Computing Essentials 2017 Chapters 1-13
DIMM (dual in-line memory module)
An expansion module used to add memory to the system board.
mouse
An input device that controls a pointer that is displayed on the monitor.
A process by which a program is divide into two modules called objects.
(OOP) Objected- oriented programming
Unicode
A 16-bit code designed to support international languages, like Chinese and Japanese.
Shading
A background color or pattern that can be applied to text, tables, or graphics.
enterprise storage system
An organizational strategy to promote efficient and safe use of data across the networks.
general-purpose application
A browser is an example of a:
The ______ mobile operating system was introduced in 2007 and is now owned by Google.
Android
Clip Art
A collection of graphic images that can be inserted into documents, presentations, web pages, and spreadsheets; simple drawings that are included as collections with many software packages.
Monitor
A computer device that presents visual images of text and graphics. (See also display screen)
all-in-one
A desktop computer that has the monitor and system unit housed together in the same case (e.g., Apple's iMac).
tower computer
A desktop system unit placed vertically.
network gateway
A device that allows one LAN to be linked to other LANs or to larger networks.
card reader
A device that interprets the encoded information contained on credit, debit, access, and identification cards.
printer
A device that translates information that has been processed by the system unit and presents the information on paper.
input
Any data or instructions that are used by a computer.
output device
Any hardware used to provide or to create output.
wearable
Apple's Watch is what type of computer?
Format Painter
A feature used to copy the format settings applied to the selected text to other text you want to format the same way.
artificial intelligence (AI)
A field of computer science that attempts to develop computer systems that can mimic or simulate human thought processes and actions.
cache memory
Area of random-access memory (RAM) set aside to store the most frequently accessed information. Cache memory improves processing by acting as a temporary high-speed holding area between memory and the CPU, allowing the computer to detect which information in RAM is most frequently used.
dot pitch
A function of a monitor that is the distance between each pixel. (See also pixel pitch)
Inline Graphic
A graphic that is part of a line of text.
Floating Graphic
A graphic to which text wrapping has been applied, making the graphic independent of text and able to be moved anywhere on the page.
Slot
Area on a system board that accepts expansion cards to expand a computer system's capabilities.
coaxial
A high-frequency transmission cable that delivers television signals as well as connects computers in a network
Ethernet port
A high-speed networking port that allows multiple computers to be connected for sharing files or for high-speed Internet access.
Fifth-generation languages (5GLs) incorporate the concepts of which of the following?
Artificial intelligence.
These second-generation languages use abbreviations or mnemonics that are automatically converted to the appropriate sequence of 1s and 0s.
Assembly
toggle key
A key that turns a feature on or off.
combination key
A key, that when held down in combination with another key, performs an action.
Clip Organizer
A library of art, pictures, sounds, video clips, and animations that all Office applications share.
Tab Leader
A line that appears in front of tabbed text.
Borders
A line that can be added above, below, or to the sides of a paragraph, text, or table cell.
Tab Stop
A location on the horizontal ruler that indicates where to align text.
character encoding standards
Assign unique sequence of bits to each character.
magnetic-card reader
A machine that reads encoded information stored on a thin magnetic strip located on the back of a card.
Indent Maker
A marker on the horizontal ruler that shows the indent settings for the active paragraph.
resolution
A matrix of pixels.
Clip
A media file, such as a graphic, photograph, sound, movie, or animation, that can be inserted into a document.
optical mouse
A mouse that emits and senses light to detect mouse movement.
Style
A named collection of character and paragraph formats that are stored together and can be applied to text to format it quickly.
These tools are also called computer-aided software engineering (CASE) tools. They are used in system analysis to evaluate alternative hardware and software solutions. A. Project management tools B. Automated design tools C. Spreadsheets D. Report generator
Automated design tools
multicore chip
A new type of chip that provides two independent CPUs, allowing two programs to run simultaneously. Also see central processing unit.
organic light organic light- emitting diode(OLED)
A newer technology that has the benefits of lower power consumption and longer battery life as well as thinner displays.
stylus
A pen-like device commonly used with tablet PCs and PDAs.
technical writer
A person who prepares instruction manuals, technical reports, and other scientific or technical documents.
Mini DisplayPort (MiniDP, mDP)
A port that an audiovisual device typically uses to connect large monitors. These ports are used with many Apple Macintosh computers.
external Serial Advanced Technology Attachment (eSATA)
A port that provides very high speed connections for external hard-disk drives, optical disks, and other large secondary storage devices.
This lists the assets, liabilities, and the equity of an organization.
Balance sheet
window
A rectangular area that can contain a document, program, or message
carpal tunnel syndrome
A repetitive strain injury consisting of damage to the nerves and tendons in the hands.
pixel
A series of dots that form images on a monitor. (See also picture elements)
bluetooth
A short-range radio communication standard that transmits data over short distances of up to approximately 33 feet
Bullet
A small graphic symbol used to identify an item in a list.
Notebook
A small, portable system unit that contains electronic components, selected secondary storage devices, and input devices.
musical instrument digital interface (MIDI)
A standard that allows musical instruments to connect to the system using MIDI ports.
Desktop
A system unit that typically contains the system's electronic components and selected secondary storage devices. Input and output devices, such as the mouse, keyboard, and monitor, are located outside the system unit.
liquid crystal display (LCD)
A thin, flat display made up of any number of color or monochrome pixels arrayed in front of a light source or reflector.
Chip
A tiny circuit board etched on a small square of sandlike material called silicon. A chip is also called a silicon chip, semiconductor, or integrated circuit.
Smartphone
A type of cell phone that offers a variety of advanced functionality, including Internet and e-mail.
Left Indent
A type of indent in which the left edge of a paragraph is moved in from the left margin.
Hanging Indent
A type of indent in which the second and following lines of a paragraph are indented more than the first.
ergonomic keyboard
A type of keyboard designed specifically to alleviate wrist strain associated with the repetitive movements of typing.
Tablet
A type of microcomputer that contains a thin system unit, most of which is the monitor. The best-known tablets are Apple's iPad, Motorola's Zoom, and HP's Slate.
Netbook
A type of microcomputer that is smaller, lighter, and less expensive than a notebook computer.
flat-panel monitor
A type of monitor that is much thinner and requires less power to operate than CRTs.
DVI (Digital Video Interface) Port
A type of port that provides a connection to a digital monitor.
VGA (Video Graphic Adapter) port
A type of port that provides a connection to an analog monitor.
dot-matrix printer
A type of printer that forms characters and images using a series of small pins on a print head.
ink-jet printer
A type of printer that sprays ink at high speed onto the surface of paper.
laser printer
A type of printer that uses a laser light beam to produce images with excellent letter and graphics quality.
Font
A typeface or design of a set of characters (letters, numbers, symbols, and punctuation marks).
Point
A unit of measurement for text characters and the space between paragraphs and characters; 1/72 of an inch.
optical scanner
Accepts documents consisting of text and/or images and converts them to machine-readable form.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
Binary coding scheme that is a standard for minicomputers and mainframe computers.
ASCII (American Standard Code for Information Interchange)
Binary coding scheme widely used on all computers, including microcomputers. Eight bits form each byte, and each byte represents one character.
Justify
Alignment in which an item is flush with both the right and left margins.
Right-Align
Alignment in which the item is flush with the left margin.
Left-Align
Alignment in which the the item is flush with the left margin.
Bus
All communication travels along a common connecting cable called a bus or a backbone. As information passes along the bus, it is examined by each device on the system board to see if the information is intended for that device. See bus line and ethernet.
wireless network card
Allows computers to be connected without cables.
Motherboard
Also called a system board; the communications medium for the entire system.
clock speed
Also called clock rate. It is measured in gigahertz, or billions of beats per second. The faster the clock speed, the faster the computer can process information and execute instructions.
Utility suites
BitDefender Norton Utilities ZoneAlarm
topologies
Bus, ring, star, tree, and mesh are five types of network:
Which of the following refers to tools that are used to provide some assistance in designing, coding, and testing software?
CASE
PC card slot
Also known as Personal Computer Memory Card International Association (PCMCIA) card slot. Credit card-sized expansion cards developed for portable computers.
PC card
Also known as Personal Computer Memory Card International Association (PCMCIA) card. Credit card- sized expansion cards developed for portable computers.
Network Interface Card (NIC)
Also known as a network adapter card. They are used to connect a computer to one or more computers forming a communication network whereby users can share data, programs, and hardware.
mainframe
Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.
Center
An alignment in which an item is centered between the margins.
A list of questions helps guide the systems analyst and end user through key issues for the present system.
Checklist
universal serial bus (USB)
Combines with a PCI bus on the system board to support several external devices without inserting cards for each device. USB buses are used to support high-speed scanners, printers, and video capturing devices.
logical operation
Comparing two pieces of data to see whether one is equal to (=), less than (<), or greater than (>) the other.
crackers
Computer criminals who create and distribute malicious programs.
Digital
Computers are digital machines because they can only understand 1s and 0s. It is either on or off. For example, a digital watch states the exact time on the face, whereas an analog watch has the second hand moving in constant motion as it tells the time.
Port
Connecting socket on the outside of the system unit. Used to connect input and output devices to the system unit.
expansion bus
Connects the CPU to slots on the system board. There are different types of expansion buses such as industry standard architecture (ISA), peripheral component interconnect (PCI), accelerated graphics port (AGP), universal serial bus (USB), and FireWire buses. See system bus.
network adapter card
Connects the system unit to a cable that connects to other devices on the network.
This type of language uses symbols, words, and phrases that instruct a computer how to structure information for display or processing.
Content-markup
Analog
Continuous signals that vary to represent different tones, pitches, and volume.
keyboard
Convert numbers, letters, and special characters that people understand into electrical signals.
scanning devices
Convert scanned text and images into a form that the system unit can process.
An interpreter ________.
Converts and runs the procedural language one statement at a time into machine code.
A compiler ________.
Converts the source code into machine language code.
Cable
Cords used to connect input and output devices to the system unit.
digital versatile disc
DVD stands for:
Which of the following tools present data or information flow within an information system? A. Grid chart B. Decision table C. System flowchart D. Data flow diagram
Data flow diagram
This system is a flexible tool for data analysis, since its reports do not have a fixed format.
Decision support system
A(n) _____ shows the decision rules that apply when certain conditions occur.
Decision table
Which of the following is used to show the rules that apply to a decision when one or more conditions apply? A. System flowchart B. Decision table C. Grid chart D. Checklist
Decision table
graphics coprocessor
Designed to handle requirements related to displaying and manipulating 2-D and 3-D graphic images.
power supply unit
Desktop computers have a power supply unit located within the system unit that plugs into a standard wall outlet, converting AC to DC, which becomes the power to drive all of the system unit components.
A program associated with a device that works with the operating system to allow communication between the device and the rest of the computer system.
Device driver
sound card
Device that accepts audio input from a microphone and converts it into a form that can be processed by the computer. Also converts internal electronic signals to audio signals so they can be heard from external speakers.
graphics card
Device that provides high-quality 3-D graphics and animation for games and simulations.
Problems arising in this approach would spell disaster. A. Direct approach B. Parallel approach C. Phased approach D. Pilot approach
Direct approach
The goal of the _______ utility program is to locate and eliminate unnecessary fragments and rearrange files and unused disk space.
Disk Defragmenter
Bit
Each 1 or 0 is a bit; short for binary digit.
bus line
Electronic data roadway, along which bits travel, connects the parts of the CPU to each other and links the CPU with other important hardware. The common connecting cable in a bus network.
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
Exception
Which system presents information in a highly summarized form?
Executive support system (ESS)
Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.
Executive support systems (ESS)
universal serial bus (USB) port
Expected to replace serial and parallel ports. They are faster, and one USB port can be used to connect several devices to the system unit.
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?
Expert system
A purchase order form pertains to the payroll department.
False
An MIS differs from a TPS in that it creates databases.
False
In case of an unanticipated union strike, the manager in charge of manufacturing might consult the management information system to determine how it will affect production schedules.
False
The executive support system can analyze the effects of events and trends outside the organization.
False
The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output.
False
The marketing department identifies, investigates, and develops new products and services.
False
The research department strictly involves itself only with the creation of finished goods that are tangible.
False
There are three basic decision models used in GDSS: operational, strategic, and financial.
False
virtual memory
Feature of an operating system that increases the amount of memory available to run programs. With large programs, parts are stored on a secondary device like your hard disk. Then each part is read in RAM only when needed.
The ______ utility program makes a copy of files to help protect you from the effects of a disk failure.
File History
system board
Flat board that usually contains the CPU and memory chips connecting all system components to one another.
Font Effect
Font formatting that applies a special effect to text such as small caps or superscript.
Text Wrapping
Formatting applied to a graphic to make it a floating graphic.
Bold
Formatting applied to text to make it thicker and darker.
Italic
Formatting applied to text to make the characters slant to the right.
Text Effect
Formatting that applies a visual effect to text, such as shadow, glow, outline, or reflection.
Character Spacing
Formatting that changes the width or scale of characters, expands or condenses the amount of space between characters, raises or lowers characters, relative to the line of text, and adjusts kerning.
arithmetic operation
Fundamental math operations: addition, subtraction, multiplication, and division.
In the preliminary investigation phase of the systems life cycle, which one of the following tasks would NOT be included? A. Briefly defining the problem B. Suggesting alternative solutions C. Gathering the data D. Preparing a short report
Gathering the data
________ control is the ability to control operations with finger movements, such as swiping, sliding, and pinching.
Gesture
A(n) _____ shows the relationship between input and output documents.
Grid
input device
Hardware used to translate words, sounds, images, and actions that people understand into a form that the system unit can process.
_______ is an operating system feature that provide(s) online assistance for operating system functions and procedures.
Help
refresh rate
How often a displayed image is updated or redrawn on a monitor.
What documentation shows the income, expenses, and difference between them for a company during a specific time period?
Income statements
RFID (radio-frequency identification) tag
Information chips that are embedded in merchandise to track their location.
joystick
Input device for computer games.
This typically consists of transactions from the transaction processing system.
Internal data
home networks
LAN that allows different computers to share resources, including a common internet connection
_______ convert programming instructions into a language that the computer can process.
Language translators
This is an example of the _______ operating system, which is a powerful alternative to Windows.
Linux
These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.
Machine
As much as 75 percent of the total lifetime cost for an application program is spent on this.
Maintenance
Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers?
Management information system (MIS)
Monitoring system performance is an example of how the operating system ________.
Manages resources
Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?
Marketing
density
Measures how tightly the magnetic charges can be packed next to one another on the disk.
Memory
Memory is contained on chips connected to the system board and is a holding area for data instructions and information (processed data waiting to be output to secondary storage). RAM, ROM, and CMOS are three types of memory chips.
This level of management is involved with tactical planning and implementing the long-term goals within an organization.
Middle management
Who uses management information systems?
Middle-level managers
grayscale
Most common black ink selection in which images are displayed in many shades of gray.
Mac OS X ________ was released in 2012 and designed for desktops and laptops. The functionality is similar to Windows 8.
Mountain Lion
_______ is the ability of the operating system to switch between different applications stored in memory.
Multitasking
_______ operating systems are used to control and coordinate computers that are linked together.
Network
PCI Express (PCIe)
New type of bus that is 30 times faster than PCI bus.
AC adapter
Notebook computers use AC adapters that are typically outside the system unit. They plug into a standard wall outlet, convert AC to DC, provide power to drive the system components, and can recharge batteries.
binary system
Numbering system in which all numbers consist of only two digits: 0 and 1.
This type of software development focuses less on the procedures and more on defining the relationships between previously defined procedures
Object-oriented software development
These systems are used in managing documents, communicating, and scheduling.
Office automation systems
mouse pointer
Often in the form of an arrow, it moves on the screen as the user moves the computer mouse.
expansion slot
Openings on a system board. Users can insert optional devices, known as expansion cards, into these slots, allowing users to expand their systems. See expansion card.
FireWire bus
Operates much like USB buses on the system board but at higher speeds.
______ coordinate computer responses, provide an interface between users and the computer, and run applications.
Operating Systems
Windows utilities
Optimize Drives Disk Cleanup File History
expansion card
Optional device that plugs into a slot inside the system unit to expand the computers' abilities. Ports on the system board allow cables to be connected from the expansion board to devices outside the system unit.
system unit
Part of a microcomputer that contains the CPU. Also known as the system cabinet or chassis, it is the container that houses most of the electronic components that make up the computer system.
This implementation approach is preferred when there are many people in an organization performing similar operations. A. Direct B. Parallel C. Phased D. Pilot
Pilot
High Definition Multimedia Interface (HDMI)
Port that provides high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.
optical audio connections
Port used to integrate computers into high-end audio and home theatre systems.
In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system
Prepares a preliminary investigation report
These third-generation languages are designed to express the logic that can solve general problems
Procedural
output
Processed data or information.
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
Production
desktop publishing
Program that allows you to mix text and graphics to create publications of professional quality.
Lower- level lang. are closer to 0s and 1s. Higher-level lang. are closer to the languages of humans.
Programming language generations
presentation graphics
Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
trojan horses
Programs that come into a computer system disguised as something else are called:
operating systems
Programs that coordinate computer resources, provide an interface, and run applications are known as:
spreadsheets
Programs that organize, analyze, and graph numerical data such as budgets and financial reports.
flash memory
RAM chips that retain data even when power is disrupted. Flash memory is an example of solid-state storage and is typically used to store digitized images and record MP3 files.
memory
RAM is a type of:
primary storage
RAM is sometimes referred to as:
digital video camera
Record motion digitally on a disk or in the camera's memory.
read-only memory (ROM)
Refers to chips that have programs built into them at the factory. The user cannot change the contents of such chips. The CPU can read or retrieve the programs on the chips but cannot write or change information. ROM stores programs that boot the computer, for example. Also called firmware.
robot
Robots are computer-controlled machines that mimic the motor activities of living things, and some robots can solve unstructured problems using artificial intelligence.
control unit
Section of the CPU that tells the rest of the computer how to carry out program instructions.
PCMCIA slot
See PC card slot.
Processor
See central processing unit.
GPU (graphics processing unit)
See graphics coprocessor.
main board
See motherboard or system board.
Laptop
See notebook computer and notebook system unit.
Sony/Philips Digital Interconnect Format (S/PDIF)
See optical audio connection.
integrated circuit
See silicon chip.
system chassis
See system unit.
Plug and Play
Set of hardware and software standards developed to create operating systems, processing units, expansion cards, and other devices that are able to configure themselves. When the computer starts up, it will search for the Plug and Play device and automatically configure it to the system.
Semiconductor
Silicon chip through which electricity flows with some resistance.
Handheld
Smallest type of system unit, designed to fit into the palm of one hand.
Socket
Sockets provide connection points on the system board for holding electronic parts.
NIC
Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
firewall
Special hardware and software used to control access to a corporation's private network is known as a(n):
computer technician
Specialist who installs hardware and software and troubleshoots problems for users.
interactive whiteboard
Specialized devices with a large display connected to a computer or projector (see also digital whiteboard)
digital whiteboard
Specialized devices with a large display connected to a computer or projector (see also interactive whiteboard)
mass storage devices
Specialized high-capacity secondary storage devices designed to meet organizational demands.
Coprocessor
Specialized processing chip designed to improve specific computer operations, such as the graphics coprocessor.
_______ operating systems control a single desktop or laptop computer.
Stand-alone
Boot
Starting or restarting your computer.
Who is responsible for operational matters and monitoring day-to-day events?
Supervisors
A collection of activities and elements organized to accomplish a goal. a.Program b.Information c.System d.Data
System
______ software would control where a word processing program is stored in memory.
System software
A professional who specializes in analyzing and designing business systems is called a(n) ____. a. systems analyst b. project manager c. individual systems developer d. programmer a. Systems Analyst
Systems Analyst
Gathering and analyzing data is part of this phase. a.Systems analysis b.Systems implementation c.Preliminary investigation d.Systems design
Systems analysis
This individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them. A. Network administrator B. Cryptographer C. Systems analyst D. Computer enginee
Systems analyst
Programming is part of which phase of the systems life cycle?
Systems development
During which phase of the systems life cycle are users trained to use the new system? A. Preliminary investigation B. Systems implementation C. Systems development D. Systems maintenanc
Systems implementation
Identify the sixth phase of the systems life cycle. A. Systems maintenance B. Systems development C. Systems design D. Systems analys
Systems maintenance
Which of the following phases of the systems life cycle is considered as the "ongoing process"? A. Systems development B. Systems analysis C. Systems design D. Systems maintenance
Systems maintenance
This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.
Tactical model
ExpressCard
Technology replacing the PC Card to provide a direct connection to the system bus. Also see PC card.
Line Spacing
The amount of space between lines of text.
Paragraph Spacing
The amount of space between paragraphs.
Microprocessor
The central processing unit (CPU) of a microcomputer controls and manipulates data to produce information. The microprocessor is contained on a single integrated circuit chip and is the brains of the system.
online identity
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:
hardware
The keyboard, mouse, display, and system unit are:
Internet
The largest network in the world is [the]:
carrier package
The material that chips are mounted on which then plugs into sockets on the system board.
dots-per-inch (dpi)
The measurement of printer resolution, the more dots-per-inch the better the quality of the image printed.
cathode-ray tube (CRT) monitor
The most common type of monitor that are typically placed directly on the system unit or on the desktop.
Word
The number of bits (such as 16, 32, or 64) that can be accessed at one time by the CPU.
bus width
The number of bits traveling simultaneously down a bus is the bus width.
arithmetic-logic unit (ALU)
The part of the CPU that performs arithmetic and logical operations.
central processing unit (CPU)
The part of the computer that holds data and program instructions for processing the data. The CPU consists of the control unit and the arithmetic-logic unit. In a microcomputer, the CPU is on a single electronic component called a microprocessor chip.
Font Size
The size of characters measured in points.
Kerning
The space between standard combinations of letters.
Indent
The space between the edge of a line of text or a paragraph and the margin.
BIOS (basic input/output system)
The start-up instructions for a computer, including the specifics concerning the amount of RAM and the type of keyboard, mouse, and secondary storage devices connected to the system unit.
Which among the following would not be described in the systems analysis report? A. The current information system B. The requirements for a new system C. The development schedule D. The training requirements for users
The training requirements for users
telephony
The transmission of telephone calls over computer networks.
document
The type of file created by word processors, for example, memos, term papers, and letters.
system bus
There are two categories of buses. One is the system bus that connects the CPU to the system board. The other is the expansion bus that connects the CPU to slots on the system board.
disk caching
This hard-disk performance enhancement anticipates data needs
communication channel
This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.
system
This type of software works with end users, application software, and computer hardware to handle the majority of technical details
silicon chip
Tiny circuit board etched on a small square of sandlike material called silicon. Chips are mounted on carrier packages, which then plug into sockets on the system board.
This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.
Top management
On a hard disk a _______ is a concentric ring.
Track
________ systems help supervisors by generating databases that act as the foundation for other information systems.
Transaction processing
handwriting recognition software
Translates handwritten notes into a form that the system unit can process.
Highlighting
Transparent color that can be applied to a text to draw attention to it.
Accounts payable refers to money the company owes its suppliers for materials and services it has received.
True
CAD/CAM systems use powerful personal computers running special programs that integrate the design and manufacturing activities.
True
Customer profiles, census data, and economic forecasts are examples of external data.
True
Demand reports do not have to be produced on a regular basis.
True
Expert systems capture the knowledge of human experts and store it in a knowledge base.
True
Knowledge workers use specialized information systems, called KWSs, to create information in their area of expertise.
True
Middle-level managers are responsible for tactical planning and the implementation of long-term goals.
True
Office automation systems are designed primarily to support data workers.
True
Supervisors' responsibilities include operational matters.
True
The executive support system helps top-level managers oversee the company's operations and develop strategic plans.
True
The research department identifies, investigates, and develops new products and services.
True
Top-level managers need information both from within the organization and from outside.
True
hotspots
Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities.
flash drives
USB drives are also known as:
Byte
Unit consisting of eight bits. There are 256 possible bit combinations in a byte and each byte represents one character.
secondary
Unlike memory, this type of storage holds data and programs even after electric power to the computer system has been turned off.
parallel processing
Used by supercomputers to run large and complex programs.
FireWire port
Used to connect high-speed printers, and even video cameras, to system unit.
hexadecimal system (hex)
Uses 16 digits to represent binary numbers.
voice recognition system
Uses a microphone, a sound card, and special software to allow users to operate computers and to create documents using voice commands.
cloud computing
Uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet.
_______ perform specific tasks related to managing computer resources.
Utilities
What could you use if you wanted to run two or more applications each requiring a different operating system?
Virtualization
random-access memory (RAM)
Volatile, temporary storage that holds the program and data the CPU is presently processing. It is called temporary storage because its contents will be lost if electrical power to the computer is disrupted or the computer is turned off.
legacy port
Was common on microcomputer systems to connect specific types of devices. They have largely been replaced by faster, more flexible ports such as the universal serial bus (USB).
game port
Were used to connect video game controllers and joysticks.
crash
When a read-write head makes contact with the hard disk's surface, it causes a head:
The operating system feature which is a rectangular area for displaying information and running programs.
Window
_______ is the most popular desktop operating system.
Windows
Versions of Windows
Windows 8 Windows 7
The ______mobile operating system was originally developed in 2012 by Microsoft to support a variety of portable devices, including smartphones.
Windows Phone 8
Database
a collection of related data. It is the electronic equivalent of a file cabinet
software suite
a collection of separate application programs bundled together and made available as a group.
computer network
a communication system that connects two or more computers so that they can exchange information and share resources
Network administrator
a computer specialist responsible for efficient network operations and implementation of new networks
system unit
a container that houses most of the electronic components that make up a computer system
network gateway
a device that allows one LAN to be linked to other LANs or connected to the LAN of another office group
coaxial cable
a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core
copyright
a legal concept that gives content creators the right to control use and distribution of their work
Bandwidth
a measurement of the width or capacity of the communication channel
WiMax (Worldwide Interoperability for Microwave Access)
a new standard that extends the range of Wi-Fi networks using microwave connections
Router
a node that forwards or routes data packets from one network to their destination in another network
client
a node that requests and uses resources available from other nodes (unit's personal computer)
server
a node that shares resources with other nodes (application server, communication server)
Linux
a popular open source alternative to Windows
extranet
a private network that connects more than one organization
intranet
a private network within an organization that resembles the Internet
wireless revolution
a revolution that will dramatically affect the way we communicate and use computer technology
directory server
a specialized server that manages resources, such as user accounts, for an entire network
enterprise storage system
a strategy developed by large organizations to promote efficient and safe use of data across the networks within their organizations
network attached storage (NAS)
a type of file server designed for homes and small businesses. NAS is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.
Personal area network (PAN)
a type of wireless network that works within a very small area- immediate surroundings
internet
a way to connect to other people and computers
wireless LAN (WLAN)
a wireless local area network that uses radio frequencies to connect computers and other devices
Eliminating errors in a program is also called ______ the program. a) debugging b) modularizing c) coding d) clarifying
a) debugging
When a program makes a true or false decision, it is an example of a(n) _______ logic structure. a) if-then-else b) do until c) do while d) what-if
a. if-then-else
The __________ structure involves repeating a sequence until a condition is met. a) loop b) sequence c) conditional d) selection
a. loop
The program's processing steps are grouped into logically-related programming statements called a) modules b) unit c) object d) component
a. modules
A(n) __________ is a list of instructions detailing the steps needed to perform a task. a) program b) punch card c) agenda d) plan
a. program
The control structure used to perform a series of statements one after the other is called a) sequential b) selection c) loop d) random
a. sequential
Money collected from or owed by customers is called ________.
accounts receivable
connection devices
act as an interface between the sending and receiving devices and the communication channel
mobile apps
add-on features or programs typically designed for smartphones and tablets
provide user interface
allow users to interact with application programs and computer hardware
desktop publishing programs (page layout programs)
allow you to mix text and graphics to create publications of professional quality
wireless modem (WWAN)
almost all computers today have these modems built in
Electronic Commerce
also known as e-commerce
office suite
also known as office software suites and productivity suites, contain general-purpose application programs that are typically used in a business situation
cloud storage
also known as online storage
cloud
also known as online suite
flash memory
also known as solid-state storage
storage area network (SAN)
an architecture to link remote computer storage devices to computers such that the devices are as available as locally attached drives
pointer
an item on the screen controlled by the mouse that is used to select items such as icons
blog
an online diary or commentary
primary storage
another name for RAM
Real-time operating systems RTOS
another name for embedded operating systems
servers
another name for midrange computers
host
any computer system connected to a network that provides access to its resources
cybercrime
any criminal offense that involves a computer and a network
node
any device that is connected to a network (computer or printer)
Digital versatile discs (DVD)
are the standard optical discs in PCs and can store 4.7 GB
Denial of service (DoS) attack
attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data
phishing
attempts to trick internet users into thinking a fake but official-looking website or email is legitimate
Flowcharts and pseudocode are examples of tools used in the program __________ phase. a) specification b) design c) code d) test
b. design
When a program repeats a portion of software code as long as a certain condition doesn't exist, it's using a(n) _______ structure. a) if-then-else b) do until c) do while d) what-if
b. do until
The actual coding of a program is done by a(n) a) systems analyst b) software engineer c) end-user d) database administrator
b. software engineer
This shows the relationship between input and output documents. a.Investigation report b.Grid chart c.Top-down analysis method d.Checklist
b.Grid
Starting or restarting the computer is called ______ the system.
booting
temporary Internet files
browser cache, contains web page content and instructions for displaying this content
history file
browsers store the locations of sites visited in a:
pits
bumpy areas on the surface of optical discs
electronic commerce
buying and selling goods electronically
A(n) __________ error could be the result of the programmer making an incorrect calculation. a) syntax b) general protection c) logic d) breakpoint
c) logic
Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the a) program tracking log b) project management database c) program specifications document d) management information system
c. program specifications document
The three structures of structured programming are __________. a. sequence, order, and process b. selection, loop and iteration c. sequence, selection, and loop d. if, else, and then
c. sequence, selection, and loop
A program error that violates the grammar rules of the programming language is a(n) _______ error. a) modular b) logic c) syntax d) language
c. syntax
application software
can be described as end user software and is used to accomplish a variety of tasks
Write-once disc
can be written on once, after that the disc can be read many times but cannot be written on or erased
optical discs
can hold over 128 gigabytes of data
embedded operating system
cell phone operating systems
switch
central node that coordinates the flow of data by sending messages directly between sender and receiver nodes
rewritable discs
changeable, portable storage options that are popular for storing and sharing audio, video, and large multimedia presentations
wireless communication
changed the way we communicate with one another
A ______ boot is when you power on a computer that is off.
cold boot
botnet
collection of zombies
Select all of the common names associated with someone who resolves common technical problems faced by computer users.
computer support specialist help-desk technician technical support specialist
zombies
computers infected by a virus, worm, or trojan horse that allows them to be remotely controlled for a malicious purpose
mainframe computers
computers that occupy specially wired, air-conditioned rooms. Capable of great processing speeds and data storage
midrange computers
computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. Used by medium-sized companies or departments of large companies to support their processing needs but are now used to support or serve end users for certain applications
privacy
concerns the collection and use of data about individuals
firewall
consists of hardware and software that control access to a company's intranet and other internal networks
twisted-pair cable
consists of pairs of copper wire
program
consists of the step-by-step instructions that tell the computer how to do its work
analog signals
continous electronic waves sent and received by telephones
NOS (network operating systems)
control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources
The first step in implementing a new system is to determine the A. hardware requirements. B. software requirements. C. conversion type. D. best alternative.
conversion type
domain name server (DNS)
converts text-based address to IP address
first-party cookie
cookie that is germinated only by the website you are currently visiting
third-party cookie
cookie that is usually generated by an advertising company that is affiliated with the website you are visiting
manage resources
coordinate memory, processing, storage, and devices
Wide area networks (WAN)
countrywide and worldwide networks
Virtual private networks (VPN)
create a secure private connection between a remote user and an organization's internal network
word processors
create text-based documents and are one of the most flexible and widely used software tools.
worksheet files
created by electronic spreadsheets to analyze things like budgets and to predict sales
presentation files
created by presentation graphics programs to save presentation materials
Document files
created by word processors to save documents such as memos, term papers, and letters
__________ refers to testing by a select group of potential users in the final stage of testing a program. a) Manual testing b) Desk checking c) Attempt at translation d) beta testing
d) beta testing
The actual writing of a program in a programming language is called a) program design b) logic structure c) language translation d) coding
d) coding
In programming, _______ are explanations that tell other programmers what's happening in the software code. a) restrictions b) tables c) documentation d) selections
d. documentation
The programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem. a) grid table b) pseudocode c) algorithm d) flowchar
d. flowchart
information brokers
data gatherers who collect, analyze, and sell personal data
A transaction processing system is also referred to as a ________.
data processing system
file servers
dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.
network architecture
describes how a network is arranged and how resources are coordinated and shared
The first step in the systems design phase is to A. examine the hardware requirements. B. design alternative systems. C. select the best system. D. analyze the data.
design alternative systems.
Solid-state drives (SSDs)
designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data
antispyware
designed to detect and remove various types of privacy threats
The place that provides access to computer resources allowing you to interact with the operating system's graphical user interface.
desktop
______ are specialized programs that allow particular input or output devices to communicate with the rest of the computer system.
device drivers
A _____ provides information or requests input.
dialog box
Read-only discs
discs that cannot be written on or erased by the user- stuff you buy in the store
tab
divide menus into major activity areas
manuals
documents written with procedures by computer specialists
solid-state storage
does not have any moving parts, is more reliable, and requires less power than hard disks. Saves data and information electronically but is not volatile
A _______ works with the operating system to allow communication between the device and the rest of the computer system.
driver
Use Windows Update to update the _____ on your computer.
drivers
communication systems
electronic systems that transmit data from one location to another
the operating system on a smartphone would be ______.
embedded
Virtual private networks (VPN)
encrypt connections between company networks and remote users such as workers connecting from home
big data
ever-growing volume of data
IP address
every computer on the Internet has a unique numeric address called an:
ethernet cables
example of a twisted-pair cable that is often used in networks and to connect a variety of components to a system unit
Fiber-optic service (FiOS)
faster connection than cable or DSL. Is showing up in some areas, but is a new technology and not widely available
Utility programs
file compression diagnostic antivirus backup
Documents, worksheets, programs, and presentations are all examples of _____.
files
Data Manipulation
finding entry into someone's computer network and leaving a prank message
lands
flat areas that represent the 1s and 0s on the disc surface of optical discs
A good way to organize related files is to store them within a ______.
folder
system software
form of software that the computer uses
When a file cannot be saved on a single track across contiguous sectors and has to be broken up into small parts it is said to be ______.
fragmented
scam
fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return
You would run this program on your hard drive to ______ and improve system performance.
free up disk space
icons
graphical elements that represent familiar objects
connectivity
greatly expands the capability and usefulness of information systems
In a GDSS, the ________ is generally the decision maker.
group
When a computer is running virtualiztion software, the operating system for each virtual machine is known as the _______.
guest operating system
storage devices
hardware that reads data and programs from storage media
Fourth general mobile telecommunications (4G)
has begun to replace 3g networks in some areas with providers using LTE connections to provide faster transmission speeds
cyberbullying
he use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:
Organizational cloud storage
high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage
electronic profiles
highly detailed and personalized descriptions of individuals
profiles
highly detailed and personalized descriptions of individuals are electronic:
secondary storage
holds data and programs even after electric power to the computer system has been turned off
https
hypertext transfer protocol secure is widely used to protect the transfer of sensitive information
In a graphical user interface a graphical representation for a program, file, or function is called a(n) _____.
icon
Disk Cleanup
identifies and eliminates nonessential files
Rogue Wi-Fi hotspots
imitate free networks to capture any and all information
Tasks in the ________ phase of the SDLC are to build and test system components and to convert users to the new system. A) system definition B) component design C) system maintenance D) implementation
implementation
redundant arrays of inexpensive disks (RAID)
improve performance by expanding external storage, improving access speed, and providing reliable storage
disk caching
improves hard-disk performance by anticipating data needs
history files
include the locations, addresses, of sites that you have recently visited
specialized applications
includes thousands of other programs that tend to be more narrowly focused and used in specific disciplines and occupations
general purpose application
includes word processing programs, spreadsheets, presentation graphics, and database management systems
File compression
increase storage capacity by reducing the amount of space required to store data and programs
IP address
individual numeric address given to every computer on the Internet
The ________ keeps records of the number of each kind of part or finished good in the warehouse.
inventory control system
web bugs
invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge
sectors
invisible wedge-shaped sections that divided each track
TCP/IP (transmission control protocol/internet protocol)
involves identifying sending and receiving devices and breaking information into smaller parts called packets
RAID systems
larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.
run applications
load and run applications
internal hard disk
located inside the system unit. Able to store and retrieve large quantities of information quickly
Optimize Drives
locates and eliminates fragments and rearranges files and unused disk space
File History
makes a copy of all files that are in the libraries, contacts, and favorites and on the desktop
Computer Fraud and Abuse Act
makes it a crime for unauthorized persons to view or damage data using any computer across state lines
Digital Millennium Copyright Act
makes it illegal to deactivate or otherwise disable any anti-piracy technologies including DRM technologies
malware
malicious programs created to damage or disrupt a computer system
capacity
measures how much a particular storage medium can hold
access speed
measures the amount of time required by the storage device to retrieve data and programs
In a graphical user interface, ______ provide a list of options and commands.
menus
tablet and smartphones use _____ type of operating system
mobile OS mobile operating system
wearable
mobile computers like Apple watch that you wear on your body
privacy mode
mode in the browser that ensures that your browsing activity is not recorded on your hard disk
DSL (digital subscriber line)
modem that uses standard phone lines to create a high-speed connection directly to your phone company's offices. usually external and connect with either a USB or ethernet
display
most common type of output device
people
most important part of any information system
Windows
most widely used microcomputer operating system and can run with a variety of different microprocessors
software
name for a program or programs
Metropolitan area network (MAN)
network that spans distances up to 100 miles
Local area networks (LAN)
networks with nodes that are in close physical proximity
mesh network
newest topology and does not use a specific physical layout , rather requires that each node have more than one connection to the other nodes
head crash
occurs when a readwrite head makes contact with the hard disk's surface or with particles on its surface
sending and receiving devices
often a computer or specialized communication device
ADSL service (asymmetrical digital subscriber line)
one of the most widely used types of DSL, much faster than dial-up
Random-access memory (RAM)
one type of memory that holds the program and data that is currently being processed
blogs
online diaries or commentaries
An ______ operating system is one in which users can modify and further develop the code.
open source
The collection of programs that handles many of the technical details related to using a computer is called the ______.
operating system
Select all the types of system software.
operating systems utilities language translators device drivers
standalone operating systems
operating systems used by desktops
network operating systems NOS
operating systems used by networks
spreadsheets
organize, analyze, and graph numeric data such as budgets and financial reports
Android
owned by Google and widely used in many of today's smartphones
Windows Phone 8
owned by Microsoft and used in a variety of portable devices mainly for social networking and instant messaging
microprocessor
part of system unit that controls and manipulates data to produce information
people
part of the information system that includes the end users
memory
part of the system unit that is a holding area for data, instructions, and information
Computer monitoring software
perhaps the most invasive and dangerous type of spyware
Regional managers can compare their regular sales reports with that of the other regional managers by using ________.
periodic reports
desktop computer
personal computer that is small enough to fit on top of or alongside a desk but too big to carry around
laptop computer
personal computers that are portable and lightweight and fit in most briefcases
vector images
photos that are made with geometric shapes or objects
bitmap images
photos that are made with pixels
The operating system is often called the software environment or software _______.
platform
In a graphical user interface, the _____ is used to select items.
pointer
Menus
present commands that are typically displayed in a menu bar at the top of the screen
information
processed facts
Program specification can also be called
program definition or program analysis
virus
program that migrates through networks and operating systems, and attaches themselves to different programs and databases
Database management system (BDMS)
program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.
trojan horses
programs that appear to be harmless, but they contain malicious programs
Presentation graphics
programs that combine a variety of visual objects to create attractive, visually interesting presentations.
operating systems
programs that coordinate computer resources, provide an interface between users and the computer, and run applications
word processors
programs that create text-based documents,
web page editors
programs that provide support for website design and HTML coding
worms
programs that simply replicate themselves over and over again
web authoring programs
programs typically used to create sophisticated commercial websites
Project resources can be scheduled, planned, and controlled using ________.
project managers
Heath Insurance Portability and Accountability Act (HIPAA)
protects medical records
Gramm-Leach Bliley Act
protects personal financial information
Although the development time is shorter, it is sometimes more difficult to manage the project and to control costs with A. rapid applications development. B. prototyping. C. systems analysis. D. systems maintenance.
prototyping.
Dialog boxes
provide additional information and request user input
dialog box
provide information or request input
help
provide online assistance for operating system functions and procedures
buttons
provide shortcuts for quick access to commonly used commands
Cable service
provided by cable television companies using their existing television cables. These connections are usually faster than DSL
DSL service (digital subscriber line)
provided by telephone companies using existing telephone lines to provide high-speed connections
provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents
web
provides a multimedia interface to the numerous resources available on the internet
videoconferencing
provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.
secondary storage
provides permanent or nonvolatile storage
texting
provides very efficient direct text communication between individuals using short electronic messages.
This is an outline of the logic of the program you will write.
pseudocode
employee-monitoring software
record virtually everything you do on the computer for the sake of a company
density
refers to how tightly the magnetic charges on a hard disk are packed next to one another
downlink
refers to receiving data from a satellite
mass storage
refers to the tremendous amount of secondary storage required by large organizations
accuracy
related to the responsibility of those who collect data to ensure that the data is correct
access
relates to the responsibility of those who have data to control who is able to use that data
property
relates to who own data
Ribbons
replace menus and toolbars by organizing commonly used commands into a set of tabs. These tabs display command buttons that are the most relevant to the tasks being performed by the user
digital signals
represent the presence or absence of an electronic pulse and are sent and received by computers
plagiarism
representing some other person's work and ideas as your own without giving credit to the original source
Wireless network encryption
restricts access to authorized users on wireless networks
Family Educational Rights and Privacy Act (FERPA)
restricts disclosure of education records
tracks
rings of concentric circles on the platter
protocols
rules for exchanging data between computers
Mac OS
runs on Apple computers
cylinder
runs through each track of a stack of platters
The ________ activity records the customer requests for products or services.
sales order processing
password
secret words or phrases that must be keyed into a computer system to gain access
A file is said to be fragmented when it cannot be saved on a single track across contiguous wedge shaped sections called _______.
sectors
Determining whether the system can be made secure against unauthorized use is part of A. analyzing the data. B. writing the systems design report. C. selecting the best system. D. testing the system.
selecting the best system.
modem
short for modulator-demodulator
Galleries
simplify the process of making a selection from a list of alternatives. This is accomplished by graphically displaying the effect of alternatives before being selected.
window
simply a rectangular area that can contain a document, program, or message.
cookies
small data files that are deposited on your hard disk from websites you have visited
mobile apps
small programs primarily designed for mobile devices
flash memory cards
small solid-state storage devices widely used in portable devices
packets
smaller parts of a message sent separately over the internet and reassembles into the correct order before delivery
tablet
smaller, lighter, and generally less powerful personal computers than laptops. Usually have touch-screens instead of standard keyboards
USB drives
so compact that they can be transported on a key ring
Image editors
specialized graphics programs for editing or modifying digital photographs
mass storage devices
specialized high-capacity secondary storage devices designed to meet organization demands for data storage
Basic categories of operating systems
stand-alone network embedded
ethics
standard of moral conduct
First Generation mobile telecommunications (1G)
started in the 1980s using analog radio signals to provide analog voice transmission service
Second Generation mobile telecommunications (2G)
started in the 1990s using digital radio signals
Third generation mobile telecommunications (3G)
started in the 2000s and provided serves capable of effective connectivity to the internet, marking the beginning of smartphones
Solid-state storage
storage that has no moving parts
peer-to-peer network
strategy of having nodes have equal authority and can act as both clients and servers
client/server networks
strategy of using central servers to coordinate and supply services to other nodes on the network
Specialized suites
suites focus on specific applications
cloud suites
suites that are stored at a server on the Internet and are available anywhere you can access the Internet.
Utility suites
suites that include a variety of programs designed to make computing easier and safer
Cellular service providers
support voice and data transmission to wireless devices using cellular networks
The correct sequence for the five phases in the systems development life cycle (SDLC) process is ________.
system definition requirements analysis component design Implementation system maintenance
_____ software controls where a program is stored in memory, how commands are converted so that the system unit can process them, and where files are saved.
system software
Determining whether the new procedures are actually furthering productivity is part of the A. testing of the new sample phase. B. selecting the best system phase. C. designing of alternatives phase. D. systems audit phase.
systems audit phase.
The costs versus the benefits of designs and the outlines of their effects is presented in the A. systems analysis report. B. preliminary investigation report. C. initialization report. D. systems design report.
systems design report
In a graphical user interface, _____ divide menus into major activity areas.
tabs
uplink
term relating to sending data to a satellite
web authoring
the act of creating a site
media
the actual physical material that holds the data and programs
topology
the arrangement or configuration of a network
broadband
the bandwidth typically used for DSL, cable, and satellite connections to the Internet
privacy
the browser mode that ensures your browsing activity is not recorded
connectivity
the concept related to using computer networks to link people and resources
the Internet of Things (IoT)
the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet
hardware
the equipment that processes the data to create information
application software
the form of software the end user uses
Identity theft
the illegal assumption of someone's identity for the purpose of economic gain
online identity
the information that people voluntary post about themselves online
cloud computing
the internet acts as a cloud of servers that supply applications to clients as a service rather than a product
personal computers (PC)
the least powerful, yet the most widely used and fastest-growing type of computer
supercomputers
the most powerful type of computer. Special, high-capacity computers used by very large organizations. typically used to process massive amounts of data
smartphone
the most widely used handheld computers. cell phones with wireless connections to the Internet and processing capabilities
Microsoft Excel
the most widely used spreadsheet program
Microsoft Word
the most widely used word processor
modulation
the name of the process of converting from digital to analog
Blu-ray discs (Bfs)
the newest form of optical storage designed t store hi def videos, which uses the HD 720 and HD 1080 resolutions
media
the physical material that holds the data and programs
user interface
the portion of the application that allows you to control and to interact with the program
encryption
the process of coding information to make it unreadable except to those who have a special piece of information known as a key
demodulation
the process of converting from analog to digital
computer communications
the process of sharing data, programs, and information between two or more computers
procedures
the rules or guidelines for people to follow when using software, hardware, and data
transfer rate
the speed with which a modem transmits data is called its:
transfer rate
the speed with which modems transmit data, typically measured in megabits per second
pixels
the thousands of dots that form images
access
the three primary privacy issues are accuracy, property, and:
vector
the type of image that consists of geometric shapes
software piracy
the unauthorized copying and/or distribution of software
cyberbullying
the use of the Internet, smartphones, or other devices to send or pot content intended to hurt or embarrass another person
NIC (network interface cards)
these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter
data transmission specifications
these are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel
secondary storage devices
things like hard-disk drive, data and programs that can be retained after the computer has been shut off
illusion of anonymity
thinking that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy
proxy server
this is a server that all communications between the company's internal networks and the outside world have to pass through
optical
this type of storage uses pits and lands to represent 1s and 0s
specialized applications
thousands of other programs that are more narrowly focused on specific disciplines and occupations
CD, DVD, BD
three types of optical discs
DRM
to prevent copyright violations, corporations often use:
star network
topology in which each device is connected directly to a central network switch
tree network
topology in which each device is connected to a central node, either directly or through one or more other devices
bus network
topology in which each device is connected to a common cable called a backbone, and all communications travel alongside.
ring network
topology in which each device is connected to two other devices
On a hard disk a ________ is a concentric ring.
track
The final step of the implementation phase of the systems life cycle is to A. develop documentation. B. train the users. C. select the conversion type. D. write the implementation report.
train the users.
input devices
translate data and programs that humans can understand into a form that the computer can process
output devices
translate the processed information from the computer into a form that humans can understand
fiber-optic cable
transmits data as pulses of light through tiny tubes of glass
keyboard and mouse
two most common input devices
keystroke logger
type of computer monitoring software that records every activity and keystroke made on a computer system, including red card numbers, passwords, and emails
app store
typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge
toolbars
typically appear below the menu bar and include small graphic elements called buttons that provide shortcuts for quick access to commonly used commands
Database files
typically created by database management programs to contain highly structured and organize data
hard disks
typically use to store programs and very large data files
web authoring programs
typically used to create sophisticated commercial sites
data
unprocessed facts
optical discs
use laster technology to store data and programs
hard disk
use rigid metallic platters that are tacked one on top of another
external hard drives
use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk
digital right management (DRM)
used by corporations to control access to electronic media and files
graphical user interface (GUI)
used by most general-purpose applications because it displays graphical elements called icons to represent familiar objects
Unix
used by servers on the Web, mainframe computers and powerful microcomputers
communication devices
used for a personal computer to routinely communicate with other computer systems located as near as the next office or as far away as halfway around the world using the Internet
voiceband (low bandwidth)
used for standard telephone communications
iOS
used in iPhone, iPod Touch, and iPad
medium band
used in special leased lines to connect to midrange computers and mainframes as well as to transmit data over long distances
Illustration programs
used to create and edit vector images
spyware
used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet
Tabs
used to divide the ribbon into major activity areas
Video editors
used to edit videos to enhance quality and appearance.
The means for a user to interact with application programs and computer hardware describes the _____.
user interface
optical disc drives
uses a laser that projects a tiny beam of light to read the disc
Wi-Fi
uses high-frequency radio signals to transmit data
microwave
uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication, only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances
infrared
uses infrared light waves to communicate over short distances
Global positioning system (GPS)
uses location information to uniquely determine the geographic location of a device
Cellular
uses multiple antennae to send and receive data within relatively small geographic regions
satellite
uses orbiting satellites about 22,000 miles above the earth as microwave relay stations
satellite connection service
uses satellites to provide wireless connections, slower than DSL and cable, but are available almost everywhere
dictionary attack
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
cloud computing
uses the Internet and the web to shift many computer activities from a user's computer to computers on the Internet
cable modem
uses the same coaxial cable as the television, creates a high-speed connection using USB or Ethernet
dial-up services
using existing telephones and telephone modems to connect to the internet
_____ are specialized programs to make computing easier.
utilities
When a computer is running virtualization software, it is operating as though it were two or more separate and independent computers known as
virtual machines
Utility suites often provide programs that will protect your system from dangerous programs called computer ______.
viruses
strategy
way of coordinating the sharing of information and resources
compact discs (CD)
were the first widely available optical format for PC users with 700 MB of storage
software
what controls hardware?
mistaken identity
when the electronic profile of one person is switched with another
modem
widely used communication device that modifies audio, video, and other types of data into a form that can be transmitted across the Internet
broadband
widely used for DSL, cable, and satellite connections to the Internet
general-purpose applications
widely used programs in all career areas
baseband
widely used to connect individual computers that are located close to one another
Video game design software
will help you organize your thoughts and guide you through the game design process including character development and environmental design
hotspots
wireless access points that provide internet access
Intrusion detection system (IDS)
work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic
system software
works with end users, application software, and computer hardware to handle the majority of technical details
The final task in the design phase of the systems life cycle is to A. select the best design. B. design alternative systems. C. write a systems design report. D. examine hardware requirements.
write a systems design report.
Freedom of Information Act
you are entitled to look at your records held by government agencies by law