• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/221

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

221 Cards in this Set

  • Front
  • Back
Windows Explorer
PROGRAM TO ORGANIZE AND MANIPULATE FILES STORED ON YOUR COMPUTER
File shredder software
permanently deleting- overwrites empty sectors with random 1's and 0's- good for when you are donating your computer
Gateway
any software or device used to join two networks
Bandwidth
transmission capacity of a communications channel- Broadband and Narrowband
Narrowband
Less capacity- internet and DSL
Broadband
^ capacity- cable, tv, DSL
PAN
Personal Area Network- wireless connection (30 feet) Example comp --> printer
LAN
Local area network- wireless single building
MAN
Metropolitan Area Network- public high speed (50 miles)
WAN
Wide Area Network- large area usually consists of smaller networks
Server-client
computer on a network + supplies with data. Client (responding to web page) requests data
Mainframe
Large and $$- simultaneously processing data for 100's or 1000's users- Business or government buildings (security) Is 6.5 feet tall 2,807 pounds $100,000 to one milly
Data
Symbols that represent people, events, things, ideas, names, #, colours, notes
Digital
1's 0's- text, #, sounds, graphics videos being converted. Example light switch going on and off
Analog
represents an infinite scale of values "dimmer"
Numeric Data
arithmetic operations binary code 0-1
Character Data
letters, symbols, numerals, NOT arithmetic (name addy #)
ASCII
American Standard Code for Information Interchange- 7 bits/ char. A=1000001. Uppercase, lower, punctuation, numerals
Extended
8 bits- other graphic symbols
Unicode
16bit
Compiler
converts all statements in a program in a single batch and results in a collection of instructions (object code) is placed in a new file
Machine Language
list of codes for microprocessors instruction sets- directly executed by processors circuitry
Brute force attack
password cracking software- runs for days much more extensive than dictionary attack
Sniffing
Records network tracking
Phishing
hacker obtains ISP and banking info
Keylogger
Records users keystrokes and sends information to a hacker- forms malicious codes
Trojan
seems to perform one thing but does another- type of virus
ALU
Arithmetic Logic Unit- +/- logical operations. Comparing numbers to see if they are the same
Registers
holds data that is being processed
Control unit
fetches each instruction
Authentication Protocol
any method that confirms a persons identity using something the persons knows, is, possesses
Biometrics
fingerprint, retinal, facial feature recognition
User ID
Character, letters- unique identifier
Password
verifies a user id
Solid State Storage
aka flash memory, earasible/ RW- like a digital camera
LCD
Liquid crystal display- produces images by manipulating light within a layer of liquid crystals- Standard on notebooks
Resolution
# of horizontal and vertical pixels that a device displays on a screen
CD
Compact disc- 80 minutes. 700 MB
DVD
Digital video disc/ digital versatile disk 4.7 GB (4700 MB) 7x CD capacity
Optical storage
stores data as a microscoptic light and dark spots( pits) on the disc surface (lands) lighter areas
RAM
Random access memory- temporarily holds data- chips. small circuit "waiting room"
ROM
Read only memory- holds computer start up routine- single integrated circuit permanent! "hard wired instructions"
Linux Platform
can use on windows or PC
Serial processing
one instruction processed at a time
Pipelining
instructions can be processed before previous instructions are complete
Parallel Processing
Multiple instructions at a time
Peripheral Device
designates input, output, and storage equipment added to a computer system to enhance functionality
Form Factor
size and dimensions of a component (system board or a unit) portable or not
Digital Revolution
Computers and the internet- 1980's. 40's and 50s had calculators- 50s computers for WWII, 1976 personal computers
Bulletin Boards
comments and questions- 1st type of social scene
Chat groups
Exchange messages real-time
Blogs
personal journals for public access weblogs
Web
World Wide Web- linked documents, graphics, and sounds accessed over the internet. 2009 there were 231 million websites
Cyberspace
entities that exist largely within computer networks
Digitalization
process of converting text, #s, sounds, photos, and videos into data that can be processed by digital services (cameras)
Convergence
Several technologies with distinct functions form into one single product (phone with camera and music player- i've side (quality)
Open source
developing and licensing software in which source codes remain public to be improved and freely distributed
Input
typed, transmitted, submitted into a computer supplied by a person, environment, or computers Example: words or symbols
Output
the result produced by a computer
Data- processing
the symbols that represent facts, objects, ideas. Computer manipulate data representing= processing
CPU
Central processing unit- microprocessors to programs to perform task based on received data
Memory
holds data waiting to be processed, stored, or output
Storage
data left on a permanent basis- not needed immediately- switches from one task to another
PDA
Personal digital assistant- pocket sized appointment book
Application software
a set of computer programs that helps a person carry out a taks (create, edit, print)
System Software
help computer systems monitor itself in order to function efficiently
Operating System
(OS) Master controller for all activities, starting and locating files
Wi-fi
wireless network technology- standards compatible with the internet (Example IEEE 802.11)
Router
wireless access point includes routing circuitry, can connect wi-fi networks to the internet
Internet Backbone
"Spine" increases the capacity of communication links. Provide main routes for data traffic
ISP
Internet service provider- company
Modem
Converts data signals from computer to communications channels
TCP/ IP
Responsible for message transaction on the internet. TCP- transmission control protocol- breaks messages into packets. IP- internet protocol- address packets so they can be routed to the desired areas
Protocol suite
combos that work together.
TCP
Transmission Control Protocol- creates, connects, and exchanges data
IP
Internet protocol- provides unique address
HTTP
Hypertext Transfer Protocol- Exchanges information over the web
FTP
File transfer protocol- transfers files between local and remote computer hosts
POP
Post office protocol- transfers email
SMTP
Simple mail transfer protocol. Emails messages over the server
VOIP
Voice over internet protocol- voice conversations
Static IP
Permanent page
Dynamic IP
Temporary page
DNS
Domain name system- unique IP addy entered into a large database
Port
Virtual device- abstract concept that allows a computer to perform more than one type of service
Ping
Packet internet Groper- send signals to address and awaits reply and notification
Wimax
A portable modem- coverage is limited
Firewall
designed to filter out suspicious packets attempting to enter or leave a computer
NAT
Network address translation- process your router uses to keep track of packets and public and private IP addresses
Hypertext
Stores literary documents, links and allows comments
RSS
Really simple syndication. Delivers files called "feeds" from web sites to people
URL
Uniform resource locator. Begins with http://- it is a unique address
HTML
Hypertext Markup Language- set of specifications for creating documents that a browser can display as a web page- how documents should appear
DHTML
Dynamic hypertext markup language- more animated
Web crawler
aka Web Spider- automated to visit web sites
Cookies
Local shared object- collect and store personal data- many users delete or block
Keyword Stuffing
unethical manipulated keywords placed to gain increased ratings Ex. "sex" but nothing to do with sex
Phishing
Reveals informations- scams
Pharming
An exploit that redirects users to a fake site by poisoning a domain with a false IP address. Appears legit- this is a very sophisticated way
WMA
Window media audio
Resolution
Bitmap graphics- the quality of an image depends on resolution
Pixelated
Create new pixels by averaging colours nearby- Example- enlarging an image
JPEG
Joint phtographic experts group- graphics store true colours
GIF
Graphics interchange format- 256 colours
PIECES framework
This systems helps classify problems. P-Performance (when system does not respond quickly enough) I- Information (users info) E-Economies (costs- too much to operate) C-Control (authority) E-Efficiency (too many resources used?) S-Service (too difficult)
PERT
Program evaluation and review technique- Analyze and identifies the time needed to complete each task
RFP
Request for proposal- describes problems and requirements for solutions
RFQ
Request for quotation. Price on hardware and software
Data Type
Specifies a way that data is represented on a disk or a RAM. Numeric or characters- letters, #s, symbols
Logical Data type
aka Boolean yes/no data, true/false
Hyperlink
Stores URLs used to link a database to a webpage Example- music store--> musician
W3C
World Wide Web Consortium
Hierarchal Database
one -to-one, one-to many- relationships are linked in a hierarchal structure
Network database
relationships between record types -mesh like
XML
Extensible Markup language- similar to HTML- allows a developer to customize tags
NAT
Network address translation- modifies IP addy in IPv4 headers
Spoofing
Deception
Telnet
enables one computer to communicate with another
Piracy
copyright infringement of software- unauthorized copying
Network operating System
server/ client uses multiple clients to share resources
Disk Manager
Software Ms-dos- initially a hard disk- used in the 80's and 90's
Dithering
"noise" randomizes error- colour blending images
Hub
Computer network device- "usb" holds many at once
MIS
Management information technology- department
Modulation
contains information that is to be transmitted in one or more wave forms
Syntax
Programming languages- grammar rules
Syntax Error
when an instruction does not follow the rules or grammar of a programmed language
Low level language
instructions of the lowest level of computer hardware
High level language
does the work of multiple low level commands
Assembly language
codes opposed to 0's and 1's- OP codes (abbreviated words)
Runtime Error
A program bug- shows up when you run a program- can't execute
Logic Error
Error in the logic or design of a program
BPR
Business Process Redesign- improving a business by making radical changes
Convergence
Merging of digital technology. Example- cell phones playing music
Database
collection of data store on one or more computers
Record
holds data for a single entity- person, place, or thing
Field
holds one item of data relevant to a records categories
Relative Reference
Reference that can change B4 to B3. Example- if you deleted a column the row would move up
Absolute Reference
Never changes when you insert rows
Statistical software
Helps you analyze large sets of data to discover relationships and patterns- display and explore data virtually
Mathematical Modelling Software
tools to solve math, science, and engineering problems
Spreadsheets
rows and column of numbers in real life situations (excel)
Cell
contains a value, label, or formula
Value
# in a calculation
Label
describes data
Formula
works behind the scenes to tell a computer how to use contents of the cells in calculations
Word Processing
Microsoft word- replaced typewriters
Desktop publishing softwares
DTP -graphic design- Adobe
Web authoring
creating web sites- HTML tags
Format
the way that all elements on a document are arranged
Vector Graphics
a set of instructions for re-creating a picture
Rastering
superimposing a grid over images and determining the colour of each pixel
Tracing
locates the edges of objects in a bitmap im age and converts the resulting shapes into graphic objects
Wireframes
pop up tent- covered with surface texture and colour to create 3-D graphics
Rendering
the process of wireframes- colour to create 3-D graphic
DRM
Digital Rights Management. Protects products of the entertainment industry- copyrights holders to limit access to
Microsoft Windows
80% of personal computers
Mac OS x
Macintosh operating systems- Apple. X= ten- more sophisticated
UNIX
1969 AT&T Bell was dependable- there were many versions
File extension
File name extensions- separated from main name Example Paint.exe (exe is the extension)
File specification
aka path file name
Defragmentation Utility
Software tool rearranges files on a disk so they are stored in clusters
Detailed reports
inventory lists- organized lists
DSL
Digital Subscriber line- high speed internet connection- telephone lines
EBCDIC
Extended Binary Coded Decimal Interchange Code- represents character data- digital computers
Exception Report
Management generated- low inventory list
Function
Spreadsheet software built in calculation formation
Gantt Chart
Chart that depicts projects schedule by showing tasks as a bar on a chart
Magnetic Storage
Technology for recording data onto disks and tape by magnetizing particles of an oxide toasted surface coating
Malware
Malicious software- viruses and worms disrupt
Output
Results produced by a computer- music, graphs
Record Occurrence
A record that has been filled with data for a particular entity
RF signals
Radio frequency Signals- they broadcast and receive information via radio waves
SSL
Secure socket layers- uses encryption to establish secure connections between computers and web sites
Tracing
Locates edges of objects in a bitmap graphic image and converts the shapes into vectors
3G
third generation
Browser
Retrieving, presenting, traversing information
CMOS
Complementary metal oxide semiconductor- constructs and integrates circuits
Demodulation
extracting information from a wave electronic circuit
Control panel
views and manipulates basic system settings
Desktop publishing
creation of documents using a page layout skill
CSS
Content scramble system- digital rights management- encrypt and control content on DVDs
Information
collects, stores, processes data- organized
Mission statement
Organizes goals and how they will accomplish them
Organizational chart
hierarchy of employees in an organization
Strategic planning
long range planning and future goals
Tactical planning
what will be achieved in a year or less
Operational planning
day-to-day planning
TPS
Transaction processing system- ways to collect, process, store, display, modify or cancel transactions
Ad hoc report
a demand report- specifies information not available on scheduled reports
Exception report
information that is outside normal/acceptable ranges
DSS
Decision support system- helps people make decisions by directly manipulating data
Data Mining
Analyzing existing data to discover unknown useful information
Data warehouse
for data from more than one database
Record
collection of data files
Record type
fields- no data
User interface
combination of hardware and software that helps people and computers communicate
command line interface
requires users to type memorized commands to run programs and tasks
Graphical user interface
provides a way to point and click a mouse
Kernal
provides essential operating systems services- memory management and file access
Computer virus
attaches itself to a file, and reproduces and spreads to other files. It is the distribution of infected files
Trojan
Pretends to perform one action while really performing another and infecting your computer
Keylogger
records a users keystrokes- hackers use this
Antivirus software
looks for viruses
Vertical market software
automates specialized tasks in a specific market or business
Horizontal market software
generic- any business can use this
Software suite
collection of software sold as a single package (mic office)
EULA license
end user license agreement
3-d graphics
wideframes and are three dimensional
CAD
Computer aided design software- 3-D for architects and engineers- blueprints and product specifications (autocad)
presentation
tools you need
Client/ server mode
hierarchal structure- servers are at the top
peer-to-peer
workstations serve as clients and servers
Communications protocol
set of rules for transmitting data from one network to another
Ethernet
waves that provide options for transporting data over wireless networks
LAN devices (5) Star, Ring, Bus, Mesh, tree
Star- home networks- central connection point that links workstations. Ring- connects all devices in a circle- each one has two neighbours failure in one= all- this is not used often. Bus- connects all on a common backbone- stops with a terminator- performs poorly. Mesh- connects each device to manage many networks- used today! Tree- blend of sta and bus- used for school and businesses -refer to pics
Kilobyte, kilobit
1000- small computer file 1.024
Megabyte, megabits
Million- medium to large file- 1,048,576
Gigabyte, gigabit
Billion- storage capacity - 1 billion
Terabyte
Trillion
Petabyte
1000 trillion 2^50