Computer Concepts 2014 Stuff

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Network specialist/administrator

A computer professional who plans, installs, and maintains one or more local area networks

Flash cookie

A cookie-like object that is created and used by the Adobe Flash Player; also referred to as a local shared object

Digital watermark

A digital rights management technology that inserts a hidden signal into multimedia content as an identifying marker that can be tracked or verified

TIFF

(Tag Image File Format) A bitmap image file format with a .tif extension that automatically compresses the file data

HTML tags

A set of instructions, such as <B>, inserted into an HTML document to provide formatting and display information to a Web browser

Wavetable

A set of pre-recorded musical instrument sounds in MIDI format

Implementation phase

A set of tasks performed with the supervision of a system development project team in which a new information system is constructed

MiFi

A small, wireless router that connects to a cellular data network, creating a mobile WiFi hotspot

Ionizing radiation

A type of radiation that has sufficient energy to remove an electron from an atom and potentially cause tissue damage

Ruby

An interpreted language used to develop Web apps

Objective-C

An object-oriented programming language that is based on C

Eiffel

An object-oriented programming language with syntax similar to C

Digital Revolution

An ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet. The technology driving the digital revolution is based on digital electronics and the idea that electrical signals can represent data, such as numbers, words, pictures, and music.

Online employment service

An online database of job opening announcements that spans many industries or just one specific industry

menu / menu bar

Displays a list of commands or options. Menus were developed in response to difficulties many people experienced trying to remember command words and syntax for commands line user interfaces.

Predicate

In a Prolog fact, such as likes(John, Mary), the predicate "likes" describes the relationship between the arguments in parentheses, such as (John, Mary)

Low-level language

A programming language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations

Server

Is to serve computers on a network (such as the Internet or home network) by supplying them with data.

Signed code

Program code that has an associated digital certificate identifying the programmer; used to reduce susceptibility to malware

Confidentiality

The obligation not to disclose willingly any information obtained in confidence

Format shifting

The process of converting media into a different file format to use it on a device other than the original one

System conversion

The process of deactivating an old information system and activating a new one

Software customization

The process of modifying a commercially available software application to meet the needs of a specific user or organization

Systems analysis and design

The process of planning and building an information system

Cropping

The process of selecting and removing part of an image

Rasterization

The process of superimposing a grid over a vector image and determining the color depth for each pixel

memory leak

when an application requests memory but never releases it, can cause an application not to function properly

infared light

can carry data signals but only for shot distances and with a clear line of sight

module

component

Function

(1) In the context of spreadsheet software, a built-in formula for making a calculation. (2) In the context of programming, a section of code that manipulates data, but is not included in the main sequential execution path of a program.

Atanasoff-Berry Computer

(ABC) An early electronic computer prototype that incorporated the use of vacuum tubes for data processing instead of mechanical switches

AACS

(Advanced Access Content System) A digital rights management system that uses encryption to restrict access and copying content from optical media

AAC

(Advanced Audio Coding) A file format that provides highly compressed audio files with very little loss of sound quality and is promoted by Apple on its iTunes Web site

ASF

(Advanced Systems Format) Microsoft's proprietary container format for streaming digital multimedia; typically holds WMV and WMA files

API

(Application Program[ming] Interface) A set of application programs or operating system functions that can be utilized by a program

AVI

(Audio Video Interleave) A video file format, developed by Microsoft, that was once the most common format for desktop video on the PC

Blu-ray disc movie

(BDMV) A file format used for storing high definition video clips on Blu-ray discs

BASIC

(Beginners All-purpose Symbolic Instruction Code) A simple high-level programming language that was popularized by Microsoft in the 1970s

BLOB

(Binary Large OBject) A collection of binary data, such as a graphic or audio clip, that is stored in a single field of a database

BI

(Business Intelligence) An integrated set of technologies and procedures used to collect and analyze data pertaining to sales, production, and other internal operations of a business in order to make better business decisions

B2G

(Business-to-Government) An e-commerce exchange of products, services, or information between businesses and governments

Chief information officer

(CIO) The highest-ranking executive responsible for information systems

COBOL

(COmmon Business-Oriented Language) A high-level programming language used for transaction processing on mainframe computers

C2C

(Consumer-to-Consumer) An e-commerce exchange of products, services, or information between consumers; for example, online auctions

CSS

(Content Scramble System) A DRM technology designed to prevent unauthorized duplication of DVDs

CRM

(Customer Relationship Management) A technique for increasing profitability by improving the relationship between a company and its customers

Data flow diagram

(DFD) A diagram that illustrates how data moves through an information system

Digital rights management

(DRM) A set of techniques and technologies designed to discourage and prevent unauthorized duplication of digital content

Fortran

(FORmula TRANslator) The oldest high-level computer programming language still in use for scientific, mathematical, and engineering programs

FTP

(File Transfer Protocol) A set of rules for uploading and downloading files between a client computer and a remote server

HTTPS

(Hypertext Transfer Protocol Secure) The protocol used to create secure connections for e-commerce by adding a layer of encryption

Joint application design

(JAD) A widely accepted design technique that is based on the idea that the best information systems are designed when end users and systems analysts work together on a project as equal partners

JIT

(Just In Time) A manufacturing system in which the parts needed to construct a product are received at the assembly site only as needed

LISP

(LISt Processor) A declarative programming language that excels at handling complex data structures, artificial intelligence projects, and very complex programs

Management information system

(MIS) A type of information system that manipulates the data collected by a transaction processing system to generate reports that managers can use to make business decisions

MRP

(Manufacturing Resource Planning) A business management technique in which an optimum manufacturing plan is generated based on a wide variety of data

Network address translation

(NAT) A security technique that allows a LAN to use one type of IP address for intra-network data and another type of address for data traveling to and from the Internet

Network service providers

(NSP) Companies that maintain a series of nationwide Internet links

ODBMS

(Object Database Management System) Database management software used to construct an object-oriented database

OLAP

(Online Analytical Processing) A system that consists of computer hardware, database software, and analytical tools that are optimized for analyzing and manipulating data

OLTP system

(Online Transaction Processing System) Interactive online transaction processing methods that use a "commit or rollback" strategy to ensure accurate transaction processing

PNG

(Portable Network Graphics) A type of graphics file format similar to but newer than GIF or JPEG

Request for quotation

(RFQ) A document sent by an organization to vendors requesting a formal price quotation on a list of hardware and/or software

Run-length encoding

(RLE) A graphics file compression technique that looks for patterns of bytes and replaces them with messages that describe the patterns

Repetitive stress injury

(RSI) An injury that occurs from overuse over a period of time

SIMULA

(SIMUlation LAnguage) Believed to be the first object-oriented programming language

SVG

(Scalable Vector Graphics) A graphics format designed specifically for Web display that automatically re-sizes when displayed on different screens

SSL

(Secure Sockets Layer) A security protocol that uses encryption to establish a secure connection between a computer and a Web server

SMTP

(Simple Mail Transfer Protocol) A communications protocol used to send e-mail across a network or the Internet

SDK

(Software Development Kit) A collection of language-specific programming tools

TQM

(Total Quality Management) The process by which an organization analyzes and implements ways to improve the quality of its products and/or services

TCP

(Transmission Control Protocol) The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets

Web site

A Web address that holds a collection of information identified by a common domain name, such as www.cnn.com

Computed field

A calculation that a DBMS performs during processing and then temporarily stores in a memory location

Computer science

A career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems

Computer engineering

A career that focuses on the design and development of computer hardware and peripheral devices

zombie

A computer under the control of a bad bot.

Class diagram

A diagram that provides the name of each object, a list of the object's attributes, a list of methods, and an indication of the cardinality between objects

Scheme

A dialect of LISP, used for computer research and teaching

Nonlinear editing

A digital video editing technique that requires a personal computer and video editing software

Fixed-length field

A field in a data file that has a predetermined number of characters

Data view

A mechanism typically applied to databases in which different forms or reports are displayed depending on a query, and can be customized for different categories of users

Cookie

A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user

REALbasic

A modern OO version of the BASIC programming language that works cross platform on Windows, Macs, and Linux

WebM

A multimedia container format designed for HTML5 projects

Report template

A predesigned pattern that provides the outline or general specifications for a report

Database audit

A procedure that monitors or records user activity within a database, often for security purposes

Pixel interpolation

A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged

Record occurrence

A record that has been filled with data for a particular entity

Web palette

A standard selection of colors that all Internet browsers can display; also called Web-safe palette or browser palette

Broadcast flag

A status flag inserted into the data stream of digital television to indicate whether it can be copied

Disaster recovery plan

A step-by-step plan that describes the methods used to secure equipment and data against disasters, and how to recover from disasters

3-D graphics

A type of digital graphics format that displays a three-dimensional image on a two-dimensional space

Linear editing

A video editing technique involving recording segments of video from one tape to another

strong encryption

"very difficult to break"

Ad-blocking software

A type of software that prevents ads from appearing on your computer screen

hash value

A unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.

Distributed processing

An information system design in which data is processed on multiple workstations or servers

Software

Categorized in two main categories: System software: designed for computer-centric tasks. Application software: designed to help people accomplish real-world tasks.

Input

Computer input is whatever is typed, submitted, or transmitted to a computer system.

compatible

Computers that operate the same way and use the same software.

IBM AS/400

IBM's most successful legacy minicomputer

DHCP (Dynamic Host Configuration Protocol)

IP addresses can be obtained through ___; designed to automatically distribute IP addresses; most computers are preconfigured to get an IP address by sending a query to the network device acting as the ___ server.

Problem statement

In software engineering, a concise summary of elements that must be manipulated in order to achieve a result or goal

Event

In the context of programming, an action or change in state, such as a mouse click, that requires a response from the computer

External information

Information obtained by organizations from outside sources

Software

Sets up a computer to do a specific task. When a computer "runs" a software, it performs the instructions to carry out a task.

Time shifting

The practice of recording digital content for later playback

JOIN

An SQL command that temporarily joins data from more than one table in order to allow simultaneous access to both tables

SELECT

An SQL keyword that queries for a particular record or group of records from a table

COLOSSUS

An early electronic computer prototype that used binary data representation and was used during WWII to decode messages encrypted by ENIGMA

Schickard's Calculator

An early mechanical calculator consisting of a series of gears and spokes representing numerical values

Xerox Alto

An early personal computer prototype, developed by Xerox Corp. that featured, among other things, a graphical user interface that became influential in the development of the Apple Macintosh

IBM PC

An early, commercially successful personal computer system that featured a 4.77 MHz Intel 8088 processor, 64 KB RAM, and a floppy disk drive. Ancestor to today's PCs.

Prototype

An experimental or trial version of a device or system

Online processing

An interactive method of processing transactions in which each transaction is processed as it is entered

DEC PDP-8

Built by Digital Equipment Corp. and introduced in 1965, the PDP-8 was the first commercially successful minicomputer.

Programming language

C, BASIC, COBOL, or Java. They use limited set of command words such as Print, If, Write, Display, and Get to perform sentence-like statements designed as step-by-step directives for processor chip.

system utilities

Can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

Character data

Composed of letters, symbols, and numerals that are not used in arithmetic operations.

Third-generation computers

Computers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing

Second-generation computers

Computers that use transistors for data processing and storage instead of vacuum tubes

First-generation computers

Computers that use vacuum tubes to process and store data such as UNIVAC

Windows RT

Designed as a mobile OS for tablet devices with ARM processors.

mobile operating system

Designed for devices such as smartphones and tablets. Mobile OSs support touchscreens, but tend to limit multitasking and user access to local storage devices.

demoware

Distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

Container formats

File formats, typically for storing sound and video, that contain one or more types of data that is compressed using standard codecs

metadata

File tags are a type of ____ that describes the contents of a file. This essentially means "data about data." Describe the data contained in a file.

Rendering

In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows

Subclass

In object-oriented programming, a subclass is derived from a superclass and inherits its attributes and methods

Class

In object-oriented terminology, a group with specific characteristics to which an object belongs

Inheritance

In object-oriented terminology, a method for defining new classes of objects based on the characteristics of existing classes

Always-On Connection

In the context of Internet access, a permanent connection, as opposed to a connection that is established and dropped as needed

Web page

Information displayed by a Web browser that's produced from an HTML document or generated on the fly from data in a database

Internal information

Information obtained by an organization from its own resources, such as from accounting or personnel systems

security suite

Integrates several security modules to protect against the most common types of malware, unauthorized access, and spam. Costs less than purchasing standalone security modules.

Computer Network

Is a group of computers linked together to share data and resources

file system

Keep track of the names and locations of files that reside on a storage medium, such as a hard disk. NTFS (New Technology File System).

Class hierarchy

Like a hierarchical diagram, a class hierarchy is a set of related superclasses and subclasses defined within the object-oriented paradigm

Sponsored links

Links displayed by a search engine that have paid placements

First-generation languages

Machine languages that were available for programming the earliest computers

Mac OS

Macintosh Operating System, Apple's computer systems. Uses the "dock."

Marketing channels

Marketing outlets such as retail stores or mail order for computer-related products

capacitors

Microscopic capacitors hold the bits that represent data.

Android

Mobile operating system that is a popular platform for tablet computers, smartphones, and ebook readers. It is an open source OS under the project leadership of Google. Designed for ARM processors.

consumer basics

Most operating systems include a handful of small applications and a good variety of useful utility software.

Actors

Object-oriented jargon for people who use an information system

Detail reports

Organized lists generated by a management information system (for example, an inventory list)

Output

Output is the result produced by a computer.

Help desk

Part of the Information Systems department designated to assist users experiencing problems with their computers or applications

software upgrade

Periodically, software publishers replace older versions of a software product with a new version.

Fourth-generation languages

Programming and query languages, such as SQL and RPG, that more closely resemble human languages than did third-generation languages

Third-generation languages

Programming languages, such as FORTRAN, BASIC, and COBOL, that followed assembly languages and provided English-like keywords

ASCII

Pronounced "ASK ee" is the American Standard Code for Information Interchange

EBSDIC

Pronounced "EB seh dick" is the Extended Binary-Code Decimal Interchange Code

Unicode

Pronounced "YOU ni code" uses 16-bits and provides codes for 65,000 characters. Such as to represent the many different alphabets and languages of the world.

video software

Provides a set of tools for creating video productions from raw footage. Examples: Windows Movie Maker, Apple iMovie, DVD authoring software.

Cloud Computing

Provides access to information, applications, and communications, and storage over the Internet. Local applications are being eclipsed by cloud computing, which characterizes the fourth phase of the digital revolution.

kernel

Provides essential operating system services, such as memory management and file access. The kernel stays in RAM all the time your computer is on.

relative reference (spreadsheets)

Reference that can change from B4 to B3 example, if row 3 is deleted then all the data moves up one row.

Authentication Protocol

Refers to any method that confirms a person's indentity using something the person knows, possesses, or is.

Local software

Refers to any software that is installed on a computer'a hard drive.

front side bus (FSB)

Refers to the circuitry that transports data to and from the microprocessor.

file format

Refers to the organization and layout of data that is stored in a file. The format of a file usually includes a header, data, and possibly an end-of-file marker. Example of graphical file formats: GIF, JPEG, PNG.

virus signature

Section of program code, such as a unique series of instructions, that can be used to identify a known malicious program, much as a fingerprint is used to identify an individual.

Password

Series of characters that verifies a user ID and guarantees you are the person you claim to be.

Domain name

Short for "fully qualified domain name"; an identifying name by which host computers on the Internet are familiarly known (for example, "coca-cola.com").

backup

Stores the files needed to recover data that's been wiped out by operator error, viruses, or hardware failures. Your backup schedule depends on how much data you can afford to lose. You should test your backup by trying to restore one file. The backup device you select depends on the value of your data, your current equipment, and your budget. A full system backup includes a copy of every file stored on your computer's hard drive.

Analysis phase

Tasks performed by the project team whose goal is to produce a list of requirements for a new or revised information system

random access or direct access

The ability of a device to "jump" directly to the requested data. Example: hard disk, CD, DVD, Blu-ray, and solid state drives.

APL

The acronym for A Programming Language, a high-level scientific programming language used to manipulate tables of numbers

Telecommuting

The act of using available technologies, such as computers, telephones, and the Internet, to work from home or another off-site location

Database structure

The arrangement of the fields, tables, and relationships in a database

system unit

The case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.

Data type

The characteristics of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo

user interface

The combination of hardware and software that helps people and computers communicate with each other.

Report generator

The component of a data management environment that provides a user with the ability to design reports

Web crawler

The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching

Query processor

The component of a search engine that examines keywords entered by users and fetches results that match the query

Search engine indexer

The component of a search engine that reviews the Web pages brought back by a crawler and creates pointers to them so that they can be quickly accessed

Sequential execution

The computer execution of program instructions performed in the sequence established by a programmer

FTP client

The computer or software that is used to access an FTP server and transfer files to it or from it

Offshoring

The corporate practice of relocating production, manufacturing, or customer service to lower-cost overseas locations

Outsourcing

The corporate practice of using third-party contractors to supply raw goods, manufacturing, or services

MITS Altair

The first commercial microcomputer. It was based on the Intel 8080 processor and sold primarily to computer hobbyists.

Machine Language

The list of codes for microprocessing instruction set.

Transcoding

The process of converting audio and video files from one digital format to another, such as converting an MOV file into a Flash video file

Message header

The section of an e-mail file that contains address, subject, and file attachment information

Manufacturer direct

The selling of products by hardware manufacturers directly to consumers by means of a sales force or mail order

boot process

The sequence of events that occurs between the time that you turn on a computer and the time that it is ready for your to issue commands.

Computer Program

The series of instructions that tells a computer how to carry out processing tasks.

Direct conversion

The simultaneous deactivation of an old computer system and activation of a new one

Packet loss

The situation in which data bits are lost in transit, requiring them to be resent which significantly increases the time required for an intact message to arrive at its destination

Enterprise information system

The use of one or more information systems that share data and typically provide information to hundreds or thousands of users who may be located in diverse locations

RGB color model

The use of red, green, and blue light that can be combined to create the full spectrum of colors

defragmented utility

To regain peak performance, you can use a ___ ___ such as Windows Disk Defragmenter, t rearrange the files on a disk so that they are stored in contiguous clusters.

cluster

To speed up the process of storing and retrieving data, a disk drive usually work with a group of sectors called a ___ or a block.

intergrated graphics

built into a computer's system board

RF signals

commonly called radio waves; sent and received by a transceiver which is a combination of a transmitter and a receiver that is equipped with an antenna

optical fiber cable

composed of many strands of glass tubes that are not much wider than a human hair; data signals speed through these tubes as rays of light; MANs and WANs use these to carry network signals

wireless ad-hoc protocol

devices broadcast directly to each other

storage medium (storage media for plural)

disk tape, CD, DVD, paper, or other substance that contains data

symmetric key encryption

key used to encrypt s message is also used to decrypt the message; used to encrypt stationary data such as corporate financial records and data that travels over WLANs

narrowband

less capacity, such as dial-up Internet acccess

lands

lighter, non-pitted surface areas of the disc

communications channel

or link, is a physical path or frequency for signal transmissions

network device

or network appliance, is any electronic device that broadcasts network data, boosts signals, or routes data to its destination

cryptogrpahic key

or simply key; a word, number, or phrase that must be known to encrypt a decrypt a message

encryption

transforms a message so that its contents are hidden from unauthorized readers; converting plaintext into ciphertext

DOCSIS

(Data Over Cable Service Interface Specification) A security technology used for filtering packets and maintaining customer privacy on cable Internet services

DBMS

(DataBase Management System) Application software that assists the user in manipulating, storing, and maintaining database files

Entity-relationship diagram

(ERD) A diagram that graphically depicts relationships between record types

HTML

(Hypertext Markup Language) A standardized format used to specify the layout for Web pages

HTTP

(Hypertext Transfer Protocol) The communications protocol used to transmit Web pages. HTTP:// is an identifier that appears at the beginning of Web URLs (for example, http://www.fooyong.com)

Information systems

(IS or CIS) The career field or academic major that focuses on developing computer systems and networks for businesses

Internet service provider

(ISP) A company that provides Internet access to businesses, organizations, and individuals

Information technology industry

(IT industry) Companies involved in the development, production, sales, and support of computers and software

IP

(Internet Protocol) One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.

Netiquette

(Internet etiquette) A set of guidelines for posting messages and e-mails in a civil, concise way

JPEG

(Joint Photographic Experts Group) A format that uses lossy compression to store bitmap images. JPEG (pronounced JAY-peg) files have a .jpg extension.

MPEG

(Moving Picture Experts Group) A family of highly compressed container file formats and codecs for digital multimedia; MPEG-1, MPEG-2, and MPEG-4

MIME

(Multi-purpose Internet Mail Extensions) A standard for formatting non-ASCII messages so that they can be sent over the Internet, typically as e-mail messages

Network access points

(NAP) Internet nodes that link together different network service providers so that data can be transferred from one service provider to the other

UML

(Unified Modeling Language) A tool for diagramming a set of object classes

Wireless Basics

-Wireless network technology transports data from one device to another without cables or wires -Slower than wired networks -Security concerns

Keyword

(1) A word or term used as the basis for a Web page search. (2) A command word provided by a programming language.

SQL keywords

A collection of command words that issue instructions to an SQL database

Quality assurance specialist

A computer professional who participates in alpha and beta test cycles of software. Also refers to a person who examines and tests computer chips and devices.

Computer salesperson

A computer professional who sells computers and computer-related products. Also called a sales rep.

Pop-up ad

A type of advertisement that usually appears in a separate window when you enter a Web site

laptop computer

Also referred to as a notebook computer is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.

adaptive utilities

Alter a device's user interface to create an accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text.

Secure connection

An Internet connection that encrypts data transmitted between your computer and a Web site

CREATE

An SQL command that produces a new table in a database

Transaction

An exchange between two parties that can be recorded and stored in a computer system

Webcam

An inexpensive digital camera that attaches directly to a computer and creates a video by capturing a series of still images

Business

An organization that seeks profit by providing goods and services

trojan horse (or simply Trojan)

Computer program that seems to perform one function while actually doing something else. A Trojan is not designed to spread itself to other computers and are not designed to replicate themselves. Trojans are stand alone programs that useful utilities or applications, which victims download and install unaware of their destructive nature.

Web authoring software

Computer programs for designing and developing customized Web pages that can be published electronically on the Internet

quarantined file

Contains code that is suspected of being park of virus.

automatic recalculation (spreadsheets)

Feature that ensures that the results in every cell are accurate for the information currently entered in the worksheet.

Control Unit

Fetches each instruction in a computer.

desktop computer

Fits on a desk and runs on power from an electrical wall outlet. The main component of a typical desktop computer is a system unit that houses the processor, memory, storage devices, display circuitry, and sound circuitry.

WiMAX

Fixed wireless Internet service based on Ethernet protocols with a range of 30 miles and a transmission speed of 70 Mbps

horizontal market software

Generic software that just about any kind of business can use such as payroll software, accounting software, project management software.

LED (light-emitting diode)

Gradually, CCFL backlighting technology is being replaced by low-power light-emitting diodes.

Binary Number System

Has only two digits: 0 and 1. No numeral like 2 exists in this system, so the number is represented in binary as 10 (said as "one zero")

Dictionary Attack

Helps hackers guess your password by stepping through a dictionary containing thousands of the most commonly used passwords.

Object

In an object database or OO programming language, a discrete piece of code describing a person, place, thing, event, or type of information

Photosites

In digital photography, each photosite is a single point in an image, equivalent to one pixel

Flowchart

In software engineering, a graphical representation of the way a computer should progress from one instruction to the next when it performs a task

Global update

In the context of databases, changing data in more than one record at a time, i.e., changing the due date in all the records

RAW

In the context of digital graphics, a file that contains unprocessed image data directly from a digital camera's sensors

Control structures

Instructions that specify the sequence in which a program is to be executed: sequence, selection, and repetition controls

recovery disk

Is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard disk as it existed when the computer was new.

Application Software

Is a set of computer programs that helps a person carry out a task.

System Software

Is to help the computer system monitor itself in order to function efficiently.

storage device

Mechanical apparatus that records and retrieves data from a storage medium. Includes hard disk drives, CD drives, DVD drives, Blu-ray drives, and flash drives. Data gets copied from a storage device into RAM, where it waits to be processed. Processed data is held temporarily in RAM before it is copied to a storage medium.

volatile

Most RAM is volatile, meaning it requires electrical power to hold data.

local applications

Most contain a setup program that guides you through the installation process.

money management software

Offers a variety of tools for tracking cash flow and investments.

music software

Offers many ways to work with music, sound effects, and narration from your desktop, laptop, or handheld computer such as iTunes.

Data flow

On a DFD, a line with an arrow on the end, which indicates the direction in which data flows

graphical user interface (GUI)

Provides a way to select menu options and manipulate graphical objects displayed on the screen using a mouse or gesture.

Quality of service

QoS) The level of performance that is provided by a computer system and measured by factors such as response time, downtime, and capacity

Scheduled reports

Reports such as monthly sales summaries that follow a fixed format and are produced according to a preset timetable

Access control

Security measures that limit access to systems, such as databases

Codec

Short for COmpressor/DECompressor, a hardware or software routine that compresses and decompresses digital graphics, sound, and video files

portable computer

Small, lightweight personal computer; form factors include clamshell styles and slate styles.

Apps

Software applications are sometimes referred to as "apps"

dual boot

Software called Boot Camp is a ____ ____ utility that can switch between Mac OS X or Windows. To change operating systems, you have to reboot.

Executive dashboard software

Software designed for managers that typically uses widgets to graphically display statistics relevant to business decisions

Project management software

Software specifically designed as a tool for planning, scheduling, and tracking projects and their costs

Antispyware

Software that blocks spyware from entering a computer

Inference engine

Software that can analyze and manipulate a knowledge base or expert system

Text-to-speech software

Software that generates speech based on written text that is played back through a computer's sound card

Spam filter

Software that identifies unsolicited and unwanted e-mail messages and blocks them from the recipient's Inbox

Web application (Web app)

Software that is accessed with a Web browser. They are example of cloud computing. Many are associated with consumer sites. Most require no installation at all on your local computer or handheld device.

Database server software

Software that is designed to manage a large number of records and perform many simultaneous transactions

E-mail client software

Software that is installed on a client computer and has access to e-mail servers on a network. This software is used to compose, send, and read e-mail messages.

Tracing software

Software that locates the edges of objects in a bitmap graphic and converts the resulting shape into a vector graphic

Keylogger

Software that secretly records a user's keystrokes and sends the information to a hacker.

Integrated audio

Sound card circuity that is built into the circuity of a digital device, in contrast to the use of an add-on sound card

tax preparation software

Specialized type of personal finance software designed to help you gather your annual income and expense data, identify deductions, and calculate tax payments

Gigahertz (GHz)

Specifies the speed of a microprocessor which means a billion cycles per second.

benchmarks

Test to gauge the overall speed of a microprocessor.

Smileys

Text-based symbols used to express emotion

Stored Program

That a series of instructions for a computing task can be loaded into a computer's memory. These instructions can easily be replaced by a different set of instructions when it is time for the computer to perform another task. This ability to switch programs makes computers multipurpose machines.

Microprocessor

The CPU is microprocessor, which is an electronic component that can be programmed to perform tasks based on a data it receives.

botnet

The person who control many bot infested computers can link them together into a network.

Place shifting

The practice of accessing media from a remote location, such as over a network

Video capture

The process of converting analog video signals into digital data stored on a hard drive

Strategic planning

The process of developing long-range goals and plans for an organization

Software engineering

The process of developing software using systematic mathematical, engineering, and management techniques

virus definitions

Virus signatures and other information that antivirus software uses to identify and eradicate malware is stored in one or more files.

Structured English

Vocabulary and syntax used by systems analysts to concisely and unambiguously explain the logic of a process. It is limited to words defined in a data dictionary and to specific logical terms such as IF.THEN

Ergonomics

The science of designing safe, comfortable, efficient machines and tools for human use

Loop

The section of program code that is repeated because of a repetition control structure; also called an iteration

Record type

The structure of a record, including the names, length, and data types for each field

Integration testing

The testing of completed modules of an application to ensure that they operate together correctly

Predictive methodology

The traditional approach to software development in which detailed specifications are created before coding begins

file shredder software

To delete data from a disk in such a way that no one can ever read it, you can use special file shredder software that overwrites supposedly empty sectors with random 1s and 0s. This software is handy if you plan to donate your computer to charitable organization and you want to make sure your personal data no longer remains on the hard disk. Files in the Windows Recycle Bin and similar utilities can be undeleted

HTML mail

E-mail messages that contain formatting, such as bold and italics, by turning on the HTML mail function

folder

When using Windows, Mac, or a Linux graphical file manager, each subdirectory is depicted as a folder

packet

a "parcel" of data that is sent across a computer network; every packet that travels over a network includes the address of its destination device

disk image

a bit-by-bit copy of the data from all sectors of a disk

power surge

a sudden increase in electrical energy, affecting the current that flows to electrical outlets

multithreading

allows multiple parts, or threads, to run simultaneously within a single program

slate form factor

enhanced media players, smartphones, and tablets

dedicated graphics

graphics circuitry mounted on small circuit board called a graphics card (video card)

microwaves

provide another option for transporting data wirelessly; they are electromagnetic signals

RISC

reduced instruction set computer

communications protocol

refers to a set of rules for efficiently transmitting data from one network note to another

pixel

small dots of light that form an image

personal finance software

such as Intuit Quicken, is designed to keep track of income, expenses, assets, and liabilities using a simple checkbook-like user interface

BPR

(Business Process Redesign) A technique for improving a business by making radical changes to existing business procedures or organizational structure

B2B

(Business-to-Business) An e-commerce exchange of products, services, or information between businesses

CASE tool

(Computer-Aided Software Engineering) Software that is used to summarize system requirements, diagram current and proposed information systems, schedule development tasks, prepare documentation, and develop computer programs

Domain Name System

(DNS) A large database of unique IP addresses that correspond with domain names

Decision support system

(DSS) A computer system that allows decision makers to manipulate data directly, to incorporate data from external sources, and to create data models or "what-if" scenarios

GIF

(Graphics Interchange Format) A bitmap graphics file format, popularized by CompuServe, for use on the Web

RDBMS

(Relational Database Management System) Database management software used to create, update, and administer a relational database

rules for efficiently transmitting data from one network node to another:

-Divide messages into packets -Affix addresses to packets -Initiate transmission -Regulate flow of data -Check for transmission errors -Acknowledge receipt of transmitted data

LAN advantages

-LANs enable people to work together -Sharing networked software can reduce costs -Sharing data on a LAN can increase productivity -Sharing networked hardware can reduce costs -Sharing an Internet connection can be cost-effective and convenient -Sharing networked hardware can provide access to a wide range of services and specialized peripheral devices

Private IP address

An IP address that cannot be routed over the Internet

Object-oriented paradigm

An approach to programming that focuses on the manipulation of objects rather than on the generation of procedure-based code

Runtime error

An error that occurs when a computer program is run

Alice

An object-oriented programming language designed as a teaching language that provides a drag-and-drop interface for creating animations

Encapsulation

An object-oriented technique in which the internal details of an object are "hidden" in order to simplify their use and reuse

C++

An object-oriented version of the C programming language

Apple I

An unassembled computer kit released in 1976 by Apple Computer Inc. for computer hobbyists.

Asymmestric Internet Connection

Any connection to the Internet in which the upstream speed differs from the downstream speed

Symmetric Internet connection

Any connection to the Internet in which the upstream speed is the same as the downstream speed

Analog hole

Any device or technique that allows digital content to be copied legally or illegally from an analog device

Chat

Interactive real-time person-to-person communication over a network

word size

Refers to the number of bits that a microprocessor can manipulate at one time. Example: A 64-bit processor registers and processes 64 bits at a time.

Java applet

Small programs that add processing and interactive capabilities to Web pages

Success factors

System requirements that also serve as an evaluation checklist at the end of a development project

storage density

The amount of data than can be stored in a given area of a storage medium.

Planning phase

The first phase of an information system development project with the goal of creating a Project Development Plan

Normalization

The process of analyzing data to create the most efficient database structure

Operand

For an instruction specifies the data, or the address of the data, for the operation.

Sound card

A circuit board that gives the computer the ability to accept audio input from a microphone, play sound files, and produce audio output through speakers or headphones

Memo data type

A data type that specifies that a field in a data file can contain variable-length text comments (also called memo field)

Relational database

A database structure that incorporates the use of tables that can establish relationships with other, similar tables

Source document

A file containing the HTML tags or scripts for a Web page

Flash

A file format developed by Macromedia and marketed by Adobe that has become popular for animations on Web pages

Haskell

A functional programming language. (See functional paradigm.)

Assembly language

A low-level computer programming language that uses simple commands and is translated into machine language by an assembler

Slide rule

A manual calculator invented by William Oughtred that uses John Napier's logarithms to perform complex engineering and scientific calculations

Information engineering methodology

A method of developing an information system that focuses on data the information system collects before finding ways to process that data

Structured methodology

A method of developing an information system that focuses on the processes that take place within the information system

Person-to-person payment

A method of e-commerce payment that uses an intermediary or third party such as PayPal to handle payment between a buyer and seller

Link popularity

A metric used by some search engines to rank the sites that are relevant to a query

Traceroute

A network utility that records a packet's path, the number of hops, and the time it takes for the packet to make each hop

BitTorrent

A peer-to-peer technology in which pieces of files are distributed to and from a collection of networked computers; used for distributing music and movies over the Internet

Static IP address

A permanently assigned and unique IP address, used by hosts or servers

Computer programmer

A person who designs, codes, and tests computer programs

Instant messaging

A private chat in which users can communicate with each other in real time using electronically transmitted text messages

pipelining

A processor can begin executing an instruction before it completes the previous instruction.

Server-side program

A program or scripting statement that resides on a Web server and acts as an intermediary between a user's browser and a DBMS

wireless encryption key

network security key; basis for scrambling and unscrambling the data transmitted between wireless devices; all workstations use the same key to scramble and unscramble data

PSK (pre-shared key)

personal mode; type of WPA used on most home networks

cryptogrpahic algorithm

procedure for encrypting or decrypting a message

Metropolitan Area Network (MAN)

public high-speed network with range of about 50 miles

decryption

the opposite of encryption

public folder

designed to hold files and folders that you want to share with other people on your network

node

each connection point on a network

weak encryption

easy to decrypt even without the algorithm and key; unauthorized decryptio is sometimes referred to as breaking or cracking a code

Digital camera

A camera that takes and stores a digital image instead of recording onto film

submenu

Additional set of commands that the computer displays after you make a selection from the main menu. Sometimes a submenu displays after another submenu.

CAD software

Computer Aided Design software and is a special type od 3D graphics software designed for architects and engineers who use computers to create blueprints and product specifications. Examples: AutoCAD, TurboCAD.

Instruction Set

Collections of Preprogrammed activities

Chipmakers

Companies that design and manufacture computer chips used in a wide variety of computer-related applications

Equipment manufacturers

Companies that design and manufacture computer hardware and communication products

Software publishers

Companies that produce computer software

resource fork

Companion file that stores information about the data in the data fork, such as the file type and the application that created it.

synchronization

Compares the content of files on two devices and makes them the same. Example: a program called Time Machine supplied with Mac OS X is a good example of synchronization software. Windows 8 includes a synchronization utility called File History.

Pixelated

Describes the effect of increasing the size and thus decreasing the quality of an image

file tag

Describes the file's contents.

physical storage model

Describes what happens on the disks and in the circuits. Storage media must be formatted before it can store files. The formatting process divides the disk into tracks and sectors.

network interface card (NIC)

connect to a LAN, a computer requires network circuitry

Use case

Tasks performed by an actor in an information system

Maintenance phase

The day-to-day operation of an information system, including making modifications and correcting problems to insure correct operation

Wi-Fi hotspot

The geographical area in which you can connect to a Wi-Fi signal, such as a Wi-Fi equipped campus or coffeehouse

multiprocessing

capability supports a division of labor among all the processing units

PERT

(Program Evaluation and Review Technique) A project management technique that displays interconnected events and task milestones on a timeline

Request for proposal

(RFP) A document sent by an organization to vendors to solicit proposals; it specifies the problem that needs to be solved and the requirements that must be met

Ethernet

-A wired network technology that is defined by IEEE 802.3 standards -Simultaneously broadcasts data packets to all network devices -Vary in speed from 10Mbps to 100Gbps

Wired Basic

-A wired network uses cables to connect network devices -Wired networks are fast, secure, and simple to configure -Wired connections are more secure than their wireless counterparts -Devices tethered to cables have limited mobility

Ad hoc report

A customized report (also called a demand report) generated as needed

Date data type

A data type that indicates that the data in a field represents a date

Application specifications

A detailed description of the way that the software for an information system should interface with the user, store data, process data, and format reports

Byte

A group of 8-bits

Organization

A group of people working together to accomplish a goal

Search operator

A logical search operator such as AND, OR, and NOT that helps form complex queries

product activation

A means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

Analytical Engine

A mechanical calculator designed by Charles Babbage that included memory and a programmable processor, and is widely regarded as the most important ancestor to modern computer design

Hollerith Tabulating Machine

A mechanical calculator first used in 1890 by the U.S. Census Bureau that used punch cards to store data and led to the creation of IBM.

multi-core processor

A microprocessor that contains circuitry for more than one processing.

multiuser operating system

Allows a single, centralized computer to deal with simultaneous input, output, and processing requests from many users.

Fixed Internet access

Any Internet access service designed to be used from a fixed, non-portable location, i. e., dial-up, ISDN, DSL, and cable Internet service

Computer professional

Any person whose primary occupation involves one or more aspects of computer technology

Mobile Internet access

Any service that allows subscribers to access the Internet while on the go

unzipped

As part of the installation process, this downloaded file must be reconstituted, or ____, into the original collection of files.

hard disk drive / hard disk platter

Contains one or more platters and their associate read-write heads. A platter is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.

Data Processing

Data processing is based on an input-processing-output cycle. Data goes into a computer, it is processed, and then it is output.

Data

Data refers to the symbols that represent facts, objects, and ideas.

security software

Designed to protect computers from various forms of destructive software and unauthorized intrusions.

Case sensitive

Differentiates between uppercase and lowercase.

Fixed wireless Internet service

High-speed, wide area Internet service alternative to cable and DSL that transmits data wirelessly using RF signals

Source Code

Human-readable version of a program.

Control

In the context of graphical user interfaces, a control is a screen-based object whose behavior can be specified by a programmer

Metafile

In the context of graphics, a file that contains both vector and bitmap data

Class attribute

In the context of object-oriented programming, a class attribute defines a characteristic for the members of a class. Similar to a field in a database.

Bit

One binary digit

Alpha test

One of the first phases of software testing, usually conducted by the software publisher's in-house testing team

Nonprofit organization

Organizations with political, social, or charitable goals that are not intended to generate a profit

Drawing software

Programs that are used to create vector graphics with lines, shapes, and colors, such as logos or diagrams

ROM, R, RW

ROM = read-only; R = recordable; RW = rewritable

sequential access

Reading through the data from the beginning of the tape. Old fashioned way of reading through data.

packet writing

Recording technology that lets you record in multiple sessions. Example: you can copy a few files to a CD during one session, and then at a later date record additional files to the same CD.

malicious software / malware

Refer to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

library

Similar to a folder only in the sense that it can be used to group similar files; however a library doesn't actually store files. Instead, it contains a set of links to files that are stored on various devices for systems and in various folders.

"number crunching" software

Software applications for planning and analysis such as statistical software and mathematical modeling software.

Firewall

Software or hardware designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts

Properties

The characteristics of an object in a program

Latency

The elapsed time it takes for a packet of data to arrive at its destination

Voiceband modem

The type of modem typically used to connect a computer to a telephone line

Database model

The underlying structure or category of a database, such as relational, hierarchical, network, or object

Data dependence

The undesirable situation in which data and program modules become so interrelated that modifications become difficult

Search terms

The words entered into a search engine or database to form a query

VGA, DVI, HDMI,

Video Graphics Array (VGA), Digital Visual Interface (DVI), High-Definition Multimedia Interface (HDMI) these ports are designed for audiovisual devices

file-naming conventions

You must adhere to file-naming conventions when saving files:Case sensitivity, Maximum length, Spaces allowed, Numbers allowed, Characters not allowed, File names not allowed.

wireless infrastructure protocol

a centralized broadcasting device coordinates communication among network devices

Network Discovery

a setting that affects whether your computer can see other computers on a network, and whether your computer can be seen by others

bluetooth

a short-range, wireless network technology designed to make its own connections between two devices

ciphertext

an encrypted message

router

central distribution point for getting data to its destination; network devices also include hubs, switches, gateways, bridges, wireless access points, and repeaters

plaintext

cleartext; has not yet been encrypted

office suite

collection of programs that typically include word processing, spreadsheet, presentation, and database modules.

homegroup

collection of trusted Windows computers that automatically share files and folders; access can be protected by a password

CSIC

complex instruction set computer

UPS (uninterruptible power supply)

device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage

discovery mode

devices equipped with Bluetooth capability can be set into ___ in which they are open for pairing; two devices in discovery mode can "discover" each other and exchange passkeys, one pairing is complete, the two devices can share data without exchanging passkeys again

EULA

end-user license agreement is displayed on the screen when you first install software.

circuit switching

establishes a dedicated, private link between one telephone and another for the duration of a call; this type of switching provides callers with a direct pipeline over which a stream of voice data can flow; inefficent

shared resources

hardware, software, and data made available for authorized network users to access

Systems programmer

he person responsible for installing, modifying, and troubleshooting the operating system of a mainframe or supercomputer

file management utility

helps you manage files in your operating system

broadband

high-bandwidth communication systems, such as TV and DSL; essential for networks that support many users, and those that carry lots of audio and video data, such as music and movie downloads

expansion slot

long, narrow socket on the system board into which you can plug an expansion card

differential backup

makes a backup of only those files that were added or changed since your last full backup session

incremental backup

makes a backup of the files that were added or changed since the last backup—not necessarily the files that changed from the last full backup

packet switching

more efficient than circuit switching; divides a message into several packets that can be routed independently to their destination; messages divided into equal size pickets are easier to handle than an assortment of small, medium, large, and huge files

WEP (Wired Equivalent Privacy)

original wireless encryption protocol

dot matrix printer

produce characters and graphics by using a grid of fine wires; the wires strike a ribbon and paper

Wi-Fi

refers to a set of wireless networking technologies defined by IEEE 802.11 standards

bare-mental restore

restores the computer in a single step

wireless encryption

scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key

expansion bus

segment of the data bus to which peripheral devices connect

Web

short for World Wide Web and is a collection of linked documents, graphics, and sounds that can be accessed over the Internet. During the period from 1995-2010, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications, such as Microsoft Office, Norton's Internet Security Suite, and Corel Digital Studio.

network attached storage (NAS)

storage device that directly connects to a network

bandwith

transmission capacity of a communications channel

handshaking

two computers on a network might negotiate their communications protocols

laser printer

uses the same technology as a photocopier top paint dots of light on a light-sensitive drum.

Web browser

A program that communicates with a Web server and displays Web pages

Metasearch tool

A program that performs broad-based Web searches, such as searching more than one job database at a time

Web search engine

A program that uses keywords to find information on the Internet and returns a list of links to relevant documents

Sequence control structure

A programming construct that alters the order in which instructions are executed

High-level language

A programming language that allows a programmer to write instructions using human-like language

Multiparadigm languages

A programming language that supports more than one paradigm, such as object-oriented and procedural paradigms

Programming paradigm

A programming methodology or approach, as in the object-oriented paradigm

Instantiation

A programming term that refers to the process of assigning a value to a variable

MIDI

(Musical Instrument Digital Interface) A standardized way in which sound and music are encoded and transmitted between digital devices that play music

database

A database is a collection of data. Database software helps you enter, find, organize, update, and report information stored in a database.

Distributed database

A database that is stored on different computers, on different networks, or in different locations

Prolog

A declarative programming language used to develop expert systems modeled after human thinking

C#

A derivative of C++ programming language developed by Microsoft

Cardinality

A description of the numeric relationship (one-to-one, one-to-many, or many-to-many) that exists between two record types

taskbar or dock

A desktop includes a ___ or ____ for launching applications.

Unstructured file

A file that contains data, but that is not in a structured format of fields and records

Data store

A filing cabinet, disk, or tape that holds data. On a DFD, usually represented by an open-ended rectangle.

copyright

A form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

Change requests

A formal, written request to add, delete, or change the features of an information system

Attack tree

A hierarchical diagram of potential threats to a system used as one tool in creating more secure software

Ada

A high-level programming language developed by the U.S. Department of Defense and originally intended for military applications.

Flash video

A popular video file format developed by Adobe Systems and used for Web-based video at sites such as YouTube

Test area

A portion of a computer system where software testing can occur without disrupting an organization's regular information system

P2P file sharing

A practice in which individuals can obtain music, video, and other types of files from other users on a network; sometimes the files are shared without authorization from the copyright holder

Debugger

A programming utility that helps programmers test and correct a computer program

Stateless protocol

A protocol, such as HTTP, that allows one request and response per session

Static Web publishing

A simple way to display the data in a database by converting a database report into an HTML document

Scratch

A simple-to-use visual programming language based on Smalltalk/Squeak and used to teach programming

Flat file

A single file that is the electronic version of a box of index cards, in which all records use the same record format

Media content

A term popularized in the context of multimedia that refers music, movies, television shows, and books

Mail order

A type of retailing in which a merchant takes orders by telephone or from an Internet site, then ships orders by mail or other courier service

Event-driven paradigm

An approach to programming in which a programmer creates programs that continually check for, and respond to, program events, such as mouse clicks

Defensive programming

An approach to programming that attempts to identify possible threats and proactively create code to avoid them; also called secure programming

Agile methodology

An approach to software development that produces programs in an incremental way allowing specification to evolve at each iteration

rooting

Android way of jailbreaking your device.

Anonymizer Tools

Anonymous Internet sites, such as Freenet, and anonymizer tools that cloak a person's identity, even make it possible to exercise freedom of speech in situations where reprisals might repress it.

Knowledge base

The collection of facts and rules obtained from experts that are incorporated into an expert system

root directory

The main directory is referred to as the root directory. On a a PC, the root directory is identified by the device letter followed by a backslash. Example: the root directory of the hard disk would be C:\

Internet backbone

The major communications links that form the core of the Internet

Personal Computing

The model for the second phase of the digital revolution, personal computing, is characterized by small, standalone computers powered by local software.

Unit testing

The process of testing a completed application module to make sure that it operates reliably and correctly

3D graphics software

Tools for creating wireframes that represent three-dimensional objects. 3D graphics software can cover a wireframe with surface texture and color to create a graphic of 3D object.

EEPROM (Electrically Erasable Programmable Read-Only Memory)

Type of ROM that is non-volatile but user modifiable. Has replaced non-modifiable ROMs on most modern computers.

Spyware

Type of program that secretly gathers personal information without the victim's knowledge, usually for advertising and other commercial purposes.

mapping application

Typically displays satellite, aerial, or street maps used to locate places and get directions between two addresses. Example: Google Maps.

LCD (liquid crystal display)

Display that produces an image by filtering light through a layer of liquid crystal cells.

dialog box

Displays the options associated with a command.

Use case diagram

Documentation of the users of an information system and their functions

disc mastering

Process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session. The process can take some time -- especially when burning a full DVD or BD.

software installation

Process that places a program into a computer so that it can be run or executed.

Joining tables

In SQL terminology, the act of creating a relationship between tables

Sort order

In a database table, the order in which records are stored on disk

Known information

In a problem statement, information supplied to the computer to help it solve a problem

Fact

In the context of Prolog programming, a fact is a statement incorporated into a program that provides basic information for solving a problem

Goal

In the context of Prolog programming, a query that searches for an answer based on a set of Prolog facts and rules

Assumption

In the context of programming, a condition that you accept to be true, which often places limits on the scope of the programming problem

Constant

In the context of programming, a constant represents an unchanging value. In contrast, the data held in a variable can change.

Walkthrough

In the context of programming, a method of verifying that an algorithm functions properly when using realistic test data

Central Processing Unit (CPU)

In which most of the processing takes place in is the CPU

freeware

copyrighted software that is available for free

networked peripheral

network-enabled peripheral, is any device that contains network circuitry to directly connect to a network

expansion card

small circuit boards that give the computer additional capabilities

surge strip

a device that contains electrical outlets protected by circuitry that blocks surges

MAC address

a unique number assigned to a network interface card when it is manufactured

Processing

Computers can manipulate data in many ways.

Gantt chart

A chart that depicts a project schedule by showing each task as a bar on the chart

Smalltalk

A classic object-oriented programming language

Software as a service

A cloud computing model in which consumers access applications using a browser, usually fee based

HTTP status code

A code used by Web servers to report the status of a browser's request. The HTTP status code 404 means document not found.

Web cache

A collection of Web pages and associated graphics that have been accessed and are temporarily stored locally to speed up subsequent access to them

Supercomputer

A computer falls into the supercomputer category if it is, at the time of construction, one of the fastest computers in the world.

E-mail message

A computer file containing a letter or memo that is transmitted electronically via a communications network

Mark-8

A microprocessor-based computer system, developed by Jonathan A. Titus in 1974, that helped lead to the development of personal computers.

Field name

A name that identifies the contents of a field

Variable

A named storage location that is capable of holding data, which can be modified during program execution

Ogg Theora

A non-proprietary container format (Ogg) and video codec (Theora)

location-based software

Able to access your current location and use it to show you the closest shops, restaurants, and theaters, as well as information about each location. But, stay alert for devices and software applications that track your location.

audio editing software

Also called recording or mixing software. Your OS may provide audio editing software such as Windows Sound Recorder, ProStudio, or Audacity.

Computer retailers

Also called resellers, companies that sell computer-related products

data transfer rate

Amount of data a storage device can move per second from the storage medium to the computer.

HTML forms

An HTML document containing blank boxes that prompt users to enter information that can be sent to a Web server. Commonly used for e-commerce transactions.

INSERT

An SQL keyword that adds a record to a table

DELETE

An SQL keyword that removes a record from a table

Declarative paradigm

An approach to the programming process in which a programmer writes a program by specifying a set of statements and rules that define the conditions for solving a problem

Memory

An area of a computer that temporarily holds data waiting to be processed, stored or output.

Internet forum

An asynchronous online discussion in which participants post comments to discussion threads, which can be read at a later time by other participants

Public attribute

An attribute for an object, class, or record that can be accessed from any routine in a program

Streaming audio

An audio file format that allows the audio clip to begin before the file is entirely downloaded

Windows Registry

An important group of files used by the Windows operating sytsem to store configuration information about all the devices and software installed on a computer system.

Biometrics

Fingerprint, facial recognition, retinal pattern.

setup program

Guides you through the installation process and makes the installation easy because it handles a variety of behind-the scenes technical details.

word processing software

Has replaced typewriters for producing many types of documents, including reports, letters, memos, papers, and book manuscripts. A typical word processor window displays a work area, called a workspace, that represents a blank piece of paper.

Mobile broadband

High-bandwidth wireless technology that was developed for sending digital data over cell phone systems

Internet

Is a global computer network originally developed as a military project, and was then handed over to the National Science Foundation for research and academic use.

parallel processing

Multiple instructions are executed at the same time.

pirated software

People who circumvent copyright law and illegally copy, distribute, or modify software.

Managers

People who make decisions about how an organization carries out its activities

server operating system

Provides tools for managing distributed networks, email servers, and Web hosting sites. Server operating systems typicalling route data and programs to each user's local computer where the actual processing takes place.

Intellectual Property

Refers to the ownership of certain types of information, ideas, or representations.

Instruction Cycle

Refers to the process in which a computer executes a single instruction.

Upload

Refers to the process of copying files from your client computer to a server.

file extension

Sometimes referred to as a file name extension; is an optional file identifier that is seperated from the main file name by a period. Example: paint.exe File extensions provide clues to a file's contents .exe (Windows) and .app (Mac OS). A file extension does not really define the format of a file.

system requirements

Specify the OS and minimum hardware capacities necessary for a software product to work correctly.

optical storage

Stores data as microscopic light and dark spots on the disk surface such as CD, DVD, and Blu-ray storage technologies.

magnetic storage

Stores data by magnetizing microscopic particles on the disk or tape surface.

solid state storage (flash memory)

Stores data in an erasable, rewritable circuitry, and non-volatile.

HTML conversion utility

Utility software that converts documents, spreadsheets, and databases into HTML files that can be posted on the Web

Desktop video

Videos stored in digital format on a PC's hard disk or CD

uninstall routine

Which deletes the software's files from the various folders on your computer's hard disk.

blue screen death

also called BSoD which indicates that the operating system has encountered an error which it cannot recover, and the computer no longer accepts any commands

Ethernet adapter

also called Ethernet card or NIC; a USB Ethernet adapter plugs into a USB port and can be used with a laptop and desktop computers; Ethernet card installs in an expansion slot inside the system unit of a desktop computer

Local Area Network (LAN)

connects computers in a limited geographical area

dual-band

when a router uses both frequencies; offers flexibility to support various network devices and also can over come interference on either of the bands

restore point

A snapshot of your computer settings. Restore points are essentially backups of the Windows Registry. If a hard disk problem causes system instability, you might be able to roll back to a restore point when your computer was operational.

Meta keyword

A word that is included in the header of an HTML document in order to describe the document's contents

Transaction processing system

(TPS) A system that keeps track of transactions for an organization by providing ways to collect, display, modify, and cancel transactions

TCP/IP

(Transmission Control Protocol/Internet Protocol) The primary protocol suite for transmitting messages over the Internet

TLS

(Transport Layer Security) An update of the Secure Sockets Layer (SSL) protocol for encrypting data before it is transmitted over a network

URL

(Uniform Resource Locator) The address of a Web page

Virtual private network

(VPN) A network connection that typically carries encrypted data over the Internet to and from a remote access server

VAR

(Value-Added Reseller) A company that combines one product with additional hardware, software, and/or services to create a system designed to meet the needs of specific customers or industries

VOB

(Video OBject) An industry-standard video format for standalone DVD players

VDE

(Visual Development Environment) Programming tools that allow programmers to build substantial parts of computer programs by pointing and clicking, rather than entering code

VoIP

(Voice over Internet Protocol) Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.

Blog

(WeB LOG) A publicly-accessible personal journal posted on the Web. Blogs often reflect the personality of the author and are typically updated daily

WMA

(Windows Media Audio) A file format with a .wma extension that is promoted by Microsoft and provides highly compressed audio files with very little loss of sound quality

WAP

(Wireless Access Protocol) A communications protocol that provides Internet access for handheld devices

WBS

(Work Breakdown Structure) A project management tool based on a hierarchical structure of tasks and deliverables

CCD

(charge-coupled device) One of the components in a digital camera that captures light from an image and converts it into color data

XML

(eXtensible Markup Language) A document format similar to HTML, but that allows the Web page developer to define customized tags, generally for the purpose of creating more interactivity

MTBF

(mean time between failures) An estimate of the length of time a device will perform before it fails

file management tips

*Use descriptive names, *Maintain file extensions, *Group similar files, *Organize your folders from the top down, *Consider using default folders, *Use Public folders for files you want to share, *Do not mix data files and program files, *Don't store files in the root directory, *Access files from the hard disk, *Follow copyright rules, *Delete or archive files you no longer need, *Be aware of storage locations, *Back up

Jitter

Deviations in the timing of a digital signal that can interfere with communications, especially voice over IP

DSL filter

Devices that are commonly used to prevent interference from analog devices, such as telephones, that use the same line as DSL devices

Grayscale palette

Digital images that are displayed in shades of gray, black, and white

Proprietary information

Financial and product data, procedures, or concepts created by an individual or organization that are not made public because they would aid the competition

Apple Macintosh

First released in 1984, it was one of the first commercially successful personal computers sold with graphical user interface software

VisiCalc

First released on the Apple II, VisiCalc was the first electronic spreadsheet

Real-time messaging system

Technologies, such as instant messaging and chat, that allow people to exchange messages when they are online

bootstrap loader

Tell the computer how to access the hard disk, find the operating system, and load it into RAM.

RAM (random access memory)

Temporarily holding area for data, application program instructions, and the operating system. RAM capacity is expressed in gigabytes. Personal computers typically feature between 2 GB and 8 GB of RAM. If a program exceeds its allocated space, the operating system uses an area of the hard disk, called virtual memory, to store parts of programs or data files until they are needed.

E-mail system

The collection of computers and software that works together to provide e-mail services

Computer industry

The corporations and individuals that supply computer-related goods and services to individuals and organizations

Native resolution

The dimensions of the grid that holds LEDs in a flat-screen, LCD display device; the resolution at which an LCD offers the clearest display

Whistleblowing

The disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace

Convergence

The expansion of cloud computing is due in part to convergence, a process by which several technologies with distinct functionalities evolve to form a single product. Convergence worked its magic on cell phones, computers, portable media players, digital cameras, GPS's, watches, and ebook readers. Now you get features from all of them by purchasing a single digital device.

document formatting

The final format of your document depends on several formatting factors, such as page layout, paragraph style, and font. Page layout refers to the physical position of each element on a page. Paragraph style includes the alignment of text within the margins and the space between each line of text. A font is a set of letters that share a unified design.

Acceptance testing

The final phase of testing for a new information system, in which the system's new owner determines whether the system performs as required

DOS (Disk Operating System)

The first PCs used a command-line OS called ____.

UNIVAC

The first commercially successful digital computer

de Colmar's Arithmometer

The first commercially successful, mass-produced mechanical calculator

BMP

The native bitmap graphic file format of the Microsoft Windows OS

Click-through rate

The number of times Web site visitors click an ad to connect to an advertiser's site

Sampling rate

The number of times per second a sound is measured during the recording process

WPA (Wi-Fi Protected Access)

WPA2; offers stronger protection by making sure that packets have not been intercepted or tampered with in any way

Computer engineer

A computer professional who focuses on the design and development of computer hardware and peripheral devices

Manufacturing technician

A computer professional who participates in the fabrication of computer chips, systems, and devices

Technical support specialist

A computer professional who provides phone or online help to customers of computer companies and software publishers

Computer operator

A computer professional who works directly with and maintains mainframe computers

Expert system

A computer system incorporating knowledge from human experts, and designed to analyze data and produce a recommendation or decision (also called knowledge-based system)

Information system

A computer system that collects, stores, and processes information, usually within the context of an organization

Domain name server

A computer that hosts the domain name system database

Web server

A computer that listens for queries from Web browsers and transmits HTML documents over the Internet

FTP server

A computer that stores and distributes files to remote client computers

E-mail server

A computer that uses special software to store and send e-mail messages over the Internet

file specification (path)

A computer's file location. Example on a PC C:\Music\iTunes\iTunes Media\Music\Gee.mp3

PIECES framework

A concept developed by James Wetherbe to help identify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Information, Economics, Control, Efficiency, and Service).

Buffer overflow

A condition that can be exploited by hackers in which data overflows its intended memory space to affect other variables; also called buffer overrun

Dial-up connection

A connection that uses a phone line to establish a temporary Internet connection

HTML5 canvas

A container for graphics defined by the HTML scripting language and used to create graphics and animations for Web pages

Network neutrality

A controversial proposal, it exemplifies the conundrum of government legislation in the IT industry

Ad-serving cookie

A cookie installed by a marketing firm to track user activities on Web sites containing its ads

Third-party cookie

A cookie that is generated by an ad or an entity other than the Web page that is shown in the browser

First-party cookie

A cookie that is generated by the Web page that is shown in the browser

Hyperlink data type

A data type assigned to fields that store URLs used to link directly to a Web page

Logical data type

A data type specifying that a field in a data file is used to store true/false or yes/no data

Text data type

A data type used for fixed-length fields that hold character data such as people's names or CD titles

Case sensitive database

A database in which uppercase letters are not equivalent to their lowercase counterparts

XML DBMS

A database management system that provides authoring and query tools for designing and managing collections of XML documents

Hierarchical database

A database model in which record types are arranged as a hierarchy, or tree, of child nodes that can have only one parent node

Object database

A database model that organizes data into classes of objects that can be manipulated by programmer-defined methods; also referred to as object-oriented database

Dimensional database

A database often created for data analysis that has a more complex structure than a simple two-dimensional table

Object-relational database

A database that uses object-oriented and relational concepts

Satellite modem

A device that connects a computer to a satellite for purposes of accessing the Internet

Scanner

A device that converts a printed image into a bitmap graphic

Manual calculator

A device that helps solve mathematical calculations, but does not contain sophisticated built-in algorithms

Modem

A device that modulates and demodulates a signal, typically used to send data from a computer to the Internet over telephone, cable television, or satellite networks

Digitizing tablet

A device that provides a flat surface for a paper-based drawing and a "pen" used to create hand-drawn vector drawings

card reader

A device that reads and writes data on solid state storage.

DSL modem

A device that sends and receives digital data to and from computers over telephone lines

Organizational chart

A diagram showing the hierarchy of workers in an organization

Online shopping cart

A feature of e-commerce sites that stores information about items selected for purchase often by creating a cookie on a shopper's computer

Variable-length field

A field in a data file that can expand to accept any number of characters up to a maximum limit

Primary key

A field in a database that contains data, such as a Social Security number, that is unique to a record

Sort key

A field used to arrange records in order

MP3

A file format that provides highly compressed audio files with very little loss of sound quality

Database index

A file of keys and pointers used to display a list of database records organized according to the data in one or more fields

Structured file

A file that consists of a collection of data organized as a set of similarly structured records

Web 2.0

A group of new and innovative ways to use the Web, such as for social networking, blogging, and wikis

Protocol suite

A group of protocols, such as TCP and IP, that work together

Web 3.0

A group of technologies including cloud computing that extend the ways in which the Internet and Web can be used

Phishing

A hacker poses as a legitimate representative of an official organization such as your ISP, your bank, or an online payment service in order to persuade you into disclosing highly confidential information.

Pascal

A high-level, procedural programming language developed to help computer programming students learn the structured approach to programming

Satellite Internet service

A high-speed Internet service that uses a geosynchronous or low-earth orbit satellite to send data directly to satellite dishes owned by individuals

Web portfolio

A hypertext version of a resume containing links to Web sites of former employers or schools

Markup language

A language that provides text and graphics formatting through the use of tags. Examples of markup languages include HTML, XML, and SGML.

Dot-coms

A legacy term for companies formed mainly to offer goods and services online

Mechanical calculator

A machine capable of implementing algorithms used to solve mathematical calculations

Mainframe

A mainframe computer (or simply a mainframe) is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.

Top-level domain

A major domain category into which groups of computers on the Internet are divided, such as com, edu, gov, int, mil, net, and org

Napier's Bones

A manual calculator created by John Napier that could be used to perform mathematical calculations by manipulating numbered rods

Abacus

A manual calculator that consists of beads mounted on sticks inside a frame with each bead representing a specific quantity

XHTML

A markup language very similar to HTML, but more customizable

Specific absorption rate

A measure of the amount of RF energy that is absorbed by the body; used to indicate the levels of radiation emitted by cell phones and other devices.

Leibniz Calculator

A mechanical calculator capable of performing the four arithmetic functions that helped develop the technology for the first commercially successful calculator

Difference Engine

A mechanical calculator design created by Charles Babbage that was to use steam power for fully automatic operation. It was never built.

MOV

A multimedia file format, popular for digital videos, that works with QuickTime software

Routable IP address

A network address that can be routed over the Internet; contrast to private IP address

Grid computing system

A network of computers harnessed together to perform processing tasks; distributed grids like the SETI project use ad hoc and diverse Internet connected computers; also see cloud computing

Pseudocode

A notational system for algorithms that combines English and a programming language

Real data type

A numeric data type used for fields that contain numbers with decimal places

Integer data type

A numeric data type used for fields that contain whole numbers

Decision model

A numerical representation of a realistic situation, such as a cash flow model of a business

solid state drive (SSD)

A package of flash memory that can be used as a substitute for a hard disk drive.

Technical writer

A person who specializes in writing explanations of technical concepts and procedures

Database administrator

A person who supervises database design, development, testing, and maintenance

External entity

A person, organization, or device that exists outside an information system, but provides it with input or receives output. On a DFD, usually represented by a square.

Apple Lisa

A personal computer system, developed and manufactured by Apple Computer Inc., that featured one of the first graphical user interfaces.

HTML document

A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser

Project Development Plan

A planning document that is the final result of a planning phase and is reviewed and approved by management

Java

A platform-independent, object-oriented, high-level programming language based on C++, typically used to produce interactive Web applications

SQL

A popular query language used by mainframes and microcomputers

Semi-structured problem

A problem for which a general procedure has been established, but which requires some degree of discretionary judgment to arrive at a solution

Structured problem

A problem for which there exists a well-established procedure for obtaining the best solution

Unstructured problem

A problem for which there is no established procedure for arriving at a solution

Commit or rollback strategy

A procedure in transaction processing systems that will nullify, or roll back, a transaction if all the steps cannot be finalized, or committed to

Batch processing

A processing system that involves holding a group of transactions for processing until the end of a specified period of time

Program editor

A programming tool, similar to a word processor, but that provides specialized editing and formatting features to streamline the programming process

query language

A query language such as SQL (Structured Query Language) provides a set of commands for locating and manipulating data. Example: natural language query, keyword search, query by example.

Decision query

A question or set of instructions that describes the data that needs to be gathered to make a decision

Bitrate

A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files

Compression ratio

A ratio such as 5:1 that indicates the ratio of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.

Many-to-many relationship

A relationship in which one record in a particular record type can be related to more than one record in another record type, and vice versa

One-to-many relationship

A relationship in which one record in a particular type may be related to more than one record of another record type

System Requirements Report

A report generated at the conclusion of the analysis phase of the SDLC by a project team that has studied a system and determined the system requirements

Summary report

A report generated by a management information system that combines or groups data and usually provides totals, such as a report of total annual sales for the past five years

Exception report

A report generated by a management information system, listing information that is outside normal or acceptable ranges, such as a reorder report showing low-stock inventory items

Wireframe

A representation of a 3-D object using separate lines, which resemble wire, to create a model

subdirectory

A root directory can be subdivided into smaller lists.

Logic error

A run-time error in the logic or design of a computer program

Metasearch engine

A search engine that searches other search engines

Subroutine

A section of code that performs activities or manipulates data but is not included in the main sequential execution path of a program

disk partition

A section of hard disk drive that is treated as a separate storage unit. Partitions can be assigned drive letters. Partitions are not the same as folders.

System palette

A selection of colors that are used by an operating system to display graphic elements

E-mail attachment

A separate file that is transmitted along with an e-mail message

DVD image

A series of files containing the data needed for a video DVD. The image is typically stored on a hard disk for testing before the image is transferred or "burned" to the DVD.

Digital video

A series of still frames stored sequentially in digital format by assigning values to each pixel in a frame

Anonymous proxy service

A server on the Internet that can be used to forward Web requests after cloaking the originating address for users who want to surf anonymously

E-mail account

A service that provides users with an e-mail address and a mailbox

User privileges

A set of assigned rights that specify what data is accessible to a particular user on a network or on a database

Code of ethics

A set of guidelines designed to help professionals make on-the-job ethical decisions

Programming language

A set of keywords and grammar (syntax) that allows a programmer to write instructions that a computer can execute

Machine code

A set of machine language instructions for a program.

backup software

A set of utility programs designed to back up and restore some or all of the files on a computer's primary storage device. A backup made by copying all the files to a backup device is called a full backup.

Tweet

A short message, sometimes called a microblog, posted on Twitter

Channel conflict

A situation in which computer vendors, from retail, wholesale, or mail-order channels, compete for customers

Web bug

A small graphic on a Web page that installs cookies designed to track your online activities. Also known as a Clear GIF.

software update

A small section of program code that replaces part of the software you currently have installed. Many software applications allow you to set your preferences for how you would like to receive notifications and updates. It is always a good idea to install updates and service packs when they become available.

Gradient

A smooth blending of shades of different colors, from light to dark

Information technology

(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data.

Table

(1) An arrangement of data in a grid of rows and columns. (2) In a relational database, a collection of record types with their data

Parameters

(1) In the context of SQL, the specifications used to delineate a command by specifying a table or search keyword (2) In the context of programming, a keyword or variable used to specify variations of commands

System requirements

(1) The minimum hardware and operating system specifications required necessary for a software application to operate correctly. (2) Criteria for developing a successful information system, which are typically compiled into a Systems Requirements Report at the conclusion of the analysis phase of the SDLC.

B2C

(Business-to-Consumer) An e-commerce exchange of products, services, or information between businesses and consumers

DSL

(Digital Subscriber Line) A high-speed Internet connection that uses existing telephone lines, requiring close proximity to a switching station

Executive information system

(EIS) A special type of a decision support system that is designed to provide senior managers with information relevant to strategic management activities

EDI

(Electronic Data Interchange) The ability to transfer data between different companies using networks that enable companies to buy, sell, and trade information

ENIAC

(Electronic Numerical Integrator and Computer) An early electronic computer prototype that was designed for the U.S. Army for calculating trajectories and was completed in 1945.

EAI

(Enterprise Application Integration) The use of networked software and databases for providing unrestricted sharing of data in an organization

ERP

(Enterprise Resource Planning) A system of business management that integrates all resources of a business, including planning, manufacturing, sales, and marketing

HDCP

(High-bandwidth Digital Content Protection) A form of copy protection designed to prevent digital content from being transmitted over a DVI interface to a non-complying display device

IDE

(Integrated Development Environment) A set of programming tools, typically including editor, compiler, and debugger, packaged into an application for creating programs

ICANN

(Internet Corporation for Assigned Names and Numbers) A global organization that coordinates the management of the Internet's domain name system, IP addresses, and protocol parameters

IMAP

(Internet Messaging Access Protocol) A protocol similar to POP that is used to retrieve e-mail messages from an e-mail server, but offers additional features, such as choosing which e-mails to download from the server

Ping

(Packet INternet Groper) A command on a TCP/IP network that sends a test packet to a specified IP address and waits for a reply

System development life cycle

(SDLC) The series of phases that outlines the development process of an information system

POP3

(Post Office Protocol 3) A standard for retrieving e-mail messages from an e-mail server

Router Installation

-Look for a Wireless-N router that includes a Gigabit Ethernet switch -Wired and wireless connections -Make sure the number of Ethernet ports is sufficient for the number of wired devices that you intend to connect -Before using your network, you should adjust the router's configuration settings to make sure your network is secure -Stored in router's EEPROM -You must connect a computer to the router -You can use your computer's browser to access the router configuration utility -An SSID (service set identifier) is the name of a wireless network -Use the router configuration software to change the default SSID -Each workstation requires a unique address for sending and receiving data

Wi-Fi Security

-Networks with wired or wireless connections are vulnerable to a variety of threats -Wireless signals are broadcast through the air; and like the signals from a radio station, they can be picked up by any device equipped with a receiver tuned to the right frequency -Your network router maintains a list of clients that are accessing your network using wired or wireless connections

LAN disadvantages

-One disadvantage of LANs is that when a network malfunctions, all the resources you're accustomed to accessing are unavailable until the network is repaired -LANs are vulnerable to unauthorized access -LANs are vulnerable to malicious code

Router Configuration

-Plug in the router -Connect the router to a computer -Configure the router -Access the router setup utility -Create a new router password -Enter an SSID for the network -Activate WEP, WPA, or PSK and create an encryption key -Connect an Internet access device -Set up the wireless workstations

Device Connection

-Simply turn on any Windows computer with wireless capability and make sure that it is in range of your router -Macs automatically sense available networks and give you the option of connecting to them -Any device that has Wi-Fi capability should be able to connect to your network

Internet Connection

-Your Internet service provider supplies a device called a modem that is designed to carry data to and from the Internet -This device typically has a standard Ethernet port that can be connected to a router -Most routers supply a WAN port designed for an Internet connection -Plug a standard network cable into the router's WAN port and connect the other end of the cable into the Internet modem

file sharing

-allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored -Once your network gives you access to other computers on the network, you can view a list of files stored there -when you activate file sharing, files in Public folders can be accessed by other network users -You also can make specific files shareable

octet

.an IP address such as 204.127.129.1 is separated into 4 sections by periods for the convenience of human readers; each section is called ___ because in binary it is represented by eight bits

Contract worker

A computer professional who does not work directly for one company and often is paid by the job instead of a salary

Monochrome bitmap

A bitmap image that contains only the colors black and white

Predictive analytics

A branch of data mining that focuses on predicting future probabilities and trends using statistical algorithms, neural networks, and optimization research

Private Browsing

A browser feature that allows users to surf the Web without accumulating a trail of cookies

Big data

A collection of data contained in one or more databases that is so large it requires specialized data management tools and techniques

Data warehouse

A collection of information organized for analysis

Database

A collection of information that might be stored in more than one file or in more than one record type

Network database

A collection of physically linked records in a one-to-many relationship in which a member (child) can have more than one owner (parent)

True Color bitmap

A color image with a color depth of 24 bits or 32 bits. Each pixel in a True Color image can be displayed using any of 16.7 million different colors.

SQL query

A command created using SQL database client software that operates directly on the record in a database

Socket

A communication path between two remote programs

Cable modem

A communications device that can be used to connect a computer to the Internet via the cable TV infrastructure

Synchronous communications

A communications mode, such as VoIP, in which participants must be online at the same time

Asynchronous communications

A communications mode, such as forums, e-mail, blogs, and tweets, in which participating parties do not have to be online at the same time

IT service companies

A company that focuses on providing computer and network connections, repair, support, or other services to companies and consumers

Market share

A company's share, or percentage, of the total market

Decision support worksheet

A comparison table used by a project team to evaluate solutions by assigning a score and a weight to each criterion

C

A compiled procedural language that provides both high-level commands and low-level access to hardware

Turnkey system

A complete information system that consists of both hardware and commercial software

Apple II

A complete microcomputer system, developed by Apple Computer Inc. and introduced in 1978 that helped broaden the personal computer market beyond hobbyists.

Repetition control structure

A component of a computer program that repeats one or more instructions until a certain condition is met (also called loop or iteration)

Selection control structure

A component of a computer program that tells a computer what to do, depending on whether a condition is true or false (also called decision structure or branch)

Threat modeling

A component of defensive programming that helps programmers identify ways in which their programs might be compromised; also called risk analysis

Lossless compression

A compression technique that is able to reconstitute all of the data in the original file; hence "lossless" means that this compression technique does not lose data

File

A computer file, usually referred to simply as a file, is named collection of data that exists on a storage medium such as a hard disk, CD, DVD, or flash drive.

Computer

A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.

Transistors

A computer processing technology created by Bell Laboratories in 1947, characterizing second-generation computers, which replaced vacuum tubes for data processing

Systems analyst

A computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems

Security specialist

A computer professional who analyzes security threats, implements solutions, and develops policies and procedures to protect computer equipment and data

Web site designer

A computer professional who creates, tests, posts, and modifies HTML documents and other data for a Web site

native file format

A software application can open files that exist in its native file format, plus several other file formats. Example: Microsoft Word opens files in its native .docx as well as HTML (.htm or .html), Text (.txt), and Rich Text Format (.rtf)

Plug-in

A software module that adds a specific feature to a system. In the context of browsers, a plug-in adds the ability to display or play various additional file formats.

Expert system shell

A software tool used for developing expert system applications

Data center

A specialized facility designed to house and protect computer systems and data

Field format

A specification for the way that data is displayed on the screen and printouts, usually using a series of Xs to indicate characters and 9s to indicate numbers

Field validation rule

A specification that a database designer sets up to filter the data entered into a particular field

Integrated Circuit (IC)

A super-thin slice of semiconducting material packed with microscopic circuit elements.

Process

A systematic series of actions that a computer performs to manipulate data; typically represented on a DFD by a rounded rectangle

Decision table

A tabular method for listing rules and specifying the outcomes for various combinations of rules

Ray tracing

A technique by which light and shadows are added to a 3-D image

Quality-of-service metric

A technique for measuring a particular quality-of-service characteristic, such as response time

Fuzzy logic

A technique used by an expert system to deal with imprecise data by incorporating the probability that the input information is correct

Store-and-forward

A technology used by communications networks in which an e-mail message is temporarily held in storage on a server until it is requested by a client computer

Dynamic IP address

A temporarily assigned IP address usually provided by an ISP

Digital Divide

A term that refers to the gap between people who have access to technology and those who do not.

Beta test

A testing phase near the end of the software development process in which a software product is tested in real-world computer environments, often by end users

microprocessor clock

A timing device that sets the pace for executing instructions.

Sequence diagram

A tool used by a project team that depicts the detailed interactions that take place within an information system

Anonymous FTP

A type of FTP access that requires no account on a server, but rather can be accessed using "anonymous" as the user ID

Cable Internet service

A type of Internet connection offered to subscribers by cable television companies

Banner ad

A type of advertisement typically embedded at the top of a Web page

File compression utility

A type of data compression software that shrinks one or more files into a single file occupying less storage space than the files did separately

Neural network

A type of expert system that uses computer circuitry to simulate the way in which the brain processes information, learns, and remembers

Phased conversion

A type of information system conversion in which one module of a new information system is activated at a time

Pilot conversion

A type of system conversion in which a new information system is first activated at one branch of a multi-branch company

Parallel conversion

A type of system conversion in which the old computer system remains in service while some or all of the new system is activated

Phoneme

A unit of sound that is a basic component of words and is produced by speech synthesizers

File Explorer

A utility program bundles with the Windows operating system and designed to help you organize and manipulate the files stored on your computer. File Explorer helps you manipulate files and folders in the following ways: Rename, Copy, Move, Delete. Windows offers a set of preconfigured personal folders, such as My Documents and My Music, for storing your personal data files.

Lookup routine

A validation process used by database designers to prevent data entry errors by searching for an entry such as a state abbreviation in a file or database table

home computer system

A vast array of computer configurations designed to accommodate consumers who use computers for personal tasks. Some of the most cutting-edge computers are designed for gaming. Computers marketed for small business applications tend to be middle-of-the-line models pared down to essentials.

Videogame Console

A videogame console, such as Nintendo's Wii, Sony's PlayStation, or Microsoft's Xbox, is not generally referred to as personal computer because of their history as dedicated game devices.

Form design grid

A visual programming tool that allows programmers to drag and drop controls to form the user interface for a program

desktop

A visual work area that covers the entire screen and remains in the background throughout a computing sesion.

Dynamic Web publishing

A way of displaying data from a database as customized Web pages, which are generated as the page is sent to the browser

Hypertext

A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another

Feature creep

An undesirable occurrence during information system development when users, customers, or designers attempt to add features after the final specifications have been approved

Keyword stuffing

An unpopular practice of including a huge variety of keywords in the header of

Analog Data

Analog data is represented using an infinite scale of values

Data mining

Analyzing data to discover patterns and relationships that are important to decision making

virtual machine

Allow you to use one computer to simulate the hardware and software of another. Each virtual machine has its own simulated processor (or core processor), RAM, video card, input and output ports, and OS. Each machine can run most software that's compatible with the virtual OS platform. Popular virtual machine software such as VMware and Parallels Desktop can run on most computers with Intel microprocessors, including Intel Macs, PCs, and generic Linux computers

Address space randomization

Also referred to as address space layout randomization (ASLR); A computer security technique in which program data is arranged in RAM according to an unpredictable arrangement, making it more difficult for hackers to locate key data and change it

Hypertext link

Also referred to simply as a "link," an underlined word or phrase on a Web page that, when clicked, takes you to a designated URL

ribbon

Alternative type of menu that is arranged as rows of tools on a succession of tabs. Microsoft pioneered the ribbon interface element, which was incorporated in the last several editions of Microsoft Office.

Streaming video

An Internet video technology that sends a small segment of a video file to a user's computer and begins to play it while the next segment is being sent

UPDATE

An SQL keyword used to alter the values in a database record

Algorithm

An abstract or general procedure for solving a problem, typically expressed as pseudocode, structured English, or a flowchart

Hover ad

An advertisement, created using interactive Web tools such as DHTML, that appears on top of Web pages sometimes obscuring parts of them

Procedural paradigm

An approach to programming in which a programmer defines the steps for solving a problem

Object-oriented methodology

An approach to system development that regards the elements of a system as a collection of objects that interact with each other to accomplish tasks

One-to-one relationship

An association between database entities in which one record type is related to one record of another type

Private attribute

An attribute for an object, class, or record that can be accessed only from the program routine in which it is defined

WAV

An audio file format with .wav extension that was Windows' original "native" sound format

Webmail

An e-mail system that allows users to access e-mail messages using a browser

Local e-mail

An e-mail system that requires users to install e-mail client software on their computer hard disk or flash drive; Messages are held on a server until the client software downloads them to the local computer

Harvard Mark I

An early computer prototype also known as the ASCC (Automatic Sequence Controlled Calculator) developed by IBM that used decimal data representation rather than binary

Z3

An early electronic computer prototype designed by Konrad Zuse that was the first to incorporate the use of binary numbers for data representation

Pascaline

An early mechanical calculator capable of performing addition, subtraction, division, and multiplication

IBM 360

An early third-generation computer that is widely regarded as the first general purpose mainframe

RCA Spectra 70

An early third-generation computer that was among the first to use integrated circuits for data processing

IBM PC XT

An early, commercially successful personal computer system that included a hard disk drive

Vacuum tube

An electronic device that controls the flow of electrons in a vacuum and represents binary data; used in the construction of first generation computers

Syntax error

An error that results when an instruction does not follow the syntax rules, or grammar, of the programming language

Visual Basic

An event-driven programming environment in which the programmer uses forms to lay out the screen components of a program; components are defined by properties and Basic program code

DNS cache poisoning

An exploit in which the DNS database is changed in such as way that a URL no longer connects to the correct Web site

Phishing

An exploit that attempts to trick consumers into revealing private information, such as account numbers, credit card numbers, and passwords

Pharming

An exploit that redirects users to fake Web sites

Port probe

An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port scan

E-mail address

An identifier that includes a user name, @ symbol, and e-mail server, used to route e-mail messages to their destination

Vector graphic

An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn

Bitmap graphic

An image, such as a digital photo, that is stored as a grid work of colored dots

Centralized processing

An information system design in which data is processed on a centrally located computer, usually a mainframe

Ogg Vorbis

An open source audio file format

Dart

An open source programming language created by Google for developing Web apps as a successor to JavaScript

Workstation

An ordinary personal computer that is connected to a network OR A powerful desktop computer used for high-performance tasks.

Mission

An organization's goal or plan, which is reflected by the organization's activities

Remote Access Trojan (RAT)

Another type of Trojan that has back door capabilities that allow remote hackers to transmit files to victims' computers, search for data, run programs, and use a victims's computer as a relay station for breaking into other computers.

Lossy compression

Any data compression technique in which some of the data is sacrificed to obtain more compression

Copy protected

Any digital rights management technology designed to prevent duplication of digital content; also referred to as copy prevention or copy restriction

Procedural language

Any programming language used to create programs composed of a series of statements that tell the computer how to perform a specific task

Client

Any software or digital device, such as a computer, that requests data from a server.

bot

Any software that can automate a task or autonomously execute a task when a commanded to do so.

Image compression

Any technique that is used to reduce the size of a file that holds a graphic

Portable Internet access

Any type of Internet service, such as portable satellite, that can be moved from one place to another

jailbreak

Apps are available from other sources, but using them requires an unauthorized change to the device's software. After downloading and installing the jailbreak software, your device will be able to install apps from a variety of sources other than the iTunes App Store. The jailbreak lasts until you accept a software update from Apple and these updates can wipe the jailbreak software, forcing you to re-install it.

Social Media

Are cloud based applications designed for social interactions and consumers generated content. They include wikis (Wikipedia), blogging (Tumblr, Twitter), social networking services (Facebook, Google +), photo sharing (Instagram).

Synthesized sound

Artificially created sound, usually found in MIDI music or synthesized speech

fragmented files

As a computer writes on a disk, parts of files tend to become scattered all over the disk. These ___ ___ are stored in noncontiguous clusters.

Second-generation languages

Assembly languages that followed machine languages

restore

Backups allow you to restore data from a backup to the original storage location or to a replacement device.

Buying A Computer

Browse through computer magazines and online computer stores to get a general idea of features and prices. Decide on a budget and stick to it. Make a list of the ways you plan to use your computer. Select a platform. Decide on a form factor. Select peripherals, software, and accessories.

bootstrap program

Built into special ROM circuitry housed in the computer's system unit. When you turn on a computer the ROM circuitry power receives power and begins the boot process by executing the bootstrap program.

Fourth-generation computers

Computers, such as today's personal computer, servers, and mainframes, that use a general purpose microprocessor for data processing

Compiler

Converts all the statements in a program in a single batch, and the resulting collection of instructions, called object code, is placed in a new file.

shareware

Copyrighted software marketed under a try-before-you-buy policy. Typically includes license that permits you to use the software for a trial period.

desktop publishing software

DTP software takes word processing to the next level by providing professional tools for producing typeset-quality documents. DTP software is available in consumer-level and professional-level versions. DTP software allows you to create a page using multiple frames; some frames can hold text, while other frames can hold titles, graphics, and tables. Today's word processing software typically provides an adequate feature set for the document production needs of most individuals.

single-user operating system

Deals with one set of input devices those that can be controlled by one user at a time, such as OS for tablets and smartphones.

User documentation

Descriptions of how to interact with an information system or program, including instructions on use, features, and troubleshooting

System documentation

Descriptions of the features, hardware architecture, and programming of an information system written for programmers, designers, and analysts who maintain the system

peripheral device

Designates input, output, and storage equipment that might be added to a computer system to enhance its functionality.

mobile app

Designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player. Most handheld devices can use both Web apps and mobile apps. Mobile apps can be purchased from an app store such as Apple App Store or Android Market.

desktop operating system

Designed for desktop or laptop personal computer. The computer you use at home, school, or at work is most likely configured with a desktop operating system, such as Microsoft Windows or Mac OS. Today's desktop operating systems invariably provide multitasking capabilities so that users can run more one application at a time.

vertical market software

Designed to automate specialized tasks in a specific market or business. Examples: hospital patient management and billing software, construction industry job estimating software, student record management.

graphics software

Designed to help you create, manipulate, and print graphics. Examples: Paint software, Photo editing software, Drawing software, 3-D graphics software, CAD software.

utility software

Designed to help you monitor and configure settings for your digital gear, its operating system, or application software. Third-party software companies offer additional products that extend and improve upon those supplied by the operating system. A PDF reader, such as Adobe Reader, is an essential utility that displays documents stored in standard PDF files.

GPL (General Public License)

Developed for a free OS called GNU. The GPL is slightly more restrictive that the BSD license because it requires derivative works to be licensed.

Globalization

Digital technology is an important factor in global and national economies, in addition to affecting the economic status of individual. Globalization can be defined as the worldwide economic interdependent of countries that occurs as cross border commerce increases and as money flows more freely among countries.

MIDI sequence

Digitally encoded MIDI music stored on a digital device, such as a computer or MIDI instrument

Linux distribution

Download that contains the Linux kernel, system utilities, graphical user interface, applications, and an installation routine. Beginner-friendly Linux distributions include Fedora, Mint, Debian, openSUSE, and Ubuntu.

application windows

Launched applications are displayed here on the desktop which can be resized and repositioned.

Fifth-generation languages

Either declarative languages, such as Prolog, or programming languages that allow programmers to use graphical or visual tools to construct programs

Radiation

Energy that is emitted in the form of waves or particles; all digital devices emit radiation; some types of radiation are considered safer than others

directory

Every storage device has a ____ containing a life of its files.

Remarks

Explanatory comments inserted into lines of code in a computer program

Resolution dependent

Graphics, such as bitmaps, in which the quality of the image is dependent on the number of pixels comprising the image

tablet / smartphone backup

Handheld devices are usually backed up by synching them to a desktop or laptop computer. Synching is usually initiated by tethering your handheld device to a full-size computer using a USB cable. iPhones, iPods, and iPads synch with iTunes software, and you have the option to encrypt the backup to prevent your data from exposure if your computer falls victim to an unauthorized intrusion. Many Android devices include backup software, usually accessible from the Settings icon.

Handheld Devices

Handheld digital devices include familiar gadgets such as iPhones, iPads, iPods, Garmin GPSs, Droids, and Kindles. These devices incorporate many computer characteristics. Handheld devices can be divided into two broad categories: those that allow users to install software applications (apps) and those that do not.

System Board

Houses all the essential chips and provides connecting circuitry between them. The electronic components of most digital devices are mounted on a circuit board called a system board, motherboard, or main board.

UNIX

Operating system was developed in 1969 at AT&T's Bell Labs. Dependable in multiuser environments.

command-line interface

Originally computers had a ____ that required users to type memorized commands to run programs and accomplish tasks.

Workers

People who perform the tasks necessary to carry out an organization's mission

Superclass

In object-oriented programming, a superclass can provide attributes and methods for subclasses

Rule

In the context of Prolog programming, a rule is a general statement about the relationship between facts

Argument

In the context of Prolog programming, an argument describes a predicate and is enclosed in parentheses in a Prolog fact

Communications port

In the context of computer networking, a virtual location for data that arrives or leaves the device; common ports include 21 for FTP, 110 for e-mail, and 80 for Web data

Iteration

In the context of computer programming, a section of code that is repeated; also called a loop

Procedure

In the context of computer programming, a section of code that performs activities but is not included in the main sequential execution path of a program

Code

In the context of computer programming, code can be used as a noun to refer to the set of instructions that form a program, or as a verb that refers to the process of writing a program

Intrusion

In the context of computer security, the unauthorized access to a computer system

Record

In the context of database management, a record is the fields of data that pertain to a single entity in a database

Dimension

In the context of databases, a dimension is a layer that consists of one or more fields; used to structure and query dimensional databases

Relationship

In the context of databases, an association between entities that can be used to link records in more than one file

Method

In the context of object-oriented programming, any action that an object can perform

Message

In the context of object-oriented programming, input that is collected and sent to an object

Polymorphism

In the context of object-oriented programming, the ability to redefine a method for a subclass. Also called overloading.

Syntax

In the context of programming languages, syntax refers to the grammar rules that create valid program statements

Personal Computer

Is a microprocessor based computing device designed to meet the computing needs of an individual.

Blackberry OS

Is a proprietary operating system produced by RIM. Key feature is the ability to work with corporate e-mail software systems produced by Microsoft and IBM.

boot disk

Is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk.

User ID

Is a series of characters-letters and possibly numbers or special symbols- that becomes a person's unique identifier such as a Social Security number. Also referred to as user name, login, screen name, etc.

Microcontroller

Is a special-purpose microprocessor that is built into the machine it controls. Microcontrollers can be embedded in all sorts of everyday devices.

Extended ASCII

Is a superset of ASCII that uses 8-bits to represent each character.

recovery partition

Is located on the computer's hard disk and contains the necessary files to restore a computer to its original state.

ALU (arithmetic logic unit)

Is part of the microprocessor that performs arithmetic operations, such as add or subtract. It also performs logical operations, such as comparing two numbers to see if they are the same. The ALU uses registers to hold data that is being processed.

Digital Data

Is text, numbers, graphics, sound, and video that has been converted into discrete digits such as 0s and 1s.

Storage

Is the area where data can be left on a permanent basis when it is not immediately needed for processing.

access time

Is the average time is takes a computer to locate data on the storage medium and read it.

executable file (.exe for PC or app for Mac)

Main component of a software package that is designed to be started by users or automatically launched by the OS.

open source software

Makes uncompiled program instructions-the source code- available to programmers who want to modify and improve the software.

Formal methods

Mathematically-based techniques for specifying and developing reliable and robust software or hardware

read-write head

Mechanism in the disk drive magnetizes particles to write data, and senses the particles polarities to read data.

Digital content

Media content that is stored in digital format

Digital audio

Music or voice that has been digitized into files using sampling techniques; sometimes referred to as waveform audio

Network Troubleshoothing

Network problems can stem from a variety of sources: -Cables -Security -Interference -Settings -Switches -Signal strength -Network devices

absolute reference (spreadsheets)

Never changes when you insert rows, or copy or move formulas.

public domain software

Not Protected by copyright because the copyright has expired, or the author has placed the program in the public domain, making it available without restriction. May be freely copied, distributed, and even resold. Cannot apply for a copyright on it.

JavaScript

Not to be confused with Java, JavaScript is an interpreted language most commonly used for client-side Web scripting

Professional ethics

On-the-job actions and choices that reflect a person's values

serial processing

One instruction at a time; the processor must complete all steps in the instruction cycle before it begins to execute the next instruction.

Megapixel

One million pixels; expresses the resolution and quality of an image; usually used in reference to digital cameras

Linux

Operating system distributed along with its source code under the terms of a GPL (General Public License). A Linux distribution is a download that contains the Linux kernel, system utilities, graphical user interface, applications, and an installation routine.

iOS

Operating system for the Apple iPhone, which launched in 2007. Used for the iPod Touch and iPad. All iOS devices use ARM-based microprocessors.

start screen

Popular on handheld devices, appears at the end of the boot process whenever it is invoked by the user, commonly by pressing the Home button. Start screen display icons or tiles for apps, so that you can select the one you want to use.

portable software

Portable software is designed to run from removable storage, such as a CD or USB flash drive. Installation is simply a matter of getting program files to the media on which they are supposed to run.

USB flash drive

Portable storage device that plugs directly into a computer's system unit using a built-in connector.

Component

Prewritten objects or modules that programmers can customize and add to their own programs

Compute-Intensive

Problem is one that requires massive amounts of data to be processed using complex mathematical calculations.

Download

Process of copying a file from a server to your own client computer.

Open Source

Promote copying, free distribution, peer review, and user modification. Examples are Linux, Firefox Web browser, LibreOffice Suite, and Thunderbird email.

Application development tool

Software, such as 4GLs, expert system shells, and component objects, that can be assembled into the applications software for an information system

Password manager

Sometimes called a keychain; stores user IDs with their corresponding passwords and automatically fills in login forms.

push technology

RIM pioneered push technology, in which notifications are automatically sent to a device.

rootkit

Refers to software tools used to conceal malware and backdoors that have been installed on a victim's computer.

Data Representation

Refers to the form in which data is stored, processed, and transmitted.

Data redundancy

Repetition of data within a database

proprietary software

Restrictions on its use that delineated by copyright patents, or license agreements. Some ____ is distributed commercially, whereas some is free.

overclocking

Technique for increasing the speed of a computer component, such as a processor, graphics card, system board, or memory. Can increase the processing power of a slow component to match that of a faster, more expensive component.

Audio compression

Techniques used to reduce the size of files that contain audio data

Client-side script

Scripting statements embedded in an HTML document that are executed by a client's browser

Server-side script

Scripting statements that are executed by a Web server in response to client data

file header

Section of data at the beginning of a file that contains information about a file, such as the date it was created, the date it was last updated, its size, and its file type.

computer worm

Self-replicating program designed to carry out some unauthorized activity on a victim's computer. Worms can spread themselves from one computer to another without any assistance from victims.

Semiconducting materials

Semiconductors; such as silicon and germanium, are substances with properties between those of a conductor (such as copper) and insulator (such as wood).

computer virus

Set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.Viruses can replicate themselves only on the host computer. Viruses can lurk in a computer for days, or months while replicating themselves; you might not even know that your computer has contracted a virus. Therefore it is easy to inadvertently spread infected files to other people's computers.

Web

Short for World Wide Web. An Internet service that links documents and information from computers located worldwide, using the HTTP protocol

E-commerce

Short for electronic commerce, it is the business of buying and selling products online

op code

Short for operation code, is a command word for an operation such as add, compare, or jump.

Tactical planning

Short- or near-term decisions and goals that deploy the human, financial, and natural resources necessary to meet strategic goals

data fork

Similar to files in other operating systems. It contains data, such as the text for a document, the graphics for a photo, or the commands for a program.

icon or tile

Small picture that represents a program, file, or hardware device. Some icons are designed as tiles, which can display information feeds of live data.

Break reminder software

Software designed to signal users when it is time to take a break in order to avoid various repetitive-use and stress injuries

Database client software

Software that allows any remote computer or network workstation to access data in a database

Wiki

Software that allows users to collaborate to create, change, and link Web pages. Used for applications such as Wikipedia and open source project management

device driver

Software that helps a peripheral device establish communication with a computer. Used by: printers, monitors, graphics cards, sound cards, network cards, modems, storage devices, mice, and scanners. On a Mac, you can click the Apple icon, select About this Mac, and then select More info to look at a list of devices connected to your computer. On a PC, if you need to update a device driver or change its settings, you can usually view driver information by accessing the Control Panel and selecting System (or System and Security).

Mission statement

The written expression of an organization's goals and how those goals will be accomplished

Procedure handbook

Step-by-step instructions for performing a specific job or task

logical storage models

Storage metaphors help you visualize and mentally organize the files on your disks and other storage devices.

presentation software

Supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a computer screen or projector.

Design phase

The process a project team uses for figuring out how to implement a new system. This phase is undertaken after the analysis phase is complete.

Speech synthesis

The process by which computers produce sound that resembles spoken words

Speech recognition

The process by which computers recognize voice patterns and words, then convert them to digital data

Digitization

The process of converting text, numbers, sound, photos, and video, into data that can processed by digital devices. The digital revolution has evolved through four phases, beginning with big, expensive, standalone computers, and progressing to today's digital world in which small, inexpensive digital devices are everywhere.

Digital audio extraction

The process of copying files from an audio CD and converting them into a format that can be stored and access from a computer storage device, such as a hard disk; sometimes referred to as ripping

Knowledge engineering

The process of designing rules, entering them into an expert system, and testing them

Computer programming

The process of designing, coding, and testing computer programs

System testing

The process of testing an information system to ensure that all the hardware and software components work together

Application testing

The process of testing newly developed application software by running unit tests, integration tests, and system tests

Persistent HTTP connection

The process of using the same TCP connection to handle multiple HTTP requests, such as for obtaining the text and then the graphics for a Web page; contrast to stateless protocol

Event-handling code

The program segment that instructs the computer how to react to events, such as mouse clicks

Upstream speed

The rate at which data is transmitted from your home computer to the Internet

Downstream speed

The rate at which transmitted data flows from a host or server to a local computer (contrast with upstream speed)

Aspect ratio

The relative width and height of the video frame; widescreen is 16:9 and fullscreen is 4:3.

Operational planning

The scheduling and monitoring of workers and processes

Color palette

The selection of colors used in a graphic; also called color lookup table or color map

Data independence

The separation of data from the programs that manipulate the data

Field

The smallest meaningful unit of information contained in a data file

HTML5

The version of HTML that was in the final stages of the approval process as of 2012

file location

To designate a file's location, you must first specify the device where the file is stored. The main hard disk usually is referred to as drive C. Macs do not use drive letters.

Digital-to-analog converter

Transforms digital bits into analog waves when you play an audio file

ROM (read-only memory)

Type of memory circuitry that that is housed in a single integrated circuit. Permanent and non-volatile. Contains a small set of instructions and data called the bootstrap loader, sometimes referred to as the BIOS, which tells the computer how to access the hard disk, find the operating system, and load it into RAM.

operating system (OS)

Type of system software that acts as the master controller for all activities that take place within a computer system. Examples: Microsoft Windows, Mac OS, Linux, iOS, Android.

antivirus software

Type of utility software that looks for and eradicates viruses, Trojan horses, worms, and bots.

file copies

Unique files are difficult to reproduce. Manually copying and pasting requires you to select the files and destination device each time.

Spam

Unsolicited e-mail typically sent as a bulk or mass-mailing and often used for fraudulent or deceptive marketing

reserved words

Used as commands or special identifiers. You cannot use these alone as a file name.

Brute Force

Uses password-cracking software, but its range is much more extensive than the dictionary attack.

spreadsheet

Uses rows and columns of numbers to create a model or representation of a real solution. A formula tells the computer how to use the contents of cells in calculations.

zipped

Usually all the files needed for the new software are ____ to consolidate them into one large file.

service pack

Usually applies to OS updates, is a set of updates.

virus hoax

Usually arrives as an email message containing dire warnings about a supposedly new virus on the loose.

commercial software

Usually sold in retail stores or at Web sites. Although you buy this software, you actually purchase only the right to use it under the terms of the software license.

Identity Theft

When someone gains unauthorized access to your personal data and uses it illegally.

Sniffling

Which intercepts information sent out over computer networks.

Operating System (OS)

Which is essentially the master controller for all the activities that take place within a computer.

word processing features

Word Wrap, Search and Replace, Thesaurus, Grammar checker, Readability formula, Spelling checker, Spelling dictionary

expansion port

any connector that passes data into and out of computer or peripheral device

safe mode

You computer uses a limited version of the OS that allows you to use your mouse, screen, and keyboard, but no other peripheral devices. Can be used to track down and uninstall programs or hardware that might be causing operational problems.

file server

a computer whose primary purpose is to be repository for files that can be accessed by network workstations; example: an old desktop computer to store lots of big video files

IP address

a series of numbers used to identify a network device

Wide Area Network (WAN)

covers a large geographical area and typically consists of several smaller networks

pairing

creates a persistent link between two devices, usually through the exchange of an authentication code called a passkey

MIMO (multiple-input multiple-output)

devices with one or more antennas technology to boost signals and spread them more evenly over the signal range; routers usually have 1-4 antennas and more antennas generally mean more coverage area and good speed even as devices get farther from the router

public key encryption (PKE)

eliminates key distribution problem, by using one key to encrypt a message and another key to decrypt the message; when personal computer users want to encrypt email or other documents, they turn to public key encryption software such as PGP (Pretty Good Privacy), GnuPG, or AxCrypt

ink jet printer

has a nozzle-like print head that sprays ink onto paper

Personal Area Network (PAN)

interconnection of personal digital devices or consumer electronics

dot pitch

measure of image clarity; smaller dot pitch is crisper image

Megahertz (MHz)

million cycles per second

data bus

moves data between RAM and the microprocessor

SSID (service set identifier)

name of a wireless network

color depth

number of colors a monitor can display

Wi-Fi adapter

plugs into a USB port or an internal expansion slot

multitasking

provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

AES (Advanced Encryption Standard)

technology used for WPA2; one of the strongest cryptographic algorithms; encryption methods can be broken by the use of expensive, specialized, code-breaking computers


Set pelajaran terkait

Stress Management Chapter 1 Quiz

View Set

Health alcohol and substance abuse

View Set

CH 9: The Nurse-Patient Relationship

View Set