CTA Chapter 7
RAM provides what type of storage?
temporary or volatile storage
creating and knowingly spreading a virus is a very serious crime and federal offense punishable under what Act?
the Computer Fraud and Abuse Act
The primary difference between A PAN, LAN, MAN, AND WAN is what?
the geographic range
What is the disadvantage of Peer-to-peer (P2P)?
the lack of security controls or other common management functions (for this reason, few businesses use this type of network to communicate sensitive information)
what is reading?
the process of accessing information from secondary storage.
what is writing?
the process of saving information to the secondary storage device
the single most dramatic change in connectivity and communcitations in the past decade has been....
the widespread use of mobile devices like smartphones and tablets within wireless Internet connectivity
What do home network allow?
they allow different computers to share resources including a common Internet connection
What is the advantage of Peer-to-peer (P2P)?
they are easy and inexpensive (often free) to set up and use
Why are Cylinders necessary for a hard disk platter?
they differentiate files stored on the same track and sector of different platters
Besides being within laptops, smartphones, and GPS's, what other kind of application do FLASH MEMORY CARDS have?
they provide removable storage
can be used to transmit information without your knowledge.
web bugs example: when a user opens an email containing a web bug, information is sent back to the source of the bug
This access point interrupts incoming radio frequencies and routes communications to the appropriate devices.
wireless access point or base station
all communications pass through the networks centrally located _____________
wireless access point or base station
Almost all computers have this type of built in modem.
wireless modem
encompasses various technologies that control access to electronic media and files.
digital rights management (DRM)
to prevent copyright violations, corporations often use what?
digital rights management (DRM)
computers send and receive ___________. These represent the presence or absence of an electronic pulse.
digital signals
This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable or it can be wireless
Communication channel
call attention to unusual events. An example is a sales report that shows certain items are selling significantly above or be;ow marketing department forecasts.
Exception reports
compared to a coaxial cable, it is lighter, faster, and more reliable at transmitting data. It is rapidly replacing twisted pair cable telephone lines
Fiber- optic cable
this database is like hierarchical except a child node may have more than one parent in a many-to-many relationship; additional connections are called pointers!
Network database
expansion cards located within the system that connect the computer to a network. Sometimes referred to as a LAN adaptor
Network interface cards (NIC)
Malicious Programs created by crackers are known as what?
maleware
these things are especially designed to damage or disrupt a computer system
maleware
specialized high- capacity secondary storage devices designed to meet organizational demands for data storage
mass storage devices
a list of instructions for a computer to follow is known as a what?
program
another name for program specification...
program definition or program analysis
consists of a written description of the program and the procedures for running it.
program documentation
designed to ensure that the program operates correctly, efficiently, and effectively
program maintenance
the rules for exchanging data between computers are known as...
protocol
to build a model or prototype that can be modified before the actual system is installed
protoyping
central node that coordinates the flow of data by sending messages directly between sender and receiver nodes.
switch
a collection of activities and elements organized to accomplish a goal
system
a six-phase problem-solving procedure that makes up the systems life cycle
systems analysis and design
cyber crimes cost over $______________ a year.
$400 billion
Several factors affect how data is transmitted. These factors include ____________ and ____________.
- Bandwidth -protocols
In the systems development phase, ____________ and _________ are acquired and tested.
- hardware -software
The 1's and 0's in an optical disc are represented by flat areas called _____________ and bumpy areas called ___________ on the discs surface.
-lands -pits
What are the 5 basic functions of an organization? Describe them.
1) Accounting- records all financial activity from billing customers to paying employees 2) Marketing- plans, prices, promotes, sells, and distributes the organizations goods and services 3) Human Resources- focuses on people--- hiring, training, promoting 4) Production- actually creates finished goods and services using raw materials and personnel 5) Research- identifies, investigates, and develops new products and services
What are the 3 types of privacy? describe them.
1) Accuracy- relates to the responsibility of those who collect data to ensure that the data is correct 2) Property- relates to who owns the data 3) Access- relates to the responsibility of those who have data to control who is able to use the data.
What are the 2 ways in which data is processed? describe them.
1) Batch processing- data is collected over time and then processed later all at one time (batched) 2) Real- time processing (online processing)- data is processed at the same time the transaction occurs. Direct access storage devices make real time processing possible
PrimaryTechnologies used for wireless connections are...
1) Bluetooth 2) Wifi 3) Microwave 4) WiMax 5) Celular 6) satellite connections
What are the 5 Topologies?
1) Bus network 2) Ring Network 3) Star Network 4) Tree Network 5) Mesh Network
What are the 3 widely known optical discs?
1) CD 2) DVD 3) Blu- ray discs
what are the 5 subsystems of a DBMS? describe them.
1) DBMS engine- provides a bridge = between logical and physical data views 2) Data definition subsystem- defines the logical structure of a database using data dictionary pr schema 3) Data manipulation subsystem- provides tools for data maintenance and data analysis; tools include query by example and structured query language 4) Application generation subsystem- provides tools for creating data entry forms with specialized programing languages 5) Data administration subsystem- manages the data-base
What are the 3 commonly used types of modems:
1) DSL 2) cable 3) wireless
What are the 3 performance Enhancements for Hard Disks?
1) Disk Caching 2) redundant arrays of inexpensive disks 3) File Compression/ Decompression
4 applications that depend on computer communications include:
1) Email- fast, efficient alternative to traditional mail by sending and receiving electronic documents 2) Texting- provides very efficient direct text communication between individuals using sort electronic messages 3) Videoconferencing- provides a very low cost alternative to long distance telephone calls using electronic voice and video delivery 4) Electronic commerce- buying and selling goods electronically
Some of the mass storage devices that support the enterprise storage system include:
1) File Servers- computers with large storage capacities that provide users access to fast storage and retrieval data 2)Network attached storage (NAS)- a type of file server designed for homes and small business. It is less expensive, easier to set up, and easier to manage than most file servers. However it does not include powerful management tools and features found on large scale file servers. 3) RAID systems- a device that enhance security by constantly making backup copies of files moving across the organizations networks. 4) Organizational cloud storage- High speed internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage
what are the 4 types of databases? describe them.
1) Individual (personal computer) database- used by one person 2) company database- stored on central server; accessed by multiple people 3)distributed databases- spread out geographically; accessed by communications links 4) Commercial databases (information utilities and data banks)- Enormous; for particular subjects
What are the 4 important characteristics of secondary storage? explain them.
1) Media: the physical material that hods the data and programs 2) Capacity: measures how much a particular storage medium can hold 3) Storage Device: hardware that reads data and programs from storage media. Most also write to storage media 4) Access Speed: measures the amount of time required by the storage device to retrieve data and programs
Two systems to support information workers include:
1) Office automation systems- support data workers. Focus on managing documents, communicating, and scheduling. 2) Knowledge work systems- use OAS systems. They create information for their areas expertise.
What are the 6 phases that make up the systems analysis and design? describe them.
1) Preliminary investigation- identifying organizations problems or needs and summarizing in short report 2) Systems analysis- studying present system in depth, specifying new requirements, and documenting findings 3) systems design- designing new or alternative system to meet new requirements and creating a design report 4) Systems development- acquiring , developing, and testing needed hardware and software 5) systems implementation- installing new system and training people 6) Systems maintenance- periodically evaluating and updating systems as needed
Each of the optical discs has three basic formats which include:
1) Read Only (ROM) 2) Write Once (R for recordable) 3) Rewritable (RW for rewritable or RAM)
what are the 4 basic elements of a communication system?
1) Sending and receiving data 2) Connection devices 3) Data transmission specifications 4) Communication channel
What are the 3 basic types of Decision Models? describe them.
1) Strategic Models- assist top level managers in long range planning, such as stating company objectives or planning plant locations 2) Tactical Models- help middle class management control the works of the organization, such as financial planning and sales promotion planning. 3) Operational Models- help lower level management accomplish the organizations day to day activities, such as evaluating and maintaining quality control
What are the 3 levels of management? Describe them.
1) Supervisors- manage and monitor the employees or workers. They have responsibility relating to operational matters 2) Middle Management- deal with control, planning, and decision making. They implement the long term goals of the organization 3) Top Management- concerned with long range planning. They need information that will help them plan the future growth and direction of the organization
What are the information needs of each level of management?
1) Top Level- need summary information describing the overall operations of the business. they need to forecast and plan for long range 2) Middle level- need summarized information (weekly or monthly reports). they ned to develop the budget projections and to evaluate the performance of supervisors 3) Supervisors- need detailed, very current, day-to-day information on their units so that they can keep operations running smoothly.
Describe the information flow of the 3 levels of management.
1) Top level- both vertical and horizontal 2) Middle- both vertical and horizontal 3) Supervisors- primarily vertical
What are the 4 structured programming techniques? describe them.
1) Top-Down program design- major processing steps called program modules are identified 2) Pseudocode- an outline of the logic of the program you will write 3) Flowcharts- program charts are graphic representations of the steps necessary to solve a programming problem. 4) Logic Structures- arrangements of programing statements. The 3 types include: 1) sequential: one program statement followed by another 2) Selection (IF-THEN-ELSE): when a decision must be made 3) Repetition (loop)- when a process is repeated until condition is true
Large Organizations typically have formal names for the systems designed to collect and use the data. The most common names include: (4)
1) Transaction Processing System (TPS) 2) Management Information System (MIS) 3) Decision Support System (DSS) 4) Executive Support System (ESS)
Physical connections use a solid medium to connect sending and receiving devices. These connections include...(3)
1) Twisted pair 2) Coaxial 3) Fiber-optic cables
The disadvantages of cloud storage include:
1) access speed- the data transfer rate is dependent upon the speed of our internet connection, which most likely is not as fast as a user's internal network 2) file security- users are dependent upon the cloud service's security procedures, which may not be as effective as your own
What are the 5 groups that data is organized into? describe them.
1) character- the most basic logical element, consisting of individual numbers, letters, and special characters 2) field- next level, consulting of a set of related characters for example, a persons last name. A data field represents an attribute (description ot characteristic) of some entity (person, place, thing, or object) 3) Record- a collection of related fields, for example, a payroll record consisting of fields of data relating to one employee 4) Table- a collection of related records; for example, a payroll table consisting of all the employee records 5) database- an integrated collection of related tables; for example, a personnel database contains all related employee tables
What are 2 of the most common network strategies?
1) client/ server networks 2) Peer-to-peer (P2P)
electronic profiles raise man important issues including:
1) collecting public, but personal identifying information 2) spreading information without personal consent 3) spreading inaccurate information
What are the 2 categories of Communication channels?
1) connects sending and receiving devices by providing a physical connection, such as a wire or cable 2) wireless
typically, digital rights management (DRM) is used to....
1) control the number of devices that can access a given file 2) limit the kinds of devices that can access a file
What are the disadvantages of Client/ server networks? (2)
1) cost of installation 2) maintence
What are the 3 tasks of the preliminary investigation phase?
1) defining the problem- 2) Suggesting Alternative Systems 3) Preparing a Short Report
What are the 5 methods for testing for syntax and logic errors? describe them.
1) desk checking method (code review)- careful reading of a printout of the program 2) manual testing- using a calculator and sample data to test for correct programming logic 3) Attempt at translation- running the program using a translator program to identify syntax errors 4) Testing sample data- running the program and testing the program for logic errors using sample data 5) testing by users (beta testing)- final step in which potential users try the program and provide feedback
What are the 4 ways to convert? describe them
1) direct approach- abandoning the old system and staring up the new system (can be very risky) 2) Parallel approach- running the old and new system side by side until the new system proves its worth; very low risk; however, very expensive; not generally recommended 3) pilot approach- converting only one part of the organization to the new system until the new system proves its worth; recommended for situations with many people performing similar operations 4) phased approach- gradually implementing the new system to the entire organization; less risky but more expensive than parallel conversion; recommended for situations with many people performing different operations.
What are the three tasks of the systems design?
1) economic feasibility - cost vs. benefits (time for system to pay for itself) 2) technical feasibility- hardware and software reliability; available training. 3) operational feasibility- will the system work within the organization?
What are the 3 tasks of the System analysis phase?
1) gathering data- helpful to use organization chart 2) analyzing the data- helpful to use top down analysis, grid charts, and system flowcharts. 3) Documenting Systems Analysis-
What are the 5 principal database models?
1) hierarchical 2) network 3) relational 4) multidimensional 5) object-oriented
What are the essential features of transmission control protocol/internet protocol (TCP/IP)?
1) identifying sending and receiving devices 2) breaking information into small parts, or packets, for transmission across the Internet
two important security concerns in databases include:
1) illegal use of data 2) unauthorized access
What are the 2 basic types of hard disks?
1) internal 2) external
Some flash memory cards are used within devices such as....
1) laptops 2) smartphones 3) GPS Navigation systems
starts with core program functionality and expands until the customers is satisfied with the results.
Agile development
The benefits of cloud storage include:
1) maintenance- the cloud service will take care of disk fragmentation, back-ups, encryption, and security 2) Hardware upgrades- the cloud service will never run out of disk space and can replace failed hard disks without interruption to the user 3) File sharing and collaboration- users can share documents, spreadsheets, and files with other users from anywhere wth an Internet connection
There are a number of specialized terms that describe computer networks. There terms include (10)....
1) node 2)client 3) server 4) directory server 5) hot 6) router 7) switch 8) network interface cards (NIC) 9) Network operating systems (NOS) 10)Network administrator
What are the 5 tasks of Program specification (program definition or program analysis)?
1) program objectives 2) desired output 3) input data 4) processing requirements 5) program specification
The 6 step procedure for creating programs includes... (describe them)
1) program specification- defining objects, inputs, outputs, and processing requirements 2) program design- creating a solution using structured programing tools and techniques such as top down, program design, pseudocode, program flowcharts, and logic structures 3) Program code- writing or coding the program using a programming language 4) Program Test- testing or debugging the program by looking for syntax and logical errors 5) program documentation- ongoing process throughout the programing process 6) program maintenance- periodically evaluating programs for accuracy, efficiency, standardization, and ease of use and modifying program code as needed
Two alternatives for the systems life cycle include:
1) prototyping 2) rapid applications developments (RAD)
what are 2 ways to acquire software?
1) purchasing "off the shelf packaged software" 2) designing custom programs
What are 4 advantages of databases?
1) sharing data 2) improved security 3) reduced data redundancy 4) higher data integrity
2 examples of flash memory cards being used to provide removable storage include...
1) storing images captured from digital cameras and then transferring the images to desktop and other computers. 2) used in digital media players like iPod's to store and play music and video files
What are the advantages of Client/server networks? (2)
1) the ability to handle very large networks 2) the availability of powerful network management software to monitor and control network activities
What are the 4 parts of Decision Support System (DSS)? Describe them.
1) user- someone who has to make decisions 2) system software- essentially the operating system-- programs designed to work behind the scenes to handle detailed operating procedures. 3) data- stored in a database and consists of two kinds... 1) internal: data from within the organization 2) external: data gather from outside the organization 4) Decision Models- give the DSS its analytical capabilities.
People who use program documentation include: (3)
1) users- who need to know how to use the program 2) operators- who need to know how to excavate the program and how to recognize the errors 3) Programmers- who may need to update and maintain the program in the future
What are the 3 types of maleware?
1) viruses 2) worms 3) Trojan horses
List the 4 categories of bandwidth:
1) voiceband (also known as low bandwidth) 2) medium band 3) broadband 4) baseband
Cyber-crimes can take many forms including:
1)creation of malicious programs 2) denial service attacks 3) rouge WiFi hotspots 4) data manipulation 5) identity theft 6) Internet scams 7) Cyber-bulling
It is estimated that over _________ billion smartphones are in use worldwide.
1.5 billion
optical discs can hold over ______________ gigabytes of data
128
explain the 4 different generations of cellular networks.
1st generation mobile telecommunications (1G)- started in the 1980's using analog radio signals to provide analog voice transmission service 2nd generation mobile telecommunications (2G)- started in the 1990's using digital radio signals 3rd generation mobile telecommunications (3G)- started in the 2000's and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones 4th generation mobile telecommunications (4G)- has begun to replace 3G networks in some areas with providers using LTE (Long Term Evolution) connection to provide faster transmission speeds
Bluetooth transmits data over short distances of approximately ____________ ft.
33 feet
DVD's can store up to ______ GB (7 times the capacity of CDs)
4.7 GB
cyber crimes affect over _______ people.
400 million
consists of hardware and software that control access to a company's intranet and other internal networks.
A Firewall
one of the most widely used types of DSL
ADSL (asymmetric digital subscriber line)
once the system is operational, the system analysts performs a ____________ by comparing the new system to its original design specifications.
systems audit
To document and communication the finding of the Systems design, a _________________ is prepared for higher management.
systems design report
After each packet is sent separately over the Internet, what happens next?
At the receiving end, the packets are reassembled into the correct order.
list the overall financial conditions of an organization. They include assets, liabilities, and how much an organizations owned by the owners.
Balance sheet
bandwidth that is widely used to connect individual computers that are located close to one another. It is able to support high-speed transmission. Though, is can only carry a single signal at a time.
Baseband
the newest form of optical disc storage designed to store hi def (high definition) video
Blue- ray discs (BD's)
The most popular personal area Network (PAN) is....
Bluetooth (max range of around 33 feet)
is a short range radio connections standard that transmits data over short distances of up to approximately 33 feet
Bluetooth (used for wireless headphones, printer connections, and handheld devices) Communcation
bandwidth that is widely sued for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use a single broad connection for high speed data transfer.
Boradband
Topology where each device is connected to a common cable or backbone, and all communications travel along this cable
Bus network
this type of optical discs stores about 700 MB of storage
CD
optical discs that store music are known as...
CDs
uses multiple cell towers (antennae) to send and receive data within relativity small geographic regions. Most cell phones and mobile devices use these networks
Cellular Communcation
support voice and data transmission to wireless devices using cellular networks.
Cellular service providers (including Verizon, AT&T, Sprint, and T-Mobile)
general definitions (part of object oriented database)
Classes
network strategy that uses central servers to coordinate and supply services to other nodes on the network. the server provides access to resources such as web pages, databases, application software, and hardware.
Client/server networks
an essential element of every communications system that carry the data from one computer to another.
Communications channel
What was the first widely avaible optical format for PC users?
Compact discs (CD's)
used frequently to compress files on DVD's, CD's, and flash drives as well. Also helps to speed up transmission of files from one computer to another
Compression Files
what act makes it a crime for unauthorized persons to view data using any computer across state lines
Computer Fraud and Abuse Act
the most invasive and dangerous type of spyware
Computer monitoring software
these act as an interface between the sending and receiving devices and the communication channel. They convert outgoing messages into packets that can travel across the communication channel. They also reverse the process for incoming messages
Connection devices
the process of changing to the new systems and training people.
systems implementation (conversion)
consists of a systems audit followed by periodic evolution
systems maintenance
showing up in some areas, this is a new technology that is not widely available. Current providers include Google and Verizon (speeds faster then DSL and cable)
Fiber-optic service (FiOS)
a modem that uses standard phone lines to create a high-speed connection directly to your phone company's office. These devices are usually external and connect to the systems unit using either a USB or an Ethernet port.
DSL (digital subscriber line)
optical discs that store movies or software are known as....
DVDs
These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel
Data Transmission specifications
Transaction Processing System (TPS) are also known as...
Data processing systems (DPS)
concerned with protecting software and data from unauthorized tampering or damage.
Data security
provides a flexible tool for analysis. It helps middle class mangers and others in the organization analyze a wide range of problems, such as the effect of events and rends outside the organization. Like MIS, it draws on the detailed data of the transaction processing system
Decision Support System (DSS)
the process of converting from analog to digital
Demodulation
what attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data?
Denial of Service attack (DoS)
provided by telephone compaines usuing existing telephone lines to provide high speed conection. (must faster then dial up)
Digital subscriber line (DSL) service
the standard optical discs in PCs
Digital versatile discs (DVDs)
improves hard-disk performance by using cache anticipating data needs. Acts as a temporary high-speed holding area between a secondary storage device and the CPU
Disk Caching
the most common standard is known as ....
Ethernet
LANs using Ethernet are sometimes referred to as ____________.
Ethernet LANs
a cable that are often used in networks and to variety of comments to the system unit.
Ethernet cables
protects email messages as they move across the Internet
Email encryption
many employers check their employees electronic mail and computer files using what?
Employee-monitoring software
also known as the executive information system (EIS), this is an easy to use system that presents information in a very highly summarized form. It helps top level managers oversee the company's operations and develop strategic plans. It combines the databases generated from the TPS and the reports generated from the MIS with external data.
Executive Support System (ESS)
a type of artificial intelligence that uses a database to provide assistance to users.
Expert Systems/ knowledge based systems
another name for knowledge based systems
Expert systems
increases storage capacity by reducing the amount of space required to store data and programs
File Compression and File Decompression
protects sensitive fils by encrypting them before they are stored on a hard drive
File encryption
another name for a USB drive is a ____________.
Flash Drive
Solid- State Storage provides access to _______________________, also known as solid- state storage.
Flash Memory
offers a combination of features of RAM and ROM. Like RAM it can be updated and like ROM it does not lose information when a computer is turned off.
Flash Memory
small solid-state storage devices widely used in portable devices.
Flash Memory Cards
Under what act are you entitled to look at your records held by government agencies (portions may be delated for national security reasons)?
Freedom of Information Act
devices that use that information to uniquely determine the geographic location of the device
Global positioning system (GPS)
reliable, detect obvious and common errors, and are well documented. The best way to create them is to write structured programs.
Good programs
protects personal finance information
Gramm-Leach-Biley Act
restricts disclosure of educational records
Family Educational Rights and Privacy Act (FERPA)
Use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk. Because they are easily removed, they are useful to protect or secure sensitive information
External Hard drives
a private network that connects more than one organization. Used to allow suppliers and others limited access to their networks.
Extranet
True or False: File Compression is limited to hard-disk systems.
False, File Compression is NOT limited to hard-disk systems
True or False: All spyware goes detected
False, a lot of spyware goes undetected because they user is unaware it is there.
true or false: Trajan Horses are viruses
False, they are NOT viruses
save files by altering the magnetic charges of the disk's surface to represent 1's and 0's
Hard Disks
Because Hard Disks are sensitive thin instruments, a ___________ could occur.
Head Crash
occurs when a read-write head makes contact with the hard disk's surface of with particles on its surface (exs: smoke particles, fingerprints, dust, or human hair)
Head Crash
Protects medical records
Health Insurance Portability and Accountability Act (HIPAA)
uses nodes to link and structure fields and records; entires may have one parent node with several child nodes in a one-to-many relationship
Hierarchical database
________________ include locations, or address pf sites that you have recently visited.
History Files
Common key fields (primary keys) include:
ID numbers and driver's license numbers
Every computer on the Internet has a unique numeric address called a ______________.
IP Address (Internet protocol address)
________ can be used to trace internet activities to their origin allowing computer security experts and law enforcement officers to investigate computer crimes.
IP Address's
one of the fastest growing crimes in the country and can financially devastate its victim.
Identity Theft
the illegal assumption of someones identity for the purpose of economic gain.
Identity Theft
used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances. This bandwidth id capable of very high speed data transfer.
Medium Band
Google Chrome's Privacy Mode is known as...
Incognito Mode
distribute, communicate, and create information. they are the organizations administrative assistants, clerks, engineers, and scientists.
Information Workers
Unlike radio waves, __________ uses infrared light waves to communicate over short distances.
Infrared
Solid- state drives (SSD's) are designed to be connected where?
Inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data.
work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic.
Instruction detection systems (IDS)
Many organizations today employ ______________ to support effective communication within and between organizations using intranets and extranets.
Internet Technologies
a private network within an organization that resembles the internet.
Intranet
the field in a record that uniquely identifies each record
Key field (primary key)
What does LTE stand for?
Long Term Evolution
maleware is short for what?
Malicious software
summarizes the detailed data of the transaction processing system in standard reports for middle- level managers. Such reports might include weekly sales and production schedules.
Management Information System (MIS)
the tremendous amount of secondary storage required by large organizations
Mass Storage
This Topology is the newest type and does not use a specific physical layout (such as a star or a tree). Rather, this network requires that each node have more than one connection to the other nodes. The resulting pattern is a mesh.
Mesh Network
spanning distances up to 100 miles, these networks are frequently used as links between office building that are located throughout a city.
Metropolitan area networks (MAN)
What is the most widely used project manager?
Microsoft Project
uses high frequency radio waves. It sometimes referred to as line-of-sight communication because it only travel in a straight line. They can only be transmitted over short distances
Microwave communication
the name of the process of converting from digital to analog
Modulation
the word modem is short for what?
Modulator- demodulator
this type of database extends two- dimensional relational tables to three or more demsoins, sometimes called a data cube!!!
Multidimensional database
a computer specialist responsible for efficient network operations and implementation of new members
Network Administor
control and coordinate the activities of all computers and other devices on a network (these activities include: electronic communication and the sharing of information and resources)
Network Operating systems (NOS)
describes the physical arrangement of a network
Network Topology
describes how a network is arranged and how resources are coordinated and shared.
Network architecture
this type of database stores data, instructions, and unstructured data. Data is organized using classes, objects, attributes, and methods.
Object- Oriented database
focuses less on procedures and more on defining relationships between previously defined procedures or objects.
Object- oriented software development
include locating and correcting errors, improving usability, and standardizing software.
Operations
In this type of technology, a laser beam alters the surface of a plastic or metallic disc to represent data.
Optical Disc Technology
In this strategy, nodes have equal authority and can act as both clients and servers.
Peer-to-peer (P2P)
the new system is periodically evaluated to ensure that it is operating efficiently. This is known as...
Periodic Evaluation
reports that are produced at regular intervals --- weekly, monthly, or quarterly
Periodic reports
concerned with protecting hardware from any possible human damage and natural disasters
Physical Security
RAM is sometimes referred to as what?
Primary Storage
___________ concerns the collection and use of data about individuals.
Privacy
Safari's Privacy Mode is known as...
Private Browsing
consists of specifying 5 tasks related to objectives, outputs, inputs, requirements, and documentation.
Program specification (program definition or program analysis)
a 6 step procedure for creating programs
Programming (software development)
what instructs a computer to perform specific operations?
Programming Langauges
programs designed to schedule, plan, and control project resources.
Project Managers
Before data can be processed or a program can run, it must be in ____________.
RAM
holds or stores data and programs that the CPU is presently processing
RAM (random access memory)
uses powerful development software, small specialized teams, and highly trained personnel. Typically, the development costs more. However, the time is much less and the quantity is often larger
Rapid Applications Development (RAD)
discs that cannot be written on or erased by the user
Read Only (ROM) exs: CD's, DVDs, Blu-Ray
improve performance by expanding external storage, improving access speed, and providing reliable storage. They are linked and inexpensive
Redundant array's of inexpensive disks (RAID)
discs similar to write-once discs except that the disc surface is not permanently altered when data is recorded
Rewritable ex: storing and sharing audio, video, and large multi media presentations
Topology where each device is connected to two other devices, forming a ring. When a message is sent, it is passed around he ring until it reaches the intended destination
Ring Network
imitate free networks at restaurants, coffee shops, etc.
Rogue WiFi hotpots
uses satellites orbiting about 22,000 miles above the earth as microwave relay stations.
Satellite communications
uses satellites to provide wireless connections. While slower the DSL and cable, they are available almost anywhere using a satellite- receiving disk.
Satellite connection services
hey originate messages in the form of data, information, and/or instructions (ex: a computer)
Sending and receiving data
unlike hard disks which rotate and have read/write heads that move in and out, ________________________ devices have no moving parts.
Solid- State Storage
When a head crash occurs, the surface of the disk is scratched. This causes what?
Some or all of the data to be destroyed
Topology where each device is connected to a central network switch. Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. This network is the most widely used today.
Star Network
an architecture to link remote computer storage devices, such as enterprise storage systems, to a computer such that the devices are as available as locally attached drives
Storage Area Network (SAN)
a way of coordinating the sharing of information and resources.
Strategy
Violations of the rules of programming language
Syntax Errors
In a _______________, data is collected about the present system. The focus is on determining the requirements for a new system.
System analysis
In what phase does a new or alternative information system get designed?
Systems design
One of the most common infrared devices is the ________
T.V. remote control
optical carrier (OC) have largly replaced what?
T1 lines that could be combined to form higher- capacity options known as T3 or DS3 lines
Whenever you visit a website, these files are saved by your browser. If you leave a site and then return later, these files are used to quickly redisplay web content
Temporary Internet Files (browser cache)
makes it illegal to deactivate or otherwise disable any anti piracy technologies including DRM technoliges. the act also establishes that copies of commercial programs may not be legally resold or given away. It further makes it a crime to sell or use programs or devices that are used to illegally copy software.
The Digital Millennium Copyright Act
What is the widest of al WAN's?
The Internet (spans the entire globe)
What is one way that File Compression programs do there job?
They search for repeating patterns, leaving enough tokens so that the original can be rebuilt or decompressed (these programs shrink them to a quarter of their original size)
programs that appear to be harmless, however, contain Malicious programs
Trajan Horses
record day-to-day transactions, such as customer bills, orders, inventory levels, and product output. It helps supervisors by generating databases that at as the foundation for the other information systems
Transaction Processing System (TPS)
Topology where each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes, and so forth, forming a treelike structure. This network, also known as a hierarchical network, is used to share corporate wide data.
Tree Network
Trojan horses secretly install a virus on the computer system.
True
True or False: Disk Caching requires a combination of hardware and software.
True
True or False: RAID is often used by Internet servers and large organizations because the storage capability, fast access speed, and high reliability.
True
True or False: SSD's are more expensive and generally have a lower capacity than hard disks
True
True or False: USB drives/Flash Drives are some compact that they can be transported on a key ring.
True
consists of pairs of copper wire that are twisted togther. (both telephone lines and Ethernet Cables use this)
Twisted Pair
these drives connect directly to a computers USB port to transfer files and can have captivities from 1 GB to 256 GB
USB Drives/Flash Drives
a term relating to sending data to a satellite
Uplink
encrypt connections between company networks and remote users such as workers connecting from home. this connection creates a secure virtual connection to a company LAN across the Internet
Virtual Private Networks (VPNs)
create a secure private connection between remote user and an organization's internal network. Special VPN protocols create the equivalent of a dedicated line between a user's home or laptop computer and a company sever.
Virtual private networks (VPN)
programs that migrate through networks and operating systems attaching themselves to different programs and databases altering and or delating files.
Viruses
used for standard telephone communication. Personal computers with telephone modems and dial up service use this bandwidth. While effecting for transmitting documents, it is too slow for many types of transmission, including high quality video and audio.
Voiceband
what is the most widely sued wireless network encryption for home wireless networks?
WPA2 (WiFi protected Access)
another name for a wireless modem is...
WWAN (wireless wide area network)
secures web transactions, especially financial transactions.
Website encryption
uses high- frequency radio signals to transmit data
Wi-Fi (wireless fidelity) Commmuncation
a new standard that extends the range of wifi networks using microwave connecitons
WiMax (worldwide interoperability for microwave access) Communcation
countrywide and worldwide networks that provide access to regional service (MAN) providers and typically span greater than 100 miles.
Wide area networks (WANs)
a wireless local area network is typically referred to as a _____________.
Wireless LAN (WLAN)
uses radio frequencies to connect computer and other devices
Wireless LAN (WLAN)
restricts access to authorized users on wireless networks
Wireless Network Encryption
a computer infected by a virus, worm, or trojan horse is known as a....
Zombie
a computer criminal who creates and distributes malicious programs.
a cracker
What is the key to a SAN?
a high speed network, connecting individual computers to mass storage devices
a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or sending their time and money for little or no return
a scam
refers to money the company owes it suppliers for material snd services it has received
accounts payable
recorded money received from or owed by customers
accounts receivable activity
simply a scam using the internet
an internet scam
Optical Discs are read by what? How does this object read them?
an optical disc drive reads the discs using a laser that projects a tiny beam of light on these areas
telephones typicall send and receive ______________, which are continuous electronic waves.
analog signals
programs designed to detect and remove various types of privacy threats
anti-spyware or spy removal programs
the data fields an objet posses (part of object oriented database)
attributes
a measurement of the width or capacity of the communication
bandwidth
Using secondary storage devices, data and programs can what?
be retained after the computer has been shut off
the ever-growing volume of data is often referred to as....
big data
devices such as finger scanning or eye scanning
biometric scanning
some optical discs, referred to as double-sided discs, containing information on....
both sides and need to be flipped over to read the other side
a collection of zombie computers is known as a....
botnet or robot network
harness the combined power of zombies for Malicious activities like password cracking or sending junk mail.
botnet or robot network
another name for Temporary Internet Files is...
browser cache
How do user interact with Expert Systems/ knowledge based systems?
by describing a particular situation or problem. the expert takes the inputs and searched the known base until a solution or recommendation is formulated.
How is secondary storage accomplished?
by writing files to and reading files from secondary storage devices
a modem that uses the same coaxial cable as your television. It connects to the systems unit using either a USB or an Ethernet port.
cable modem
provided by cable television companies using their existing television cables. (these connections are usually faster then DSL)
cable service
what do mass storage devices allow large organizations to do?
centralize their maintenance and security of data, thereby reducing costs and personnel
a node that requests and uses resources available from other nodes
client
_____________ is when the interent acts as a "cloud" of servers that supply applications to clients as a service rather than a product.
cloud computing
a high frequency transmission cable, replaces the multiple wires of telephone lines with a single solid copper core
coaxial cable
used to deliver television signals as well as to connect computers in a network
coaxial cable
writing a program is known as what?
coding
electronic systems that transmit data from one location to another
communication systems
the process of sharing data, programs, and information between two or more computers
computer communications
guidelines for the morally acceptable use of computers in our society
computer ethics
a communication system that connects two or more computers so they can exchange information and share resources.
computer network
provide automation and assistance in program design, coding, and testing.
computer- aided software development (CASE)
a concept related to using computer networks to link people and resources
connectivity
acquiring hardware involves what?
consideration for future company growth, existing networks, communication capabilities, and training.
systems implementation is also known as what?
conversion
small data files that re deposited on your hard disk from websites you have visited . Based on your browser's settings, these can be accepted or blocked.
cookies
a legal concept that gives content creators the right to control use and distribution of their work
copyright
the use of the Internet to send or post content intended to hurt or embarrass another person
cyber bullying
any criminal offense that involves a computer and a network
cybercrime or computer crime
A ____________ runs through each track of a stack of platters.
cylinder
finding entry into someones computer network and leaving a prankster message is known as what?
data manipulation
a technique for searching and exploring databases for related information and patterns
data mining
data warehouses support what?
data mining
The Information Workers who are involved with the distribution and communication of information are known as what?
data workers
computer professionals who help define processing rights
database administrators (DBA's)
the software for creating, modifying, and gaining access to the database
database management system (DBMS)
DBMS programs are designed to work wit specific data structures or _________________.
database models
these models define rules and standards for all the data in the database.
database models
a collection of integrated data- logically related files and records
datebase
a process of testing and eliminating errors in a program
debugging
the opposite of a periodic report. It is produced on request.
demand report
refers to how tightly these charges can be packed next to one another on a hard disk
desnity
using existing telephone's and telephone modems to connect to the internet.
dial-up service
uses software to try thousands of common words sequently in an attempt to gain unauthorized access to a user's account
dictionary attack
most large organization have ______________ describing ways to continue operating until normal computer operations can be restored.
disaster recovery plans
what converts a text-based address into a numeric IP address?
domain name server (DNS)
refers to receiving data from a satellite
downlink
Using publicly available databases and in many cases nonpublic databases, information resellers create ___________.
electronic profiles
highly detailed and personalized descriptions of individuals
electronic profiles
the process of coding information to make it unreadable except to those who have a special piece of information known as a encryption key or simply a key.
encryption
most large organizations have established a strategy called _________ to promote efficient and safe use of data across the networks within their organizations
enterprise storage system
this type of hard disk provides slower access and typically connect to a USB or Thunderbolt port on the system unit and are easily removed.
external
transmits data as pules of light through tiny tubes of glass
fiber-optic cable
act as a security buffer between a corporation's private network and all external networks, including the internet
firewall
a cookie that is generated (and then read) only be the website you are currently visiting.
first party cookie
keeps track of all summaries of all the foregoing transactions
general ledger
Some DSS's are specifically designed to support more than one or a tea, of decision makers. These systems are known as _________________.
group decision support systems (GDSS)
someone who gains access to our computer that contains information about us
hacker
LANs used by individuals in their homes and apartments are known as...
home networks
any computer system connected to a network that provides access to its resources
hot
wireless access points that provide Internet access are widely available in public places such as coffee shops, colleges, and bookstores. These access points are known as ______________ and typically use Wi-Fi technology.
hotspots
what is the most widely used protocol?
https
a ___________ previously filled the purpose of a switch by sending a received message to all connected nodes, rather then just the intended node.
hub
https is known as a what?
hyper transfer protocol secure
the concept that people think that because they are using their own computer and are selective about disclosing their names or other personal information that little can be done to invade their personal privacy is known as...
illusion of anonymity
transfer rate is measured how?
in millions of bites per second (Mbps)
show a company's financial performance (income expenses, and the difference between them for a specific time period)
income statements
a vast industry of data gatherers is known as ___________________ now exists that collects, analyzes, and sells personal data
information resellers or information brokers
where is an internal hard disk located?
inside the unit system
While __________ hard disks have fast access, they have a fixed amount of storage and cannot be easily removed from the system unit
internal
keeps records of the number of each kind of part or finished good in the warehouse
inventory control system
___________ in different files can be used to integrate the data in a database
key fields (primary keys)
tables can be connected (related ) to other tables by what?
key fields (primary keys)
A type of Computer monitoring software that records every activity and keystroke made on your computer system (this includes credit card numbers, passwords, and email messages)
keystroke logger
The database known as ___________ contains facts and rules to relate these facts distilled from a human expert.
knowledge base
The Information Workers who are involved with the creation of information are known as...
knowledge workers
networks with nodes that are in close physical proximity-- within the same building for instance-- are called....
local area networks (LAN's)
incorrect calculations or producers
logic errors
instructions for retrieving or manipulating attribute values (part of object oriented database)
methods
when an electronic profile of one person is switched with another this is known as .....
mistaken identity
To convert digital signals to analog signals and vice vera, you need a ______________.
modem
enables personal computers to communicate across different media, including telephone wires, cable lines, and radio waves.
modem
a device that allows one LAN to be linked to other LANs or to larger networks
network gateway
any device that is connected to the internet (ex: computer, printer, or data storage)
node
Object-oriented programming (OOP) is a process by which a program is divided into modules called ________________.
objects
specific instances of a class that can contain both data and instructions to manipulate the data (part of object oriented database)
objects
The most common types of trojan horse appear where?
on free computer games and free screensaver programs that can be downloaded from the Internet.
the information that people voluntarily post about themselves online
online identity
Before information is sent across the Internet, it is reformatted or broken down into small parts called _________.
packets
_________________ help you create a strong password.
password managers
secret words or phrases that must be keyed into a computer system to gain access
passwords
software updates are known as what?
patches
activity concerned with calculating employee paychecks
payroll
these networks make it possible for wireless devices to interact with each other.
personal area Network (PAN)
a type of wireless network that works within a very small area (your immediate surroundings)
personal area Network (PAN) -they connect cell phones to head sets and key boards to computers
a technique often used by internet scammers is _____________.
phishing
attempts to trick Internet users into thinking fake but official looking website or e-mail is legitimate.
phishing
representing some other person's work an ideas as your own without giving credit to the original source
plagerism
one who plagerizes is a ....
plagiarists
determines the need for a new information system
preliminary investigation
a mode that ensures that your browsing activity is not recorded on your hard disk
privacy mode
databases offer a great opportunity for increased _____________; however, security is always a concern.
productivity
By evaluating the source and the content of each communication, the ______________ decides whether it is safe to let a articular message or file pass into or out of the organization's network.
proxy server
all communications between a company's internal network and the outside world pass through what?
proxy server
a form that shows the name if the company supplying the material or service and what is being purchased
purchase order
the buying of materials and services is known as what?
purchasing
Most wireless connections use what to communicate?
radio waves
Unlike hard disks which use magnetic charges to represent 1's and 0's, optical discs use _____________.
reflected light
A table and its data are called a.....
relation
data is stored in tables (relations); related tables must have a common data item (key field).
relational database
Hard Disks use _________________ that are stacked one on top of another.
rigid metallic platters
a node that forwards or routes data packets from one network to their destination in another network
router
records the customers requests for the company's products or services
sales order processing activity
Provides permanent or nonvoliate storage
secondary storage
Each track on a Hard Disk platter is divided into invisible wedge-shaped sections called ____________.
sectors
_______________ involves protecting individuals and organizations form theft and danger
security
provide a collection of utility programs designed to protect your privacy and security while you are on the web
security suites
a node that shares resources with other nodes (they perform specialized tasks...depending on the task they may be called an application server, communication sever, database server, file server, printer server, or a web server)
server
Like internal storage, external storage has a fixed amount of storage. HOWEVER...
since since each removable port can be easily replaced by another removable hard disk, a single port on the system unit can provide access to an unlimited amount of storage.
the unauthorized copying and/or distribution of software
software privacy
significant patches are called...
software updates
a wide range of programs that are designed to secretly record and report an individual's activities on the Internet
spyware
the most dangerous type of privacy threat comes in the form of what?
spyware
cloud computing provides what?
storage, also known as online storage
In programing design, a solution is designed using preferably ____________________.
structured programming techniques
What do internal hard disks do?
they store and retrieve large qualities of information quickly. They are used to store programs and data files. (ex: they store major applications such as Word and Excel)
a cookie that is usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next
third party cookie
hyper transfer protocol secure (https) is widely used to what?
to proetct the transfer of sensitive information
third party cookies are also known as ___________ because they are used by the advertising company to keep track of your web activity as you move from one site to the next
tracking cookies
rings of concentric circles on the Hard Disk platter are known as what?
tracks
The speed with which modems transmit data varies. This speed is known as...
transfer rate
TCP/IP stands for what?
transmission control protocol/internet protocol
True or False: Lower level generations are closer to 1's and 0's and higher level are closer to the language of humans
true
True or False: The name Blu- ray comes form a special blue-colored resolutions
true
true or false: worms can carry viruses
true
In a SAN system, the ______________________ provides the file system for storing data, but the SAN provides the disk space for data.
users computer
how is the new system tested?
using sample data
How do Hard Disks store and organize files?
using tracks, sectors, and cylinders
computer systems that allow people located at various geographic locations to communicate and have in-person meetings
videoconferencing systems
The amount of light reflected on an optical discs determines what?
weather the area represent 1's or 0's
invisible images or HTML code hidden within a web page or email message
web bugs
programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed down or stopped.
worms
unlike a virus, ____________ typically do not attach itself to a program or alter and/or delate files.
worms
discs that can be written once. After that, the disc can be read many times but cannot be written or erased
write- once ex: CD-R (used for storing family photos), DVD-R (used to store home movies)