MIS FINAL

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Design Phase consists of two major activities:

1. If necessary, acquire hardware and software. 2. develop all of the details of the new or modified information system.

Site license

A legal agreement that permits users to install software on multiple computers--usually at a volume discount

Registers

A processor contains small,high speed storage locations, called ____ that temporarily hold data and instructions -part of the processor not the memory or a permanent storage device

Another term for system unit?

Chasis

Automatic Update

Feature that regularly provides new features or corrections to the program.

Ergonomic Keyboard

Has a design that reduces the chance of repetitive strain injuries (RSIs) of wrist and hand. -recall that the goal of ergonomics is to incorporate comfort, efficiency, and safety in the design of the workplace.

tactile output

some input devices, such as a mouse, and mobile devices, such as a smartphone include____ that provides the user with a physical response from the device. example: users may sense a bumping feeling on their hand while scrolling through a smartphones contact list.

Disk Cache

sometimes called a buffer, consists of a memory chip on a hard disk that stores frequently accessed data, instructions, and information.

Motherboard

sometimes called a system board, is the main circuit board of the computer. -many electronic components, such as the processor and memory attach to it.

What is a receiving device

that accepts transmission of data, instructions, or information travel

Virtual memory

the operating system allocates a portion of the storage medium, such as the hard disk or USB flash drive, to function as additional RAM.

Clock speed

the pace of the system clock___, is measured by the number of ticks per second -the faster the__ the more instructions the processor can execute per second.

Booting

the process of starting or restarting a computer or mobile device

Procedural language

the programmer writes instructions that tell the computer what to accomplish and how to do it. -often called a third-generation language or functional language, a programmer uses a series of English-like words to write instructions. Example: ADD stands for addition.

Request for quotation(RFQ)

Identifies the required product. With an ___, the vendor quotes a price for the listed product.

in the fields

In a relational database, the only data redundancy(duplication) exists in the common columns(fields). The database uses these common columns for relationships.

Performance monitoring

Is a program that assesses and reports information about various computer resources and devices. Example: users can monitor the processor, disks, network, and memory usage.

A Buffer

Is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or an output device.

Compiler

Is a separate program that converts the entire source program into machine language before executing it.

ISDN

Is a set of standards for digital transmission of data over standard copper phone lines.

A DVD Rom uses all to achieve higher storage but

Making disk single-session

vaporware is NOT

Malware

A Worm

Malware that resides in active memory and replicates itself over a network to infect machines, using up the system resources and possibly shutting down the system.

True of tape?

No longer used as a primary method of storage.Instead, businesses use ___most often for long-term storage and back-up.

Main Circuit board of the system unit?

System Board

Expansion Bus

allows the processor to communicate the peripheral devices

Broadband

also called a digital modem, is a communications device that sends and receives data and information to and from a digital line.

Surge Protector

also called a surge suppressor, uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electric equipment. Absorbs small overvoltages-- generally w/out damage to the computer and equipment.

DOS is NOT

an operating system

ALU

another component of the processor, performs arithmetic,comparison, and other operations.

Operating system and tools

app softwares tools enable u to perform maintenance tasks

Back end

application that supports front end is sometimes called the ...

NOT true of relational database?

applications best suited are those who are organized in 3-D dimensions

What is NOT true of Biometric device?

are an unreliable method of identification and notification.

Search

attempts to locate a file on your computer or mobile device based on specified criteria.

what is the greatest problem with bus network?

bus itself might become inoperable. if that happens, the network remains inoperative until the bus is back in working order.

Green computing supporting

buy computer from retailer who will dispose of your old computer properly

Interpreter

by contrast, translates and executes one statement at a time. -reads a code statement, converts it to one or more machine language instructions, and then executes those machine language instructions.

Virtual Server

can be created and configured quickly, does not require a new physical server, and is easier to manage.

Host Computers

controls access to the hardware,software, and other resources on the network and provides a centralized storage area for programs, data, and information.

Data model

defines how users view the organization of the data. -it does not define how the OS actually arranges the data on the storage media.

digital communication

describes a process in which two or more computers or devices transfer data, instructions, and information.

Describes info system

five phases? -is a set of hardware,software, data, people, and procedures that work together to produce information. -support daily, short-term, and long-range activities of users in a company.

copy right

gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials. -protects any tangible form of expression.

Valid TLD'S

gov,org,net

Intel and AMD

now use a numbering scheme that more accurately reflects the processing speed of their chips. The leading manufactures of personal computer processor chips are___.

Response time

of a display refers to the time in milliseconds(ms) that it takes to turn a pixel on or off. range of displays range from 2 to 16 ms.The lower the number, the faster the___.

Power supply

or laptop AC adapter converts the wall outlet AC power into DC power.

What is term for latter option?

outsourcing

Malware

short for malicious software, consists of programs that act without a users knowledge and deliberately alter the operations of computers and mobile devices

Mail Server

Stores and delivers email messags

S in SQL stands for

Structured

Principle of least privilege policy

where users access privileges are limited to the lowest level necessary to perform required tasks.

Intel-Compatible

which have an internal design similar to intell processors, perform the same functions, and can be as powerful, but often are less expensive. (AMD)

Flatbed scanner

works in a manner similar to a copy machine except it creates a file of the document in memory instead of a paper copy.

FTP

(File transfer Protocol) is an internet standard that permits file uploading and downloading to and from other computers on the internet.

Kind of software designed to make users more productive

Application

RAM

(Random access memory) also called main memory, consists of memory chips that can be read from and written to by the processor and other devices. It is volatile, which means it loses its contents when the power is removed from the computer.

Expansion card

(adapter card) sometimes called____ or adapter board is a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.

Detailed design

-The activities to be performed include developing designs for databases, inputs, outputs, and programs. During ___of inputs and outputs, the systems analyst carefully designs every menu, screen, and report specified in the requirements. The outputs often are designed first b/c they help define the requirements for the inputs. Thus, it is very important that outputs are identified correctly and that users agree to them.

Paging

-The technique of swapping items between memory and storage is called___, is a time consuming process for the computer.

Full-back up

-copies all of the files on media in the computer -advantage=fastest recovery method. all files r saved -disadvantages=longest backup time

SSD advantages over traditional hard disks

-higher storage capacities -faster access times -faster transfer rates -quieter operation -more durable -lighter weight -less power consumption(leads to longer battery life) -less heat generation -longer life(more than 10 times longer)

System development life cycle

-is a set of activities used to build an information system. 1.Planning 2. Analysis 3.Design 4. Implementation 5. Support and Security

Graphical user interface

-most users today work with this. -you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.

Validation checks

-sometimes called validation rules, reduce data entry errors and thus enhance that data's integrity.

Access provider

...

Bundle

...

Line printers and dot-matrix printers

...

Magnetic Media

...

Performance monitor

...

Program Management

...

Square-shaped

...

Transferring Hems from memory to storage media

...

Uninstaller

...

periods

...

About__% of e-waste is recycled?

20

Software suite

A collection of individual applications available together as a unit.

What is a Steering Committee?

A decision-making body in an organization.

Anti-Spam

A filtering program that attempts to remove spam before it reaches your inbox or forum.

Pop-up Blocker

A filtering program that stops pop-up ads from displaying on webpages.

Project request

A formal, written request for a new or modified information system.

Image

A pixel is a single point in an electronic image.

LINUX

A popular, multitasking UNIX-based operating system that runs on a variety of personal computers,servers, and devices.

Instant messaging

A real-time internet communications service that notifies you when one or more of your established contacts are online and then allows you to exchange messages or files or join a private chat room with them.

Personal Firewall

A security tool that detects and protects a personal computer and its data from unauthorized intrusions.

uninstaller(2)

A tool that removes a program, as well as any associated entries in the system files.

Secure Site

A website that uses encryption techniques to secure its data

When data in a spreadsheet program is changed, what occurs?

All calculations can be recalculated

Software

Also called a program,consists of a series of related instructions,organized for a common purpose, that tells the computer what tasks to perform and how to perform them. Categories are: system and Application

Paint software

An application that allows users to draw pictures, shapes, and other graphics with various on-screen tools such as a pen, brush, eyedropper, and paint bucket.

Image Editing Software

An application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images.

Digital Security Risk

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

For best performance bandwidth should be...

Bandwidth should be high latency low

Arpanet

Became functional in September 1969, Linking scientific and academic researchers across the US. (ARPA) an agency of the US department of defense. ARPA'S goal was to build a network that 1. allowed scientists at different physical locations to share info and work together on military and scientific projects. and 2. could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack.

E-Commerce uses

Business-to-Business

Sychronization

Calendar and contact management applications enable you to synchronize information. This means that all of your computers and mobile devices, along with your organizations server or cloud storage, have the latest version of any updated information.

Term for # of Bytes(characters) a storage medium can hold

Capacity

Vending Kiosk

Dispense item after payment is received. Examples include DVD rentals and license plate renewals.

MIDI

Connects to musical instruments(adapter cards)

Firmware(2)

Consists of ROM chips or flash memory chips that store permanent instructions.

User Interface

Controls how you enter data and instructions and how information is displayed on the screen.

Restore

Copy backed up files to their original location on a computer or mobile device.

Which is NOT file maintenance?

Deleting records

Hits

Depending on your search text, search engines may respond with thousands to billions of search results, sometimes called ...

CAD programs allow..

Designers to rotate designs of 3-D objects to view them from any angle. -CAD software is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.

Bus Width

Determines the number of bits that the computer can transmit at one time.

In a relational database...

Each row has a primary key and each column has a unique name. -A____is a database that stores data in tables that consist of rows and columns.

CPU,Processor,Centural Processing unit

Electronic Component that inturprets

NOT true of communications software?

Email FTP, and VOIP are examples of system software

Single user/single tasking

Embedded computer

Steps in Machine cycle?

Executing, Fetching, Storing, Decoding

Keyboard monitoring software

Few programs have criminal and beneficial purposes but______Also called keylogging software, fits these objectives. this software runs undetected and stores every keystroke in a file for later retrieval. -criminals us program to capture usernames and passwords -employers can measure the efficiency of data entry personnel. -verify employees are not releasing company secrets -Review hard disk files -check running programs -run detection software regularly

Tracks

Form circles on the surface of a hard disk. the disk storage locations are divided into wedge-shaped sections, which break the tracks into small arcs called sectors. several sectors form a cluster.

NOT guideline for designing database?

Here ARE the guidelines 1.determine its purpose 2.Examine the requirements and identify the entities(tables,files,or objects) involved. 3. identify the attributes(fields) for all the entities 4. identify the functional dependencies that exist among the attributes. 5.Use the functional dependencies to identify the entities. 6. identify any relationships between entities

Macro NOT true?

Here are things that ARE true -is a series of statements that instructs a program or app how to complete a task. -allow users to automate routine, repetitive, or difficult tasks in application software, such as word processing, spreadsheet or database programs. -users can create simple programs within the software by writing macros -usually create ___in one of two ways:1. record the___or 2. write the __. -if you want to automate a routine or repetitive task such as formatting or editing, you would record___.

NOT true of machine language?

Here is what IS true, -Known as the first generation of programming languages -is the only language the computer directly recognizes -instructions use a series of binary digits(1s and 0s) or a combination of numbers and letters that represents binary digits -coding in ____language is tedious and time consuming

What is JAD session?

Instead of a single one-on-one interview, analysts often use joint-application design sessions together data and information -or focus group,consists of a series of lengthy, structured group meetings in which users and IT professionals work together to design or develop an application

Green Computing

Involves reducing the electricity consumed and environmental waste generated when using a computer.strategies that support it include: recycling, using energy efficient hardware, and energy saving features.

Clip Art

Is a collection of drawings ,photos , and other images

Website

Is a collection of related webpages,which are stored on a web server.

Peripherals

Is a device you connect to a computer or mobile device to expand its capabilities. Examples include, a keyboard, mouse, microphone, monitor, printer, scanner, webcam, and speakers.

World wide web

Is a global library of information available to anyone connected to the internet.

Data warehouse

Is a huge database that stores and manages the data required to analyze historical and current transactions.

Visual programming language

Is a language that uses a visual or graphical interface for creating all source code.

Mainframes

Is a large, expensive, powerful server that can handle hundreds or thousands of connected users simultaneously.

Feasibility

Is a measure of how suitable the development of a system will be to the organization.

4GL programming language

Is a non procedural language that enables users and programmers to access data in a database. -one popular___is SQL

Mobile Computer

Is a portable personal computer, designed so that a user can carry it from place to place.

Uploading

Is a process of transferring files from your computer or mobile device to a server on the internet.

Normalization

Is a process that database developers use to ensure that data within the relations contains the least amount of duplication.

Embedded Computer

Is a special-purpose computer that functions as a component in a larger product. ___ are everywhere ---Consumer electronics, Home automation devices, Automobiles, Process controllers and robotics, Computer devices and office machines. Are usually small and have limited hardware.

Default Value

Is a value that the DBMS initially displays in a field. Example: if most students who attend the school live in Indiana, the DBMS initially could display IN in the state field.

Graphic

Is a visual representation of nontext information, such as drawing, chart, or photo.

Hotspot

Is a wireless network that provides internet connections to mobile computers and devices.

Internet

Is a worldwide collection of computer networks that connects millions of businesses,government agencies, educational institutions and individuals.

Project Management Software

Is an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project. Helps users manage project variables, allowing them to complete a project on time and within budget.

Presentation Software

Is an application that allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group.

Note Taking

Is an application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook. many also include a calendar feature.

Port Replicator

Is an external device that provides connections to peripheral devices through ports built into the device.

Javascript

Is an interpreted language that allows a programmer to add dynamic content and interactive elements to a webpage. These elements include alert messages, scrolling text, animations, menus, data input forms, pop up windows, and interactive quizzes.

Deliverable

Is any tangible item such as a chart, diagram,report,or program file.

Opensource Software

Is software provided for use, modification and redistribution. This software has no restrictions from the copyright holder regarding modification of the software's internal instructions and its redistribution.

Browser

Is software that enables users with an internet connection to access and view webpages on a computer or mobile device. ex. internet explorer, firefox, safari, and Google chrome.

Search Engine

Is software that finds websites, webpages,images, and videos, news,maps, and other information related to a specific topic.

Cyberxtortionist

Is someone who demands payment to stop an attack on an organizations technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organizations network if they are not paid a sum of money

Cyberterrorist

Is someone who uses the internet or network to destroy or damage computers for political reasons. The cyberterrorist might target the nations air traffic control system, electricity-generating companies or a telecommunications infrastructure.

Supercomputers

Is the Fastest,Most powerful computer-- and the most expensive. Capable of processing many trillions of instructions in a single second.

Pairing

Is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other.

VR(virtual Reality)

Is the use of computers to stimulate a real or imagined environment that appears as a three-dimensional space.

The purpose of the Implementation Phase

Is to construct, or build, the new or modified system and then deliver it to the users. Members of the system development team perform four major activities in this phase. 1. develop programs and apps 2.install and test new system 3.train users 4. convert to the new system

What is the key advantage of the Multidimensional database?

It can consolidate data much faster than a relational database.

Built directly on a processor chip

L2 Cache

Database analysts and Administrators

Managing a company's database requires a great deal of coordination. The role of coordinating the use of the data base belongs to ______. -ADMINISTRATOR=requires a more technical inside view of the data. Creates and maintains the data dictionary,manages security of the database, monitors the performance of the database, and checks backup and recovery procedures.

upward compatible

Meaning it may not run on new versions of the operating system.

What is storage media?

Media, such as hard disks, USB flash drives, memory cards, and optical discs, on which a computer keeps data, instructions, and information.

non volatile memory

Memory that does not lose its contents when power is removed from the computer.

Most computers today use comm and-line

NOT TRUE

Protocol as it applies to a network?

Network standards and protocols often work together to move data through a network. some of these standards define how a network is arranged physically, while others specify how messages travel along a network. thus, as data moves thru a network from one program to another, it may use one or more of these standards. -a standard that outlines characteristics of how 2 devices communicate on a network is called protocol. -specifically a protocol may define data format, coding schemes, error handling, and the sequence in which data transfers over a network.

Hard disk/SSD

Operating system; applications; user data and information, including photos, music and videos; backups SSD: is a flash memory storage device that contains its own processor to manage its storage.

Back up

Or copy, of the entire database should be made on a regular basis. -Some DMBS's have their own built-in___tools. others require users to purchase a separate ___program, or use one included with the operating system.

Email List

Or electronic mailing list, is a group of email addresses used for mass distribution of a message. Original use of them such as LISTSERV, allowed any subscriber to send a message, which created a discussion-type forum among all subscribers via email.

Internet Cable

POS terminal able to update inventory

Application Files

Programs designed to make users more productive and/or assist them with personal tasks.

Byte

Provides enough different combinations of 0s and 1s to represent 256 different characters. These characters include numbers, uppercase and lowercase letters of the alphabet, punctuation marks, and other keyboard symbols, such as asterisk (*), ampersand (&), dollar sign ($).

Software can be distributed to anyone to others at no cost?

Public-Domain

The hard disks

Read/write head. also called a hard disk drive, is a storage device that contains or or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.

Query language

Request for specific data -language used with databases that allows users to specify the data they want to display,print,store,update,or delete.

True of SSD's

SSD's have faster transfer rates

E-Commerce

Short for electronic commerce, is a business transaction that occurs over an electronic network such as the internet.

Purpose of IP address?

Short for internet protocol address, is a sequence of numbers that uniquely identifies the location of each computer or device connected to the internet.

Multimedia authoring software

Software that allows users to combine text, graphics, audio, video, and animation in an interactive application.

All-In-One

Some desktops called ___ , do not have a tower and instead house the screen and system unit in the same case.

what is a form?

Sometimes called a data entry form, is a window on the screen that provides areas for entering or modifying data in a database.

Data Dictionary

Sometimes called a repository,contains data about each file in the database and each field in those files.

Word Processing Software

Sometimes called a word processor, is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics. Major Advantage=it enables users to change their written words easily.

Archival

Sometimes called full back up, provides the best protection against data loss because it copies all program and data files.

Single-session

Standard CD-Rom

Document Management

System that allows for storage and management of a company's documents, such as word processing documents, presentations, and spreadsheets.

Plug and Play

Technology that gives a computer the capability to recognize peripheral devices as you install them.

System software

Term used to refer to the operating system and other tools that consist of the programs that control or maintain the operations of the computer and its devices.

System Clock

The processor relies on a small quartz crystal circuit called the ____to control timing of all computer operations. generates regular electronic pulses or ticks, that set the operating pace of components of the system unit

Access time

The amount of time it takes the processor to read data, instructions, and information from memory and the time required to deliver an item from memory to the processor.

network architecture

The configuration of computers, devices, and media in a network, sometimes called___, is categorized as either client/server or peer-to-peer.

Memory management

The purpose of ____ is to optimize the use of a computer or devices internal memory.

Internet Backbone

These major carriers of network traffic are known collectively as...In the US, the transmission media that made up the internet backbone exchange data and information at several different major cities across the country. That is, they transfer data information from one network to another until reaching the final destination.

which is true for thermal printers?

They are inexpensive, but the quality is low and images tend to fade

Not advantage of external hard drives

They leave data in the computer

Administrators

The person overseeing network operations, uses the server operation system to add and remove users, computers, and other devices to and from the network. -use these files to monitor computer usage

Decryption

The process of decoding encrypted data.

Mirroring

The simplest RAID storage design is level 1, called__, which writes data on 2 disks at the same time to duplicate the data.

5 GHZ

The system clock has a clock speed of 5 billion clock cycles per second

direct

The user stops using the old system and begins using the new system on a certain date. Advantage=It requires no transition costs and is a quick implementation technique. Disadvantage= It is extremely risky and can disrupt operations seriously if the new system does not work correctly the first time.

Skimmer

Thieves can capture a credit card number and pin by placing a BLANK on an ATM. A sophisticated BLANK is an entire panel placed directly on top of the ATM face and virtually is undetectable, but less-technical devices are false card readers secured to the card slot with double-sided tape and a hidden camera or an overlay on the keypad.

What is the Role of W3C?

To ensure the continued growth of the web. Nearly 400 organizations from around the world are members of W3C, advising, defining standards, and addressing other issues

Battery life based on

USAGE

Visual Voicemail

Users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.

Not true about mobile printers?

Usually connect to a firewire port

system test

Verifies that all programs in an application work together properly.

Time of unit test?

Verifies that each individual program an object works by itself.

Streaming

Where you access the media content whhile it downloads. For example, radio and tv broadcasts often use this media to broadcast music, interviews, talk shows, sporting events, news, and other segments so that you can listen to the audio or view the video as it downloads to your computer.

webpage

Which can contain text,graphics,audio,and video.

Force Feedback

Which is a technology that sends resistance to the device in response to actions of the user. example: in gaming the steering wheel vibrates or trembles, making the driving experience as realistic as possible. also used in practical training applications, such as in the military and aviation.

Netiquette

Which is short for internet etiquette, is the code of acceptable behaviors users should follow while on the internet; that is the conduct expected of individuals while online.

Backward compatible

Which means they support older USB devices as well as newer ones

Multimedia

Which refer to any application that combines text with media. Media includes graphics,animation, audio, video, and/or virtual reality.

Ethernet Port

Wire Graphics

smallest unit of data a computer can process

a bit

A Modem

a broadband modem-also called a digital modem, is a communications device that sends and receives data and information to and from a digital line. -DSL, IDSN, and cable modems

RAID

a group of 2 or more integrated hard disks

NIC

a network card, sometimes called a network interface card, is a communications device that enables a computer or device that does not have built-in networking capability to access a network.

Digital Divide

a term used to illustrate the gap between those with and without access to technology.

Integrated

circuit contains many microscopic pathways capable of carrying electrical current. -each ___ can contain millions of elements such as resistors, capacitors, and transistors.

NOT part of planning

conduct a preliminary investigation

Memory

consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data (information).

parallel conversion

consists of running the old system alongside the new system for a specified time. Advantage=can fix any problems in the new system before you terminate the old system. Disadvantage= It is costly to operate two systems at the same time.

Firmware

contain permanently written data, instructions, or information such as a mobile devices start-up instructions.

contrast Ratio

describes the difference in light intensity between the brightest white and darkest black that can be produced on a display. ____today range from 500:1 to 2000:1 . higher____represent colors better.

Google android is NOT

desktop os

What is the goal of internet?

develop and test advanced internet technology

pixel pitch sometimes called

dot pitch -is the distance in millimeters between pixels on a display.

RSS

enables web content to be distributed

Not true of Wifi?

even if 2 products are wifi certified, they must be on same platform

RAM

fastest transfer rate

Which is NOT a likely complaint from using computers?

high blood pressure

Completeness

if you are running a check to ensure__. validity check that verifies that a required field contains data.

NOT true about internet and network attacks?

information kept on an organization

Braille

instead of using a monitor, blind users can work with voice output. that is, the computer speaks out loud the information that appears on the screen. Another alternative is a _____printer, which prints out information on paper in braille.

Employee monitoring

involves the use of computers,mobile devices, or cameras to observe, record, and review an employees use of a technology, including communications such as email messages, keyboard activity(used to measure productivity), and websites visited. Many programs exist that easily allow employers to monitor employees. further, it is legal for employees to use these programs.

Wireless access point

is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network using wireless technologies such as wifi. -have high quality internal or external antennas for optimal signals.

What is database?

is a collection of data organized in a manner that allows access,retrieval, and use of that data.

Router

is a communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network. -can be used on a network of any size.

UPS

is a device that contains a surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. Connects your computer and a power source.

A data projector

is a device that takes the text and images displaying on a computer or mobile device screen and projects images on a larger screen so than an audience can see the image clearly. -low cost units-->LCD and DLP projectors

Optical reader

is a device that uses a light source to read characters,marks, and codes and then converts them into digital data that a computer can process.

Personal area network (PAN)

is a network that connects computers and devices in an individuals workspace using wired and wireless technology. -may connect devices thru a router using network cables or directly using special USB cables. -also may use bluetooth or wifi technology.

Spyware

is a program placed on a computer or mobile device w/out the users knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Front end

is a program that generally has a more user-friendly interface than the DMBS. -interacts with the DBMS, which in turn, interacts with the database.

Bot

is a program that performs a repetitive task on a network

Phishing

is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.

Network Attached Storage(NAS)

is a server that is placed on a network with the sole purpose of providing storage to users,computers, and devices attached to the network.

peer-to-peer

is a simple, inexpensive network that typically connects fewer than 10 computers. Each computer called a peer, has equal responsibilities and capabilities, sharing hardware(such as a printer).

Multi-Core

is a single chip with two or more separate processor cores. -are used in all sizes of computers

Computer Chip

is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

HTML(Hypertext Markup Language)

is a special formatting language that programmers use to format documents for display on the web. -View a webpage written with ___ in a browser. -Is not actually a programming language. -it is a language that has specific rules.

Spoofing

is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.

interactive whiteboard

is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen, usually via a projector.

Touch Screen

is a touch-sensitive display device. are convenient because they do not require a seperate device for input.more popular as computers and mobile devices become smaller, leaving less room to connect external input devices, such as a keyboard or mouse.

Webcam

is a type of DV camera that enables you to capture video and still images, and usually audio input, for viewing or manipulation on a computer or mobile device.

Flash Memory

is a type of nonvolatile memory that can be erased electronically and rewritten.

Optical discs

is a type of storage medium that consists of flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. -store items by using microscopic pits (indentations) and lands (flat areas) that are in the middle layer of the disc.

Broadcast Radio

is a wireless transmission medium that distributes radio signals through the air over long distances such as between cities, regions, and countries and short distances, such as within an office or home.

Linux(2)

is an Open source OS, which means its code is provided for use, modification, and redistribution.

Microwave Station

is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications.

barcode

is an identification code that consists of either a set of vertical lines and spaces of different widths or a two-dimensional pattern of dots, squares, and other images. -represents data that identifies the manufacturer and the item.

user response

is an instruction a user issues by responding to a message displayed by a program or app. a response to the message instructs the program or app to perform certain actions. example: reply YES to a question "do you want to save changes"? the program saves the changes you've made.

Command

is an instruction that causes a program or app to perform a specific action. programs and apps respond to commands that a user issues. issue commands by touching an area on a screen, pressing keys on a keyboard, and clicking a mouse button to control a pointer on the screen, or speaking into a microphone.

Enterprise users

is category of users. Each employee or customer who uses computers,mobile devices, and other technology in the enterprise is an.

Output

is data that has been processed into a useful form. recall that computers process data (input) into information(__)

Database approach NOT true

is isolated data

Cross Platform application

is one that runs the same on multiple operating systems.

acceptance test

is performed by end users and checks the new system to ensure that it works with actual data.

Control Unit

is the component of the processor that directs and coordinates most of the operations in the computer. -has a role much like a traffic officer: it interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction. -arithmetic logic unit -registers,buses

Kernel

is the core of an operating system that manages memory and devices, maintains the internal clock,runs programs,and assigns the resources such as devices, programs, apps, data, and information. -is memory resident, which means it remains in memory while the computer or mobile device is running.

Validation

is the process of comparing data with a set of rules or values to determine if the data is correct.

Voice Input

is the process of entering input by speaking into a microphone. the microphone may be built in the computer or device, in a headset, or an external peripheral device that sits on top of a desk or other surface. -uses of voice input include instant messaging that supports voice conversions, chat rooms, that support voice chats, video calls, video conferencing. -part of a larger category called audio input.

Content Filtering

is the process of restricting access to certain material. many businesses use ____ to limit employees web access.

source program

is the program that contains the language instructions, or code, to be converted to machine language.

Transfer Rate

is the speed with which data, instructions, and information transfer to and from a device.

What is NOT a reason mobile device can be categorized as computer?

it can accept output

What is true about a computer?

its electronic components process data using instructions

Session Cookie

keep track of items in shopping cart

Home Network

many home users connect multiple computers and devices

Access time

measures 1. the amount of time it takes a storage device to locate an item on a storage medium or 2. the time required to deliver an item from memory to the processor. -access time of storage devices is slow, compared with the access time of memory.

Voice

noise-which is an electrical disturbance that can degrade communications

Energy star

personal computers, display devices, printers, and other devices should comply with guidelines of the ____program. the us department of energy (DOE) and the us environmental protection agency (EPA) developed the ____ program to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy-efficient devices. for example to sleep or power save mode after a specified number of inactive minutes or hours.

Controller

previously called a disk controller, consists of a special purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer. -may be part of the drive, may be on the motherboard, or may be a separate adapter card inside the computer.

Risks of using computers

privacy,environmental,health

Back door as it refers to computer crime is___?

program or set instructions that allows users to by pass security controls

VPN

provides the mobile user with a secure connection to the company network server, as if the user has a private line.

RFID standard

radio frequency identification -is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. -RFID reader, also called a transceiver, reads the radio signals and transfers the information to a computer or computing device. -ranges from 5 inches to 300 feet or more.

information privacy

refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.

intellectual property

refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.

Data integrity

reflects the quality of the data. -the more errors the data contains, the lower its integrity.

ADA(Americans with Disabilities Act)

requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers.

Machine-dependent language

runs on only one particular type of computer or device.

Hibernate mode do

save any open docs and programs to a hard drive before remaining power from computer drive

Spooling

sends documents to be printed to a buffer instead of sending them immediately to the printer.

DNS server identify which?

server translates the domain name to its associated IP address so that the request can be routed to the correct computer. Is a server on the internet that usually is associated with an ISP.

Disadvantage of all-in-one printer?

they are significantly less expensive than if you purchase each device separately. if the device breaks down, however, you lose all four functions, which is the primary disadvantage.

They restore the files

to back up a file means to make a copy of it. in the case of a system failure or the discovery of corrupted files, you ___by copying the backed up files to their original location on the computer or mobile device

Purpose of hubs and switches?

to provide central points for cables in a network.

How many peripheral devices can you connect w/USB port?

up to 127

large-format printer

using ink-jet printer technology, but on a much larger scale, a_____creates photo-realistic-quality color prints. Graphic artists use these high-cost, high-performance printers for signs, posters, and other professional quality displays.


Set pelajaran terkait

C7 Anti-Avoidance: Sec 84.1, Sec 55(2), GAAR

View Set

Chem 1110 Exam 1 Chapters 1 and 2

View Set

Chapter 3 Measures Of Central Tendency

View Set

Mexico Textbook Reading (Part 1)

View Set

BLS Section 3 Check your Knowledge

View Set

Data and Info. Management Chapter 8 (Marist College Eitel Lauria)

View Set

POS 455-001, International Relations- Dr. Scott Turner

View Set