Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
234 Cards in this Set
- Front
- Back
A feature in some browsers that places a marker of a Web site's Uniform Resource Locator (URL) in an easily retrievable list (called Favorites in Microsoft Internet Explorer)
|
bookmark
|
|
a list that shows the hierarchy of previously viewed Web pages within the Web site that you are currently visiting. Shown at the top of some Web pages, it aids Web site navigation
|
breadcrumb list
|
|
Software installed on a computer system that allows individuals to locate, view, and navigate the Web
|
Web browser
|
|
a list of contacts set up in an instant messaging program
|
buddy list
|
|
A device that enables a computer to send data over cable lines. A modem modulates and demodulates the signal into digital data and back again
|
cable modem
|
|
A small text file that some Web sites automatically store on a client computer's hard drive when a user visits the site
|
cookie
|
|
A connection to the Internet using a standard telephone line
|
dial-up connection
|
|
A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmissions to share the same line
|
DSL
|
|
A type of specially coded text that, when clicked, enables a user to jump from one location, or Web page, to another within a Web site or to another Web site altogether
|
hyperlink
|
|
A program that enables users to communicate online in real time with others who are also online
|
instant messaging
|
|
(1) A specific word a user wishes to query (or look for) in an Internet search. (2) A specific word that has a predefined meaning for a particular programming language.
|
keyword
|
|
A company that connects individuals, groups, and other companies to the Internet
|
Internet service provider
|
|
A way to connect to the Internet using a small satellite dish, which is place outside the home and connects to a computer with coaxial cable. The company then sends the data to a satellite orbiting the Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer
|
satellite Internet
|
|
A set of programs that searches the Web for specific words (or keywords) you wish to query (or look for) and then returns a list of the Web sites on which those keywords are found
|
search engine
|
|
Unwanted or junk e-mail
|
spam
|
|
A structured outline of Web sites organized by topics and subtopics
|
subject directory
|
|
A Web site's unique address such as www.microsoft.com
|
Uniform Resource Locator
|
|
Which one of the following statements is NOT true about instant messaging?
a. It is a popular form of communication. b. You communicate in real time. c. More than two people can IM at the same time. d. Unlike e-mail, IM is good for private conversations. |
d. Unlike e-mail, IM is good for private conversations.
|
|
When shopping online, which of the following does NOT indicate that you have a secure connection displays?
a. A closed padlock icon in the status bar. b. The URL begins with https. c. The word “secure” in the title bar. d. The VeriSign seal on the Web page. |
c. The word “secure” in the title bar.
|
|
With a podcast, you can
a. subscribe to video and audio content. b. have the most recent content “delivered” automatically. c. play the video and audio content on an MP3 player. d. All of the above. |
d. All of the above.
|
|
A Web page that enables online collaboration is a(n)
a. podcast. b. wiki. c. blog. d. IM chat. |
b. wiki.
|
|
Which of the following is annoying, but really doesn’t render any harm to your computer?
a. Virus b. Spyware c. Sneakware d. Malware |
b. Spyware
|
|
One scam that lures Internet users into revealing personal information is
a. malware. b. phishing. c. spam. d. Internet hoax. |
b. phishing.
|
|
When searching the Internet, which of the following is true?
a. It doesn’t matter which search engine you use; they all provide the same results. b. A subject directory is best to use when you can provide keywords. c. Boolean operators and advanced search pages will help to narrow your results. d. Search engines are best to use when you need to narrow the search by specific topics. |
c. Boolean operators and advanced search pages will help to narrow your results.
|
|
In the Web address http://www.irs.gov, which part is considered the top-level domain?
a. www b. .gov c. http d. www.irs.gov |
b. .gov
|
|
Which of the following provides the fastest broadband Internet connection by transmitting data at the speed of light?
a. Cable b. DSL c. Fiber-optics d. Satellite |
c. Fiber-optics
|
|
The primary disadvantage to cable Internet access is the quality and effectiveness of the service
a. are affected by the number of users on the same cableline at any time. b. depend on your proximity to a phone company central office. c. can be affected by adverse weather conditions. d. depend on the Internet service provider you select. |
a. are affected by the number of users on the same cableline at any time.
|
|
The Web and the Internet are interchangeable terms.
|
False
|
|
DSL service is not affected by the number of users on the line at the same time.
|
True
|
|
Because Google generates the most search results of any of the search engines, it is called a meta search engine.
|
False
|
|
Cookies store personal information to help customize Web pages for users.
|
True
|
|
You cannot connect to the Internet wirelessly unless you’re in a WiFi hotspot.
|
False
|
|
Software that is specifically designed to detect viruses and protect a computer and files from harm
|
antivirus software
|
|
An automated attack that is launched from more than one zombie computer at the same time
|
distributed denial of service
|
|
A software program or hardware device designed to prevent unauthorized access to computers or networks
|
firewall
|
|
Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)
|
hacker
|
|
The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding others
|
identity theft
|
|
As defined by the NAS, "the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation."
|
information assurance
|
|
A virtual communications gateway or path that enables a computer to organize requests for information (such as Web page downloads and e-mail routing) from other networks or computers
|
logical port
|
|
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
|
network adapter
|
|
A network in which each node connected to the network can communicate directly with every other node on the network
|
peer-to-peer network
|
|
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems
|
zombie
|
|
A device that is installed on a long cable run to amplify a signal
|
repeater
|
|
A device that routes packets of data between two or more networks
|
router
|
|
A device for transmitting data on a network.
|
switch
|
|
The actual speed of data transfer that is achieved. It is usually less than the data transfer rate and is measured in megabits per second (Mbps)
|
throughput
|
|
A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged
|
virus
|
|
Which type of sharing is NOT a benefit of installing a home network?
a. Peripheral b. Internet connection c. CPU d. File |
c. CPU
|
|
Which of the following is NOT a reason peer-to-peer networks are generally installed in homes?
a. Client/server networks are less expandable than peer-to-peer networks. b. Client/server networks are designed for larger numbers of users.. c. Client/server networks provide more security than is needed in a home network. d. Servers are too difficult for most home users to set up. |
a. Client/server networks are less expandable than peer-to-peer networks.
|
|
All networks contain the following elements except
a. network adapters. b. transmission media. c. networking software. d. wireless connectivity. |
d. wireless connectivity.
|
|
Which is an example of a network navigation device required to move data between two networks?
a. Wireless signal sender b. Switch c. Router d. 5E cable. |
c. Router
|
|
Wireless Ethernet networks are more challenging to set up than wired networks because
a. the navigation devices they use are more complicated to set up. b. they have more security vulnerabilities. c. there are many sources of signal interference in most houses. d. None of the above |
b. they have more security vulnerabilities.
|
|
Power-line networks are viable alternatives to Ethernet networks because they
a. are less expensive than Ethernet networks. b. don’t require running any new wires to install. c. provide six times the throughput of wired Ethernet networks. d. All of the above. |
b. don’t require running any new wires to install.
|
|
When hackers use a program that controls many other computers and uses them to launch an attack on another computer, this is called a(n)
a. Zero-day attack. b. Trojan Horse attack. c. Distributed Denial of Service attack. d. Boot Sector Virus attack. |
c. Distributed Denial of Service attack.
|
|
Which is NOT a benefit of firewalls?
a. They make it harder for a hacker to locate specific computers on a network. b. They repeatedly change the IP address of the router. c. They close unused logical ports to decrease network vulnerability. d. They filter out unauthorized requests for data. |
b. They repeatedly change the IP address of the router.
|
|
Wireless Ethernet networks are attractive to hackers because
a. The 802.11 protocol has weak security rules. b. You can’t install a firewall on a wireless Ethernet network. c. Wireless Ethernet networks have much greater bandwidth than wired. d. It is much easier for a hacker to establish a connection with a wireless network. |
d. It is much easier for a hacker to establish a connection with a wireless network.
|
|
Viruses that are triggered by a certain event (such as a date) or condition being achieved are called
a. worms. b. stealth viruses. c. logic bombs d. macro viruses. |
c. logic bombs
|
|
Actual data throughput is usually higher on wireless networks.
|
False
|
|
All home networks require each computer on the network to be equipped with its own network adapter.
|
True
|
|
Installing a firewall on your network will stop most viruses from being planted on your network.
|
False
|
|
Never opening e-mail attachments will ensure a computer never catches a virus.
|
False
|
|
Some wireless Ethernet networks are subject to interference from cordless phones.
|
True
|
|
A type of wireless technology that uses radio waves to transmit data over short distances. Often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones
|
Bluetooth
|
|
A telephone that operates over a wireless network.
|
cell phone
|
|
Connects a personal digital assistant (PDA) to a computer using either a universal serial bus (USB) port or a serial port
|
cradle
|
|
A form of portable storage
|
flash memory card
|
|
A system of 21 satellites (plus three working spares), built and operated by the U.S. military, that constantly orbit the Earth. They provide information to GPS-capable devices to pinpoint locations on the Earth
|
GPS
|
|
Software that makes it possible to access the Internet from a PDA/smartphone
|
microbrowser
|
|
An extension of short message service (SMS) that enables messages that include text, sound, images, and video clips to be sent from a cell phone or PDA to other phones or e-mail addresses
|
multimedia message service
|
|
A portable electronic tool such as a cell phone, personal digital assistant (PDA), or notebook
|
mobile computing devices
|
|
A small portable device (such as an Ipod) that enables you to carry your MP3 or other media files around with you
|
portable media player
|
|
A powerful mobile computing solution that offers a large display and all of the computing power of a full desktop system
|
notebook computer
|
|
A category of computers consisting of notebooks that weigh 2 pounds or less
|
ultraportable
|
|
A mobile phone with advanced capabilities as a result of a convergence (or combination) of features such as camera, PMP, and PC-like features
|
PDA / Smartphone
|
|
The number of operations (or cycles) the processor completes each second, measured in hertz (Hz)
|
processor speed
|
|
Technology that enables short text messages (up to 160 characters) to be sent over mobile networks
|
short message service
|
|
A pen-shaped device used to tap or write on touch-sensitive screens
|
stylus
|
|
The process of updating data so that the files on different systems are the same
|
synchronizing
|
|
A notebook computer designed specifically to work with handwriting recognition technology
|
tablet notebook
|
|
Mobile computing is useful only in professions that
a. don’t rely on Internet access. b. where work requires intensive graphics and large display screens. c. where work requires intensive computer processing power. d. None of the above. |
d. None of the above.
|
|
Currently, cell phones contain ALL of the following except
a. a CPU. b. output devices. c. hard drives. d. input devices. |
c. hard drives.
|
|
Cell phones store data
a. on a memory cards. b. in RAM. c. in ROM. d. all of the above. |
d. all of the above.
|
|
To fit more songs on a personal media player you can
a. decrease the sampling rate of digitized music files. b. install additional RAM in the PMP. c. increase the sampling rate of digitized music files. d. install a larger hard drive in the PMP. |
a. decrease the sampling rate of digitized music files.
b. install additional RAM in the PMP. d. install a larger hard drive in the PMP. |
|
Flash memory is
a. nonvolatile and is not erased when power is disconnected. b. volatile and is erased when power is disconnected. c. used only in PDA/smartphones and tablet computers. d. the main storage medium in notebook computers. |
a. nonvolatile and is not erased when power is disconnected.
|
|
The device best suited for a salesperson who has to demonstrate processor-intensive multimedia to clients is a
a. smartphone with Internet capabilities. b. PDA/smartphone with an external monitor. c. Tablet PC. d. notebook computer. |
c. Tablet PC.
d. notebook computer. |
|
GPS chips are
a. installed in all newly manufactured automobiles. b. installed in all newly manufactured cell phones. c. reliable only when installed in Tablet PCs. d. available only for PDAs and smartphones. |
b. installed in all newly manufactured cell phones.
|
|
For Internet access, you should obtain:
a. a Tablet PC. b. a PDA/smartphone. c. an Internet tablet. d. All of the above can have Internet capability. |
d. All of the above can have Internet capability.
|
|
When a notebook does not have enough USB ports, you
a. can have two devices share one USB port. b. can add ports only if the notebook is configured with flash memory. c. can’t add ports unless your computer uses Windows Vista. d. can add ports using a PC card or external hub. |
d. can add ports using a PC card or external hub.
|
|
Portable devices that can be synchronized with your home computer are
a. PDAs and GPS units. b. iPods and PDA/smartphones. c. ultramobiles and GPS units. d. any device with Bluetooth. |
b. iPods and PDA/smartphones.
|
|
Hard drives are found only in desktops, notebooks, and tablet notebooks.
|
False
|
|
PMPs with a hard drive are able to carry fewer songs than those with flash memory.
|
False
|
|
A PDA/smartphone and a notebook can exchange data wirelessly if they both have Bluetooth.
|
True
|
|
Tablet notebooks are commonly used for text messaging.
|
False
|
|
Smartphones run Windows Vista as an operating system.
|
False
|
|
fully describes each field in the database and its attributes
|
data dictionary
|
|
When individual databases are not sufficient to maintain all the data that needs to be tracked, this should be created
|
data warehouse
|
|
utilizes databases and other related systems to assist management with building business models and making critical decisions.
|
decision support
|
|
This should be used for displaying related information that is stored in multiple tables
|
join query
|
|
Extremely lengthy textual data is stored in a
|
memo field
|
|
Data used to describe other data
|
metadata
|
|
digits such as 1234 are normally stored in a
|
numeric field
|
|
video files are appropriately stored in a
|
object field
|
|
should be established as a unique field to be included with each record
|
primary key
|
|
Queries generated by this language make use of English-language statements driven by the mathematical principles of
|
relational algebra
|
|
usually displays requested information from only one table
|
select query
|
|
The most popular query language in use today is
|
SQL
|
|
it is important to ensure each record is identified uniquely, when creating this
|
table
|
|
They could be stored in this, if calculations do not have to be performed on the number
|
text field
|
|
systems which record routine business activities
|
transaction processing
|
|
Two lists reflecting different data about the same person is an example of
a. data redundancy. b. data inconsistency. c. data disparity. d. data duplication errors. |
b. data inconsistency.
|
|
Which of the following is NOT an advantage of using a database versus lists?
a. Information can be easily shared among users. b. Data entry errors can be minimized with databases. c. Data integrity can be assured with a database.. d. Databases are easier to build and maintain than lists. |
d. Databases are easier to build and maintain than lists.
|
|
A group of related fields in a relational database is called a
a. primary key. b. record. c. master key. d. table. |
b. record.
|
|
In databases, tables are related using
a. primary keys and foreign keys. b. Boolean logic. c. data marts. d. database logic. |
a. primary keys and foreign keys.
|
|
A field that has a unique value for each record in a database is called the
a. logical key. b. master field. c. key field. d. primary key. |
d. primary key.
|
|
A primary key of one table that is also found in a related table is a
a. linked key. b. foreign key. c. secondary key. d. subordinate key. |
b. foreign key.
|
|
Which of the following is one of the four main operations of a database management system?
a. Querying data b. Dissecting data c. Structuring data d. Consolidating data |
a. Querying data
|
|
Ensuring that a field must contain a number that is between two valuesis an example of a(n)
a. existence check. b. completeness check. c. range check. d. consistency check. |
c. range check.
|
|
A system that is designed to help perform routine daily tasks is known as a(n)
a. decision support system. b. office support system. c. data warehouse. d. management information system. |
b. office support system.
|
|
An electronic system used to record sales of products through Web site is an example of a
a. transaction processing system. b. decision support system. c. management information system. d. knowledge-based system. |
a. transaction processing system.
|
|
A query is designed to make data entry into a database easier.
|
False
|
|
Consistency checks ensure that only reasonable data values are entered into a database.
|
True
|
|
Reducing data redundancy by recording data only once is called data normalization.
|
True
|
|
A data warehouse is a smaller slice of a data mart.
|
False
|
|
The main reason businesses use data mining is to simplify transaction processing systems.
|
False
|
|
Compressed audio/video files distributed on the Internet
|
podcasts
|
|
allows constant updates for subscribers
|
Really Simple Syndication
|
|
Available to the public
Simple to create, read, and manage Entries listed on a single page, with most recent entry at the top Searchable |
blogs
|
|
Digital video clips playable on media player software
|
vlogs
|
|
Broadcasts of audio/visual content over the Internet
Not updated automatically Use streaming media |
webcasts
|
|
Web sites that allow anyone to change their content
Provide source for collaborative writing |
wikis
|
|
Using the Internet to place phone calls
Uses technology similar to e-mail to send voice data digitally Requires speakers, a microphone, an Internet connection, and a VoIP provider |
VoIP
|
|
Internet social networks
Multiplayer online game services Chat rooms Newsgroups Listservs |
Group Communication
|
|
Members share common interests.
Members communicate by voice, chat, IM, video, and blogs. Members create personalized profiles. Growth has been explosive. Risks must be recognized and reduced. |
Social Networks
|
|
Play occurs over the Internet among many other players
Persistent or ever-on game environment Some games let you interact with other players |
Multiplayer online games
|
|
Real-time, text-based conversations
Rooms can focus on specific topics or interests or be general interest Identity protection -Username Netiquette: rules of polite interaction |
Chat Rooms
|
|
Online discussion forums
Members post and reply to messages Create or respond to “threads” |
Newsgroups
|
|
Electronic mailing lists of e-mail addresses of people interested in a topic
Threads are sent as e-mails Less public than newsgroups |
Listservs
|
|
Multimedia:
Involves forms of media and text -Graphics -Audio -Video Streaming audio and video Some files require a plug-in program |
Web Entertainment
|
|
Conducting business online
-Business-to-consumer (B2C) -Business-to-business (B2B) -Consumer-to-consumer (C2C) |
E-commerce
|
|
Online transactions can be safer than traditional retail shopping.
VeriSign is a company that certifies that online transactions are secure. A closed padlock icon indicates a secure Web site. The URL changes from http:// to https://. |
E-Commerce Safeguards
|
|
Shop at well-known, reputable sites.
Pay by credit card, not debit card. Check the return policy. |
Online Shopping Guidelines
|
|
Spam
Cookies Adware/pop-ups Spyware Malware Phishing and hoaxes |
Online Annoyances
|
|
Junk e-mail
Avoid spam: -Separate e-mail account -Spam filters -Antispam practices |
Spam
|
|
Text files stored on client computers when visiting Web sites
Used on return visits to Web sites Unique ID number Personal information remembered Privacy risk |
Cookies
|
|
Software that has a malicious intent
Spyware is a form of malware Other forms are viruses, worms, and Trojan horses Designed to render a computer useless or to penetrate it completely |
Malware
|
|
Programs that download on your PC when you install/use other software
Enable sponsored ads to appear in your browser window or as pop-ups |
Adware
|
|
Added as a program piggybacked with a requested program
Gathers information, usually about surfing habits Antivirus software doesn’t detect it Spyware removal programs are required |
Spyware
|
|
Phony communication that attempts to scam someone into revealing personal information
Often looks very official |
Phishing
|
|
Contain information that is untrue
May request that people send money |
Hoaxes
|
|
Computer software
Graphical Enables Web navigation Popular browsers: -Internet Explorer -Mozilla’s Firefox -Apple’s Safari -Opera -Camino (Mac OS X) |
Web Browsers
|
|
Quick tabs: Show thumbnail images of all open Web pages in open tabs
Tabbed browsing: Multiple pages available in same browser window |
Browser Features
|
|
Collection of related Web pages
First page known as home or index page |
Website
|
|
HTML document
-Text and graphics Unique address Hyperlinks |
Web page
|
|
Uniform Resource Locator
Unique Web site address |
URL
|
|
Easy method of returning to Web pages
|
bookmarks
|
|
User keys word or phrase in search box
“Spider” or “Web crawler” program scans Web pages Results are indexed and sent to the client |
Search Engines
|
|
Web pages organized by topics and subtopics
Do not use keywords to search Narrow search by clicking on subfolders |
Subject Directories
|
|
Used to refine searches
|
Boolean operators
|
|
Who is the author of the article or Web site sponsor?
Is the site biased? Is the information current? Toward what audience is the site geared? Are links available? |
Evaluating Web Sites
|
|
Users connected to the Internet
Requests data and Web pages |
Client computer
|
|
Stores Web pages and data
Returns the requested data to the client |
Server computer
|
|
Dial-up connections
Broadband connections -Cable -Satellite -DSL |
Connecting to the Internet
|
|
Uses coaxial cable and a cable modem
Fast connection speed Speed depends on number of users Not available in all areas |
Cable
|
|
Uses telephone lines
Faster than dial-up Doesn’t tie up phone line Requires special DSL modem |
Digital Subscriber Line
|
|
Sends light through fiber optics
Fast Expensive Available only in certain areas |
Fiber-Optic Service
|
|
Use standard telephone line
Require a modem to convert analog and digital signals Slowest connection speed (56K) |
Dial-Up Connections
|
|
Provide user access to the Internet
National, regional, or local companies Broadband connection: broadband provider is your ISP Dial-up connection: need to determine ISPs available in your area |
Internet Service Providers
|
|
Research and development of cutting-edge networking and wireless technologies
|
Large Scale Networking
|
|
Project sponsored by universities, government, and industry to develop new Internet technologies
|
Internet2
|
|
Social networking sites
Wikis Podcasts User content databases |
Web 2.0
|
|
Two or more computers connected together
Devices connected to networks: nodes |
Computer network
|
|
Sharing resources and peripherals
Transferring files Sharing of broadband connection with use of a router |
Benefits of a network
|
|
Nodes communicate with each other
-Peers Share peripheral devices Used in home and small office networks |
Peer-to-Peer Networks
|
|
A large, multi-server, multi-client network
|
Internet
|
|
Nodes are within a small geographic region:
-Homes -Schools -Small businesses |
Local Area Network
|
|
LANs connected over long distances
-A few miles to thousands of miles -Use telecommunications lines |
Wide area Network
|
|
Nodes are within a specific geographic region, such as a city
Sponsored by a government entity to provide access to city residents and/or visitors |
Metropolitan area network
|
|
Provide communications channel between nodes
|
Transmission Media
|
|
-Twisted pair
-Coaxial cable -Fiber-optic cable -Radio waves (wireless) |
Forms of Media
|
|
-Data transfer rate
-Throughput |
Bandwidth
|
|
Devices connected to or installed in nodes
-Network interface cards (NICs) -External or internal network adapters Enable communication between nodes |
Network Adapters
|
|
Devices that help make data flow possible
|
Network Navigation Devices
|
|
Route data between networks
|
Router
|
|
Receive data and retransmit it to nodes on the same network
|
Switches
|
|
Built into operating systems that support networking
-Windows -Mac OS |
Peer-to-peer software
|
|
Network operating system (NOS) software
-Windows Server 2008 -SUSE Linux Enterprise |
Client/Server software
|
|
Wired Ethernet networks
Wireless Ethernet networks Power-line networks |
Types of Peer-to-Peer Networks
|
|
Ethernet network adapters are used to connect nodes
-NIC card -PC card -USB adapter Computers are connected to each other using unshielded twisted pair cable |
Wired Ethernet Networks
|
|
Keep track of data packets
Amplify and retransmit signals Keep the network running efficiently |
Ethernet Switches
|
|
Transfer packets from one network to another
Home Internet routers transfer data from the Internet to the home network. Allows for network-ready devices such as network printers or NAS (network attached storage) |
Ethernet Routers
|
|
Use radio waves to connect nodes
Basically Ethernet networks that use radio waves instead of wires Based on the IEEE 802.11 standard, also known as Wi-Fi (Wireless Fidelity) Each node requires a wireless network adapter -Transceivers |
Wireless Ethernet Networks
|
|
Device added to a wireless network to extend the range of the network
Must connect to either a switch, a router, or a node on the network |
Wireless Access Point
|
|
Computers are connected to a house’s electrical wiring to create a network.
|
Power-Line Networks
|
|
Programs designed to detect viruses
-Scan files looking for virus signatures (unique code) -Provide options for deleting or fixing infected files -Inoculate files against further infection Detects known viruses Needs to be updated frequently |
Antivirus Software
|
|
Full-featured communication and information storage devices
Features include: -Auto-redial -Call timers -Voice mail -Voice-activated dialing -Internet access -Text messaging -Personal information management |
Cellular Phones
|
|
Coordinates sending data between components
Runs the operating system |
Microprocessor (CPU)
|
|
ROM stores the operating system
Internal memory chips |
Memory
|
|
Input devices:
-Microphone -Keypad -Graffiti pad -Touch screen -Digital camera Output devices: -Speaker -LCD display |
Cell Phone Hardware
|
|
Translate the user’s commands into instructions for the processor
-Symbian -Windows Mobile -OS X |
Cell Phone Operating Systems
|
|
Format for storing music
|
MP3
|
|
Used to add additional memory to portable media players
Nonvolatile Noiseless Uses very little power Software enables transfer of audio and video files |
PMP Flash Memory
|
|
Music without any digital rights
Can be moved freely from system to system May be part of a subscription service |
DRM Music
|
|
Input devices:
-Touch screen with stylus -Keyboards -Graffiti text system Output devices: -LCD displays |
PDA/Smartphone Input and Output Devices
|
|
Also called laptops
Computing power of a desktop Weigh more than tablet PCs |
Notebooks
|
|
Gives details on
Display brightness Battery status Power management plant Wireless network connections External displays Presentation systems (projectors) connected |
Windows Mobility Center
|
|
Collections of related data
Easily stored, sorted, organized, and queried Turn data into information |
Database
|
|
Category of information, displayed in columns
|
field
|
|
Type of data that can be stored in a field
|
data type
|
|
A group of related fields
|
record
|
|
A group of related records
|
table
|
|
A field value unique to a record
|
primary key
|
|
Organize data in tables
Link tables to each other through their primary keys |
relational database
|
|
Store data in objects
Also store methods for processing data Handle unstructured data |
object-oriented databases
|
|
Store data in multiple dimensions
Organize data in a cube format Can easily be customized Process data much faster |
multidimensional databases
|
|
Application software designed to capture and analyze data
|
Database Management Systems
|
|
Process of ensuring that data entered into the database is correct (or at least reasonable) and complete
|
Data Validation
|
|
Organize data into tables
Relationships are links between tables with related data Common fields need to exist between fields |
Relational Database Operations
|
|
For each record in a table, only one corresponding record in a related table
|
One-to-one
|
|
Only one instance of a record in one table; many instances in a related table
|
one-to-many
|
|
Records in one table related to many records in another
|
many-to-many
|
|
The primary key of one table is included in another to establish relationships with that other table
|
foreign key
|
|
Large-scale repository of data
Organizes all the data related to an organization Data organized by subject |
Data warehouse
|
|
Extract data from source
Reformat the data Store the data |
Data Staging
|
|
Small slices of data
Data for a single department |
Data Marts
|
|
Software-based solutions used to gather and analyze information
|
Information Systems
|
|
Assist employees in day-to-day tasks
Improve communications Example: Microsoft Office Include e-mail, word-processing, spreadsheet, database, and presentation programs |
Office Support Systems
|
|
Keep track of everyday business activities
Batch processing Real-time processing |
Transaction Processing Systems
|
|
Provide timely and accurate information for managers in making business decisions
|
Management Information Systems
|
|
Help managers develop solutions for specific problems
|
Decision Support Systems
|
|
Software that assists in building management models in DSSs
Can be built to describe any business situation Typically contain financial and statistical analysis tools |
Model Management Systems
|
|
Enables users to communicate with computers using a natural spoken or written language
|
Natural language processing (NLP) system
|
|
Branch of computer science that deals with attempting to create computers that think like humans
|
Artificial intelligence (AI)
|
|
Integrate multiple data sources
Enable smooth flow of information Allow information to be used across multiple areas of an enterprise Accumulate all information in a central location |
Enterprise Resource Planning Systems
|
|
Process by which great amounts of data are analyzed and investigated
Objective is to spot patterns or trends within the data |
Data Mining
|