Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Artificial intelligence (AI)
|
the ability of computers to mimic or duplicate the functions of the human brain
|
|
Expert Systems
|
Hardware and software that stores knowledge and makes inferences, similar to a human expert
|
|
Robotics
|
Mechanical or computer devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans
|
|
Neural Networks
|
A computer system that can simulate the functioning of a human brain
|
|
Genetic algorithm
|
an approach to solving large, complex problems in which a number of related operations or models change and evolve until the best one emerges
|
|
Prototyping
|
An iterative approach to the systems development process
|
|
Operational prototype
|
a functioning prototype that accesses real data files, edits input data, makes necessary computations and comparisons, and produces real output
|
|
Nonoperational prototype
|
a mock-up, or model, that includes output and input specifications and formats
|
|
Critical Success Factor
|
a business term for an element which is necessary for an organization or project to achieve its mission. For example, a CSF for a successful Information Technology (IT) project is user involvement.
|
|
Computer-Aided Software Engineering (CASE) tools
|
automate many of the tasks required in a systems development effort and enforce adherence to the SDLC
|
|
Computer mistakes
|
Mistakes can be caused by unclear expectations and a lack of feedback
A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data |
|
Computer Crime
|
Often defies detection
The amount stolen or diverted can be substantial The crime is “clean” and nonviolent The number of IT-related security incidents is increasing dramatically Computer crime is now global |
|
Cyberterrorist
|
intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them
|
|
Homeland Security Department
|
Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate
|
|
Identity Theft
|
An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else
|
|
Virus
|
a program that attaches itself to other programs
|
|
Worm
|
an independent program that replicates its own program files until it interrupts the operation of networks and computer systems
|
|
Trojan Horse
|
a program that appears to be useful but actually masks a destructive program
|
|
Antivirus program
|
program or utility that prevents viruses and recovers from them if they infect a computer
|
|
The Work Environment: Health Concerns
|
Occupational stress
Repetitive stress injury (RSI) Carpal tunnel syndrome (CTS) Emissions from improperly maintained and used equipment |