• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/126

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

126 Cards in this Set

  • Front
  • Back
this often involves a deliberate act that is against the law
intentional breach of computer security
any illegal act involving a computer generally is referred to as a _______
computer crime
the term _______ refers to online or internet-based illegal acts
cybercrime
examples of computer crime
1.computer theft of funds
2. Unauthorized entry into a computer system
3. stealing computer crime
4. stealing computer hardware or hardware theft
4 safeguard techniques
1. user names and passwords
2. possessed objects
3. biometric devices
4. encryption
defined as any program that runs on a computer without prior consent or knowledge of the user
rogue software
refers to a special password or code which is used to bypass the normal security measures of computer systems
back door or trap door
a program that can imitate another program in order to gather user information
chameleons
are programs which can destroy programs and/or data when a certain trigger is encountered;
logic bombs
commonly used by programmers in order to ensure payment of software
logic bombs
named after the greek myth
trojan horse
is a readily accepted by a suer because it presents itself as something useful
trojan horse
program which makes the keyboard act in a peculiar way
ANSI bombs
is a program that copies itself repeatedly, for example in memory or on a network using up resources and possibly shutting down the computer or network
worm
widely-distributed type of rogue software
computer virus
meaning of virus
Vital Information Resource Under Siege
a program that duplicates itself by infecting other programs
computer virus
protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files
Anti-virus program
is a hardware and/or software that protects a network's resources from intrusion by users on another network such as the internet
Firewalls
refers to the illegal use and/or distribution of copyrighted computer programs
software piracy
3 safeguards against software piracy
1. site license
2. shareware
3. freeware
an agreement through the buyer of a software has the right to use the program on a given number of computers
site license
a program that is distributed free on a trial basis
shareware
the most effective strategy against software piracy because the programs are distributed for free; not as powerful as copyrighted software
freeware
the software developed by programmers which are distributed for free
public-domain software
moral guidelines that govern the use of computers and information systems
computer ethics
three forms of computer ethics
1. information accuracy
2. intellectual property rights (IPR)
3. information privacy
2 basic categories of graphics
1. bitmap
2. vector
cells are filled with one or more colors.
bitmap
another name for bitmap
grid
are mathematical equations describing the size, shape, thickness, position, color, and fill or lines closed graphical shapes
vectors
standardized method of encoding data for storage.
file format
important because they tell the program what kind of data is contained in the file and how the data is organized
set of vectors
two types of file formats
1. propriety
2. universal
___ is under the sole control of the software developer who invented the format
propriety
based on openly published specifications and are commonly used by many different programs and operating systems.
universal
bitmap-based graphics programs
paint programs
vector-based programs that are well-suited for work when accuracy and flexibility are as important as coloring and special effects
draw programs
other name for draw programs
object-oriented programs
cousins to pain programs
photo-editing programs
taking place of a photographer's darkroom for many tasks
photo-editing program
they are also used to edit nonphotographic images and to create images from scratch
photo-editing programs
also called computer-aided drafting or computer-aided drawing
computer-aided design
computerized version of the hand-drafting process that used to be done with a pencil and ruler on a drafting table
computer-aided design
used extensively in technical fields such as architecture and in mechanical, electrical and industrial engineering.
computer-aided design
special type of graphics, which is now used to create 3-D imaging movies, television and print
3-D Animation software
an outgrowth of the 3-D explosion is _____-
computer-based animation
means simply a way of sharing information
medium
combination of different media
multimedia
4 characteristics of a multimedia system
1. must be computer controlled
2. are integrated
3. must be represented digitally
4. usually interactive
application which uses a collection of multiple media sources
multimedia application
collection of data organized in a manner that allows access, retrieval and use of that data
database
with ______ users create a computerized database
database software or DBMS
advantages of DBMS
1. reduced redundancy
2. integrated Data
3. data integrity
data stored in separate files as opposed to in a database tends to repeat some of the same data over and over
reduced redundancy
any iten of data can be used to satisfy an inquiry or report
integrated data
identifies the quality of data.
data integrity
is very important because computers and people use information to make decisions and take actions
data integrity
organizes data in a tree structure
hierarchical data model
this structure implies that an record can have repeating information, generally in the child data segments
hierarchical data model
data in a series of records, which have a set of field values attached to it
hierarchical data model
it collects all the instances of a specific record together a as record type
hierarchical data model
the hierarchical model uses ____
parent child relationships
it coincided with the popularity of the hierarchical data model.
network data model
some data were more naturally modeled with more than one parent per child
network data model
permitted the modeling of many-to-many relationships in data
network data model
____ formally defined the network model
CODASYL (1971)
the basic data modeling construct in the network model is the _____
set construct
a set consists of _________
1. owner record type
2. set name
3. member record type
a __________ can have that role in more than one set, hence the mulitparent concept is supported
member-record type
an ____ can also be a member or owner in another set
owner record type
a database based on the relational model developed by E.F Codd
relational model
who developed the relational model
E.F Codd
allows the definition of data structures, storage and retrieval operations and integrity constraints
relational database
data are organized in tables
relational model
collection of records
table
organize data in table format consisting of related rows and columns
relational model
parts of a table
1. data item
2. field
3. record
each box in the table contains a single piece of data
data item
it is each column of the table
field
is the full set of data in any given row
record
names of types of data you want to use
field name
2 steps in creating a database
1. designing the structure of the file
2. entering the data in a file
4 field data types
1. character field
2. numeric field
3. date field
4. logical field
contains descriptive data
character field
contains numbers used of for calculations
numeric field
can usually limit to eight characters including slash used to separate the months, days and years
date field
used to keep track of true or false, yes/no conditions
logical field
determines the maximum number of characters or digits to be contained in the field including decimal point.
field width
also known as index field. it is the field on which an inquiry to the database can be based
key field
6 database software activities
1. list the records
2. list specific fields
3. query
4. add new record
5. modify existing record
6. delete record
5 main functions of managers A
1. planning
2. organizing
3.staffing
4. directing
5. controlling
5 main functions of managers
1. devising
2. deciding
3. hiring
4. guiding.
5. monitoring
both short and long term range plans for the organization and setting goals to help achieve the plans term range plans
planning/devising
how to use resources such as people and materials
organizing/deciding
training workers
staffing/hiring
employees to perform their work in a way that supports the organizational goals
directing/guiding
the organizational program toward reaching its goals
controlling/monitoring
levels of managers
Strategic
Tactical
Operational
(LM) set objectives
top
(LM) scan environment
top
(LM) plan and make decisions
top
(LM) report to top management
middle
(LM) oversee first-line managers
middle
(LM) develop and implement activities
middle
(LM)allocate resources
middle
(LM) report ot middle managers
first-line
(LM) supervise employees
first-line
(LM) coordinate activities
first-line
(LM) are involved in day-to-day operations
first-line
it is a set of formal system designed to provide information for an organization
MIS
runs the MIS department
MIS managers
also known as resource manager
MIS managers
it is a computer system that supports managers in a sub-routine decision making tasks
DSS (decision support system)
is a mathematical representation of a real life system
Model
also known as input
independent variable
also known as output
dependet variable
uses a computer model to reach a decision about real-time situation
simulation
emphasis, planned, reports on a variety of subjects decision-making
MIS DSS
is a decision-support system especially made for senior-level managers
ESS
5 ESS considerations
1. the overall vision or broad view of company goals
2. strategic long term planning and objectives
3. staffing and labor relations
4. crisis management
5. strategic control and monitoring of overall operations
3 ESS characteristics
1. easy to use
2. flexible
3. customizable
3 benefits of Personal computer manager
1. increased productivity
2. worker enthusiasm
3. easier access of information
4 areas that a pc manager that needs attention
1. technology overload
2. cost control
3. data security and integrity
4. computer junkies
place where workers can get help with software problems
information center
4 services of information center
1. software selection
2. data access
3. network access
4 . training