• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Artificial intelligence (AI)
the ability of computers to mimic or duplicate the functions of the human brain
Expert Systems
Hardware and software that stores knowledge and makes inferences, similar to a human expert
Robotics
Mechanical or computer devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans
Neural Networks
A computer system that can simulate the functioning of a human brain
Genetic algorithm
an approach to solving large, complex problems in which a number of related operations or models change and evolve until the best one emerges
Prototyping
An iterative approach to the systems development process
Operational prototype
a functioning prototype that accesses real data files, edits input data, makes necessary computations and comparisons, and produces real output
Nonoperational prototype
a mock-up, or model, that includes output and input specifications and formats
Critical Success Factor
a business term for an element which is necessary for an organization or project to achieve its mission. For example, a CSF for a successful Information Technology (IT) project is user involvement.
Computer-Aided Software Engineering (CASE) tools
automate many of the tasks required in a systems development effort and enforce adherence to the SDLC
Computer mistakes
Mistakes can be caused by unclear expectations and a lack of feedback
A programmer might develop a program that contains errors
A data-entry clerk might enter the wrong data
Computer Crime
Often defies detection
The amount stolen or diverted can be substantial
The crime is “clean” and nonviolent
The number of IT-related security incidents is increasing dramatically
Computer crime is now global
Cyberterrorist
intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them
Homeland Security Department
Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate
Identity Theft
An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else
Virus
a program that attaches itself to other programs
Worm
an independent program that replicates its own program files until it interrupts the operation of networks and computer systems
Trojan Horse
a program that appears to be useful but actually masks a destructive program
Antivirus program
program or utility that prevents viruses and recovers from them if they infect a computer
The Work Environment: Health Concerns
Occupational stress
Repetitive stress injury (RSI)
Carpal tunnel syndrome (CTS)
Emissions from improperly maintained and used equipment