Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
61 Cards in this Set
- Front
- Back
PDA
|
(personal digital assistant) provides personal organizer functions such as a calendar, an appointment book, and address book, a calculator and a notepad.
|
|
CPU
|
(central processing unit) is the electronic component that interprets and carries out the basic instructions that operate the computer
|
|
GUI
|
(graphical user interface) you interact with the software using text, graphics, and visual images such as icons
|
|
Embedded computer
|
is a special purpose computer that functions as a component in a larger product. A variety of everyday products contain embedded computers; consumer electronics, automobiles, computer devices and office machines
|
|
Information Processing cycle
|
Series of input, process, output, and storage activities performed by a computer
|
|
Wiki
|
Collaborative website that allows users to create, add to, modify, or delete the website content via their web browser
|
|
URL
|
(Uniform Resource Locator) Unique address for a web page
|
|
Domain
|
Text version of an IP address
|
|
Portal
|
is a web site that offers a variety of Internet services from a single, convenient location
|
|
FTP
|
(File Transfer Protocol) is an internet standard that permit’s the process of file uploading and downloading
|
|
Worksheet
|
Rows and columns used to organize data in a spread sheet.
|
|
Font style
|
adds emphasis to a font. Bold, italics, and underline are examples of font style.
|
|
Query
|
Request for specific data from a database
|
|
CAD Software
|
(Computer-Aided Design) is a sophisticated type of application software that assist a professional user in creating engineering, architectural, and scientific designs.
|
|
RAM
|
(Random Access Memory) type of memory that can be read from and written to by the processor and other devices. Programs and data are loaded into RAM a from storage devices such as a hard disk and remain in RAM as long as the computer has continuous power.
|
|
Cache
|
Area of memory that stores the contents of frequently used data or instructions
|
|
ROM
|
(read only memory) Type of nonvolatile memory that is used to store permanent data and instructions.
|
|
Megabyte
|
one million bytes
|
|
RAID
|
(redundant array of independent disks) Redundant array of independent disks. Group of two or more integrated hard disk that acts like a single large hard disk.
|
|
GIGO
|
(garbage in, garbage out) computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input.
|
|
Relational database
|
database that stores data in tables that consist of rows and columns, with each row having a primary key and each column having a unique name.
A developer of a relational database refers to a file as a relation, a record as a tuple, and a field as an attribute. A user of a relational database, by contrast, refers to a file as a table, a record as a row, and a field as a column. |
|
Validation
|
the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes entered data to help ensure that it is correct.
|
|
QBE
|
(query by example) DBMS feature that has a graphical user interface to assist users with retrieving data.
|
|
Firewall
|
Hardware and/or software that protects a network’s resources from intrusion by
users on another network such as the internet. |
|
Encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Expansion
|
insert characters between existing characters
|
|
Backup
|
Duplicate or copy of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.
|
|
Pharming
|
Scam where a perpetrator attempts to obtain a user’s personal and financial information via spoofing
|
|
Biometric
|
technology of authenticating a person’s identity y verifying a personal characteristic
|
|
Check digit
|
Validity check consisting of a number(s) or character(s) that is appended to or inserted in a primary key value.
|
|
Implementation phase
|
Phase of the system development cycle during which the new or modified system is constructed, or built, and then delivered to the users. Four major activites performed include: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
|
|
Programming language
|
Set of words, symbols, and codes that enables a programmer to communicate instructions to a computer.
|
|
Data model
|
Rules and standards that define how a database organizes data.
|
|
DoS attack
|
Assault on a computer or network whose purpose is to disrupt computer access to an internet service such as the web or email.
|
|
B2C
|
(Business to Consumer) e-commerce consists of the sale of goods and services to the general public.
|
|
C2C
|
(Consumer to Consumer) e-commerce occurs when one consumer sells directly to another, such as in an online auction eBay is one of the more popular online auction web sites.
|
|
B2B
|
(Business to Business)e-commerce. Many businesses provide goods and services to other business, such as online advertising, recruiting, credit, sales, market research, technical support, and training.
|
|
Cmos
|
(complementary metal-oxide semiconductor) Technology used by some RAM chips, flash memory chips, and other types of memory chips that provides high speeds and consumes little power by using battery power to retain information even when the power to a computer is off.
|
|
Queue
|
Lineup of multiple print jobs within a buffer
|
|
Modem
|
Communications device that converts a computer’s digital signals to analog signals
|
|
Perpendicular recording
|
Data storage technique in which hard disks align magnetic particles vertically, making much greater storage capacities possible.
|
|
Secure digital
|
(SD) type of miniature mobile storage medium that is a flash memory card capable of storing between 16B and 1 GB of data.
|
|
Access time
|
Measurement of the amount of time it takes the Processor to read data, instructions, and information from memory.
|
|
Burning
|
Process of writing on an optical disc.
|
|
Dedicated line
|
Type of always-on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used)
|
|
Sending device
|
Device that initiates instructions to transmit data, instructions or information.
|
|
Subject directory
|
Search tool that classifies Web Pages in an organized set of categories and subcategories.
|
|
USB port
|
Port that can connect up to 127 different peripheral with a single connector type.
|
|
Memory Cache
|
Cache that helps speed the processes of a computer b stroing frequently used instructions and data.
|
|
IrDA port
|
Network standard used to transmit data wirelessly via infrared (IR) light waves.
|
|
E-commerce
|
Short for electronic commerce, a business transaction that occurs over an electronic network such as the internet.
|
|
VoIP
|
(voice over IP) technology that allows users to speak to other users over the Internet using their desktop computer, mobile computer, or mobile device
|
|
RSs 2.0
|
Really Simple Syndication. Specification that content aggregators use to distribute content to subscribers
|
|
Intranet
|
An internal network that uses Internet technologies.
|
|
Web 2.0
|
Term used to refer to Website that allow users to modify web site content, provide a means for users to share personal information, and have application software built into the site for visitors to use.
|
|
In applications that allow users to write__________, the security level should be set so the application warns a user that a document they are attempting to open contains a macro
|
Macro
|
|
A_______ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
|
bypass
|
|
Each time you start a computer, the operating system is loaded (copied) from the computers memory to the hard drive. T/F
|
False
|
|
A megabyte (MB) is equal to approximately 1 billion bites T/F
|
False
|
|
To develop a web page, you must be a computer programmer.
|
False
|
|
Most DEBMSs allow different levels of access privileges to be identified for each field in the DB.
|
True
|