• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back

Computer Related Health Issues

Computer Vision Syndrome and Carpoltunnel

Hierarchy of Data

Bit, Byte, Field, Record, File

Database Management System

(DBMS) is a collection of programs that enables you to store, modify, and extract information from a database. Example. computerized library systems, computerized parts inventory systems

The Globalization Challenge

The challenge of doing business with other countries is because we think our way is the only way. We also think our language is the only language in the world.


Object-oriented Programming

you store data and a code together in an object and you store the object in an object library.


The Components of an Information System

Hardware, Software, Data, People, Procedures

Query Language

a specialized language for requesting information form a database.

Knowledge Workers

people who create and spend their time dealing with knowledge.

Source Code

a text listing of commands to be compiled or assembled into a executable computer program. The code that is written by the human programmer in a high level language.


Richness vs Reach

Reach is the number of people that you can deliver your information to. Richness is the quantity of the information you are delivering.

Operating System Software

is the most important software that runs on the computer. Its performs basic tasks on the computer where you can use your keyboard, printer, and screen. Ex. Lenox

Cookies

is a small file placed on your computer by the website that you are visiting. The main purpose is to identify users and possibly prepare customized web pages for them.

Data Redundancy

this is the saving of the same data in more than one place.

Data Mining

a class of database applications that look for hidden patterns in a group of data that can be used to predict future behavior.

Application Software

software written to complete a particular action such as Microsoft Office.

The Three Different Softwares

System software, Operating software, Application software

B to C Commerce

it is a business selling directly to consumers via the internet.

Smart Card

a small electronic device about the size of a credit card that contains electronic memory. It can be used as a third level of security.

Profiling

the use of a powerful search tool to search through data to identify people that fit in a select category

Non-obvious Relationship Awareness (NORA)

software which can find minute relationship between people and historic data or events

Opt-In vs Opt-Out

Opt-in requires the seller to convince you into selling your information. Opt-out requires you not to all your information to be sold.


Spoofing

to fool hardware and software.

Data Dictionary

contains a list of all files in the database, the number of records in each file, and the names and types of each file.

Ethical Dilemmas

any situation that forces you to make a decision that would may/may not be ethical. doubling of computer power every year, drastic drop in data storage costs and increase in storage density, huge telecommunications networks, and advances in data mining tools

P3P

(Platform for Privacy Preferences) is a specification that will allow users’ web brewers to automatically understand web sites’ privacy practices.

Encryption

is translation of data into a secret code. This is the best ways to keep you data secure.


Copyright vs Patent

Copyright protects intellectual property for individual for their whole life plus 70 years after that, but for companies it protect their intellectual property for 95 years from publish date or 120 years from creation. Patent protects someones invention for 20 years.


Memory vs Storage

Memory is violate and Storage is long term.

Batch vs Online

Batch is all the sales people are selling out of one lot and the inventory may or may not be there. Online is real time and the consumers know right then if the company has the inventory in stock or not.


High-Level vs Low-Level Languages

High-level languages are closer to human languages than machine languages. They are easier to read, write, and maintain. Low-level languages are closer to hardware than high-level.

Time Sharing

refers to the use of a computer by more than one user, users share the computers time. Ex. mainframes

SSP’s vs ASP’s

(Storage Service Provider) is a company that provides computer storage space and related management services. (Application Service Provider) is a 3rd party entity that manages and distributes software-based services and solutions to customers from a central data center.