info systems part 7

Ace your homework & exams now with Quizwiz!

Integrated case products, sometimes called I-CASE (Computer-aided software engineering) or a CASE workbench, include all of these capabilities?

-Project dictionary -Code generators -Diagrams and prototyping -Quality assurance

All of the following are required for video conferencing

-Video camera attached to your computer -Microphone -Speakers -Video conferencing software

All of the following are recommended defenses against botnets, DoS attacks, and spoofing

-implementing a personal firewall solution -never starting a computer with removable media in ports - installing an antivirus program and updating it frequently -setting the macro security program so you can enable or disable macros

Commonly used methods to retrieve and maintain data in a database include all of the following

-report generators and forms -query languages -query by example -report writer

Business software suites typically include all of the following programs

-word processing -spreadsheet -e-mail -presentation graphics

_____ enables users to write and print checks, track checking account activity, and update and reconcile balances on demand.

Accounting software; helps companies record and report their financial transactions. Newer accounting software supports online credit checks, billing, direct deposit, and payroll services.

A special kind of DSS, called a(n) ____, supports the strategic information needs of executive management.

An EIS (executive information system); presents information as charts and tables that show trends, ratios, and statistics.

_____ allows users to share documents with others in real time.

An online meeting; all participants see the document at the same time. As someone changes the document, everyone in the meeting sees the changes being made.

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the _____.

Business Software Alliance (BSA); approximately 840,000 Internet sites sell pirated software.

Using _____, engineers can test the design of a car or bridge before it is built.

CAE (computer-aided engineering); programs simulate the effects of wind, temperature, weight, and stress on product shapes and materials.

_____ software tracks leads and inquiries from customers, stores a history of all correspondence and sales to a customer, and allows for tracking of outstanding issues with customers.

CRM (customer relationship management); systems manage information about customers, interactions with customers, past purchases, and interests.

_____ is a certification that tests advanced knowledge of installing, configuring, and operating LANs and WANs.

Cisco Certified Network Professional (CCNP); Cisco is an industry leader in network technology and communications. The CCNP covers topics such as security, converged networks, QoS, VPN, and broadband technologies.

_____ is the delivery of education at one location while the learning takes place at other locations.

Distance learning (DL); courses use computers and other technologies to extend education from the classroom to anywhere students can access an Internet-connected computer.

When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.

Domain name servers (DNS) are organized as a set of independent, cooperative systems that are arranged hierarchically according to domain levels.

The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.

Electronic Communications Privacy Act (ECPA); prohibits access to stored communication or transmitted messages such as e-mail or voice mail without consent or a court order.

Many large companies use the words, ____, to refer to the huge network of computers that meets their diverse computer needs.

Enterprise computing; is the use of a series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures.

_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Ergonomics; Employees can be injured or develop disorders of the muscles, nerves, tendons, ligaments, and joints from working in an area that is not ergonomically designed.

____ uses the Internet, instead of the public switched telephone network, to connect a calling party and one or more called parties.

Internet telephony; uses a computer microphone, Internet telephone software, and the computer's sound card to digitize and compress audio over the Internet.

Some mailing lists are called _____, named after a popular mailing list software product.

LISTSERVs

On the Web, ____ involves the display of 3-D images that users explore and manipulate interactively.

Virtual reality (VR) is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

_____ is the process of collecting data from the Internet as a source for a data warehouse.

Web farming; Data warehouses use Web farming and click streams for external data sources.

A wireless portal is a portal specifically designed for _____.

Web-enabled devices; such as notebook computers, PDAs, and cellular phones use wireless portals to access a variety of Internet services from a single, convenient location.

CIM (customer interaction management) software _____.

assists support personnel in providing the best solutions for customers; manages the day-to-day interactions with customers, such as telephone calls, e-mail interactions, Web interactions, and instant messaging systems.

When using a search engine, use a(n) ____ after the search word to find plurals or variations of that word.

asterisk; at the end of a word substitutes for any combination of characters. For example: retriev* returns retrieves, retrieval, retriever, etc.

To "cut" involves removing a portion of a document and storing it in a temporary storage location, sometimes called a _____.

clipboard; An item that has been cut from a document is stored in the clipboard and can subsequently be pasted from the clipboard to a specific location in a document.

Entry-level jobs for graduating _____ students include database analyst, software engineer, systems programmer, computer technician, and computer consultant.

computer science (CS)

Many large businesses have _____ software, which allows the company to provide a personalized touch and customized service to its customers.

customer relationship management (CRM); manage information about customers, interactions with customers, past purchases, and interests.

A _____ is a special window that provides information, presents available options, or requests a response.

dialog box; Dialog boxes often contain option buttons, text boxes, check boxes, and command buttons.

The gap between those who have access to computers and those who do not is referred to as the ____.

digital divide; refers to a society in which those who do not understand computers will not be employable in today's workplace.

A _____ is a mathematical formula that can be used to encrypt and decrypt sensitive data.

hash; provides an encryption key, which the recipient of the data uses to decrypt an encrypted message. The key is a hash value that is computed using the original data and a hashing algorithm.

A ____ is an area with the capability of wireless Internet connectivity.

hot spot; Wireless users can connect to the Internet through a public Internet access point with an appropriate network card as long as they are in a hot spot.

The two main components of an expert system are ____.

knowledge base and inference rules; An expert system captures and stores the knowledge of human experts and then imitates human reasoning and decision making through a set of inference rules.

Many FTP sites require a(n) ____ to access files.

login name and password; Some FTP sites restrict file transfers to those who have authorized accounts on the FTP server. Many FTP sites have anonymous FTP, whereby anyone can transfer available files.

A popular Web-based type of discussion group that does not require a newsreader is a ____.

message board; Many Web sites have message boards, instead of newsgroups, because they are easier to use.

Examples of _____ are real estate agents, insurance agents, meter readers, package delivery people, journalists, consultants, and students.

mobile users; use notebook computers, Web-enabled PDAs, and smart phones to work while away from a main office or school.

A _____ installs, configures, and maintains LANs, WANs, intranets, and Internet systems.

network administrator; oversees all network operations, including installation of hardware and software, adding and removing users, and maintaining network security.

The _____ is the destructive event or prank a malicious-logic program is intended to deliver.

payload

In a grocery store, a(n) _____ is a combination of an electronic cash register, bar code reader, and printer.

point of sale (POS) terminal

When computer users _____ a document, the computer transfers the document from memory to a storage medium.

save; Once a document is saved, it is stored permanently as a file on a storage medium, such as a floppy disk, hard disk, or CD.

A(n) _____ allows the user to choose specific files to backup, regardless of whether or not the files have changed since the last incremental backup.

selective backup; is less time-consuming than a full backup and gives the user more control over which files to back up than a full, differential, or incremental backup.

A _____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount.

site license; are a means of providing a bulk rate to companies and schools that want to use software packages on many computers.

Hyperstudio is a multimedia authoring software application that allows users to create presentations called ____.

stacks; Multimedia-authoring software allows users to combine text, graphics, audio, video, and animation into an interactive presentation, called a stack.

A _____ works with the analyst, programmer, and user to create documentation and user materials.

technical writer; create documentation during all phases of system development for both internal and external use.

A(n) ____ is a group of processing steps that are treated as a single activity to perform a desired result.

transaction

A Web browser program allows _____.

users to access and view Web pages on the Internet

An integration test _____.

verifies that an application works with other applications; is performed during the implementation phase after unit and system testing.

A unit test _____.

verifies that each individual program works by itself; A unit test is performed during the implementation phase to test individual components of a system before integrating them.

When a mobile user connects to a main office using a standard Internet connection, a _____ provides the mobile user with a secure connection to the company network server.

virtual private network (VPN)

A _____ is a program that assists in the management and tracking of all the activities in a business from start to finish.

workflow application; Enterprises use workflow applications to assist in defining complex workflows, such as the workflow for the receipt of a customer support request.

The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems.

zombie; DoS and DDoS attack a computer(s) with the intention of disrupting service on the targeted system. The hacker accesses a computer, making it the master, and then the master uses the zombie to execute the attack.


Related study sets

Soil and Agriculture- Environmental Science

View Set

Lecture 3 - Chemical Reactions and Water in the Body

View Set

therapeutic groups chapter 33 (2)

View Set

Conceptual Physics--Chapter 3: Linear Motion

View Set