• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/163

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

163 Cards in this Set

  • Front
  • Back
User Interface
controls how data and instructions are entered and how information is displayed. there are 2 types
What are the two types of user interfaces?
graphical user interface (GUI)

command-line interface
Virtual Memory
a concept in which the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM
server operating system
organizes and coordinates how multiple users access and share network resources
Windows 7
Microsoft's fastest, most efficient operating system to date
Mac OS X
a multitasking GUI operating system available only for Apple computers
UNIX
a multitasking operating system that is flexible and powerful
Linux
popular, UNIX-type operating system that is open source software, which means its code is open for the public for use, modification, and redistribution
What are various Server Operating Systems?
Windows Server 2008
UNIX
Linux
Solaris
Novell's NetWare
Solaris
a server operating system that is specifically designed for e-commerce applications
Novell's NetWare
server operating system designed for client/server networks
What are several Embedded Operating systems?
Windows embedded CE
Windows Mobile
Palm OS
iPhone OS
Google Android
Windows Embedded CE
scaled down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality such as VoIP phones, cameras, ATM, point-of-sale terminals, picture frames, handheld navigation devices, and portable media devices
Windows Mobile
operating system based on Windows Embedded CE, works on smart phones and PDAs
Palm OS
operating system used on smart phones and PDAs
iPhone OS
operating system for iPhone and iPod touch
Embedded Linux
scaled-down Linux OS for smart phones, PDAs, and other devices
Symbian OS
open source multitasking OS designed for smart phones
Web filtering software
restricts access to certain material on the web
What are the components requires for successful communication?
1. sending device
2. communications channel
3. receiving device
groupware
software that helps groups of people work together and share information over a network
collaborate
work online with others
Web services
standardized software that enables programmers to create applications that communicate with other remote computers over a network
What are types of dedicated lines?
IDSN lines
DSL
FTTP
T-carrier
ATM
IDSN lines
set of standards for digital transmission over standard copper telephone lines
T-carrier line
long-distance digital telephone line that carries multiple signals over a single comms line
ATM
(Asynchronous Transfer Mode)
a service that carries voice, data, video, and multimedia at extremely high speeds
Home network
can use phone lines or WiFi

Most homes use WiFi which can transmit to distances up to 1,500 feet
Twisted pair cable

(Transmission media)
consists of one or more twisted-pair wires bundled together
Fiber-optic cable
consists of thin strand of plastic or glass that use light to transmit signals.
Broadcast radio
distributes radio signals thru the air or space
Cellular radio
a form of broadcast radio that is used widely for mobile communications
Microwaves
radio waves that provide a high-speed signal transmission
What are the qualities of valuable information?
accurate, verifiable, timely, organized, accessible, useful, and cost-effective.
Accurate information
error free
verifiable info
can be proven as correct or incorrect
timely info
has an age suited to its use
organized info
arranged to suit the needs and requirements of the decision maker
accessible info
available when the decision maker needs it
useful info
has meaning to the person who receives it
cost-effective info
should give more value than it costs to produce
character
number, letter, space, punctuation, or other symbol.
*1 byte (8 bits)
field
a combination of one or more related characters and is the smallest unit of data a user accesses
record
a group of related fields
data file
a collection of related records stored on a storage medium
File processing approach (system)
each department or area withing an organization has its own set of data files
What are the 2 weaknesses of the file processing approach (system)
1. redundancy
2. isolated files
database approach
many programs and users share the data in a database
What are some advantages to the database approach?
1. reduces data redundancy
2. improves data integrity
3. permits easier access
4. reduces development time
What are some disadvantages to the database approach?
1. more complex requiring special training, more storage computer memory and processing power
2. more vulnerable
data dictionary
contains data about each file in the database and each field within those files
What are some DBMS retrieving and maintaining functions?
1. query language
2. query by example
3. forms
4. report generators
query language
simple English like statements that allow user to specify the data to display, print, or store
query by example (QBE)
has a graphical user interface that assists users in retrieving data
form
a window on the screen that provides areas for entering or modifying data
report generator
allows users to design a report on the screen, retrieve data into the report design, and then display or print the report
database log
a listing of activities that changes the contents of the database
recovery utility
uses the logs and/or backups to restore the database
continuous backup
a backup plan in which all data is backed up whenever a change is made
data model
consists of rules and standards that define how the database organizes data
What are the 3 most popular data models?
1. relational
2. object-oriented
3. multidimensional
relational database
stores data in tables that consist of rows and columns.
What does a relational developer refer to file, record and field as?
file: relation
record: tuple
field: attribute
What does a relational user refer to file, record, and field as?
file:table
record:row
field: column
Structures Query Language SQL
allows users to manage, update, and retrieve data in a relational database
object-oriented database (OODB)
stores data in objects
object

(in reference to databases)
an item that contains data, as well as the actions that read or process the data
object query language OQL
often used by object-oriented databases to manipulate and retrieve data
multidimensional database
stores data in dimensions and allows users to access and analyze and view of the database data
data warehouse
huge database system that stores and manages the data required to analyze historical and current transactions
uses multidimensional databases
How do you interact with Web Databases?
links to a form on a web page. to access you fill in the form, or enter search text on a web page
database analyst (DA)
focuses on the meaning and the usage of data. Decides on the placement of fields, defines the relationships among data, and identifies users' access and privileges
database administrator (DBA)
requires a more technical inside view of the data. creates and maintains the data dictionary, manages security, monitors performance, and check backup and recovery procedures.
worm
copies itself repeatedly
what does installing a firewall and/or intrusion detection software defend against?
botnet
denial of service attack
improper use of a back door
spoofing
what can access control include?
user name
password
possessed object
biometric device
Software piracy
unauthorized and illegal duplication of copyrighted software
What are some way companies attempt to prevent information theft?
encryption
digital signature
digital certificate
certificate authority
system failure
prolonged malfunction of a computer.
uninterruptible power supply (UPS)
contains surge protection circuits and one or more batteries that can provide power during a power loss.
repetitive strain injury (RSI)
injury or disorder of the muscles, nerves, tendons, ligaments, and joints
tendonitis and carpal tunnel
How do you prevent health-related disorders?
1. take frequent breaks
2. use precautionary exercises and techniques
3. incorporate ergonomics when planning
cookie
a file the a web server stores on a computer to collect data about the user
spyware
a program placed on a computer that secretly collects data about a user
adware
a program that displays an online advertisment in a banner or pop-up window
phishing
scam which the perpetrator sends an official looking email message that attempts to obtain a user's personal financial info
social engineering
gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
What are the six steps of the Program Development Life-Cycle
1. Analyze requirements
2. Design Solution
3. Validate Design
4. Implement Design
5. Test Solution
6. Document Solution
What are the 5 phases of the System Development Life-Cycle
1. Planning
2. Analysis
3. Design
4. Implementation
5. Operation, Support, & Security
Planning Phase
project request reviewed and approved - requests are prioritized, resources allocated, and a project development team is formed
repetitive strain injury (RSI)
injury or disorder of the muscles, nerves, tendons, ligaments, and joints
tendonitis and carpal tunnel
How do you prevent health-related disorders?
1. take frequent breaks
2. use precautionary exercises and techniques
3. incorporate ergonomics when planning
cookie
a file the a web server stores on a computer to collect data about the user
spyware
a program placed on a computer that secretly collects data about a user
adware
a program that displays an online advertisment in a banner or pop-up window
phishing
scam which the perpetrator sends an official looking email message that attempts to obtain a user's personal financial info
social engineering
gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
What are the six steps of the Program Development Life-Cycle
1. Analyze requirements
2. Design Solution
3. Validate Design
4. Implement Design
5. Test Solution
6. Document Solution
What are the 5 phases of the System Development Life-Cycle
1. Planning
2. Analysis
3. Design
4. Implementation
5. Operation, Support, & Security
Planning Phase
project request reviewed and approved - requests are prioritized, resources allocated, and a project development team is formed
Analysis Phase
preliminary investigation (feasibility study) conducted to determine the exact nature of the problem or improvement and detailed analysis is performed to study how the current system works, determine users' requirements, and recommend a solution.
Design Phase
and necessary hardware and software are acquired, and the details of the new or modified information system are developed
Implementation Phase
new or modified system is constructed and delivered to the users
Operation, Support, & Security Phase
ongoing assistance is provided for the information system and its users after the system is implemented
system development
a set of activities used to build an information system.
project management
the process of planning, scheduling, and then controlling the activities during system development
What is the goal of project management?
to deliver an acceptable system to the user in an agreed-upon time frame
feasibility
a measure of how suitable the development of a system will be to the organization
programming language
a set of words, abbreviations, and symbols that enables a programmer to communicate instructions to a computer
low-level language
programming language that runs only on one type of computer
procedural languages
third-generation language (3GL)
high-level languages that can run on many different computers and OS. a programmer writes instructions that tell the computer what accomplish and how to do it
What is a major benefit of object-oriented programming (OOP) language
the ability to reuse and modify existing objects, allowing programmers to create applications faster
What are the 4 types of OOP languages
1. Java
2. C#
3. F#
4. C++
Rapid application development (RAD)
a method of developing software which the programmer writes and implements a program in segments instead of waiting until the entire program is completed
often used in conjunction with OOP
Visual Studio
Microsoft's suite of program development tools including:
Visual Basic
Visual C++
Visual C#
4GL (fourth generation language
non-procedural language that users and programmers use to access the data in a database
*SQL is a popular 4GL
application generator
creates source code, or machine code from a specification of the required functionality, and a macro
macro
series of statements that instructs a program how to complete a task
Hypertext Markup Language (HTML)
special formatting language used to format documents for display on the Web
dynamic HTML (DHTML)
aka scripting language
used to add interactivity to Web pages
Popular languages for developing web pages
1. Ruby on Rails
2. Ajax
3. API
Ruby on Rails
open source framework that provides technologies for developing object-oriented, database driven Web sites
Ajax (Asynchronous JavaScript and XML)
method of creating interactive Web applications designed to provide immediate response to user requests
*updates only changes to Web page
API (application programming interface)
collection of tools that programmers use to interact with the environment such as a Web site or OS
Types of Web page authoring software
Dreamweaver
Expression Web
Flash
Share Point Designer
Control structure
depicts the logical order of program instructions.
What are the 3 basic control structures?
1. sequence
2. selection
3. repetition
What are some tools and techniques business managers use?
business intelligence (BI)
business process mngmnt (BPM)
business proc. automation (BPA)
Accounting information systems
Manage everyday transactions & help budget, forecast, & analyze
distribution systems
control inventory and manage shipping
office information system (OIS)
enables employees to perform tasks using computers and other electronic devices, instead of manually
transaction processing system (TPS)
captures and processes data from day-to-day business activities
management info system (MIS)
generates accurate, timely, and organized info, so users can make decisions, solve problems, or track progress
decision support system (DSS)
helps users analyze data and make decisions
expert system
captures and stores the knowledge of human experts and then imitates human reasoning and decision making
enterprise resource planning (ERP)
provides applications to help manage and coordinate ongoing activities
content management system (CMS)
organizes and allows access to carious forms of documents and files
What are types of technologies used throughout an enterprise?
portals
communications
data warehouses
extranets
Web services
service-oriented architectures
workflow
virtual private networks
extranet
allows customers or suppliers to access part of an enterprise's intranet
Web services
allow businesses to create products and B2B interactions
service-oriented architecture
helps increase communications between diverse information systems
workflow applications
assists in the management and tracking of the activities in a business process
virtual private network (VPN)
provides users with a secure connection to a company's network server
virtualization
the practice of sharing or pooling computing resources, such as servers and storage devices
server virtualization
provides the capability to divide a physical server logically into many virtual servers
storage virtualization
provides the capability to create a single logical storage device from many physical storage devices
cloud computing
Internet service that provides computing needs to users
grid computing
often used in research environments, combines many servers and/or personal computers on a network to act as one large computer
enterprise hardware
allows large organizations to manage and share info and data using devices geared for maximum availability and efficiency
redundant array of independent disks (RAID)
a group of integrated disks that duplicates data, instructions, and info to improve data reliability
network attached storage (NAS)
server that provides storage for users and information systems
storage area network (SAN)
provides storage to other servers
enterprise storage system
consolidates storage so that operations run efficiently
blade servers
pack a complete computer server on a single card, or blade, rather than a system unit
differential backup
copies only files that have been changed since the last full backup
incremental backup
copies only files that have changed since the last incremental backup
selective backup
aka partial backup
allows users to backup specific files
continuous data protection (CDP)
all data is backed up whenever a change is made
What are the components of a disaster recovery plan
1. Emergency Plan
2. Backup Plan
3. Recovery Plan
4. Test Plan
Emergency Plan
specifies the steps to be taken immediately after disaster strikes
Backup Plan
specifies how a company uses backup files and equipment to resume information processing
Recovery Plan
identifies the actions to be taken to restore full information processing operations
Test Plan
contains information for simulating disasters and recording an organization's ability to recover