INTRO TO COMPUTING FORMATIVES AND QUIZLETS 2
Normalization
a method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.
Opt-In Model
a model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it
Opt-Out Model
a model of informed consent that permits the company to collect personal information until the customer specifically requests that the data not be collected
ARPANET
a national computer network from which the Internet developed
WiMax (Worldwide Interoperability for Microwave Access)
a new standard that extends the range of Wi-Fi networks using microwave connections
client
a node that requests and uses resources available from other nodes (unit's personal computer)
client
a node that requests and uses resources available from other nodes. typically a client is a user's personal computer
Whitelisting
a process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity
virtualization
a process that allows a single physical computer to support multiple operating systems that operate independently
Tunneling
a process that encrypts each data packet to be sent and places each encrypted packet inside another packet
Risk Management
a process that identifies, controls, and minimizes the impact of threats, in an effort to reduce risk to manageable levels
Master Data Management
a process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core mater data.
Risk Mitigation
a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan
Mass Customization
a production process in which items are produced in large quantities but are customized to fit the desires of each customer
instant messaging
a program allowing communication and collaboration for direct, live connections over the internet between two or more people
window
a rectangular area containing a document or message.
wireless revolution
a revolution that will dramatically affect the way we communicate and use computer technology
solid-state storage
a secondary storage device that has no moving parts. data is stored and retrieved electronically directly from these devices, much as they would be from conventional computer memory
Explicit Knowledge
The more objective, rational, and technical types of knowledge
cathode-ray tube (CRT) monitor
The most common type of monitor that are typically placed directly on the system unit or on the desktop.
Microphone
The most widely used audio-input device is the _______.
Correct Answer: C. microphone
The most widely used audio-input device is the _______. Answers: A. Webcam B. radio frequency card reader C. microphone D. stylus
Speakers and Headphones
The most widely used audio-output devices.
Clock speed
The number of times the clock that controls the computer ticks per second. Each clock tick would allow a single step in the Fetch - Decode - Execute cycle to complete. This is measured in Hertz (Hz) and a modern processor would usually have a clock speed measure in gigahertz. 1 gigahertz is 1 billion clock ticks per second!
Correct Answer: B. platform
The operating system is often referred to as the software environment or software _______. Answers: A. network B. platform C. window D. desktop
central processing unit (CPU)
The part of the computer that holds data and program instructions for processing the data. The CPU consists of the control unit and the arithmetic-logic unit. In a microcomputer, the CPU is on a single electronic component called a microprocessor chip.
Encryption
The process of converting an original message into a form that cannot be read but anyone except the intended receiver
Entity-Relationship (ER) Modeling
The process of designing a database by organizing data entities to be used and identifying the relationships among them
microcomputer (4 types)
a small computer that contains a microprocessor as its central processor
Aspect Ratio
The proportional relationship between a display's width and height.
Correct Answer: A. Aspect ratio
The proportional relationship between a display's width and height. Answers: A. Aspect ratio B. Resolution C. Dot pitch D. Clock speed
Correct Answer: C. pixels
The series of dots that form the image on a monitor are called _______. Answers: A. picas B. bits C. pixels D. bytes
Protocol
The set of rules and procedures governing transmission across a network
active display area
The size, or _______, is measured by the diagonal length of a monitor's viewing area.
Indent
The space between the edge of a line of text or a paragraph and the margin.
C
The standard for high definition optical discs is _______. A. DVD-RAM B. HD DVD C. Blu-ray D. HD CD
Trojan Horse
a software program containing a hidden function that presents a security risk
Packet Switching
The transmission technology that breaks up blocks of text into packets
document
The type of file created by word processors, for example, memos, term papers, and letters.
Firewall
a system (either hardware, software, or a combination of both) that prevents a specific type or information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network
inventory control system
a system that keeps records of the number of each kind of part or finished good in the warehouse
blog
a type of personal website where articles are regularly posted
disk cleanup
a windows troubleshooting utility that eliminates nonessential files
Cellular service providers
support voice and data transmission to wireless devices using cellular networks
Transaction Processing System (TPS)
supports the monitoring, collection, storage, processing, and dissemination of the organization's basic business transactions, each of which generates data
wireless LAN (WLAN)
a wireless local area network that uses radio frequencies to connect computers and other devices
Telecommuting
a work arrangement whereby employees work at home, at the customer's premises, in special workplaces, or while traveling, usually using a computer lined to their place of employment
Eliminating errors in a program is also called ______ the program. a) debugging b) modularizing c) coding d) clarifying
a) debugging
Money collected from or owed by customers is called ________.
accounts receivable
The correct sequence for the five phases in the systems development life cycle (SDLC) process is ________.
system definition requirements analysis component design Implementation system maintenance
_____ software controls where a program is stored in memory, how commands are converted so that the system unit can process them, and where files are saved.
system software
inventory control system
system that keeps records of each kind of part or finished good in the warehouse
transaction processing system
system that records day to day transactions
flash memory
also known as solid-state storage
spam blocker
also referred to as spam filter. software that uses a variety of different approaches to identity and eliminate spam or junk mail
storage area network (SAN)
an architecture to link remote computer storage devices to computers such that the devices are as available as locally attached drives
pointer
an item on the screen controlled by the mouse that is used to select items such as icons
blog
an online diary or commentary
windows os
an operating environment extending the capability of DOS
Privacy Policies
an organization's guidelines with respect to protecting the privacy of customers, clients, and employees
Real-time operating systems RTOS
another name for embedded operating systems
host
any computer system connected to a network that provides access to its resources
cybercrime
any criminal offense that involves a computer and a network
node
any device that is connected to a network (computer or printer)
document file
any text material
general purpose applications
application used for doing common tasks, such as browsers and world processors, spreadsheets, databases, management systems, and presentation graphics
Digital versatile discs (DVD)
are the standard optical discs in PCs and can store 4.7 GB
network
arrangement in which various communication channels are connected through 2 or more comps
expert systems
artificial intelligence that helps decision makers instead of them talking to actual human experts
Denial of service (DoS) attack
attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data
phishing
attempts to trick internet users into thinking a fake but official-looking website or email is legitimate
privacy
the browser mode that ensures your browsing activity is not recorded
WYSIWYG editors
Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______.
Correct Answer: A. WYSIWYG editors
Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______. Answers: A. WYSIWYG editors B. flash C. animations D. mobile apps
_________ applications allow you to play games, edit documents, and even create basic drawings without leaving your web browser.
Web-based
game port
Were used to connect video game controllers and joysticks.
C) Cloud computing
What is it called when servers on the Internet supply applications as a service, rather than a product?
Correct Answer: C. Cloud computing
What is it called when servers on the Internet supply applications as a service, rather than a product? A. Digital versatile computing B. Service computing C. Cloud computing D. Optical computing
) Ultra-high-definition television (UHDTV
What kind of specialized monitor is especially useful for graphic artists, designers, and publishers?
Fragmented
When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _____.
Correct Answer: A. fragmented
When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _______. Answers: A. fragmented B. contiguous C. sectored D. disbursed
Virtuilization
When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.
Correct Answer: D. Sectors
Which of the following is not a system software program type? Answers: A. Utilities B. Device drivers C. Language translators D. Sectors
Correct Answer: C. Stylus
Which of the following is not a type of scanning device? Answers: A. Optical scanner B. Bar code reader C. Stylus D. Character and mark recognition
Correct Answer: C. RAM
Which of the following is not an example of secondary storage? A. External hard drives B. RAID C. RAM D. Flash drives
RAM
Which of the following is not an example of secondary storage? Question 5 options: A) External hard drives B) RAID C) RAM D) Flash drives
Often stores the operating system
Which of the following is true about an internal hard disk?
Correct Answer: B. Fixed amount of storage
Which of the following is true about an internal hard disk? A. Variable amount of storage B. Fixed amount of storage C. Portable D. Slow
Access Speed
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
C
Which of the following measures the amount of time required by the storage device to retrieve data and programs? A. Nonvolatile media B. Capacity C. Access speed D. RAM
Flash Memory
Which of the following offers a combination of the features of RAM and ROM?
MIDI
Which of the following ports is used for connecting musical instruments to a sound card?
Correct Answer: C. MIDI
Which of the following ports is used for connecting musical instruments to a sound card? Answers: A. MiniDP B. S/PDIF C. MIDI D. eSATA
e-SATA
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?
Correct Answer: A. eSATA
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? Answers: A. eSATA B. S/PDIF C. HDMI D. MiniDP
Correct Answer: B. Duplex
Which of the following printer features enables you to print on both sides of a sheet of paper? Answers: A. Simplex B. Duplex C. Resolution D. Dual Matrix
Web authoring
Which of the following programs would be used to create a website?
Correct Answer: D. Printer speed is measured in the number of words printed per minute.
Which of the following statements is incorrect? Answers: A. Printer resolution is measured in dpi (dots per inch). B. Printer output is often called hard copy. C. Memory within a printer is used to store printing instructions and documents waiting to be printed. D. Printer speed is measured in the number of words printed per minute.
Correct Answer: C. Spreadsheet
Which would be the most appropriate type of application to create, analyze, and forecast budgets? Answers: A. DBMS B. Word processor C. Spreadsheet D. Presentation graphics
microprocessor
the central processing unit (CPU) of a personal computer controls and manipulates data to produce information. the microprocessor is contained on a single integrated circuit chip and is the brains of the system.
Hypertext Transport Protocol (HTTP)
the communications standard used to transfer pages across the WWW portion of the Internet; defines how messages are formulated and transmitted
wordprocessor
the computer and the program allow you to create, edit, save, and print documents composed of text
mainframe computer
the computer can process several million program instructions per second. Sizable organizations rely on these room size systems to handle large programs and a great deal of data.
connectivity
the concept related to using computer networks to link people and resources
the Internet of Things (IoT)
the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet
Tacit Knowledge
the cumulative store of subjective or experiential learning; it is highly personal and hard to formalize
application software
the form of software the end user uses
Identity theft
the illegal assumption of someone's identity for the purpose of economic gain
online identity
the information that people voluntary post about themselves online
personal computers (PC)
the least powerful, yet the most widely used and fastest-growing type of computer
virtual
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk.
Correct Answer: C. Virtual
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Answers: A. Flash B. Cache C. Virtual D. Extended
mother board
the main circuit board of a computer
Best Practices
the most efficient and effective ways to complete a business process.
supercomputers
the most powerful type of computer. Special, high-capacity computers used by very large organizations. typically used to process massive amounts of data
smartphone
the most widely used handheld computers. cell phones with wireless connections to the Internet and processing capabilities
Microsoft Word
the most widely used word processor
Workflow
the movement of information as it flows through the sequence of steps that make up an organization's work procedures
modulation
the name of the process of converting from digital to analog
Audio
______-input devices convert sounds into a form that can be processed by the system unit.
Video Editors
_______ are used to edit videos to enhance quality and appearance.
marketing
the organizational department that plans, prices, promotes, sells, and distributes an organization's goods and services
media
the physical material that holds the data and programs
user interface
the portion of the application that allows you to control and to interact with the program
the premier business oriented social networking site
Ethics
the principles of right and wrong that guide an individual in making decisions
Risk Analysis
the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each being compromised with the costs of protecting it
encryption
the process of coding information to make it unreadable except to those who have a special piece of information known as a key
demodulation
the process of converting from analog to digital
Profiling
the process of forming a digital dossier
computer communications
the process of sharing data, programs, and information between two or more computers
Privacy
the right to be left alone and to be free of unreasonable personal intrusion
procedures
the rules or guidelines for people to follow when using software, hardware, and data
Biometrics
the science and technology of authentication by scanning and measuring a person's unique physical features such as fingerprints, retinal patterns, and facial characteristics
domain name
the second part of the URL; it is the name of the server where the resource is located.
Procedures
the set of instructions about how to combine components of information systems in order to process information and generate the desired output
NIC (network interface cards)
these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter
data transmission specifications
these are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel
secondary storage devices
things like hard-disk drive, data and programs that can be retained after the computer has been shut off
illusion of anonymity
thinking that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy
proxy server
this is a server that all communications between the company's internal networks and the outside world have to pass through
optical
this type of storage uses pits and lands to represent 1s and 0s
Primary Activities
those business activities related to the production and distribution of the firm's products and services, thus creating value
specialized applications
thousands of other programs that are more narrowly focused on specific disciplines and occupations
CD, DVD, BD
three types of optical discs
DRM
to prevent copyright violations, corporations often use:
top management
top level managers are concerned with long range strategic planning. they supervise middle management
star network
topology in which each device is connected directly to a central network switch
tree network
topology in which each device is connected to a central node, either directly or through one or more other devices
bus network
topology in which each device is connected to a common cable called a backbone, and all communications travel alongside.
ring network
topology in which each device is connected to two other devices
On a hard disk a ________ is a concentric ring.
track
Rings of concentric circles without visible grooves, part of how files are stored and organized on a flexible disk.
track
The final step of the implementation phase of the systems life cycle is to A. develop documentation. B. train the users. C. select the conversion type. D. write the implementation report.
train the users.
data processing system
transaction processing system that keeps track of routine operations and records these events in a database
data processing system
transaction processing system that keeps track of routine operations and records these events in a databse
input devices
translate data and programs that humans can understand into a form that the computer can process
Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
beta
desktop OS
type of operating system that controls single desktop or notebook
linux
type of unix operating system alternate to windows
Back Door
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures
optical discs
use laster technology to store data and programs
hard disk
use rigid metallic platters that are tacked one on top of another
external hard drives
use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk
graphical user interface (GUI)
used by most general-purpose applications because it displays graphical elements called icons to represent familiar objects
Unix
used by servers on the Web, mainframe computers and powerful microcomputers
cloud computing
uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet
cable modem
uses the same coaxial cable as the television, creates a high-speed connection using USB or Ethernet
Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the a) program tracking log b) project management database c) program specifications document d) management information system
c. program specifications document
The three structures of structured programming are __________. a. sequence, order, and process b. selection, loop and iteration c. sequence, selection, and loop d. if, else, and then
c. sequence, selection, and loop
A program error that violates the grammar rules of the programming language is a(n) _______ error. a) modular b) logic c) syntax d) language
c. syntax
application software
can be described as end user software and is used to accomplish a variety of tasks
third-party cookie
cookie that is usually generated by an advertising company that is affiliated with the website you are visiting
manage resources
coordinate memory, processing, storage, and devices
information
data that has been processed by a computer system.
How tightly the bits (electromagnetic charges) can be packed next to one another on a diskette.
density
solid-state storage
does not have any moving parts, is more reliable, and requires less power than hard disks. Saves data and information electronically but is not volatile
hard disk
enclosed disk drive containing one or more metallic disks.
IP address
every computer on the Internet has a unique numeric address called an:
When a file cannot be saved on a single track across contiguous sectors and has to be broken up into small parts it is said to be ______.
fragmented
scam
fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return
midrange
fridge size machines b/w personal comps & mainframes in processing speed and data storage capacity
Social Engineering
getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges
GUI
graphic user interface. special screen that allows software commands to be issued thru use of graphic symbols or icons or pulldown menus
icons
graphical elements that represent familiar objects
QR code
graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and websites
When a computer is running virtualiztion software, the operating system for each virtual machine is known as the _______.
guest operating system
Enclosed disk drive containing one or more metallic disks. Hard disks use magnetic charges to record data and have large storage capacities and fast retrieval times.
hard disk
cyberbullying
he use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:
When a hard disk's read/write head makes contact with the hard disk's surface or with particles on its surface resulting in a catastrophic loss of data.
head crash
clock speed measured is in
hertz
The next generation of optical disc.
hi def (high definition)
sTYLUS
hich of the following is not a type of scanning device?
Digital versatile disc (DVD)
hich of these is not an example of solid state storage?
viruses
hidden instructions that migrate through networks and operating systems and become embedded in different programs
In a graphical user interface a graphical representation for a program, file, or function is called a(n) _____.
icon
Disk Cleanup
identifies and eliminates nonessential files
Rogue Wi-Fi hotspots
imitate free networks to capture any and all information
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system. A) system definition B) component design C) system maintenance D) implementation
implementation
disk caching
improves hard-disk performance by anticipating data needs
history files
include the locations, addresses, of sites that you have recently visited
File compression
increase storage capacity by reducing the amount of space required to store data and programs
network os
interactive software between applications and computers coordinating and directing activities between computers on a network. this operating system is located on one of the connected computers hard disks, making that system the network server.
disk defragmenter
is a tool that rearranges the data on your volume and reunites fragmented data so your computer can run more efficiently.
Programs that are based on _________ graphics rely on mathematics to generate and manipulate a variety of shapes.
vector
When a computer is running virtualization software, it is operating as though it were two or more separate and independent computers known as
virtual machines
Utility suites often provide programs that will protect your system from dangerous programs called computer ______.
viruses
random-access memory RAM
volatile, temporary storage that holds the program and data the CPU is presently processing. called temporary because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.
wiki
website that allows people to fill in missing information or correct inaccuracies on it by directly editing the pages.
well known social media site
compact discs (CD)
were the first widely available optical format for PC users with 700 MB of storage
software
what controls hardware?
mistaken identity
when the electronic profile of one person is switched with another
modem
widely used communication device that modifies audio, video, and other types of data into a form that can be transmitted across the Internet
broadband
widely used for DSL, cable, and satellite connections to the Internet
general-purpose applications
widely used programs in all career areas
baseband
widely used to connect individual computers that are located close to one another
Video game design software
will help you organize your thoughts and guide you through the game design process including character development and environmental design
TEST
witness
web authoring software
word processing program for generating web pages
system software
works with end users, application software, and computer hardware to handle the majority of technical details
The final task in the design phase of the systems life cycle is to A. select the best design. B. design alternative systems. C. write a systems design report. D. examine hardware requirements.
write a systems design report.
Freedom of Information Act
you are entitled to look at your records held by government agencies by law
memory
is contained on chips connected to the system board and is a holding area for data instructions and information.
Computer Fraud and Abuse Act
makes it a crime for unauthorized persons to view or damage data using any computer across state lines
malware
malicious programs created to damage or disrupt a computer system
supervisor
manager responsible for managing and monitoring workers.
middle management
managers that deal with control and planning
The tremendous amount of secondary storage required by large organizations.
mass storage
An actual physical material that holds data and programs.
media
wearable
mobile computers like Apple watch that you wear on your body
Select all the types of system software.
operating systems utilities language translators device drivers
Windows Phone 8
owned by Microsoft and used in a variety of portable devices mainly for social networking and instant messaging
system unit
part of a personal computer that contains the CPU. also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system
people
part of the information system that includes the end users
ALU
performs mathematical and logical computations
utility
performs specific tasks related to managing comp resources
utility
performs specific tasks related to managing computer resources or files. Norton utility for virus control and system maintenance is a good example of a utility
Regional managers can compare their regular sales reports with that of the other regional managers by using ________.
periodic reports
desktop computer
personal computer that is small enough to fit on top of or alongside a desk but too big to carry around
laptop computer
personal computers that are portable and lightweight and fit in most briefcases
vector images
photos that are made with geometric shapes or objects
bitmap images
photos that are made with pixels
Bumpy areas that optical discs use to represent 1s and 0s.
pit
file compression
process of reducing the storage requirements for a file
uploading
process of transferring info from comp user is operating to remote comp
mainframe`
process several million programs per second
information
processed facts
desktop publishing
program that allows you to mix tex and graphics to create publications of professional quality
plug ins
program that is automatically loaded and operates as part of a browser
virus
program that migrates through networks and operating systems, and attaches themselves to different programs and databases
Database management system (BDMS)
program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.
HTML hypertext markup language
programming language that creates document files used to display webpages
trojan horses
programs that appear to be harmless, but they contain malicious programs
Presentation graphics
programs that combine a variety of visual objects to create attractive, visually interesting presentations.
operating systems
programs that coordinate computer resources, provide an interface between users and the computer, and run applications
word processors
programs that create text-based documents,
worms
programs that simply replicate themselves over and over again
web authoring programs
programs typically used to create sophisticated commercial websites
back up
protects from disc failure
Heath Insurance Portability and Accountability Act (HIPAA)
protects medical records
Gramm-Leach Bliley Act
protects personal financial information
Although the development time is shorter, it is sometimes more difficult to manage the project and to control costs with A. rapid applications development. B. prototyping. C. systems analysis. D. systems maintenance.
prototyping.
Business Intelligence (BI)
provide COMPUTER-BASED support for COMPLEX, nonroutine decisions, primarily for middle managers and knowledge workers.
Dialog boxes
provide additional information and request user input
dialog box
provide information or request input
Cable service
provided by cable television companies using their existing television cables. These connections are usually faster than DSL
DSL service (digital subscriber line)
provided by telephone companies using existing telephone lines to provide high-speed connections
provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents
dialog box
provides additional info and requests user output
dialog box
provides additional information and requests user input
secondary storage
provides permanent or nonvolatile storage
texting
provides very efficient direct text communication between individuals using short electronic messages.
This is an outline of the logic of the program you will write.
pseudocode
microblog
publishes short sentances (twitter)
microblog
publishes short sentences that only take a few seconds to write, rather than long stories or posts like a transitional blog
data
raw unprocessed facts that are input to a computer system that will give compiled information when the computer processes those facts. Data is also defined as facts or observations about people, places, things, and events.
ROM
read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read.
employee-monitoring software
record virtually everything you do on the computer for the sake of a company
window
rectangular area containing document or message
file compression
reducing storage requiremnts for a file
Improve performance by expanding external storage, improving access speed, and providing reliable storage.
redundant array of inexpensive disks (RAID)
ROM
refers to chips that have programs built into them at the factory. the user cannot change the contents of such chips. the cpu can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer
density
refers to how tightly the magnetic charges on a hard disk are packed next to one another
downlink
refers to receiving data from a satellite
client-based email`
requires email client program to be installed on comp
warm boot
restarting your computer while the computer is already on and the is not turned off
A file is said to be fragmented when it cannot be saved on a single track across contiguous wedge shaped sections called _______.
sectors
The purpose of _________ software is to keep you, your computer, and your personal information safe from a variety of threats.
security
Logic Bombs
segments of computer code embedded within an organization's existing computer programs
Notebook (laptop) computer
small, portable system unit that contains electronic components 4- 10 lbs
packets
smaller parts of a message sent separately over the internet and reassembles into the correct order before delivery
Anti-Malware Systems (antivirus software)
software packages that attempt to identify and eliminate viruses, worms, and other malicious software
Privilege
a collection of related computer system operations that can be performed by users of the system
Database
a collection of related data. It is the electronic equivalent of a file cabinet
database
a collection of related information like employee names, addresses, and phone numbers. it is organized so that a computer program can quickly select the desired pieces of information and display them for you
Network administrator
a computer specialist responsible for efficient network operations and implementation of new networks
Network
a connecting system (wireline or wireless) that permits different computers to share resources
system unit
a container that houses most of the electronic components that make up a computer system
Denial-of-Service Attack
a cyber-attack in which an attacker sends a flood of data packets to the target computer with the aim of overloading its resources
ethics
standard of moral conduct
Second Generation mobile telecommunications (2G)
started in the 1990s using digital radio signals
Third generation mobile telecommunications (3G)
started in the 2000s and provided serves capable of effective connectivity to the internet, marking the beginning of smartphones
cold boot
starting the computer after it has been turned off
SRAM
static random access memory is a type of memory chip which is faster and requires less power than dynamic memory.
SAN is a mass storage development to link remote computer storage devices to computers such that the devices are as available as locally attached drives.
storage area network (SAN)
optical disc
storage device that can hold over 17 gigabytes of data, which is the equivalent of several million typewritten pages. lasers are used to record and read data on the disc.
Solid-state storage
storage that has no moving parts
coaxial cable
a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core
server
a host computer with a connection to the Internet that stores document files used to display web pages
Secure Socket Layer (SSL) (Transport Layer Security)
An encryption standard used for secure transactions such as credit card purchases and online banking
DIMM (dual in-line memory module)
An expansion module used to add memory to the system board.
usually connects to a USB or Thunderbolt port
An external hard disk _______.
Secondary Key
An identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy
Synchronous Optical Network (SONET)
An interface standard for transporting digital signals over fiber-optic lines; allows the integration of transmissions from multiple vendors
bit
1 or 0
Terabyte
1024 Gigabytes
byte
8 bits
Unicode
A 16-bit code designed to support international languages, like Chinese and Japanese.
can be erased and rewritten
A CD-RW disc _______.
Chrome OS
An operating system designed by Google for netbook computers and Internet connectivity through cloud computing.
disk cleanup
A Windows troubleshooting utility that eliminates nonessential files.
general-purpose application
A browser is an example of a:
8 bits
A byte is formed by a group of _____.
Logic Circuit
A circuit made by combining a sequence of logic gates.
The ______ mobile operating system was introduced in 2007 and is now owned by Google.
Android
Clip Art
A collection of graphic images that can be inserted into documents, presentations, web pages, and spreadsheets; simple drawings that are included as collections with many software packages.
Code of Ethics
A collection of principles intended to guide decision making by members of an organization
Business Process
A collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customers.
Database
A collection of related files or tables containing data
Ethernet
A common local area network protocol
creating a new folder on your computer
A computer can become infected with viruses in all the following ways, except by _____.
E-Book Reader
A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines.
all-in-one
A desktop computer that has the monitor and system unit housed together in the same case (e.g., Apple's iMac).
tower computer
A desktop system unit placed vertically.
Copyright
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years
Inline Graphic
A graphic that is part of a line of text.
Floating Graphic
A graphic to which text wrapping has been applied, making the graphic independent of text and able to be moved anywhere on the page.
Byte
A group of 8 bits that represent a single character
Entity Classes
A grouping of entities of a given type
Slot
Area on a system board that accepts expansion cards to expand a computer system's capabilities.
Output device
A hardware component of a computer system that is manipulated depending on the results of some processing. Examples of output devices are: monitor, speakers, printer, motors, lights and others.
Input device
A hardware component of a computer system that is used to gather information. Examples of input devices are: keyboard, mouse, microphone, switches and buttons, thermometer, light sensor, pressure sensor and others.
coaxial
A high-frequency transmission cable that delivers television signals as well as connects computers in a network
Ethernet port
A high-speed networking port that allows multiple computers to be connected for sharing files or for high-speed Internet access.
Digital Subscriber Lines (DSL)
A high-speed, digital data-transmission technology using existing analog telephone lines
Fifth-generation languages (5GLs) incorporate the concepts of which of the following?
Artificial intelligence.
These second-generation languages use abbreviations or mnemonics that are automatically converted to the appropriate sequence of 1s and 0s.
Assembly
toggle key
A key that turns a feature on or off.
combination key
A key, that when held down in combination with another key, performs an action.
Optical storage
A kind of secondary storage device that uses lasers to read pits and lands of an optical disc. The laser is either reflected into or away from a detector and this is interpreted as the 1s and 0s of the binary number system. Example of optical storage are CDs, DVDs and BluRays. The capacity of a CD can be as low as 640Mb and a BluRay can store up to 100Gb.
Constant
A lable referring to a location in memory containing a value that can be accessed but not changed by a program.
Tab Leader
A line that appears in front of tabbed text.
AND
A logic gate that outputs 1 if both inputs are 1.
character encoding standards
Assign unique sequence of bits to each character.
Data Mart
A low-cost, scaled-down, version of a data warehouse designed for the end-user needs in a small organization, or in a strategic business unit (SBU) or department in a large organization
magnetic-card reader
A machine that reads encoded information stored on a thin magnetic strip located on the back of a card.
resolution
A matrix of pixels.
Clip
A media file, such as a graphic, photograph, sound, movie, or animation, that can be inserted into a document.
Boolean algebra
A method for expressing mathmatically a logic circuit.
stylus
A pen-like device commonly used with tablet PCs and PDAs.
technical writer
A person who prepares instruction manuals, technical reports, and other scientific or technical documents.
Software
A program or collection of programs that enable the hardware to process data
utility suite
A program that combines several utilities in one package to improve system performance.
This lists the assets, liabilities, and the equity of an organization.
Balance sheet
window
A rectangular area that can contain a document, program, or message
carpal tunnel syndrome
A repetitive strain injury consisting of damage to the nerves and tendons in the hands.
Data Warehouse
A repository of historical data that are organized by subject to support decision makers in the organization
pixel
A series of dots that form images on a monitor. (See also picture elements)
Internet Protocol (IP)
A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.
Configuration table
A store of information about devices on a network.
Chip
A tiny circuit board etched on a small square of sandlike material called silicon. A chip is also called a silicon chip, semiconductor, or integrated circuit.
flat-panel monitor
A type of monitor that is much thinner and requires less power to operate than CRTs.
DVI (Digital Video Interface) Port
A type of port that provides a connection to a digital monitor.
VGA (Video Graphic Adapter) port
A type of port that provides a connection to an analog monitor.
Backup and Restore
A utility program included with the many versions of Windows that makes a copy of all files or selected files that have been saved onto a disk.
constant
A value that does not change
EBCDIC (Extended Binary Coded Decimal Interchange Code)
Binary coding scheme that is a standard for minicomputers and mainframe computers.
Nano bytes
All of the following are commonly used units of measurement to describe memory capacity, except _____.
Correct Answer: D. Nanobyte (NB)
All of the following are commonly used units of measurement to describe memory capacity, except _____. Answers: A. Megabyte (MB) B. Gigabyte (GB) C. Terabyte (TB) D. Nanobyte (NB)
clock speed
Also called clock rate. It is measured in gigahertz, or billions of beats per second. The faster the clock speed, the faster the computer can process information and execute instructions.
Utility suites
BitDefender Norton Utilities ZoneAlarm
The next generation of optical format (high definition) that has a capacity of 25 to 100 gigabytes.
Blu-Ray Disc (BD)
_________ software aids architects, engineers, and many others who need to create a digital model of an object.
CAD
One of the most widely used optical formats.
CD (compact disc)
Some ERP systems integrate _________ capabilities that allow sales departments to manage call centers, support customers, and keep track of sales commissions.
CRM
Which of the following is an example of a cloud-based backup utility?
Carbonite
Binary data
Categorical consisting of only two possible outcomes
PC card
Also known as Personal Computer Memory Card International Association (PCMCIA) card. Credit card- sized expansion cards developed for portable computers.
Network Interface Card (NIC)
Also known as a network adapter card. They are used to connect a computer to one or more computers forming a communication network whereby users can share data, programs, and hardware.
Center
An alignment in which an item is centered between the margins.
Internet Protocol (IP) Address
An assigned address that uniquely identifies a computer on the Internet
Phishing Attack
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.
Digital Dossier
An electronic description of an individual and his or her habits
A list of questions helps guide the systems analyst and end user through key issues for the present system.
Checklist
Concatenation
Combining two strings into a single string.
Port
Connecting socket on the outside of the system unit. Used to connect input and output devices to the system unit.
_________ software is used to create and manage complex databases.
DBMS
A newer optical format that has replaced CDs as the standard; similar to CDs except that more data can be packed into the same amount of space.
DVD (digital versatile disc or digital video disc)
digital versatile disc
DVD stands for:
Knowledge
Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current problem or activity
Clickstream Data
Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a web site.
Which of the following tools present data or information flow within an information system? A. Grid chart B. Decision table C. System flowchart D. Data flow diagram
Data flow diagram
Information
Data that has been organized so that they have meaning and value to the recipient
Asynchronous Transfer Mode (ATM)
Data transmission technology that uses packet switching and allows for almost unlimited bandwidth on demand.
DBMS
DataBase Management System - the system that separates the applications from the data, and provides features that allow the database systems to be created, interrogated, and maintained.
This system is a flexible tool for data analysis, since its reports do not have a fixed format.
Decision support system
A(n) _____ shows the decision rules that apply when certain conditions occur.
Decision table
A program associated with a device that works with the operating system to allow communication between the device and the rest of the computer system.
Device driver
Problems arising in this approach would spell disaster. A. Direct approach B. Parallel approach C. Phased approach D. Pilot approach
Direct approach
Audit
Examination of of information systems, their inputs, outputs, and processing
The marketing department identifies, investigates, and develops new products and services.
False
_________ is software that is completely free to use without any specified time restrictions.
Freeware
PAths
Hard disks store and organize files using all of the following, except _______. A) tracks B) sectors C) cylinders D) paths
input device
Hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process.
Information Technology Components
Hardware, software, databases, and networks
_______ is an operating system feature that provide(s) online assistance for operating system functions and procedures.
Help
Information Technology Infrastructure
IT components plus IT services
CERN
In Switzerland, where the web was introduced in 1992
Dialog Boxes
In many application programs, this feature is used to provide information or request input.
Correct Answer: C. Dialog boxes
In many application programs, this feature is used to provide information or request input. Answers: A. Windows B. Menus C. Dialog boxes D. Pointer
What documentation shows the income, expenses, and difference between them for a company during a specific time period?
Income statements
RFID (radio-frequency identification) tag
Information chips that are embedded in merchandise to track their location.
joystick
Input device for computer games.
Coaxial Cable
Insulated copper wire; used to carry high-speed data traffic and television signals
Trade Secret
Intellectual work, such as a business plan, that is a company secret and is not based on public information
network OS
Interactive software between applications and computers coordinating and directing activities between computers on a network. This operating system is located on one of the connected computers' hard disks, making that system the network server.
Correct Answer: A. Thumb
Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connecting to the Web. Answers: A. Thumb B. Traditional C. Notebook D. Combination
home networks
LAN that allows different computers to share resources, including a common internet connection
_______ convert programming instructions into a language that the computer can process.
Language translators
AC adapter
Laptops and tablets use _____ that are typically located outside the system unit.
Correct Answer: A. AC adapters
Laptops and tablets use _____ that are typically located outside the system unit. Answers: A. AC adapters B. batteries C. power supply units D. MiniDc
Which of the following is an example of password management software?
LastPass
This is an example of the _______ operating system, which is a powerful alternative to Windows.
Linux
_________ is an open source operating system with hundreds of distributions that are available commercially or as a free download.
Linux
As much as 75 percent of the total lifetime cost for an application program is spent on this.
Maintenance
Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers?
Management information system (MIS)
Monitoring system performance is an example of how the operating system ________.
Manages resources
Memory
Memory is contained on chips connected to the system board and is a holding area for data instructions and information (processed data waiting to be output to secondary storage). RAM, ROM, and CMOS are three types of memory chips.
Backing Storage
Memory which can be used for long term storage
This level of management is involved with tactical planning and implementing the long-term goals within an organization.
Middle management
GUI
Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.
Correct Answer: C. graphical user interface
Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects. Answers: A. integrated package B. dialog box C. graphical user interface D. menu button
_______ operating systems are used to control and coordinate computers that are linked together.
Network
Distributed Processing
Network architecture that divides processing work between two or more computers, linked together in a network
Hard Drive
Non-volatile storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces. The capacity can be anything from a few hundred gigabytes to several terrabytes. The device is either permanently installed within the computer case or can be portable
AC adapter
Notebook computers use AC adapters that are typically outside the system unit. They plug into a standard wall outlet, convert AC to DC, provide power to drive the system components, and can recharge batteries.
unix
OS developed for midrange comps
windows 8
OS from 2012 to better inegrate desktop OS with mobile OS
These systems are used in managing documents, communicating, and scheduling.
Office automation systems
mouse pointer
Often in the form of an arrow, it moves on the screen as the user moves the computer mouse.
sectors
On a hard disk each track is divided into invisible wedge-shaped sections called _______.
Correct Answer: B. sockets
On the motherboard, the connection points for chips are referred to as _____. Answers: A. slots B. sockets C. ports D. lines
use file compression
One way to improve the storage capacity of a hard disk is to _______.
Windows utilities
Optimize Drives Disk Cleanup File History
expansion card
Optional device that plugs into a slot inside the system unit to expand the computers' abilities. Ports on the system board allow cables to be connected from the expansion board to devices outside the system unit.
Communications Channels
Pathway for communicating data from one location to another
High Definition Multimedia Interface (HDMI)
Port that provides high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.
optical audio connections
Port used to integrate computers into high-end audio and home theatre systems.
Which of the following is an example of presentation software?
PowerPoint
In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system
Prepares a preliminary investigation report
_________ software enables users to create electronic slideshows that are used to present information.
Presentation
Cloud Printers
Printers connected to the Internet that provide printing services to others on the Internet are called _______.
Correct Answer: D. cloud printers
Printers connected to the Internet that provide printing services to others on the Internet are called _______. Answers: A. dot-matrix printers B. thermal printers C. plotters D. cloud printers
primary storage
RAM is sometimes referred to as:
digital video camera
Record motion digitally on a disk or in the camera's memory.
Compression
Reduction in file size to reduce download times and storage requirements.
Semiconductor
Silicon chip through which electricity flows with some resistance.
registers
Small high-speed storage locations in a process that temporarily hold data and instructions.
Handheld
Smallest type of system unit, designed to fit into the palm of one hand.
Flash Memory Card
Smartphones use which of these storage technologies?
Correct Answer: C. Flash memory card
Smartphones use which of these storage technologies? Answers: A. Optical drive B. Solid state drive C. Flash memory card D. Flash drive
Socket
Sockets provide connection points on the system board for holding electronic parts.
application
Software designed to carry out a useful real-world task.
NIC
Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
interactive whiteboard
Specialized devices with a large display connected to a computer or projector (see also digital whiteboard)
_________ software is used for entering, calculating, and analyzing sets of numbers.
Spreadsheet
_______ operating systems control a single desktop or laptop computer.
Stand-alone
Boot
Starting or restarting your computer.
cold boot
Starting the computer after it has been turned off.
Gathering and analyzing data is part of this phase. a.Systems analysis b.Systems implementation c.Preliminary investigation d.Systems design
Systems analysis
ExpressCard
Technology replacing the PC Card to provide a direct connection to the system bus. Also see PC card.
Correct Answer: A. Bitrate
Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character
Correct Answer: B. Word
Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character
Code editor
Text area used to enter code in an IDE.
User Interface
The boundary between the computer and the user.
embedded
The category of operating system used for handheld devices.
Correct Answer: B. Embedded
The category of operating system used for handheld devices. Answers: A. Network B. Embedded C. Stand-alone D. Open source
Security
The degree of protection against criminal activity, danger, damage, and/or loss
Clock Chip
The electronic device in a computer that controls the timing of signals.
Database
The electronic equivalent of a file cabinet is a _______.
database
The electronic equivalent of a file cabinet is a _______.
Correct Answer: A. database
The electronic equivalent of a file cabinet is a _______. Answers: A. database B. word processor C. spreadsheet D. query
Secondary Storage
The long term memory of the computer where programs and data are kept when they aren't being used. Hard disks, optical drives and solid state drives are all examples of secondary storage.
Primary Storage
The main working memory of the computer made up of ROM and RAM. This is where the computer stores data and programs while they are being worked on.
The Internet ("the Net")
The massive network that connects computer networks of businesses, organizations, government agencies, and schools around the world, quickly, seamlessly, and inexpensively.
carrier package
The material that chips are mounted on which then plugs into sockets on the system board.
Correct Answer: A. microphones
The most widely used audio-output devices. Answers: A. microphones B. speakers and headsets C. cloud printers D. faxes
Windows
The most widely used personal computer operating system.
Domain Names
The name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left.
Word
The number of bits (such as 16, 32, or 64) that can be accessed at one time by the CPU.
Command Line
The place where typed commands are given to the operating system.
reading
The process of accessing information from secondary storage devices is referred to as _______.
Correct Answer: C
The process of accessing information from secondary storage devices is referred to as _______. A. backing up B. restoring C. writing D. reading
Correct Answer: C. clock speed
The processing speed of a microprocessor is typically represented by its _____. Answers: A. bus line B. control unit C. clock speed D. ALU
Ergonomics
The science of adapting machines and work environments to people; focuses on creating an environment that is safe, well lit, and comfortable
Font Size
The size of characters measured in points.
Correct Answer: B. active display area
The size, or _______, is measured by the diagonal length of a monitor's viewing area. Answers: A. resolution B. active display area C. aspect ratio D. dot pitch
Database Management System (DBMS)
The software program (or group of programs) that provides access to a database
Kerning
The space between standard combinations of letters.
BIOS (basic input/output system)
The start-up instructions for a computer, including the specifics concerning the amount of RAM and the type of keyboard, mouse, and secondary storage devices connected to the system unit.
Correct Answer: D. Ergonomics
The study of human factors related to things people use. Answers: A. Headgear B. RSI C. Technical study D. Ergonomics
Domain Name System (DNS)
The system administrated by the Internet Corporation for Assigned Names (ICANN)that assigns names to each site on the internet
Business-Information Technology Alignment
The tight integration of the IT function with the strategy, mission, and goals of organization
Which among the following would not be described in the systems analysis report? A. The current information system B. The requirements for a new system C. The development schedule D. The training requirements for users
The training requirements for users
telephony
The transmission of telephone calls over computer networks.
Internet telephony (Voice over Internet Protocol or VoIP)
The use of the Internet as the transmission medium for telephone calls.
Image Editors
These are specialized graphics programs for editing or modifying digital photographs.
Blu-ray
These discs have a capacity of 50 gigabytes on one side.
Correct Answer: D
These discs have a capacity of 50 gigabytes on one side. A. HD DVD B. CD C. DVD D. Blu-Ray
Unicode
This character encoding scheme allows non-English characters and special characters to be represented.
Correct Answer: B. Unicode
This character encoding scheme allows non-English characters and special characters to be represented. Answers: A. ASCII B. Unicode C. EBCDIC D. ANSIC
disk caching
This hard-disk performance enhancement anticipates data needs
contrast ratio
This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.
Correct Answer: A. Contrast ratio
This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black. Answers: A. Contrast ratio B. Dot Pitch C. Active display area D. Resolution
App Store
This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
App store
This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
Correct Answer: A. MICR
This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. Answers: A. MICR B. OCR C. OMR D. UPC
disk caching, RAID, and file compression
Three ways to improve the performance of a hard disk include _______.
________ systems help supervisors by generating databases that act as the foundation for other information systems.
Transaction processing
Accounts payable refers to money the company owes its suppliers for materials and services it has received.
True
CAD/CAM systems use powerful personal computers running special programs that integrate the design and manufacturing activities.
True
Customer profiles, census data, and economic forecasts are examples of external data.
True
Demand reports do not have to be produced on a regular basis.
True
Expert systems capture the knowledge of human experts and store it in a knowledge base.
True
Knowledge workers use specialized information systems, called KWSs, to create information in their area of expertise.
True
Middle-level managers are responsible for tactical planning and the implementation of long-term goals.
True
Unicode
Up to 32-bit system to code the character set of a computer (usually 16-bit or 32-bit versions).
hexadecimal system (hex)
Uses 16 digits to represent binary numbers.
_________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.
Virtual reality
parallel processing
When several CPUs work on the same program together
Voice over IP
Which of the following allows the transmission of voice and often video communication over the Internet?
Printer speed is measured in the number of words printed per minute.
Which of the following statements is incorrect? A) Printer resolution is measured in dpi (dots per inch). B) Printer output is often called hard copy. C) Memory within a printer is used to store printing instructions and documents waiting to be printed. D) Printer speed is measured in the number of words printed per minute.
OMR
Which of the following types of character recognition systems is used for standardized multiple-choice testing?
Correct Answer: C. OMR
Which of the following types of character recognition systems is used for standardized multiple-choice testing? Answers: A. UPC B. MICR C. OMR D. OCR
Optical DIsk
Which of these is not a mass storage device?
The operating system feature which is a rectangular area for displaying information and running programs.
Window
_______ is the most popular desktop operating system.
Windows
_________ can run mobile-style apps in the area known as the Start screen, while running traditional software in the more familiar desktop.
Windows 8
Versions of Windows
Windows 8 Windows 7
The ______mobile operating system was originally developed in 2012 by Microsoft to support a variety of portable devices, including smartphones.
Windows Phone 8
Desktop Systems
With these systems, input and output devices are located outside the system unit.
Correct Answer: A. Desktop systems
With these systems, input and output devices are located outside the system unit. Answers: A. Desktop systems B. Personal digital assistants C. Smartphones D. Laptop computers
Which of the following is an example of word processing software?
Word
_________ software provides tools for creating and editing all kinds of text-based documents such as letters, resumes, and reports.
Word processing
Which of the following is NOT a popular computer programming language?
Xero
Input
_______ is any data or instructions that are used by a computer.
Correct Answer: A. Dialog boxes
_______ provide additional information and request user input. Answers: A. Dialog boxes B. Windows C. Toolbars D. Ribbons
database
a collection of organized data that allows access, retrieval, and use of data
computer network
a communication system that connects two or more computers so that they can exchange information and share resources
Metasearch Engine
a computer program that searches several engines at once and integrates the findings of the various search engines to answer queries posted by users
Distributed Denial-of-Service (DDoS) Attack
a denial-of-attack that sends a flood of data packets from many compromised computers simultaneously
attachment
a file attached to email message
presentation file
a file created by presentation graphics programs to save presentation materials
attachment
a file, such as a document or worksheet, that is attached to an email message
Record
a grouping of logically related fields
Internet
a huge computer network available to everyone with a personal computer and a means to connect to it. it is the actual physical network made up of wires, cables, and satellites as opposed to the web, which is the multimedia interface to resources available on the Internet.
copyright
a legal concept that gives content creators the right to control use and distribution of their work
Bandwidth
a measurement of the width or capacity of the communication channel
feild
a place in a database record where a category of information can be entered or located
Flash Drive
a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain; also known as a pen drive, keychain drive, thumb drive, jump drive
Linux
a popular open source alternative to Windows
extranet
a private network that connects more than one organization
Virtual Private Network (VPN)
a private network that uses a public network (usually the internet) to securely connect users by using encryption
intranet
a private network within an organization that resembles the Internet
Knowledge Management (KM)
a process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory anf that typically reside within the organization in an unstructured manner
javascript
a scripting language that adds basic interactivity to web pages
Master Data
a set of core data, such as customer, product, employee, vendor, geographic location, and so on that span the enterprise information systems
Warm Site
a site that provides many of the same services and options of the hot site but does not include the company's applications
enterprise storage system
a strategy developed by large organizations to promote efficient and safe use of data across the networks within their organizations
Risk Acceptance
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur
Risk Limitation
a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat
client based email
a system that requires a special program known as an email client is a users personal computer
Certificate Authority
a third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
Public-Key Encryption
a type of encryption that uses two different keys, a public key and a private key
network attached storage (NAS)
a type of file server designed for homes and small businesses. NAS is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.
backup and restore
a utility program that helps protect you from the effects of a disc failure by making a copy of selected or all files that have been saved onto a disk.
Chat Room
a virtual meeting room where you can communicate in real time, where groups come to "gab" electronically
internet
a way to connect to other people and computers
When a program makes a true or false decision, it is an example of a(n) _______ logic structure. a) if-then-else b) do until c) do while d) what-if
a. if-then-else
The __________ structure involves repeating a sequence until a condition is met. a) loop b) sequence c) conditional d) selection
a. loop
The program's processing steps are grouped into logically-related programming statements called a) modules b) unit c) object d) component
a. modules
The control structure used to perform a series of statements one after the other is called a) sequential b) selection c) loop d) random
a. sequential
Measures the amount of time required by the storage device to retrieve data and programs.
access speed
mobile application
add on features for a variety of mobile devices, including smartphones netbooks and tablets
mobile application
add on features for variety of mobile devices
The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):
algorithm
Adware
alien software designed to help pop-up ads that appear on your screen
image editors
an application for modifying bitmap images
Data Governance
an approach to managing information across an entire organization
chrome OS
an operating system designed by google for netbook computers and internet connectivity through cloud computing
multitasking
an operating system feature that allows more than one application to run at a time
unix
an operating system originally developed for midrange computers. it is now important because it can run on many of the more powerful personal computers.
primary storage
another name for RAM
Flowcharts and pseudocode are examples of tools used in the program __________ phase. a) specification b) design c) code d) test
b. design
When a program repeats a portion of software code as long as a certain condition doesn't exist, it's using a(n) _______ structure. a) if-then-else b) do until c) do while d) what-if
b. do until
The actual coding of a program is done by a(n) a) systems analyst b) software engineer c) end-user d) database administrator
b. software engineer
This shows the relationship between input and output documents. a.Investigation report b.Grid chart c.Top-down analysis method d.Checklist
b.Grid
e-commerce
b2b b2c c2c
database field (column)
basic unit data entry
machine code
binary representation of a program
Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.
bitmap
Starting or restarting the computer is called ______ the system.
booting
temporary Internet files
browser cache, contains web page content and instructions for displaying this content
history file
browsers store the locations of sites visited in a:
pits
bumpy areas on the surface of optical discs
electronic commerce
buying and selling goods electronically
e commerce types (B2B, B2C, C2C and examples)
buying and selling goods over the internet
A(n) __________ error could be the result of the programmer making an incorrect calculation. a) syntax b) general protection c) logic d) breakpoint
c) logic
How much a particular storage medium can hold.
capacity
embedded operating system
cell phone operating systems
switch
central node that coordinates the flow of data by sending messages directly between sender and receiver nodes
microprocessor
central processing unit (cpu) of a personal computer controls and manipulates data to produce info
rewritable discs
changeable, portable storage options that are popular for storing and sharing audio, video, and large multimedia presentations
wireless communication
changed the way we communicate with one another
language translator
changes things into computer processable language
memory
chips connected to system board
The _________ is a temporary location for things that are being moved or copied.
clipboard
Internet servers that supply applications as a service for online storage.
cloud storage
A ______ boot is when you power on a computer that is off.
cold boot
Information system
collection of hardware, software, people, data, procedures, and the internet
database
collection of related info
botnet
collection of zombies
database filed
column. given names displayed at top of each table
USB drive
combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high speed scanners, printers, and video capturing devices
Broadcast Media (Wireless Media)
communications channels that use electromagnetic media (the "airwaves") to transmit data
CAD/CAM
comp aided design
The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU.
compiler
Embedded OS
completely stored within ROM
spreadsheet
computer produced spreadsheet based on the traditional accounting worksheet that has rows and columns used to present and analyze data
software (2 major kinds)
computer program consisting of step by step instructions, directing the computer on each task it will perform
expert system
computer program that provides advice to decision makers who would other wise rely on human experts
Select all of the common names associated with someone who resolves common technical problems faced by computer users.
computer support specialist help-desk technician technical support specialist
privacy
concerns the collection and use of data about individuals
Hyperlink
connection or link to other documents or web pages that contain related content
hyperlink
connection or link to other documents or web pages that contain related information
firewall
consists of hardware and software that control access to a company's intranet and other internal networks
twisted-pair cable
consists of pairs of copper wire
analog signals
continous electronic waves sent and received by telephones
NOS (network operating systems)
control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources
Communications Controls (Network Controls)
controls that deal with the movement of data across networks
Physical Controls
controls that restrict unauthorized individuals from gaining access to a company's computer facilities
Access Controls
controls that restrict unauthorized individuals from using information resources and are concerned with user identification
The first step in implementing a new system is to determine the A. hardware requirements. B. software requirements. C. conversion type. D. best alternative.
conversion type
domain name server (DNS)
converts text-based address to IP address
first-party cookie
cookie that is germinated only by the website you are currently visiting
Piracy
copying a software program without making payment to the owner
Wide area networks (WAN)
countrywide and worldwide networks
Virtual private networks (VPN)
create a secure private connection between a remote user and an organization's internal network
word processors
create text-based documents and are one of the most flexible and widely used software tools.
word processor
create, edit, print text based documents
worksheet files
created by electronic spreadsheets to analyze things like budgets and to predict sales
presentation file
created with presentation programs
production
creates finished goods and dervices using raw materials and personnel
The actual writing of a program in a programming language is called a) program design b) logic structure c) language translation d) coding
d) coding
Metadata
data about data
information brokers
data gatherers who collect, analyze, and sell personal data
Relational Database Model
data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data
A transaction processing system is also referred to as a ________.
data processing system
cloud computing
data stored at a server on the Internet and available anywhere the Internet can be accessed.
Cloud computing
data stored on a server on the internet
The place that provides access to computer resources allowing you to interact with the operating system's graphical user interface.
desktop
graphical site map
diagram a websites overall design
Read-only discs
discs that cannot be written on or erased by the user- stuff you buy in the store
A hard disk performance enhancement that improves processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
disk caching
tab
divide menus into major activity areas
manuals
documents written with procedures by computer specialists
Digital Certificate
electronic document created and digitally signed by a trusted third party that certifies the identity of the owner of a public key
communication systems
electronic systems that transmit data from one location to another
disk defragmenter
eliminates unnecessary fragments and rearranges files
the operating system on a smartphone would be ______.
embedded
mobile os
embedded operating system that controls a smartphone
Virtual private networks (VPN)
encrypt connections between company networks and remote users such as workers connecting from home
A type of system that large organizations use to promote efficient and safe use of data across the networks within their organizations.
enterprise storage system
hardware
equipment that includes a keyboard, monitor, printer, the computer itself, and the devices that are controlled by the software programming.
A CD that can be written to many times. (See also CD-RW compact disc rewritable)
erasable optical disc
big data
ever-growing volume of data
A hard disk performance enhancement that increases storage capacity by reducing the amount of space required to store data and programs.
file compression
Utility programs
file compression diagnostic antivirus backup
database file
file containing highly structured and organized data created by database management programs.
database file
file containing highly structured data created by database programs
document file
file created by a word processor to save documents such as letters, research papers, and memos
Rebuilding a file that has been compressed.
file decompression
Documents, worksheets, programs, and presentations are all examples of _____.
files
You would run this program on your hard drive to ______ and improve system performance.
free up disk space
QR Code
graphics that appear as black and white boxes that automatically link mobile devices to a variety of diff content including games, text, videos, websites
connectivity
greatly expands the capability and usefulness of information systems
In a GDSS, the ________ is generally the decision maker.
group
Unified Communications (UC)
hardware and software platform that simplifies and integrates all forms of communications - voice, email, instant messaging, location, and video-conferencing - across an organization.
storage devices
hardware that reads data and programs from storage media
Fourth general mobile telecommunications (4G)
has begun to replace 3g networks in some areas with providers using LTE connections to provide faster transmission speeds
information system
has several parts: people, procedures, software, hardware, data, and the Internet
pixels
he series of dots that form the image on a monitor are called _______.
Cybercrime
illegal activities conducted online
redundant arrays of inexpensive disks (RAID)
improve performance by expanding external storage, improving access speed, and providing reliable storage
general purpose application
includes word processing programs, spreadsheets, presentation graphics, and database management systems
viruses
instructions that migrate thru networks and OSs and become embedded in diff programs. sometimes designed to destroy data
web
introduced in 1992 and prior to the web the internet was all text. the web made it possible to provide a multimedia interface
The ________ keeps records of the number of each kind of part or finished good in the warehouse.
inventory control system
web bugs
invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge
sectors
invisible wedge-shaped sections that divided each track
TCP/IP (transmission control protocol/internet protocol)
involves identifying sending and receiving devices and breaking information into smaller parts called packets
Flat areas that optical discs use to represent 1s and 0s.
land
File History
makes a copy of all files that are in the libraries, contacts, and favorites and on the desktop
Digital Millennium Copyright Act
makes it illegal to deactivate or otherwise disable any anti-piracy technologies including DRM technologies
access speed
measures the amount of time required by the storage device to retrieve data and programs
In a graphical user interface, ______ provide a list of options and commands.
menus
privacy mode
mode in the browser that ensures that your browsing activity is not recorded on your hard disk
blogs
online diaries or commentaries
Internet servers that supply applications as a service for storage (See also Cloud Storage)
online storage
Virtual Universities
online universities from which students take classes from home or an off-site location via the internet
An ______ operating system is one in which users can modify and further develop the code.
open source
software platform
operating system consisting of collection of programs to handle technical details depending on the type of operating system
A device with a laser that projects a tiny beam of light on a disc to reflect the light to determine a pit or land.
optical disc drive
microprocessor
part of system unit that controls and manipulates data to produce information
memory
part of the system unit that is a holding area for data, instructions, and information
Computer monitoring software
perhaps the most invasive and dangerous type of spyware
secondary storage
permanent storage used to preserve programs and data that can be retained after the computer is turned off
Menus
present commands that are typically displayed in a menu bar at the top of the screen
RAM or memory, where data is stored before being processed.
primary storage
downloading
process of transferring information from a remote computer to the computer one is using
uploading
process of transferring information from the computer the user is operating to a remote computer
specialized applications
programs that are narrowly focused on specific disciplines and occupations. some of the best known are multimedia, web authoring, graphics, virtual reality, and artificial intelligence
web page editors
programs that provide support for website design and HTML coding
Project resources can be scheduled, planned, and controlled using ________.
project managers
help
provide online assistance for operating system functions and procedures
buttons
provide shortcuts for quick access to commonly used commands
ROM
read only memory. user cannot change contents
Ribbons
replace menus and toolbars by organizing commonly used commands into a set of tabs. These tabs display command buttons that are the most relevant to the tasks being performed by the user
exception report
report that calls attention to unusual events
periodic report
reports for a specific time period as to the health of the company or a particular department of the company
digital signals
represent the presence or absence of an electronic pulse and are sent and received by computers
cylinder
runs through each track of a stack of platters
The ________ activity records the customer requests for products or services.
sales order processing
JavaScript`
scripting language that adds basic interactivity to webpages
Provides permanent or nonvolatile storage.
secondary storage
Hardware where data and programs can be retained after the computer has been shut off. (see also storage device)
secondary storage device
solid state storage
secondary storage device that has no moving parts
password
secret words or phrases that must be keyed into a computer system to gain access
Determining whether the system can be made secure against unauthorized use is part of A. analyzing the data. B. writing the systems design report. C. selecting the best system. D. testing the system.
selecting the best system.
To keep using _________ after the trial period, you must purchase a full version or a code that can be entered into the software.
shareware
modem
short for modulator-demodulator
income statement
shows company's financial position over period of time
Galleries
simplify the process of making a selection from a list of alternatives. This is accomplished by graphically displaying the effect of alternatives before being selected.
window
simply a rectangular area that can contain a document, program, or message.
mobile apps
small programs primarily designed for mobile devices
flash memory cards
small solid-state storage devices widely used in portable devices
tablet
smaller, lighter, and generally less powerful personal computers than laptops. Usually have touch-screens instead of standard keyboards
Storage devices with no moving parts. Data and information are retrieved electronically.
solid-state storage
executive support system
sophisticated software that can draw together data from an organizations databases in meaningful patterns and highly summarized forms
Basic categories of operating systems
stand-alone network embedded
First Generation mobile telecommunications (1G)
started in the 1980s using analog radio signals to provide analog voice transmission service
peer-to-peer network
strategy of having nodes have equal authority and can act as both clients and servers
client/server networks
strategy of using central servers to coordinate and supply services to other nodes on the network
cloud suite
suite stored at a server on the Internet and available anywhere from the Internet
cloud suite
suite stored at a server on the internet & available anywhere on internet
Specialized suites
suites focus on specific applications
cloud suites
suites that are stored at a server on the Internet and are available anywhere you can access the Internet.
Utility suites
suites that include a variety of programs designed to make computing easier and safer
transaction processing system
system that records day to day transactions, such as customer orders, bills, inventory levels, and production output
microcomputer hardware
system unit, input/output, secondary storage, communication
Determining whether the new procedures are actually furthering productivity is part of the A. testing of the new sample phase. B. selecting the best system phase. C. designing of alternatives phase. D. systems audit phase.
systems audit phase.
The costs versus the benefits of designs and the outlines of their effects is presented in the A. systems analysis report. B. preliminary investigation report. C. initialization report. D. systems design report.
systems design report
Strategic Information Systems (SISs)
systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity
uplink
term relating to sending data to a satellite
TEST
test
web authoring
the act of creating a site
hardware
the equipment that processes the data to create information
production
the organizational department that actually creates finished goods and services using raw materials and personnel
Privacy
the right to be left alone and to be free of unreasonable personal intrusions
Information Privacy
the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others.
pixels
the thousands of dots that form images
DBMS database management system
to organize, manage, and retrieve data. DBMS programs have five subsystems: DBMS engine, data definition, data manipulation, applications generation, and data administration. (Microsoft access)
web authoring programs
typically used to create sophisticated commercial sites
data
unprocessed facts
digital right management (DRM)
used by corporations to control access to electronic media and files
optical disc drives
uses a laser that projects a tiny beam of light to read the disc
strategy
way of coordinating the sharing of information and resources
hotspots
wireless access points that provide internet access
Correct Answer: B. can be erased and rewritten
A CD-RW disc _______. A. can be written to only once B. can be erased and rewritten C. cannot be written on D. cannot be erased
Router
A communications processor that routes messages through several connected LANs or to a wide area network such as the Internet
Kilobyte
1024 bytes.
application software
Apps software that performs useful work
control unit
Component of a processor that directs and coordinates most of the operations in the computer.
crackers
Computer criminals who create and distribute malicious programs.
Network Access Points (NAPs)
Computers that act as exchange points for Internet traffic and determine how traffic is routed
Analog Signals
Continuous waves that transmit information by altering the amplitude and frequency of the waves
Table
A grouping of logically related records
Cross-Functional Business Process
A process in which no single functional area is responsible for its completion; multiple functional areas collaborate to perform the function
Authentication
A process that determines the identity of the person requiring access
Accumulator
A register in the CPU that stores data currently being used by the CPU.
Smartphone
A type of cell phone that offers a variety of advanced functionality, including Internet and e-mail.
Peer-to-Peer (P2P) Processing
A type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server.
Hanging Indent
A type of indent in which the second and following lines of a paragraph are indented more than the first.
laser printer
A type of printer that uses a laser light beam to produce images with excellent letter and graphics quality.
Virtual Group (Team)
A work group whose members are in different locations and who meet electronically.
Web authoring programs that allow you to build a page without interacting directly with HTML code are known as _______.
A) WYSIWYG editors
optical scanner
Accepts documents consisting of text and/or images and converts them to machine-readable form.
Bus
All communication travels along a common connecting cable called a bus or a backbone. As information passes along the bus, it is examined by each device on the system board to see if the information is intended for that device. See bus line and ethernet.
integer
All whole numbers (both positive and negative) and zero.
Motherboard
Also called a system board; the communications medium for the entire system.
arithmetic operation
Fundamental math operations: addition, subtraction, multiplication, and division.
Correct Answer: B. Server
In a network operating system, this computer coordinates all communication between computers. Answers: A. Client B. Server C. Terminal D. Mode
Correct Answer: C. Host
In a virtualized environment, this operating system runs on the physical machine. Answers: A. Guest B. Client C. Host D. Home
There are three basic decision models used in GDSS: operational, strategic, and financial.
False
Which of the following is an example of video editing software?
Final Cut Pro
Font Effect
Font formatting that applies a special effect to text such as small caps or superscript.
parallel processing
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____.
Correct Answer: C. parallel processing
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____. Answers: A. arithmetic-logic processing B. multiplexer processing C. parallel processing D. graphics coprocessing
PCI Express (PCIe)
New type of bus that is 30 times faster than PCI bus.
Correct Answer: D
On a hard disk each track is divided into invisible wedge-shaped sections called _______. A. bits B. platters C. cylinders D. sectors
Sockets
On the motherboard, the connection points for chips are referred to as _____.
Pits and lands
Optical discs use these to represent data.
operating systems
Programs that coordinate computer resources, provide an interface, and run applications are known as:
spreadsheets
Programs that organize, analyze, and graph numerical data such as budgets and financial reports.
read-only memory (ROM)
Refers to chips that have programs built into them at the factory. The user cannot change the contents of such chips. The CPU can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer, for example. Also called firmware.
Information Technology (IT)
Relates to any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
RFID
Radio frequency identification uses radio frequencies to represent a number that can be scanned for input into a computer system.
To create successful software, computer programmers go through a series of steps known as the:
SDLC
disk defragmenter
A Windows utility that optimizes disk performance by eliminating unnecessary fragments and rearranging files.
virtualization
A process that allows a single physical computer to support multiple operating systems that operate independently.
A process by which a program is divide into two modules called objects.
(OOP) Objected- oriented programming
Correct Answer: A. E-book reader
A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Answers: A. E-book reader B. Interactive whiteboard C. HDTV D. Flat panel monitor
Transmission Control Protocol/Internet Protocol (TCP/IP)
A file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted.
Hot Sites
A fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicate your company's computing resources and provide near realtime recovery of IT operations.
File
A grouping of logically related records
Intranet
A private network that uses the TCP/IP protocols.
bluetooth
A short-range radio communication standard that transmits data over short distances of up to approximately 33 feet
Character
A sinlge alphabetic or numeric character.
Bullet
A small graphic symbol used to identify an item in a list.
Accountability
A tenet of ethics that refers to determining who is responsible for actions that were taken
liquid crystal display (LCD)
A thin, flat display made up of any number of color or monochrome pixels arrayed in front of a light source or reflector.
Core
A traditional processor has a single core. Modern processors have more than one core so, in effect, are like having more than one processor. A dual core processor will have two cores and so can perform two operations at the same time.
Crypto processor
A type of specialty processor devoted exclusively to protecting your privacy.
capacity
The _______ of a secondary storage device indicates how much data the storage medium can hold.
Correct Answer: B. capacity
The _______ of a secondary storage device indicates how much data the storage medium can hold. Answers: A. access B. capacity C. memory D. storage
Line Spacing
The amount of space between lines of text.
Paragraph Spacing
The amount of space between paragraphs.
taking the letters of the first six alphabetic characters found on the top row of keys
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.
Bit rate
The bit rate is the space available for each sample measured in kilobits per second (kbits/s). (128 kbits/s is 128 kilobit per second of sampled sound).
Microprocessor
The central processing unit (CPU) of a microcomputer controls and manipulates data to produce information. The microprocessor is contained on a single integrated circuit chip and is the brains of the system.
Character set
The characters available to a computer
hardware
The keyboard, mouse, display, and system unit are:
Blue-ray disc
The large capacity, high-definition optical discs designed to store hi-def video and video games are _______.
Internet
The largest network in the world is [the]:
Risk
The likelihood that a threat will occur
clock speed
The processing speed of a microprocessor is typically represented by its _____.The processing speed of a microprocessor is typically represented by its _____.
Mobile
This type of embedded operating system is used by smartphones.
This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.
Top management
On a hard disk a _______ is a concentric ring.
Track
duplex
Two categories of laser printers are _______.
personal and shared
Two categories of laser printers are _______.
Correct Answer: B. personal and shared
Two categories of laser printers are _______. Answers: A. thermal and personal B. personal and shared C. ink-jet and high-definition D. active-matrix and passive matrix
Work Group
Two or more individuals who act together to perform some task, on either a permanent or temporary basis.
linux
Type of UNIX operating system initially developed by Linus Torvalds, it is one of the most popular and powerful alternatives to the Windows operating system.
Virtual
Type of keyboard that uses a touch screen as the input device.
Correct Answer: D. Virtual
Type of keyboard that uses a touch screen as the input device. Answers: A. PDA B. Wireless C. Traditional D. Virtual
Cloud
Type of storage that can be accessed anywhere with an internet connection
hotspots
Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities.
The size of a key chain; these hard drives connect to a computer's USB port enabling a transfer of files.
USB drive
flash drives
USB drives are also known as:
parallel processing
Used by supercomputers to run large and complex programs.
crash
When a read-write head makes contact with the hard disk's surface, it causes a head:
Correct Answer: A
Which of the following characteristics about RAID is incorrect? A. expanded storage capability B. fast access speed C. highly reliable D. one high-capacity hard disk drive
Entity-Relationship (ED) Data
Document that shows data entities and attributes and relationships among them
output
Processed data or information.
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
Production
desktop publishing
Program that allows you to mix text and graphics to create publications of professional quality.
Lower- level lang. are closer to 0s and 1s. Higher-level lang. are closer to the languages of humans.
Programming language generations
desktop publishing
Programs that allow you to mix text and graphics and focus on flexible page design and layout.
Correct Answer: B. Desktop publishing
Programs that allow you to mix text and graphics and focus on flexible page design and layout. Answers: A. Databases B. Desktop publishing C. Word processors D. Image galleries
Presentation Graphics
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:
presentation graphics
Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
_________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
device driver
Every device that is connected to the computer has a special program associated with it called a device driver that allows communication between the operating system and the device.
Which of the following is an example of spreadsheet software?
Excel
Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.
Executive support systems (ESS)
universal serial bus (USB) port
Expected to replace serial and parallel ports. They are faster, and one USB port can be used to connect several devices to the system unit.
Microprocessor
In most personal computer systems, the CPU is contained on a single chip called the _____.
Which of the following is an example of audio editing and production software?
Pro Tools
Information Security
Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
presentation files
created by presentation graphics programs to save presentation materials
Document files
created by word processors to save documents such as memos, term papers, and letters
worksheet file
created with spreadsheet programs
When you no longer need a file or a folder you can use the _________ command to remove it from your drive.
delete
device driver
every device that is connected to the comp has a special program associated with it called a device driver that allows communication b/w operating system & device
device driver (peripheral devices)
every device that is connected to the computer has a special program associated with it called a device driver that allows communication between the operating system and the device
ethernet cables
example of a twisted-pair cable that is often used in networks and to connect a variety of components to a system unit
Removable hard drives used the same as internal disks.
external hard drive
Fiber-optic service (FiOS)
faster connection than cable or DSL. Is showing up in some areas, but is a new technology and not widely available
supercomputer
fastest calculating device ever invented, processing billions of program instructions per second. used by very large organizations like NASA
ribbon
feature of Microsoft Office 2007, 2010, and 2013 that replaces menus and toolbars by organizing commonly used commands into a set of tabs
ribbon
feature of Microsoft office 07, 2010, 2013 that replaces manuals and toolbars by organizing commonly used commands into set of tabs
the 3 stages of the fetch-execute cycle
fetch decode execute
A dedicated computer with very large storage capacity that provides users access to fast storage and retrieval of data.
file server
The most fundamental components of storage that users interact with are the:
files
Data Manipulation
finding entry into someone's computer network and leaving a prank message
Credit card-sized solid-state storage devices widely used in notebook computers.
flash drive
Credit card-sized device used to store and transfer images and digital media.
flash memory card
DSL (digital subscriber line)
modem that uses standard phone lines to create a high-speed connection directly to your phone company's offices. usually external and connect with either a USB or ethernet
image editor
modifies bitmap images
supervisor
monitors and manages workers
display
most common type of output device
people
most important part of any information system
most popular microblogging site that enables you to add new content from your browser, instant messaging application, or even a mobile phone
Windows
most widely used microcomputer operating system and can run with a variety of different microprocessors
Mulitcore
multiple cores on the same mother board
The ability to run multiple programs at the same time is known as:
multitasking
software
name for a program or programs
specialized apps
narrow focus programs on specific disciplines
Similar to a file server except simpler and less expensive.
network attached storage (NAS)
Metropolitan area network (MAN)
network that spans distances up to 100 miles
Local area networks (LAN)
networks with nodes that are in close physical proximity
mesh network
newest topology and does not use a specific physical layout , rather requires that each node have more than one connection to the other nodes
Chip Carries
ntegrated circuits must be mounted on _____, which are then plugged into the system board.
Specialized high-capacity secondary storage devices designed to meet storage requirements of large organizations.
mass storage devices
inventory
material possessions that can be sold
inventory
materials or products a company has in stock
capacity
measures how much a particular storage medium can hold
middle management
middle level managers deal with control and planning. they implement the long term goals of the organization
desktop publishing
mixing text and graphics to create professional publications
tablet and smartphones use _____ type of operating system
mobile OS mobile operating system
head crash
occurs when a readwrite head makes contact with the hard disk's surface or with particles on its surface
sending and receiving devices
often a computer or specialized communication device
The operating system is often called the software environment or software _______.
platform
A component of a hard disk made of a rigid metallic material and stacked one on top of another.
platter
In a graphical user interface, the _____ is used to select items.
pointer
Structured Query Language (SQL)
popular relational database language that enables users to perform complicated searches with relatively simple instructions
virtualization
process that allows single physical comp to support multiple OS's that operate independently
cookies
small data files that are deposited on your hard disk from websites you have visited
USB drives
so compact that they can be transported on a key ring
executive support system
software that can draw together data from an organization's databases in meaningful patterns
Employee Monitoring Systems
systems that monitor employees' computers, e-mail activities, and Internet surfing activities
In a graphical user interface, _____ divide menus into major activity areas.
tabs
A device that provides automatic access to data archived on a large collection or library of tapes.
tape library
accounts payable
the activity that shows the money a company owes to its suppliers
accounts receivable
the activity that shows what money has been received or is owed by customers
media
the actual physical material that holds the data and programs
network
the arrangement in which various communications channels are connected through two or more computers. the largest network in the world is the internet.
topology
the arrangement or configuration of a network
broadband
the bandwidth typically used for DSL, cable, and satellite connections to the Internet
Uniform Resource Locator (URL)
the set of letters that identifies the address of a specific resource on the Web
transfer rate
the speed with which a modem transmits data is called its:
transfer rate
the speed with which modems transmit data, typically measured in megabits per second
access
the three primary privacy issues are accuracy, property, and:
vector
the type of image that consists of geometric shapes
software piracy
the unauthorized copying and/or distribution of software
communication devices
used for a personal computer to routinely communicate with other computer systems located as near as the next office or as far away as halfway around the world using the Internet
output devices
translate the processed information from the computer into a form that humans can understand
fiber-optic cable
transmits data as pulses of light through tiny tubes of glass
voiceband (low bandwidth)
used for standard telephone communications
iOS
used in iPhone, iPod Touch, and iPad
keyboard and mouse
two most common input devices
medium band
used in special leased lines to connect to midrange computers and mainframes as well as to transmit data over long distances
Illustration programs
used to create and edit vector images
spyware
used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet
Tabs
used to divide the ribbon into major activity areas
Video editors
used to edit videos to enhance quality and appearance.
The means for a user to interact with application programs and computer hardware describes the _____.
user interface
Wi-Fi
uses high-frequency radio signals to transmit data
linux
type of UNIX operating system initially developed by Linus Torvalds, it is one of the most popular and powerful alternatives to the Windows operating system
keystroke logger
type of computer monitoring software that records every activity and keystroke made on a computer system, including red card numbers, passwords, and emails
app store
typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge
toolbars
typically appear below the menu bar and include small graphic elements called buttons that provide shortcuts for quick access to commonly used commands
Database files
typically created by database management programs to contain highly structured and organize data
hard disks
typically use to store programs and very large data files
Spam
unsolicited e-mails
windows 7
update from last Microsoft OS
network gateway
a device that allows one LAN to be linked to other LANs or connected to the LAN of another office group
Patent
a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years
directory server
a specialized server that manages resources, such as user accounts, for an entire network
income statement
a statement that shows a company's financial performance, income, expenses, and the difference between them for a specific time period
desktop OS
a type of operating system that controls a single desktop or notebook computer
Personal area network (PAN)
a type of wireless network that works within a very small area- immediate surroundings
Mobile Portal
a web site that is accessible from mobile devices.
Commercial (Public) Portal
a web site that offers fairly routine content for diverse audiences; offers customization only at the user interface
Affinity Portal
a web site that offers single point of entry to an entire community or affiliated interests
Corporate Portal
a web site that provides a single point of access to critical business information located inside and outside of an organization
Expert Systems (ES)
attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge and expertise within a specific domain
Portal
A Web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, using advanced search and indexing techniques.
Data Storage Device
A device capable of permanently or temporarily storing digital data. Examples could be RAM, a hard disk, flash drive or optical storage.
artificial intelligence (AI)
A field of computer science that attempts to develop computer systems that can mimic or simulate human thought processes and actions.
Bandwidth
A transmission capacity of a network, stated in bits per second
Broadband
A transmission speed ranging from approximately one megabit per second up to several terabits per second.
Correct Answer: A. Image editors
These are specialized graphics programs for editing or modifying digital photographs. Answers: A. Image editors B. Desktop publishing C. Presentation graphics D. Illustrations
Correct Answer: B. Photo editors
These programs are used to create and edit vector images. Answers: A. Illustration programs B. Photo editors C. Presentation graphics D. Image galleries
Correct Answer: A. Illustration programs
These programs are used to create and edit vector images. Answers: A. Illustration programs B. Photo editors C. Presentation graphics D. Image galleries
Multitouch
These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.
Coprocessors
These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.
Correct Answer: C. Coprocessors
These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. Answers: A. Smartcards B. CPUs C. Coprocessors D. NIC cards
Fire Wire
These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices.
Correct Answer: A. FireWire
These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices. Answers: A. FireWire B. Serial C. Parallel D. AGP
Correct Answer: C. App store
This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge. Answers: A. QR store B. Cloud C. App store D. Mobile store
communication channel
This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.
dot pitch
A function of a monitor that is the distance between each pixel. (See also pixel pitch)
Database
A group of logically related files that stores data and the associations among them
Field
A grouping of logically related characters into a word, a small group of words, or complete number
Business Process Management (BPM)
A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
Indent Maker
A marker on the horizontal ruler that shows the indent settings for the active paragraph.
Extranet
A network that connects parts of the intranets of different organizations
multicore chip
A new type of chip that provides two independent CPUs, allowing two programs to run simultaneously. Also see central processing unit.
organic light organic light- emitting diode(OLED)
A newer technology that has the benefits of lower power consumption and longer battery life as well as thinner displays.
Bus
A part of a computer architecture that transfers data and signals between components of the computer.
Instance
A particular entity within an entity class
Byte
Unit consisting of eight bits. There are 256 possible bit combinations in a byte and each byte represents one character.
secondary
Unlike memory, this type of storage holds data and programs even after electric power to the computer system has been turned off.
FireWire port
Used to connect high-speed printers, and even video cameras, to system unit.
Entity
A person, place, thing, or event about which information is maintained in a record
Left Indent
A type of indent in which the left edge of a paragraph is moved in from the left margin.
Electronic Commerce (E-Commerce) Systems
A type of inter-organizational information system that enables organizations to conduct transactions, called business-to-business (B2B) electronic commerce, and customers to conduct transactions with businesses, called business-to-consumer (B2C) electronic commerce
ergonomic keyboard
A type of keyboard designed specifically to alleviate wrist strain associated with the repetitive movements of typing.
Tablet
A type of microcomputer that contains a thin system unit, most of which is the monitor. The best-known tablets are Apple's iPad, Motorola's Zoom, and HP's Slate.
Netbook
A type of microcomputer that is smaller, lighter, and less expensive than a notebook computer.
dot-matrix printer
A type of printer that forms characters and images using a series of small pins on a print head.
ink-jet printer
A type of printer that sprays ink at high speed onto the surface of paper.
Font
A typeface or design of a set of characters (letters, numbers, symbols, and punctuation marks).
Point
A unit of measurement for text characters and the space between paragraphs and characters; 1/72 of an inch.
File History
A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites and on the desktop.
Correct Answer: B. Backup and Restore
A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites on the desktop. Answers: A. Disk Cleanup B. Backup and Restore C. Disk Defragmenter D. Virus Scan
Videoconference
A virtual meeting in which participants in one location can see and hear participants at other locations and can share data and graphics by electronic means
Mini DisplayPort (MiniDP, mDP)
A port that an audiovisual device typically uses to connect large monitors. These ports are used with many Apple Macintosh computers.
external Serial Advanced Technology Attachment (eSATA)
A port that provides very high speed connections for external hard-disk drives, optical disks, and other large secondary storage devices.
Vulnerability
A possibility that an information resource will be harmed by a threat
Risk Transferee
A process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance
Authorization
A process that determines which actions, rights, or privileges the person has, based on verified identity
Business Process Reengineering (BPR)
A radical redesign of a business process that that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (from scratch)
Algorithm
A series of steps designed to solve a mathematical or other problem.
ACID
A set of rules that protects a database from errors during a transaction.
Sectors
Which of the following is not a system software program type?
Video editors
_______ are used to edit videos to enhance quality and appearance.
Correct Answer: D. Video editors
_______ are used to edit videos to enhance quality and appearance. Answers: A. Drawing programs B. Image editors C. Bitmap gallery D. Video editors
Correct Answer: D. Input
_______ is any data or instructions that are used by a computer. Answers: A. Digital B. Output C. Information D. Input
table
_______ make up the basic structure of a relational database with columns containing field data and rows containing record information.
Utility
A small program designed to carry out a limited maintenance task.
Responsibility
A tenet of ethics in which you accept the consequences of your decisions and actions
CPU
Abbreviation of central processing unit. The CPU is the brains of the computer. Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
Mobile apps
Add-on programs for a variety of mobile devices including smartphones and tablets.
Correct Answer: D. Mobile apps
Add-on programs for a variety of mobile devices including smartphones and tablets. Answers: A. Clouds B. Utilities C. QR codes D. Mobile apps
Which of the following is an example of desktop publishing software?
Adobe InDesign
Justify
Alignment in which an item is flush with both the right and left margins.
Right-Align
Alignment in which the item is flush with the left margin.
Left-Align
Alignment in which the the item is flush with the left margin.
Correct Answer: A
All of the following are true of DVD-ROM drives except: A. They are also known as erasable optical discs. B. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. C. They are a type of optical disc. D. DVD-ROM stands for "digital versatile disc-read only memory".
They are also known as erasable optical discs.
All of the following are true of DVD-ROM drives except: Question 19 options: A) They are also known as erasable optical discs. B) They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. C) They are a type of optical disc. D) DVD-ROM stands for "digital versatile disc-read only memory."
wireless network card
Allows computers to be connected without cables.
Monitor
Also called the Visual Display Unit (VDU) or screen. Hardware. An output device used to display the results of processing to the user.
PC card slot
Also known as Personal Computer Memory Card International Association (PCMCIA) card slot. Credit card-sized expansion cards developed for portable computers.
keyboard
Convert numbers, letters, and special characters that people understand into electrical signals.
scanning devices
Convert scanned text and images into a form that the system unit can process.
An interpreter ________.
Converts and runs the procedural language one statement at a time into machine code.
language translator
Converts programming instructions into a machine language that can be processed by a computer.
A compiler ________.
Converts the source code into machine language code.
Cable
Cords used to connect input and output devices to the system unit.
enterprise storage system
An organizational strategy to promote efficient and safe use of data across the networks.
input
Any data or instructions that are used by a computer.
Hardware
Any part of your computer that has a physical structure, such as the monitor or keyboard.
These tools are also called computer-aided software engineering (CASE) tools. They are used in system analysis to evaluate alternative hardware and software solutions. A. Project management tools B. Automated design tools C. Spreadsheets D. Report generator
Automated design tools
photoelectric CELLS
Bar code readers use _______ embedded in them to read bar codes.
Correct Answer: D. photoelectric cells
Bar code readers use _______ embedded in them to read bar codes. Answers: A. coprocessors B. magnetic cells C. RFID microchip D. photoelectric cells
Correct Answer: D. File compression program
Before sending a large file over the Internet, you might want to use one of these programs. Answers: A. Disk defragmenter B. Uninstaller C. Disk cleanup program D. File compression program
Which of the following refers to tools that are used to provide some assistance in designing, coding, and testing software?
CASE
Cache Memory
Cache memory is very fast memory that is on the processor. The cache acts as a buffer between the processor and other devices on the computer and speeds up the overall process by removing the need to wait while data is fetched or written from or to other devices
Cyberterrorism
Can be defined as premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents
network adapter card
Connects the system unit to a cable that connects to other devices on the network.
This type of language uses symbols, words, and phrases that instruct a computer how to structure information for display or processing.
Content-markup
Analog
Continuous signals that vary to represent different tones, pitches, and volume.
PCMCIA slot
See PC card slot.
system chassis
See system unit.
have no moving parts
Solid-state storage devices are different than hard disks in that they _______.
web authoring software
Specialized and powerful programs, called _______ are typically used to create specialized commercial sites.
software suite
a collection of separate application programs bundled together and made available as a group.
Exposure
The harm, loss, damage that can result if a threat compromises an information resource
utility suite
a program that combines several utilities in one package to improve system performance
Demilitarized Zone (DMZ)
a separate organizational local area network that is located between an organization's internal network and an external network, usually the Internet.
Service where the Internet acts as a "cloud" of servers that supply application services
cloud computing
Value System
includes the producers, suppliers, distributors, and buyers, all with their value chains
specialized applications
includes thousands of other programs that tend to be more narrowly focused and used in specific disciplines and occupations
IP address
individual numeric address given to every computer on the Internet
Knowledge Management Systems (KMSs)
information technologies used to systemize, enhance, and expedite, intra- and interfirm knowledge management
Intellectual Property
intangible property that is the result of creativity (such as patents or trademarks or copyrights)
A magnetic secondary storage device that is located inside the system unit.
internal hard disk
spreadsheets
organize, analyze, and graph numeric data such as budgets and financial reports
system unit
part of personal comp that contains cpu
web
provides a multimedia interface to the numerous resources available on the internet
videoconferencing
provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.
internet service provider
provides access to the internet
GUI graphical user interface
special screen that allows software commands to be issued through the use of graphic symbols or pull down menus
cloud computing
the internet acts as a cloud of servers that supply applications to clients as a service rather than a product
Multidimensional Structure
the manner in which data are structured in a data warehouse so that they can be analyzed by different views or perspectives, which are called dimensions.
Microsoft Excel
the most widely used spreadsheet program
Blu-ray discs (Bfs)
the newest form of optical storage designed t store hi def videos, which uses the HD 720 and HD 1080 resolutions
download
transforming info from remote comp to the comp it needs to be used on
CERN
where the web was introduced in 1991
Intrusion detection system (IDS)
work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic
windows OS 7, 8
-OS from 2009 that has a traditional user interface similar to previous versions of Windows. It provides enhanced features including improved handwriting recognition and advanced searching capabilities for finding files and other content on your computer. -OS from 2012 that is designed to better integrate Microsoft's desktop OS with its mobile OS. It provides support for gestures, cloud integration, and apps.
Gigabyte
1024 megabytes
Nibble
4 bits
dots-per-inch (dpi)
The measurement of printer resolution, the more dots-per-inch the better the quality of the image printed.
arithmetic-logic unit (ALU)
The part of the CPU that performs arithmetic and logical operations.
Correct Answer: C. 4 bytes at a time
A 32-bit-word computer can access _____. Answers: A. 2 bytes at a time B. 16 bytes at a time C. 4 bytes at a time D. 8 bytes at a time
Which of the following is an example of web development software?
Dreamweaver
DRAM
Dynamic random-access memory is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit. The capacitor can be either charged or discharged; these two states are taken to represent the two values of a bit, conventionally called 0 and 1.
Organizational Social Responsibility
Efforts by organizations to solve various social problems
bus line
Electronic data roadway, along which bits travel, connects the parts of the CPU to each other and links the CPU with other important hardware. The common connecting cable in a bus network.
mobile OS
Embedded operating system that controls a smartphone.
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
Exception
Which system presents information in a highly summarized form?
Executive support system (ESS)
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?
Expert system
In case of an unanticipated union strike, the manager in charge of manufacturing might consult the management information system to determine how it will affect production schedules.
False
The executive support system can analyze the effects of events and trends outside the organization.
False
The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output.
False
The research department strictly involves itself only with the creation of finished goods that are tangible.
False
virtual memory
Feature of an operating system that increases the amount of memory available to run programs. With large programs, parts are stored on a secondary device like your hard disk. Then each part is read in RAM only when needed.
The ______ utility program makes a copy of files to help protect you from the effects of a disk failure.
File History
system board
Flat board that usually contains the CPU and memory chips connecting all system components to one another.
Client/Server Computing
Form of distributed processing in which some machines (servers) perform computing functions for end-user PCs (clients)
Italic
Formatting applied to text to make the characters slant to the right.
Text Effect
Formatting that applies a visual effect to text, such as shadow, glow, outline, or reflection.
Character Spacing
Formatting that changes the width or scale of characters, expands or condenses the amount of space between characters, raises or lowers characters, relative to the line of text, and adjusts kerning.
Information Technology Platform
Formed by the IT components of hardware, software, networks (wireline and wireless), and databases
Cache Memory
Frequently-accessed information is held in _____.
Correct Answer: B. cache memory
Frequently-accessed information is held in _____. Answers: A. hard drive B. cache memory C. flash memory D. read only memory
Information Technology Services
IT personnel use IT components to perform these IT services: develop information systems, oversee security and risk, and manage data
Bitmap
Image editors edit images consisting of thousands of pixels that form this type of image.
Correct Answer: B. Bitmap
Image editors edit images consisting of thousands of pixels that form this type of image. Answers: A. Vector B. Bitmap C. Object D. Electronic
Server
In a network operating system, this computer coordinates all communication between computers.
host
In a virtualized environment, this operating system runs on the physical machine.
Bit
In binary (computer language), a bit represents a zero or one.
application software
"apps" software that can perform useful work, such as word processing, cost estimating, or accounting tasks.
Boolean
(Data Type) Type of data in a database field that can be true/false or yes/no
Megabyte
1024 KB
ASCII (American Standard Code for Information Interchange)
7-bit system to code the character set of a computer.
4 bytes at a time. 32/ 8
A 32-bit-word computer can access _____.
Cold Site
A backup location that provides only rudimentary services and facilities
Attribute
A characteristic of an entity. It becomes a field in a data table.
Application (App)
A computer program designed to support a specific task or business process
Search Engine
A computer program that searches for specific information by key words and reports the results
File Server (Network Server)
A computer that contains various software and data files for a local area network, and contains the network operating system
Hardware
A device such as a processor, monitor, keyboard, or printer. Together, the devices accept, process, and display data and information
network gateway
A device that allows one LAN to be linked to other LANs or to larger networks.
card reader
A device that interprets the encoded information contained on credit, debit, access, and identification cards.
printer
A device that translates information that has been processed by the system unit and presents the information on paper.
Actuator
A device to produce physical movement based on output from a computer system.
T-Carrier System
A digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call.
Digital Signals
A discrete pulse, either on or off, that conveys information in a binary form
Format Painter
A feature used to copy the format settings applied to the selected text to other text you want to format the same way.
optical mouse
A mouse that emits and senses light to detect mouse movement.
Style
A named collection of character and paragraph formats that are stored together and can be applied to text to format it quickly.
Enterprise Network
A network, encompassing an organization, composed of interconnected multiple LANs and WANs
Wide Area Networks (WANs)
A network, generally provided by common carriers, that covers a wide geographic area.
Real
A number that can have decimal or fractional parts.
Password
A secret word or phrase giving admittance or access to information
Cookie
A small text file that some Web sites automatically store on a client computer's hard drive when a user visits the site.
Notebook
A small, portable system unit that contains electronic components, selected secondary storage devices, and input devices.
Dashboards
A special form of IS that support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
musical instrument digital interface (MIDI)
A standard that allows musical instruments to connect to the system using MIDI ports.
Binary
A system of numbers using only two digits 0 and 1 (also called the 2-base system).
World Wide Web (the Web, WWW, or W3)
A system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/ server architecture; it uses the transport functions of the Internet.
Computer Network
A system that connects computes and other devices via communications media so that data and information can be transmitted among them
Correct Answer: C. Cryptoprocessor
A type of specialty processor devoted exclusively to protecting your privacy. Answers: A. Data cards B. Micro cards C. Cryptoprocessor D. Embedded cards
Mobile Apps
Add-on programs for a variety of mobile devices including smartphones and tablets.
Identifier
An attribute that identifies an entity instance
Correct Answer: B
An external hard disk _______. A. is heavy B. is hard to remove C. cannot be used in addition to an internal hard disk D. usually connects to a USB or Thunderbolt port
Computer-Based Information System (CBIS)
An information system that uses computer technology to perform some or all of its intended tasks
mouse
An input device that controls a pointer that is displayed on the monitor.
UNIX
An operating system originally developed for minicomputers. It is now important because it can run on many of the more powerful microcomputers.
Embedded OS
An operating system that is completely stored within the ROM (read-only memory) of the device that it is in; used for handheld computers and smaller devices like PDAs.
Server
Any computer that shares its resources with other computers on a network. The resources could be services such as web or email, resources such as file storage or print, or processing such as databases.
Personal Computer (PC)
Any computer whose price, size, and capabilities make it useful for individuals to use with no intervening computer operator.
Threat
Any danger to which an information resource may be exposed
output device
Any hardware used to provide or to create output.
wearable
Apple's Watch is what type of computer?
cache memory
Area of random-access memory (RAM) set aside to store the most frequently accessed information. Cache memory improves processing by acting as a temporary high-speed holding area between memory and the CPU, allowing the computer to detect which information in RAM is most frequently used.
file compression
Before sending a large file over the Internet, you might want to use one of these programs.
ASCII (American Standard Code for Information Interchange)
Binary coding scheme widely used on all computers, including microcomputers. Eight bits form each byte, and each byte represents one character.
universal serial bus (USB)
Combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high-speed scanners, printers, and video capturing devices.
Network Controls (Communication Controls)
Communication Controls
Cable Media (Wireline Media)
Communications channels that use physical wires or cables to transmit data and information.
Digital
Computers are digital machines because they can only understand 1s and 0s. It is either on or off. For example, a digital watch states the exact time on the face, whereas an analog watch has the second hand moving in constant motion as it tells the time.
Clients
Computers, such as users' personal computers, that use any of the services provided by services
expansion bus
Connects the CPU to slots on the system board. There are different types of expansion buses such as industry standard architecture (ISA), peripheral component interconnect (PCI), accelerated graphics port (AGP), universal serial bus (USB), and FireWire buses. See system bus.
database management system
DBMS. program that sets up, structures, a database
Which of the following is used to show the rules that apply to a decision when one or more conditions apply? A. System flowchart B. Decision table C. Grid chart D. Checklist
Decision table
Controls
Defense mechanisms (also called countermeasures)
Data Model
Definition of the way that data in a DBMS are conceptually structured
graphics card
Device that provides high-quality 3-D graphics and animation for games and simulations.
The goal of the _______ utility program is to locate and eliminate unnecessary fragments and rearrange files and unused disk space.
Disk Defragmenter
Bit
Each 1 or 0 is a bit; short for binary digit.
Attribute
Each characteristic or quality describing a particular entity
A purchase order form pertains to the payroll department.
False
An MIS differs from a TPS in that it creates databases.
False
Text Wrapping
Formatting applied to a graphic to make it a floating graphic.
Bold
Formatting applied to text to make it thicker and darker.
Correct Answer: D
Hard disks store and organize files using all the following, except _______. A. tracks B. sectors C. cylinders D. paths
Touch Screen
Hardware. An input and output device that combines the use of a monitor and a mouse. Most often used on smartphones and tablet computers.
Sensor
Hardware. An input device that detects something about the environment. Sensors come in a wide variety of types but the most common are: motion, heat, light, sound and pressure sensors.
Backbone Networks
High-speed central networks to which multiple smaller networks (such as LAN and smaller WANs) connect.
Functional Area Information Systems (FAISs)
ISs that support a particular functional area within the organization
Enterprise Resource Planning (ERP)
Information systems that correct a lack of communication among the functional area ISs by tightly integrating the functional area ISs via a common database
thumb
Keyboards that are widely used on various smartphones and other small portable devices, and that are designed primarily for communicating via texting and connecting to the Web.
These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.
Machine
density
Measures how tightly the magnetic charges can be packed next to one another on the disk.
_________ players refer to applications that allow you to listen to music and play videos.
Media
grayscale
Most common black ink selection in which images are displayed in many shades of gray.
Multitasking
Most operating systems support the ability to switch between different applications. This is called _____.
Correct Answer: A. multitasking
Most operating systems support the ability to switch between different applications. This is called _______. Answers: A. multitasking B. booting C. translating D. driving
Expansion Slots
Most personal computers allow users to expand their systems by providing these on the system board.
Correct Answer: A. Expansion slots
Most personal computers allow users to expand their systems by providing these on the system board. Answers: A. Expansion slots B. Ports C. Sound cards D. Network cards
Mac OS X ________ was released in 2012 and designed for desktops and laptops. The functionality is similar to Windows 8.
Mountain Lion
_______ is the ability of the operating system to switch between different applications stored in memory.
Multitasking
Collaboration
Mutual efforts by two or more individuals who perform activities in order to accomplish certain tasks
Correct Answer: D
One way to improve the storage capacity of a hard disk is to _______. A. format often B. use file compression C. increase memory D. use disk caching
expansion slot
Openings on a system board. Users can insert optional devices, known as expansion cards, into these slots, allowing users to expand their systems. See expansion card.
FireWire bus
Operates much like USB buses on the system board but at higher speeds.
______ coordinate computer responses, provide an interface between users and the computer, and run applications.
Operating Systems
system unit
Part of a microcomputer that contains the CPU. Also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system.
Which of the following is an example of accounting software for businesses?
QuickBooks
flash memory
RAM chips that retain data even when power is disrupted. Flash memory is an example of solid-state storage and is typically used to store digitized images and record MP3 files.
Memory
Refers to the primary storage of a computer system. Can be volatile (lost when computer is turned off) such as RAM or nonvolatile (permanently written to storage device) such as ROM.
warm boot
Restarting your computer while the computer is already on and the power is not turned off.
Plug and Play
Set of hardware and software standards developed to create operating systems, processing units, expansion cards, and other devices that are able to configure themselves. When the computer starts up, it will search for the Plug and Play device and automatically configure it to the system.
Assignment
Setting the value of a variable.
Browsers
Software applications through which users primarily access the web
firewall
Special hardware and software used to control access to a corporation's private network is known as a(n):
computer technician
Specialist who installs hardware and software and troubleshoots problems for users.
web authoring programs
Specialized and powerful programs, called _______ are typically used to create specialized commercial sites.
mass storage devices
Specialized high-capacity secondary storage devices designed to meet organizational demands.
Auto documentation
System that tracks variables, modules and comments for maintenance for purposes.
Correct Answer: A
The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a _______. A. head crash B. cylinder crash C. track crash D. sector crash
Primary Key
The identifier field or attitude that uniquely identities a record
online identity
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:
Globalization
The integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology
bus width
The number of bits traveling simultaneously down a bus is the bus width.
Colour depth
The number of bits used for each pixel or dot. The more bits, the more colours that can be represented.
Resolution
The number of pixels or dots per unit, for example ppi (pixel per inch), often referred to as dpi (dots per inch).
Platform
The operating system is often referred to as the software environment or software _____.
Make-To-Order
The strategy of producing customized products and services
Ergonomics
The study of human factors related to things people use.
Mother Board
The system board is also known as the _____.
Correct Answer: B. motherboard
The system board is also known as the _____. Answers: A. expansion slot B. motherboard C. expansion card D. bus
Disk Cleanup
The windows troubleshooting utility that identifies and eliminates nonessential files is called
Correct Answer: C. Disk Cleanup
The windows troubleshooting utility that identifies and eliminates nonessential files is called _______. Answers: A. Backup and Restore B. Disk Defragmenter C. Disk Cleanup D. Norton Utilities
system bus
There are two categories of buses. One is the system bus that connects the CPU to the system board. The other is the expansion bus that connects the CPU to slots on the system board.
ribbons
These organize commonly used commands into a set of tabs.
illustration Programs
These programs are used to create and edit vector images.
Ribbon
This GUI includes tabs, groups, and galleries.
Correct Answer: B. Ribbon
This GUI includes tabs, groups, and galleries. Answers: A. Character-based B. Ribbon C. Contextual D. Dialog
Cloud Storage
This allows you to upload and store documents on the Internet.
Correct Answer: A
This allows you to upload and store documents on the Internet. A. Cloud storage B. Flash drive C. Solid State storage D. Hard Disk drive
Correct Answer: C. Device driver
This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system. Answers: A. Client B. Virtual machine C. Device driver D. Server
Application
This type of software can be described as end user software and is used to accomplish a variety of tasks.
Correct Answer: B. Application
This type of software can be described as end user software and is used to accomplish a variety of tasks. Answers: A. Communications B. Application C. Utility D. System
system
This type of software works with end users, application software, and computer hardware to handle the majority of technical details
System
This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
Linux
This version of UNIX is an open source operating system that is an alternative to Windows.
handwriting recognition software
Translates handwritten notes into a form that the system unit can process.
Compiler
Translation software that converts high-level source code into machine (object) code.
Highlighting
Transparent color that can be applied to a text to draw attention to it.
Office automation systems are designed primarily to support data workers.
True
Supervisors' responsibilities include operational matters.
True
The executive support system helps top-level managers oversee the company's operations and develop strategic plans.
True
The research department identifies, investigates, and develops new products and services.
True
file compression
Utility programs that reduce the size of files so they require less storage on the computer and can be sent more efficiently over the Internet. Examples of such programs are WinZip and Wizard.
_________ software is created for a specific industry such as health care or insurance.
Vertical market
What could you use if you wanted to run two or more applications each requiring a different operating system?
Virtualization
Cyberwarfare
War in which a country's information systems could be paralyzed from a massive attack by destructive software
Flash
When you reboot your system, the computer follows start-up instructions stored in this type of memory.
Correct Answer: D. Flash
When you reboot your system, the computer follows start-up instructions stored in this type of memory. Answers: A. DRAM B. SDRAM C. Cache D. Flash
Correct Answer: D. Web authoring
Which of the following programs would be used to create a website? Answers: A. Image editor B. Illustration C. Desktop publishing D. Web authoring
Correct Answer A
Which of these is not an example of solid state storage? A. Digital versatile disc B. SSDs C. Flash memory cards D. USB drives
Spreadsheet
Which would be the most appropriate type of application to create, analyze, and forecast budgets?
Correct Answer: B. Tables
_______ make up the basic structure of a relational database with columns containing field data and rows containing record information. Answers: A. QR codes B. Tables C. Fields D. Workbooks
Dialog Boxes
_______ provide additional information and request user input.
dialog boxes
_______ provide additional information and request user input.
Correct Answer: D. Audio
_______-input devices convert sounds into a form that can be processed by the system unit. Answers: A. Electrolyzing B. Plotting C. Webcam D. Audio
Industrywide Portal
a Web-based gateway to information and knowledge for an entire industry
Competitive Forces Model
a business framework devised by Michael Porter that analyzes competitiveness by recognizing five major forces that could endanger a company's position
Internet2
a new, faster telecommunications network that deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories.
Router
a node that forwards or routes data packets from one network to their destination in another network
client
a node that requires resources from other nodes. a users personal comp
server
a node that shares resources with other nodes (application server, communication server)
Informed User
a person knowledgeable about information systems and information technology
end user
a person who uses personal computers or has access to larger computers.
Least Privilege
a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization
Blacklisting
a process in which a company identifies certain types of software that are not allowed to run in the company environment
A(n) __________ is a list of instructions detailing the steps needed to perform a task. a) program b) punch card c) agenda d) plan
a. program
connection devices
act as an interface between the sending and receiving devices and the communication channel
sales order processing
activity that records the demands of customers for a company's products or services
sales order processing
activity that records the demands of customers for a companys products or services
mobile apps
add-on features or programs typically designed for smartphones and tablets
Spyware
alien software that can record your keystrokes and/or capture your passwords
Spamware
alien software that uses your computer as a launch platform for spammers
provide user interface
allow users to interact with application programs and computer hardware
desktop publishing programs (page layout programs)
allow you to mix text and graphics to create publications of professional quality
wireless modem (WWAN)
almost all computers today have these modems built in
Electronic Commerce
also known as e-commerce
office suite
also known as office software suites and productivity suites, contain general-purpose application programs that are typically used in a business situation
cloud storage
also known as online storage
cloud
also known as online suite
logic gate
an elementary building block of a digital circuit. Most logic gates have two inputs and one output. At any given moment, every terminal is in one of the two binary conditions low (0) or high (1), represented by different voltage levels.
Data Items
an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning
web based email
an email system that does not require an email program to be installed on your computer
single core processor
an integrated circuit to which one processor is attached for basic performance, power consumption, and processing of single tasks.
multi core processor
an integrated circuit to which two or more processor cores have been attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks.
embedded OS
an operating system that is completely stored within the ROM (read-only memory) of the device that it is in; used for handheld computers and smaller devices like PDAs
servers
another name for midrange computers
system software
background software that enables the application software to interact with the computer. system software consists of the operating system, utilities, device drivers, and language translators.
Write-once disc
can be written on once, after that the disc can be read many times but cannot be written on or erased
optical discs
can hold over 128 gigabytes of data
hard dick
closed disk drive containing one or more metallic disks using metallic charges to record data and have large storage capacities and have fast retrieval times
management information system
computer based information system that produces standardized reports in a summarized and structured form. generally used to support middle managers
management info system
computer based system that produces standardized reposrts in a summarized form
zombies
computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for a malicious purpose
mainframe computers
computers that occupy specially wired, air-conditioned rooms. Capable of great processing speeds and data storage
midrange computers
computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. Used by medium-sized companies or departments of large companies to support their processing needs but are now used to support or serve end users for certain applications
program
consists of the step-by-step instructions that tell the computer how to do its work
language translator
converts programming instructions into a machine language that can be processed by a computer
web authoring software
creating a website, word processing program for generating web pages. also called html editor or web page editor, widely used web authoring programs include adobe dream weaver and microsoft front page
Identity Theft
crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
A part of a hard disk that runs through each track of a stack of platters.
cylinder
__________ refers to testing by a select group of potential users in the final stage of testing a program. a) Manual testing b) Desk checking c) Attempt at translation d) beta testing
d) beta testing
In programming, _______ are explanations that tell other programmers what's happening in the software code. a) restrictions b) tables c) documentation d) selections
d. documentation
The programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem. a) grid table b) pseudocode c) algorithm d) flowchar
d. flowchart
Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
database
Query by Example (QBE)
database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted
file servers
dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.
network architecture
describes how a network is arranged and how resources are coordinated and shared
The first step in the systems design phase is to A. examine the hardware requirements. B. design alternative systems. C. select the best system. D. analyze the data.
design alternative systems.
Solid-state drives (SSDs)
designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data
antispyware
designed to detect and remove various types of privacy threats
______ are specialized programs that allow particular input or output devices to communicate with the rest of the computer system.
device drivers
graphical site map
diagram of a website's overall design
A _____ provides information or requests input.
dialog box
instant message
direct/live chat b/w 2 or more ppl
A _______ works with the operating system to allow communication between the device and the rest of the computer system.
driver
Use Windows Update to update the _____ on your computer.
drivers
Flash memory
flash memory is a type of nonvolatile memory that erases data in units called blocks. A block stored on a flash memory chip must be erased before data can be written, or programmed, to the microchip. Flash memory retains data for an extended period of time whether a flash-equipped device is powered on or off.
lands
flat areas that represent the 1s and 0s on the disc surface of optical discs
A good way to organize related files is to store them within a ______.
folder
URL
for browsers to connect you to resources on the web, the location or address of the resources must be specified, the addresses are called urls
system software
form of software that the computer uses
Preparing a storage device for use by an operating system is known as:
formatting
Organizational cloud storage
high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage
electronic profiles
highly detailed and personalized descriptions of individuals
profiles
highly detailed and personalized descriptions of individuals are electronic:
secondary storage
holds data and programs even after electric power to the computer system has been turned off
server
host comp wit connect to internet that stores document files used to display webpages
Internet
huge computer network available to everyone with a personal computer
HTML
hypertext markup language. program language that creates documents files to view webpages
https
hypertext transfer protocol secure is widely used to protect the transfer of sensitive information
Which of the following operating systems is NOT likely to be running on a server?
iOS
Local Area Network (LAN)
is a network that connects computers in a limited geographical area, such as a school computer laboratory, office, or group of buildings. Every user device on the network can communicate with every other device
Disk Caching
is process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
RAID systems
larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.
TLD top level domain
last part of an internet address; identifies the geographic description or organizational identification.
Distance Learning (DL)
learning situations in which teachers and students do not meet face to face
balance sheet
lists the overall financial condition of an organization
run applications
load and run applications
internal hard disk
located inside the system unit. Able to store and retrieve large quantities of information quickly
Optimize Drives
locates and eliminates fragments and rearranges files and unused disk space
The internal
logical structure and organisation of the computer hardware.
top management
long range, strategic planning
ADSL service (asymmetrical digital subscriber line)
one of the most widely used types of DSL, much faster than dial-up
Random-access memory (RAM)
one type of memory that holds the program and data that is currently being processed
The collection of programs that handles many of the technical details related to using a computer is called the ______.
operating system
Chrome OS
operating system designed by google for netbook comps & internet connectivity thru clouds
MAC OS
operating system designed by macintosh comps
MAC os
operating system designed for Macintosh computers
multitasking
operating system that allows a single user to run several application programs at the same time
software platform
operating system, also known as software platform, consisting of a collection of programs to handle technical details depending on the type of operating system
standalone operating systems
operating systems used by desktops
network operating systems NOS
operating systems used by networks
A storage device that uses a laser beam to alter the surface of a plastic or metallic disc to represent data.
optical disc
High-speed Internet connection to a dedicated remote organizational cloud storage server.
organizational cloud storage
marketing
organizational department that plans, prices, promotes, sells, and distributes an organization's goods
Android
owned by Google and widely used in many of today's smartphones
Entry Barrier
product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete
Knowledge Workers
professional employees who are experts in a particular subject area and create information and knowledge, which they integrate into the business
plugins
program automatically loaded and operated as part of a browser
utility suite
program combining several utilities in one package to improve system performance
Program specification can also be called
program definition or program analysis
mass storage
refers to the tremendous amount of secondary storage required by large organizations
midrange computer
refrigerator sized machines falling in between personal computers and mainframes in processing speed and data storing capacity. Medium sized companies or departments of large companies use midrange computers.
accuracy
related to the responsibility of those who collect data to ensure that the data is correct
access
relates to the responsibility of those who have data to control who is able to use that data
property
relates to who own data
plagiarism
representing some other person's work and ideas as your own without giving credit to the original source
CAN SPAM ACT
requires every marketing related email to provide an opt-out option
Wireless network encryption
restricts access to authorized users on wireless networks
Family Educational Rights and Privacy Act (FERPA)
restricts disclosure of education records
secondary storage
retains info after system is turned off (cds, dvds)
tracks
rings of concentric circles on the platter
database record (row)
row of data
database record
row. contains info about one employee
spread sheet
rows and columns to analyze data
protocols
rules for exchanging data between computers
Mac OS
runs on Apple computers
Section shaped like a pie wedge that divides the tracks on a disk.
sector
Operating system
software that interacts between application software and the comp handling such details as running programs, storing, processing data and coordinating all comp resources including attached peripheral devices. fxns: managing resources, providing user interface, running apps
operating system
software that interacts between application software and the computer, handling such details as running programs, storing and processing data, and coordinating all computer resources, including attached peripheral devices. it is the most important program on the computer. windows 7 windows 8 and mac os x
browsers (most popular ones)
special internet software connecting you to remote computers; opens and transfers files, displays texts and images, and provides an uncomplicated interface to the Internet and web documents. (internet explorer, mozilla firefox, and google chrome)
Image editors
specialized graphics programs for editing or modifying digital photographs
mass storage devices
specialized high-capacity secondary storage devices designed to meet organization demands for data storage
Virtual Collaboration
the use of digital technologies that enable organizations or individuals to collaboratively plan, design, develop, manage and research products, services and innovative information systems and electronic commerce applications
Teleconferencing
the use of electronic communication that allows two or more people at different locations to have a simultaneous conference
cyberbullying
the use of the Internet, smartphones, or other devices to send or pot content intended to hurt or embarrass another person
microwave
uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication, only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances
infrared
uses infrared light waves to communicate over short distances
Global positioning system (GPS)
uses location information to uniquely determine the geographic location of a device
Cellular
uses multiple antennae to send and receive data within relatively small geographic regions
satellite
uses orbiting satellites about 22,000 miles above the earth as microwave relay stations
satellite connection service
uses satellites to provide wireless connections, slower than DSL and cable, but are available almost everywhere
dictionary attack
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
dial-up services
using existing telephones and telephone modems to connect to the internet
social networks
using the internet to connect to individuals
_____ are specialized programs to make computing easier.
utilities
disk cleanup
utlity that eliminates nonessential files
Interorganizational Information Systems (IOSs)
Information systems that connect two or more organizations
Correct Answer: D. chip carriers
Integrated circuits must be mounted on _____, which are then plugged into the system board. Answers: A. slots B. pins C. ports D. chip carriers
This typically consists of transactions from the transaction processing system.
Internal data
Viruses
Malacious software that cab attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection
Malware
Malicious software that enters a computer system without the owner's knowledge or consent. such as viruses or worms
Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?
Marketing
control unit
Section of the CPU that tells the rest of the computer how to carry out program instructions.
Modules (DBMS)
Sections of code within a DBMS that allow the user interface to be tailored.
Transport Layer Security (TLS)
Secure Socket Layer
Processor
See central processing unit.
GPU (graphics processing unit)
See graphics coprocessor.
main board
See motherboard or system board.
Laptop
See notebook computer and notebook system unit.
Sony/Philips Digital Interconnect Format (S/PDIF)
See optical audio connection.
integrated circuit
See silicon chip.
Client
Software or hardware that requests services from a server.
Operating System
Software that controls the operation of a computer. Provides a user interface. Platform for applications. Memory management. File/disk management. e.g. Windows 8, Linux, OS X, Android. Single User Operating System. Only one user can use the computer at any given time.
operating system
Software that interacts between application software and the computer, handling such details as running programs, storing and processing data, and coordinating all computer resources, including attached peripheral devices. It is the most important program on the computer. Windows 7, Windows Vista, and Mac OS X are examples of operating systems.
Assemble
Software that translates assembly language code into machine code.
Run time environment
Software to support the execution of programs.
Flash Memory
Solid-state memory used as a low cost secondary storage in portable devices and as removable memory.
Correct Answer: B. web authoring programs
Specialized and powerful programs, called _______ are typically used to create specialized commercial sites. Answers: A. graphical site map B. web authoring programs C. hyperlink D. microblog
digital whiteboard
Specialized devices with a large display connected to a computer or projector (see also interactive whiteboard)
Digital or interactive whiteboards
Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms.
Correct Answer: D. Digital or interactive whiteboards
Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. Answers: A. Scanners B. HDTV C. E-books D. Digital or interactive whiteboards
Coprocessor
Specialized processing chip designed to improve specific computer operations, such as the graphics coprocessor.
volatile memory
Storage (such as RAM chips) that is wiped clean when power is cut off from a device.
nonvolatile
Storage that retains its data after the power is turned off is referred to as _______.
Correct Answer: D
Storage that retains its data after the power is turned off is referred to as _______. A. volatile storage B. sequential storage C. direct storage D. nonvolatile storage
Offline
Storage which can be disconnected from computer system
BIOS
The Basic Input/Output System built into every computer. This is a program often called the bootstrap loader (hence the term to boot your computer) that is stored in the ROM. When you turn your computer on the BIOS program loads and finds the operating system.
Head Crash
The hard disk's surface is scratched and some or all of the data is destroyed when there is a
Correct Answer: C. Pits and lands
Optical discs use these to represent data. Answers: A. Analog signals B. Magnetic charges C. Pits and lands D. Laser beams
Individual Social Responsibility
Organizational Social Responsibility
Intellectual Capital (Intellectual Assets)
Other terms for knowledge
These third-generation languages are designed to express the logic that can solve general problems
Procedural
Correct Answer: B. presentation graphics
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called: Answers: A. graphs B. presentation graphics C. diagrams D. charts
trojan horses
Programs that come into a computer system disguised as something else are called:
_________ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals.
Project management
memory
RAM is a type of:
RAM
Random Access Memory. a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is the most common type of memory found in computers and other devices, such as printers.
Shading
A background color or pattern that can be applied to text, tables, or graphics.
Servers
A computer that provides access to various network services, such as printing, data, and communications.
Twisted-Pair Wire
A communications medium consisting of strands of copper wire twisted together into pairs
Fiber-Optic Cables
A communications medium consisting of thousands of very thin filaments of glass fibers, surrounded by cladding, that transmit information via light pulses generated by lasers
Correct Answer: D. creating a new folder on your computer
A computer can become infected with viruses in all the following ways, except by _______. Answers: A. opening attachments to e-mail messages B. downloading software from the Internet C. downloading files from the Web D. creating a new folder on your computer
Monitor
A computer device that presents visual images of text and graphics. (See also display screen)
Solid state storage
A kind of secondary storage device that uses EEPROM circuits to store binary information. Examples of solid state storage are SSDs (solid state disks), flash drives and SD cards. Solid state storage can range in capacity from a few hundred kilobytes to hundreds of gigabytes. Capacities are growing and prices are coming down all the time but they are generally far more expensive than a similarly sized magnetic storage device.
Magnetic storage
A kind of secondary storage device that uses the magnetic N and S to represent the 1s and 0s of binary. Examples of magnetic storage are floppy disks, magnetic tapes and hard disks. The capacity of a floppy disk can be as low as 360Kb and a hard disk can have a capacity of 4Tb (and growing!).
Liability
A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems
Clip Organizer
A library of art, pictures, sounds, video clips, and animations that all Office applications share.
Borders
A line that can be added above, below, or to the sides of a paragraph, text, or table cell.
address
A location in main memory used to store data or instructions.
Tab Stop
A location on the horizontal ruler that indicates where to align text.
Assembly language
A low-level programming language that used more memorable mnemonic codes and lables to represent machine-level code. Each instruction corresponds to just one machine operation.
Desktop
A system unit that typically contains the system's electronic components and selected secondary storage devices. Input and output devices, such as the mouse, keyboard, and monitor, are located outside the system unit.
mainframe
Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.
Competitive Advantage
An advantage over competitors gained by offering consumers greater value, either through lower prices or by providing more benefits that justify higher prices
topologies
Bus, ring, star, tree, and mesh are five types of network:
Support Activities
Business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value
Correct Answer: C. Optical disc
C
With the _________ operating system, you will be fully immersed in Google's ecosystem of apps and services.
Chrome
Alien Software
Clandestine software that is installed on your computer through duplicitous methods
_________ backup providers are companies which provide utility software that creates automated backups to an online account.
Cloud
Data Dictionary
Collection of definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use this data element.
Information systems (IS)
Collects, processes, stores, analyzes, and disseminates information for a specific purpose
Internet Service Provider (ISP)
Companies that provide Internet connections for free
Comparison
Comparing the values of two items and returning TRUE or FALSE depending upon the result of that comparison.
logical operation
Comparing two pieces of data to see whether one is equal to (=), less than (<), or greater than (>) the other.
Temporary
Describes RAM storage
Permanent
Describes ROM storage
graphics coprocessor
Designed to handle requirements related to displaying and manipulating 2-D and 3-D graphic images.
power supply unit
Desktop computers have a power supply unit located within the system unit that plugs into a standard wall outlet, converting AC to DC, which becomes the power to drive all of the system unit components.
Worms
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication
sound card
Device that accepts audio input from a microphone and converts it into a form that can be processed by the computer. Also converts internal electronic signals to audio signals so they can be heard from external speakers.
Modem
Device that converts signals from analog to digital and vice versa
In the preliminary investigation phase of the systems life cycle, which one of the following tasks would NOT be included? A. Briefly defining the problem B. Suggesting alternative solutions C. Gathering the data D. Preparing a short report
Gathering the data
web authoring
General-purpose applications include all of the following except:
Correct Answer: A. web authoring
General-purpose applications include all of the following except: Answers: A. web authoring B. word processors C. spreadsheets D. database management systems
________ control is the ability to control operations with finger movements, such as swiping, sliding, and pinching.
Gesture
Raster
Graphics format consisting of a matrix of dots.
A(n) _____ shows the relationship between input and output documents.
Grid
viruses
Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.
refresh rate
How often a displayed image is updated or redrawn on a monitor.
Word
In most personal computer systems, the CPU is contained on a single chip called the _____.
Correct Answer: C. microprocessor
In most personal computer systems, the CPU is contained on a single chip called the _____. Answers: A. semiconductor B. ALU C. microprocessor D. control unit
E-Learning
Learning supported by the Web; can be done inside traditional classrooms or in virtual classrooms
Who uses management information systems?
Middle-level managers
Value Chain Model
Model that shows the primary activities that sequentially add value to the profit margin; also shows the support activities
Graphical User Interface (GUI)
Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.
Menu Button
Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.
binary system
Numbering system in which all numbers consist of only two digits: 0 and 1.
character and mark recognition devices
OMR, OCR, and MICR are all types of _______.
Correct Answer: D. character and mark recognition devices
OMR, OCR, and MICR are all types of _______. Answers: A. Radio Frequency Card Readers B. magnetic card readers C. bar code readers D. character and mark recognition devices
This type of software development focuses less on the procedures and more on defining the relationships between previously defined procedures
Object-oriented software development
MAC OS
Operating system designed for Macintosh computers.
multitasking
Operating system that allows a single user to run several application programs at the same time.
software platform
Operating system, also known as software platform, consisting of a collection of programs to handle technical details depending on the type of operating system. For example, software designed to run on an Apple computer is compatible with the Mac OS environment.
Registers
Part of the processor used for temporary storage to store instructions, memory locations to access etc
Arithmetic Logic Unit
Part of the processor which carries out calculations and logical comparisons (AND OR NOT etc)
Control unit
Part of the processor which ensures that instructions are carried out in the correct order
Bus Lines
Pathways that support communication among the various electronic components on the system board are called _____.
Correct Answer: A. bus lines
Pathways that support communication among the various electronic components on the system board are called _____. Answers: A. bus lines B. network lines C. logic paths D. gate ways
utility
Performs specific tasks related to managing computer resources or files. Norton Utility for virus control and system maintenance is a good example of a utility. Also known as service programs.
Which of the following Adobe products would be the best choice for editing bitmap images?
Photoshop
This implementation approach is preferred when there are many people in an organization performing similar operations. A. Direct B. Parallel C. Phased D. Pilot
Pilot
robot
Robots are computer-controlled machines that mimic the motor activities of living things, and some robots can solve unstructured problems using artificial intelligence.
Which of the following phases of the systems life cycle is considered as the "ongoing process"? A. Systems development B. Systems analysis C. Systems design D. Systems maintenance
Systems maintenance
top level domain
TLD. last part of internet address (.com)
This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.
Tactical model
Who is responsible for operational matters and monitoring day-to-day events?
Supervisors
A collection of activities and elements organized to accomplish a goal. a.Program b.Information c.System d.Data
System
______ software would control where a word processing program is stored in memory.
System software
A professional who specializes in analyzing and designing business systems is called a(n) ____. a. systems analyst b. project manager c. individual systems developer d. programmer a. Systems Analyst
Systems Analyst
This individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them. A. Network administrator B. Cryptographer C. Systems analyst D. Computer enginee
Systems analyst
Programming is part of which phase of the systems life cycle?
Systems development
During which phase of the systems life cycle are users trained to use the new system? A. Preliminary investigation B. Systems implementation C. Systems development D. Systems maintenanc
Systems implementation
Identify the sixth phase of the systems life cycle. A. Systems maintenance B. Systems development C. Systems design D. Systems analys
Systems maintenance
Correct Answer: B. taking the letters of the first six alphabetic characters found on the top row of keys
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______. Answers: A. representing the phonetics of the alphabets most closely associated with the keyboard B. taking the letters of the first six alphabetic characters found on the top row of keys C. using the alphabetic characters most frequently used on the keyboard D. using the letters of the alphabetic characters that are closest to access while typing
microprocessor
The central processing unit that is generally made from a single integrated circuit.
Business Environment
The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations
Dot Pitch
The distance between each pixel.
Correct Answer: A. Dot pitch
The distance between each pixel. Answers: A. Dot pitch B. Refresh rate C. Resolution D. Word size
Supply Chain
The flow of materials, information, money, and services from suppliers of raw materials through factories and warehouses to the end customers
Digital Divide
The gap between those who have access to information and communications technology and those who do not
Mac OSX
This operating system is designed to run only with Apple computers.
Correct Answer: C. Mac OS
This operating system is designed to run only with Apple computers. Answers: A. Windows B. Linux C. Mac OS D. UNIX
UNIX
This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers.
Correct Answer: D. UNIX
This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers. Answers: A. Windows B. Mac OS X C. Linux D. UNIX
Correct Answer: C. Disk caching
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. Answers: A. Data compression B. Data access C. Disk caching D. RAID
MICR
This reading device is used in banks to read the numbers on the bottom of checks and deposit slips.
A word processor would most likely be used to do which of the following?
To create documents that consist primarily of text, you need this software.
Word processor
To create documents that consist primarily of text, you need this software.
Correct Answer: B. Word processor
To create documents that consist primarily of text, you need this software. Answers: A. Presentation graphics B. Word processor C. Spreadsheet D. Database management
legacy port
Was common on microcomputer systems to connect specific types of devices. They have largely been replaced by faster, more flexible ports such as the universal serial bus (USB).
Operating System
This system software is responsible for managing your computer's resources including memory, processing, and storage.
Correct Answer: B. Operating system
This system software is responsible for managing your computer's resources including memory, processing, and storage. Answers: A. Utility B. Operating system C. Language translator D. Device driver
Warm Boot
This type of boot occurs when the computer is already on and you restart it without turning off the power.
Correct Answer: C. Warm boot
This type of boot occurs when the computer is already on and you restart it without turning off the power. Answers: A. Generic boot B. Live boot C. Warm boot D. Cold boot
tablet
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor.
Correct Answer: B. Tablet
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Answers: A. Laptop B. Tablet C. Desktop D. Smartphone
Correct Answer: B. Mobile
This type of embedded operating system is used by smartphones. Answers: A. Desktop B. Mobile C. Network D. Stand-alone
Vector
This type of image is made up of geometric shapes or objects.
Correct Answer: C. Vector
This type of image is made up of geometric shapes or objects. Answers: A. Raster B. Bitmap C. Vector D. Pixel
Optical
This type of mouse emits and senses light to detect mouse movement.
Correct Answer: D. System
This type of software works with end users, application software, and computer hardware to handle the majority of technical details. Answers: A. Communications B. Application C. Utility D. System
Correct Answer: C. Mavericks
This version of Mac OS X has better power management and enhanced workflow options for multiple monitor setups. Answers: A. Launchpad B. Mission Control C. Mavericks D. Mountain Lion
Mavrics
This version of Mac OS X has improved power management and enhanced workflow options for multiple monitor setups.
Correct Answer: C. Linux
This version of UNIX is an open source operating system that is an alternative to Windows. Answers: A. Mountain Lion B. Lion C. Linux D. Windows
Correct Answer: C
Three ways to improve the performance of a hard disk include _______. A. disk caching, RAID, and file expansion B. file compression, disk caching, and file encryption C. disk caching, RAID, and file compression D. RAID, file compression and disk expansion
silicon chip
Tiny circuit board etched on a small square of sandlike material called silicon. Chips are mounted on carrier packages, which then plug into sockets on the system board.
CHips
Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____.
Correct Answer: D. chips
Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____. Answers: A. buses B. slots C. sockets D. chips
Electronic Surveillance
Tracking people's activities with the aid of computers
Top-level managers need information both from within the organization and from outside.
True
voice recognition system
Uses a microphone, a sound card, and special software to allow users to operate computers and to create documents using voice commands.
CHR
Uses the ASCII value to look up the character associated with a particular number.
cloud computing
Uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet.
_______ perform specific tasks related to managing computer resources.
Utilities
random-access memory (RAM)
Volatile, temporary storage that holds the program and data the CPU is presently processing. It is called temporary storage because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.
Data Inconsistency
Where different versions of data have become different because duplicate versions have been stored and updated differently.
Program-Data Independance
Where the applications that use a shared database are separated from the actual data by a DBMS, changes can therefore be made to one application without it affecting the other as the programs and the data are independent.
Data Duplication / Data Redundancy
Where the same data is stored more than once, unnecessarily. This can lead to data inconsistency.
multicore processor
Which of the following allows a computer to run two or more operations simultaneously?
Correct Answer: C. Multicore processors
Which of the following allows a computer to run two or more operations simultaneously? Answers: A. Coprocessors B. Multiplexing C. Multicore processors D. Binary system
Correct Answer: D. Voice over IP
Which of the following allows the transmission of telephone calls over computer networks? Answers: A. Faxing B. Cell phones C. PDAs D. Voice over IP
USB port
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices?
Correct Answer: A. USB port
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Answers: A. USB port B. SATA C. Parallel port D. Firewire bus
one high-capacity hard disk drive
Which of the following characteristics about RAID is incorrect? Question 13 options: A) Expanded storage capability B) Fast access speed C) Highly reliable D) One high-capacity hard disk drive
It directs the movement of electronic signals between memory (Which temp holds data) and the arithmetic-logic unit.
Which of the following is a function of the control unit?
Correct Answer: B. It directs the movement of electronic signals between memory and the arithmetic-logic unit.
Which of the following is a function of the control unit? Answers: A. It provides pathways that support communication among the various electronic components. B. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C. It performs fundamental math operations like addition, subtraction, and so on. D. It uses the logic to compare two pieces of data.
CISC
Which of the following is not a character encoding standard?
Correct Answer: C. CISC
Which of the following is not a character encoding standard? Answers: A. EBCDIC B. ASCII C. CISC D. Unicode
Provide INTERNET access
Which of the following is not a function of the operating system?
Correct Answer: B. Providing Internet access
Which of the following is not a function of the operating system? Answers: A. Managing resources B. Providing Internet access C. Providing a user interface D. Running applications
Lotus Symphony
Which of the following is not a popular cloud suite or online office suite?
Correct Answer: D. Lotus Symphony
Which of the following is not a popular cloud suite or online office suite? Answers: A. Google Docs B. Zoho C. Microsoft Office Web Apps D. Lotus Symphony
Android
Which of the following is not a popular desktop operating system?
Correct Answer: B. Android
Which of the following is not a popular desktop operating system? Answers: A. Windows 8 B. Android C. Linux D. Max OS X
mountain lion
Which of the following is not a popular mobile operating system?
Correct Answer: A. Mountain Lion
Which of the following is not a popular mobile operating system? Answers: A. Mountain Lion B. Windows Phone 8 C. iOS D. Android