• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
PDA
(personal digital assistant) provides personal organizer functions such as a calendar, an appointment book, and address book, a calculator and a notepad.
CPU
(central processing unit) is the electronic component that interprets and carries out the basic instructions that operate the computer
GUI
(graphical user interface) you interact with the software using text, graphics, and visual images such as icons
Embedded computer
is a special purpose computer that functions as a component in a larger product. A variety of everyday products contain embedded computers; consumer electronics, automobiles, computer devices and office machines
Information Processing cycle
Series of input, process, output, and storage activities performed by a computer
Wiki
Collaborative website that allows users to create, add to, modify, or delete the website content via their web browser
URL
(Uniform Resource Locator) Unique address for a web page
Domain
Text version of an IP address
Portal
is a web site that offers a variety of Internet services from a single, convenient location
FTP
(File Transfer Protocol) is an internet standard that permit’s the process of file uploading and downloading
Worksheet
Rows and columns used to organize data in a spread sheet.
Font style
adds emphasis to a font. Bold, italics, and underline are examples of font style.
Query
Request for specific data from a database
CAD Software
(Computer-Aided Design) is a sophisticated type of application software that assist a professional user in creating engineering, architectural, and scientific designs.
RAM
(Random Access Memory) type of memory that can be read from and written to by the processor and other devices. Programs and data are loaded into RAM a from storage devices such as a hard disk and remain in RAM as long as the computer has continuous power.
Cache
Area of memory that stores the contents of frequently used data or instructions
ROM
(read only memory) Type of nonvolatile memory that is used to store permanent data and instructions.
Megabyte
one million bytes
RAID
(redundant array of independent disks) Redundant array of independent disks. Group of two or more integrated hard disk that acts like a single large hard disk.
GIGO
(garbage in, garbage out) computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input.
Relational database
database that stores data in tables that consist of rows and columns, with each row having a primary key and each column having a unique name.
A developer of a relational database refers to a file as a relation, a record as a tuple, and a field as an attribute. A user of a relational database, by contrast, refers to a file as a table, a record as a row, and a field as a column.
Validation
the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes entered data to help ensure that it is correct.
QBE
(query by example) DBMS feature that has a graphical user interface to assist users with retrieving data.
Firewall
Hardware and/or software that protects a network’s resources from intrusion by
users on another network such as the internet.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Expansion
insert characters between existing characters
Backup
Duplicate or copy of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.
Pharming
Scam where a perpetrator attempts to obtain a user’s personal and financial information via spoofing
Biometric
technology of authenticating a person’s identity y verifying a personal characteristic
Check digit
Validity check consisting of a number(s) or character(s) that is appended to or inserted in a primary key value.
Implementation phase
Phase of the system development cycle during which the new or modified system is constructed, or built, and then delivered to the users. Four major activites performed include: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
Programming language
Set of words, symbols, and codes that enables a programmer to communicate instructions to a computer.
Data model
Rules and standards that define how a database organizes data.
DoS attack
Assault on a computer or network whose purpose is to disrupt computer access to an internet service such as the web or email.
B2C
(Business to Consumer) e-commerce consists of the sale of goods and services to the general public.
C2C
(Consumer to Consumer) e-commerce occurs when one consumer sells directly to another, such as in an online auction eBay is one of the more popular online auction web sites.
B2B
(Business to Business)e-commerce. Many businesses provide goods and services to other business, such as online advertising, recruiting, credit, sales, market research, technical support, and training.
Cmos
(complementary metal-oxide semiconductor) Technology used by some RAM chips, flash memory chips, and other types of memory chips that provides high speeds and consumes little power by using battery power to retain information even when the power to a computer is off.
Queue
Lineup of multiple print jobs within a buffer
Modem
Communications device that converts a computer’s digital signals to analog signals
Perpendicular recording
Data storage technique in which hard disks align magnetic particles vertically, making much greater storage capacities possible.
Secure digital
(SD) type of miniature mobile storage medium that is a flash memory card capable of storing between 16B and 1 GB of data.
Access time
Measurement of the amount of time it takes the Processor to read data, instructions, and information from memory.
Burning
Process of writing on an optical disc.
Dedicated line
Type of always-on connection that is established between two communications devices (unlike a dial-up line where the connection is reestablished each time it is used)
Sending device
Device that initiates instructions to transmit data, instructions or information.
Subject directory
Search tool that classifies Web Pages in an organized set of categories and subcategories.
USB port
Port that can connect up to 127 different peripheral with a single connector type.
Memory Cache
Cache that helps speed the processes of a computer b stroing frequently used instructions and data.
IrDA port
Network standard used to transmit data wirelessly via infrared (IR) light waves.
E-commerce
Short for electronic commerce, a business transaction that occurs over an electronic network such as the internet.
VoIP
(voice over IP) technology that allows users to speak to other users over the Internet using their desktop computer, mobile computer, or mobile device
RSs 2.0
Really Simple Syndication. Specification that content aggregators use to distribute content to subscribers
Intranet
An internal network that uses Internet technologies.
Web 2.0
Term used to refer to Website that allow users to modify web site content, provide a means for users to share personal information, and have application software built into the site for visitors to use.
In applications that allow users to write__________, the security level should be set so the application warns a user that a document they are attempting to open contains a macro
Macro
A_______ is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
bypass
Each time you start a computer, the operating system is loaded (copied) from the computers memory to the hard drive. T/F
False
A megabyte (MB) is equal to approximately 1 billion bites T/F
False
To develop a web page, you must be a computer programmer.
False
Most DEBMSs allow different levels of access privileges to be identified for each field in the DB.
True