Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
89 Cards in this Set
- Front
- Back
Network Database
|
any devices, such as a geteway, hub, or router, that is used to broadcast network data, boost signals, or route data to its destination
|
|
Network interface Card
|
circuitry, often on a expansion card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter
|
|
Network service providers
|
(NSP's) companies that maintain a series of nationwide Internet links
|
|
Non-volatile
|
Any electronic component that does not require a constant supply of power to hold data
|
|
Open source
|
an approach to developing and licensing software in which source code remains public so it can be improved and freely distributed
|
|
Operating System
|
the software that controls the computer's use of its hardware resources, such as memory and disk storage space. Also called OS
|
|
Operational Planning
|
the scheduling and monitoring of workers and processes
|
|
Optical Storage
|
a technology that records data as light and dark spots on a CD, DVD, or other optical media
|
|
Organizational Chart
|
a diagram showing the heirarchy of workers in an organziation
|
|
Peer-To-Peer Mode
|
a method of using a network in which workstations act as both file servers and clients
|
|
Peripheral Device
|
a component or equipment, such as a printer, that expands a computer's input, output, or storage capabilities
|
|
Phishing
|
An e-mail based scam that's designed to fool users into revealing confidential information
|
|
PIECES framework
|
a concept developed by James Wetherbe to help indentify problems in an information system. Each letter of PIECES stands for a potential problem (Performance, Infomation, Economics, Control, Efficiency, and Service)
|
|
Pirated Software
|
Software that is copied, sold, or distributed with/out permission from the copyright holder
|
|
Pits
|
Spots on a CD that are burned onto an optical storage medium to repersent digital data
|
|
Pixels
|
Short for picture element; the smallest unit in a graphic image. Computer display devices use a matrix or pixels to display text and graphics
|
|
Port Probe
|
an exploit used by hackers to locate computer ports that can be used for surreptitious access
|
|
RAM
|
(random access memory) Computer memory circuitry that holds data, program instructions and the operating system while the computer is on
|
|
Rasterization
|
the process of superimposing a grid over a vector image and determining the color depth for each pixel
|
|
Relative Reference
|
In a worksheet, a cell reference that can change if cells change position as a result of a move or copy operation
|
|
Rendering
|
In graphics software, the process of creating a 3D solid image by covering a wireframe drawing and applying computer generated highlights and shadows
|
|
Resolution dependent
|
graphics, such as bitmaps, in which the quality of the image is dependent on the number of pixels comprising the image
|
|
RF Signals
|
(radio frequency signals) Data that is broadcast and received via radio waves with a transceiver
|
|
Ring topology
|
a network in which all devices are connected in a circle with each device having exactly two neighbors
|
|
ROM
|
(Read-only Memory) Refers to one or more intergrated circuits that contain permanent instructions that the computer uses during the boot process
|
|
Root directory
|
the main directory of a disk
|
|
Routable IP address
|
A network address that can be routed over the internet; contrast to private IP address
|
|
Search Engine Indexer
|
the component of a search engine that reviews the Web pages brought back by a crawler and creates pointers to them so that they can be quickly accessed
|
|
Site License
|
Legal permission for software to be used on any and all computers at a specific location ( for example, within a corporate building or on a university campus)
|
|
SMTP
|
(Simple Mail Transfer Protocol) a communication protocol used to send e-mail across a network or the Internet
|
|
Solid State Storage
|
technology that records data and stores it in a microscopic grid cells on a non-volatile, erasable, low-power chip
|
|
Sound Card
|
a circuit board that gives the computer the ability to accept audio input from a microphone, play sounds files, and produce audio output through speakers or headphones
|
|
SSL
|
(Secure Sockets layers) a security protocol that uses encryption to establish a secure connection betwen a computer and a Web server
|
|
Star topology
|
a network configured with a central connection point thathub for all workstations and peripherals
|
|
Static Web publishing
|
A simple way to display the data in a database by converting a database report into an HTML document
|
|
Storage
|
the area of a computer where data is retained on a permanent basis
|
|
Storage Density
|
closeness of the particles on a disk surface. As debnsity increases, the particles are packed more tightly together and are usually smaller
|
|
Storage Devices
|
mechanical apparatus that records data to and retrieves data from a storage medium
|
|
Storage Medium
|
physical material used to store computer data, such a floppy disk, a hard disk, or a CD-ROM
|
|
Store- & - Forward
|
tehcnology used by communications networks in which an e-mail message is temporarily held in storage on a server until it is requested by a client computer
|
|
Stored program
|
A set of instructions that resides on a storage device, such as a hard drive, and can be loaded into computer memory and excuted
|
|
Strategic Planning
|
proccess of developing long-range goals and plans for an organization
|
|
Syntax Error
|
an error that results when an instruction does not follow the syntax rules, or grammar, of the programming language
|
|
Tactical Planning
|
short or near term decisions and goals that deploy the human, financial and natural resources neccessary to meet stategic goals
|
|
TCP
|
(transmission Control Protocol) the protocol within TCP/IP that is responsibel for est. a dataconnection between two hosts and breaking data into packets
|
|
TCP/IP
|
(transmission Control Protocol/ Internet Protocol) the primary protocol suite for transmitting messages over the internet
|
|
Tracing software
|
software that locates the edges of objects in a bitmap graphic and converts the resulting shape into a vector graphic
|
|
Tree topology
|
multiple star networks connected into a bus configuration by a backbone
|
|
Tojan horse
|
a computer program that appears to perform one function whicle actually doing something else, such as inserting a cirus into a computer system or stealing a password
|
|
UNIX
|
a multiuser, multitasking server operating system developed by AT&T bell laboratories in 1969
|
|
URL
|
Unifrom Resource Locator - the address of a web page
|
|
User interface
|
the software and hardware that enable people to interact with computers
|
|
Vector graphic
|
an image generated from descriptions that specify the position, lengh, and direction in which lines and shapes are drawn
|
|
Vertical Market Software
|
computer programs designed to meet the needs of a specific market segment or industry, such as medical record- keeping softwarte for use in hospitals
|
|
VoIP
|
( Voice over Internet Protocol) hardware etc, used to make telephone style calls over the internet. AKA = internet telephony
|
|
WAN
|
(Wide Area Network) interconnected group of computers and peripherals that cover a large geographical area such as multiple branches of corporation
|
|
Web authoring Software
|
computer programs for designing and developiong sustomized web pages taht can be published electonically on the internet
|
|
Web Search Engine
|
a program that uses keywords to find information on the internet and returns a lists of links to relvant documents
|
|
Web Server
|
a computer that listens for queries form web browsers and transmits HTML documents over the Internet
|
|
Web Site
|
a web address that holds a collection of information identified by a common domain name, such as www.cnn.com
|
|
Web Site Designer
|
a computer professional who creates, tests, posts, and modifies HTML documents and other data for a web site
|
|
Wi-Fi
|
An ethernet compatible wireless network that uses 802.11a,b,g, and n standards
|
|
Wi-Fi hotspot
|
the geographical area in which you can connect to a WIFI signal
|
|
Windows
|
an element of graphical user interfaces that is rectangular in shape and displays the conrtolsfor a program or a dialog box
|
|
Windows Explorer
|
a file management utility included with most Windows operating system that helps users manage their fiels
|
|
WMA
|
(windows media audio) a file format with a wma extension that is promoted by microsoft and provides highly compressed audio files with very little loss of sound quality
|
|
Word processing software
|
computer programs that assist the user in producing documents, such as reporst, letters, papers, and manuscripts
|
|
XHTML
|
a markup language very similar toHTML4.01 but more customizable
|
|
XML
|
Extensible Markup language -- document format similar to HTML, but that allows the web pages developer to define customized tags, generally for the purpose of creating more interactivity
|
|
Analysis Phase
|
Tasks performed by the project team whose goal is to produce a list of require for a newé revised info system
|
|
Bus Topology
|
Network arranged on a communication backbone that connects all networks devices -- if backbone fails=network unusable
|
|
Antivirus Software
|
a computer program used to scan a computer`s memory and disks to identify isolate and eliminate viruses
|
|
Ad hoc Report
|
a customized report ( AKA demand report) generated as needed
|
|
Absolute Reference
|
in a worksheet formula, cell reference ( usually `$`symbol) that cannot change a result of a move or copy operation
|
|
EULA
|
(End user Lisence Agreement) software licence that appears on screen when a software is being installed
|
|
Firewall
|
softwareéhardware designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusions attempts
|
|
FTP
File Transfer Protocol |
set or rules for uploading and downloading files between a client computer and remote server
|
|
MH2
Megahertz |
measure of frequency equilvent to one million cycles per second
|
|
Gigahertz
|
A measure of frequency equilevent to one billion cycles per second
|
|
Gigabyte
|
approx one billion bytes, exactly 1024 megabytes
|
|
Gigabit
|
approx one billion bits, exactly 1024 megabits
|
|
magnetic Storage
|
technology for recording data onto disks for type by magnetizing participles of an oxide-based surface coating
|
|
Linex
|
operating system that is a dervative of UNIX, available as freeware, and widely used for servers though it is also used on personal computers and workstations
|
|
LAN
Local Area Network |
interconnected group of computers and peripherals located within a limited area, such as a building or campus
|
|
Kernel
|
The core model of an operating system that typically manages memory, processes tasks and storages devices
|
|
JPEG
Joint Photographic Experts Group |
A format that uses lossy compression to store bitmap images
|
|
Internet backbone
|
major communications links that form the core of the internet
|
|
Intregration testing
|
testing of comleted modules of an application to ensure that they operate together correctly
|
|
Exception Report
|
report generated by managing infomation system list infomation that is outside normal ranges. ( recorder report showing low stock inventory items)
|