Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
144 Cards in this Set
- Front
- Back
a device that connects wireless communication devices together to form a wireless network
|
access point
|
|
final testing of an application system before it is installed
|
acceptance testing
|
|
one of the simplest data structures - hold a fixed number of equally-sized data elements. most programming languages have these as a built-in data type
|
array
|
|
fingerprints or eye-prints or voice-prints in addition to or in place of access cards for physical or electronic access to a network
|
biometric authentication
|
|
what is another name for a bridge
|
switch
|
|
what type of network - signals are transmitted in the form of messages that are transmitted to and are received by ALL of the devices but only the intended device acutally accepts and processes the message
|
Bus Network
|
|
translation of a program from source code to object code so that the program can be executed
|
compilation
|
|
type of multiplexer that combines multiple telecom channels onto a single transmission medium in such a way that all the individual channels can be active simultaneously
|
concentratotor
|
|
assumes the selling price is constant, costs are linear, sales mix is constant and inv doesn't change - determines the effects of selling and production volume on rev, cost and income
|
cost-volume-profit analysis
|
|
a database mgt system language that ties together the logcial and physical views of the data in the database
|
data definition language
|
|
a centralized collection of the data elements that are contained in the organization's databases. normally contains the definition and format and possibly the edit rules for each data element
|
data dictionary
|
|
form of data security - applies for certificate authority
|
digital certificate
|
|
LAN architecture developed by Xerox - uses bus or star - most widely implemented LAN standards
|
Ethernet
|
|
languages that enable end users to develop applications with little or no technical assistance
|
fourth-generation language
|
|
rule of thumb - algorithms that produce "good enough" answers
|
heuristic
|
|
a tag-based formatting laugange for web pages
|
HTML
|
|
a piece of hardware that combines several telecom signals for transmission over a single communications medium
|
multiplexer
|
|
the coordinated processing of programs by more than one processor
|
multiprocessing
|
|
several parts of a program running at the same time on a single processor
|
multiprogramming
|
|
a circuit board installed on a node that allows a node to connect with and communicate over the network
|
NIC (Network Interface Card)
|
|
software that manages communcation over a network
|
Network Operating System (NOS)
|
|
small pieces of data that travel over a network - they are normally small parts of the complete message
|
packet
|
|
most common primary storage
|
RAM
|
|
decription of the types of data elements that are in a database, the relationships amount the data elements and the structure used to organize the data
|
schema
|
|
most common secondary storage
|
ROM
|
|
creates a packet-switching network where a mesage is split into pieces by the sending end and put back together by the receiving end
|
TCP/IP
|
|
portions of a program that are not being executed are stored on disk and retrieved and brought into acutal memory when needed
|
virtual memory
|
|
list of permissions attached to a piece of data
|
access control list
|
|
transfer mechanism for PC memory addresses into and out of the processor
|
address bus
|
|
wireless networking, physically close enough to communicate without an access point
|
ad hoc mode
|
|
software advice, normally run on a stand-alon hardware platform, designed specifically for that task
|
appliance
|
|
weakening of a signal as it travels through a cable
|
attenuation
|
|
an AI shell starts with a hypothesis and wroks by asking questions of the user to see if there are data available to support optimal goal
|
backward chaining
|
|
chopping off the high and low ends of an analog signal
|
bandpass filtering
|
|
measurement of the speed data is transmitted between two computers
|
baud rate
|
|
internet software program that performs certain services on the internet - gathering information from web pages
|
Bot
|
|
high speed memory buffer that temporarily stores data that a processor needs
|
cache
|
|
conflict between product distribution channels - where the direct sales might cannibalize sales from the resellers
|
channel conflict
|
|
circuits that actually perform the fuctions of a motherboard
|
chipset
|
|
process for teleophone lines in which an entire circuit is reserved for the entire duration of a call
|
circuit switching
|
|
loosely coupled computers that work together as a group
|
cluster
|
|
converts analog signal to digital
|
codec
|
|
collaborative filtering
|
amazon guesses what I want next
|
|
joining together of two strings of characters by sticking them end-to-end
|
concatenation
|
|
transfer mechanism for data into and out of a PC processor/memory
|
data bus
|
|
another name for data scrubbing
|
data cleansing
|
|
data that is processed is independent of the programs - either can be changed without affecting the other
|
data independence
|
|
another name for data warehouse
|
data store
|
|
degree of access to computing in higher ecnomic areas differs from lower areas
|
digital divide
|
|
software that stores credit card and other information to facilitate payment for goods on the internet
|
digital wallet
|
|
implementing a system without any period of parallel processing
|
direct cross over
|
|
spreading of optical signals as they travel along a fiber optic cable
|
dispersion
|
|
a database that is physcially stored in several different physical locations
|
distributed database
|
|
domain name warehousing
|
cybersquatting
|
|
electronic transmission and storage of backup data at an offsite location
|
electronic vaulting
|
|
processor controlling the device is completely contained in the device in controls (PDA)
|
embedded system
|
|
computer system that contains redundant stuff to provide continuous uniterrupted service
|
fault-tolerant computer system
|
|
cable that works with light pulses
|
fiber optic cable
|
|
.doc, .xls
|
file extension
|
|
form of non-volatile memory that can be electronically erased and re-written - digital cameras and cell phones
|
flash memory
|
|
AI shell begins with the available data and uses the rules to extract more data until the optimal goal is reached
|
forward chaining
|
|
a packet of data that has been encoded for transmission over a particular transmission link
|
frame
|
|
rate at which a signal oscillates - one hertz means that an event repeats inself once per second
|
frequency
|
|
ability to transmit in both directions at the same time using more than one communication medium or at a different frequency
|
full-duplex
|
|
logic that deals with approximate rather than precise
|
fuzzy logic
|
|
interfacing with a computer through the manipulation of graphical images
|
graphical user interface (GUI)
|
|
internal label which occurs at the beginning of a tape or disk file and identifies the files
|
header label
|
|
another name for fault-tolerant system
|
high availability computer system
|
|
used to transfer web pages on the web
|
HTTP
|
|
device that connects network components
|
hub
|
|
internet enabled cell phone or pda - few specialized communications functions
|
information appliance
|
|
wireless networking whne the networking devices communicate through an access point
|
infrastructure mode
|
|
software agent that assists users and acts on their behalf with non-repetitive tasks
|
intelligent agent
|
|
used by hardware devices to indicate to the motherboard that they are requesting service
|
interrupt
|
|
pieces of hardware that store data and addresses within the PC processor and determine the size of data which the processor can operate
|
internal register
|
|
sudden and unwanted variation in one or more characteristics of a signal
|
jitter
|
|
design products or services and create new knowledge - engineers, architects, scientists, etc.
|
knowledge worker
|
|
another name for transmission delay
|
latency
|
|
balancing access requests among various servers, often in a server farm
|
load balancing
|
|
subscriber line - a telephone line used by a customer to reach the telephone company's POP
|
local loop
|
|
piece of program code inserted into some kind of other software that will set off a malicious function when a specified condition is met
|
logic bomb
|
|
address is a unique physical address for each NIC on a network
|
MAC address
|
|
virus that is contained in a document or spreadsheet and is executed when the document or spreadsheet is opened or some other function is performed
|
macro virus
|
|
general name for malicious software
|
malware
|
|
MTBF
MTTR |
mean time between failure
mean time to recover |
|
data about data - To: From: in an e-mail
|
metadata
|
|
a search engine that sends user requests to other search engines
|
metasearch engine
|
|
something quantitative about a system or process that can be measured
|
metric
|
|
low level instructions that are hard wired into a processor - normally can't be changed. firmwire
|
microcode
|
|
transmission is point-to-point radio transmission using large dish antennas
|
microwave transmission
|
|
payment less than $10 - sometimes batched
|
micropayment
|
|
software that acts as an intermediary between different application components
|
middleware
|
|
a computer between a PC/Server and a mainframe
|
minicomputer
|
|
backup computer to duplicate all of the processes and transactions on the primary computer
|
mirroring
|
|
processing power doubles every 18 months
|
Moore's Law
|
|
combination of multiple signals on a single communcations circuit
|
multiplexing
|
|
a network that is based on the human brain
|
neural network
|
|
a firewall technique that is used to send traffic from an internal network to the internet by using a single public IP address
|
network address translation NAT
|
|
random electromagnetic energy in a cable
|
noise
|
|
can take information from various sources and find non-obvious relationships and connections
|
non-obvious relationship awareness
|
|
combines data and the specific processes which operate on that data
|
object
|
|
compiling program source code so that the programs can be executed
|
object code
|
|
formatted block of information transmitted by a network - normally a header, a trailer and a data area
|
packet
|
|
a firewall examining individual income packets and determining wheather to accept or reject each specific packet based on the IP addresses used and the specific port that the packet is to go to
|
packet filtering
|
|
method of slicing digital messages income pieces
|
packet switching
|
|
analyze a sequence of characters in a string of characters to determine the structure of that string of characters - compilers often use this
|
parse
|
|
device which switches an organization's telephone and hooks into the telephone company's local loop - can handle both normal telephone traffic and IP using VoIP
|
PBX - Private Branch Exchange
|
|
lowest layer of architecture
|
physical layer
|
|
access rules that are written for firewalls
|
policy rules
|
|
a telephone company's connection to its network
|
POP (point of presence)
|
|
is the control field that indicates which application process should receive the data in the data field
|
port
|
|
change in signal during propagation (creation) of the signal
|
propagation effect
|
|
PSDN
PSTN |
public switched data network
public switched telephone network |
|
the same as broadcast technology - internet based content delivery system where information is provided to a client based on a predefined set of request parameters
|
push technology
|
|
use of tiny tages with embedded microchips containing data about an item and its location and a small antenna to trasmit that information
|
radio frequency identification (RFID)
|
|
an electronic device that receives a weak or low-level signal and regenerates/retransmits it at a higher level or high power
|
repeater
|
|
a piece of software used by an intruder that is inteded to conceal malicious software installed without the user's knowledge
|
rootkit
|
|
the ability of a computer to expand to serve a larger number of users
|
scalability
|
|
metasearch engine that gathers results from multiple search engines
|
search aggregator
|
|
describes structure of database
|
schema
|
|
physical interface that connects to certain peripheral devices such as mice and keyboards
|
serial port
|
|
group of networked servers that are housed in one location
|
server farm
|
|
the process of partitioning one physical server into multiple servers such that each of the virtual servers has the appearance and capability of running as its own dedicated machine
|
server virtualization
|
|
a computer hardware device (sometimes software) that can intercept traffic passing over a digital network - captures each packet and decodes it
|
sniffer
|
|
calling a person, impersonating somebody else and asking for and obtaining a password to the system
|
social engineering
|
|
the actual program instructions written by a programmer - is compiled to produce object code or interpreted
|
source code
|
|
temporary data structure based on LIFO
|
stack
|
|
firewall technology where the firewall retains the source's IP address and port number so that it will know where to return the response
|
stateful packet filtering
|
|
a network that contains remote storage devices to servers in such a way that devices appear to the operating system to be local devices
|
storage area network
|
|
is the particular view of data in a database that is needed by a particular application program
|
subschema
|
|
a part of a network
|
subnet
|
|
an assurance service introduced by the AICPA that evaluates the reliability of an information system with respect to its availability security integrity and maintainability
|
SysTrust
|
|
physical device similar to an identification card that identifies a particular user
|
token
|
|
internal label which occurs at the end of a tape or disk file and identifies the file. are used by processing the tape or disk riles to ensure that the proper files are being processed
|
trailer label
|
|
single transmission channel between two telephone switching centers
|
trunk line
|
|
another name for a virtual private network
|
tunneling
|
|
a string of characters that refers to specific resources on a computer www.live.com
|
URL (uniform resource locator)
|
|
another name for on-demand computing
|
utility computer
|
|
computer program that is typically included with operating systems that perform certain common functions
|
utility program
|
|
private network that has been configured within a public network to take advantage of the ecnonomies of scale of the public network, often the internet. wraps the data from the private network in a wrapper to hide its contents. there are several types of VPNs; some of them use encryption and are secure and some of them are not secure
|
virtual private networks
|
|
person who drives around looking for unsecured WiFi wireless networks
|
war driver
|
|
a bot which browses the web in an automated manner. many search engines utilize these to provide up-to-date data on web pages to update their indexes
|
web crawler
|
|
enables cell phones and other wireless devices to access web-based information and services
|
wireless application protocol
|
|
an attack on a computer system that is launched from a third party computer which has been taken over
|
zombie attack
|