• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/144

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

144 Cards in this Set

  • Front
  • Back
a device that connects wireless communication devices together to form a wireless network
access point
final testing of an application system before it is installed
acceptance testing
one of the simplest data structures - hold a fixed number of equally-sized data elements. most programming languages have these as a built-in data type
array
fingerprints or eye-prints or voice-prints in addition to or in place of access cards for physical or electronic access to a network
biometric authentication
what is another name for a bridge
switch
what type of network - signals are transmitted in the form of messages that are transmitted to and are received by ALL of the devices but only the intended device acutally accepts and processes the message
Bus Network
translation of a program from source code to object code so that the program can be executed
compilation
type of multiplexer that combines multiple telecom channels onto a single transmission medium in such a way that all the individual channels can be active simultaneously
concentratotor
assumes the selling price is constant, costs are linear, sales mix is constant and inv doesn't change - determines the effects of selling and production volume on rev, cost and income
cost-volume-profit analysis
a database mgt system language that ties together the logcial and physical views of the data in the database
data definition language
a centralized collection of the data elements that are contained in the organization's databases. normally contains the definition and format and possibly the edit rules for each data element
data dictionary
form of data security - applies for certificate authority
digital certificate
LAN architecture developed by Xerox - uses bus or star - most widely implemented LAN standards
Ethernet
languages that enable end users to develop applications with little or no technical assistance
fourth-generation language
rule of thumb - algorithms that produce "good enough" answers
heuristic
a tag-based formatting laugange for web pages
HTML
a piece of hardware that combines several telecom signals for transmission over a single communications medium
multiplexer
the coordinated processing of programs by more than one processor
multiprocessing
several parts of a program running at the same time on a single processor
multiprogramming
a circuit board installed on a node that allows a node to connect with and communicate over the network
NIC (Network Interface Card)
software that manages communcation over a network
Network Operating System (NOS)
small pieces of data that travel over a network - they are normally small parts of the complete message
packet
most common primary storage
RAM
decription of the types of data elements that are in a database, the relationships amount the data elements and the structure used to organize the data
schema
most common secondary storage
ROM
creates a packet-switching network where a mesage is split into pieces by the sending end and put back together by the receiving end
TCP/IP
portions of a program that are not being executed are stored on disk and retrieved and brought into acutal memory when needed
virtual memory
list of permissions attached to a piece of data
access control list
transfer mechanism for PC memory addresses into and out of the processor
address bus
wireless networking, physically close enough to communicate without an access point
ad hoc mode
software advice, normally run on a stand-alon hardware platform, designed specifically for that task
appliance
weakening of a signal as it travels through a cable
attenuation
an AI shell starts with a hypothesis and wroks by asking questions of the user to see if there are data available to support optimal goal
backward chaining
chopping off the high and low ends of an analog signal
bandpass filtering
measurement of the speed data is transmitted between two computers
baud rate
internet software program that performs certain services on the internet - gathering information from web pages
Bot
high speed memory buffer that temporarily stores data that a processor needs
cache
conflict between product distribution channels - where the direct sales might cannibalize sales from the resellers
channel conflict
circuits that actually perform the fuctions of a motherboard
chipset
process for teleophone lines in which an entire circuit is reserved for the entire duration of a call
circuit switching
loosely coupled computers that work together as a group
cluster
converts analog signal to digital
codec
collaborative filtering
amazon guesses what I want next
joining together of two strings of characters by sticking them end-to-end
concatenation
transfer mechanism for data into and out of a PC processor/memory
data bus
another name for data scrubbing
data cleansing
data that is processed is independent of the programs - either can be changed without affecting the other
data independence
another name for data warehouse
data store
degree of access to computing in higher ecnomic areas differs from lower areas
digital divide
software that stores credit card and other information to facilitate payment for goods on the internet
digital wallet
implementing a system without any period of parallel processing
direct cross over
spreading of optical signals as they travel along a fiber optic cable
dispersion
a database that is physcially stored in several different physical locations
distributed database
domain name warehousing
cybersquatting
electronic transmission and storage of backup data at an offsite location
electronic vaulting
processor controlling the device is completely contained in the device in controls (PDA)
embedded system
computer system that contains redundant stuff to provide continuous uniterrupted service
fault-tolerant computer system
cable that works with light pulses
fiber optic cable
.doc, .xls
file extension
form of non-volatile memory that can be electronically erased and re-written - digital cameras and cell phones
flash memory
AI shell begins with the available data and uses the rules to extract more data until the optimal goal is reached
forward chaining
a packet of data that has been encoded for transmission over a particular transmission link
frame
rate at which a signal oscillates - one hertz means that an event repeats inself once per second
frequency
ability to transmit in both directions at the same time using more than one communication medium or at a different frequency
full-duplex
logic that deals with approximate rather than precise
fuzzy logic
interfacing with a computer through the manipulation of graphical images
graphical user interface (GUI)
internal label which occurs at the beginning of a tape or disk file and identifies the files
header label
another name for fault-tolerant system
high availability computer system
used to transfer web pages on the web
HTTP
device that connects network components
hub
internet enabled cell phone or pda - few specialized communications functions
information appliance
wireless networking whne the networking devices communicate through an access point
infrastructure mode
software agent that assists users and acts on their behalf with non-repetitive tasks
intelligent agent
used by hardware devices to indicate to the motherboard that they are requesting service
interrupt
pieces of hardware that store data and addresses within the PC processor and determine the size of data which the processor can operate
internal register
sudden and unwanted variation in one or more characteristics of a signal
jitter
design products or services and create new knowledge - engineers, architects, scientists, etc.
knowledge worker
another name for transmission delay
latency
balancing access requests among various servers, often in a server farm
load balancing
subscriber line - a telephone line used by a customer to reach the telephone company's POP
local loop
piece of program code inserted into some kind of other software that will set off a malicious function when a specified condition is met
logic bomb
address is a unique physical address for each NIC on a network
MAC address
virus that is contained in a document or spreadsheet and is executed when the document or spreadsheet is opened or some other function is performed
macro virus
general name for malicious software
malware
MTBF
MTTR
mean time between failure
mean time to recover
data about data - To: From: in an e-mail
metadata
a search engine that sends user requests to other search engines
metasearch engine
something quantitative about a system or process that can be measured
metric
low level instructions that are hard wired into a processor - normally can't be changed. firmwire
microcode
transmission is point-to-point radio transmission using large dish antennas
microwave transmission
payment less than $10 - sometimes batched
micropayment
software that acts as an intermediary between different application components
middleware
a computer between a PC/Server and a mainframe
minicomputer
backup computer to duplicate all of the processes and transactions on the primary computer
mirroring
processing power doubles every 18 months
Moore's Law
combination of multiple signals on a single communcations circuit
multiplexing
a network that is based on the human brain
neural network
a firewall technique that is used to send traffic from an internal network to the internet by using a single public IP address
network address translation NAT
random electromagnetic energy in a cable
noise
can take information from various sources and find non-obvious relationships and connections
non-obvious relationship awareness
combines data and the specific processes which operate on that data
object
compiling program source code so that the programs can be executed
object code
formatted block of information transmitted by a network - normally a header, a trailer and a data area
packet
a firewall examining individual income packets and determining wheather to accept or reject each specific packet based on the IP addresses used and the specific port that the packet is to go to
packet filtering
method of slicing digital messages income pieces
packet switching
analyze a sequence of characters in a string of characters to determine the structure of that string of characters - compilers often use this
parse
device which switches an organization's telephone and hooks into the telephone company's local loop - can handle both normal telephone traffic and IP using VoIP
PBX - Private Branch Exchange
lowest layer of architecture
physical layer
access rules that are written for firewalls
policy rules
a telephone company's connection to its network
POP (point of presence)
is the control field that indicates which application process should receive the data in the data field
port
change in signal during propagation (creation) of the signal
propagation effect
PSDN
PSTN
public switched data network
public switched telephone network
the same as broadcast technology - internet based content delivery system where information is provided to a client based on a predefined set of request parameters
push technology
use of tiny tages with embedded microchips containing data about an item and its location and a small antenna to trasmit that information
radio frequency identification (RFID)
an electronic device that receives a weak or low-level signal and regenerates/retransmits it at a higher level or high power
repeater
a piece of software used by an intruder that is inteded to conceal malicious software installed without the user's knowledge
rootkit
the ability of a computer to expand to serve a larger number of users
scalability
metasearch engine that gathers results from multiple search engines
search aggregator
describes structure of database
schema
physical interface that connects to certain peripheral devices such as mice and keyboards
serial port
group of networked servers that are housed in one location
server farm
the process of partitioning one physical server into multiple servers such that each of the virtual servers has the appearance and capability of running as its own dedicated machine
server virtualization
a computer hardware device (sometimes software) that can intercept traffic passing over a digital network - captures each packet and decodes it
sniffer
calling a person, impersonating somebody else and asking for and obtaining a password to the system
social engineering
the actual program instructions written by a programmer - is compiled to produce object code or interpreted
source code
temporary data structure based on LIFO
stack
firewall technology where the firewall retains the source's IP address and port number so that it will know where to return the response
stateful packet filtering
a network that contains remote storage devices to servers in such a way that devices appear to the operating system to be local devices
storage area network
is the particular view of data in a database that is needed by a particular application program
subschema
a part of a network
subnet
an assurance service introduced by the AICPA that evaluates the reliability of an information system with respect to its availability security integrity and maintainability
SysTrust
physical device similar to an identification card that identifies a particular user
token
internal label which occurs at the end of a tape or disk file and identifies the file. are used by processing the tape or disk riles to ensure that the proper files are being processed
trailer label
single transmission channel between two telephone switching centers
trunk line
another name for a virtual private network
tunneling
a string of characters that refers to specific resources on a computer www.live.com
URL (uniform resource locator)
another name for on-demand computing
utility computer
computer program that is typically included with operating systems that perform certain common functions
utility program
private network that has been configured within a public network to take advantage of the ecnonomies of scale of the public network, often the internet. wraps the data from the private network in a wrapper to hide its contents. there are several types of VPNs; some of them use encryption and are secure and some of them are not secure
virtual private networks
person who drives around looking for unsecured WiFi wireless networks
war driver
a bot which browses the web in an automated manner. many search engines utilize these to provide up-to-date data on web pages to update their indexes
web crawler
enables cell phones and other wireless devices to access web-based information and services
wireless application protocol
an attack on a computer system that is launched from a third party computer which has been taken over
zombie attack