaction between consumers

How can you tell that a macro is no longer recording?

By the red light in the status bar.

Root Directory

C: drive is the top of the filling structure of your

Which type of software is used to make 3-D models

CAD

Two of the most popular methods of designing programs that execute on a server and give a web page more sophisticated capabilities are ASP.NET and ____________.

CGI

Core

CPU contains the parts of the CPU requried for processing

Smartphones have...

CPU, memory, input/output, its own OS, its own app software.

data collision avoidance method

CSMA/CD

twisted-pair cable

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).

Twisted-pair Cable

Cables made of copper wires that are twisted tofether are each other and are surrounded by a plastic jacket (ie Traditonal Home Phone wire)

T line

Carries digital data over twisted-pair wires.

Task Manager

Check on the program or to exit the nonresponsive program

Pinning

Choose which application are visible on the Start menu

Forms a dedicated connection between two communicating parties

Circuit switching

How would you reply to an email message you've received that has multiple recipients, all of whom you would like to see your reply?

Click Reply All

If you want to get rid of only files that have been in the Recycle Bin for a long time you should open the Recycle Bin, choose View, Details, and then what?

Click the Date Deleted header to put the objects in order of date. Select all the objects deleted prior to a certain date. Press or click Delete. Click Yes.

Start Menu

Clicking Windows icon (or Start Button) on the left corner of the screen or by pressing the Windows key on the keyboard

Difference in CPU

Clock Speed Multiple Cores Amount Cache Memory

Cloud Storage:

Cloud storage refers to services, like Dropbox, that store your files on the Internet (in the "cloud") instead of storing them only on local devices. Storing your data in the cloud allows you to access it fromalmost any computing device that is connected to the Internet.

Cold Boot vs Warm Boot

Cold Boot: Powering computer from a computer turned off state, such as when you start you computer in the morning Warm Boot: Restarting system while it's powered

Instruction Set

Collection of commands that a specific CPU can execute

Folder

Collection of files

File

Collection of program instructions or data that is stored and treated as a single unit

Crisis-Mapping Tool

Collects information from different social media and then maps them, instantly making the information publicly available (ie Ushahidi)

Microsoft Account

Combination of an email address and a password

Solid State Hybrid Drive (SSDH)

Combination of both a mechinalal hard drive and SSD into a single device --> offer a very small Storage Space, but huge impact on boot time

Cognitive Surplus

Combination of leisure time and the tools to be creative

Dynamic HTML

Combination of technologies used to create lively and interactive websites.

hybrid topology

Combining multiple topologies into one network.

Unshielded Twisted-Pair (UTP) cable

Composed of 4 pairs of wires that are twisted around each other to reduce electrical interference

source code

Comprises the instructions programmers have written in the higher-level language, and translate the source code directly into machine language—the binary patterns that will execute commands on the CPU.

Virus

Computer program that attaches itself to another computer program (host) and attempts to spread to other computers

Client

Computer that ask for data

Havard Mark I

Computer used by the US Navy for ballisitic nd gunnery calculations --> could ass, subtractc, multiply and divide Howard Aiken and Grace Hopper (1944)

Fourth-Generation Computers

Computer with Microprocessors

Alto

Computer with Word Processor, based on the What you see is what you get principle, that integrated a file management system with directories and folders

Third-Generation

Computer with early integrated-circuit

Hard Disk Drive (HDD)

Computer's primary device for permanent storage of software and documents (Nonvolatile)

When my friend connects to my computer, how is data transferred?

Computers communicate efficiently using the communication methodology called packet switching.

But how do computers get the IP address from a domain name?

Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.

commerce server

Computers that host software that enables users to buy goods and services over the web.

Copyleft

Concept of redistrubting modifies open source software under the same terms as the original software

Mobile Broadband

Connect your to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access

Piggybacking

Connecting to a wireless network without the owners permission

USB Port

Connects input and output devices to the computer

Front side bus (FSB)

Connects the processor CPU in your computer to the system memory

Crowdsourcing

Consumers checking in with the voice of the crowd before making a purchase

Registry

Contins all the different configuaration (settings) used by the OS and by other application

CPU composed of two units

Control Unit: Coordinates the activities of all the other computer components Arithmetic Logic Unit (ALU): Responsible for performing all the arethemitic calculation

analog-to-digital converter chip

Converts analog signals into digital signals.

analog-to-digital converter chip

Converts your voice's sound waves into digital signals.

Full Installation

Copies all the most commonly used files and programs from the distribution disc to your computer's hard drive

Backups

Copies of files that you can use to replace the originals if they're lost or damaged

Shielded twisted-pair (STP)

Copper wire cabling with a foil shielding to reduce interference.

Presentation Software

Create a slideshow (ie Microsoft Powerpoint)

Word Processing Software

Create and edit documents (ie Microsoft Word)

Computer-Aided Design (CAD)

Create automated designs, technical drawings, and 3-D model visualization

Which tool would you use if you wanted to trim a half-inch from the left side of a digital photograph?

Crop

Grey-Hat Hacker

Cross between black/white illegally break into systems to flaunt to admin or to sell services to repair

acts like an IP address phone book for computers

DNS server

Users with __________ are more susceptible to the dangers from the Internet.

DSL and cable modems

VisiCalc

Dan Bricklin and Bob Frankston (1978) First Spreadsheet Program (1)

Tracks

Data is recorded on hard discs in concentric circle

Which of the following statements about ring topology is TRUE?

Data only flows in one direction

Packets

Data sent through a network in bundles

information

Data that has been organized or presented in a meaningful fashion; the result, or output that users require at the end of a job.

Packets

Data travels in pieces identified by IP to identify computers. Reached they are reassembled into cohesive messages

Data vs Information

Data: Representation of a fact, a figure or idea (Ex. Number, Words, Picture or even Sound) Information: Data that has been organized or presented in a meaningful fashion

Which step in the program development cycle is the process of detecting errors in a program?

Debugging

Custom Installation

Decide the features you want to be installed on your hard drive --> save space

What are decision points?

Decision points are points at which the program must choose from different actions, based on the value of its current inputs.

Not necessary to do before installing beta software

Defragging the hard drive

Live Bookmarks

Deliever contents updates to you as soon as they become available using RSS, the same technology that updates blogs and podcats

Which of the following enables hackers to use your computer to launch attacks against other sites?

Denial-of-service (DOS) attack agent

data types

Describe the kind of data that is being stored at the memory location.

Moore's Law

Describes the pace at which centeral processing units (CPUs) improvement

Virus Signature

is a portion of the virus code that unique to a particular computer virus. Software scans files for these signatures when they're opened/executed and identifies infected files and the type of virus infecting them.

TCP/IP

is a suite of protocols used to route packets over the Internet, not encrypt files. The suite is named after the original two protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP). The suite actually comprises many protocols like user datagram protocol (UDP), file transfer protocol (FTP), Telnet, hypertext transfer protocol (HTTP), secure HTTP (S-HTTP), and simple mail transfer protocol (SMTP).

The ranking of network problems by importance is usually determined by the ________.

number of affected users

The ranking of network problems by importance is usually determined by ____

number of users affected

NOS software is needed

on all computers in a client/server network.

In private-key encryption

only the two parties involved in sending the message (not the server) have the code. This can be a simple shift code where letters of the alphabet are shifted to a new position. The main problem with private-key encryption is key security. If someone steals a copy of the code, the code is broken.

Apple's OS X and Microsoft Windows are examples of ________ software.

operating system

Which of the following is NOT an output device?

optical mouse

Spam Filter

option you can select in your email account that places known or suspected spam into folder

The communications methodology that computers use to transfer data is called _____

packet switching

Packet Analyzer (Sniffer)

program deployed that looks or sniffs each packet through the internet

To complete pairing a headset to your cell phone, you enter a passkey, which is __________.

provided by the headset manufacturer

The two basic types of encryption are private- and ____________ key encryption.

public-

In ____ encryption, a key pair is created, where one key is for coding and the other is for decoding

public-key

_____ encryption is the most commonly used encryption on the internet

public-key

The Processing IDE provides the ability to do all of the following EXCEPT ________.

publish

To remain current with fixes to problems, the Sound Byte suggests that technicians should do all of the following EXCEPT ________.

pursue an advanced degree

Bluetooth uses __________ waves to transmit data signals over short distances.

radio

At a minimum, all data packets must contain the _____

recipient's address, sender's address, reassembling instructions, and data.

a long string of numbers

recorded sound waves are stored in CD/DVD in the format of signals represented as...

Each of the four numbers in a dotted decimal number in an IP address is

referred to as an octet.

Each of these is a basic type of a touch screen, EXCEPT

reflective

Which system of ethics states there is no universal moral truth?

relativism

A brute force attack is an attempt to access an account by:

repeatedly trying different passwords.

On client/server networks, bridges

route data between two collision domains on a single network.

An example of a network navigation device is a __________.

router

A virus can infect your system through all of the following, EXCEPT ________.

saving files to the cloud

Why are P2P networks not usually installed in businesses?

security is stronger on client/server networks

Updates that you can download to fix possible security issues are called __________.

security patches

MIME is a protocol that's used when you're

sending an e-mail that has a file attached.

Internet Protocol (IP)

sends data between computers on the internet

You can combine Arduino with _______ and motors so that when the microcontroller receives input, it makes something happen with the motors.

sensors

The add-on boards which connect to you Arduino and give it additional functionality such as a touch screen are ______.

shields

data mart

small slices of a data warehouse.

Adware

software that displays sponsored ads in a section of your browser window or pop-up

Firewall

software/hardware designed to protect computers from hackers. Named after housing construction feature that slows fire from house to house. Also blocks logical ports and keeps computer network address secure

Disadvantages of VoIP

some people regard sound quality and reliability issues as VoIP primary disadvantages using at home loss of service is power lost security risks

A macro name can contain any of the following characters EXCEPT __________.

spaces

All of the following are navigation devices to move data around or between networks EXCEPT _____

spans

digital signal processor

specialized chip included in the cell phone to handle compression work

In a ____________ network, failure of one computer does not affect other computers on the network.

star

In the ____ topology, devices are connected together through a central switch.

star

Which type of network topology is most popular?

star

manually assigned IP address

static IP

An IP address that does not change and is usually assigned manually by a network administrator is called a ____

static address

IP address for a computer does not change

static addressing

SMS

store-and-forward technology

HTML5

supports powerful multimedia effects.

All of the following are network topologies EXCEPT ____

switch

directs signals to the intended device

switch

____ are called smart hubs, because the retransmit signals only to the devices that need to receive them

switches

________ software helps run the computer and coordinates instructions between other software and the hardware devices

system

which of the following is not considered an accessibility utility?

system restore

Which of the following is NOT considered metadata?

table name

Each element in HTML documents are marked with ____

tags

When using a bus topology, to prevent signals from bouncing back to computers that have already received the signal, a __________ is used.

terminator

Which of the following describes copyleft?

terms enabling redistributing open source software

The final step in the PDLC is ______

testing and documentation

After creating a macro, you can use it by selecting the macro name and then clicking __________.

the Run button in the Macros dialog box

The information in a data packet includes

the To address, From address, data, and reassembly instructions

default value

the calue a databse will use for a field unless the user enters another value.

In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.

the help desk problem database

online transaction processing (OLTP)

the immediate processing of user requests or transactions.

field size

the maximum number of characters (or numbers) that a filed in a databse can contain.

structured query language (SQL)

the most popular database query language today.

JavaScript is

the most popular embedded scripting language.

foreign key

the primary key of another database table that is included for purposes of establishing relationships with another table.

batch processing

the process of accumulating transaction data until a certain point is reached, then processing those transactions all at once.

consistency check

the process of comparing the value of data in a databse field against established parameters to determine whether the value is reasonable.

validation

the process of ensuring that data entered into a database is correct (or at least reasonable) and complete.

data integrity

the process of ensuring that the data contained in a databse is accurate and reliable.

sort

the process of organizing a database into a particular order.

export

the process of putting data into an electronic file in a format that another application can understand.

nomalization

the process of recording data only once in a database to reduce data redundancy.

query

the process of requesting information form a database.

real-time processing

the process of updating a database (or information system) immediately as changes are made.

Cascading style sheets allow you to quickly change

the rules for applying formatting to an HTML document.

A network technician can expect each of the following EXCEPT ____

the same challenges every day

artificial intelligence (AI)

the science that attempts to produce computers that display the same type of reasoning and intelligence that humans do.

Machine Language

the series of steps a central processing unit goes through when it performs a program instruction

Seek Time

the time it takes for the read/write heads to move over the surface of the disk, moving to the correct track

primary key (key filed)

the unique field that each database record in a table must have.

relational algebra

the use of English-like expressions that have variables and operations, much like algebraic equations.

Makers are people who want to build ______.

their own solutions to problems

When packets reach their destination

they are reassembled by the receiving computer.

When packets reach their destination:

they are reassembled by the receiving computer.

special data packet

token

The different array of computers, peripherals, and media is called network _____

topology

Data-flow diagrams

trace all data in an information system from the point at which data enters the system to its final resting place (storage or output)

Which invention replaced vacuum tubes in computers?

transistor

Which components are a characteristic of second-generation computers?

transistors

To qualify as a power spike, the increase in the normal flow of electricity must last __________ nanoseconds or less.

two

In public-key encryption

two keys are created-one for coding and one for decoding.

The text between <U> and </U> will be ______ when displayed on a web page

underlined

UPS stands for __________.

uninterruptible power supply

A quick way to deploy software to a large number of computers is to __________.

use "ghosting" software to copy the image of one computer to another

Ethernet Network

uses Ethernet protocol as the means by which nodes on the network communicate

bluetooth

uses radio waves to transmit data signals over short distances

A surge protector protects your computer from high-level surges by __________.

using the excess current to melt a fuse in the surge protector, which stops the current from continuing into your computer

Cyberloafing/Cyberslacking

using your computer for non work activities while your being paid to do your job

A new feature in Windows 10 that is used to organize open windows into task-specific groups is called

virtual desktops

Which ethical philosophy states that morals are internal?

virtue ethics

Google's Now and Apple's Siri use _______ to assist smartphone users.

voice recognition

A company would use a(n) _____ server to provide internet-based information.

web

A(n) ____ server is used to host an internet site

web

Hosts websites that can be accessed via the internet

web server

data redundancy

when the same data exists in more than one place in a database.

Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.

writing computer manuals

When you enter a domain name into a web browser

your computer converts the domain name into an IP address by consulting a database maintained on a DNS server, which functions like a phone book for the Internet. Your ISP's web server has a default DNS server that it goes to when it needs to translate a domain name into an IP address. Your ISP or network administrator defines the default DNS server.

RAM

your computer's temporary storage space; the computer's short term memory

A computer controlled by a hacker is called a __________.

zombie

A computer that a hacker has gained control of in order to launch DoS attacks is known as a ________ computer.

zombie

Structured Query Language (SQL) Structured Query Language (SQL)

is a database programming language that is an example of a fourth-generation language (4GL). Many other database query languages and report generators are also 4GLs.

fourth-generation language (4GL) Structured Query Language (SQL)

is a database programming language that is an example of a fourth-generation language (4GL). Many other database query languages and report generators are also 4GLs.

Base Transceiver Station

is a large communication tower with antennas, amplifiers, receivers, and transmitters.

JAD (Joint Application Development)

is a methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshops called JAD sessions.

test condition

A check to see whether the loop in an algorithm is completed.

program specification

A clear statement of the goals and objectives of the project.

Instant messaging is secure because of the type of encryption used

False

Most instant messaging services use a high level of encryption.

False

Network operating systems need to be installed only on one client computer in order to "talk" to the entire network.

False

PGP is a private-key encryption package available for download.

False

Static addressing is more common than dynamic addressing.

False

Special Memory storage built into the CPU

Registers (Storage)

Which of the following household devices does NOT need power surge protection?

Remote control

connection-oriented protocol

Requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data.

SMTP

Responsible for sending e-mail to its destination.

Kernel (Supervisor Program)

Responsiblie for managining the processor and all other components of the computer system

Intellectual Property

Result of someone's creativity and knowledge which is protected by copyright laws and documented by copyrights, patents and trademarks

Jacquard Loom

Revolutionized the fabric industry by creating a machine that automated the weaving of complex patterns Developed by Joseph Jacquard

____ addressing means that the IP address for a computer never changes and is most likely manually assigned by a network administrator

Static

Clock Cycle

Steady beats ("ticks") of system clock

Who was the Founders of Apple

Steve Jobs and Steve Wozniak

Coaxial cable

Still used in some manufacturing facilities where machinery creates heavy electrical interference.

Cloud Computing

Storing Data, files an application on the web and being able to access and manipulate these files and applications from any Internet-connect device

Directory

Structure composed of drives, libraries, folders, subfolders and files

The S in SQL stands for ____ Query Language.

Structured

Ethics

Study of general nature of morals and the specific moral choice individuals make

smartphone

"A device that combines the functionality of a cell phone, a PMP, and a PDA into one unit."

base transceiver station

"A large communications tower with antennas, amplifiers, and receivers/transmitters."

codec

"A rule, implemented in either software or hardware, which squeezes a given amount of audio and video information into less space."

wide area network (WAN)

A network made up of local area networks (LANs) connected over long distances.

flowcharts

A visual representation of the patterns the algorithm comprises.

What do file servers do?

File servers are used to store and manage files for network users.

Home Network

Personal firewall

Microprocessor Chip

Small Chip containing millions of transitiors --> functions as CPU

Firmware

System software that controls hardware devices

metadata

data that describes other data.

closing tag

</U>

Opening HTML tags are enclosed within ____

<>

Which of the following is a header tag?

<H4>

Opening tag

<P>

Which of the following is NOT an HTML tag?

<R>

HTML tags are enclosed in __________.

<greater than and less than brackets>

The beginning and ending of paragraphs are marked by the ___ and ____ tags

<p> and </p>

What is a denial of service attack?

A DOS attack is an attempt to make a computer resource unavailable to its intended users, such as preventing an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

C#

A Microsoft programming language developed to compete with Java.

point of presence (POP)

A bank of modems, servers, routers, and switches through which Internet users connect to an Internet service provider.

Point of presence

A bank of modems, servers, routers, and switches through which many users can connect to an ISP simultaneously.

initial value

A beginning point.

What are benchmarks?

A benchmark is a score given by smartphone reviewers to measure overall system performance of the smartphone processor after comparing competing smartphones.

What is a bridge?

A bridge connects two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic.

fiber-optic cable

A cable that transmits data at close to the speed of light along glass or plastic fibers.

Fiber-Optic Cable

A cable that transmits data at clsoe to the speed of light along glass or plastic fibers

class

A category of input identified in object-oriented analysis; classes are defined by information and actions.

mobile switching center

A central location that receives cell phone requests for service from a base station.

centralized

A characteristic of client/ server networks where the server, not the individual user, coordinates data security.

scalability

A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.

decentralized

A characteristic of peer-to-peer networks where the individual user coordinates data security.

OneDrive

A cloud storage service provided by Microsoft.

MediaFire

A cloud storage service that features large amounts of free storage and tools for sharing files on social media.

iCloud

A cloud storage/synchronization service provided by Apple.

operator

A coding symbol that represents a fundamental action of the programming language.

Software Suite

A collection of software programs bundled together as package

AJAX (Asynchronous JavaScript and XML)

A collection of technologies that allow the creation of web applications that can update information on a page without requiring the user to refresh or leave the page.

Dynamic HTML (DHTML)

A combination of technologies—HTML, cascading style sheets, and JavaScript—used to create lively and interactive websites.

fifth-generation language (5GL)

A computer language in which a problem is presented as a series of facts or constraints instead of as a specific algorithm; the system of facts can then be queried; considered the most "natural" of languages.

Assembly Language

A computer language that allows programmers to write programs

second-generation language (2GL)

A computer language that allows programmers to write programs using a set of short, English-like commands that speak directly to the central processing unit and that give the programmer direct control of hardware resources; also called assembly language.

third-generation language (3GL)

A computer language that uses symbols and commands to help programmers tell the computer what to do, making 3GL languages easier for humans to read and remember; examples of 3GL languages include BASIC, FORTRAN, COBOL, C/C++, and JAVA.

fourth-generation language (4GL)

A computer language type that includes database query languages and report generators.

web server

A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.

honey pot

A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.

netbook

A computing device that runs a full-featured operating system but weighs two pounds or less.

Server

A computter that recieves the request and reurns the data to the client

handshaking

A connection-oriented protocol requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data. This process is referred to as handshaking.

local area network (LAN)

A network in which the nodes are located within a small geographic area.

Service Set Identifier (SSID)

A network name that runs on a web server rather than on a computer

How many states ban handheld phones for all ages?

14

Global Positioning System (GPS)

"A system of 21 satellites (plus 3 working spares), built and operated by the U.S. military, that constantly orbit the earth. They provide information to GPS-capable devices to pinpoint locations on the earth."

cellular phone (cell phone)

"A telephone that operates over a wireless network. Cell phones can also offer Internet access, text messaging, personal information management (PIM) features, and more."

Internet tablet

"A very light, portable computing device without a keyboard."

multimedia message service (MMS)

"An extension of short message service (SMS) that enables messages that include text, sound, images, and video clips to be sent from a cell phone or PDA to other phones or e-mail addresses."

Central Processing Unit (CPU)

"Brains" of the computer b/c it controls all the functions performed by the computer's other components and processes all the commands issues to it by software instruction

resolution

"The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen."

keyword

(1) A specific word a user wishes to query (or look for) in an Internet search. (2) A specific word that has a predefined meaning in a particular programming language.

data type (field type)

(1) Describes the kind of data being stored at the memory location; each programming language has its own data types (although there is some degree of overlap). (2) In a database, indicates what type of data can be stored in a field and prevents the wrong type of data from being entered into the field.

browsing

(1) the process of viewing database records. (2) the process of "surfing" the Web.

VoIP

(Voice over Internet Protocol).

Network Administration

- Installing new computers and devices - Monitoring the network to ensure it is performing efficiently - Updating and installing new software on the network - Configuring or setting up proper security for a network

Utilitarianism

-Actions judged solely by consequence -Action generate greater happiness are judged to be better than actions that lead to unhappiness (Group>Individual)

Deontology (Duty Based)

-Focus on adherence to moral duties and rights -Morals should apply to everyone equally

Relativism

-No universal moral truth -Moral principles dictated by cultural tastes and customs

Pipelining

-Technique that allows CPU to work on more than one instruction at the same time --> Boost CPU performance -Requires more transistors and more complicated hardware design

So that it can be recognized as a web page, you should save your Notepad document with a(n) __________ extension.

.htm or .html

Closing HTML tags include the additional __ character

/

What is a gigabyte?

1 billion bytes

System Development Life Cycle (SDLC) six steps

1) Problem/Opportunity Identification 2) Analysis 3) Design 4) Development 5) Testing & Installation 6) Maintenance & Evaluation

Software Updates

1)Install automatically 2)Check for updates 3)Recommended updates 4)Microsoft update

Identify the two methods for diverting the extra voltage to ground.

1)Metal oxide varistor (MOV): When voltage is below a certain level, the electrons in the semiconductors flow in such a way as to create a very high resistance. When the voltage exceeds that level, the electrons behave differently, creating a much lower resistance. When voltage is too high, an MOV can conduct a lot of current to eliminate the extra voltage. 2)Gas discharge arrestor: The electrical power is strong enough to ionize the gas, making it a very effective conductor. It passes on current to the ground line until the voltage reaches normal levels, and then becomes a poor conductor again.

Appropriate Websites for Research

1. Authority 2. Bias 3. Relevance 4. Audience 5. Links

Identifying Personal Ethics

1. Describe Yourself 2. Key Beliefs 3. External Influence 4. Consider Why 5. Statement of Value

Multimedia and Educational Software

1. Drawing Software 2. Educational and Reference Software 3. App Creation Software 4. Digital Audio Software 5. Digital Image- and Video- Software

Machine Cycle (Processing Cycle)

1. Fetch 2. Decode 3. Execute 4. Store

File Transfer and Synchronization

1. File Transfer: You can transfer data between a smartphone and your computer in a number of ways including through a micro SD card, a USB connector, or wirelessly. 2. Synchronization: The process of updating your data so the files on your smartphone and computer are the same is called synchronizing.

Four major functions of a Computer

1. Input - gather data or allows users to enter data 2. Process - Manipulates, calculates, or organizes that data into information 3. Output - It displays data and information in a form suitable for the user 4.Storage - Saves data and information for later use

Helpful Search Strategies

1. Search Phrases ("") 2. Search within specific websites 3. Use wild card (*)

Benefits of Networks

1. Sharing an Internet connection 2. Sharing printers and other peripherals 3. Sharing Files 4. Common Communication

A GPS device can accurately pinpoint your location within __________.

10 feet

Which of the following is considered to be a photo-quality resolution for a 4"x6" digital photograph that will be printed in the newspaper?

1280x960

Which of the following is a typical IP address?

197.169.72.74

Lotus 1-2-3

1983 (2)

Microsoft Excel

1985 still in use today (Application Software) (3)

Wireless option to Satellite Broadband

3G or 4G

How many states ban texting for all ages?

44

WiGig

802.11ad

Super WiFi (White WiFi)

802.11af

Low Power WiFi

802.11ah

Ethernet is similar to what IEEE standard?

802.3

three-way handshake

A connection-oriented protocol requires two computers to exchange control packets, thereby setting up the parameters of the data exchange session, before sending packets that contain data. This process is referred to as handshaking. TCP uses a process called a three-way handshake to establish a connection.

data plan

A connectivity plan or text messaging plan in which data charges are separate from cell phone calling charges and are provided at rates different from those for voice calls.

Structured Query Language (SQL)

A database programming language used to construct queries to extract data from relational databases; one example of a fourth-generation language.

circuit switching

A dedicated connection is formed between two points (such as two people on telephones), and the connection remains active for the duration of the transmission.

integrated development environment (IDE)

A developmental tool that helps programmers write and test their programs; one IDE can be configured to support many different languages.

integrated development environment (IDE)

A developmental tool that helps programmers write, compile, and test their programs.

switch

A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent.

Switch

A device for transmitting data on a network. Switch makes decisions, based on the media access control address of the data, as to where the data is to be sent

Terminator

A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.

terminator

A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it.

e-reader

A device that can display e-text and that has supporting tools, like note taking, bookmarks, and integrated dictionaries.

network adapter

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.

Bridge

A device that is used to send data between different collision domains, depending on where the recipient device is located.

access card reader

A device that reads information from a magnetic strip on the back of a credit card-like access card.

Router

A device that routes packets of data between two or more networks

router

A device that routes packets of data between two or more networks.

biometric authentication device

A device that uses some unique characteristic of human biology to identify authorized users.

bridge

A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.

hexadecimal digit

A digit with 16 possible values: 0-9 and A-F.

What is the difference between a DOS and a DDOS?

A distributed denial-of-service (DDOS) attack uses multiple compromised systems to flood the bandwidth or resources of a targeted system, such as a web server.

architecture neutral

A feature of Java whereby code needs to be compiled only once, after which the code can be run on many different CPUs.

Which of the following does NOT pose a potential threat to your computer?

A firewall

Which step in the program development cycle maps out the logic and processes?

A flowchart

Voice over Internet Protocol (VoIP)

A form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long- distance calls.

Wireless Markup Language (WML)

A format for writing content viewed on a cellular phone or personal digital assistant (PDA) that is text-based and contains no graphics.

bastion host

A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.

optical carrier (OC) line

A high-speed fiber-optic line.

programming language

A kind of "code" for the set of instructions the central processing unit knows how to perform.

base transceiver station

A large communications tower with antennas, amplifiers, and receivers/transmitters.

base transceiver station

A large communications tower with antennas, amplifiers, receivers, and transmitters.

cascading style sheet

A list of rules that defines in one single location how to display HTML elements.

Cascading style sheet

A list of rules that defines in one single location how to display HTML.

eXtensible Markup Language (XML)

A markup language that enables designers to define their own data-based tags, making it much easier for a website to transfer the key information on its page to another site; it defines what data is being described rather than how it's to be displayed.

Common Gateway Interface (CGI)

A method of designing programs that provides a methodology by which a browser can request a program file be executed instead of just being delivered to the browser.

access method

A method to control which computer is allowed to use transmission media at a certain time.

client/server model

A model of network communications where a client device such as a computer, tablet, or smartphone uses browsers to request services from networks that make up the Internet.

network prefix

A slash and a number at the end of the last octet. The network prefix identifies how many of the possible 32 bits in a traditional IP address are to be used as the unique identifier, leaving the remaining bits to identify the specific host.

Java applet

A small Java-based program.

applet

A small application located on a server; when requested, the applet is downloaded to the client.

Integrated Circuit

A small chip capable of containing thousands of tranisitors Developed by Jack Kilby (1958)

prototype

A small model of a program built at the beginning of a large project.

portable media player (PMP)

A small portable device (such as an iPod) that enables you to carry your MP3s or other media files around with you.

packet (data packet)

A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent.

Touch Pad or Trackpad

A small, touch-sensitive area at the base of the keyboard

print queue

A software holding area for print jobs. Also called a print spooler.

print queue

A software holding area for print jobs. When the print server receives a job (a printing request) from a client computer, it puts the job into a print queue on the print server.

Distributed or Grid Computing

A software system in which components located on networked computers interact to achieve a common goal

digital signal processor

A specialized chip that processes digital information and transmits signals very quickly.

multipurpose Internet mail extensions (MIME)

A specification introduced in 1991 to simplify attachments to e-mail messages. All e-mail client software now uses this protocol to attach files.

Graphics Double Date Rate 5 (GDDR5)

A standard of video memory

Head Crash

A stoppage of the hard drive that often results in data loss

VBScript

A subset of Visual Basic, used to introduce dynamic decision making into web pages.

global positioning system (GPS)

A system of 21 satellites (plus 3 working spares), built and operated by the U.S. military, that constantly orbit the earth. The satellites provide information to GPS-capable devices to pinpoint locations on the earth.

digital rights management (DRM)

A system of access control that allows only limited use of material that has been legally purchased.

bus (linear bus) topology

A system of networking connections in which all devices are connected in sequence on a single cable.

information system

A system that includes data, people, procedures, hardware, and software that help in planning and decision making; a software-based solution used to gather and analyze information.

top-down design

A systematic approach in which a problem is broken into a series of high-level tasks.

Voice over Internet Protocol (VoIP)

A technology that facilitates making telephone calls across the Internet instead of using conventional telephone lines.

cellular (cell) phone

A telephone that operates over a mobile network. Cell phones can also offer Internet access, text messaging, personal information management (PIM) features, and more.

pseudocode

A text-based approach to documenting an algorithm.

debugger

A tool in an integrated development environment that helps programmers analyze a program as it runs.

Pretty Good Privacy (PGP)

A tried-and-true public-key encryption package available for download; public-key encryption is the most commonly used encryption on the Internet.

object-oriented analysis

A type of analysis in which programmers first identify all the categories of inputs that are part of the problem the program is meant to solve.

binary decision

A type of decision point in an algorithm that can be answered in one of only two ways: yes (true) or no (false).

loop

A type of decision point in an algorithm. In a loop, a question is asked, and if the answer is yes, a set of actions is performed. Once the set of actions has finished, the question is asked again, creating a loop. If the answer to the question is no, the algorithm breaks free of the loop and moves on to the first step that follows the loop.

client/server network (server-based network)

A type of network that uses servers to deliver services to computers that are requesting them (clients).

ring (loop) topology

A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.

server-side program

A type of program that runs on a web server rather than on a computer.

Bluetooth (technology)

A type of wireless technology that uses radio waves to transmit data over short distances (approximately 3-300 feet depending on power); often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.

Bluetooth technology

A type of wireless technology that uses radio waves to transmit data over short distances (approximately 30 feet for Bluetooth 1 and 60 feet for Bluetooth 2). Often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.

dotted decimal number (or dotted quad)

A typical IP address is expressed as follows: 197.169.73.63

IP address

A unique identification number that defines each computer, service, or other device that connects to the Internet.

rapid application development (RAD)

An alternative program-development method; instead of developing detailed system documents before they produce the system, developers first create a prototype, then generate system documents as they use and remodel the product.

Beta Version

An application that is still underdevelopment

extranet

An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it.

brute force attack

An attempt to access an account by repeatedly trying different passwords.

What's an e-mail client and e-mail server?

An e-mail client is an e-mailing application (such as Microsoft Outlook) from which an e-mail message is sent, and an e-mail server is a specialized computer that stores, processes, and sends e-mails.

How is an e-mail server different from a communications server?

An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.

HyperText Transfer Protocol Secure

An encrypted protocol for secure transmissions.

private-key encryption

An encryption where only the two parties involved in sending the message have the code.

runtime error

An error in a program that occurs when a programmer accidentally writes code that divides by zero, a mathematical error.

logical error

An error in a program that produces unintended or undesired output, where the syntax is correct but some other human error has occurred.

scope creep

An ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype.

Semantic Web (Web 3.0)

An evolving extensuon of the web in which data is defines in such a way to make it more easily processed by computers

object

An example of a class in object-oriented analysis.

Sound Card

An expanision card that attaches to the motherboard inside your system unit

Network Interface Card (NIC)

An expanision card that enables a computer to connect other computers or to a cable moderm to faciliatate a hogh-speed Internet connetion

multimedia message service (MMS)

An extension of SMS; allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.

What is an IDE?

An integrated development environment (IDE) is a development tool that helps programmers write, compile, and test their programs.

Java

An object-oriented programming language that has a large set of existing classes.

system development life cycle (SDLC)

An organized process (set of steps) to ensure that development proceeds in an orderly fashion.

Transport Layer Security (TLS)

An updated extension of Secure Sockets Layer.

Computer Forensics

Analyzes computer systems with specific techniques to gather potential legal evidence

Web Server

Ancomputer that hosts a website you're requesting - so you can see it on your computer

runtime error

Another kind of error caught when the program executes is a runtime error. That kind of forbidden operation generates a runtime error message.

Cybercrime

Any criminal action perpetrated primarily through the use of a computer

possessed object

Any object that users carry to identify themselves and that grants them access to a computer system or facility.

Hardware

Any part of a computer you can physically touch

Multimedia

Anything that involves one or more forms of media plus text

Which computer first stored its operating system in ROM?

Apple II

A school network might use a(n) _____ server to store software such as Microsoft Office.

Application

Two main types of software (computer has)

Application Software: Software you use to do task (Everyday) System Software: Helps run computer and coordinate instruction between application software and computers hardware (ie OS)

Factor affect quality of a monitor

Aspect Ratio: Width to Height proportion of a monitor (Normal 4:3, HD 16:9) Resolution: Clearness or sharpness of the image, reflects the number of pixels on the screen Contrast Ratio: Difference in light intensity between brightest white and darkest black a monitor can produce Viewing Angle: Distance in degrees from which you can move to the side or a monitor before the image degrades Brightness: Greatest amount of light showing when the monitor is displaying pure white Response Time: Time it takes for pixels to change color

Cookie File

Assigns an ID to your computer intended to make your return more efficient or geared interests. Contains browsing habits, ads you opened, products you looked at, time and location.

positive acknowledgment (ACK)

Assume that two systems, X and Y, have established a connection. When Y receives a data packet that it can read from X, it sends back a positive acknowledgment (ACK). If X does not receive an ACK in an appropriate period of time, it resends the packet.

Which type of server is designed to keep track of who is logging on to the network and which network services are available?

Authentication

_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user

Authentication

What unintentional denial of service happened in March 2014?

DigitalGlobe launched a crowdsourcing service on which users could help search for the missing Malaysia Airlines Flight 370 in satellite images. The response overwhelmed the company's servers.

Network-ready devices

Directly to a network, either though a wired or wireless connection

Touch Screen

Display screen that respond to commands initiated by touching them with finger or stylus

Graphics Processing Unit (GPU)

Displaying graphics demands a lot of computational work fro the CPU

Taskbar

Displays open and favorite application for easy access

Different types of (monitor) or display screen

Displays text, graphics and videos as soft copies --> only seen on screen Liquid Crystal Display (LCD): Flat-panel monitor, is light and energy efficient Light-Emitting Diode (LED): More energy efficient and better color accuracy and thinner panels then LCD Legacy Technology (CRT): Computing device that use techniques, parts and methods that are no longer popular Organic Light-Emitting Diode display (OLED): Organic compounds that produce light when exposed to an electric current --> doesn't need backlight to function leads to less power draw and smaller display

Network Architecture

Distance between Nodes on a network

Cookies

Do not go through hard drive in search of info only what you supply in forms (personal data). Does not pose a security threat its virtually impossible to hide a virus/malicious software

JavaScript uses the ____________ Model to organize the objects and page elements on a web page.

Document Object.

connectionless protocol

Does not require any type of connection to be established or maintained between two computers that are exchanging information.

Passwords

Don't use easily deduces components Use at least 14 characters Don't use words in dictionary Use mix of upper/lowercase and symbols Never tell anyone or write where someone can see it Change your password often Don't use the same password

When using ____ addressing, your computer is assigned an address from an available pool of IP addresses

Dynamic

____ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the internet

Dynamic

dynamic host configuration protocol (DHCP)

Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP), which belongs to the TCP/IP protocol suite. DHCP takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.

Node

Each device connected to a network

variable

Each input and each output item that the program manipulates, also known as a variable, needs to be announced early in the program so that memory space can be set aside.

variable

Each input and output item the program manipulates.

Peer-to-Peer (P2P) Network

Each node connected on the network can communicate directly with every other node on the network

Which of the following browsers was introduced with Windows 10?

Edge

Transmission Media

Either wired or wireless; establish a communication channel between the nodes on a network

What allows the exchange of large amounts of business data in a standardized electronic format?

Electronic data interchange

Audio MIDI Interface

Electronics standard that allows different kinds of electronic instrucments to communicate with each other with computers

File Transfer Protocol

Enables files to be downloaded to a computer or uploaded to other computers.

Telnet

Enables users to login to a remote computer and work on it as if they were sitting in front of it.

information assurance

Ensuring that information systems contain accurate information and are adequately secured against tampering.

protocol most commonly used on star networks

Ethernet

Interrupt Handler

Every device has its own type of interrupt, which associates with a special numerical code that prioritize the request

How often to backup

Every time you make changes Image-weekly or after new software installed

Macintosh

Everything Lisa was and then some and about a third of the price

cellular phone (or cell phone)

Evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device. Cell phones offer all of the features available on a traditional telephone system, including automatic redial, call timers, and voice mail capabilities.

Video Card (Video Adapter)

Expanision Card that's installed inside the system unit to translate binary data into the images you view on your moitor

The Internet Crime Complaint Center (IC3) is a partnership between the ________

FBI and National White Collar Crime Center

4 Common Categories for cybercrime

FBI related scams Identity Theft Non auction/Non Delivery of Merchandise Advance Fee Fraud

Device Driver

Facilitates communication between the device and the OS

A communications server is used to host websites on a client/server network

False

A database server acts as a repository for application software.

False

A repeater moves data between two networks

False

fifth-generation language (5GL)

Fifth-generation languages are considered the most "natural" of languages. In a 5GL, a problem is presented as a series of facts or constraints instead of as a specific algorithm. The system of facts can then be queried (asked) questions.

What do most smartphones use to highlight and select information on the touch-sensitive screen?

Fingers or a stylus

Windows __________ helps to block viruses and worms from reaching your computer and logs successful and unsuccessful attempts to connect to it.

Firewall

Packet Filtering

Firewall can be configured so they filter out packets sent to specific logical ports

Osborne

First "portable" Computer Weight 24.5 pounds 5-inch scrreen 64 kilobytes of RAM Preinstalled spreadsheet and word processing software (1981)

Analytical Engine

First Automatic Calculator Developed by Charles Babbage (1834)

Z1

First Mechanical Calculator Developed Konrad Zuse (1936)

Windows 95

First Microsoft OS designed to be principally a GUI OS

Altair 8800

First Personal Computer - 256 bytes of memory, no keyboard or monitor, switches in the front entering data and Light on front indication result of code (1975)

Mosaic

First Web Browser (1993)

Word Star

First Word processing application (1979)

Pascalene

First accurate mechanical calcualtor Blaise Pascal (1642)

Universal Automatic Computer (UNIVAC)

First commercially successfully electronic digital computer --> operated on magnetic tape

Atanasoff-Berry Computer (ABC)

First electrically powered digital computer --> first to use vacuum tubes, instead of the mechanical switches used in older computer to store data Develop by John Atanasoff (1939)

File Name

First path of a file --> generally the name you assign to the file when you save it

Lisa

First successful PC that used GUI

Storage Devices

Flash Drive (Thumb Drive): SSD flash memory storing information on an internal memory chip Flash Card Memory: SD card inside different devices Optical Drive: Hardware that uses laser or light to Read from and maybe even write to CDs, DVDs, or Blu-Ray disc Compact Discs/Digital Video Discs: Originally created for audio (DVDs hold 14 times more than CDs) Blu-Ray: Holds up to 50 GB of data

Extensions (File Type)

Follow the file name and a period or dot

All of the following are sections of a web page EXCEPT ___

Foot

MS-DOS

For IBM computers

interpreter

For a programming language, translates the source code into an intermediate form, line by line; each line is then executed as it's translated.

Network Adapter

For the different nodes on a network to communicate with each other and access the network

Podcast

Form of digital media comprised of a series of audio or video files that are distributed over the Internet

Really Simple Syndication (RSS)

Formats that sends the latest content of the podcast series automatically to aggregtor

CMYK

Four Color printing process (Cyan, Magenta, Yellow and Key --> Black)

Webcam

Front-facing camera that attaches to a desktop computer or is built into a devices

Geolocation

GPS chips to calculate your exact location

control structure

General term used for a keyword in a programming language that allows the programmer to direct the flow of the program based on a decision.

Which of these is NOT an example of potentially harmful software that a hacker could install to gain control of your computer?

Ghost

How is processor speed measured?

Gigahertz: Billions of machine cycles per second

Connectivity Port

Gives access to networks and the Internet

wireless access point (WAP)

Gives wireless devices a sending and receiving connection point to the network.

GPS stands for __________.

Global Position Services

Divine-Command Theory

God is all-knowing and sets morals standards

frame

Groups of data packets that are sent together in a package.

If you want your name to appear in the title bar of the browser window when the web page displays, you should put it in the ____ section.

HEAD

Which HTML section contains elements that are not displayed in a browser when viewing a web page?

HEAD

Zombie

Hacker that controls a computer. Often used to launch denial-of-service attacks on other computers

communication server

Handles all communications between the network and other networks, including managing Internet connectivity.

Iphone Keyboard

Has more than 40 languages

packet screening

Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network.

Which of the following possible negative aspects of working as a technician was NOT discussed in the Sound Byte?

Having to work mandatory overtime

next

In the programming language Visual Basic, programmers use the keywords For and Next to implement a loop. After the keyword For, an input or output item is given a starting value. Then the statements, or "sentences," in the body of the loop are executed. When the command Next is run, the program returns to the For statement and increments the value of the input or output item by 1.

information system

Includes data, people, procedures, hardware, and software.

Project Management Tools

Incorporte tasks and calenders sot he indiviidual components as well as the entire project can sta on schedule

feature phones

Inexpensive cell phones with modest processors, simple interfaces, and, often, no touch screens.

Spyware Transmits

Information about you i.e. habits to the owner of the program so that the information can be used for marketing purposes

Internet data is transmitted in packets, and routers use some of the information in a packet to route the data to the correct recipient. List the four packet components mentioned on the website.

Information on the sender's address, the receiver's address, the package's place in the entire message, and how the receiving computer can be sure that the package arrived intact.

List two examples of configuration table information.

Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic

Prevention of future infection

Inoculation records key attributes about files (size/date created) and keeps statistics in safe place

Scanners

Input Devices to input images

Different types of (Microphones)

Input device that lets you capture sound waves and transfer them to digital format on your computer Close Talk: Hands-Free or Attach Headset Omnidirectional: Picks up sound equally well from all directions Unidirectional: Picks up sound from only one direction Clip-On: Clips to cloths or Available wireless

Stylus

Input device that looks like a pen and that you use to tap commands or draw on a screen

____ is the ability of two or more people to communicate in text over the internet in real time

Instant messaging

Program

Instruction set --> provides a with a mean for us to interact with and use the computer

What does IDE stand for?

Integrated Development Environment

derivative work

Intellectual property that is based on an original work but is modified in some way.

Internet of Things (IoT)

Interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer interaction

Internal Hard Drive vs External Hard Drive

Internal Hard Drive: Reside in system unit and usually holds all permanent stored programs and data External Hard Drive: Similar storage capacities, but resides outside the system unit and connect to the computer via port

System Clock

Internal clock (metronome) keeping steady beat and controlling when the CPU moves to the next stage of processing

Which one of the following organizations provides direction for the maintenance and development of Internet protocols?

Internet Architecture Board

IC3

Internet Crime Complaint Center-Partnership between FBI and National White Collar Crime Center (NW3C)

Smartphone Features:

Internet access, Personal information management (PIM), voice recording, Play/organize music, GPS, Digital image and video capture, computing power to run programs like word processing or even video-editing software.

The ____________ is a collection of large national and international networks.

Internet backbone

Which of the following is a private network setup by a business that's used exclusively by a select group of employees and suppliers?

Intranet

TRS-80

Introduce Radio Shack Monochrome Display 4 KB RAM Circuitry is hidden under keyboard 10,000 units in first month

Advanced Research Projects Agency (ARPA)

Invented Internet Created by 4 node-network (UCLA, Standford, UC Santa Barbara and University of Utah) Fathers of Internet - Vinton Cerf and Robert Kahn (1969)

Pretexting

Involves creating a scenario that sounds legit enough that someone will trust you

CyberBullying

Involves the use of digital technology to bully another

Scareware

Is a type of malware that downloads onto your computer and tries to convince you that your computer is infected, pop-ups, banners.

What was the importance of the Turing machine to today's computers?

It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM.

Which of the following statements about HTML is FALSE?

It is a programming language, like Java.

What is a surge arrestor?

It is a unit that is installed near the electric meter, where the power lines run to a building. This protects all the circuits in the house or office from a certain range of voltage surges.

Which of the following statements about Windows Defender is FALSE?

It prevents denial of service (DOS) attacks.

What does creating a restore point do?

It saves the settings of the computer exactly as they are when the restore point is created.

What happens when the Recycle Bin gets full?

It starts permanently deleting its oldest files to make space for new ones.

Collaborative Consumption

Joining together as a group to use a specific product more efficiently

Three categories of apps

Local Apps: Computing device (No Internet needed) --> Microsoft Office Mobile Apps: Computing device (Constant Internet connection) Web-Based Apps: Software as a Service (SaaS) --> vendor hosts the software over the Internet without having to install it on computer

all of the following are examples of network operating systems EXCEPT

MS-DOS

Real-Time Operating System

Machinery that performs a repeptive series of specific tasks in an exact amount of time

Which of the following statements about macros is FALSE?

Macros can only be used one time.

Motherboard

Main circuit board that contains the central electronic components of the computer (located in system unit)

System Files

Main files of the OS

TCP/IP (Transmission Control Protocol (TCP) and Internet Protocol (IP))

Main suite of protocols used is TCP/IP. The suite is named after the original two protocols that were developed for the Internet: the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

Other types of Computers

Mainframe: Large, expensive computer that supports many users at once simultaneously --> big Businesses Super computer: Designed to do perform complex calculations extremely rapidly --> Weather forecast and Atomic energy research Embedded Computer: Self contained computer devices that have their own programming and typically don't receive input from you or interact with other systems (ie Drones) Smartphones: A device with features of a computer including wide assortment of apps, media players, high-quality camera and web connectivity

Switch

Makes decisions as to where the data is to be sent and rebroadcasts it to the appropriate network node.

Financial Planning Software

Manage daily finances (ie Mint)

Three main functions of an operating system

Manages the computer hardware --> processor, memory and storage device as we as peripheral device such as a printer

Control Unit

Manages the switched inside the CPU

processing

Manipulating or organizing data into information.

Do I have to pay for cloud storage services?

Many cloud storage services, like Dropbox, offer free accounts that feature limited amounts of storage.

IBM PC

Marketed to businesses and consumers 64 KB to 256 KB of RAM Floppy disk drives optional Hard Drive not supported by early models (1981)

Arduino was developed by ___________.

Massimo Banzi

Bandwidth (Data Transfer Speed)

Maximum speed at which data can be transmission between two nodes on a network

inheritance

Means that a new class can automatically pick up all of the data and methods of an existing class, and then extend and customize those to fit its own specific needs.

static addressing

Means that the IP address for a computer never changes and is most likely assigned manually by a network administrator or ISP.

CPU Benchmarks

Measurement used to compare performance between processors

If you want to store large collections of media and easily share them with friends and family, what service should you consider if you want free cloud storage?

MediaFire

Define the following Ethernet terms:

Medium: Usually fiber-optic or twisted pair cabling used to provide a path for electronic signals Segment: A single-shared medium Node: A device that attaches to a segment; also called a station Frame: Short messages the nodes use to communicate; variably sized chunks of information

What happened on June 25, 2009, that caused Google to think it was under a DDOS attack?

Michael Jackson died on this day and a spike in searches related to him was so big that it was thought to be a DDOS attack.

All of the following are examples of software suites EXCEPT

Microsoft One-Note

Which of the following is an example of an e-mail client?

Microsoft Outlook

The easiest way to create a web page is to use __________.

Microsoft Word

Pixels

Monitor Screen are made up of millions of tiny dots

Keystroke Logger (Key logger)

Monitors keystrokes with intent of stealing passwords, login id's, or credit card information

SuperFetch

Monitors the applications you use the most and preloads them into your system memory so that they'll be ready to be used when you want them

Virtue Ethics

Morals are internal Strive to be a person that behaves well spontaneously

Swap File (Page File)

More RAM is needed, the OS Swaps out from RAM the data or instruction that haven't recently been used and moves them to a temporary storage area on the hard drive

What was the name of the first web browser?

Mosaic

debugger

Most IDEs include a tool called a debugger that helps programmers dissect a program as it runs. The debugger pauses the program while it is executing and allows the programmer to examine the values of all the variables.

Free Cloud Storage:

Most cloud storage providers, such as Dropbox, iCloud, and OneDrive, feature free accounts with limited amounts of storage and limited features. You can always increase your storage capacity and gain access to more tools by paying a subscription fee for a premium account.

QWERTY Keyboard

Most common keyboard layout

ID Theft

Most financially damaging

Which network is a combination of two or more LANs connected together over long distances?

WAN

What is a car whisperer, and how can you combat it?

Software that intercepts a hands-free Bluetooth conversation in a car. It enables an attacker to speak to the driver as well as eavesdrop on a conversation and receive audio from a Bluetooth-enabled car stereo. One can try to change the security code (passkey), but many devices use 0000 and cannot be changed.

Web Browser

Software that lets you locate, view, and navigate the web

Spreadsheet Software

Software that lets you make calculations and perform numerical analyses (ie Microsoft Excel)

microbrowser

Software that makes it possible to access the Internet from a PDA/smartphone.

Output

Speaker, LCD or OLED

network operating system (NOS)

Special software that needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.

e-mail servers

Specialized computers whose sole function is to store, process, and send e-mail.

Home Network Server

Specialized devices designed to store files, share files across the network, and back up files on computer connected to the netwrok

Network-Attached Storage (NAS)

Specialized devices designed to stroe and manage all network data

Hyperlinks

Specially coded elements that let you jump from one web page to another within the same webiste or to another site altogether

Vertical Market Software

Specific industry, such as property management software for real estate professionals

Keywords

Specific words you wish to look for or query

Multipurpose Internet Mail Extensions (MIME)

Specification for sending files as attachments to e-mail.

System Requirement

Specify the minimum recommended standars for the operating system, processor, primary memory (RAM), and hard drive capacity

Three Components to Search Engines

Spider: Constantly collects data Indexer Program: Organizes the data into a large database Search Engine Software: Searches indexed data, pulling out relevant informatuon according to search

gigabit Ethernet

Standard Ethernet network (802.3)

Wireless Fidelity (WiFi)

Standard wireless Ethernet networks --> 802.11ac

JSON

Stands for Javascript Object Notation; a syntax for exchanging information between computers.

World Wide Web (www)

Subtext of the Internet that is connected via hypertext

Top-level Domain

Suffix in the domian name after the dot (ie com or net)

The two major antivirus companies featured in the Sound Byte are __________.

Symantec and McAfee

Types of viruses 1)Boot-Sector 2)Logic Bombs/Time bombs 3)Worm 4)Script/Macro 5)Email 6)Encrytion

Symptoms 1) Existing program disappears 2)Browser goes to unknown page 3)Old messages, pop-ups, images 4)Data files corrupt 5)Program stops working 6)Shuts down unexpectedly

The __________ utility allows you to create a copy of your entire hard drive on an external hard drive.

System Image

Minimum set of recommened statnard for a program is known as

System Requirements

Base-10 number system (Decimal Notation)

System you use to represent all of the numeric values you use each day (0-9 <-- 10 digits) using power of 10

Windows 8 Backup

System-Image backup utility-file history

_____ is the main suite of protocols used on the internet

TCP/IP

The main suite of Internet protocols used to transmit data is called

TCP/IP.

Different types of Portable Computers

Tablet Computer: Integrated into a flat multitouch-sensitive screen, Uses onscreen virtual keyboard --> can connect seperate keyboard (ie. IPad or Microsoft Surface) Laptop or Notebook Computer: Keyboard, Monitor, and other devices integrated into single compact case (ie. MacBook Pro) Ultrabook: Full-featured (lightweight) --> low powers processors and SSD to reduce size and weight to extend battery life (ie. MacBook Air) 2-in-1 PC: Similar to Laptop, but monitor can swivels and fold flat --> Conventional laptop and tablet computer with touch screen Chromebook: Google OS and designed to be connected on the Internet at all times --> Storage in cloud instead of local hard drive

HTML tags

Tags that surround and define HTML content (such as <b> and </b>, which indicate bolding).

Dynamic Host Configuration Protocol (DHCP)

Takes a pool of IP addresses and shares them with hosts on a network on an as-needed basis

short message service (SMS)

Technology that enables short text messages (up to 160 characters) to be sent over mobile networks.

Quick Response (QR) code

Technology that lets the any piece of print in the real world host a live link to online information and video content

variable declaration

Tells the operating system that the program needs to allocate storage space in RAM.

Stealth

Temporary erases code from files where they reside or hide in the active memory

Other Examples of Educational and Reference Software

Test Prep Simulation Instructional Trip Planning Home Design and Improvement Course Management Brain Training Genealogy

electronic text (e-text)

Textual information stored as digital information so that it can be stored, manipulated, and transmitted by electronic devices.

Uncompressed audio file

WAV

Does the IP address remain the same or can it change automatically?

The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.

Static addressing

The IP address for a computer never changes.

user datagram protocol (UDP)

The Internet Protocol is responsible only for sending packets on their way. The packets are created by either the TCP or the user datagram protocol (UDP).

Hypertext Transfer Protocol Secure (HTTPS)

The Internet protocol that ensures data is sent securely over the web.

Preemptive Multitasking

The OS process the task assigned a higher priority before processing a task assigned a low priority

dynamic decision making

The ability of a web page to decide how to display itself based on the choices the reader makes.

token method

The access method used by ring networks to avoid data collisions.

machine language

The actual machine language of a CPU, the sequence of bits (1s and 0s) that the CPU understands.

first-generation language (1GL)

The actual machine language of a CPU; the sequence of bits (1s and 0s) that the CPU understands.

Physical Memory

The amount of RAM actaully sitting on the memory modules in your computer

Physical memory

The amount of RAM that is actually sitting on memory modules in your computer

Application Programming Interface (API)

The application software needs in orfer to interact with the CPU

Path Separator

The backslash character (\), used by Windows

mobile switching center

The base transceiver station passes the request to a central location.

executable program

The binary sequence that instructs the CPU to run their code.

executable program

The binary sequence that instructs the central processing unit to run the programmer's code.

portability

The capability to move a completed solution easily from one type of computer to another.

resolution

The clearness or sharpness of an image, which is controlled by the number of pixels displayed on the screen.

operators

The coding symbols that represent the fundamental actions of the language.

Platform

The combination of a computer's operating system and processor. The two most common platform tyopes are the PC and the Apple

packet switching

The communications methodology that makes computer communication efficient.

logical errors

The compiler only can make sure that the specific rules of the language are followed, that all of the keywords are spelled correctly, and that the operators being used are meaningful to that language. These logical errors in the problem are caught only when the program executes.

ubiquitous computing

The condition in which computing is so woven into the fabric of everyday life that it becomes indistinguishable from it.

What if the ISP's web server cannot locate the IP information on the default DNS server?

The default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain.

Digital Divide

The discrepancy between those who have access to the opportunities and knowledge that computers and the Internet and those who don't

electronic data interchange (EDI)

The exchange of large amounts of data in a standardized electronic format.

What's the first step in programming?

The first step in programming is to define the problem statement.

dotted decimal number (dotted quad)

The form of an Internet protocol address, where sets of numerals are separated by decimals, i.e., 197.169.73.63.

control structures

The general term used for keywords in a programming language that allow the programmer to control (redirect) the flow of the program based on a decision.

Path (Subdirectory)

The information after each slash

source code

The instructions programmers write in a higher-level language.

Binary Language

The language computers use to process data into information, consisting of only the values 0 and 1

first-generation language (1GL)

The machine language of a central processing unit (CPU); the sequence of bits that the CPU understands.

Internet backbone

The main pathway of high-speed communications lines over which all Internet traffic flows.

tunneling

The main technology for achieving a virtual private network; the placement of data packets inside other data packets.

RTM (release to manufacturer)

The manufacturer will make changes before releasing the product to other manufacturers, for installation on new machines for example. That point in the release cycle is called RTM (or release to manufacturers).

CSMA/CD

The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals.

What does synchronization mean?

The process of updating your data so that the files on your smartphone and computer are the same is called synchronization.

Components of Smartphones.

The most fully featured and powerful cellular phones are put in the smartphone category. Like any other computer, a smartphone includes a processor, an operating system, memory, input and output devices, and ports 1. Processors: There are several popular smartphone processors on the market today. 2. Operating Systems: The Android OS, Windows Phone, and iPhone operating systems are the most popular. 3. Input Devices: The input devices are primarily a microphone and touchpad. Some phones offer both a touch screen and a built-in keyboard. And a smartphone's digital camera is also an input device, capturing photos and video. 4. Output Devices: The output devices include a speaker and either a liquid crystal display (LCD) or OLED (organic light-emitting diode) display.

smartphone

The most fully featured and powerful cellular phones.

star topology

The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.

When I attach a file to my e-mail, will SMTP send it to the e-mail server?

The multipurpose Internet mail extensions (MIME) protocol is responsible for sending e-mail file attachments.

My office has shifted to a client/server network and uses one server in the office—is that sufficient?

The number and types of servers you need depends on the workload your network experiences.

sampling rate

The number of times per second a signal is measured and converted to a digital value. Sampling rates are measured in kilobits per second.

Internet Protocol version 4 (IPv4)

The original IP addressing scheme created in the early 1980s.

base class

The original class is called the base class, and the new, modified class is called the derived class,

derived class

The original class is called the base class, and the new, modified class is called the derived class,

If data is broken into chunks and sent over various routes at the same time, how do these packets reach their destination?

The packets contain destination information and are reassembled when they all reach the destination.

testing plan

The part of a problem statement that lists specific input numbers the program would typically expect the user to enter.

error handling

The part of a problem statement where programmers describe what the program should do if the input data is invalid or just gibberish.

testing plan

The part of the problem statement that lists specific input numbers the programmers would typically expect the user to enter; the plan then lists the precise output values that a perfect program would return for those input values.

error handling

The part of the problem statement where programmers must describe what the program should do if the input data is invalid or just gibberish.

CPU usage

The percentage of time that your CPU is working

media access control (MAC) address

The physical address, similar to a serial number, of each network adapter.

network topology

The physical or logical arrangement of computers, transmission media (cable), and other network components.

release to manufacturers (RTM)

The point in the release cycle, where, after beta testing, a manufacturer makes changes to the software and releases it to other manufacturers, for installation on new machines, for example.

general availability (GA)

The point in the release cycle, where, after release to manufacturers, software is available for purchase by the public.

compilation

The process by which code is converted into machine language—the language the CPU can understand

compilation

The process by which code is converted into machine language—the language the central processing unit can understand.

program development life cycle (PDLC)

The process each programming project follows through several stages from conception to final deployment.

Boot Process

The process for loading the operating system (OS) into random access memory (RAM) when the computer is turned on 1. CPU activates BIOS 2. Power-on self-test 3. Load OS to RAM 4. Configuration

authentication

The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.

program development life cycle (PDLC)

The process of performing a programming project, which consists of five stages: describing the problem, making a plan, coding, debugging, and testing and documentation.

debugging

The process of running a program over and over to find and repair errors and to make sure the program behaves in the way it should.

What is Bluejacking, and how can you prevent it?

The process of sending a business card to someone within close proximity, hoping the contact will be allowed and an unauthorized connection will be made. To prevent Bluejacking, set the Bluetooth device to hidden, invisible, or nondiscoverable mode.

programming

The process of translating a task into a series of commands a computer will use to perform that task.

synchronizing (or syncing)

The process of updating data on portable devices (such as a cell phone or iPod) and a computer so that they contain the same data.

syncing (or synchronizing)

The process of updating data on portable devices (such as a cell phone or iPod) and computer so that they contain the same data.

synchronizing

The process of updating your data so that the files on your cell phone and computer are the same.

Latencry (Rotational Delay)

Waiting Time

What's a URL and it's parts?

URL (Uniform Resource Locator): Inital access to a particular website by type in unique address Protocol --> http Domain Name --> Website Name Top-Level Domain --> com, net and gov Path or Subdirectory --> rest of the information following domain

Electronic Numerical Integrator & Computer (ENIAC)

US government - sponsored machine developed to calculate the setting used for weapons Developed by John W. Mauchly and J. Presper Ecker (1944)

To program your Arduino, you'll use an Arduino IDE and upload the code to your Arduino via ________.

USB

Distributions (Distros)

Underlying Linux kernel (the code that provides Linux's basic functionality) and special modification to the OS, and may also include additional open source Software

Which of the following statements is false?

Unethical behavior is always illegal

The _____ is a great Arduino for first-time Makers.

Uno

Spam

Unwanted junk or emails

Spam

Unwanted or junk-email find information either list purchase or with software that looks for e-mail addresses on the internet

Spim

Unwanted or unsolicited instant messages

Spyware

Unwanted piggyback program that usually downloads with other software you install from the internet and runs in the background

Solid State Drive (SSD)

Use electronic memory and has no mechanical motors or moving parts --> offer incredible fast access time

Document Object Model (DOM)

Used by JavaScript to organize objects and page elements.

Unshielded twisted-pair cable (UTP)

Used by most home networks.

Simple Mail Transfer Protocol (SMTP)

Used for transmission of e-mail messages across the internet

web server

Used to host a website so it will be available through the Internet.

service packs

Users often uncover problems in a program even after its commercial release to the public. These problems are addressed with the publication of software updates or service packs. Users can download these software modules to repair errors identified in the program code.

software updates

Users often uncover problems in a program even after its commercial release to the public. These problems are addressed with the publication of software updates or service packs. Users can download these software modules to repair errors identified in the program code.

Graphical User Interface (GUI)

Uses icons to represent programs and actions, allowed users to interact with computers more easily (Point and Click Technology)

Bluetooth

Uses radio waves to transmit data signals over short distances (approximately 30 feet for Bluetooth 1 and 60 feet for Bluetooth 2 and 3).

Bluetooth

Uses radio waves to transmit data signals over short distances (less than 100 feet for Bluetooth 4).

third-generation language (3GL)

Uses symbols and commands to help programmers tell the computer what to do. This makes 3GL languages easier for humans to read and remember.

Unicode

Using 16 bits instead of 8 bits --> represents the alphabets of all modern and historic language and notational systems (1,115,00 code points and 96,000 unique charcters)

Cloud Storage

Using a service that keeps your files on the Internet rather then storing you files solely on a local device

Hacktivism

Using computers and computer networks ina subversive way to promote they are overwhelmed and legitimate used can't access the site

virtualization

Using specialized software to make individual physical servers behave as though they are more than one physical device.

Social Networking

Using the web to communicate and share information among your firend and other

Reset this PC

Utility program in Windows 10 attempts to diagnose and fix errors in your windows system fiiles that are causing your computer behave imporpoerly

Video Graphics Array (VGA) and Digital Video Interface (DVI)

VGA and DVI two ports on older LCD monitor connects like HDMI now

Authentication

Verification of login name and password

Big Data

Very large data sets that are analyzed to reveal patterns, trends and associations

TCP/IP Protocol

Vinton Cerf and Robert Kahn developed a set of communication rules that allows different types of computers to communicate (1973) IP Protocol (Dotted Quad or Dotted Decimal) - Set of four groups of numbers separated by periods --> computer connected to the Internet identify each other

Software Piracy

Violation a software license agreement by copying an application onto more computers than the license argreement permits

syntax error

Violation of the strict, precise set of rules that define the language.

VBA stands for __________.

Visual Basic for Applications

flowchart

Visual diagram of a process, including the decisions that need to be made along the way.

Which protocol uses standard internet connections to make phone calls over the internet

VoIP

____ technology is used to make free long-distance calls

VoIP

technology used to transmit phone calls over the internet

VoIP

A network consisting of two LANs separated by great physical distances is known as a:

WAN

Different types of email system

Web-Based Email: Managed with you web browers= and allows you to access your email from the web (ie gmail) Email Client: Need to be installed on your computer --> Open program, emails download to computer (ie Microsoft Outlook)

Social Media

Websites or apps allow user to create and share content and/or participate in social networking with each other

Social Media

Websites or apps that allow uses to create and share content and/or particpate in scoial netowrking with others

What is the difference between a power surge and a power spike?

When a power increase lasts 3 nanoseconds or more, it is a power surge. When a power increase lasts only 1 or 2 nanoseconds, it is a power spike.

Smartphone Processors.

When comparing processors, keep in mind processor speed and performance reviews (called benchmarks). Benchmarking reviews measure overall system performance. Reviewers run the same task on competing smartphones and compare the time it takes to complete the task.

Volatile storage

When the power is off, the data stored in RAM is cleared out.

data collision

When two computers send data at the same time and the sets of data collide somewhere in the connection media.

DNS (domain name system)

When you enter the URL in your browser, your computer must convert the URL to an IP address. To do this, your computer consults a database that is maintained on a DNS (domain name system) server that functions like a phone book for the Internet.

private key

When you receive the message, you use your private key to decode it. You are the only one who ever possesses the private key, and therefore it is highly secure. The keys are generated in such a way that they can work only with each other.

Interrupt

When you tell your computer to print your document, the printer generates a unique signal that tells the OS that it's in need of immediate help

What is the name of the Microsoft software that enables you to edit video?

Windows Movie Maker

If your system becomes unstable, you can reset it to a configuration from a past date by using __________.

Windows System Restore

Disk Cleanup

Windows utility that removes unnecessary file form your hard drive

Bluetooth Technology

Wireless transmissions standard that lets you connect devices

packet (or data packet)

With packet switching, data is broken into smaller chunks (each one called a packet or a data packet) that are sent over various routes at the same time.

second-level domain

Within each top-level domain are many second-level domains. A second-level domain needs to be unique within its own top-level domain but not necessarily unique to all top-level domains.

You can create a sophisticated online resume by using Microsoft ____

Word

Boolean Operators

Words such as AND, NOT, and OR that describe the relationship between keyworkds in a search

What was the first word processing application?

Wordstar

The standards to ensure uniformity of HTML around the world are set by the__________.

World Wide Web Consortium

Which of the following is NOT a mobile operating system?

XOS

Is there an alternative to remembering IP addresses?

Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.

Do I need any special software to use dedicated servers?

Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.

How do I perform encryption?

You can encrypt messages using private-key encryption. In private-key encryption, only the two parties involved in sending and receiving the message have the code.

Can you add more memory to a smartphone once you've bought one?

You can expand smartphone memory in some smartphones by using flash memory cards.

Thrashing

You can manually change this setting to increase the amount of hard drive speace allocated, but eventually your computer will become sluggish as it is forced to page more often

File Transfer:

You can transfer data between a smartphone and your computer in a number of ways including through a micro SD card, a USB connector, or wirelessly via Bluetooth or cloud services.

Is there any other safer way to encrypt emails?

You can use public-key encryption. In public-key encryption, two keys are created, one key for encoding and the other for decoding.

Can you tell me which of the smartphone operating systems is better?

You could use Windows, Android, or iOS depending on which OS you were most comfortable working with.

Smartphone Sychronization:

You need a wireless internet service provider to connect a smartphone to the Internet. Once connected to the Internet, your smartphone can take advantage of cloud storage services for transferring files and synchronizing your phone with your computer.

Smartphones and the Internet.

You need a wireless internet service provider to connect a smartphone to the internet.

What server is used to store applications?

You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.

How does the computer know the IP addresses of other computers?

Your computer consults a database maintained on a domain name server to determining other IP addresses.

The packets

contain destination information and are reassembled when they reach the destination. Packet contents vary depending on the protocol being followed. At a minimum, all packets must contain an address to which the packet is being sent, the address from where the packet originates, reassembling instructions if the original data was split between packets, and the data that is being transmitted.

synchronize

coordinate information on a PDA smartphone and PC

The Processing language was developed to make programming more accessible to ______.

creative and artistic people

When packets are sent through the Internet

data packets are sent through different routes to reach the destination.

structured (analytical) data

data that can be identified and classified as discrete bits of information (such as a name or phone number). Unstructured data includes nontraditional data such as audio clips (including MP3 files), video clips, and pictures that must be viewed in their entirety rather than in discrete segments.

time-variant data

data that doesn't all pertain to one period of time-for ex., data in a data warehouse.

A ____ server provides client computers with access to stored information

database

allows client computers to access a database

database server

The process of finding and correcting errors is called ____

debugging

Which of the following is not an advantage of installing a network in a business?

decentralization of files and data

_______ are points at which a program must choose from a range of different actions based on the value of its current inputs.

decision points

A(n)____________ server is used to fulfill one specific function on a network.

dedicated

In a network, ____ servers preform specific tasks such as handling e-mail or managing files.

dedicated

Servers such as print and database are examples of ___ servers that fulfill a specific network function

dedicated

Podcasts enable you to _______

deliver audio/video files via RSS

Denial-of-service (DoS) attack

denied access because a hacker is repeatedly making a request of that computer through a computer they have taken over as a zombie

Which ethical theory focuses on adherence to moral duties and rights?

deontology

Special programs that facilitate communication between a device and the OS are called

device drivers

The ethical theory that states that deities are all-knowing and set moral truth is

divine command theory

Most instant messaging services

do not use a high level of encryption.

Most IM services

do not use encryption for IM messages, and the secure data transmission software used on e-mail does not work with IM programs. Therefore, it is not a good idea to send sensitive information using instant messaging because it is susceptible to interception and possible misuse by hackers.

A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers.

domain name

used in place of an IP address

domain name

changeable IP address

dynamic IP

IP address for a computer is assigned from a pool of available IP addressed

dynamic addressing

A(n) _____ is a specialized computer with the sole function of storing, processing, and sending email

e-mail server

processes and delivers incoming and outgoing e-mail

e-mail server

Fiber-optic cable most likely would be used in a business network when

electrical or magnetic interference is present.

A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer

email client

File Transfer Protocol (FTP)

enables files to be downloaded to a computer or uploaded to other computers

A Trojan horse __________.

enables hackers to remotely control your PC as if they were sitting in front of it

A good way to protect your e-mails is to use _____

encryption

_____ is the process of encoding data so that only the person with the key can decode and read the message.

encryption

process of encoding an e-mail so that only the recipient can read it

encryption

The Binary sequence that instructs the CPU to run the code is called a(n) _____

executable program

Which of the following devices could NOT be connected using Bluetooth technology?

external Blu-ray drive

FBI Website

fbi.gov/about-us/investigate/cyber

In a database, the term ________ is synonymous with a category of information

field

Mac OS

first commercially available OS to incorporate the ability to interact with the computer with user-friendly point-and-click technology

A ____ is a visual representation of a process, including the decisions that need to be made along the way.

flowchart

Data in a ring topology network __________.

flows in one direction only

WML

format used to create web content for cell phones and smartphones

Dynamic addressing

is a temporary IP address assigned to you by your ISP from an available pool of IP addresses. It is assigned by the dynamic host configuration protocol (DHCP) each time you log on to the Internet. IP addresses can also be assigned statically. Static addressing means that the IP address for a computer never changes and is most likely assigned manually by a network administrator.

An IP address

is a unique identification number assigned to each computer, server, or device connected to the Internet. A typical IP address is expressed as a series of numbers separated by decimal points, such as 197.169.73.63, and is called a dotted decimal number. Internet Corporation for Assigned Names and Numbers (ICANN) is responsible for allocating IP addresses to network administrators. To find your IP address, go Google and type "what is my IP."

Digital Living Network Alliance (dlna.org)

is an organization working to standardize different kinds of appliances and network devices used in our homes.

Social Engineering

is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information

Input

is microphone and touch pad, digital camera

dynamic addressing

is more common than static addressing.

An e-mail client

is not a computer but rather the e-mailing application (such as Microsoft Outlook) from which an e-mail is sent. An e-mail server is not e-mailing software but rather a specialized computer that stores, processes, and sends e-mails. All e-mail has to pass through e-mail servers.

The multipurpose Internet mail extensions (MIME) protocol

is responsible for sending e-mail file attachments. The MIME specification was introduced in 1991 to simplify attachments to e-mail messages. All e-mail client software now uses this protocol for attaching files. E-mail is still being sent in text, but the e-mail client using the MIME protocol now handles the encoding and decoding of e-mail file attachments for users.

A domain name

is simply a name that takes the place of an IP address, making it easier for people to remember it. Yahoo.com and Aol.com are domain names. Domains are organized by level. The portion of the domain name after the dot is the top-level domain (TLD), such as .com. Within the top-level domain are many second-level domains, such as Amazon.com and Microsoft.com.

Smartphone OS

is stored in ROM

Packet switching

is the communications methodology that makes computer communication efficient. In packet switching, data is broken into smaller chunks called packets, which are sent over various routes at the same time. Packet switching doesn't require that a dedicated communications circuit be maintained.

data mining

is the process by which great amounts of data are analyzed and investigated. The objective is to spot significant patterns or trends within the data that would otherwise not be obvious.

HTTPS is different than HTTP because

it is a combination of HTTP and the Secure Sockets Layer (SSL)

Which of the following statements about using ghosting software is false?

it is difficult to use

All of the following are problems with the bus topology EXCEPT ____

it is expensive

All of the following are weaknesses of the bus topology EXCEPT __________.

it is expensive to implement

It can be difficult to fix a wireless connectivity problem because __________.

it might be difficult to replicate the problem

On what is Processing based?

java

Which of the following database systems uses artificial intelligence?

knowledge-based system

digital rights management free

legally free music

A microcontroller is a type of CPU that has ______ functionality.

limited

in a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field.

long text

Arduino programs generally run in a(n) ________, looking for input pins and making decisions to send through the output pins based on the input received..

loop

Bluetooth devices communicate at __________ bandwidths.

low

A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

Adware and spyware are examples of __________.

malware

Image backup or system backup

means that all system, apps, and data files are backed up. Ensures you capture changes to apps such as updates. Makes exact copy

All of the following network topologies were discussed in the Sound Byte EXCEPT __________.

mesh

Search engines that search other search engines are called

metasearch engines

Using applications on smartphones and tablets to buy and sell products is known as ________ commerce.

mobile

Hacker

most commonly defined as anyone who unlawfully breaks into a computer system

All of the following would be likely candidates for Bluetooth connectivity EXCEPT a ________.

mouse

Multishirking

multiple non work tasks at same time

network device

node

inkjet printers and laser printers are examples of

nonimpact

unstructured data

nontraditional database data such as audio clips (including MP3 files), video clips, pictures, and extremely large documents. Data of this type is known as a binary large object (BLOB) because it is actually in binary form.


संबंधित स्टडी सेट्स

Chapter 33: Management of Patients With Nonmalignant Hematologic Disorders 5

View Set

Chapter 51: Care of Patients with Musculoskeletal Trauma

View Set

Unit 1 Quiz: Psychology's History and Approaches

View Set

Lesson 3 - Displacing the Plains Indians

View Set

fin 240 mindtap: check your understanding (sdsu)

View Set

Espanol Quiz Study Words: Colors, School Supplies, Filling out a form, personal questions

View Set

DAT 123 Nutrition & Oral Health: Eating Well for a Healthy Mouth Dentalcare.com PDF

View Set