Ist 195 final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Online banking is an example of what type of e-commerce?

B2C

Continuous low power connection, no need to pair With a device, does not waste your battery, indoor GPS alternative

BLE (bluetooth low energy)

require line of sight to read, can only identify one type of item, can only read individually, can't be updated, can't be read if the code is damaged or dirty, require manual tracking and can be human error

Barcode

broadcasts a UUID every 100 milliseconds, immediate, have to be within a few feet, radio transmitters (not accurate)-- can absorb different media ex Disney key

Beacons

came from bitcoin, any digital transaction limitless possibilities, no longer need a centralized clearing house to manage transactions, uses a distributed ledger to verify transactions, uses cryptocurrency-- CANT GO BACK AND CHANGE

Blockchain

Attention your brand gets across all social medial over specific time period; impressions, likes, shares

Brand Awareness

Contained on a microprocessor, brain of the computer, rated by clock speed.

CPU (central processing units)

part of RAM, provides faster data accessing and processing capabilities than RAM

CPU memory cache

Cascade Style Sheet// separates content from style// formats the content

CSS

Known as GDPR (EU general data protection regulation) law for California

California Consumer Privacy Act (CCPA)

2018 breaches that compromised users on facebook, facebook wanted to know who peoples friends were and would give it to amazon and Microsoft which would allow them to get their emails just off their friends

Cambridge Analytica (facebook)

resists disclosure of educational records

Family educational rights and privacy act (FERPA)

(attributes) every table consists of fields, first name, last name, email

Fields (in class)

A large, expensive, powerful computer that can hand billion of transactions per day-- heavy in the banking community

Mainframe

________ computers are not nearly as powerful as supercomputers, but are capable of great processing speeds and data storage and occupy specially wired, air-conditioned rooms.

Mainframe

means all info (bits and bytes) are packed into small things-- internet is called a ____ switch network

Packets

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________.

Parallel processing

------ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

Phishing

________ operating systems control a single desktop or laptop computer.

Stand alone

Hides a message inside something else making it not obvious

Steganography

Which of the following is not a system software program type?

Storage

type of data that is highly organized and manageable; excel files

Structured data

Which of the following is not a type of scanning device?

Stylus

In this phase of the systems life cycle, the new information system is installed, and people are trained to use it.

Systems implementation

Transmission control protocol-- guarantees delivery of data-- parent protocol

TCP

IPv6

A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion.

Responsibility of those who collect data

Accuracy

Which of the following is not malware?

Ad-Aware

SDLC Design Phase

Aquire hardware and software if necessary, develop details of system

how people make money off open source?

As a developer and as a consult

Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services.

executive support systems (ESS)

A LAN set up for a household's personal use is called a ________ network.

home

________ are graphic representations for a program, type of file, or function.

icons

These programs are used to create and edit vector images

illustration programs

What documentation shows the income, expenses, and difference between them for a company during a specific time period?

income statements

A(n) ________ database is a collection of integrated files primarily used by just one person.

individual

In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server.

individual

Effective operation within any organization requires an efficient and coordinated flow of ________ throughout the organization.

information

analysis-- what is likely to happen in the future based off what happened in the past

predictive analysis

the collection of data about individuals

privacy

The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as ________ rights.

processing

A ________ is a list of instructions for the computer to follow to accomplish the task of processing data into information.

program

Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.

program flowcharts

Software is another name for ________.

programs

relates to who owns the data

property

All communications between a company's internal networks and the outside world pass through this server.

proxy

permissionless, means everyone can participate and contribute to the ledger

public chains

The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL).

query-by-example

Hybrid data; email, forms and tweets

semi-structured data

In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?

sending and receiving devices

Has more power than a PC and has multiple types like Web, Mail, Game, and file

server

WIndows server, Mac OS server, Unix, Linux

server OS

looking in store and buying online

showrooming

The most widely used handheld computers are ________.

smartphones

Why open source?

social benefits, freedom, security, community

Programming is also called ________ development.

software

<html> <head><title></title></head> <body></body> </html>

structure of a document

_______ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.

structured

four major types of data

structured, unstructured, semi-structured, geospatial

An important aspect of the preliminary investigation phase is to ________.

suggest alternative solutions

The fastest and most powerful computer that processes a quadrillion instructions per day-- used by the national government and NASA

supercomputer

is one key (key that locks and unlocks door), not as secure, but it is faster

symmetric cryptosystems

What are the two major software types?

system software and application software

The ________, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

system unit

Gathering and analyzing data is part of this phase

systems analysis

The ________ report describes the current information system, the requirements for a new system, and a possible development schedule.

systems analysis

athering and analyzing data is part of this phase.

systems analysis

A(n) ________ is a collection of related records.

table

________ make up the basic structure of a relational database with columns containing field data and rows containing record information.

tables

When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility.

technical

volatile

temporary

The title element defines text that will display on the title bar of the web browser, Important for search optimization

title tag

SDLC operation, support and security phase

to provide ongoing assistance for an information system and its users after the system is implemented

This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization.

top management

________ systems help supervisors by generating databases that act as the foundation for other information systems.

transaction processing

4 principles of WCAG

. Perceivable: presentable to users 2. Operable: all functionality available from a keyboard 3. Understandable 4. Robust: can be interpreted by a wide variety of user agents (those with disabilities) including assistive technology.

1956, it is an IBM supercomputer, 5mg of storage and was about a ton, with a cost of 160000

305 RAMAC

Cellular services use ________ to provide wireless connectivity to the Internet for smartphones.

3G and 4G cellular networks

A(n) ________-bit-word computer can access 8 bytes of information at a time.

64

Bits and Bytes

8 bits= 256 values, or one byte

________ programs guard your computer system against viruses or other damaging programs that can invade your computer system.

Antivirus

IaaS (Infrastructure as a Service)

A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers.

Transistor

A small electronic device used in a circuit as an amplifier or switch.

responsible for promoting ethical conduct Among computing professionals by publishing the ACM code of ethics

ACM

americans with disabilities act—forbids discrimination on the basis of a physical or mental disability if the individual can perform "essential function" of the job.-- 1990

ADA

1969-- times a or war-- how do you get continuous communication--Stanford, UCLA, UC Santa Barbra, and U of Utah all 4 were on this internet and if 1 network went down, the others wouldn't

ARPANET

Responsibility of those who control and use the data

Access

Elastic compute cloud (Iaas or Paas) provides resizable compute capacity in cloud and reduces time

Amazon EC2

SaaS (Software as a Service)-- secure durable and scannable, low cost

Amazon S3

Simple Storage Service (SaaS) - fixed amount

Amazon S3

UNIX

An operating system originally conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974, the UNIX code was rewritten in the standard programming language C. Today there are various commercial versions of UNIX.

a Buisness activity that creates value with the assistance of networking and telecommunication technology, conducting Buisness through virtual meetings and is bigger than commence

Buisness

The processing speed of a microprocessor is typically represented by its ________.

Clock Speed

users can have access to applications or computing resources from anywhere through connected devices

Cloud computing

The actual connecting or transmission medium that carries the message in a communication system is called the ________.

Communication channel

________ indicates a monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.

Contrast ratio

Small data files that are deposited on a user's hard disk when they visit a website are called _______.

Cookies

multicore processor-- Mac OS and windows

Cores

is crypted message that is all jumbled up - Cryptography uses "keys" • A key is a piece of information used in the scrambling process - Methods for transforming information in order to hide its content • Substitution - • Transposition - • Concealment - • Frequency count - the amount of times letters appear (EX. the letter "e" appears 12% of the time while "x" is .2% of the time)

Cryptography

________ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

Cyberbullying

A service that uses existing phone lines to provide high-speed connections is called ________.

DSL

________ uses standard telephone lines to provide high-speed connections.

DSL

Once data is in the warehouse, then you can make a dashboard; pulling all data form and excel sheet and a variety of other places. example: side arm sports

Dashboard

contains attributes and characteristics for all tables (metadata)-- table name, attribute name, type, length, key

Data dictionary

a tool that graphically shows the flow of data in a system

Data flow diagram

how a database is organized

Database schema

a large interconenctive data place that has a variety of systems-- taking data that is typically scattered throughout many apps and systems in a variety of formats

Datawarehouse

Synchronized records-- every participant keeps a copy of these transactions and they are secure by encryption to prevent tampering- can't change the past

Decentralized Ledger

separating the values in each row with a specific character- most spreadsheet or database apps are able to import or export data in a delimited format

Delimited files

Attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data

Denial of Service (DoS)

Analysis that says what happened and why

Descriptive analysis

Window, Mac OS X, Unix , linux, Chrome OS

Desktop OS

In many application programs, this feature is used to provide information or request input.

Dialog boxes

________ provide additional information and request user input.

Dialog boxes

________ cash is the Internet's equivalent to traditional cash.

Digital

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

Digital Millennium Copyright Act

another name (allious) for an IP address getting routed to a server

Domain Names

Product review/ tech review, customer references, legal review, market analysis

Due Diligence

Made the RDBMS in 1970

E. F. Codd

________ systems are also known as knowledge-based systems.

Expert

considerations of a person

Facebook algorithms: Predictions

Generated only by websites you are visiting

First party cookies

Your own data straight from the most valuable source; existing marketing campaigns, website analytics

First party data

when a primary key of one table is used in another table to build a relationship in the second table

Foreign key

formula: 4+3 Function: Sum()

Formula vs functions

Start and shut down a computer/ manage memory/ establish an internet connection/ automatically update

Functions of operating systems

Friends and family, loan, angel investor, crowdfunding, venture capital

Funding options

256 color pixels used for clip art and low res photos but is small in file size

GIF

a popular tool used to plan and schedule the time relationships among project activities

Gantt chart

includes info on positions

Geospatial Data

Protects personal finance info

Gramm leach Bililey act

________ is the component of the information system that is described as the equipment that processes data to create information.

Hardware

The head element contains information about the Web page. Important for search engine optimization

Heading tags

Protects medical records

Health instance portability and accountability act (HIPAA)

Created the Mark 1 in 1944-- Harvard Professor

Howard aiken

HTML stands for

Hypertext Markup Language

HTML stands for ________.

Hypertext Markup Language

Responsible for managing and coordinating the domain name system, delegates control over each TLD to a domain name registry

ICANN

cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed

IaaS

________ is the illegal assumption of someone's identity for the purposes of economic gain.

Identity theft

Create- use of sensors to gather info, Communicate- transfer from one place to another, Aggregate- gather info from one of more sources at one or more time, analyze- look for patterns, act- create change

Information Value loop

spread of fake news

Information Warefare

Russian linked propaganda tied to the 2016 presidential election, more than 140 million users were exposed.

Internet research agency

supports millions of color pixels and is used for photos. Largest file size

JPEG

1991-- Linus Torvald- resembles UNIX but was developed independently- open source software

Linux

Which of the following is not a popular cloud suite or online office suite?

Lotus Symphony

________ ports are a special type of port for connecting musical instruments to a sound card.

MIDI

A free web based distance learning program designed for the participation of large numbers of geographically dispersed students

MOOC (Massive open online course)

1944-- one go the first computers analogue (digital)- massive device and very slow-- made my howard Aiken

Mark 1

Google android and apple OS

Mobile OS

Java, Objective C, JavaScript, Swift

Mobile languages

Number of transistors on an integrated circuit doubles every two years and cost decreases-- made in 1965 by Gordon Moore

Moore's Law

These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.

Multitouch

uses same frequency as RFID high frequency-- usually requires communication within 5 cm, 2 way communication-- Apple Pay

NFC ( Near- field communications)

the study of manipulating matter on an atomic/ molecular level

Nanotechnology

________ operating systems are used to control and coordinate computers that are linked together.

Network

as small as a GIF but offers a lot more color options. A high res photo w transparency

PNG

the enforcement body of title IX-Educational institutions are required to accommodate students with disabilities. They can lose federal funding for not abiding (violating Section 504).

Office of civil rights

_____ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization.

Operational

Laptops and desktops used by one person at a time

PC (personal computer)

enables someone to summarize a lot of data

Pivot Tables

________ do not use streaming technology and are used to download media files to your computer.

Podcasts

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:

Presentation software

a unique field for each table (student ID number)

Primary Key

network made of unknown participants

Private chains

the process of planning, scheduling, and controlling the activities during system development

Project management

what data do we have can we use it how can we drive value from date what other data should be have

Questions to ask about data

Which of the following is not an example of secondary storage?

RAM

Which of the following will not retain data after the computer is turned off?

RAM

Which one of the following is not considered a form of secondary storage?

RAM

Hold data that CPU is currently processing; volatile and is lost when computer is turned off

RAM (random Access memory)

can be read without a line of sight, multiple tags can be read at the same time, can cope with harsh environments, can identify a specific item, new info can be over written, can be tracked so there is no human error

RFID (diff than barcodes)

a system which transmits the identity of an object or person wirelessly using radio waves

RFID Technology ( radio frequency identification)

Malicious software that encrypts your computers data and ransoms the password to the user

Ransomware

Trade data sets with a partner- doesn't come from many sources and you don't have to pay

Second party data

(rows) collection of related fields in the database

Records

1st formal law that supported equality & rights of individuals with disabilities

Rehabilitation act of 1973

data is organized in tables related by common fields; most widely used database model; identify the purpose, determine the tables and fields, assign the fields to a table and reorganize as needed to minimize redundancy-- data storage, data transformation, security management

Relational Database Model (RDBMS)

SDD V HDD

SDD is faster HDD is larger

title tag is important

SEO

Secure Sockets Layer Transport Layer Security encrypts data, defines route fo packets to take

SSL/TLS

computing environment where an Internet server hosts and deploys applications

SaaS

distribution model-- software hosted by a service provider and licensed for the use by the user-- Fast

SaaS (software as a service)

PHP, ASP.Net, JavaScript, Ruby, Python

Server Side

________ are cell phones with wireless connections to the Internet.

Smartphones

A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch-sensitive screen, is called a ________.

Tablet

IPv4

The dominant protocol for routing traffic on the Internet-- ran out of domains

________ systems help supervisors by generating databases that act as the foundation for other information systems.

Transaction processing

All of the following are true of DVD-ROM drives except:

They are also known as erasable optical discs.

Generated by an advertising company that is affiliated with the website you are visiting-- also called tracking cookies

Third party cookies

These are used by advertisers to keep track of your web activity as you move from one site to the next.

Third party cookies

you pay a broker in exchange for data collected from broad sources

Third party data

________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver

Trojan horses

5 Gbit/s Universal Serial Bus

USB 3

More than 100,000 characters Universal Character Set Includes ASCII

USB- C

1991-- Mark Weiser-- constant availability and completely connected- exists everywhere- computers are widespread and readily available, seem to be everywhere

Ubiquitous computing

Most popular Linux version, main goal is security, makes money off support

Ubuntu

________, also known as mini notebooks, are lighter and thinner with longer battery life than most laptops

Ultrabooks

structure is not formally defined or anticipated; images, audio and video

Unstructured Data

analysis of data

Velocity

uncertainty

Veracity

________ are used to edit videos to enhance quality and appearance.

Video Editors

________ memory uses the hard drive to substitute for RAM.

Virtual

________ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

Virtual private networks

takes a computer and virtualizes it so it looks like multiple computers-- green option

Virtualization

how much you have

Volume

The 4 V's of Big Data

Volume, Velocity, Variety, Veracity

1967-- encourage and promote the protection of intellectual property throughout the world

WIPO

This version of the web evolved to support more dynamic content creation and social interaction.

Web 2.0

An international community that develops open standards to ensure long-term growth of the web.

Web Content accessibility guidelines

WiMax stands for ________.

Worldwide Interoperability for Microwave Access

open wireless standard to provide a foundation for the IoT, Nonprofit, Promoted as: reliable, low power, scalable, secure, and global

Zigbee

information system

a set of hardware, software, data, people, and procedures that work together to produce information

4 main computing functions

accept input, process input, produce output, storage

The size, or ________, is measured by the diagonal length of a monitor's viewing area

active display area

battery powered, improved operating range, cost more, range is greater than

active tags 100 meters

3D printers, also known as ________, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

additive manufacturing

add all times a post was shared, divide by followers, multiply by 100

amplification rate

A(n) ________ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

app

add up the number of likes on a post, divide by followers, multiple by 100

applause rate

uses 2 keys - is more secure - Public and Private key • Public key - give to anyone • Private key - key that is hidden

asymmetric cyrptosystem

a broad term for datasets so large or complex that traditional data processing applications are inadequate

big data

Caesar shift, number as a key, words as a key

caesar ciphers

The most basic logical element of data is a ________.

character

Integrated circuits typically are mounted on ________, which are then plugged into the system board.

chip carriers

Apple's Mail and Microsoft's Outlook are examples of a ________.

client based email system

HTML, CSS, JavaScript

client side

_______ computing provides access to software, programs, and data from anywhere through an Internet connection.

cloud

With ________, or online storage, you can access your files from any computer with an Internet connection.

cloud storage

One of the six steps of programming is writing the program, also called ________.

coding

Access to these databases is offered to the public or selected outside individuals, for a fee.

commercial databases

if excel is red, you are under with money, if green, you are above with money-- allows you to set rules for cell formatting

conditional formatting

SDLC Analysis Phase

conduct preliminary investigation, preform detailed analysis activities: study current system, determine user requirements, recommend solution

SDLC Implementation Phase

construct the new or modified system and then deliver it

These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.

coprocessors

This is a legal concept that gives content creators the right to control use and distribution of their work.

copyright

This type of computer criminal creates and distributes malicious programs.

cracker

A type of specialty processor devoted exclusively to protecting your privacy.

cryptoprocessor

When evaluating a website's content, whether or not the information is up to date is considered part of the ________ element.

currancy

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

dictionary attack

________ show the data or information flow within an information system; the data is traced from its origin through processing, storage, and output.

data flow diagrams

________ is concerned with protecting software and data from unauthorized tampering or damage

data security

Information collected by an organization from a variety of external and internal databases is stored in this special type of database.

data warehouse

unscrambling information to restore it to its original form

decrypting

types of analytics

descriptive, predictive, prescriptive and discovery

types of operating systems

desktop, server, mobile

Which of these is not an example of solid-state storage?

digital versatile disc

analysis where you find something important out

discovery analysis

This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.

disk caching

________ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.

disk caching

In a(n) ________ database, not all the data in a database is physically located in one place.

distributed

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?

eSATA

infrastructure and data that allow one or more types of online or electronic transactions

ecommerce

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

employee monitoring software

scrambling information so it isn't readable until decrypted

encryption

how they decide what add pops up, facebook says that the typical person has about 1500 stories that could show up time you visit your feed , can show up faster than one can consume it

facebook algorithm

heavy favor activity, more people share- the more relevant, reacting: happy sad, look at active and passive activity

facebook algorithm: Signals

How much content

facebook algorithm: inventory

In a network database, a node may be reached through more than one path with the help of ________.

pointers

"Wiki" comes from the Hawaiian word for ________.

fast

A(n) ________ is a group of related characters.

field

________ programs scan files for ways to reduce the amount of required storage.

file compression

Program ________ graphically present the detailed sequence of steps needed to solve a programming problem.

flow charts

people logging into a server

game server

A network ________ is a device that allows one LAN to be linked to other LANs or to larger networks.

gateway

involves reducing the electricity consumed and environmental waste generated when using a computer; strategies 1) recycle 2)use energy efficient hardware 3)extend life of the computer 4)virtual computing

green computing

A(n) ________ decision support system is used to support collective work.

group

________ use(s) rigid metallic platters to store programs and very large data files.

hard disks

A ________ occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface.

head crash

In a(n) ________ database, any action on one element immediately affects the elements related to it.

hierarchical

Tracks are divided into invisible wedge-shaped sections called ________.

sectors

collect and sell personal data-- largest one is Acxiom: go out and buy data to get info and buying public records and create a profile so you can look up specific features

information brokers

People that collect and sell personal data are called ________.

information resellers

If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________.

integrity

how data is used from chips and sensors to drive various Buisness processes, enable new applications and service customers

internet of things

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

internet scam

________ printers use a technology similar to that used in a photocopying machine.

laser

This type of error could be the result of the programmer making an incorrect calculation.

logic

This logic structure involves repeating a sequence as long as a certain condition remains true.

loop

why move to cloud computing?

lower cost for operations, better compete and address market demands, lower downtime; high performing applications, always up to date, security

email and gmail has to have many web names in this server

mail server

Most organizations spend more time and money on the systems ________ phase than on any of the other phases.

maintenance

software designed to infiltrate or damage a computer system without the owners consent (virus and worms)

malware

Pricing, promoting, selling, and distributing the organization's goods and services pertain to which of the following functions?

marketing

A ________ network topology does not use a specific physical layout, but requires that each node have more than one connection to the other nodes.

mesh

Twitter is an example of what type of site?

microblog

Which among the following is considered a line-of-sight communication medium?

microwave

Special web browsers, called ________ browsers, are designed to run on portable devices such as smartphones and tablets.

mobile

Add-on programs for a variety of mobile devices, including smartphones and tablets.

mobile apps

main circuit board of the system unit; controls communication for the entire computer; all the components, and device connect to the motherboard

motherboard

don't just rely on usernames and passwords- passwords are compromised at all times-- something you know, something you have, something you do

multi factor authentication

In a(n) ________ database, a node may be reached through more than one path with the help of pointers

network

Windows Server is an example of a(n) ________ operating system.

network

This device enables connectivity between two LANS or a LAN and a larger network.

network gateway

Storage that retains its data after the power is turned off is referred to as ________.

nonvolatile storage

non- volatile

not temporary

Which of the following is true about an internal hard disk?

often stores the operating system

when someones code is published and people can fix it up and don't have to pay

open source

Activities in the program maintenance area fall under two categories: ________ and changing needs.

operations

hree common storage options discussed in your text are hard disk, ________, and solid-state storage

optic disk

doesn't need a battery for power, activates itself and transmits data using power generated by radio waves from the RFID reader, usually less then 3 meters

passive tags

Hard disks store and organize files using all the following, except ________.

paths

A ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.

personal

In general, the pilot and ________ approaches are the most favored conversion approaches.

phased

planning, analysis, design, implementation, Operation support and security

phases of SDLC (system development life cycle)

________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.

phishing

The scenario wherein many files about the same person exist across different departments within an organization is called data ________.

redundancy

This type of database is organized into many tables with common data items (key fields) linking the tables to one another.

relational

SDLC Planning Phase

review project requests, prioritize project requests, allocate resources, form project development team

These organize commonly used commands into sets of related activities.

ribbons

The ________ activity records the customer requests for products or services.

sales order processing

A ________ engine is a specialized program that assists you in locating information on the web and the Internet.

search

The ________ compares your entry against its database and returns the result, a list of sites on that topic.

search engine

a civil rights law prohibiting discrimination against individuals with disabilities by federally assisted programs or activities

section 504

Requires that the federal government provide individuals with disabilities access to electronic information and information technology at a level comparable to that enjoyed by others

section 508

HTTP (Hypertext Transfer Protocol)

the protocol used for transmitting web pages over the Internet, web browser communications with the server

Which among the following would not be described in the systems analysis report?

the training requirements for users

________ printers are widely used with ATMs.

thermal

________ is a term relating to sending data to a satellite.

uplink

Simple Mail Transfer Protocol (SMTP)

used to send outgoing email

An external hard disk _______.

usually connects to a USB or Thunderbolt port

different forms of data

variety

migrate through networks and attach to different programs

virus

The five types of personal computers are: desktops, laptops, tablets, smartphones, and ________.

wearable

________ email systems do not require an email program to be installed on your computer.

web based

Looking online and buying in store

web rooming

a lot of people can use this server at once

web server

________ allow computers to be connected without cables.

wireless network cords

fills the computer with self replicating info

worms

In the URL "http://www.simnetonline.com," what is the domain name?

www.simnetonline.com


Set pelajaran terkait

Intro to Business Final Exam EHS, EHS Final Exam, Business Management Final EHS, Final Intro to Business EHS, Intro to Business EHS

View Set

Principles of Computer Programming: Data Representative & Algorithm

View Set

Faith Bible Institute: Angels Elective

View Set

Сучасні технології навчання

View Set

Global | Ch 8 - Corporate Strategy & Vertical Integration and Diversification

View Set