MIS FINAL
The Design Phase consists of two major activities:
1. If necessary, acquire hardware and software. 2. develop all of the details of the new or modified information system.
Site license
A legal agreement that permits users to install software on multiple computers--usually at a volume discount
Registers
A processor contains small,high speed storage locations, called ____ that temporarily hold data and instructions -part of the processor not the memory or a permanent storage device
Another term for system unit?
Chasis
Automatic Update
Feature that regularly provides new features or corrections to the program.
Ergonomic Keyboard
Has a design that reduces the chance of repetitive strain injuries (RSIs) of wrist and hand. -recall that the goal of ergonomics is to incorporate comfort, efficiency, and safety in the design of the workplace.
tactile output
some input devices, such as a mouse, and mobile devices, such as a smartphone include____ that provides the user with a physical response from the device. example: users may sense a bumping feeling on their hand while scrolling through a smartphones contact list.
Disk Cache
sometimes called a buffer, consists of a memory chip on a hard disk that stores frequently accessed data, instructions, and information.
Motherboard
sometimes called a system board, is the main circuit board of the computer. -many electronic components, such as the processor and memory attach to it.
What is a receiving device
that accepts transmission of data, instructions, or information travel
Virtual memory
the operating system allocates a portion of the storage medium, such as the hard disk or USB flash drive, to function as additional RAM.
Clock speed
the pace of the system clock___, is measured by the number of ticks per second -the faster the__ the more instructions the processor can execute per second.
Booting
the process of starting or restarting a computer or mobile device
Procedural language
the programmer writes instructions that tell the computer what to accomplish and how to do it. -often called a third-generation language or functional language, a programmer uses a series of English-like words to write instructions. Example: ADD stands for addition.
Request for quotation(RFQ)
Identifies the required product. With an ___, the vendor quotes a price for the listed product.
in the fields
In a relational database, the only data redundancy(duplication) exists in the common columns(fields). The database uses these common columns for relationships.
Performance monitoring
Is a program that assesses and reports information about various computer resources and devices. Example: users can monitor the processor, disks, network, and memory usage.
A Buffer
Is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or an output device.
Compiler
Is a separate program that converts the entire source program into machine language before executing it.
ISDN
Is a set of standards for digital transmission of data over standard copper phone lines.
A DVD Rom uses all to achieve higher storage but
Making disk single-session
vaporware is NOT
Malware
A Worm
Malware that resides in active memory and replicates itself over a network to infect machines, using up the system resources and possibly shutting down the system.
True of tape?
No longer used as a primary method of storage.Instead, businesses use ___most often for long-term storage and back-up.
Main Circuit board of the system unit?
System Board
Expansion Bus
allows the processor to communicate the peripheral devices
Broadband
also called a digital modem, is a communications device that sends and receives data and information to and from a digital line.
Surge Protector
also called a surge suppressor, uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electric equipment. Absorbs small overvoltages-- generally w/out damage to the computer and equipment.
DOS is NOT
an operating system
ALU
another component of the processor, performs arithmetic,comparison, and other operations.
Operating system and tools
app softwares tools enable u to perform maintenance tasks
Back end
application that supports front end is sometimes called the ...
NOT true of relational database?
applications best suited are those who are organized in 3-D dimensions
What is NOT true of Biometric device?
are an unreliable method of identification and notification.
Search
attempts to locate a file on your computer or mobile device based on specified criteria.
what is the greatest problem with bus network?
bus itself might become inoperable. if that happens, the network remains inoperative until the bus is back in working order.
Green computing supporting
buy computer from retailer who will dispose of your old computer properly
Interpreter
by contrast, translates and executes one statement at a time. -reads a code statement, converts it to one or more machine language instructions, and then executes those machine language instructions.
Virtual Server
can be created and configured quickly, does not require a new physical server, and is easier to manage.
Host Computers
controls access to the hardware,software, and other resources on the network and provides a centralized storage area for programs, data, and information.
Data model
defines how users view the organization of the data. -it does not define how the OS actually arranges the data on the storage media.
digital communication
describes a process in which two or more computers or devices transfer data, instructions, and information.
Describes info system
five phases? -is a set of hardware,software, data, people, and procedures that work together to produce information. -support daily, short-term, and long-range activities of users in a company.
copy right
gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials. -protects any tangible form of expression.
Valid TLD'S
gov,org,net
Intel and AMD
now use a numbering scheme that more accurately reflects the processing speed of their chips. The leading manufactures of personal computer processor chips are___.
Response time
of a display refers to the time in milliseconds(ms) that it takes to turn a pixel on or off. range of displays range from 2 to 16 ms.The lower the number, the faster the___.
Power supply
or laptop AC adapter converts the wall outlet AC power into DC power.
What is term for latter option?
outsourcing
Malware
short for malicious software, consists of programs that act without a users knowledge and deliberately alter the operations of computers and mobile devices
Mail Server
Stores and delivers email messags
S in SQL stands for
Structured
Principle of least privilege policy
where users access privileges are limited to the lowest level necessary to perform required tasks.
Intel-Compatible
which have an internal design similar to intell processors, perform the same functions, and can be as powerful, but often are less expensive. (AMD)
Flatbed scanner
works in a manner similar to a copy machine except it creates a file of the document in memory instead of a paper copy.
FTP
(File transfer Protocol) is an internet standard that permits file uploading and downloading to and from other computers on the internet.
Kind of software designed to make users more productive
Application
RAM
(Random access memory) also called main memory, consists of memory chips that can be read from and written to by the processor and other devices. It is volatile, which means it loses its contents when the power is removed from the computer.
Expansion card
(adapter card) sometimes called____ or adapter board is a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.
Detailed design
-The activities to be performed include developing designs for databases, inputs, outputs, and programs. During ___of inputs and outputs, the systems analyst carefully designs every menu, screen, and report specified in the requirements. The outputs often are designed first b/c they help define the requirements for the inputs. Thus, it is very important that outputs are identified correctly and that users agree to them.
Paging
-The technique of swapping items between memory and storage is called___, is a time consuming process for the computer.
Full-back up
-copies all of the files on media in the computer -advantage=fastest recovery method. all files r saved -disadvantages=longest backup time
SSD advantages over traditional hard disks
-higher storage capacities -faster access times -faster transfer rates -quieter operation -more durable -lighter weight -less power consumption(leads to longer battery life) -less heat generation -longer life(more than 10 times longer)
System development life cycle
-is a set of activities used to build an information system. 1.Planning 2. Analysis 3.Design 4. Implementation 5. Support and Security
Graphical user interface
-most users today work with this. -you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.
Validation checks
-sometimes called validation rules, reduce data entry errors and thus enhance that data's integrity.
Access provider
...
Bundle
...
Line printers and dot-matrix printers
...
Magnetic Media
...
Performance monitor
...
Program Management
...
Square-shaped
...
Transferring Hems from memory to storage media
...
Uninstaller
...
periods
...
About__% of e-waste is recycled?
20
Software suite
A collection of individual applications available together as a unit.
What is a Steering Committee?
A decision-making body in an organization.
Anti-Spam
A filtering program that attempts to remove spam before it reaches your inbox or forum.
Pop-up Blocker
A filtering program that stops pop-up ads from displaying on webpages.
Project request
A formal, written request for a new or modified information system.
Image
A pixel is a single point in an electronic image.
LINUX
A popular, multitasking UNIX-based operating system that runs on a variety of personal computers,servers, and devices.
Instant messaging
A real-time internet communications service that notifies you when one or more of your established contacts are online and then allows you to exchange messages or files or join a private chat room with them.
Personal Firewall
A security tool that detects and protects a personal computer and its data from unauthorized intrusions.
uninstaller(2)
A tool that removes a program, as well as any associated entries in the system files.
Secure Site
A website that uses encryption techniques to secure its data
When data in a spreadsheet program is changed, what occurs?
All calculations can be recalculated
Software
Also called a program,consists of a series of related instructions,organized for a common purpose, that tells the computer what tasks to perform and how to perform them. Categories are: system and Application
Paint software
An application that allows users to draw pictures, shapes, and other graphics with various on-screen tools such as a pen, brush, eyedropper, and paint bucket.
Image Editing Software
An application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images.
Digital Security Risk
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
For best performance bandwidth should be...
Bandwidth should be high latency low
Arpanet
Became functional in September 1969, Linking scientific and academic researchers across the US. (ARPA) an agency of the US department of defense. ARPA'S goal was to build a network that 1. allowed scientists at different physical locations to share info and work together on military and scientific projects. and 2. could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack.
E-Commerce uses
Business-to-Business
Sychronization
Calendar and contact management applications enable you to synchronize information. This means that all of your computers and mobile devices, along with your organizations server or cloud storage, have the latest version of any updated information.
Term for # of Bytes(characters) a storage medium can hold
Capacity
Vending Kiosk
Dispense item after payment is received. Examples include DVD rentals and license plate renewals.
MIDI
Connects to musical instruments(adapter cards)
Firmware(2)
Consists of ROM chips or flash memory chips that store permanent instructions.
User Interface
Controls how you enter data and instructions and how information is displayed on the screen.
Restore
Copy backed up files to their original location on a computer or mobile device.
Which is NOT file maintenance?
Deleting records
Hits
Depending on your search text, search engines may respond with thousands to billions of search results, sometimes called ...
CAD programs allow..
Designers to rotate designs of 3-D objects to view them from any angle. -CAD software is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
Bus Width
Determines the number of bits that the computer can transmit at one time.
In a relational database...
Each row has a primary key and each column has a unique name. -A____is a database that stores data in tables that consist of rows and columns.
CPU,Processor,Centural Processing unit
Electronic Component that inturprets
NOT true of communications software?
Email FTP, and VOIP are examples of system software
Single user/single tasking
Embedded computer
Steps in Machine cycle?
Executing, Fetching, Storing, Decoding
Keyboard monitoring software
Few programs have criminal and beneficial purposes but______Also called keylogging software, fits these objectives. this software runs undetected and stores every keystroke in a file for later retrieval. -criminals us program to capture usernames and passwords -employers can measure the efficiency of data entry personnel. -verify employees are not releasing company secrets -Review hard disk files -check running programs -run detection software regularly
Tracks
Form circles on the surface of a hard disk. the disk storage locations are divided into wedge-shaped sections, which break the tracks into small arcs called sectors. several sectors form a cluster.
NOT guideline for designing database?
Here ARE the guidelines 1.determine its purpose 2.Examine the requirements and identify the entities(tables,files,or objects) involved. 3. identify the attributes(fields) for all the entities 4. identify the functional dependencies that exist among the attributes. 5.Use the functional dependencies to identify the entities. 6. identify any relationships between entities
Macro NOT true?
Here are things that ARE true -is a series of statements that instructs a program or app how to complete a task. -allow users to automate routine, repetitive, or difficult tasks in application software, such as word processing, spreadsheet or database programs. -users can create simple programs within the software by writing macros -usually create ___in one of two ways:1. record the___or 2. write the __. -if you want to automate a routine or repetitive task such as formatting or editing, you would record___.
NOT true of machine language?
Here is what IS true, -Known as the first generation of programming languages -is the only language the computer directly recognizes -instructions use a series of binary digits(1s and 0s) or a combination of numbers and letters that represents binary digits -coding in ____language is tedious and time consuming
What is JAD session?
Instead of a single one-on-one interview, analysts often use joint-application design sessions together data and information -or focus group,consists of a series of lengthy, structured group meetings in which users and IT professionals work together to design or develop an application
Green Computing
Involves reducing the electricity consumed and environmental waste generated when using a computer.strategies that support it include: recycling, using energy efficient hardware, and energy saving features.
Clip Art
Is a collection of drawings ,photos , and other images
Website
Is a collection of related webpages,which are stored on a web server.
Peripherals
Is a device you connect to a computer or mobile device to expand its capabilities. Examples include, a keyboard, mouse, microphone, monitor, printer, scanner, webcam, and speakers.
World wide web
Is a global library of information available to anyone connected to the internet.
Data warehouse
Is a huge database that stores and manages the data required to analyze historical and current transactions.
Visual programming language
Is a language that uses a visual or graphical interface for creating all source code.
Mainframes
Is a large, expensive, powerful server that can handle hundreds or thousands of connected users simultaneously.
Feasibility
Is a measure of how suitable the development of a system will be to the organization.
4GL programming language
Is a non procedural language that enables users and programmers to access data in a database. -one popular___is SQL
Mobile Computer
Is a portable personal computer, designed so that a user can carry it from place to place.
Uploading
Is a process of transferring files from your computer or mobile device to a server on the internet.
Normalization
Is a process that database developers use to ensure that data within the relations contains the least amount of duplication.
Embedded Computer
Is a special-purpose computer that functions as a component in a larger product. ___ are everywhere ---Consumer electronics, Home automation devices, Automobiles, Process controllers and robotics, Computer devices and office machines. Are usually small and have limited hardware.
Default Value
Is a value that the DBMS initially displays in a field. Example: if most students who attend the school live in Indiana, the DBMS initially could display IN in the state field.
Graphic
Is a visual representation of nontext information, such as drawing, chart, or photo.
Hotspot
Is a wireless network that provides internet connections to mobile computers and devices.
Internet
Is a worldwide collection of computer networks that connects millions of businesses,government agencies, educational institutions and individuals.
Project Management Software
Is an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project. Helps users manage project variables, allowing them to complete a project on time and within budget.
Presentation Software
Is an application that allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group.
Note Taking
Is an application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook. many also include a calendar feature.
Port Replicator
Is an external device that provides connections to peripheral devices through ports built into the device.
Javascript
Is an interpreted language that allows a programmer to add dynamic content and interactive elements to a webpage. These elements include alert messages, scrolling text, animations, menus, data input forms, pop up windows, and interactive quizzes.
Deliverable
Is any tangible item such as a chart, diagram,report,or program file.
Opensource Software
Is software provided for use, modification and redistribution. This software has no restrictions from the copyright holder regarding modification of the software's internal instructions and its redistribution.
Browser
Is software that enables users with an internet connection to access and view webpages on a computer or mobile device. ex. internet explorer, firefox, safari, and Google chrome.
Search Engine
Is software that finds websites, webpages,images, and videos, news,maps, and other information related to a specific topic.
Cyberxtortionist
Is someone who demands payment to stop an attack on an organizations technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organizations network if they are not paid a sum of money
Cyberterrorist
Is someone who uses the internet or network to destroy or damage computers for political reasons. The cyberterrorist might target the nations air traffic control system, electricity-generating companies or a telecommunications infrastructure.
Supercomputers
Is the Fastest,Most powerful computer-- and the most expensive. Capable of processing many trillions of instructions in a single second.
Pairing
Is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other.
VR(virtual Reality)
Is the use of computers to stimulate a real or imagined environment that appears as a three-dimensional space.
The purpose of the Implementation Phase
Is to construct, or build, the new or modified system and then deliver it to the users. Members of the system development team perform four major activities in this phase. 1. develop programs and apps 2.install and test new system 3.train users 4. convert to the new system
What is the key advantage of the Multidimensional database?
It can consolidate data much faster than a relational database.
Built directly on a processor chip
L2 Cache
Database analysts and Administrators
Managing a company's database requires a great deal of coordination. The role of coordinating the use of the data base belongs to ______. -ADMINISTRATOR=requires a more technical inside view of the data. Creates and maintains the data dictionary,manages security of the database, monitors the performance of the database, and checks backup and recovery procedures.
upward compatible
Meaning it may not run on new versions of the operating system.
What is storage media?
Media, such as hard disks, USB flash drives, memory cards, and optical discs, on which a computer keeps data, instructions, and information.
non volatile memory
Memory that does not lose its contents when power is removed from the computer.
Most computers today use comm and-line
NOT TRUE
Protocol as it applies to a network?
Network standards and protocols often work together to move data through a network. some of these standards define how a network is arranged physically, while others specify how messages travel along a network. thus, as data moves thru a network from one program to another, it may use one or more of these standards. -a standard that outlines characteristics of how 2 devices communicate on a network is called protocol. -specifically a protocol may define data format, coding schemes, error handling, and the sequence in which data transfers over a network.
Hard disk/SSD
Operating system; applications; user data and information, including photos, music and videos; backups SSD: is a flash memory storage device that contains its own processor to manage its storage.
Back up
Or copy, of the entire database should be made on a regular basis. -Some DMBS's have their own built-in___tools. others require users to purchase a separate ___program, or use one included with the operating system.
Email List
Or electronic mailing list, is a group of email addresses used for mass distribution of a message. Original use of them such as LISTSERV, allowed any subscriber to send a message, which created a discussion-type forum among all subscribers via email.
Internet Cable
POS terminal able to update inventory
Application Files
Programs designed to make users more productive and/or assist them with personal tasks.
Byte
Provides enough different combinations of 0s and 1s to represent 256 different characters. These characters include numbers, uppercase and lowercase letters of the alphabet, punctuation marks, and other keyboard symbols, such as asterisk (*), ampersand (&), dollar sign ($).
Software can be distributed to anyone to others at no cost?
Public-Domain
The hard disks
Read/write head. also called a hard disk drive, is a storage device that contains or or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.
Query language
Request for specific data -language used with databases that allows users to specify the data they want to display,print,store,update,or delete.
True of SSD's
SSD's have faster transfer rates
E-Commerce
Short for electronic commerce, is a business transaction that occurs over an electronic network such as the internet.
Purpose of IP address?
Short for internet protocol address, is a sequence of numbers that uniquely identifies the location of each computer or device connected to the internet.
Multimedia authoring software
Software that allows users to combine text, graphics, audio, video, and animation in an interactive application.
All-In-One
Some desktops called ___ , do not have a tower and instead house the screen and system unit in the same case.
what is a form?
Sometimes called a data entry form, is a window on the screen that provides areas for entering or modifying data in a database.
Data Dictionary
Sometimes called a repository,contains data about each file in the database and each field in those files.
Word Processing Software
Sometimes called a word processor, is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics. Major Advantage=it enables users to change their written words easily.
Archival
Sometimes called full back up, provides the best protection against data loss because it copies all program and data files.
Single-session
Standard CD-Rom
Document Management
System that allows for storage and management of a company's documents, such as word processing documents, presentations, and spreadsheets.
Plug and Play
Technology that gives a computer the capability to recognize peripheral devices as you install them.
System software
Term used to refer to the operating system and other tools that consist of the programs that control or maintain the operations of the computer and its devices.
System Clock
The processor relies on a small quartz crystal circuit called the ____to control timing of all computer operations. generates regular electronic pulses or ticks, that set the operating pace of components of the system unit
Access time
The amount of time it takes the processor to read data, instructions, and information from memory and the time required to deliver an item from memory to the processor.
network architecture
The configuration of computers, devices, and media in a network, sometimes called___, is categorized as either client/server or peer-to-peer.
Memory management
The purpose of ____ is to optimize the use of a computer or devices internal memory.
Internet Backbone
These major carriers of network traffic are known collectively as...In the US, the transmission media that made up the internet backbone exchange data and information at several different major cities across the country. That is, they transfer data information from one network to another until reaching the final destination.
which is true for thermal printers?
They are inexpensive, but the quality is low and images tend to fade
Not advantage of external hard drives
They leave data in the computer
Administrators
The person overseeing network operations, uses the server operation system to add and remove users, computers, and other devices to and from the network. -use these files to monitor computer usage
Decryption
The process of decoding encrypted data.
Mirroring
The simplest RAID storage design is level 1, called__, which writes data on 2 disks at the same time to duplicate the data.
5 GHZ
The system clock has a clock speed of 5 billion clock cycles per second
direct
The user stops using the old system and begins using the new system on a certain date. Advantage=It requires no transition costs and is a quick implementation technique. Disadvantage= It is extremely risky and can disrupt operations seriously if the new system does not work correctly the first time.
Skimmer
Thieves can capture a credit card number and pin by placing a BLANK on an ATM. A sophisticated BLANK is an entire panel placed directly on top of the ATM face and virtually is undetectable, but less-technical devices are false card readers secured to the card slot with double-sided tape and a hidden camera or an overlay on the keypad.
What is the Role of W3C?
To ensure the continued growth of the web. Nearly 400 organizations from around the world are members of W3C, advising, defining standards, and addressing other issues
Battery life based on
USAGE
Visual Voicemail
Users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.
Not true about mobile printers?
Usually connect to a firewire port
system test
Verifies that all programs in an application work together properly.
Time of unit test?
Verifies that each individual program an object works by itself.
Streaming
Where you access the media content whhile it downloads. For example, radio and tv broadcasts often use this media to broadcast music, interviews, talk shows, sporting events, news, and other segments so that you can listen to the audio or view the video as it downloads to your computer.
webpage
Which can contain text,graphics,audio,and video.
Force Feedback
Which is a technology that sends resistance to the device in response to actions of the user. example: in gaming the steering wheel vibrates or trembles, making the driving experience as realistic as possible. also used in practical training applications, such as in the military and aviation.
Netiquette
Which is short for internet etiquette, is the code of acceptable behaviors users should follow while on the internet; that is the conduct expected of individuals while online.
Backward compatible
Which means they support older USB devices as well as newer ones
Multimedia
Which refer to any application that combines text with media. Media includes graphics,animation, audio, video, and/or virtual reality.
Ethernet Port
Wire Graphics
smallest unit of data a computer can process
a bit
A Modem
a broadband modem-also called a digital modem, is a communications device that sends and receives data and information to and from a digital line. -DSL, IDSN, and cable modems
RAID
a group of 2 or more integrated hard disks
NIC
a network card, sometimes called a network interface card, is a communications device that enables a computer or device that does not have built-in networking capability to access a network.
Digital Divide
a term used to illustrate the gap between those with and without access to technology.
Integrated
circuit contains many microscopic pathways capable of carrying electrical current. -each ___ can contain millions of elements such as resistors, capacitors, and transistors.
NOT part of planning
conduct a preliminary investigation
Memory
consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data (information).
parallel conversion
consists of running the old system alongside the new system for a specified time. Advantage=can fix any problems in the new system before you terminate the old system. Disadvantage= It is costly to operate two systems at the same time.
Firmware
contain permanently written data, instructions, or information such as a mobile devices start-up instructions.
contrast Ratio
describes the difference in light intensity between the brightest white and darkest black that can be produced on a display. ____today range from 500:1 to 2000:1 . higher____represent colors better.
Google android is NOT
desktop os
What is the goal of internet?
develop and test advanced internet technology
pixel pitch sometimes called
dot pitch -is the distance in millimeters between pixels on a display.
RSS
enables web content to be distributed
Not true of Wifi?
even if 2 products are wifi certified, they must be on same platform
RAM
fastest transfer rate
Which is NOT a likely complaint from using computers?
high blood pressure
Completeness
if you are running a check to ensure__. validity check that verifies that a required field contains data.
NOT true about internet and network attacks?
information kept on an organization
Braille
instead of using a monitor, blind users can work with voice output. that is, the computer speaks out loud the information that appears on the screen. Another alternative is a _____printer, which prints out information on paper in braille.
Employee monitoring
involves the use of computers,mobile devices, or cameras to observe, record, and review an employees use of a technology, including communications such as email messages, keyboard activity(used to measure productivity), and websites visited. Many programs exist that easily allow employers to monitor employees. further, it is legal for employees to use these programs.
Wireless access point
is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network using wireless technologies such as wifi. -have high quality internal or external antennas for optimal signals.
What is database?
is a collection of data organized in a manner that allows access,retrieval, and use of that data.
Router
is a communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network. -can be used on a network of any size.
UPS
is a device that contains a surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. Connects your computer and a power source.
A data projector
is a device that takes the text and images displaying on a computer or mobile device screen and projects images on a larger screen so than an audience can see the image clearly. -low cost units-->LCD and DLP projectors
Optical reader
is a device that uses a light source to read characters,marks, and codes and then converts them into digital data that a computer can process.
Personal area network (PAN)
is a network that connects computers and devices in an individuals workspace using wired and wireless technology. -may connect devices thru a router using network cables or directly using special USB cables. -also may use bluetooth or wifi technology.
Spyware
is a program placed on a computer or mobile device w/out the users knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Front end
is a program that generally has a more user-friendly interface than the DMBS. -interacts with the DBMS, which in turn, interacts with the database.
Bot
is a program that performs a repetitive task on a network
Phishing
is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.
Network Attached Storage(NAS)
is a server that is placed on a network with the sole purpose of providing storage to users,computers, and devices attached to the network.
peer-to-peer
is a simple, inexpensive network that typically connects fewer than 10 computers. Each computer called a peer, has equal responsibilities and capabilities, sharing hardware(such as a printer).
Multi-Core
is a single chip with two or more separate processor cores. -are used in all sizes of computers
Computer Chip
is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
HTML(Hypertext Markup Language)
is a special formatting language that programmers use to format documents for display on the web. -View a webpage written with ___ in a browser. -Is not actually a programming language. -it is a language that has specific rules.
Spoofing
is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
interactive whiteboard
is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen, usually via a projector.
Touch Screen
is a touch-sensitive display device. are convenient because they do not require a seperate device for input.more popular as computers and mobile devices become smaller, leaving less room to connect external input devices, such as a keyboard or mouse.
Webcam
is a type of DV camera that enables you to capture video and still images, and usually audio input, for viewing or manipulation on a computer or mobile device.
Flash Memory
is a type of nonvolatile memory that can be erased electronically and rewritten.
Optical discs
is a type of storage medium that consists of flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. -store items by using microscopic pits (indentations) and lands (flat areas) that are in the middle layer of the disc.
Broadcast Radio
is a wireless transmission medium that distributes radio signals through the air over long distances such as between cities, regions, and countries and short distances, such as within an office or home.
Linux(2)
is an Open source OS, which means its code is provided for use, modification, and redistribution.
Microwave Station
is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications.
barcode
is an identification code that consists of either a set of vertical lines and spaces of different widths or a two-dimensional pattern of dots, squares, and other images. -represents data that identifies the manufacturer and the item.
user response
is an instruction a user issues by responding to a message displayed by a program or app. a response to the message instructs the program or app to perform certain actions. example: reply YES to a question "do you want to save changes"? the program saves the changes you've made.
Command
is an instruction that causes a program or app to perform a specific action. programs and apps respond to commands that a user issues. issue commands by touching an area on a screen, pressing keys on a keyboard, and clicking a mouse button to control a pointer on the screen, or speaking into a microphone.
Enterprise users
is category of users. Each employee or customer who uses computers,mobile devices, and other technology in the enterprise is an.
Output
is data that has been processed into a useful form. recall that computers process data (input) into information(__)
Database approach NOT true
is isolated data
Cross Platform application
is one that runs the same on multiple operating systems.
acceptance test
is performed by end users and checks the new system to ensure that it works with actual data.
Control Unit
is the component of the processor that directs and coordinates most of the operations in the computer. -has a role much like a traffic officer: it interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction. -arithmetic logic unit -registers,buses
Kernel
is the core of an operating system that manages memory and devices, maintains the internal clock,runs programs,and assigns the resources such as devices, programs, apps, data, and information. -is memory resident, which means it remains in memory while the computer or mobile device is running.
Validation
is the process of comparing data with a set of rules or values to determine if the data is correct.
Voice Input
is the process of entering input by speaking into a microphone. the microphone may be built in the computer or device, in a headset, or an external peripheral device that sits on top of a desk or other surface. -uses of voice input include instant messaging that supports voice conversions, chat rooms, that support voice chats, video calls, video conferencing. -part of a larger category called audio input.
Content Filtering
is the process of restricting access to certain material. many businesses use ____ to limit employees web access.
source program
is the program that contains the language instructions, or code, to be converted to machine language.
Transfer Rate
is the speed with which data, instructions, and information transfer to and from a device.
What is NOT a reason mobile device can be categorized as computer?
it can accept output
What is true about a computer?
its electronic components process data using instructions
Session Cookie
keep track of items in shopping cart
Home Network
many home users connect multiple computers and devices
Access time
measures 1. the amount of time it takes a storage device to locate an item on a storage medium or 2. the time required to deliver an item from memory to the processor. -access time of storage devices is slow, compared with the access time of memory.
Voice
noise-which is an electrical disturbance that can degrade communications
Energy star
personal computers, display devices, printers, and other devices should comply with guidelines of the ____program. the us department of energy (DOE) and the us environmental protection agency (EPA) developed the ____ program to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy-efficient devices. for example to sleep or power save mode after a specified number of inactive minutes or hours.
Controller
previously called a disk controller, consists of a special purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer. -may be part of the drive, may be on the motherboard, or may be a separate adapter card inside the computer.
Risks of using computers
privacy,environmental,health
Back door as it refers to computer crime is___?
program or set instructions that allows users to by pass security controls
VPN
provides the mobile user with a secure connection to the company network server, as if the user has a private line.
RFID standard
radio frequency identification -is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. -RFID reader, also called a transceiver, reads the radio signals and transfers the information to a computer or computing device. -ranges from 5 inches to 300 feet or more.
information privacy
refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.
intellectual property
refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
Data integrity
reflects the quality of the data. -the more errors the data contains, the lower its integrity.
ADA(Americans with Disabilities Act)
requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers.
Machine-dependent language
runs on only one particular type of computer or device.
Hibernate mode do
save any open docs and programs to a hard drive before remaining power from computer drive
Spooling
sends documents to be printed to a buffer instead of sending them immediately to the printer.
DNS server identify which?
server translates the domain name to its associated IP address so that the request can be routed to the correct computer. Is a server on the internet that usually is associated with an ISP.
Disadvantage of all-in-one printer?
they are significantly less expensive than if you purchase each device separately. if the device breaks down, however, you lose all four functions, which is the primary disadvantage.
They restore the files
to back up a file means to make a copy of it. in the case of a system failure or the discovery of corrupted files, you ___by copying the backed up files to their original location on the computer or mobile device
Purpose of hubs and switches?
to provide central points for cables in a network.
How many peripheral devices can you connect w/USB port?
up to 127
large-format printer
using ink-jet printer technology, but on a much larger scale, a_____creates photo-realistic-quality color prints. Graphic artists use these high-cost, high-performance printers for signs, posters, and other professional quality displays.