Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
221 Cards in this Set
- Front
- Back
Windows Explorer
|
PROGRAM TO ORGANIZE AND MANIPULATE FILES STORED ON YOUR COMPUTER
|
|
File shredder software
|
permanently deleting- overwrites empty sectors with random 1's and 0's- good for when you are donating your computer
|
|
Gateway
|
any software or device used to join two networks
|
|
Bandwidth
|
transmission capacity of a communications channel- Broadband and Narrowband
|
|
Narrowband
|
Less capacity- internet and DSL
|
|
Broadband
|
^ capacity- cable, tv, DSL
|
|
PAN
|
Personal Area Network- wireless connection (30 feet) Example comp --> printer
|
|
LAN
|
Local area network- wireless single building
|
|
MAN
|
Metropolitan Area Network- public high speed (50 miles)
|
|
WAN
|
Wide Area Network- large area usually consists of smaller networks
|
|
Server-client
|
computer on a network + supplies with data. Client (responding to web page) requests data
|
|
Mainframe
|
Large and $$- simultaneously processing data for 100's or 1000's users- Business or government buildings (security) Is 6.5 feet tall 2,807 pounds $100,000 to one milly
|
|
Data
|
Symbols that represent people, events, things, ideas, names, #, colours, notes
|
|
Digital
|
1's 0's- text, #, sounds, graphics videos being converted. Example light switch going on and off
|
|
Analog
|
represents an infinite scale of values "dimmer"
|
|
Numeric Data
|
arithmetic operations binary code 0-1
|
|
Character Data
|
letters, symbols, numerals, NOT arithmetic (name addy #)
|
|
ASCII
|
American Standard Code for Information Interchange- 7 bits/ char. A=1000001. Uppercase, lower, punctuation, numerals
|
|
Extended
|
8 bits- other graphic symbols
|
|
Unicode
|
16bit
|
|
Compiler
|
converts all statements in a program in a single batch and results in a collection of instructions (object code) is placed in a new file
|
|
Machine Language
|
list of codes for microprocessors instruction sets- directly executed by processors circuitry
|
|
Brute force attack
|
password cracking software- runs for days much more extensive than dictionary attack
|
|
Sniffing
|
Records network tracking
|
|
Phishing
|
hacker obtains ISP and banking info
|
|
Keylogger
|
Records users keystrokes and sends information to a hacker- forms malicious codes
|
|
Trojan
|
seems to perform one thing but does another- type of virus
|
|
ALU
|
Arithmetic Logic Unit- +/- logical operations. Comparing numbers to see if they are the same
|
|
Registers
|
holds data that is being processed
|
|
Control unit
|
fetches each instruction
|
|
Authentication Protocol
|
any method that confirms a persons identity using something the persons knows, is, possesses
|
|
Biometrics
|
fingerprint, retinal, facial feature recognition
|
|
User ID
|
Character, letters- unique identifier
|
|
Password
|
verifies a user id
|
|
Solid State Storage
|
aka flash memory, earasible/ RW- like a digital camera
|
|
LCD
|
Liquid crystal display- produces images by manipulating light within a layer of liquid crystals- Standard on notebooks
|
|
Resolution
|
# of horizontal and vertical pixels that a device displays on a screen
|
|
CD
|
Compact disc- 80 minutes. 700 MB
|
|
DVD
|
Digital video disc/ digital versatile disk 4.7 GB (4700 MB) 7x CD capacity
|
|
Optical storage
|
stores data as a microscoptic light and dark spots( pits) on the disc surface (lands) lighter areas
|
|
RAM
|
Random access memory- temporarily holds data- chips. small circuit "waiting room"
|
|
ROM
|
Read only memory- holds computer start up routine- single integrated circuit permanent! "hard wired instructions"
|
|
Linux Platform
|
can use on windows or PC
|
|
Serial processing
|
one instruction processed at a time
|
|
Pipelining
|
instructions can be processed before previous instructions are complete
|
|
Parallel Processing
|
Multiple instructions at a time
|
|
Peripheral Device
|
designates input, output, and storage equipment added to a computer system to enhance functionality
|
|
Form Factor
|
size and dimensions of a component (system board or a unit) portable or not
|
|
Digital Revolution
|
Computers and the internet- 1980's. 40's and 50s had calculators- 50s computers for WWII, 1976 personal computers
|
|
Bulletin Boards
|
comments and questions- 1st type of social scene
|
|
Chat groups
|
Exchange messages real-time
|
|
Blogs
|
personal journals for public access weblogs
|
|
Web
|
World Wide Web- linked documents, graphics, and sounds accessed over the internet. 2009 there were 231 million websites
|
|
Cyberspace
|
entities that exist largely within computer networks
|
|
Digitalization
|
process of converting text, #s, sounds, photos, and videos into data that can be processed by digital services (cameras)
|
|
Convergence
|
Several technologies with distinct functions form into one single product (phone with camera and music player- i've side (quality)
|
|
Open source
|
developing and licensing software in which source codes remain public to be improved and freely distributed
|
|
Input
|
typed, transmitted, submitted into a computer supplied by a person, environment, or computers Example: words or symbols
|
|
Output
|
the result produced by a computer
|
|
Data- processing
|
the symbols that represent facts, objects, ideas. Computer manipulate data representing= processing
|
|
CPU
|
Central processing unit- microprocessors to programs to perform task based on received data
|
|
Memory
|
holds data waiting to be processed, stored, or output
|
|
Storage
|
data left on a permanent basis- not needed immediately- switches from one task to another
|
|
PDA
|
Personal digital assistant- pocket sized appointment book
|
|
Application software
|
a set of computer programs that helps a person carry out a taks (create, edit, print)
|
|
System Software
|
help computer systems monitor itself in order to function efficiently
|
|
Operating System
|
(OS) Master controller for all activities, starting and locating files
|
|
Wi-fi
|
wireless network technology- standards compatible with the internet (Example IEEE 802.11)
|
|
Router
|
wireless access point includes routing circuitry, can connect wi-fi networks to the internet
|
|
Internet Backbone
|
"Spine" increases the capacity of communication links. Provide main routes for data traffic
|
|
ISP
|
Internet service provider- company
|
|
Modem
|
Converts data signals from computer to communications channels
|
|
TCP/ IP
|
Responsible for message transaction on the internet. TCP- transmission control protocol- breaks messages into packets. IP- internet protocol- address packets so they can be routed to the desired areas
|
|
Protocol suite
|
combos that work together.
|
|
TCP
|
Transmission Control Protocol- creates, connects, and exchanges data
|
|
IP
|
Internet protocol- provides unique address
|
|
HTTP
|
Hypertext Transfer Protocol- Exchanges information over the web
|
|
FTP
|
File transfer protocol- transfers files between local and remote computer hosts
|
|
POP
|
Post office protocol- transfers email
|
|
SMTP
|
Simple mail transfer protocol. Emails messages over the server
|
|
VOIP
|
Voice over internet protocol- voice conversations
|
|
Static IP
|
Permanent page
|
|
Dynamic IP
|
Temporary page
|
|
DNS
|
Domain name system- unique IP addy entered into a large database
|
|
Port
|
Virtual device- abstract concept that allows a computer to perform more than one type of service
|
|
Ping
|
Packet internet Groper- send signals to address and awaits reply and notification
|
|
Wimax
|
A portable modem- coverage is limited
|
|
Firewall
|
designed to filter out suspicious packets attempting to enter or leave a computer
|
|
NAT
|
Network address translation- process your router uses to keep track of packets and public and private IP addresses
|
|
Hypertext
|
Stores literary documents, links and allows comments
|
|
RSS
|
Really simple syndication. Delivers files called "feeds" from web sites to people
|
|
URL
|
Uniform resource locator. Begins with http://- it is a unique address
|
|
HTML
|
Hypertext Markup Language- set of specifications for creating documents that a browser can display as a web page- how documents should appear
|
|
DHTML
|
Dynamic hypertext markup language- more animated
|
|
Web crawler
|
aka Web Spider- automated to visit web sites
|
|
Cookies
|
Local shared object- collect and store personal data- many users delete or block
|
|
Keyword Stuffing
|
unethical manipulated keywords placed to gain increased ratings Ex. "sex" but nothing to do with sex
|
|
Phishing
|
Reveals informations- scams
|
|
Pharming
|
An exploit that redirects users to a fake site by poisoning a domain with a false IP address. Appears legit- this is a very sophisticated way
|
|
WMA
|
Window media audio
|
|
Resolution
|
Bitmap graphics- the quality of an image depends on resolution
|
|
Pixelated
|
Create new pixels by averaging colours nearby- Example- enlarging an image
|
|
JPEG
|
Joint phtographic experts group- graphics store true colours
|
|
GIF
|
Graphics interchange format- 256 colours
|
|
PIECES framework
|
This systems helps classify problems. P-Performance (when system does not respond quickly enough) I- Information (users info) E-Economies (costs- too much to operate) C-Control (authority) E-Efficiency (too many resources used?) S-Service (too difficult)
|
|
PERT
|
Program evaluation and review technique- Analyze and identifies the time needed to complete each task
|
|
RFP
|
Request for proposal- describes problems and requirements for solutions
|
|
RFQ
|
Request for quotation. Price on hardware and software
|
|
Data Type
|
Specifies a way that data is represented on a disk or a RAM. Numeric or characters- letters, #s, symbols
|
|
Logical Data type
|
aka Boolean yes/no data, true/false
|
|
Hyperlink
|
Stores URLs used to link a database to a webpage Example- music store--> musician
|
|
W3C
|
World Wide Web Consortium
|
|
Hierarchal Database
|
one -to-one, one-to many- relationships are linked in a hierarchal structure
|
|
Network database
|
relationships between record types -mesh like
|
|
XML
|
Extensible Markup language- similar to HTML- allows a developer to customize tags
|
|
NAT
|
Network address translation- modifies IP addy in IPv4 headers
|
|
Spoofing
|
Deception
|
|
Telnet
|
enables one computer to communicate with another
|
|
Piracy
|
copyright infringement of software- unauthorized copying
|
|
Network operating System
|
server/ client uses multiple clients to share resources
|
|
Disk Manager
|
Software Ms-dos- initially a hard disk- used in the 80's and 90's
|
|
Dithering
|
"noise" randomizes error- colour blending images
|
|
Hub
|
Computer network device- "usb" holds many at once
|
|
MIS
|
Management information technology- department
|
|
Modulation
|
contains information that is to be transmitted in one or more wave forms
|
|
Syntax
|
Programming languages- grammar rules
|
|
Syntax Error
|
when an instruction does not follow the rules or grammar of a programmed language
|
|
Low level language
|
instructions of the lowest level of computer hardware
|
|
High level language
|
does the work of multiple low level commands
|
|
Assembly language
|
codes opposed to 0's and 1's- OP codes (abbreviated words)
|
|
Runtime Error
|
A program bug- shows up when you run a program- can't execute
|
|
Logic Error
|
Error in the logic or design of a program
|
|
BPR
|
Business Process Redesign- improving a business by making radical changes
|
|
Convergence
|
Merging of digital technology. Example- cell phones playing music
|
|
Database
|
collection of data store on one or more computers
|
|
Record
|
holds data for a single entity- person, place, or thing
|
|
Field
|
holds one item of data relevant to a records categories
|
|
Relative Reference
|
Reference that can change B4 to B3. Example- if you deleted a column the row would move up
|
|
Absolute Reference
|
Never changes when you insert rows
|
|
Statistical software
|
Helps you analyze large sets of data to discover relationships and patterns- display and explore data virtually
|
|
Mathematical Modelling Software
|
tools to solve math, science, and engineering problems
|
|
Spreadsheets
|
rows and column of numbers in real life situations (excel)
|
|
Cell
|
contains a value, label, or formula
|
|
Value
|
# in a calculation
|
|
Label
|
describes data
|
|
Formula
|
works behind the scenes to tell a computer how to use contents of the cells in calculations
|
|
Word Processing
|
Microsoft word- replaced typewriters
|
|
Desktop publishing softwares
|
DTP -graphic design- Adobe
|
|
Web authoring
|
creating web sites- HTML tags
|
|
Format
|
the way that all elements on a document are arranged
|
|
Vector Graphics
|
a set of instructions for re-creating a picture
|
|
Rastering
|
superimposing a grid over images and determining the colour of each pixel
|
|
Tracing
|
locates the edges of objects in a bitmap im age and converts the resulting shapes into graphic objects
|
|
Wireframes
|
pop up tent- covered with surface texture and colour to create 3-D graphics
|
|
Rendering
|
the process of wireframes- colour to create 3-D graphic
|
|
DRM
|
Digital Rights Management. Protects products of the entertainment industry- copyrights holders to limit access to
|
|
Microsoft Windows
|
80% of personal computers
|
|
Mac OS x
|
Macintosh operating systems- Apple. X= ten- more sophisticated
|
|
UNIX
|
1969 AT&T Bell was dependable- there were many versions
|
|
File extension
|
File name extensions- separated from main name Example Paint.exe (exe is the extension)
|
|
File specification
|
aka path file name
|
|
Defragmentation Utility
|
Software tool rearranges files on a disk so they are stored in clusters
|
|
Detailed reports
|
inventory lists- organized lists
|
|
DSL
|
Digital Subscriber line- high speed internet connection- telephone lines
|
|
EBCDIC
|
Extended Binary Coded Decimal Interchange Code- represents character data- digital computers
|
|
Exception Report
|
Management generated- low inventory list
|
|
Function
|
Spreadsheet software built in calculation formation
|
|
Gantt Chart
|
Chart that depicts projects schedule by showing tasks as a bar on a chart
|
|
Magnetic Storage
|
Technology for recording data onto disks and tape by magnetizing particles of an oxide toasted surface coating
|
|
Malware
|
Malicious software- viruses and worms disrupt
|
|
Output
|
Results produced by a computer- music, graphs
|
|
Record Occurrence
|
A record that has been filled with data for a particular entity
|
|
RF signals
|
Radio frequency Signals- they broadcast and receive information via radio waves
|
|
SSL
|
Secure socket layers- uses encryption to establish secure connections between computers and web sites
|
|
Tracing
|
Locates edges of objects in a bitmap graphic image and converts the shapes into vectors
|
|
3G
|
third generation
|
|
Browser
|
Retrieving, presenting, traversing information
|
|
CMOS
|
Complementary metal oxide semiconductor- constructs and integrates circuits
|
|
Demodulation
|
extracting information from a wave electronic circuit
|
|
Control panel
|
views and manipulates basic system settings
|
|
Desktop publishing
|
creation of documents using a page layout skill
|
|
CSS
|
Content scramble system- digital rights management- encrypt and control content on DVDs
|
|
Information
|
collects, stores, processes data- organized
|
|
Mission statement
|
Organizes goals and how they will accomplish them
|
|
Organizational chart
|
hierarchy of employees in an organization
|
|
Strategic planning
|
long range planning and future goals
|
|
Tactical planning
|
what will be achieved in a year or less
|
|
Operational planning
|
day-to-day planning
|
|
TPS
|
Transaction processing system- ways to collect, process, store, display, modify or cancel transactions
|
|
Ad hoc report
|
a demand report- specifies information not available on scheduled reports
|
|
Exception report
|
information that is outside normal/acceptable ranges
|
|
DSS
|
Decision support system- helps people make decisions by directly manipulating data
|
|
Data Mining
|
Analyzing existing data to discover unknown useful information
|
|
Data warehouse
|
for data from more than one database
|
|
Record
|
collection of data files
|
|
Record type
|
fields- no data
|
|
User interface
|
combination of hardware and software that helps people and computers communicate
|
|
command line interface
|
requires users to type memorized commands to run programs and tasks
|
|
Graphical user interface
|
provides a way to point and click a mouse
|
|
Kernal
|
provides essential operating systems services- memory management and file access
|
|
Computer virus
|
attaches itself to a file, and reproduces and spreads to other files. It is the distribution of infected files
|
|
Trojan
|
Pretends to perform one action while really performing another and infecting your computer
|
|
Keylogger
|
records a users keystrokes- hackers use this
|
|
Antivirus software
|
looks for viruses
|
|
Vertical market software
|
automates specialized tasks in a specific market or business
|
|
Horizontal market software
|
generic- any business can use this
|
|
Software suite
|
collection of software sold as a single package (mic office)
|
|
EULA license
|
end user license agreement
|
|
3-d graphics
|
wideframes and are three dimensional
|
|
CAD
|
Computer aided design software- 3-D for architects and engineers- blueprints and product specifications (autocad)
|
|
presentation
|
tools you need
|
|
Client/ server mode
|
hierarchal structure- servers are at the top
|
|
peer-to-peer
|
workstations serve as clients and servers
|
|
Communications protocol
|
set of rules for transmitting data from one network to another
|
|
Ethernet
|
waves that provide options for transporting data over wireless networks
|
|
LAN devices (5) Star, Ring, Bus, Mesh, tree
|
Star- home networks- central connection point that links workstations. Ring- connects all devices in a circle- each one has two neighbours failure in one= all- this is not used often. Bus- connects all on a common backbone- stops with a terminator- performs poorly. Mesh- connects each device to manage many networks- used today! Tree- blend of sta and bus- used for school and businesses -refer to pics
|
|
Kilobyte, kilobit
|
1000- small computer file 1.024
|
|
Megabyte, megabits
|
Million- medium to large file- 1,048,576
|
|
Gigabyte, gigabit
|
Billion- storage capacity - 1 billion
|
|
Terabyte
|
Trillion
|
|
Petabyte
|
1000 trillion 2^50
|