INTRO TO COMPUTING FORMATIVES AND QUIZLETS 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Normalization

a method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.

Opt-In Model

a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it

Opt-Out Model

a model of informed consent that permits the company to collect personal information until the customer specifically requests that the data not be collected

ARPANET

a national computer network from which the Internet developed

WiMax (Worldwide Interoperability for Microwave Access)

a new standard that extends the range of Wi-Fi networks using microwave connections

client

a node that requests and uses resources available from other nodes (unit's personal computer)

client

a node that requests and uses resources available from other nodes. typically a client is a user's personal computer

Whitelisting

a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity

virtualization

a process that allows a single physical computer to support multiple operating systems that operate independently

Tunneling

a process that encrypts each data packet to be sent and places each encrypted packet inside another packet

Risk Management

a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels

Master Data Management

a process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core mater data.

Risk Mitigation

a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan

Mass Customization

a production process in which items are produced in large quantities but are customized to fit the desires of each customer

instant messaging

a program allowing communication and collaboration for direct, live connections over the internet between two or more people

window

a rectangular area containing a document or message.

wireless revolution

a revolution that will dramatically affect the way we communicate and use computer technology

solid-state storage

a secondary storage device that has no moving parts. data is stored and retrieved electronically directly from these devices, much as they would be from conventional computer memory

Explicit Knowledge

The more objective, rational, and technical types of knowledge

cathode-ray tube (CRT) monitor

The most common type of monitor that are typically placed directly on the system unit or on the desktop.

Microphone

The most widely used audio-input device is the _______.

Correct Answer: C. microphone

The most widely used audio-input device is the _______. Answers: A. Webcam B. radio frequency card reader C. microphone D. stylus

Speakers and Headphones

The most widely used audio-output devices.

Clock speed

The number of times the clock that controls the computer ticks per second. Each clock tick would allow a single step in the Fetch - Decode - Execute cycle to complete. This is measured in Hertz (Hz) and a modern processor would usually have a clock speed measure in gigahertz. 1 gigahertz is 1 billion clock ticks per second!

Correct Answer: B. platform

The operating system is often referred to as the software environment or software _______. Answers: A. network B. platform C. window D. desktop

central processing unit (CPU)

The part of the computer that holds data and program instructions for processing the data. The CPU consists of the control unit and the arithmetic-logic unit. In a microcomputer, the CPU is on a single electronic component called a microprocessor chip.

Encryption

The process of converting an original message into a form that cannot be read but anyone except the intended receiver

Entity-Relationship (ER) Modeling

The process of designing a database by organizing data entities to be used and identifying the relationships among them

microcomputer (4 types)

a small computer that contains a microprocessor as its central processor

Aspect Ratio

The proportional relationship between a display's width and height.

Correct Answer: A. Aspect ratio

The proportional relationship between a display's width and height. Answers: A. Aspect ratio B. Resolution C. Dot pitch D. Clock speed

Correct Answer: C. pixels

The series of dots that form the image on a monitor are called _______. Answers: A. picas B. bits C. pixels D. bytes

Protocol

The set of rules and procedures governing transmission across a network

active display area

The size, or _______, is measured by the diagonal length of a monitor's viewing area.

Indent

The space between the edge of a line of text or a paragraph and the margin.

C

The standard for high definition optical discs is _______. A. DVD-RAM B. HD DVD C. Blu-ray D. HD CD

Trojan Horse

a software program containing a hidden function that presents a security risk

Packet Switching

The transmission technology that breaks up blocks of text into packets

document

The type of file created by word processors, for example, memos, term papers, and letters.

Firewall

a system (either hardware, software, or a combination of both) that prevents a specific type or information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network

inventory control system

a system that keeps records of the number of each kind of part or finished good in the warehouse

blog

a type of personal website where articles are regularly posted

disk cleanup

a windows troubleshooting utility that eliminates nonessential files

Cellular service providers

support voice and data transmission to wireless devices using cellular networks

Transaction Processing System (TPS)

supports the monitoring, collection, storage, processing, and dissemination of the organization's basic business transactions, each of which generates data

wireless LAN (WLAN)

a wireless local area network that uses radio frequencies to connect computers and other devices

Telecommuting

a work arrangement whereby employees work at home, at the customer's premises, in special workplaces, or while traveling, usually using a computer lined to their place of employment

Eliminating errors in a program is also called ______ the program. a) debugging b) modularizing c) coding d) clarifying

a) debugging

Money collected from or owed by customers is called ________.

accounts receivable

The correct sequence for the five phases in the systems development life cycle (SDLC) process is ________.

system definition requirements analysis component design Implementation system maintenance

_____ software controls where a program is stored in memory, how commands are converted so that the system unit can process them, and where files are saved.

system software

inventory control system

system that keeps records of each kind of part or finished good in the warehouse

transaction processing system

system that records day to day transactions

flash memory

also known as solid-state storage

spam blocker

also referred to as spam filter. software that uses a variety of different approaches to identity and eliminate spam or junk mail

storage area network (SAN)

an architecture to link remote computer storage devices to computers such that the devices are as available as locally attached drives

pointer

an item on the screen controlled by the mouse that is used to select items such as icons

blog

an online diary or commentary

windows os

an operating environment extending the capability of DOS

Privacy Policies

an organization's guidelines with respect to protecting the privacy of customers, clients, and employees

Real-time operating systems RTOS

another name for embedded operating systems

host

any computer system connected to a network that provides access to its resources

cybercrime

any criminal offense that involves a computer and a network

node

any device that is connected to a network (computer or printer)

document file

any text material

general purpose applications

application used for doing common tasks, such as browsers and world processors, spreadsheets, databases, management systems, and presentation graphics

Digital versatile discs (DVD)

are the standard optical discs in PCs and can store 4.7 GB

network

arrangement in which various communication channels are connected through 2 or more comps

expert systems

artificial intelligence that helps decision makers instead of them talking to actual human experts

Denial of service (DoS) attack

attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data

phishing

attempts to trick internet users into thinking a fake but official-looking website or email is legitimate

privacy

the browser mode that ensures your browsing activity is not recorded

WYSIWYG editors

Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______.

Correct Answer: A. WYSIWYG editors

Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______. Answers: A. WYSIWYG editors B. flash C. animations D. mobile apps

_________ applications allow you to play games, edit documents, and even create basic drawings without leaving your web browser.

Web-based

game port

Were used to connect video game controllers and joysticks.

C) Cloud computing

What is it called when servers on the Internet supply applications as a service, rather than a product?

Correct Answer: C. Cloud computing

What is it called when servers on the Internet supply applications as a service, rather than a product? A. Digital versatile computing B. Service computing C. Cloud computing D. Optical computing

) Ultra-high-definition television (UHDTV

What kind of specialized monitor is especially useful for graphic artists, designers, and publishers?

Fragmented

When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _____.

Correct Answer: A. fragmented

When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _______. Answers: A. fragmented B. contiguous C. sectored D. disbursed

Virtuilization

When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.

Correct Answer: D. Sectors

Which of the following is not a system software program type? Answers: A. Utilities B. Device drivers C. Language translators D. Sectors

Correct Answer: C. Stylus

Which of the following is not a type of scanning device? Answers: A. Optical scanner B. Bar code reader C. Stylus D. Character and mark recognition

Correct Answer: C. RAM

Which of the following is not an example of secondary storage? A. External hard drives B. RAID C. RAM D. Flash drives

RAM

Which of the following is not an example of secondary storage? Question 5 options: A) External hard drives B) RAID C) RAM D) Flash drives

Often stores the operating system

Which of the following is true about an internal hard disk?

Correct Answer: B. Fixed amount of storage

Which of the following is true about an internal hard disk? A. Variable amount of storage B. Fixed amount of storage C. Portable D. Slow

Access Speed

Which of the following measures the amount of time required by the storage device to retrieve data and programs?

C

Which of the following measures the amount of time required by the storage device to retrieve data and programs? A. Nonvolatile media B. Capacity C. Access speed D. RAM

Flash Memory

Which of the following offers a combination of the features of RAM and ROM?

MIDI

Which of the following ports is used for connecting musical instruments to a sound card?

Correct Answer: C. MIDI

Which of the following ports is used for connecting musical instruments to a sound card? Answers: A. MiniDP B. S/PDIF C. MIDI D. eSATA

e-SATA

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?

Correct Answer: A. eSATA

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? Answers: A. eSATA B. S/PDIF C. HDMI D. MiniDP

Correct Answer: B. Duplex

Which of the following printer features enables you to print on both sides of a sheet of paper? Answers: A. Simplex B. Duplex C. Resolution D. Dual Matrix

Web authoring

Which of the following programs would be used to create a website?

Correct Answer: D. Printer speed is measured in the number of words printed per minute.

Which of the following statements is incorrect? Answers: A. Printer resolution is measured in dpi (dots per inch). B. Printer output is often called hard copy. C. Memory within a printer is used to store printing instructions and documents waiting to be printed. D. Printer speed is measured in the number of words printed per minute.

Correct Answer: C. Spreadsheet

Which would be the most appropriate type of application to create, analyze, and forecast budgets? Answers: A. DBMS B. Word processor C. Spreadsheet D. Presentation graphics

microprocessor

the central processing unit (CPU) of a personal computer controls and manipulates data to produce information. the microprocessor is contained on a single integrated circuit chip and is the brains of the system.

Hypertext Transport Protocol (HTTP)

the communications standard used to transfer pages across the WWW portion of the Internet; defines how messages are formulated and transmitted

wordprocessor

the computer and the program allow you to create, edit, save, and print documents composed of text

mainframe computer

the computer can process several million program instructions per second. Sizable organizations rely on these room size systems to handle large programs and a great deal of data.

connectivity

the concept related to using computer networks to link people and resources

the Internet of Things (IoT)

the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet

Tacit Knowledge

the cumulative store of subjective or experiential learning; it is highly personal and hard to formalize

application software

the form of software the end user uses

Identity theft

the illegal assumption of someone's identity for the purpose of economic gain

online identity

the information that people voluntary post about themselves online

personal computers (PC)

the least powerful, yet the most widely used and fastest-growing type of computer

virtual

With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk.

Correct Answer: C. Virtual

With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Answers: A. Flash B. Cache C. Virtual D. Extended

mother board

the main circuit board of a computer

Best Practices

the most efficient and effective ways to complete a business process.

supercomputers

the most powerful type of computer. Special, high-capacity computers used by very large organizations. typically used to process massive amounts of data

smartphone

the most widely used handheld computers. cell phones with wireless connections to the Internet and processing capabilities

Microsoft Word

the most widely used word processor

Workflow

the movement of information as it flows through the sequence of steps that make up an organization's work procedures

modulation

the name of the process of converting from digital to analog

Audio

______-input devices convert sounds into a form that can be processed by the system unit.

Video Editors

_______ are used to edit videos to enhance quality and appearance.

marketing

the organizational department that plans, prices, promotes, sells, and distributes an organization's goods and services

media

the physical material that holds the data and programs

user interface

the portion of the application that allows you to control and to interact with the program

linkedin

the premier business oriented social networking site

Ethics

the principles of right and wrong that guide an individual in making decisions

Risk Analysis

the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it

encryption

the process of coding information to make it unreadable except to those who have a special piece of information known as a key

demodulation

the process of converting from analog to digital

Profiling

the process of forming a digital dossier

computer communications

the process of sharing data, programs, and information between two or more computers

Privacy

the right to be left alone and to be free of unreasonable personal intrusion

procedures

the rules or guidelines for people to follow when using software, hardware, and data

Biometrics

the science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics

domain name

the second part of the URL; it is the name of the server where the resource is located.

Procedures

the set of instructions about how to combine components of information systems in order to process information and generate the desired output

NIC (network interface cards)

these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter

data transmission specifications

these are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel

secondary storage devices

things like hard-disk drive, data and programs that can be retained after the computer has been shut off

illusion of anonymity

thinking that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy

proxy server

this is a server that all communications between the company's internal networks and the outside world have to pass through

optical

this type of storage uses pits and lands to represent 1s and 0s

Primary Activities

those business activities related to the production and distribution of the firm's products and services, thus creating value

specialized applications

thousands of other programs that are more narrowly focused on specific disciplines and occupations

CD, DVD, BD

three types of optical discs

DRM

to prevent copyright violations, corporations often use:

top management

top level managers are concerned with long range strategic planning. they supervise middle management

star network

topology in which each device is connected directly to a central network switch

tree network

topology in which each device is connected to a central node, either directly or through one or more other devices

bus network

topology in which each device is connected to a common cable called a backbone, and all communications travel alongside.

ring network

topology in which each device is connected to two other devices

On a hard disk a ________ is a concentric ring.

track

Rings of concentric circles without visible grooves, part of how files are stored and organized on a flexible disk.

track

The final step of the implementation phase of the systems life cycle is to A. develop documentation. B. train the users. C. select the conversion type. D. write the implementation report.

train the users.

data processing system

transaction processing system that keeps track of routine operations and records these events in a database

data processing system

transaction processing system that keeps track of routine operations and records these events in a databse

input devices

translate data and programs that humans can understand into a form that the computer can process

Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.

beta

desktop OS

type of operating system that controls single desktop or notebook

linux

type of unix operating system alternate to windows

Back Door

typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures

optical discs

use laster technology to store data and programs

hard disk

use rigid metallic platters that are tacked one on top of another

external hard drives

use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk

graphical user interface (GUI)

used by most general-purpose applications because it displays graphical elements called icons to represent familiar objects

Unix

used by servers on the Web, mainframe computers and powerful microcomputers

cloud computing

uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet

cable modem

uses the same coaxial cable as the television, creates a high-speed connection using USB or Ethernet

Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the a) program tracking log b) project management database c) program specifications document d) management information system

c. program specifications document

The three structures of structured programming are __________. a. sequence, order, and process b. selection, loop and iteration c. sequence, selection, and loop d. if, else, and then

c. sequence, selection, and loop

A program error that violates the grammar rules of the programming language is a(n) _______ error. a) modular b) logic c) syntax d) language

c. syntax

application software

can be described as end user software and is used to accomplish a variety of tasks

third-party cookie

cookie that is usually generated by an advertising company that is affiliated with the website you are visiting

manage resources

coordinate memory, processing, storage, and devices

information

data that has been processed by a computer system.

How tightly the bits (electromagnetic charges) can be packed next to one another on a diskette.

density

solid-state storage

does not have any moving parts, is more reliable, and requires less power than hard disks. Saves data and information electronically but is not volatile

hard disk

enclosed disk drive containing one or more metallic disks.

IP address

every computer on the Internet has a unique numeric address called an:

When a file cannot be saved on a single track across contiguous sectors and has to be broken up into small parts it is said to be ______.

fragmented

scam

fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return

midrange

fridge size machines b/w personal comps & mainframes in processing speed and data storage capacity

Social Engineering

getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges

GUI

graphic user interface. special screen that allows software commands to be issued thru use of graphic symbols or icons or pulldown menus

icons

graphical elements that represent familiar objects

QR code

graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and websites

When a computer is running virtualiztion software, the operating system for each virtual machine is known as the _______.

guest operating system

Enclosed disk drive containing one or more metallic disks. Hard disks use magnetic charges to record data and have large storage capacities and fast retrieval times.

hard disk

cyberbullying

he use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

When a hard disk's read/write head makes contact with the hard disk's surface or with particles on its surface resulting in a catastrophic loss of data.

head crash

clock speed measured is in

hertz

The next generation of optical disc.

hi def (high definition)

sTYLUS

hich of the following is not a type of scanning device?

Digital versatile disc (DVD)

hich of these is not an example of solid state storage?

viruses

hidden instructions that migrate through networks and operating systems and become embedded in different programs

In a graphical user interface a graphical representation for a program, file, or function is called a(n) _____.

icon

Disk Cleanup

identifies and eliminates nonessential files

Rogue Wi-Fi hotspots

imitate free networks to capture any and all information

Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system. A) system definition B) component design C) system maintenance D) implementation

implementation

disk caching

improves hard-disk performance by anticipating data needs

history files

include the locations, addresses, of sites that you have recently visited

File compression

increase storage capacity by reducing the amount of space required to store data and programs

network os

interactive software between applications and computers coordinating and directing activities between computers on a network. this operating system is located on one of the connected computers hard disks, making that system the network server.

disk defragmenter

is a tool that rearranges the data on your volume and reunites fragmented data so your computer can run more efficiently.

Programs that are based on _________ graphics rely on mathematics to generate and manipulate a variety of shapes.

vector

When a computer is running virtualization software, it is operating as though it were two or more separate and independent computers known as

virtual machines

Utility suites often provide programs that will protect your system from dangerous programs called computer ______.

viruses

random-access memory RAM

volatile, temporary storage that holds the program and data the CPU is presently processing. called temporary because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.

wiki

website that allows people to fill in missing information or correct inaccuracies on it by directly editing the pages.

facebook

well known social media site

compact discs (CD)

were the first widely available optical format for PC users with 700 MB of storage

software

what controls hardware?

mistaken identity

when the electronic profile of one person is switched with another

modem

widely used communication device that modifies audio, video, and other types of data into a form that can be transmitted across the Internet

broadband

widely used for DSL, cable, and satellite connections to the Internet

general-purpose applications

widely used programs in all career areas

baseband

widely used to connect individual computers that are located close to one another

Video game design software

will help you organize your thoughts and guide you through the game design process including character development and environmental design

TEST

witness

web authoring software

word processing program for generating web pages

system software

works with end users, application software, and computer hardware to handle the majority of technical details

The final task in the design phase of the systems life cycle is to A. select the best design. B. design alternative systems. C. write a systems design report. D. examine hardware requirements.

write a systems design report.

Freedom of Information Act

you are entitled to look at your records held by government agencies by law

memory

is contained on chips connected to the system board and is a holding area for data instructions and information.

Computer Fraud and Abuse Act

makes it a crime for unauthorized persons to view or damage data using any computer across state lines

malware

malicious programs created to damage or disrupt a computer system

supervisor

manager responsible for managing and monitoring workers.

middle management

managers that deal with control and planning

The tremendous amount of secondary storage required by large organizations.

mass storage

An actual physical material that holds data and programs.

media

wearable

mobile computers like Apple watch that you wear on your body

Select all the types of system software.

operating systems utilities language translators device drivers

Windows Phone 8

owned by Microsoft and used in a variety of portable devices mainly for social networking and instant messaging

system unit

part of a personal computer that contains the CPU. also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system

people

part of the information system that includes the end users

ALU

performs mathematical and logical computations

utility

performs specific tasks related to managing comp resources

utility

performs specific tasks related to managing computer resources or files. Norton utility for virus control and system maintenance is a good example of a utility

Regional managers can compare their regular sales reports with that of the other regional managers by using ________.

periodic reports

desktop computer

personal computer that is small enough to fit on top of or alongside a desk but too big to carry around

laptop computer

personal computers that are portable and lightweight and fit in most briefcases

vector images

photos that are made with geometric shapes or objects

bitmap images

photos that are made with pixels

Bumpy areas that optical discs use to represent 1s and 0s.

pit

file compression

process of reducing the storage requirements for a file

uploading

process of transferring info from comp user is operating to remote comp

mainframe`

process several million programs per second

information

processed facts

desktop publishing

program that allows you to mix tex and graphics to create publications of professional quality

plug ins

program that is automatically loaded and operates as part of a browser

virus

program that migrates through networks and operating systems, and attaches themselves to different programs and databases

Database management system (BDMS)

program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.

HTML hypertext markup language

programming language that creates document files used to display webpages

trojan horses

programs that appear to be harmless, but they contain malicious programs

Presentation graphics

programs that combine a variety of visual objects to create attractive, visually interesting presentations.

operating systems

programs that coordinate computer resources, provide an interface between users and the computer, and run applications

word processors

programs that create text-based documents,

worms

programs that simply replicate themselves over and over again

web authoring programs

programs typically used to create sophisticated commercial websites

back up

protects from disc failure

Heath Insurance Portability and Accountability Act (HIPAA)

protects medical records

Gramm-Leach Bliley Act

protects personal financial information

Although the development time is shorter, it is sometimes more difficult to manage the project and to control costs with A. rapid applications development. B. prototyping. C. systems analysis. D. systems maintenance.

prototyping.

Business Intelligence (BI)

provide COMPUTER-BASED support for COMPLEX, nonroutine decisions, primarily for middle managers and knowledge workers.

Dialog boxes

provide additional information and request user input

dialog box

provide information or request input

Cable service

provided by cable television companies using their existing television cables. These connections are usually faster than DSL

DSL service (digital subscriber line)

provided by telephone companies using existing telephone lines to provide high-speed connections

e-mail

provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents

dialog box

provides additional info and requests user output

dialog box

provides additional information and requests user input

secondary storage

provides permanent or nonvolatile storage

texting

provides very efficient direct text communication between individuals using short electronic messages.

This is an outline of the logic of the program you will write.

pseudocode

microblog

publishes short sentances (twitter)

microblog

publishes short sentences that only take a few seconds to write, rather than long stories or posts like a transitional blog

data

raw unprocessed facts that are input to a computer system that will give compiled information when the computer processes those facts. Data is also defined as facts or observations about people, places, things, and events.

ROM

read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read.

employee-monitoring software

record virtually everything you do on the computer for the sake of a company

window

rectangular area containing document or message

file compression

reducing storage requiremnts for a file

Improve performance by expanding external storage, improving access speed, and providing reliable storage.

redundant array of inexpensive disks (RAID)

ROM

refers to chips that have programs built into them at the factory. the user cannot change the contents of such chips. the cpu can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer

density

refers to how tightly the magnetic charges on a hard disk are packed next to one another

downlink

refers to receiving data from a satellite

client-based email`

requires email client program to be installed on comp

warm boot

restarting your computer while the computer is already on and the is not turned off

A file is said to be fragmented when it cannot be saved on a single track across contiguous wedge shaped sections called _______.

sectors

The purpose of _________ software is to keep you, your computer, and your personal information safe from a variety of threats.

security

Logic Bombs

segments of computer code embedded within an organization's existing computer programs

Notebook (laptop) computer

small, portable system unit that contains electronic components 4- 10 lbs

packets

smaller parts of a message sent separately over the internet and reassembles into the correct order before delivery

Anti-Malware Systems (antivirus software)

software packages that attempt to identify and eliminate viruses, worms, and other malicious software

Privilege

a collection of related computer system operations that can be performed by users of the system

Database

a collection of related data. It is the electronic equivalent of a file cabinet

database

a collection of related information like employee names, addresses, and phone numbers. it is organized so that a computer program can quickly select the desired pieces of information and display them for you

Network administrator

a computer specialist responsible for efficient network operations and implementation of new networks

Network

a connecting system (wireline or wireless) that permits different computers to share resources

system unit

a container that houses most of the electronic components that make up a computer system

Denial-of-Service Attack

a cyber-attack in which an attacker sends a flood of data packets to the target computer with the aim of overloading its resources

ethics

standard of moral conduct

Second Generation mobile telecommunications (2G)

started in the 1990s using digital radio signals

Third generation mobile telecommunications (3G)

started in the 2000s and provided serves capable of effective connectivity to the internet, marking the beginning of smartphones

cold boot

starting the computer after it has been turned off

SRAM

static random access memory is a type of memory chip which is faster and requires less power than dynamic memory.

SAN is a mass storage development to link remote computer storage devices to computers such that the devices are as available as locally attached drives.

storage area network (SAN)

optical disc

storage device that can hold over 17 gigabytes of data, which is the equivalent of several million typewritten pages. lasers are used to record and read data on the disc.

Solid-state storage

storage that has no moving parts

coaxial cable

a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core

server

a host computer with a connection to the Internet that stores document files used to display web pages

Secure Socket Layer (SSL) (Transport Layer Security)

An encryption standard used for secure transactions such as credit card purchases and online banking

DIMM (dual in-line memory module)

An expansion module used to add memory to the system board.

usually connects to a USB or Thunderbolt port

An external hard disk _______.

Secondary Key

An identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy

Synchronous Optical Network (SONET)

An interface standard for transporting digital signals over fiber-optic lines; allows the integration of transmissions from multiple vendors

bit

1 or 0

Terabyte

1024 Gigabytes

byte

8 bits

Unicode

A 16-bit code designed to support international languages, like Chinese and Japanese.

can be erased and rewritten

A CD-RW disc _______.

Chrome OS

An operating system designed by Google for netbook computers and Internet connectivity through cloud computing.

disk cleanup

A Windows troubleshooting utility that eliminates nonessential files.

general-purpose application

A browser is an example of a:

8 bits

A byte is formed by a group of _____.

Logic Circuit

A circuit made by combining a sequence of logic gates.

The ______ mobile operating system was introduced in 2007 and is now owned by Google.

Android

Clip Art

A collection of graphic images that can be inserted into documents, presentations, web pages, and spreadsheets; simple drawings that are included as collections with many software packages.

Code of Ethics

A collection of principles intended to guide decision making by members of an organization

Business Process

A collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customers.

Database

A collection of related files or tables containing data

Ethernet

A common local area network protocol

creating a new folder on your computer

A computer can become infected with viruses in all the following ways, except by _____.

E-Book Reader

A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines.

all-in-one

A desktop computer that has the monitor and system unit housed together in the same case (e.g., Apple's iMac).

tower computer

A desktop system unit placed vertically.

Copyright

A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years

Inline Graphic

A graphic that is part of a line of text.

Floating Graphic

A graphic to which text wrapping has been applied, making the graphic independent of text and able to be moved anywhere on the page.

Byte

A group of 8 bits that represent a single character

Entity Classes

A grouping of entities of a given type

Slot

Area on a system board that accepts expansion cards to expand a computer system's capabilities.

Output device

A hardware component of a computer system that is manipulated depending on the results of some processing. Examples of output devices are: monitor, speakers, printer, motors, lights and others.

Input device

A hardware component of a computer system that is used to gather information. Examples of input devices are: keyboard, mouse, microphone, switches and buttons, thermometer, light sensor, pressure sensor and others.

coaxial

A high-frequency transmission cable that delivers television signals as well as connects computers in a network

Ethernet port

A high-speed networking port that allows multiple computers to be connected for sharing files or for high-speed Internet access.

Digital Subscriber Lines (DSL)

A high-speed, digital data-transmission technology using existing analog telephone lines

Fifth-generation languages (5GLs) incorporate the concepts of which of the following?

Artificial intelligence.

These second-generation languages use abbreviations or mnemonics that are automatically converted to the appropriate sequence of 1s and 0s.

Assembly

toggle key

A key that turns a feature on or off.

combination key

A key, that when held down in combination with another key, performs an action.

Optical storage

A kind of secondary storage device that uses lasers to read pits and lands of an optical disc. The laser is either reflected into or away from a detector and this is interpreted as the 1s and 0s of the binary number system. Example of optical storage are CDs, DVDs and BluRays. The capacity of a CD can be as low as 640Mb and a BluRay can store up to 100Gb.

Constant

A lable referring to a location in memory containing a value that can be accessed but not changed by a program.

Tab Leader

A line that appears in front of tabbed text.

AND

A logic gate that outputs 1 if both inputs are 1.

character encoding standards

Assign unique sequence of bits to each character.

Data Mart

A low-cost, scaled-down, version of a data warehouse designed for the end-user needs in a small organization, or in a strategic business unit (SBU) or department in a large organization

magnetic-card reader

A machine that reads encoded information stored on a thin magnetic strip located on the back of a card.

resolution

A matrix of pixels.

Clip

A media file, such as a graphic, photograph, sound, movie, or animation, that can be inserted into a document.

Boolean algebra

A method for expressing mathmatically a logic circuit.

stylus

A pen-like device commonly used with tablet PCs and PDAs.

technical writer

A person who prepares instruction manuals, technical reports, and other scientific or technical documents.

Software

A program or collection of programs that enable the hardware to process data

utility suite

A program that combines several utilities in one package to improve system performance.

This lists the assets, liabilities, and the equity of an organization.

Balance sheet

window

A rectangular area that can contain a document, program, or message

carpal tunnel syndrome

A repetitive strain injury consisting of damage to the nerves and tendons in the hands.

Data Warehouse

A repository of historical data that are organized by subject to support decision makers in the organization

pixel

A series of dots that form images on a monitor. (See also picture elements)

Internet Protocol (IP)

A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.

Configuration table

A store of information about devices on a network.

Chip

A tiny circuit board etched on a small square of sandlike material called silicon. A chip is also called a silicon chip, semiconductor, or integrated circuit.

flat-panel monitor

A type of monitor that is much thinner and requires less power to operate than CRTs.

DVI (Digital Video Interface) Port

A type of port that provides a connection to a digital monitor.

VGA (Video Graphic Adapter) port

A type of port that provides a connection to an analog monitor.

Backup and Restore

A utility program included with the many versions of Windows that makes a copy of all files or selected files that have been saved onto a disk.

constant

A value that does not change

EBCDIC (Extended Binary Coded Decimal Interchange Code)

Binary coding scheme that is a standard for minicomputers and mainframe computers.

Nano bytes

All of the following are commonly used units of measurement to describe memory capacity, except _____.

Correct Answer: D. Nanobyte (NB)

All of the following are commonly used units of measurement to describe memory capacity, except _____. Answers: A. Megabyte (MB) B. Gigabyte (GB) C. Terabyte (TB) D. Nanobyte (NB)

clock speed

Also called clock rate. It is measured in gigahertz, or billions of beats per second. The faster the clock speed, the faster the computer can process information and execute instructions.

Utility suites

BitDefender Norton Utilities ZoneAlarm

The next generation of optical format (high definition) that has a capacity of 25 to 100 gigabytes.

Blu-Ray Disc (BD)

_________ software aids architects, engineers, and many others who need to create a digital model of an object.

CAD

One of the most widely used optical formats.

CD (compact disc)

Some ERP systems integrate _________ capabilities that allow sales departments to manage call centers, support customers, and keep track of sales commissions.

CRM

Which of the following is an example of a cloud-based backup utility?

Carbonite

Binary data

Categorical consisting of only two possible outcomes

PC card

Also known as Personal Computer Memory Card International Association (PCMCIA) card. Credit card- sized expansion cards developed for portable computers.

Network Interface Card (NIC)

Also known as a network adapter card. They are used to connect a computer to one or more computers forming a communication network whereby users can share data, programs, and hardware.

Center

An alignment in which an item is centered between the margins.

Internet Protocol (IP) Address

An assigned address that uniquely identifies a computer on the Internet

Phishing Attack

An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.

Digital Dossier

An electronic description of an individual and his or her habits

A list of questions helps guide the systems analyst and end user through key issues for the present system.

Checklist

Concatenation

Combining two strings into a single string.

Port

Connecting socket on the outside of the system unit. Used to connect input and output devices to the system unit.

_________ software is used to create and manage complex databases.

DBMS

A newer optical format that has replaced CDs as the standard; similar to CDs except that more data can be packed into the same amount of space.

DVD (digital versatile disc or digital video disc)

digital versatile disc

DVD stands for:

Knowledge

Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity

Clickstream Data

Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a web site.

Which of the following tools present data or information flow within an information system? A. Grid chart B. Decision table C. System flowchart D. Data flow diagram

Data flow diagram

Information

Data that has been organized so that they have meaning and value to the recipient

Asynchronous Transfer Mode (ATM)

Data transmission technology that uses packet switching and allows for almost unlimited bandwidth on demand.

DBMS

DataBase Management System - the system that separates the applications from the data, and provides features that allow the database systems to be created, interrogated, and maintained.

This system is a flexible tool for data analysis, since its reports do not have a fixed format.

Decision support system

A(n) _____ shows the decision rules that apply when certain conditions occur.

Decision table

A program associated with a device that works with the operating system to allow communication between the device and the rest of the computer system.

Device driver

Problems arising in this approach would spell disaster. A. Direct approach B. Parallel approach C. Phased approach D. Pilot approach

Direct approach

Audit

Examination of of information systems, their inputs, outputs, and processing

The marketing department identifies, investigates, and develops new products and services.

False

_________ is software that is completely free to use without any specified time restrictions.

Freeware

PAths

Hard disks store and organize files using all of the following, except _______. A) tracks B) sectors C) cylinders D) paths

input device

Hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process.

Information Technology Components

Hardware, software, databases, and networks

_______ is an operating system feature that provide(s) online assistance for operating system functions and procedures.

Help

Information Technology Infrastructure

IT components plus IT services

CERN

In Switzerland, where the web was introduced in 1992

Dialog Boxes

In many application programs, this feature is used to provide information or request input.

Correct Answer: C. Dialog boxes

In many application programs, this feature is used to provide information or request input. Answers: A. Windows B. Menus C. Dialog boxes D. Pointer

What documentation shows the income, expenses, and difference between them for a company during a specific time period?

Income statements

RFID (radio-frequency identification) tag

Information chips that are embedded in merchandise to track their location.

joystick

Input device for computer games.

Coaxial Cable

Insulated copper wire; used to carry high-speed data traffic and television signals

Trade Secret

Intellectual work, such as a business plan, that is a company secret and is not based on public information

network OS

Interactive software between applications and computers coordinating and directing activities between computers on a network. This operating system is located on one of the connected computers' hard disks, making that system the network server.

Correct Answer: A. Thumb

Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connecting to the Web. Answers: A. Thumb B. Traditional C. Notebook D. Combination

home networks

LAN that allows different computers to share resources, including a common internet connection

_______ convert programming instructions into a language that the computer can process.

Language translators

AC adapter

Laptops and tablets use _____ that are typically located outside the system unit.

Correct Answer: A. AC adapters

Laptops and tablets use _____ that are typically located outside the system unit. Answers: A. AC adapters B. batteries C. power supply units D. MiniDc

Which of the following is an example of password management software?

LastPass

This is an example of the _______ operating system, which is a powerful alternative to Windows.

Linux

_________ is an open source operating system with hundreds of distributions that are available commercially or as a free download.

Linux

As much as 75 percent of the total lifetime cost for an application program is spent on this.

Maintenance

Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers?

Management information system (MIS)

Monitoring system performance is an example of how the operating system ________.

Manages resources

Memory

Memory is contained on chips connected to the system board and is a holding area for data instructions and information (processed data waiting to be output to secondary storage). RAM, ROM, and CMOS are three types of memory chips.

Backing Storage

Memory which can be used for long term storage

This level of management is involved with tactical planning and implementing the long-term goals within an organization.

Middle management

GUI

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.

Correct Answer: C. graphical user interface

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects. Answers: A. integrated package B. dialog box C. graphical user interface D. menu button

_______ operating systems are used to control and coordinate computers that are linked together.

Network

Distributed Processing

Network architecture that divides processing work between two or more computers, linked together in a network

Hard Drive

Non-volatile storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces. The capacity can be anything from a few hundred gigabytes to several terrabytes. The device is either permanently installed within the computer case or can be portable

AC adapter

Notebook computers use AC adapters that are typically outside the system unit. They plug into a standard wall outlet, convert AC to DC, provide power to drive the system components, and can recharge batteries.

unix

OS developed for midrange comps

windows 8

OS from 2012 to better inegrate desktop OS with mobile OS

These systems are used in managing documents, communicating, and scheduling.

Office automation systems

mouse pointer

Often in the form of an arrow, it moves on the screen as the user moves the computer mouse.

sectors

On a hard disk each track is divided into invisible wedge-shaped sections called _______.

Correct Answer: B. sockets

On the motherboard, the connection points for chips are referred to as _____. Answers: A. slots B. sockets C. ports D. lines

use file compression

One way to improve the storage capacity of a hard disk is to _______.

Windows utilities

Optimize Drives Disk Cleanup File History

expansion card

Optional device that plugs into a slot inside the system unit to expand the computers' abilities. Ports on the system board allow cables to be connected from the expansion board to devices outside the system unit.

Communications Channels

Pathway for communicating data from one location to another

High Definition Multimedia Interface (HDMI)

Port that provides high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.

optical audio connections

Port used to integrate computers into high-end audio and home theatre systems.

Which of the following is an example of presentation software?

PowerPoint

In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system

Prepares a preliminary investigation report

_________ software enables users to create electronic slideshows that are used to present information.

Presentation

Cloud Printers

Printers connected to the Internet that provide printing services to others on the Internet are called _______.

Correct Answer: D. cloud printers

Printers connected to the Internet that provide printing services to others on the Internet are called _______. Answers: A. dot-matrix printers B. thermal printers C. plotters D. cloud printers

primary storage

RAM is sometimes referred to as:

digital video camera

Record motion digitally on a disk or in the camera's memory.

Compression

Reduction in file size to reduce download times and storage requirements.

Semiconductor

Silicon chip through which electricity flows with some resistance.

registers

Small high-speed storage locations in a process that temporarily hold data and instructions.

Handheld

Smallest type of system unit, designed to fit into the palm of one hand.

Flash Memory Card

Smartphones use which of these storage technologies?

Correct Answer: C. Flash memory card

Smartphones use which of these storage technologies? Answers: A. Optical drive B. Solid state drive C. Flash memory card D. Flash drive

Socket

Sockets provide connection points on the system board for holding electronic parts.

application

Software designed to carry out a useful real-world task.

NIC

Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.

interactive whiteboard

Specialized devices with a large display connected to a computer or projector (see also digital whiteboard)

_________ software is used for entering, calculating, and analyzing sets of numbers.

Spreadsheet

_______ operating systems control a single desktop or laptop computer.

Stand-alone

Boot

Starting or restarting your computer.

cold boot

Starting the computer after it has been turned off.

Gathering and analyzing data is part of this phase. a.Systems analysis b.Systems implementation c.Preliminary investigation d.Systems design

Systems analysis

ExpressCard

Technology replacing the PC Card to provide a direct connection to the system bus. Also see PC card.

Correct Answer: A. Bitrate

Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character

Correct Answer: B. Word

Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character

Code editor

Text area used to enter code in an IDE.

User Interface

The boundary between the computer and the user.

embedded

The category of operating system used for handheld devices.

Correct Answer: B. Embedded

The category of operating system used for handheld devices. Answers: A. Network B. Embedded C. Stand-alone D. Open source

Security

The degree of protection against criminal activity, danger, damage, and/or loss

Clock Chip

The electronic device in a computer that controls the timing of signals.

Database

The electronic equivalent of a file cabinet is a _______.

database

The electronic equivalent of a file cabinet is a _______.

Correct Answer: A. database

The electronic equivalent of a file cabinet is a _______. Answers: A. database B. word processor C. spreadsheet D. query

Secondary Storage

The long term memory of the computer where programs and data are kept when they aren't being used. Hard disks, optical drives and solid state drives are all examples of secondary storage.

Primary Storage

The main working memory of the computer made up of ROM and RAM. This is where the computer stores data and programs while they are being worked on.

The Internet ("the Net")

The massive network that connects computer networks of businesses, organizations, government agencies, and schools around the world, quickly, seamlessly, and inexpensively.

carrier package

The material that chips are mounted on which then plugs into sockets on the system board.

Correct Answer: A. microphones

The most widely used audio-output devices. Answers: A. microphones B. speakers and headsets C. cloud printers D. faxes

Windows

The most widely used personal computer operating system.

Domain Names

The name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left.

Word

The number of bits (such as 16, 32, or 64) that can be accessed at one time by the CPU.

Command Line

The place where typed commands are given to the operating system.

reading

The process of accessing information from secondary storage devices is referred to as _______.

Correct Answer: C

The process of accessing information from secondary storage devices is referred to as _______. A. backing up B. restoring C. writing D. reading

Correct Answer: C. clock speed

The processing speed of a microprocessor is typically represented by its _____. Answers: A. bus line B. control unit C. clock speed D. ALU

Ergonomics

The science of adapting machines and work environments to people; focuses on creating an environment that is safe, well lit, and comfortable

Font Size

The size of characters measured in points.

Correct Answer: B. active display area

The size, or _______, is measured by the diagonal length of a monitor's viewing area. Answers: A. resolution B. active display area C. aspect ratio D. dot pitch

Database Management System (DBMS)

The software program (or group of programs) that provides access to a database

Kerning

The space between standard combinations of letters.

BIOS (basic input/output system)

The start-up instructions for a computer, including the specifics concerning the amount of RAM and the type of keyboard, mouse, and secondary storage devices connected to the system unit.

Correct Answer: D. Ergonomics

The study of human factors related to things people use. Answers: A. Headgear B. RSI C. Technical study D. Ergonomics

Domain Name System (DNS)

The system administrated by the Internet Corporation for Assigned Names (ICANN)that assigns names to each site on the internet

Business-Information Technology Alignment

The tight integration of the IT function with the strategy, mission, and goals of organization

Which among the following would not be described in the systems analysis report? A. The current information system B. The requirements for a new system C. The development schedule D. The training requirements for users

The training requirements for users

telephony

The transmission of telephone calls over computer networks.

Internet telephony (Voice over Internet Protocol or VoIP)

The use of the Internet as the transmission medium for telephone calls.

Image Editors

These are specialized graphics programs for editing or modifying digital photographs.

Blu-ray

These discs have a capacity of 50 gigabytes on one side.

Correct Answer: D

These discs have a capacity of 50 gigabytes on one side. A. HD DVD B. CD C. DVD D. Blu-Ray

Unicode

This character encoding scheme allows non-English characters and special characters to be represented.

Correct Answer: B. Unicode

This character encoding scheme allows non-English characters and special characters to be represented. Answers: A. ASCII B. Unicode C. EBCDIC D. ANSIC

disk caching

This hard-disk performance enhancement anticipates data needs

contrast ratio

This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.

Correct Answer: A. Contrast ratio

This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black. Answers: A. Contrast ratio B. Dot Pitch C. Active display area D. Resolution

App Store

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

App store

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

Correct Answer: A. MICR

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. Answers: A. MICR B. OCR C. OMR D. UPC

disk caching, RAID, and file compression

Three ways to improve the performance of a hard disk include _______.

________ systems help supervisors by generating databases that act as the foundation for other information systems.

Transaction processing

Accounts payable refers to money the company owes its suppliers for materials and services it has received.

True

CAD/CAM systems use powerful personal computers running special programs that integrate the design and manufacturing activities.

True

Customer profiles, census data, and economic forecasts are examples of external data.

True

Demand reports do not have to be produced on a regular basis.

True

Expert systems capture the knowledge of human experts and store it in a knowledge base.

True

Knowledge workers use specialized information systems, called KWSs, to create information in their area of expertise.

True

Middle-level managers are responsible for tactical planning and the implementation of long-term goals.

True

Unicode

Up to 32-bit system to code the character set of a computer (usually 16-bit or 32-bit versions).

hexadecimal system (hex)

Uses 16 digits to represent binary numbers.

_________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.

Virtual reality

parallel processing

When several CPUs work on the same program together

Voice over IP

Which of the following allows the transmission of voice and often video communication over the Internet?

Printer speed is measured in the number of words printed per minute.

Which of the following statements is incorrect? A) Printer resolution is measured in dpi (dots per inch). B) Printer output is often called hard copy. C) Memory within a printer is used to store printing instructions and documents waiting to be printed. D) Printer speed is measured in the number of words printed per minute.

OMR

Which of the following types of character recognition systems is used for standardized multiple-choice testing?

Correct Answer: C. OMR

Which of the following types of character recognition systems is used for standardized multiple-choice testing? Answers: A. UPC B. MICR C. OMR D. OCR

Optical DIsk

Which of these is not a mass storage device?

The operating system feature which is a rectangular area for displaying information and running programs.

Window

_______ is the most popular desktop operating system.

Windows

_________ can run mobile-style apps in the area known as the Start screen, while running traditional software in the more familiar desktop.

Windows 8

Versions of Windows

Windows 8 Windows 7

The ______mobile operating system was originally developed in 2012 by Microsoft to support a variety of portable devices, including smartphones.

Windows Phone 8

Desktop Systems

With these systems, input and output devices are located outside the system unit.

Correct Answer: A. Desktop systems

With these systems, input and output devices are located outside the system unit. Answers: A. Desktop systems B. Personal digital assistants C. Smartphones D. Laptop computers

Which of the following is an example of word processing software?

Word

_________ software provides tools for creating and editing all kinds of text-based documents such as letters, resumes, and reports.

Word processing

Which of the following is NOT a popular computer programming language?

Xero

Input

_______ is any data or instructions that are used by a computer.

Correct Answer: A. Dialog boxes

_______ provide additional information and request user input. Answers: A. Dialog boxes B. Windows C. Toolbars D. Ribbons

database

a collection of organized data that allows access, retrieval, and use of data

computer network

a communication system that connects two or more computers so that they can exchange information and share resources

Metasearch Engine

a computer program that searches several engines at once and integrates the findings of the various search engines to answer queries posted by users

Distributed Denial-of-Service (DDoS) Attack

a denial-of-attack that sends a flood of data packets from many compromised computers simultaneously

attachment

a file attached to email message

presentation file

a file created by presentation graphics programs to save presentation materials

attachment

a file, such as a document or worksheet, that is attached to an email message

Record

a grouping of logically related fields

Internet

a huge computer network available to everyone with a personal computer and a means to connect to it. it is the actual physical network made up of wires, cables, and satellites as opposed to the web, which is the multimedia interface to resources available on the Internet.

copyright

a legal concept that gives content creators the right to control use and distribution of their work

Bandwidth

a measurement of the width or capacity of the communication channel

feild

a place in a database record where a category of information can be entered or located

Flash Drive

a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain; also known as a pen drive, keychain drive, thumb drive, jump drive

Linux

a popular open source alternative to Windows

extranet

a private network that connects more than one organization

Virtual Private Network (VPN)

a private network that uses a public network (usually the internet) to securely connect users by using encryption

intranet

a private network within an organization that resembles the Internet

Knowledge Management (KM)

a process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory anf that typically reside within the organization in an unstructured manner

javascript

a scripting language that adds basic interactivity to web pages

Master Data

a set of core data, such as customer, product, employee, vendor, geographic location, and so on that span the enterprise information systems

Warm Site

a site that provides many of the same services and options of the hot site but does not include the company's applications

enterprise storage system

a strategy developed by large organizations to promote efficient and safe use of data across the networks within their organizations

Risk Acceptance

a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur

Risk Limitation

a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat

client based email

a system that requires a special program known as an email client is a users personal computer

Certificate Authority

a third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.

Public-Key Encryption

a type of encryption that uses two different keys, a public key and a private key

network attached storage (NAS)

a type of file server designed for homes and small businesses. NAS is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.

backup and restore

a utility program that helps protect you from the effects of a disc failure by making a copy of selected or all files that have been saved onto a disk.

Chat Room

a virtual meeting room where you can communicate in real time, where groups come to "gab" electronically

internet

a way to connect to other people and computers

When a program makes a true or false decision, it is an example of a(n) _______ logic structure. a) if-then-else b) do until c) do while d) what-if

a. if-then-else

The __________ structure involves repeating a sequence until a condition is met. a) loop b) sequence c) conditional d) selection

a. loop

The program's processing steps are grouped into logically-related programming statements called a) modules b) unit c) object d) component

a. modules

The control structure used to perform a series of statements one after the other is called a) sequential b) selection c) loop d) random

a. sequential

Measures the amount of time required by the storage device to retrieve data and programs.

access speed

mobile application

add on features for a variety of mobile devices, including smartphones netbooks and tablets

mobile application

add on features for variety of mobile devices

The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):

algorithm

Adware

alien software designed to help pop-up ads that appear on your screen

image editors

an application for modifying bitmap images

Data Governance

an approach to managing information across an entire organization

chrome OS

an operating system designed by google for netbook computers and internet connectivity through cloud computing

multitasking

an operating system feature that allows more than one application to run at a time

unix

an operating system originally developed for midrange computers. it is now important because it can run on many of the more powerful personal computers.

primary storage

another name for RAM

Flowcharts and pseudocode are examples of tools used in the program __________ phase. a) specification b) design c) code d) test

b. design

When a program repeats a portion of software code as long as a certain condition doesn't exist, it's using a(n) _______ structure. a) if-then-else b) do until c) do while d) what-if

b. do until

The actual coding of a program is done by a(n) a) systems analyst b) software engineer c) end-user d) database administrator

b. software engineer

This shows the relationship between input and output documents. a.Investigation report b.Grid chart c.Top-down analysis method d.Checklist

b.Grid

e-commerce

b2b b2c c2c

database field (column)

basic unit data entry

machine code

binary representation of a program

Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.

bitmap

Starting or restarting the computer is called ______ the system.

booting

temporary Internet files

browser cache, contains web page content and instructions for displaying this content

history file

browsers store the locations of sites visited in a:

pits

bumpy areas on the surface of optical discs

electronic commerce

buying and selling goods electronically

e commerce types (B2B, B2C, C2C and examples)

buying and selling goods over the internet

A(n) __________ error could be the result of the programmer making an incorrect calculation. a) syntax b) general protection c) logic d) breakpoint

c) logic

How much a particular storage medium can hold.

capacity

embedded operating system

cell phone operating systems

switch

central node that coordinates the flow of data by sending messages directly between sender and receiver nodes

microprocessor

central processing unit (cpu) of a personal computer controls and manipulates data to produce info

rewritable discs

changeable, portable storage options that are popular for storing and sharing audio, video, and large multimedia presentations

wireless communication

changed the way we communicate with one another

language translator

changes things into computer processable language

memory

chips connected to system board

The _________ is a temporary location for things that are being moved or copied.

clipboard

Internet servers that supply applications as a service for online storage.

cloud storage

A ______ boot is when you power on a computer that is off.

cold boot

Information system

collection of hardware, software, people, data, procedures, and the internet

database

collection of related info

botnet

collection of zombies

database filed

column. given names displayed at top of each table

USB drive

combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high speed scanners, printers, and video capturing devices

Broadcast Media (Wireless Media)

communications channels that use electromagnetic media (the "airwaves") to transmit data

CAD/CAM

comp aided design

The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU.

compiler

Embedded OS

completely stored within ROM

spreadsheet

computer produced spreadsheet based on the traditional accounting worksheet that has rows and columns used to present and analyze data

software (2 major kinds)

computer program consisting of step by step instructions, directing the computer on each task it will perform

expert system

computer program that provides advice to decision makers who would other wise rely on human experts

Select all of the common names associated with someone who resolves common technical problems faced by computer users.

computer support specialist help-desk technician technical support specialist

privacy

concerns the collection and use of data about individuals

Hyperlink

connection or link to other documents or web pages that contain related content

hyperlink

connection or link to other documents or web pages that contain related information

firewall

consists of hardware and software that control access to a company's intranet and other internal networks

twisted-pair cable

consists of pairs of copper wire

analog signals

continous electronic waves sent and received by telephones

NOS (network operating systems)

control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources

Communications Controls (Network Controls)

controls that deal with the movement of data across networks

Physical Controls

controls that restrict unauthorized individuals from gaining access to a company's computer facilities

Access Controls

controls that restrict unauthorized individuals from using information resources and are concerned with user identification

The first step in implementing a new system is to determine the A. hardware requirements. B. software requirements. C. conversion type. D. best alternative.

conversion type

domain name server (DNS)

converts text-based address to IP address

first-party cookie

cookie that is germinated only by the website you are currently visiting

Piracy

copying a software program without making payment to the owner

Wide area networks (WAN)

countrywide and worldwide networks

Virtual private networks (VPN)

create a secure private connection between a remote user and an organization's internal network

word processors

create text-based documents and are one of the most flexible and widely used software tools.

word processor

create, edit, print text based documents

worksheet files

created by electronic spreadsheets to analyze things like budgets and to predict sales

presentation file

created with presentation programs

production

creates finished goods and dervices using raw materials and personnel

The actual writing of a program in a programming language is called a) program design b) logic structure c) language translation d) coding

d) coding

Metadata

data about data

information brokers

data gatherers who collect, analyze, and sell personal data

Relational Database Model

data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data

A transaction processing system is also referred to as a ________.

data processing system

cloud computing

data stored at a server on the Internet and available anywhere the Internet can be accessed.

Cloud computing

data stored on a server on the internet

The place that provides access to computer resources allowing you to interact with the operating system's graphical user interface.

desktop

graphical site map

diagram a websites overall design

Read-only discs

discs that cannot be written on or erased by the user- stuff you buy in the store

A hard disk performance enhancement that improves processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU.

disk caching

tab

divide menus into major activity areas

manuals

documents written with procedures by computer specialists

Digital Certificate

electronic document created and digitally signed by a trusted third party that certifies the identity of the owner of a public key

communication systems

electronic systems that transmit data from one location to another

disk defragmenter

eliminates unnecessary fragments and rearranges files

the operating system on a smartphone would be ______.

embedded

mobile os

embedded operating system that controls a smartphone

Virtual private networks (VPN)

encrypt connections between company networks and remote users such as workers connecting from home

A type of system that large organizations use to promote efficient and safe use of data across the networks within their organizations.

enterprise storage system

hardware

equipment that includes a keyboard, monitor, printer, the computer itself, and the devices that are controlled by the software programming.

A CD that can be written to many times. (See also CD-RW compact disc rewritable)

erasable optical disc

big data

ever-growing volume of data

A hard disk performance enhancement that increases storage capacity by reducing the amount of space required to store data and programs.

file compression

Utility programs

file compression diagnostic antivirus backup

database file

file containing highly structured and organized data created by database management programs.

database file

file containing highly structured data created by database programs

document file

file created by a word processor to save documents such as letters, research papers, and memos

Rebuilding a file that has been compressed.

file decompression

Documents, worksheets, programs, and presentations are all examples of _____.

files

You would run this program on your hard drive to ______ and improve system performance.

free up disk space

QR Code

graphics that appear as black and white boxes that automatically link mobile devices to a variety of diff content including games, text, videos, websites

connectivity

greatly expands the capability and usefulness of information systems

In a GDSS, the ________ is generally the decision maker.

group

Unified Communications (UC)

hardware and software platform that simplifies and integrates all forms of communications - voice, email, instant messaging, location, and video-conferencing - across an organization.

storage devices

hardware that reads data and programs from storage media

Fourth general mobile telecommunications (4G)

has begun to replace 3g networks in some areas with providers using LTE connections to provide faster transmission speeds

information system

has several parts: people, procedures, software, hardware, data, and the Internet

pixels

he series of dots that form the image on a monitor are called _______.

Cybercrime

illegal activities conducted online

redundant arrays of inexpensive disks (RAID)

improve performance by expanding external storage, improving access speed, and providing reliable storage

general purpose application

includes word processing programs, spreadsheets, presentation graphics, and database management systems

viruses

instructions that migrate thru networks and OSs and become embedded in diff programs. sometimes designed to destroy data

web

introduced in 1992 and prior to the web the internet was all text. the web made it possible to provide a multimedia interface

The ________ keeps records of the number of each kind of part or finished good in the warehouse.

inventory control system

web bugs

invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge

sectors

invisible wedge-shaped sections that divided each track

TCP/IP (transmission control protocol/internet protocol)

involves identifying sending and receiving devices and breaking information into smaller parts called packets

Flat areas that optical discs use to represent 1s and 0s.

land

File History

makes a copy of all files that are in the libraries, contacts, and favorites and on the desktop

Digital Millennium Copyright Act

makes it illegal to deactivate or otherwise disable any anti-piracy technologies including DRM technologies

access speed

measures the amount of time required by the storage device to retrieve data and programs

In a graphical user interface, ______ provide a list of options and commands.

menus

privacy mode

mode in the browser that ensures that your browsing activity is not recorded on your hard disk

blogs

online diaries or commentaries

Internet servers that supply applications as a service for storage (See also Cloud Storage)

online storage

Virtual Universities

online universities from which students take classes from home or an off-site location via the internet

An ______ operating system is one in which users can modify and further develop the code.

open source

software platform

operating system consisting of collection of programs to handle technical details depending on the type of operating system

A device with a laser that projects a tiny beam of light on a disc to reflect the light to determine a pit or land.

optical disc drive

microprocessor

part of system unit that controls and manipulates data to produce information

memory

part of the system unit that is a holding area for data, instructions, and information

Computer monitoring software

perhaps the most invasive and dangerous type of spyware

secondary storage

permanent storage used to preserve programs and data that can be retained after the computer is turned off

Menus

present commands that are typically displayed in a menu bar at the top of the screen

RAM or memory, where data is stored before being processed.

primary storage

downloading

process of transferring information from a remote computer to the computer one is using

uploading

process of transferring information from the computer the user is operating to a remote computer

specialized applications

programs that are narrowly focused on specific disciplines and occupations. some of the best known are multimedia, web authoring, graphics, virtual reality, and artificial intelligence

web page editors

programs that provide support for website design and HTML coding

Project resources can be scheduled, planned, and controlled using ________.

project managers

help

provide online assistance for operating system functions and procedures

buttons

provide shortcuts for quick access to commonly used commands

ROM

read only memory. user cannot change contents

Ribbons

replace menus and toolbars by organizing commonly used commands into a set of tabs. These tabs display command buttons that are the most relevant to the tasks being performed by the user

exception report

report that calls attention to unusual events

periodic report

reports for a specific time period as to the health of the company or a particular department of the company

digital signals

represent the presence or absence of an electronic pulse and are sent and received by computers

cylinder

runs through each track of a stack of platters

The ________ activity records the customer requests for products or services.

sales order processing

JavaScript`

scripting language that adds basic interactivity to webpages

Provides permanent or nonvolatile storage.

secondary storage

Hardware where data and programs can be retained after the computer has been shut off. (see also storage device)

secondary storage device

solid state storage

secondary storage device that has no moving parts

password

secret words or phrases that must be keyed into a computer system to gain access

Determining whether the system can be made secure against unauthorized use is part of A. analyzing the data. B. writing the systems design report. C. selecting the best system. D. testing the system.

selecting the best system.

To keep using _________ after the trial period, you must purchase a full version or a code that can be entered into the software.

shareware

modem

short for modulator-demodulator

income statement

shows company's financial position over period of time

Galleries

simplify the process of making a selection from a list of alternatives. This is accomplished by graphically displaying the effect of alternatives before being selected.

window

simply a rectangular area that can contain a document, program, or message.

mobile apps

small programs primarily designed for mobile devices

flash memory cards

small solid-state storage devices widely used in portable devices

tablet

smaller, lighter, and generally less powerful personal computers than laptops. Usually have touch-screens instead of standard keyboards

Storage devices with no moving parts. Data and information are retrieved electronically.

solid-state storage

executive support system

sophisticated software that can draw together data from an organizations databases in meaningful patterns and highly summarized forms

Basic categories of operating systems

stand-alone network embedded

First Generation mobile telecommunications (1G)

started in the 1980s using analog radio signals to provide analog voice transmission service

peer-to-peer network

strategy of having nodes have equal authority and can act as both clients and servers

client/server networks

strategy of using central servers to coordinate and supply services to other nodes on the network

cloud suite

suite stored at a server on the Internet and available anywhere from the Internet

cloud suite

suite stored at a server on the internet & available anywhere on internet

Specialized suites

suites focus on specific applications

cloud suites

suites that are stored at a server on the Internet and are available anywhere you can access the Internet.

Utility suites

suites that include a variety of programs designed to make computing easier and safer

transaction processing system

system that records day to day transactions, such as customer orders, bills, inventory levels, and production output

microcomputer hardware

system unit, input/output, secondary storage, communication

Determining whether the new procedures are actually furthering productivity is part of the A. testing of the new sample phase. B. selecting the best system phase. C. designing of alternatives phase. D. systems audit phase.

systems audit phase.

The costs versus the benefits of designs and the outlines of their effects is presented in the A. systems analysis report. B. preliminary investigation report. C. initialization report. D. systems design report.

systems design report

Strategic Information Systems (SISs)

systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity

uplink

term relating to sending data to a satellite

TEST

test

web authoring

the act of creating a site

hardware

the equipment that processes the data to create information

production

the organizational department that actually creates finished goods and services using raw materials and personnel

Privacy

the right to be left alone and to be free of unreasonable personal intrusions

Information Privacy

the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others.

pixels

the thousands of dots that form images

DBMS database management system

to organize, manage, and retrieve data. DBMS programs have five subsystems: DBMS engine, data definition, data manipulation, applications generation, and data administration. (Microsoft access)

web authoring programs

typically used to create sophisticated commercial sites

data

unprocessed facts

digital right management (DRM)

used by corporations to control access to electronic media and files

optical disc drives

uses a laser that projects a tiny beam of light to read the disc

strategy

way of coordinating the sharing of information and resources

hotspots

wireless access points that provide internet access

Correct Answer: B. can be erased and rewritten

A CD-RW disc _______. A. can be written to only once B. can be erased and rewritten C. cannot be written on D. cannot be erased

Router

A communications processor that routes messages through several connected LANs or to a wide area network such as the Internet

Kilobyte

1024 bytes.

application software

Apps software that performs useful work

control unit

Component of a processor that directs and coordinates most of the operations in the computer.

crackers

Computer criminals who create and distribute malicious programs.

Network Access Points (NAPs)

Computers that act as exchange points for Internet traffic and determine how traffic is routed

Analog Signals

Continuous waves that transmit information by altering the amplitude and frequency of the waves

Table

A grouping of logically related records

Cross-Functional Business Process

A process in which no single functional area is responsible for its completion; multiple functional areas collaborate to perform the function

Authentication

A process that determines the identity of the person requiring access

Accumulator

A register in the CPU that stores data currently being used by the CPU.

Smartphone

A type of cell phone that offers a variety of advanced functionality, including Internet and e-mail.

Peer-to-Peer (P2P) Processing

A type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server.

Hanging Indent

A type of indent in which the second and following lines of a paragraph are indented more than the first.

laser printer

A type of printer that uses a laser light beam to produce images with excellent letter and graphics quality.

Virtual Group (Team)

A work group whose members are in different locations and who meet electronically.

Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______.

A) WYSIWYG editors

optical scanner

Accepts documents consisting of text and/or images and converts them to machine-readable form.

Bus

All communication travels along a common connecting cable called a bus or a backbone. As information passes along the bus, it is examined by each device on the system board to see if the information is intended for that device. See bus line and ethernet.

integer

All whole numbers (both positive and negative) and zero.

Motherboard

Also called a system board; the communications medium for the entire system.

arithmetic operation

Fundamental math operations: addition, subtraction, multiplication, and division.

Correct Answer: B. Server

In a network operating system, this computer coordinates all communication between computers. Answers: A. Client B. Server C. Terminal D. Mode

Correct Answer: C. Host

In a virtualized environment, this operating system runs on the physical machine. Answers: A. Guest B. Client C. Host D. Home

There are three basic decision models used in GDSS: operational, strategic, and financial.

False

Which of the following is an example of video editing software?

Final Cut Pro

Font Effect

Font formatting that applies a special effect to text such as small caps or superscript.

parallel processing

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____.

Correct Answer: C. parallel processing

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____. Answers: A. arithmetic-logic processing B. multiplexer processing C. parallel processing D. graphics coprocessing

PCI Express (PCIe)

New type of bus that is 30 times faster than PCI bus.

Correct Answer: D

On a hard disk each track is divided into invisible wedge-shaped sections called _______. A. bits B. platters C. cylinders D. sectors

Sockets

On the motherboard, the connection points for chips are referred to as _____.

Pits and lands

Optical discs use these to represent data.

operating systems

Programs that coordinate computer resources, provide an interface, and run applications are known as:

spreadsheets

Programs that organize, analyze, and graph numerical data such as budgets and financial reports.

read-only memory (ROM)

Refers to chips that have programs built into them at the factory. The user cannot change the contents of such chips. The CPU can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer, for example. Also called firmware.

Information Technology (IT)

Relates to any computer-based tool that people use to work with information and support the information and information-processing needs of an organization

RFID

Radio frequency identification uses radio frequencies to represent a number that can be scanned for input into a computer system.

To create successful software, computer programmers go through a series of steps known as the:

SDLC

disk defragmenter

A Windows utility that optimizes disk performance by eliminating unnecessary fragments and rearranging files.

virtualization

A process that allows a single physical computer to support multiple operating systems that operate independently.

A process by which a program is divide into two modules called objects.

(OOP) Objected- oriented programming

Correct Answer: A. E-book reader

A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Answers: A. E-book reader B. Interactive whiteboard C. HDTV D. Flat panel monitor

Transmission Control Protocol/Internet Protocol (TCP/IP)

A file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted.

Hot Sites

A fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicate your company's computing resources and provide near realtime recovery of IT operations.

File

A grouping of logically related records

Intranet

A private network that uses the TCP/IP protocols.

bluetooth

A short-range radio communication standard that transmits data over short distances of up to approximately 33 feet

Character

A sinlge alphabetic or numeric character.

Bullet

A small graphic symbol used to identify an item in a list.

Accountability

A tenet of ethics that refers to determining who is responsible for actions that were taken

liquid crystal display (LCD)

A thin, flat display made up of any number of color or monochrome pixels arrayed in front of a light source or reflector.

Core

A traditional processor has a single core. Modern processors have more than one core so, in effect, are like having more than one processor. A dual core processor will have two cores and so can perform two operations at the same time.

Crypto processor

A type of specialty processor devoted exclusively to protecting your privacy.

capacity

The _______ of a secondary storage device indicates how much data the storage medium can hold.

Correct Answer: B. capacity

The _______ of a secondary storage device indicates how much data the storage medium can hold. Answers: A. access B. capacity C. memory D. storage

Line Spacing

The amount of space between lines of text.

Paragraph Spacing

The amount of space between paragraphs.

taking the letters of the first six alphabetic characters found on the top row of keys

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.

Bit rate

The bit rate is the space available for each sample measured in kilobits per second (kbits/s). (128 kbits/s is 128 kilobit per second of sampled sound).

Microprocessor

The central processing unit (CPU) of a microcomputer controls and manipulates data to produce information. The microprocessor is contained on a single integrated circuit chip and is the brains of the system.

Character set

The characters available to a computer

hardware

The keyboard, mouse, display, and system unit are:

Blue-ray disc

The large capacity, high-definition optical discs designed to store hi-def video and video games are _______.

Internet

The largest network in the world is [the]:

Risk

The likelihood that a threat will occur

clock speed

The processing speed of a microprocessor is typically represented by its _____.The processing speed of a microprocessor is typically represented by its _____.

Mobile

This type of embedded operating system is used by smartphones.

This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.

Top management

On a hard disk a _______ is a concentric ring.

Track

duplex

Two categories of laser printers are _______.

personal and shared

Two categories of laser printers are _______.

Correct Answer: B. personal and shared

Two categories of laser printers are _______. Answers: A. thermal and personal B. personal and shared C. ink-jet and high-definition D. active-matrix and passive matrix

Work Group

Two or more individuals who act together to perform some task, on either a permanent or temporary basis.

linux

Type of UNIX operating system initially developed by Linus Torvalds, it is one of the most popular and powerful alternatives to the Windows operating system.

Virtual

Type of keyboard that uses a touch screen as the input device.

Correct Answer: D. Virtual

Type of keyboard that uses a touch screen as the input device. Answers: A. PDA B. Wireless C. Traditional D. Virtual

Cloud

Type of storage that can be accessed anywhere with an internet connection

hotspots

Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities.

The size of a key chain; these hard drives connect to a computer's USB port enabling a transfer of files.

USB drive

flash drives

USB drives are also known as:

parallel processing

Used by supercomputers to run large and complex programs.

crash

When a read-write head makes contact with the hard disk's surface, it causes a head:

Correct Answer: A

Which of the following characteristics about RAID is incorrect? A. expanded storage capability B. fast access speed C. highly reliable D. one high-capacity hard disk drive

Entity-Relationship (ED) Data

Document that shows data entities and attributes and relationships among them

output

Processed data or information.

Creating finished goods and services using raw materials and personnel pertains to which of the following functions?

Production

desktop publishing

Program that allows you to mix text and graphics to create publications of professional quality.

Lower- level lang. are closer to 0s and 1s. Higher-level lang. are closer to the languages of humans.

Programming language generations

desktop publishing

Programs that allow you to mix text and graphics and focus on flexible page design and layout.

Correct Answer: B. Desktop publishing

Programs that allow you to mix text and graphics and focus on flexible page design and layout. Answers: A. Databases B. Desktop publishing C. Word processors D. Image galleries

Presentation Graphics

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:

presentation graphics

Programs that combine a variety of visual objects to create attractive, visually interesting presentations.

_________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

Encryption

device driver

Every device that is connected to the computer has a special program associated with it called a device driver that allows communication between the operating system and the device.

Which of the following is an example of spreadsheet software?

Excel

Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.

Executive support systems (ESS)

universal serial bus (USB) port

Expected to replace serial and parallel ports. They are faster, and one USB port can be used to connect several devices to the system unit.

Microprocessor

In most personal computer systems, the CPU is contained on a single chip called the _____.

Which of the following is an example of audio editing and production software?

Pro Tools

Information Security

Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

presentation files

created by presentation graphics programs to save presentation materials

Document files

created by word processors to save documents such as memos, term papers, and letters

worksheet file

created with spreadsheet programs

When you no longer need a file or a folder you can use the _________ command to remove it from your drive.

delete

device driver

every device that is connected to the comp has a special program associated with it called a device driver that allows communication b/w operating system & device

device driver (peripheral devices)

every device that is connected to the computer has a special program associated with it called a device driver that allows communication between the operating system and the device

ethernet cables

example of a twisted-pair cable that is often used in networks and to connect a variety of components to a system unit

Removable hard drives used the same as internal disks.

external hard drive

Fiber-optic service (FiOS)

faster connection than cable or DSL. Is showing up in some areas, but is a new technology and not widely available

supercomputer

fastest calculating device ever invented, processing billions of program instructions per second. used by very large organizations like NASA

ribbon

feature of Microsoft Office 2007, 2010, and 2013 that replaces menus and toolbars by organizing commonly used commands into a set of tabs

ribbon

feature of Microsoft office 07, 2010, 2013 that replaces manuals and toolbars by organizing commonly used commands into set of tabs

the 3 stages of the fetch-execute cycle

fetch decode execute

A dedicated computer with very large storage capacity that provides users access to fast storage and retrieval of data.

file server

The most fundamental components of storage that users interact with are the:

files

Data Manipulation

finding entry into someone's computer network and leaving a prank message

Credit card-sized solid-state storage devices widely used in notebook computers.

flash drive

Credit card-sized device used to store and transfer images and digital media.

flash memory card

DSL (digital subscriber line)

modem that uses standard phone lines to create a high-speed connection directly to your phone company's offices. usually external and connect with either a USB or ethernet

image editor

modifies bitmap images

supervisor

monitors and manages workers

display

most common type of output device

people

most important part of any information system

twitter

most popular microblogging site that enables you to add new content from your browser, instant messaging application, or even a mobile phone

Windows

most widely used microcomputer operating system and can run with a variety of different microprocessors

Mulitcore

multiple cores on the same mother board

The ability to run multiple programs at the same time is known as:

multitasking

software

name for a program or programs

specialized apps

narrow focus programs on specific disciplines

Similar to a file server except simpler and less expensive.

network attached storage (NAS)

Metropolitan area network (MAN)

network that spans distances up to 100 miles

Local area networks (LAN)

networks with nodes that are in close physical proximity

mesh network

newest topology and does not use a specific physical layout , rather requires that each node have more than one connection to the other nodes

Chip Carries

ntegrated circuits must be mounted on _____, which are then plugged into the system board.

Specialized high-capacity secondary storage devices designed to meet storage requirements of large organizations.

mass storage devices

inventory

material possessions that can be sold

inventory

materials or products a company has in stock

capacity

measures how much a particular storage medium can hold

middle management

middle level managers deal with control and planning. they implement the long term goals of the organization

desktop publishing

mixing text and graphics to create professional publications

tablet and smartphones use _____ type of operating system

mobile OS mobile operating system

head crash

occurs when a readwrite head makes contact with the hard disk's surface or with particles on its surface

sending and receiving devices

often a computer or specialized communication device

The operating system is often called the software environment or software _______.

platform

A component of a hard disk made of a rigid metallic material and stacked one on top of another.

platter

In a graphical user interface, the _____ is used to select items.

pointer

Structured Query Language (SQL)

popular relational database language that enables users to perform complicated searches with relatively simple instructions

virtualization

process that allows single physical comp to support multiple OS's that operate independently

cookies

small data files that are deposited on your hard disk from websites you have visited

USB drives

so compact that they can be transported on a key ring

executive support system

software that can draw together data from an organization's databases in meaningful patterns

Employee Monitoring Systems

systems that monitor employees' computers, e-mail activities, and Internet surfing activities

In a graphical user interface, _____ divide menus into major activity areas.

tabs

A device that provides automatic access to data archived on a large collection or library of tapes.

tape library

accounts payable

the activity that shows the money a company owes to its suppliers

accounts receivable

the activity that shows what money has been received or is owed by customers

media

the actual physical material that holds the data and programs

network

the arrangement in which various communications channels are connected through two or more computers. the largest network in the world is the internet.

topology

the arrangement or configuration of a network

broadband

the bandwidth typically used for DSL, cable, and satellite connections to the Internet

Uniform Resource Locator (URL)

the set of letters that identifies the address of a specific resource on the Web

transfer rate

the speed with which a modem transmits data is called its:

transfer rate

the speed with which modems transmit data, typically measured in megabits per second

access

the three primary privacy issues are accuracy, property, and:

vector

the type of image that consists of geometric shapes

software piracy

the unauthorized copying and/or distribution of software

communication devices

used for a personal computer to routinely communicate with other computer systems located as near as the next office or as far away as halfway around the world using the Internet

output devices

translate the processed information from the computer into a form that humans can understand

fiber-optic cable

transmits data as pulses of light through tiny tubes of glass

voiceband (low bandwidth)

used for standard telephone communications

iOS

used in iPhone, iPod Touch, and iPad

keyboard and mouse

two most common input devices

medium band

used in special leased lines to connect to midrange computers and mainframes as well as to transmit data over long distances

Illustration programs

used to create and edit vector images

spyware

used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet

Tabs

used to divide the ribbon into major activity areas

Video editors

used to edit videos to enhance quality and appearance.

The means for a user to interact with application programs and computer hardware describes the _____.

user interface

Wi-Fi

uses high-frequency radio signals to transmit data

linux

type of UNIX operating system initially developed by Linus Torvalds, it is one of the most popular and powerful alternatives to the Windows operating system

keystroke logger

type of computer monitoring software that records every activity and keystroke made on a computer system, including red card numbers, passwords, and emails

app store

typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge

toolbars

typically appear below the menu bar and include small graphic elements called buttons that provide shortcuts for quick access to commonly used commands

Database files

typically created by database management programs to contain highly structured and organize data

hard disks

typically use to store programs and very large data files

Spam

unsolicited e-mails

windows 7

update from last Microsoft OS

network gateway

a device that allows one LAN to be linked to other LANs or connected to the LAN of another office group

Patent

a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years

directory server

a specialized server that manages resources, such as user accounts, for an entire network

income statement

a statement that shows a company's financial performance, income, expenses, and the difference between them for a specific time period

desktop OS

a type of operating system that controls a single desktop or notebook computer

Personal area network (PAN)

a type of wireless network that works within a very small area- immediate surroundings

Mobile Portal

a web site that is accessible from mobile devices.

Commercial (Public) Portal

a web site that offers fairly routine content for diverse audiences; offers customization only at the user interface

Affinity Portal

a web site that offers single point of entry to an entire community or affiliated interests

Corporate Portal

a web site that provides a single point of access to critical business information located inside and outside of an organization

Expert Systems (ES)

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge and expertise within a specific domain

Portal

A Web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, using advanced search and indexing techniques.

Data Storage Device

A device capable of permanently or temporarily storing digital data. Examples could be RAM, a hard disk, flash drive or optical storage.

artificial intelligence (AI)

A field of computer science that attempts to develop computer systems that can mimic or simulate human thought processes and actions.

Bandwidth

A transmission capacity of a network, stated in bits per second

Broadband

A transmission speed ranging from approximately one megabit per second up to several terabits per second.

Correct Answer: A. Image editors

These are specialized graphics programs for editing or modifying digital photographs. Answers: A. Image editors B. Desktop publishing C. Presentation graphics D. Illustrations

Correct Answer: B. Photo editors

These programs are used to create and edit vector images. Answers: A. Illustration programs B. Photo editors C. Presentation graphics D. Image galleries

Correct Answer: A. Illustration programs

These programs are used to create and edit vector images. Answers: A. Illustration programs B. Photo editors C. Presentation graphics D. Image galleries

Multitouch

These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.

Coprocessors

These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.

Correct Answer: C. Coprocessors

These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. Answers: A. Smartcards B. CPUs C. Coprocessors D. NIC cards

Fire Wire

These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices.

Correct Answer: A. FireWire

These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices. Answers: A. FireWire B. Serial C. Parallel D. AGP

Correct Answer: C. App store

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge. Answers: A. QR store B. Cloud C. App store D. Mobile store

communication channel

This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.

dot pitch

A function of a monitor that is the distance between each pixel. (See also pixel pitch)

Database

A group of logically related files that stores data and the associations among them

Field

A grouping of logically related characters into a word, a small group of words, or complete number

Business Process Management (BPM)

A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

Indent Maker

A marker on the horizontal ruler that shows the indent settings for the active paragraph.

Extranet

A network that connects parts of the intranets of different organizations

multicore chip

A new type of chip that provides two independent CPUs, allowing two programs to run simultaneously. Also see central processing unit.

organic light organic light- emitting diode(OLED)

A newer technology that has the benefits of lower power consumption and longer battery life as well as thinner displays.

Bus

A part of a computer architecture that transfers data and signals between components of the computer.

Instance

A particular entity within an entity class

Byte

Unit consisting of eight bits. There are 256 possible bit combinations in a byte and each byte represents one character.

secondary

Unlike memory, this type of storage holds data and programs even after electric power to the computer system has been turned off.

FireWire port

Used to connect high-speed printers, and even video cameras, to system unit.

Entity

A person, place, thing, or event about which information is maintained in a record

Left Indent

A type of indent in which the left edge of a paragraph is moved in from the left margin.

Electronic Commerce (E-Commerce) Systems

A type of inter-organizational information system that enables organizations to conduct transactions, called business-to-business (B2B) electronic commerce, and customers to conduct transactions with businesses, called business-to-consumer (B2C) electronic commerce

ergonomic keyboard

A type of keyboard designed specifically to alleviate wrist strain associated with the repetitive movements of typing.

Tablet

A type of microcomputer that contains a thin system unit, most of which is the monitor. The best-known tablets are Apple's iPad, Motorola's Zoom, and HP's Slate.

Netbook

A type of microcomputer that is smaller, lighter, and less expensive than a notebook computer.

dot-matrix printer

A type of printer that forms characters and images using a series of small pins on a print head.

ink-jet printer

A type of printer that sprays ink at high speed onto the surface of paper.

Font

A typeface or design of a set of characters (letters, numbers, symbols, and punctuation marks).

Point

A unit of measurement for text characters and the space between paragraphs and characters; 1/72 of an inch.

File History

A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites and on the desktop.

Correct Answer: B. Backup and Restore

A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites on the desktop. Answers: A. Disk Cleanup B. Backup and Restore C. Disk Defragmenter D. Virus Scan

Videoconference

A virtual meeting in which participants in one location can see and hear participants at other locations and can share data and graphics by electronic means

Mini DisplayPort (MiniDP, mDP)

A port that an audiovisual device typically uses to connect large monitors. These ports are used with many Apple Macintosh computers.

external Serial Advanced Technology Attachment (eSATA)

A port that provides very high speed connections for external hard-disk drives, optical disks, and other large secondary storage devices.

Vulnerability

A possibility that an information resource will be harmed by a threat

Risk Transferee

A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance

Authorization

A process that determines which actions, rights, or privileges the person has, based on verified identity

Business Process Reengineering (BPR)

A radical redesign of a business process that that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (from scratch)

Algorithm

A series of steps designed to solve a mathematical or other problem.

ACID

A set of rules that protects a database from errors during a transaction.

Sectors

Which of the following is not a system software program type?

Video editors

_______ are used to edit videos to enhance quality and appearance.

Correct Answer: D. Video editors

_______ are used to edit videos to enhance quality and appearance. Answers: A. Drawing programs B. Image editors C. Bitmap gallery D. Video editors

Correct Answer: D. Input

_______ is any data or instructions that are used by a computer. Answers: A. Digital B. Output C. Information D. Input

table

_______ make up the basic structure of a relational database with columns containing field data and rows containing record information.

Utility

A small program designed to carry out a limited maintenance task.

Responsibility

A tenet of ethics in which you accept the consequences of your decisions and actions

CPU

Abbreviation of central processing unit. The CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.

Mobile apps

Add-on programs for a variety of mobile devices including smartphones and tablets.

Correct Answer: D. Mobile apps

Add-on programs for a variety of mobile devices including smartphones and tablets. Answers: A. Clouds B. Utilities C. QR codes D. Mobile apps

Which of the following is an example of desktop publishing software?

Adobe InDesign

Justify

Alignment in which an item is flush with both the right and left margins.

Right-Align

Alignment in which the item is flush with the left margin.

Left-Align

Alignment in which the the item is flush with the left margin.

Correct Answer: A

All of the following are true of DVD-ROM drives except: A. They are also known as erasable optical discs. B. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. C. They are a type of optical disc. D. DVD-ROM stands for "digital versatile disc-read only memory".

They are also known as erasable optical discs.

All of the following are true of DVD-ROM drives except: Question 19 options: A) They are also known as erasable optical discs. B) They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. C) They are a type of optical disc. D) DVD-ROM stands for "digital versatile disc-read only memory."

wireless network card

Allows computers to be connected without cables.

Monitor

Also called the Visual Display Unit (VDU) or screen. Hardware. An output device used to display the results of processing to the user.

PC card slot

Also known as Personal Computer Memory Card International Association (PCMCIA) card slot. Credit card-sized expansion cards developed for portable computers.

keyboard

Convert numbers, letters, and special characters that people understand into electrical signals.

scanning devices

Convert scanned text and images into a form that the system unit can process.

An interpreter ________.

Converts and runs the procedural language one statement at a time into machine code.

language translator

Converts programming instructions into a machine language that can be processed by a computer.

A compiler ________.

Converts the source code into machine language code.

Cable

Cords used to connect input and output devices to the system unit.

enterprise storage system

An organizational strategy to promote efficient and safe use of data across the networks.

input

Any data or instructions that are used by a computer.

Hardware

Any part of your computer that has a physical structure, such as the monitor or keyboard.

These tools are also called computer-aided software engineering (CASE) tools. They are used in system analysis to evaluate alternative hardware and software solutions. A. Project management tools B. Automated design tools C. Spreadsheets D. Report generator

Automated design tools

photoelectric CELLS

Bar code readers use _______ embedded in them to read bar codes.

Correct Answer: D. photoelectric cells

Bar code readers use _______ embedded in them to read bar codes. Answers: A. coprocessors B. magnetic cells C. RFID microchip D. photoelectric cells

Correct Answer: D. File compression program

Before sending a large file over the Internet, you might want to use one of these programs. Answers: A. Disk defragmenter B. Uninstaller C. Disk cleanup program D. File compression program

Which of the following refers to tools that are used to provide some assistance in designing, coding, and testing software?

CASE

Cache Memory

Cache memory is very fast memory that is on the processor. The cache acts as a buffer between the processor and other devices on the computer and speeds up the overall process by removing the need to wait while data is fetched or written from or to other devices

Cyberterrorism

Can be defined as premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents

network adapter card

Connects the system unit to a cable that connects to other devices on the network.

This type of language uses symbols, words, and phrases that instruct a computer how to structure information for display or processing.

Content-markup

Analog

Continuous signals that vary to represent different tones, pitches, and volume.

PCMCIA slot

See PC card slot.

system chassis

See system unit.

have no moving parts

Solid-state storage devices are different than hard disks in that they _______.

web authoring software

Specialized and powerful programs, called _______ are typically used to create specialized commercial sites.

software suite

a collection of separate application programs bundled together and made available as a group.

Exposure

The harm, loss, damage that can result if a threat compromises an information resource

utility suite

a program that combines several utilities in one package to improve system performance

Demilitarized Zone (DMZ)

a separate organizational local area network that is located between an organization's internal network and an external network, usually the Internet.

Service where the Internet acts as a "cloud" of servers that supply application services

cloud computing

Value System

includes the producers, suppliers, distributors, and buyers, all with their value chains

specialized applications

includes thousands of other programs that tend to be more narrowly focused and used in specific disciplines and occupations

IP address

individual numeric address given to every computer on the Internet

Knowledge Management Systems (KMSs)

information technologies used to systemize, enhance, and expedite, intra- and interfirm knowledge management

Intellectual Property

intangible property that is the result of creativity (such as patents or trademarks or copyrights)

A magnetic secondary storage device that is located inside the system unit.

internal hard disk

spreadsheets

organize, analyze, and graph numeric data such as budgets and financial reports

system unit

part of personal comp that contains cpu

web

provides a multimedia interface to the numerous resources available on the internet

videoconferencing

provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.

internet service provider

provides access to the internet

GUI graphical user interface

special screen that allows software commands to be issued through the use of graphic symbols or pull down menus

cloud computing

the internet acts as a cloud of servers that supply applications to clients as a service rather than a product

Multidimensional Structure

the manner in which data are structured in a data warehouse so that they can be analyzed by different views or perspectives, which are called dimensions.

Microsoft Excel

the most widely used spreadsheet program

Blu-ray discs (Bfs)

the newest form of optical storage designed t store hi def videos, which uses the HD 720 and HD 1080 resolutions

download

transforming info from remote comp to the comp it needs to be used on

CERN

where the web was introduced in 1991

Intrusion detection system (IDS)

work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic

windows OS 7, 8

-OS from 2009 that has a traditional user interface similar to previous versions of Windows. It provides enhanced features including improved handwriting recognition and advanced searching capabilities for finding files and other content on your computer. -OS from 2012 that is designed to better integrate Microsoft's desktop OS with its mobile OS. It provides support for gestures, cloud integration, and apps.

Gigabyte

1024 megabytes

Nibble

4 bits

dots-per-inch (dpi)

The measurement of printer resolution, the more dots-per-inch the better the quality of the image printed.

arithmetic-logic unit (ALU)

The part of the CPU that performs arithmetic and logical operations.

Correct Answer: C. 4 bytes at a time

A 32-bit-word computer can access _____. Answers: A. 2 bytes at a time B. 16 bytes at a time C. 4 bytes at a time D. 8 bytes at a time

Which of the following is an example of web development software?

Dreamweaver

DRAM

Dynamic random-access memory is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit. The capacitor can be either charged or discharged; these two states are taken to represent the two values of a bit, conventionally called 0 and 1.

Organizational Social Responsibility

Efforts by organizations to solve various social problems

bus line

Electronic data roadway, along which bits travel, connects the parts of the CPU to each other and links the CPU with other important hardware. The common connecting cable in a bus network.

mobile OS

Embedded operating system that controls a smartphone.

An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.

Exception

Which system presents information in a highly summarized form?

Executive support system (ESS)

Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?

Expert system

In case of an unanticipated union strike, the manager in charge of manufacturing might consult the management information system to determine how it will affect production schedules.

False

The executive support system can analyze the effects of events and trends outside the organization.

False

The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output.

False

The research department strictly involves itself only with the creation of finished goods that are tangible.

False

virtual memory

Feature of an operating system that increases the amount of memory available to run programs. With large programs, parts are stored on a secondary device like your hard disk. Then each part is read in RAM only when needed.

The ______ utility program makes a copy of files to help protect you from the effects of a disk failure.

File History

system board

Flat board that usually contains the CPU and memory chips connecting all system components to one another.

Client/Server Computing

Form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients)

Italic

Formatting applied to text to make the characters slant to the right.

Text Effect

Formatting that applies a visual effect to text, such as shadow, glow, outline, or reflection.

Character Spacing

Formatting that changes the width or scale of characters, expands or condenses the amount of space between characters, raises or lowers characters, relative to the line of text, and adjusts kerning.

Information Technology Platform

Formed by the IT components of hardware, software, networks (wireline and wireless), and databases

Cache Memory

Frequently-accessed information is held in _____.

Correct Answer: B. cache memory

Frequently-accessed information is held in _____. Answers: A. hard drive B. cache memory C. flash memory D. read only memory

Information Technology Services

IT personnel use IT components to perform these IT services: develop information systems, oversee security and risk, and manage data

Bitmap

Image editors edit images consisting of thousands of pixels that form this type of image.

Correct Answer: B. Bitmap

Image editors edit images consisting of thousands of pixels that form this type of image. Answers: A. Vector B. Bitmap C. Object D. Electronic

Server

In a network operating system, this computer coordinates all communication between computers.

host

In a virtualized environment, this operating system runs on the physical machine.

Bit

In binary (computer language), a bit represents a zero or one.

application software

"apps" software that can perform useful work, such as word processing, cost estimating, or accounting tasks.

Boolean

(Data Type) Type of data in a database field that can be true/false or yes/no

Megabyte

1024 KB

ASCII (American Standard Code for Information Interchange)

7-bit system to code the character set of a computer.

4 bytes at a time. 32/ 8

A 32-bit-word computer can access _____.

Cold Site

A backup location that provides only rudimentary services and facilities

Attribute

A characteristic of an entity. It becomes a field in a data table.

Application (App)

A computer program designed to support a specific task or business process

Search Engine

A computer program that searches for specific information by key words and reports the results

File Server (Network Server)

A computer that contains various software and data files for a local area network, and contains the network operating system

Hardware

A device such as a processor, monitor, keyboard, or printer. Together, the devices accept, process, and display data and information

network gateway

A device that allows one LAN to be linked to other LANs or to larger networks.

card reader

A device that interprets the encoded information contained on credit, debit, access, and identification cards.

printer

A device that translates information that has been processed by the system unit and presents the information on paper.

Actuator

A device to produce physical movement based on output from a computer system.

T-Carrier System

A digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call.

Digital Signals

A discrete pulse, either on or off, that conveys information in a binary form

Format Painter

A feature used to copy the format settings applied to the selected text to other text you want to format the same way.

optical mouse

A mouse that emits and senses light to detect mouse movement.

Style

A named collection of character and paragraph formats that are stored together and can be applied to text to format it quickly.

Enterprise Network

A network, encompassing an organization, composed of interconnected multiple LANs and WANs

Wide Area Networks (WANs)

A network, generally provided by common carriers, that covers a wide geographic area.

Real

A number that can have decimal or fractional parts.

Password

A secret word or phrase giving admittance or access to information

Cookie

A small text file that some Web sites automatically store on a client computer's hard drive when a user visits the site.

Notebook

A small, portable system unit that contains electronic components, selected secondary storage devices, and input devices.

Dashboards

A special form of IS that support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

musical instrument digital interface (MIDI)

A standard that allows musical instruments to connect to the system using MIDI ports.

Binary

A system of numbers using only two digits 0 and 1 (also called the 2-base system).

World Wide Web (the Web, WWW, or W3)

A system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/ server architecture; it uses the transport functions of the Internet.

Computer Network

A system that connects computes and other devices via communications media so that data and information can be transmitted among them

Correct Answer: C. Cryptoprocessor

A type of specialty processor devoted exclusively to protecting your privacy. Answers: A. Data cards B. Micro cards C. Cryptoprocessor D. Embedded cards

Mobile Apps

Add-on programs for a variety of mobile devices including smartphones and tablets.

Identifier

An attribute that identifies an entity instance

Correct Answer: B

An external hard disk _______. A. is heavy B. is hard to remove C. cannot be used in addition to an internal hard disk D. usually connects to a USB or Thunderbolt port

Computer-Based Information System (CBIS)

An information system that uses computer technology to perform some or all of its intended tasks

mouse

An input device that controls a pointer that is displayed on the monitor.

UNIX

An operating system originally developed for minicomputers. It is now important because it can run on many of the more powerful microcomputers.

Embedded OS

An operating system that is completely stored within the ROM (read-only memory) of the device that it is in; used for handheld computers and smaller devices like PDAs.

Server

Any computer that shares its resources with other computers on a network. The resources could be services such as web or email, resources such as file storage or print, or processing such as databases.

Personal Computer (PC)

Any computer whose price, size, and capabilities make it useful for individuals to use with no intervening computer operator.

Threat

Any danger to which an information resource may be exposed

output device

Any hardware used to provide or to create output.

wearable

Apple's Watch is what type of computer?

cache memory

Area of random-access memory (RAM) set aside to store the most frequently accessed information. Cache memory improves processing by acting as a temporary high-speed holding area between memory and the CPU, allowing the computer to detect which information in RAM is most frequently used.

file compression

Before sending a large file over the Internet, you might want to use one of these programs.

ASCII (American Standard Code for Information Interchange)

Binary coding scheme widely used on all computers, including microcomputers. Eight bits form each byte, and each byte represents one character.

universal serial bus (USB)

Combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high-speed scanners, printers, and video capturing devices.

Network Controls (Communication Controls)

Communication Controls

Cable Media (Wireline Media)

Communications channels that use physical wires or cables to transmit data and information.

Digital

Computers are digital machines because they can only understand 1s and 0s. It is either on or off. For example, a digital watch states the exact time on the face, whereas an analog watch has the second hand moving in constant motion as it tells the time.

Clients

Computers, such as users' personal computers, that use any of the services provided by services

expansion bus

Connects the CPU to slots on the system board. There are different types of expansion buses such as industry standard architecture (ISA), peripheral component interconnect (PCI), accelerated graphics port (AGP), universal serial bus (USB), and FireWire buses. See system bus.

database management system

DBMS. program that sets up, structures, a database

Which of the following is used to show the rules that apply to a decision when one or more conditions apply? A. System flowchart B. Decision table C. Grid chart D. Checklist

Decision table

Controls

Defense mechanisms (also called countermeasures)

Data Model

Definition of the way that data in a DBMS are conceptually structured

graphics card

Device that provides high-quality 3-D graphics and animation for games and simulations.

The goal of the _______ utility program is to locate and eliminate unnecessary fragments and rearrange files and unused disk space.

Disk Defragmenter

Bit

Each 1 or 0 is a bit; short for binary digit.

Attribute

Each characteristic or quality describing a particular entity

A purchase order form pertains to the payroll department.

False

An MIS differs from a TPS in that it creates databases.

False

Text Wrapping

Formatting applied to a graphic to make it a floating graphic.

Bold

Formatting applied to text to make it thicker and darker.

Correct Answer: D

Hard disks store and organize files using all the following, except _______. A. tracks B. sectors C. cylinders D. paths

Touch Screen

Hardware. An input and output device that combines the use of a monitor and a mouse. Most often used on smartphones and tablet computers.

Sensor

Hardware. An input device that detects something about the environment. Sensors come in a wide variety of types but the most common are: motion, heat, light, sound and pressure sensors.

Backbone Networks

High-speed central networks to which multiple smaller networks (such as LAN and smaller WANs) connect.

Functional Area Information Systems (FAISs)

ISs that support a particular functional area within the organization

Enterprise Resource Planning (ERP)

Information systems that correct a lack of communication among the functional area ISs by tightly integrating the functional area ISs via a common database

thumb

Keyboards that are widely used on various smartphones and other small portable devices, and that are designed primarily for communicating via texting and connecting to the Web.

These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.

Machine

density

Measures how tightly the magnetic charges can be packed next to one another on the disk.

_________ players refer to applications that allow you to listen to music and play videos.

Media

grayscale

Most common black ink selection in which images are displayed in many shades of gray.

Multitasking

Most operating systems support the ability to switch between different applications. This is called _____.

Correct Answer: A. multitasking

Most operating systems support the ability to switch between different applications. This is called _______. Answers: A. multitasking B. booting C. translating D. driving

Expansion Slots

Most personal computers allow users to expand their systems by providing these on the system board.

Correct Answer: A. Expansion slots

Most personal computers allow users to expand their systems by providing these on the system board. Answers: A. Expansion slots B. Ports C. Sound cards D. Network cards

Mac OS X ________ was released in 2012 and designed for desktops and laptops. The functionality is similar to Windows 8.

Mountain Lion

_______ is the ability of the operating system to switch between different applications stored in memory.

Multitasking

Collaboration

Mutual efforts by two or more individuals who perform activities in order to accomplish certain tasks

Correct Answer: D

One way to improve the storage capacity of a hard disk is to _______. A. format often B. use file compression C. increase memory D. use disk caching

expansion slot

Openings on a system board. Users can insert optional devices, known as expansion cards, into these slots, allowing users to expand their systems. See expansion card.

FireWire bus

Operates much like USB buses on the system board but at higher speeds.

______ coordinate computer responses, provide an interface between users and the computer, and run applications.

Operating Systems

system unit

Part of a microcomputer that contains the CPU. Also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system.

Which of the following is an example of accounting software for businesses?

QuickBooks

flash memory

RAM chips that retain data even when power is disrupted. Flash memory is an example of solid-state storage and is typically used to store digitized images and record MP3 files.

Memory

Refers to the primary storage of a computer system. Can be volatile (lost when computer is turned off) such as RAM or nonvolatile (permanently written to storage device) such as ROM.

warm boot

Restarting your computer while the computer is already on and the power is not turned off.

Plug and Play

Set of hardware and software standards developed to create operating systems, processing units, expansion cards, and other devices that are able to configure themselves. When the computer starts up, it will search for the Plug and Play device and automatically configure it to the system.

Assignment

Setting the value of a variable.

Browsers

Software applications through which users primarily access the web

firewall

Special hardware and software used to control access to a corporation's private network is known as a(n):

computer technician

Specialist who installs hardware and software and troubleshoots problems for users.

web authoring programs

Specialized and powerful programs, called _______ are typically used to create specialized commercial sites.

mass storage devices

Specialized high-capacity secondary storage devices designed to meet organizational demands.

Auto documentation

System that tracks variables, modules and comments for maintenance for purposes.

Correct Answer: A

The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a _______. A. head crash B. cylinder crash C. track crash D. sector crash

Primary Key

The identifier field or attitude that uniquely identities a record

online identity

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:

Globalization

The integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology

bus width

The number of bits traveling simultaneously down a bus is the bus width.

Colour depth

The number of bits used for each pixel or dot. The more bits, the more colours that can be represented.

Resolution

The number of pixels or dots per unit, for example ppi (pixel per inch), often referred to as dpi (dots per inch).

Platform

The operating system is often referred to as the software environment or software _____.

Make-To-Order

The strategy of producing customized products and services

Ergonomics

The study of human factors related to things people use.

Mother Board

The system board is also known as the _____.

Correct Answer: B. motherboard

The system board is also known as the _____. Answers: A. expansion slot B. motherboard C. expansion card D. bus

Disk Cleanup

The windows troubleshooting utility that identifies and eliminates nonessential files is called

Correct Answer: C. Disk Cleanup

The windows troubleshooting utility that identifies and eliminates nonessential files is called _______. Answers: A. Backup and Restore B. Disk Defragmenter C. Disk Cleanup D. Norton Utilities

system bus

There are two categories of buses. One is the system bus that connects the CPU to the system board. The other is the expansion bus that connects the CPU to slots on the system board.

ribbons

These organize commonly used commands into a set of tabs.

illustration Programs

These programs are used to create and edit vector images.

Ribbon

This GUI includes tabs, groups, and galleries.

Correct Answer: B. Ribbon

This GUI includes tabs, groups, and galleries. Answers: A. Character-based B. Ribbon C. Contextual D. Dialog

Cloud Storage

This allows you to upload and store documents on the Internet.

Correct Answer: A

This allows you to upload and store documents on the Internet. A. Cloud storage B. Flash drive C. Solid State storage D. Hard Disk drive

Correct Answer: C. Device driver

This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system. Answers: A. Client B. Virtual machine C. Device driver D. Server

Application

This type of software can be described as end user software and is used to accomplish a variety of tasks.

Correct Answer: B. Application

This type of software can be described as end user software and is used to accomplish a variety of tasks. Answers: A. Communications B. Application C. Utility D. System

system

This type of software works with end users, application software, and computer hardware to handle the majority of technical details

System

This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

Linux

This version of UNIX is an open source operating system that is an alternative to Windows.

handwriting recognition software

Translates handwritten notes into a form that the system unit can process.

Compiler

Translation software that converts high-level source code into machine (object) code.

Highlighting

Transparent color that can be applied to a text to draw attention to it.

Office automation systems are designed primarily to support data workers.

True

Supervisors' responsibilities include operational matters.

True

The executive support system helps top-level managers oversee the company's operations and develop strategic plans.

True

The research department identifies, investigates, and develops new products and services.

True

file compression

Utility programs that reduce the size of files so they require less storage on the computer and can be sent more efficiently over the Internet. Examples of such programs are WinZip and Wizard.

_________ software is created for a specific industry such as health care or insurance.

Vertical market

What could you use if you wanted to run two or more applications each requiring a different operating system?

Virtualization

Cyberwarfare

War in which a country's information systems could be paralyzed from a massive attack by destructive software

Flash

When you reboot your system, the computer follows start-up instructions stored in this type of memory.

Correct Answer: D. Flash

When you reboot your system, the computer follows start-up instructions stored in this type of memory. Answers: A. DRAM B. SDRAM C. Cache D. Flash

Correct Answer: D. Web authoring

Which of the following programs would be used to create a website? Answers: A. Image editor B. Illustration C. Desktop publishing D. Web authoring

Correct Answer A

Which of these is not an example of solid state storage? A. Digital versatile disc B. SSDs C. Flash memory cards D. USB drives

Spreadsheet

Which would be the most appropriate type of application to create, analyze, and forecast budgets?

Correct Answer: B. Tables

_______ make up the basic structure of a relational database with columns containing field data and rows containing record information. Answers: A. QR codes B. Tables C. Fields D. Workbooks

Dialog Boxes

_______ provide additional information and request user input.

dialog boxes

_______ provide additional information and request user input.

Correct Answer: D. Audio

_______-input devices convert sounds into a form that can be processed by the system unit. Answers: A. Electrolyzing B. Plotting C. Webcam D. Audio

Industrywide Portal

a Web-based gateway to information and knowledge for an entire industry

Competitive Forces Model

a business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company's position

Internet2

a new, faster telecommunications network that deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories.

Router

a node that forwards or routes data packets from one network to their destination in another network

client

a node that requires resources from other nodes. a users personal comp

server

a node that shares resources with other nodes (application server, communication server)

Informed User

a person knowledgeable about information systems and information technology

end user

a person who uses personal computers or has access to larger computers.

Least Privilege

a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization

Blacklisting

a process in which a company identifies certain types of software that are not allowed to run in the company environment

A(n) __________ is a list of instructions detailing the steps needed to perform a task. a) program b) punch card c) agenda d) plan

a. program

connection devices

act as an interface between the sending and receiving devices and the communication channel

sales order processing

activity that records the demands of customers for a company's products or services

sales order processing

activity that records the demands of customers for a companys products or services

mobile apps

add-on features or programs typically designed for smartphones and tablets

Spyware

alien software that can record your keystrokes and/or capture your passwords

Spamware

alien software that uses your computer as a launch platform for spammers

provide user interface

allow users to interact with application programs and computer hardware

desktop publishing programs (page layout programs)

allow you to mix text and graphics to create publications of professional quality

wireless modem (WWAN)

almost all computers today have these modems built in

Electronic Commerce

also known as e-commerce

office suite

also known as office software suites and productivity suites, contain general-purpose application programs that are typically used in a business situation

cloud storage

also known as online storage

cloud

also known as online suite

logic gate

an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given moment, every terminal is in one of the two binary conditions low (0) or high (1), represented by different voltage levels.

Data Items

an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning

web based email

an email system that does not require an email program to be installed on your computer

single core processor

an integrated circuit to which one processor is attached for basic performance, power consumption, and processing of single tasks.

multi core processor

an integrated circuit to which two or more processor cores have been attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks.

embedded OS

an operating system that is completely stored within the ROM (read-only memory) of the device that it is in; used for handheld computers and smaller devices like PDAs

servers

another name for midrange computers

system software

background software that enables the application software to interact with the computer. system software consists of the operating system, utilities, device drivers, and language translators.

Write-once disc

can be written on once, after that the disc can be read many times but cannot be written on or erased

optical discs

can hold over 128 gigabytes of data

hard dick

closed disk drive containing one or more metallic disks using metallic charges to record data and have large storage capacities and have fast retrieval times

management information system

computer based information system that produces standardized reports in a summarized and structured form. generally used to support middle managers

management info system

computer based system that produces standardized reposrts in a summarized form

zombies

computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for a malicious purpose

mainframe computers

computers that occupy specially wired, air-conditioned rooms. Capable of great processing speeds and data storage

midrange computers

computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. Used by medium-sized companies or departments of large companies to support their processing needs but are now used to support or serve end users for certain applications

program

consists of the step-by-step instructions that tell the computer how to do its work

language translator

converts programming instructions into a machine language that can be processed by a computer

web authoring software

creating a website, word processing program for generating web pages. also called html editor or web page editor, widely used web authoring programs include adobe dream weaver and microsoft front page

Identity Theft

crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud

A part of a hard disk that runs through each track of a stack of platters.

cylinder

__________ refers to testing by a select group of potential users in the final stage of testing a program. a) Manual testing b) Desk checking c) Attempt at translation d) beta testing

d) beta testing

In programming, _______ are explanations that tell other programmers what's happening in the software code. a) restrictions b) tables c) documentation d) selections

d. documentation

The programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem. a) grid table b) pseudocode c) algorithm d) flowchar

d. flowchart

Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.

database

Query by Example (QBE)

database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted

file servers

dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.

network architecture

describes how a network is arranged and how resources are coordinated and shared

The first step in the systems design phase is to A. examine the hardware requirements. B. design alternative systems. C. select the best system. D. analyze the data.

design alternative systems.

Solid-state drives (SSDs)

designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data

antispyware

designed to detect and remove various types of privacy threats

______ are specialized programs that allow particular input or output devices to communicate with the rest of the computer system.

device drivers

graphical site map

diagram of a website's overall design

A _____ provides information or requests input.

dialog box

instant message

direct/live chat b/w 2 or more ppl

A _______ works with the operating system to allow communication between the device and the rest of the computer system.

driver

Use Windows Update to update the _____ on your computer.

drivers

Flash memory

flash memory is a type of nonvolatile memory that erases data in units called blocks. A block stored on a flash memory chip must be erased before data can be written, or programmed, to the microchip. Flash memory retains data for an extended period of time whether a flash-equipped device is powered on or off.

lands

flat areas that represent the 1s and 0s on the disc surface of optical discs

A good way to organize related files is to store them within a ______.

folder

URL

for browsers to connect you to resources on the web, the location or address of the resources must be specified, the addresses are called urls

system software

form of software that the computer uses

Preparing a storage device for use by an operating system is known as:

formatting

Organizational cloud storage

high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage

electronic profiles

highly detailed and personalized descriptions of individuals

profiles

highly detailed and personalized descriptions of individuals are electronic:

secondary storage

holds data and programs even after electric power to the computer system has been turned off

server

host comp wit connect to internet that stores document files used to display webpages

Internet

huge computer network available to everyone with a personal computer

HTML

hypertext markup language. program language that creates documents files to view webpages

https

hypertext transfer protocol secure is widely used to protect the transfer of sensitive information

Which of the following operating systems is NOT likely to be running on a server?

iOS

Local Area Network (LAN)

is a network that connects computers in a limited geographical area, such as a school computer laboratory, office, or group of buildings. Every user device on the network can communicate with every other device

Disk Caching

is process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.

RAID systems

larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.

TLD top level domain

last part of an internet address; identifies the geographic description or organizational identification.

Distance Learning (DL)

learning situations in which teachers and students do not meet face to face

balance sheet

lists the overall financial condition of an organization

run applications

load and run applications

internal hard disk

located inside the system unit. Able to store and retrieve large quantities of information quickly

Optimize Drives

locates and eliminates fragments and rearranges files and unused disk space

The internal

logical structure and organisation of the computer hardware.

top management

long range, strategic planning

ADSL service (asymmetrical digital subscriber line)

one of the most widely used types of DSL, much faster than dial-up

Random-access memory (RAM)

one type of memory that holds the program and data that is currently being processed

The collection of programs that handles many of the technical details related to using a computer is called the ______.

operating system

Chrome OS

operating system designed by google for netbook comps & internet connectivity thru clouds

MAC OS

operating system designed by macintosh comps

MAC os

operating system designed for Macintosh computers

multitasking

operating system that allows a single user to run several application programs at the same time

software platform

operating system, also known as software platform, consisting of a collection of programs to handle technical details depending on the type of operating system

standalone operating systems

operating systems used by desktops

network operating systems NOS

operating systems used by networks

A storage device that uses a laser beam to alter the surface of a plastic or metallic disc to represent data.

optical disc

High-speed Internet connection to a dedicated remote organizational cloud storage server.

organizational cloud storage

marketing

organizational department that plans, prices, promotes, sells, and distributes an organization's goods

Android

owned by Google and widely used in many of today's smartphones

Entry Barrier

product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete

Knowledge Workers

professional employees who are experts in a particular subject area and create information and knowledge, which they integrate into the business

plugins

program automatically loaded and operated as part of a browser

utility suite

program combining several utilities in one package to improve system performance

Program specification can also be called

program definition or program analysis

mass storage

refers to the tremendous amount of secondary storage required by large organizations

midrange computer

refrigerator sized machines falling in between personal computers and mainframes in processing speed and data storing capacity. Medium sized companies or departments of large companies use midrange computers.

accuracy

related to the responsibility of those who collect data to ensure that the data is correct

access

relates to the responsibility of those who have data to control who is able to use that data

property

relates to who own data

plagiarism

representing some other person's work and ideas as your own without giving credit to the original source

CAN SPAM ACT

requires every marketing related email to provide an opt-out option

Wireless network encryption

restricts access to authorized users on wireless networks

Family Educational Rights and Privacy Act (FERPA)

restricts disclosure of education records

secondary storage

retains info after system is turned off (cds, dvds)

tracks

rings of concentric circles on the platter

database record (row)

row of data

database record

row. contains info about one employee

spread sheet

rows and columns to analyze data

protocols

rules for exchanging data between computers

Mac OS

runs on Apple computers

Section shaped like a pie wedge that divides the tracks on a disk.

sector

Operating system

software that interacts between application software and the comp handling such details as running programs, storing, processing data and coordinating all comp resources including attached peripheral devices. fxns: managing resources, providing user interface, running apps

operating system

software that interacts between application software and the computer, handling such details as running programs, storing and processing data, and coordinating all computer resources, including attached peripheral devices. it is the most important program on the computer. windows 7 windows 8 and mac os x

browsers (most popular ones)

special internet software connecting you to remote computers; opens and transfers files, displays texts and images, and provides an uncomplicated interface to the Internet and web documents. (internet explorer, mozilla firefox, and google chrome)

Image editors

specialized graphics programs for editing or modifying digital photographs

mass storage devices

specialized high-capacity secondary storage devices designed to meet organization demands for data storage

Virtual Collaboration

the use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage and research products, services and innovative information systems and electronic commerce applications

Teleconferencing

the use of electronic communication that allows two or more people at different locations to have a simultaneous conference

cyberbullying

the use of the Internet, smartphones, or other devices to send or pot content intended to hurt or embarrass another person

microwave

uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication, only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances

infrared

uses infrared light waves to communicate over short distances

Global positioning system (GPS)

uses location information to uniquely determine the geographic location of a device

Cellular

uses multiple antennae to send and receive data within relatively small geographic regions

satellite

uses orbiting satellites about 22,000 miles above the earth as microwave relay stations

satellite connection service

uses satellites to provide wireless connections, slower than DSL and cable, but are available almost everywhere

dictionary attack

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account

dial-up services

using existing telephones and telephone modems to connect to the internet

social networks

using the internet to connect to individuals

_____ are specialized programs to make computing easier.

utilities

disk cleanup

utlity that eliminates nonessential files

Interorganizational Information Systems (IOSs)

Information systems that connect two or more organizations

Correct Answer: D. chip carriers

Integrated circuits must be mounted on _____, which are then plugged into the system board. Answers: A. slots B. pins C. ports D. chip carriers

This typically consists of transactions from the transaction processing system.

Internal data

Viruses

Malacious software that cab attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection

Malware

Malicious software that enters a computer system without the owner's knowledge or consent. such as viruses or worms

Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?

Marketing

control unit

Section of the CPU that tells the rest of the computer how to carry out program instructions.

Modules (DBMS)

Sections of code within a DBMS that allow the user interface to be tailored.

Transport Layer Security (TLS)

Secure Socket Layer

Processor

See central processing unit.

GPU (graphics processing unit)

See graphics coprocessor.

main board

See motherboard or system board.

Laptop

See notebook computer and notebook system unit.

Sony/Philips Digital Interconnect Format (S/PDIF)

See optical audio connection.

integrated circuit

See silicon chip.

Client

Software or hardware that requests services from a server.

Operating System

Software that controls the operation of a computer. Provides a user interface. Platform for applications. Memory management. File/disk management. e.g. Windows 8, Linux, OS X, Android. Single User Operating System. Only one user can use the computer at any given time.

operating system

Software that interacts between application software and the computer, handling such details as running programs, storing and processing data, and coordinating all computer resources, including attached peripheral devices. It is the most important program on the computer. Windows 7, Windows Vista, and Mac OS X are examples of operating systems.

Assemble

Software that translates assembly language code into machine code.

Run time environment

Software to support the execution of programs.

Flash Memory

Solid-state memory used as a low cost secondary storage in portable devices and as removable memory.

Correct Answer: B. web authoring programs

Specialized and powerful programs, called _______ are typically used to create specialized commercial sites. Answers: A. graphical site map B. web authoring programs C. hyperlink D. microblog

digital whiteboard

Specialized devices with a large display connected to a computer or projector (see also interactive whiteboard)

Digital or interactive whiteboards

Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms.

Correct Answer: D. Digital or interactive whiteboards

Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. Answers: A. Scanners B. HDTV C. E-books D. Digital or interactive whiteboards

Coprocessor

Specialized processing chip designed to improve specific computer operations, such as the graphics coprocessor.

volatile memory

Storage (such as RAM chips) that is wiped clean when power is cut off from a device.

nonvolatile

Storage that retains its data after the power is turned off is referred to as _______.

Correct Answer: D

Storage that retains its data after the power is turned off is referred to as _______. A. volatile storage B. sequential storage C. direct storage D. nonvolatile storage

Offline

Storage which can be disconnected from computer system

BIOS

The Basic Input/Output System built into every computer. This is a program often called the bootstrap loader (hence the term to boot your computer) that is stored in the ROM. When you turn your computer on the BIOS program loads and finds the operating system.

Head Crash

The hard disk's surface is scratched and some or all of the data is destroyed when there is a

Correct Answer: C. Pits and lands

Optical discs use these to represent data. Answers: A. Analog signals B. Magnetic charges C. Pits and lands D. Laser beams

Individual Social Responsibility

Organizational Social Responsibility

Intellectual Capital (Intellectual Assets)

Other terms for knowledge

These third-generation languages are designed to express the logic that can solve general problems

Procedural

Correct Answer: B. presentation graphics

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called: Answers: A. graphs B. presentation graphics C. diagrams D. charts

trojan horses

Programs that come into a computer system disguised as something else are called:

_________ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals.

Project management

memory

RAM is a type of:

RAM

Random Access Memory. a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.

Shading

A background color or pattern that can be applied to text, tables, or graphics.

Servers

A computer that provides access to various network services, such as printing, data, and communications.

Twisted-Pair Wire

A communications medium consisting of strands of copper wire twisted together into pairs

Fiber-Optic Cables

A communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information via light pulses generated by lasers

Correct Answer: D. creating a new folder on your computer

A computer can become infected with viruses in all the following ways, except by _______. Answers: A. opening attachments to e-mail messages B. downloading software from the Internet C. downloading files from the Web D. creating a new folder on your computer

Monitor

A computer device that presents visual images of text and graphics. (See also display screen)

Solid state storage

A kind of secondary storage device that uses EEPROM circuits to store binary information. Examples of solid state storage are SSDs (solid state disks), flash drives and SD cards. Solid state storage can range in capacity from a few hundred kilobytes to hundreds of gigabytes. Capacities are growing and prices are coming down all the time but they are generally far more expensive than a similarly sized magnetic storage device.

Magnetic storage

A kind of secondary storage device that uses the magnetic N and S to represent the 1s and 0s of binary. Examples of magnetic storage are floppy disks, magnetic tapes and hard disks. The capacity of a floppy disk can be as low as 360Kb and a hard disk can have a capacity of 4Tb (and growing!).

Liability

A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems

Clip Organizer

A library of art, pictures, sounds, video clips, and animations that all Office applications share.

Borders

A line that can be added above, below, or to the sides of a paragraph, text, or table cell.

address

A location in main memory used to store data or instructions.

Tab Stop

A location on the horizontal ruler that indicates where to align text.

Assembly language

A low-level programming language that used more memorable mnemonic codes and lables to represent machine-level code. Each instruction corresponds to just one machine operation.

Desktop

A system unit that typically contains the system's electronic components and selected secondary storage devices. Input and output devices, such as the mouse, keyboard, and monitor, are located outside the system unit.

mainframe

Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.

Competitive Advantage

An advantage over competitors gained by offering consumers greater value, either through lower prices or by providing more benefits that justify higher prices

topologies

Bus, ring, star, tree, and mesh are five types of network:

Support Activities

Business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value

Correct Answer: C. Optical disc

C

With the _________ operating system, you will be fully immersed in Google's ecosystem of apps and services.

Chrome

Alien Software

Clandestine software that is installed on your computer through duplicitous methods

_________ backup providers are companies which provide utility software that creates automated backups to an online account.

Cloud

Data Dictionary

Collection of definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use this data element.

Information systems (IS)

Collects, processes, stores, analyzes, and disseminates information for a specific purpose

Internet Service Provider (ISP)

Companies that provide Internet connections for free

Comparison

Comparing the values of two items and returning TRUE or FALSE depending upon the result of that comparison.

logical operation

Comparing two pieces of data to see whether one is equal to (=), less than (<), or greater than (>) the other.

Temporary

Describes RAM storage

Permanent

Describes ROM storage

graphics coprocessor

Designed to handle requirements related to displaying and manipulating 2-D and 3-D graphic images.

power supply unit

Desktop computers have a power supply unit located within the system unit that plugs into a standard wall outlet, converting AC to DC, which becomes the power to drive all of the system unit components.

Worms

Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication

sound card

Device that accepts audio input from a microphone and converts it into a form that can be processed by the computer. Also converts internal electronic signals to audio signals so they can be heard from external speakers.

Modem

Device that converts signals from analog to digital and vice versa

In the preliminary investigation phase of the systems life cycle, which one of the following tasks would NOT be included? A. Briefly defining the problem B. Suggesting alternative solutions C. Gathering the data D. Preparing a short report

Gathering the data

web authoring

General-purpose applications include all of the following except:

Correct Answer: A. web authoring

General-purpose applications include all of the following except: Answers: A. web authoring B. word processors C. spreadsheets D. database management systems

________ control is the ability to control operations with finger movements, such as swiping, sliding, and pinching.

Gesture

Raster

Graphics format consisting of a matrix of dots.

A(n) _____ shows the relationship between input and output documents.

Grid

viruses

Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.

refresh rate

How often a displayed image is updated or redrawn on a monitor.

Word

In most personal computer systems, the CPU is contained on a single chip called the _____.

Correct Answer: C. microprocessor

In most personal computer systems, the CPU is contained on a single chip called the _____. Answers: A. semiconductor B. ALU C. microprocessor D. control unit

E-Learning

Learning supported by the Web; can be done inside traditional classrooms or in virtual classrooms

Who uses management information systems?

Middle-level managers

Value Chain Model

Model that shows the primary activities that sequentially add value to the profit margin; also shows the support activities

Graphical User Interface (GUI)

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.

Menu Button

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.

binary system

Numbering system in which all numbers consist of only two digits: 0 and 1.

character and mark recognition devices

OMR, OCR, and MICR are all types of _______.

Correct Answer: D. character and mark recognition devices

OMR, OCR, and MICR are all types of _______. Answers: A. Radio Frequency Card Readers B. magnetic card readers C. bar code readers D. character and mark recognition devices

This type of software development focuses less on the procedures and more on defining the relationships between previously defined procedures

Object-oriented software development

MAC OS

Operating system designed for Macintosh computers.

multitasking

Operating system that allows a single user to run several application programs at the same time.

software platform

Operating system, also known as software platform, consisting of a collection of programs to handle technical details depending on the type of operating system. For example, software designed to run on an Apple computer is compatible with the Mac OS environment.

Registers

Part of the processor used for temporary storage to store instructions, memory locations to access etc

Arithmetic Logic Unit

Part of the processor which carries out calculations and logical comparisons (AND OR NOT etc)

Control unit

Part of the processor which ensures that instructions are carried out in the correct order

Bus Lines

Pathways that support communication among the various electronic components on the system board are called _____.

Correct Answer: A. bus lines

Pathways that support communication among the various electronic components on the system board are called _____. Answers: A. bus lines B. network lines C. logic paths D. gate ways

utility

Performs specific tasks related to managing computer resources or files. Norton Utility for virus control and system maintenance is a good example of a utility. Also known as service programs.

Which of the following Adobe products would be the best choice for editing bitmap images?

Photoshop

This implementation approach is preferred when there are many people in an organization performing similar operations. A. Direct B. Parallel C. Phased D. Pilot

Pilot

robot

Robots are computer-controlled machines that mimic the motor activities of living things, and some robots can solve unstructured problems using artificial intelligence.

Which of the following phases of the systems life cycle is considered as the "ongoing process"? A. Systems development B. Systems analysis C. Systems design D. Systems maintenance

Systems maintenance

top level domain

TLD. last part of internet address (.com)

This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.

Tactical model

Who is responsible for operational matters and monitoring day-to-day events?

Supervisors

A collection of activities and elements organized to accomplish a goal. a.Program b.Information c.System d.Data

System

______ software would control where a word processing program is stored in memory.

System software

A professional who specializes in analyzing and designing business systems is called a(n) ____. a. systems analyst b. project manager c. individual systems developer d. programmer a. Systems Analyst

Systems Analyst

This individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them. A. Network administrator B. Cryptographer C. Systems analyst D. Computer enginee

Systems analyst

Programming is part of which phase of the systems life cycle?

Systems development

During which phase of the systems life cycle are users trained to use the new system? A. Preliminary investigation B. Systems implementation C. Systems development D. Systems maintenanc

Systems implementation

Identify the sixth phase of the systems life cycle. A. Systems maintenance B. Systems development C. Systems design D. Systems analys

Systems maintenance

Correct Answer: B. taking the letters of the first six alphabetic characters found on the top row of keys

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______. Answers: A. representing the phonetics of the alphabets most closely associated with the keyboard B. taking the letters of the first six alphabetic characters found on the top row of keys C. using the alphabetic characters most frequently used on the keyboard D. using the letters of the alphabetic characters that are closest to access while typing

microprocessor

The central processing unit that is generally made from a single integrated circuit.

Business Environment

The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations

Dot Pitch

The distance between each pixel.

Correct Answer: A. Dot pitch

The distance between each pixel. Answers: A. Dot pitch B. Refresh rate C. Resolution D. Word size

Supply Chain

The flow of materials, information, money, and services from suppliers of raw materials through factories and warehouses to the end customers

Digital Divide

The gap between those who have access to information and communications technology and those who do not

Mac OSX

This operating system is designed to run only with Apple computers.

Correct Answer: C. Mac OS

This operating system is designed to run only with Apple computers. Answers: A. Windows B. Linux C. Mac OS D. UNIX

UNIX

This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers.

Correct Answer: D. UNIX

This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers. Answers: A. Windows B. Mac OS X C. Linux D. UNIX

Correct Answer: C. Disk caching

This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. Answers: A. Data compression B. Data access C. Disk caching D. RAID

MICR

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips.

A word processor would most likely be used to do which of the following?

To create documents that consist primarily of text, you need this software.

Word processor

To create documents that consist primarily of text, you need this software.

Correct Answer: B. Word processor

To create documents that consist primarily of text, you need this software. Answers: A. Presentation graphics B. Word processor C. Spreadsheet D. Database management

legacy port

Was common on microcomputer systems to connect specific types of devices. They have largely been replaced by faster, more flexible ports such as the universal serial bus (USB).

Operating System

This system software is responsible for managing your computer's resources including memory, processing, and storage.

Correct Answer: B. Operating system

This system software is responsible for managing your computer's resources including memory, processing, and storage. Answers: A. Utility B. Operating system C. Language translator D. Device driver

Warm Boot

This type of boot occurs when the computer is already on and you restart it without turning off the power.

Correct Answer: C. Warm boot

This type of boot occurs when the computer is already on and you restart it without turning off the power. Answers: A. Generic boot B. Live boot C. Warm boot D. Cold boot

tablet

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor.

Correct Answer: B. Tablet

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Answers: A. Laptop B. Tablet C. Desktop D. Smartphone

Correct Answer: B. Mobile

This type of embedded operating system is used by smartphones. Answers: A. Desktop B. Mobile C. Network D. Stand-alone

Vector

This type of image is made up of geometric shapes or objects.

Correct Answer: C. Vector

This type of image is made up of geometric shapes or objects. Answers: A. Raster B. Bitmap C. Vector D. Pixel

Optical

This type of mouse emits and senses light to detect mouse movement.

Correct Answer: D. System

This type of software works with end users, application software, and computer hardware to handle the majority of technical details. Answers: A. Communications B. Application C. Utility D. System

Correct Answer: C. Mavericks

This version of Mac OS X has better power management and enhanced workflow options for multiple monitor setups. Answers: A. Launchpad B. Mission Control C. Mavericks D. Mountain Lion

Mavrics

This version of Mac OS X has improved power management and enhanced workflow options for multiple monitor setups.

Correct Answer: C. Linux

This version of UNIX is an open source operating system that is an alternative to Windows. Answers: A. Mountain Lion B. Lion C. Linux D. Windows

Correct Answer: C

Three ways to improve the performance of a hard disk include _______. A. disk caching, RAID, and file expansion B. file compression, disk caching, and file encryption C. disk caching, RAID, and file compression D. RAID, file compression and disk expansion

silicon chip

Tiny circuit board etched on a small square of sandlike material called silicon. Chips are mounted on carrier packages, which then plug into sockets on the system board.

CHips

Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____.

Correct Answer: D. chips

Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____. Answers: A. buses B. slots C. sockets D. chips

Electronic Surveillance

Tracking people's activities with the aid of computers

Top-level managers need information both from within the organization and from outside.

True

voice recognition system

Uses a microphone, a sound card, and special software to allow users to operate computers and to create documents using voice commands.

CHR

Uses the ASCII value to look up the character associated with a particular number.

cloud computing

Uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet.

_______ perform specific tasks related to managing computer resources.

Utilities

random-access memory (RAM)

Volatile, temporary storage that holds the program and data the CPU is presently processing. It is called temporary storage because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.

Data Inconsistency

Where different versions of data have become different because duplicate versions have been stored and updated differently.

Program-Data Independance

Where the applications that use a shared database are separated from the actual data by a DBMS, changes can therefore be made to one application without it affecting the other as the programs and the data are independent.

Data Duplication / Data Redundancy

Where the same data is stored more than once, unnecessarily. This can lead to data inconsistency.

multicore processor

Which of the following allows a computer to run two or more operations simultaneously?

Correct Answer: C. Multicore processors

Which of the following allows a computer to run two or more operations simultaneously? Answers: A. Coprocessors B. Multiplexing C. Multicore processors D. Binary system

Correct Answer: D. Voice over IP

Which of the following allows the transmission of telephone calls over computer networks? Answers: A. Faxing B. Cell phones C. PDAs D. Voice over IP

USB port

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices?

Correct Answer: A. USB port

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Answers: A. USB port B. SATA C. Parallel port D. Firewire bus

one high-capacity hard disk drive

Which of the following characteristics about RAID is incorrect? Question 13 options: A) Expanded storage capability B) Fast access speed C) Highly reliable D) One high-capacity hard disk drive

It directs the movement of electronic signals between memory (Which temp holds data) and the arithmetic-logic unit.

Which of the following is a function of the control unit?

Correct Answer: B. It directs the movement of electronic signals between memory and the arithmetic-logic unit.

Which of the following is a function of the control unit? Answers: A. It provides pathways that support communication among the various electronic components. B. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C. It performs fundamental math operations like addition, subtraction, and so on. D. It uses the logic to compare two pieces of data.

CISC

Which of the following is not a character encoding standard?

Correct Answer: C. CISC

Which of the following is not a character encoding standard? Answers: A. EBCDIC B. ASCII C. CISC D. Unicode

Provide INTERNET access

Which of the following is not a function of the operating system?

Correct Answer: B. Providing Internet access

Which of the following is not a function of the operating system? Answers: A. Managing resources B. Providing Internet access C. Providing a user interface D. Running applications

Lotus Symphony

Which of the following is not a popular cloud suite or online office suite?

Correct Answer: D. Lotus Symphony

Which of the following is not a popular cloud suite or online office suite? Answers: A. Google Docs B. Zoho C. Microsoft Office Web Apps D. Lotus Symphony

Android

Which of the following is not a popular desktop operating system?

Correct Answer: B. Android

Which of the following is not a popular desktop operating system? Answers: A. Windows 8 B. Android C. Linux D. Max OS X

mountain lion

Which of the following is not a popular mobile operating system?

Correct Answer: A. Mountain Lion

Which of the following is not a popular mobile operating system? Answers: A. Mountain Lion B. Windows Phone 8 C. iOS D. Android


संबंधित स्टडी सेट्स

Unit 8: World War 2: Lesson 5: Victory for the Allies

View Set

RN nutrition online practice 2023 A

View Set

End of Semester Test: Geometry B Plato/Edmentum

View Set

Chapter 5: Foundations of Employee Motivation

View Set

Baylor University Chapter 1-3 Exam 1 ACC 3303 Mrs. Edison

View Set