Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
126 Cards in this Set
- Front
- Back
this often involves a deliberate act that is against the law
|
intentional breach of computer security
|
|
any illegal act involving a computer generally is referred to as a _______
|
computer crime
|
|
the term _______ refers to online or internet-based illegal acts
|
cybercrime
|
|
examples of computer crime
|
1.computer theft of funds
2. Unauthorized entry into a computer system 3. stealing computer crime 4. stealing computer hardware or hardware theft |
|
4 safeguard techniques
|
1. user names and passwords
2. possessed objects 3. biometric devices 4. encryption |
|
defined as any program that runs on a computer without prior consent or knowledge of the user
|
rogue software
|
|
refers to a special password or code which is used to bypass the normal security measures of computer systems
|
back door or trap door
|
|
a program that can imitate another program in order to gather user information
|
chameleons
|
|
are programs which can destroy programs and/or data when a certain trigger is encountered;
|
logic bombs
|
|
commonly used by programmers in order to ensure payment of software
|
logic bombs
|
|
named after the greek myth
|
trojan horse
|
|
is a readily accepted by a suer because it presents itself as something useful
|
trojan horse
|
|
program which makes the keyboard act in a peculiar way
|
ANSI bombs
|
|
is a program that copies itself repeatedly, for example in memory or on a network using up resources and possibly shutting down the computer or network
|
worm
|
|
widely-distributed type of rogue software
|
computer virus
|
|
meaning of virus
|
Vital Information Resource Under Siege
|
|
a program that duplicates itself by infecting other programs
|
computer virus
|
|
protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files
|
Anti-virus program
|
|
is a hardware and/or software that protects a network's resources from intrusion by users on another network such as the internet
|
Firewalls
|
|
refers to the illegal use and/or distribution of copyrighted computer programs
|
software piracy
|
|
3 safeguards against software piracy
|
1. site license
2. shareware 3. freeware |
|
an agreement through the buyer of a software has the right to use the program on a given number of computers
|
site license
|
|
a program that is distributed free on a trial basis
|
shareware
|
|
the most effective strategy against software piracy because the programs are distributed for free; not as powerful as copyrighted software
|
freeware
|
|
the software developed by programmers which are distributed for free
|
public-domain software
|
|
moral guidelines that govern the use of computers and information systems
|
computer ethics
|
|
three forms of computer ethics
|
1. information accuracy
2. intellectual property rights (IPR) 3. information privacy |
|
2 basic categories of graphics
|
1. bitmap
2. vector |
|
cells are filled with one or more colors.
|
bitmap
|
|
another name for bitmap
|
grid
|
|
are mathematical equations describing the size, shape, thickness, position, color, and fill or lines closed graphical shapes
|
vectors
|
|
standardized method of encoding data for storage.
|
file format
|
|
important because they tell the program what kind of data is contained in the file and how the data is organized
|
set of vectors
|
|
two types of file formats
|
1. propriety
2. universal |
|
___ is under the sole control of the software developer who invented the format
|
propriety
|
|
based on openly published specifications and are commonly used by many different programs and operating systems.
|
universal
|
|
bitmap-based graphics programs
|
paint programs
|
|
vector-based programs that are well-suited for work when accuracy and flexibility are as important as coloring and special effects
|
draw programs
|
|
other name for draw programs
|
object-oriented programs
|
|
cousins to pain programs
|
photo-editing programs
|
|
taking place of a photographer's darkroom for many tasks
|
photo-editing program
|
|
they are also used to edit nonphotographic images and to create images from scratch
|
photo-editing programs
|
|
also called computer-aided drafting or computer-aided drawing
|
computer-aided design
|
|
computerized version of the hand-drafting process that used to be done with a pencil and ruler on a drafting table
|
computer-aided design
|
|
used extensively in technical fields such as architecture and in mechanical, electrical and industrial engineering.
|
computer-aided design
|
|
special type of graphics, which is now used to create 3-D imaging movies, television and print
|
3-D Animation software
|
|
an outgrowth of the 3-D explosion is _____-
|
computer-based animation
|
|
means simply a way of sharing information
|
medium
|
|
combination of different media
|
multimedia
|
|
4 characteristics of a multimedia system
|
1. must be computer controlled
2. are integrated 3. must be represented digitally 4. usually interactive |
|
application which uses a collection of multiple media sources
|
multimedia application
|
|
collection of data organized in a manner that allows access, retrieval and use of that data
|
database
|
|
with ______ users create a computerized database
|
database software or DBMS
|
|
advantages of DBMS
|
1. reduced redundancy
2. integrated Data 3. data integrity |
|
data stored in separate files as opposed to in a database tends to repeat some of the same data over and over
|
reduced redundancy
|
|
any iten of data can be used to satisfy an inquiry or report
|
integrated data
|
|
identifies the quality of data.
|
data integrity
|
|
is very important because computers and people use information to make decisions and take actions
|
data integrity
|
|
organizes data in a tree structure
|
hierarchical data model
|
|
this structure implies that an record can have repeating information, generally in the child data segments
|
hierarchical data model
|
|
data in a series of records, which have a set of field values attached to it
|
hierarchical data model
|
|
it collects all the instances of a specific record together a as record type
|
hierarchical data model
|
|
the hierarchical model uses ____
|
parent child relationships
|
|
it coincided with the popularity of the hierarchical data model.
|
network data model
|
|
some data were more naturally modeled with more than one parent per child
|
network data model
|
|
permitted the modeling of many-to-many relationships in data
|
network data model
|
|
____ formally defined the network model
|
CODASYL (1971)
|
|
the basic data modeling construct in the network model is the _____
|
set construct
|
|
a set consists of _________
|
1. owner record type
2. set name 3. member record type |
|
a __________ can have that role in more than one set, hence the mulitparent concept is supported
|
member-record type
|
|
an ____ can also be a member or owner in another set
|
owner record type
|
|
a database based on the relational model developed by E.F Codd
|
relational model
|
|
who developed the relational model
|
E.F Codd
|
|
allows the definition of data structures, storage and retrieval operations and integrity constraints
|
relational database
|
|
data are organized in tables
|
relational model
|
|
collection of records
|
table
|
|
organize data in table format consisting of related rows and columns
|
relational model
|
|
parts of a table
|
1. data item
2. field 3. record |
|
each box in the table contains a single piece of data
|
data item
|
|
it is each column of the table
|
field
|
|
is the full set of data in any given row
|
record
|
|
names of types of data you want to use
|
field name
|
|
2 steps in creating a database
|
1. designing the structure of the file
2. entering the data in a file |
|
4 field data types
|
1. character field
2. numeric field 3. date field 4. logical field |
|
contains descriptive data
|
character field
|
|
contains numbers used of for calculations
|
numeric field
|
|
can usually limit to eight characters including slash used to separate the months, days and years
|
date field
|
|
used to keep track of true or false, yes/no conditions
|
logical field
|
|
determines the maximum number of characters or digits to be contained in the field including decimal point.
|
field width
|
|
also known as index field. it is the field on which an inquiry to the database can be based
|
key field
|
|
6 database software activities
|
1. list the records
2. list specific fields 3. query 4. add new record 5. modify existing record 6. delete record |
|
5 main functions of managers A
|
1. planning
2. organizing 3.staffing 4. directing 5. controlling |
|
5 main functions of managers
|
1. devising
2. deciding 3. hiring 4. guiding. 5. monitoring |
|
both short and long term range plans for the organization and setting goals to help achieve the plans term range plans
|
planning/devising
|
|
how to use resources such as people and materials
|
organizing/deciding
|
|
training workers
|
staffing/hiring
|
|
employees to perform their work in a way that supports the organizational goals
|
directing/guiding
|
|
the organizational program toward reaching its goals
|
controlling/monitoring
|
|
levels of managers
|
Strategic
Tactical Operational |
|
(LM) set objectives
|
top
|
|
(LM) scan environment
|
top
|
|
(LM) plan and make decisions
|
top
|
|
(LM) report to top management
|
middle
|
|
(LM) oversee first-line managers
|
middle
|
|
(LM) develop and implement activities
|
middle
|
|
(LM)allocate resources
|
middle
|
|
(LM) report ot middle managers
|
first-line
|
|
(LM) supervise employees
|
first-line
|
|
(LM) coordinate activities
|
first-line
|
|
(LM) are involved in day-to-day operations
|
first-line
|
|
it is a set of formal system designed to provide information for an organization
|
MIS
|
|
runs the MIS department
|
MIS managers
|
|
also known as resource manager
|
MIS managers
|
|
it is a computer system that supports managers in a sub-routine decision making tasks
|
DSS (decision support system)
|
|
is a mathematical representation of a real life system
|
Model
|
|
also known as input
|
independent variable
|
|
also known as output
|
dependet variable
|
|
uses a computer model to reach a decision about real-time situation
|
simulation
|
|
emphasis, planned, reports on a variety of subjects decision-making
|
MIS DSS
|
|
is a decision-support system especially made for senior-level managers
|
ESS
|
|
5 ESS considerations
|
1. the overall vision or broad view of company goals
2. strategic long term planning and objectives 3. staffing and labor relations 4. crisis management 5. strategic control and monitoring of overall operations |
|
3 ESS characteristics
|
1. easy to use
2. flexible 3. customizable |
|
3 benefits of Personal computer manager
|
1. increased productivity
2. worker enthusiasm 3. easier access of information |
|
4 areas that a pc manager that needs attention
|
1. technology overload
2. cost control 3. data security and integrity 4. computer junkies |
|
place where workers can get help with software problems
|
information center
|
|
4 services of information center
|
1. software selection
2. data access 3. network access 4 . training |