• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/93

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

93 Cards in this Set

  • Front
  • Back
application program
Programs help solve real-world problems
array
collection of components, all of the same type, ordered n dimensions (n>=1); each component’s position within that dimension
artificial intelligence
the study of computer systems that model and apply the intelligence of the human mind
assignment statement
a statement that stores the value of an expression into a variable
back door
A program feature that gives special and unauthorized access to a computer system to anyone who knows its exists
bandwidth
The number of bits or bytes that can be transmitted from one place to another in a fixed amount of time
binary file
a file that constrains data in a specific format, requiring a special interpretation of its bits
binary search
search algorithm for sorted lists that involves diving the list in half and determining, by value comparison, whether the items would be in the upper or lower half; the process is performed repeatedly list
biometrics:
Using human characteristics such as fingerprints, retina patterns, or voice patterns to identify users and control access
Boolean
a sequence of identifiers separated by compatible operators, that evaluates to true or false
bytecode
A standard machine language into which Java source code is compiled
client/server model
A distributed approach in which a client makes requests of a server and the server responds
compiler
A program that translates a high-level language program into machine code
CPU scheduling
The act of determining which process in memory is given access to the CPU so that it may execute
cryptography
The field of study related to encoded information
declaration
A statement that associates an identifier with a variable, and action, or some other entity within the language that can be given a name so that the programmer can refer to that items by name.
denial-of-service
an attack on a network resource that prevents authorized users from accessing the system
digital certificate
a representation of a sender’s authenticated public key used to minimize malicious forgeries
digital signature
data that is appended to a message, made from the message itself and the sender’s private key, to ensure that authenticity of the message
directory tree
a structure showing the nested directory organization of the file system
disk scheduling
the act of deciding which outstanding requests for disk I/O to satisfy first
domain name
The part of a hostname that specifies a specific organization or group
download
Receiving data on your home computer from the Internet
dynamic-partition
memory management technique in which memory is divided into partitions as needed to accommodate programs
electronic-commerce
the process of buying and selling products and services using the WWW
encryption
the process of converting plaintext into hypertext
entity-relationship diagram
a graphical representation of ER model
expert system
a software system based on the knowledge of human experts
FIFO
First In First Out “Queue
file type
the specific kind of information contained in a file, such as a Java Program or a Microsoft Word document
firewall
a gateway machine and its software that protect a network by filtering the traffic
fixed-partition
the memory management technique in which memory is divided into a specific number of partitions into which programs are loaded
gateway
a node that handles communication between its LAN and other networks
FIFO
First In First Out “Queue
file type
the specific kind of information contained in a file, such as a Java Program or a Microsoft Word document
firewall
a gateway machine and its software that protect a network by filtering the traffic
fixed-partition
the memory management technique in which memory is divided into a specific number of partitions into which programs are loaded
gateway
a node that handles communication between its LAN and other networks
graph
a data structure that consists of a set of nodes and a set of edges that relates the nodes to each other
inference engine
the software that processes rules to draw conclusions
internet service provider (ISP)
a company providing access to the Internet
interpreter
a program that inputs a program in a high-level language and directs the computer to perform the actions specified in each statement
IP address
an address made up of four numeric values separated by dots that uniquely identify a computer on the Internet
leaf node
a tree node that has no children
LIFO
Last In First Out “Stacks”
logical address
a reference to a stored value relative to the program making the reference
malicious code
a computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions
memory management
the act of keeping track of how and where programs are loaded in main memory
multiprogramming
the technique of keeping multiple programs in main memory at the same time, competing for the CPU
natural language
Languages that human beings use to communicate such as English
node
the building blocks of dynamic structures, each made up of a component (the data) and a pointer (the link) to the next node
object-oriented paradigm
a technique for developing software in which the solution is expressed in terms of objects—self-contained entities composed of data and operations on that data that interact by sending messages to one another
open system
a system that is based on a common model of network architecture and an accompanying suite of protocols
operating system
system software that manages computer resources and provides and interface of system interaction
packet
a unit of data sent across a network
page
a fixed-size portion of a process that is stored into a memory frame
physical
address in actual address in the main memory device
pop
removing an item from the stack
preemptive scheduling
CPU scheduling that occurs when the operating system decides to favor another process, preempting the currently executing process
process
the dynamic representation of a program during execution
proprietary system
a system that uses technologies kept private by a particular commercial vendor
protocol
a set of rules that define how data is formatted and processed on a network
pseudocode
a mixture of English statements and control structures that can easily be translated into a programming language
public-key cryptography
an approach to cryptography in which each user has two related keys, one public and one private
push
Adding an item to the stack
query
a request for information submitted to a database
queue
An abstract data type in which items are entered at one end and removed from the other end
relational model
a database model in which data and the relationships among them are organized into tables
relative
a path that begins at the current working directory
repeater
a network device that strengthens and propagates a signal along a long communication line
risk analysis
determining the nature and likelihood of the risks to key data
root directory
the topmost directory, in which all others are contained
root node
The beginning of the tress, unique starter node
router
a network device that directs a packet between networks toward its final destination
rule-based system
a software system based on a set of if-then rules
schema
a specification of the logical structure of data in a database
simulation
developing a model of a complex system and experimenting with the model to observe the result
smart card
a card with an embedded memory chip used to identify users and control access
spoofing
an attack on a computer system in which a malicious user masquerades an authorized user
SQL
a comprehensive relational database language for data management and queries
stack
An abstract data type in which accesses are made at only one end
strong typing
Each variable is assigned a type, and only values of that type can be stored in the variable
table
a collection of database records
text file
a file that contains characters
thrashing
inefficient processing caused by constant page swapping
time slice
the amount of time given to each process in the round-robin CPU scheduling algorithm
timeshare
a system in which CPU time is shared among multiple interactive users at the same time
upload
sending data from your home computer to a destination on the Internet
variable
a location in memory, referenced by an identifier, that contains data value
virtual machine
the illusion created by a timesharing system that each user has a dedicated machine
voice recognition
using a computer to recognize the words spoken by a human
voice synthesis
using a computer to create the sound of human speech
working directory
the currently active subdirectory