UTA INSY 2303 FINAL EXAM LATEST 2023-2024 REAL EXAM 300 QUESTIONS AND CORRECT ANSWERS|AGRADE

Uta insy 2303 exam quizlet pdf
Uta insy 2303 exam quizlet chapter 1
insy 2303 exam 1 quizlet
insy 2303 final exam
insy 2303 exam 2
insy 2303 uta

The _ number system allows digital devices to represent virtually any number simply by using 0s and 1s. (Unit 1)
Binary

Most graphics software uses a process called pixel _ to create new pixels by averaging the colors of nearby pixels. (Unit 1)
Interpolation

MIDI files are less compact than digital audio files. (Unit 1)
False

Which of the following options are well suited for using vector graphics? (Unit 1)
All of the above

A(n) _ is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played. (Unit 1)
Codec

One of the main disadvantages of MIDI is that it cannot produce vocals. (Unit 1)
True

Most music for portable media players is stored in _ audio file formats. (Unit 1)
Compressed

Which of the following is NOT a type of bitmap format? (Unit 1)
ZIP

Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image. (Unit 1)
True

__ is music, speech, and other sounds represented in binary format for use in digital devices. (Unit 1)
Digital audio

In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area? (Unit 1)
Cloning

Digital data can be __ that have been converted into discrete digits such as 0s and 1s. (Unit 1)
All of the above

8-bit color depth is also called True Color. (Unit 1)
False

Both scanners and digital cameras produce vector graphics. (Unit 1)
False

Lossy compression techniques discard some data from an image to shrink its file size. (Unit 1)
True

In digital video, a lower resolution reduces the bit rate. (Unit 1)
True

TIFF, PNG, and GIF graphics formats offer lossy compression. (Unit 1)
False

A bitmap graphic is composed of a grid of tiny rectangular cells. (Unit 1)
True

Lossy compression throws away some of the original data during the compression process. (Unit 1)
True

_ enables people to control software with spoken commands, as well as dictate text into a word processing document. (Unit 1)
Speech recognition

To conserve space, applications that require high-quality sound use low sampling rates. (Unit 1)
False

Which of the following is NOT a format that is used for digital audio? (Unit 1)
DOC

Digital photographs are stored as bitmap files. (Unit 1)
True

Digital video is a core technology for which of the following? (Unit 1)
All of the above

Which of the following is NOT a type of digital video container file? (Unit 1)
PNG

In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent. (Unit 1)
True

Sampling _ refers to the number of times per second that a sound is measured during the recording process. (Unit 1)
Rate

JPEG fields are compressed using lossy compression. (Unit 1)
True

Video resolutions can be expressed as width x height. (Unit 1)
True

3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form? (Unit 1)
A wireframe

The number of frames that are displayed per second is measured in _. (Unit 1)
Fps

A file name extension indicates the file format. (Unit 1)
True

Today’s color display devices represent color using the _ color model. (Unit 1)
RGB

Vector graphics usually require more storage space than bitmaps. (Unit 1)
False

Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques. (Unit 1)
True

Plain, unformatted text is sometimes called ASCII text. (Unit 1)
True

Compressed files usually have _ at the end of the file name. (Unit 1)
.zip

Lossy compression provides a way to compress data and reconstitute it into its original state. (Unit 1)
False

Which of the following tools would be found in 3-D graphics software? (Unit 1)
All of the above

After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic. (Unit 1)
True

Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size. (Unit 1)
False

What is another term for vector graphics software? (Unit 1)
Drawing Software

A vector graphic consists of a set of instructions for creating a picture. (Unit 1)
True

The number of colors available in a graphic is referred to as color _. (Unit 1)
Depth

Processing is handled by the computer’s central processing unit (CPU). (Unit 2)
True

_ is data that is entered into a computer. _ is the result produced by a computer. (Unit 2)
Input, Output

A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard. (Unit 2)
True

Intel Corporation is the world’s largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops. (Unit 2)
True

Most computer ads specify the speed of a microprocessor in gigahertz. (Unit 2)
True

The term instruction cycle refers to the process in which a computer executes a single instruction.​ (Unit 2)
True

In a microprocessor, the __ fetches instructions. (Unit 2)
Control unit

The ability to switch between programs makes computers multipurpose devices. (Unit 2)
True

In a display device, response rate is the time it takes for one pixel to change from black to white then back to black. (Unit 2)
True

Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called __ that combine sensors with processing circuitry. (Unit 2)
Microcontrollers

Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker. (Unit 2)
True

_ is a temporary holding area for data and programs. (Unit 2)
RAM

During an instruction cycle, all parts of the instruction are performed by the microprocessor’s control unit. (Unit 2)
False

What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, and video editors? (Unit 2)
Desktop

A solid state drive can be used as a substitute for a hard disk drive. (Unit 2)
True

Memory cards are typically volatile. (Unit 2)
False

Computers with the same operating systems can typically use the same software and peripheral devices. (Unit 2)
True

A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output. (Unit 2)
False

The part of the data bus that runs between the microprocessor and RAM is called the _ bus. (Unit 2)
Local

Battery life is the time your device operates before it must be recharged. (Unit 2)
True

Which of the following is an example of a computer that is a small, lightweight personal computer that is designed like a clam shell? (Unit 2)
Laptop computer

The electronic components of most digital devices are mounted on a circuit board called a __. (Unit 2)
All of the above

RAM is volatile. (Unit 2)
True

The operating systems for smartphones are radically different to those used for tablet computers. (Unit 2)
False

When a peripheral device is connected or disconnected while the host device is operating, it is called hot-plugging. (Unit 2)
True

When interference affects a wireless signal, data must be re-transmitted. (Unit 3)
True

Wi-Fi signals may reach up to 300 feet from the router. (Unit 3)
True

_ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school. (Unit 3)
LANs

UDP is faster than TCP but does not perform error checking. (Unit 3)
True

When setting up a Wi-Fi network, the router you select should support the fastest device you’ll want to use on the network. (Unit 3)
True

The most widespread wireless channels for communication networks are microwaves and RF signals. (Unit 3)
True

Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies. (Unit 3)
WAN

You can set up Wi-Fi to use wireless mesh topology OR star topology. (Unit 3)
True

Connection speed is technically a measure of capacity. (Unit 3)
True

The organization that supervises Internet addressing is ARPANET. (Unit 3)
False

__ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers. (Unit 3)
Ethernet

You may be able to bypass DNS outages by changing your DNS server. (Unit 3)
True

Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables. (Unit 3)
PAN

Microwaves have more carrying capacity than radio waves. (Unit 3)
True

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want? (Unit 3)
Static

Which DCE would you use if you wanted to extend a wired network by adding more ports? (Unit 3)
Hub

Which type of network topology connects a peripheral device to a host device? (Unit 3)
Point-to-point

DSL is an example of what type of Internet access? (Unit 3)
Fixed

When connecting to the Internet, most Internet users connect to a Tier 1 network. (Unit 3)
False

Network discovery works in the exact same way on all devices. (Unit 3)
False

On a network, any device that stores or generates data is considered to be a(n) _. (Unit 3)
DTE

Which of the following is an example of a DCE? (Unit 3)
All of the above

Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications? (Unit 3)
Fiber-optic cables

Wireless connections use licensed frequencies that are available for public use. (Unit 3)
False

The bandwidth of a channel that carries digital data is usually measured in _. (Unit 3)
Bits per second

Networks can be classified according to their size and geographic scope. (Unit 3)
True

Dropbox is an example of a file hosting service. (Unit 3)
True

Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet. (Unit 3)
FTP

Which file sharing protocol distributes the role of a file server across a collection of dispersed computers? (Unit 3)
BitTorrent

Which of the following is an advantage of wired connection? (Unit 3)
All of the above

The Internet is the world’s largest WAN. (Unit 3)
True

Which of the following is the technique for improving the ranking and visibility of a Web site? (Unit 4)
Search engine optimization

A 404 status code indicates that the resource that your browser requested does not exist. (Unit 4)
True

What does the HTML tag

designate in an HTML document? (Unit 4)
New paragraph

When were the original HTML specifications developed by Tim Berners-Lee? (Unit 4)
1990

Which of the following is a function of the browser cache? (Unit 4)
Any elements that it stores do not have to be downloaded again

The file name of a specific Web page always appears first in the URL. (Unit 4)
False

Using just HTML and CSS, Web designers can create dynamic Web pages. (Unit 4)
False

Search engines do not allow users to view or change their search history information. (Unit 4)
False

In the list below, which one is NOT a search operator?
GET

The __ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP. (Unit 4)
World Wide Web

In today’s Web, most Web pages have bidirectional links. (Unit 4)
False

Which of the following file extensions indicates the file is an HTML document? (Unit 4)
Both A and B

HTML is the only markup language used on the Web. (Unit 4)
False

You can create HTML documents with simple text editors such as Notepad or TextEdit. (Unit 4)
True

The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _. (Unit 4)
HTTP

A link contains the __ that links to another Web page. (Unit 4)
URL

Search engines will keep a record of your search history. (Unit 4)
True

Which of the following is a markup language? (Unit 4)
All of the above

A URL never contains spaces. (Unit 4)
True

You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents. (Unit 4)
True

HTTP is the markup language used to specify the contents of a Web page. (Unit 4)
False

Files can remain in the Web cache for days or weeks. (Unit 4)
True

HTTP uses port 20 for communications between a client device and a server. (Unit 4)
False

Which of the following is NOT an HTTP method? (Unit 4)
SEND

It is not possible to delete the contents of your browser cache. (Unit 4)
False

Which HTML tag designates links to other Web Page? (Unit 4)

If you want to change your default browser, you need to delete the browsers that you no longer want to use. (Unit 4)
False

Browser cache is another term for browser History list. (Unit 4)
False

Which HTTP method does a browser use when you upload files to a specific Web address? (Unit 4)
PUT

Which of the following is data that would NOT be found in a cookie? (Unit 4)
Information it reads from your hard drive

An HTML document begins with DOCTYPE and html declarations. (Unit 4)
True

The Web is synonymous with the Internet.
False

What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read? (Unit 4)
Hypertext

HTML tags are instructions for a browser. (Unit 4)
True

A(n) _ is a company that provides space on a server to house Web pages. (Unit 4)
Web hosting service

Which of the following is NOT used to create or edit HTML documents? (Unit 4)
Filezilla FTP client

HTTP is considered to be a(n) _ protocol. (Unit 4)
Stateless

You can use multiple browser on a device. (Unit 4)
True

What is the term used for when a link leads to a Web page that no longer exists? (Unit 4)
Link rot

An HTML document consists of three sections: the head, the body, and the content. (Unit 4)
False

The telecommunications technique used by local email is sometimes referred to as __. (Unit 5)
Store-and-forward

Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online. (Unit 5)
True

Copyright holders can assign any combination of CC rights to create a license. (Unit 5)
True

When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale. (Unit 5)
False

YouTube is an example of social media. (Unit 5)
True

In the United States, copyrights do not expire until 70 years after the author’s death. (Unit 5)
True

Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work. (Unit 5)
True

__ is an example of a content community. (Unit 5)
Wikipedia

Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial. (Unit 5)
True

Geocoding is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages. (Unit 5)
False

The number of teens using Facebook increased 30% in 2014. (Unit 5)
False

Which one of the following is NOT a Wikipedia content standard? (Unit 5)
RSS

Wiki software provides a set of tools for creating and editing content. (Unit 5)
True

Which popular social media service is good for sharing media and information? (Unit 5)
Content Community

Which of the following is NOT considered to be intellectual property? (Unit 5)
Public Domain

A person’s presence on a social media service is referred to as a(n) _. (Unit 5)
All of the above

What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them? (Unit 5)
Both A and B

Which of the following is a VoIP service? (Unit 5)
All of the above

__ are online services that facilitate communication and interaction among people who want to share information. (Unit 5)
Social media

In Wikipedia, it is possible to edit the text of an article in HTML. (Unit 5)
True

On mobile devices, VoIP uses the voice stream, not the data stream. (Unit 5)
False

_ tags make it possible to search for photos or videos using keywords. (Unit 5)
Metadata

Private messages can be forwarded by recipients, so they do not necessarily remain private. (Unit 5)
True

A nonprofit organization called __ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others. (Unit 5)
Creative Commons

Which of the following is the least important characteristic of content communities? (Unit 5)
Identity

Social networking services tend to emphasize identity and relationships. (Unit 5)
True

Webmail is configured so that incoming messages are stored in an Inbox on your local storage device. (Unit 5)
False

Instant messaging is a _, real-time technology for two or more people to type messages back and forth while online. (Unit 5)
Synchronous private

Editing the source content of wikis is discouraged at media content communities. (Unit 5)
False

In some academic settings, Wikipedia is not regarded as a reliable source of information. (Unit 5)
True

Commonly held expectations of privacy include which of the following? (Unit 5)
Both of the above

Which term is used to describe an online, personal journal in the form of a web page that contains posts on one or more topics which are usually displayed in reverse chronological order? (Unit 5)
Blog

Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs. (Unit 6)
False

Like books and movies, software is a type of intellectual property. (Unit 6)
True

Which of the following would be considered an operating system resource? (Unit 6)
All of the above

Web apps are examples of cloud computing. (Unit 6)
True

Which of the following feature is unique to OS X? (Unit 6)
Resource fork

A new version or edition of a software product is referred to as a software __. (Unit 6)
Upgrade

Which of the following is a process for installing software on a PC? (Unit 6)
None of the above

Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away. (Unit 6)
False

Which of the following operating systems is found on Macintosh desktop and laptop computers? (Unit 6)
OS X

Magnetic and optical media are divided into circular _ and then further divided into pie-shaped _. (Unit 6)
Tractors, sectors

Applications include menu options for opening and saving files calling on the operating system’s file management routines to get the job done. (Unit 6)
True

Mobile devices tend to be populated by entertainment apps, games, and social media services. (Unit 6)
True

A __ is generally priced at a flat rate and allows software to be used on all computers at a specific location. (Unit 6)
Site license

If you wanted to run multiple operating systems on one computer, you would use a virtual machine. (Unit 6)
True

In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet. (Unit 6)
Automatic recalculation

_ software may be freely copied, distributed, and even resold. (Unit 6)
Public domain

The kernel stays in RAM the entire time your computer is on. (Unit 6)
True

Paragraph style includes the alignment of text within the margins and the space between each line of text. (Unit 6)
True

Which category of software would programming languages fall into? (Unit 6)
Development Software

Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared. (Unit 6)
True

The difference between a web app and a mobile app is that the program code for Web apps , whereas mobile apps are stored on the handheld device, so they have to be __. (Unit 6)
Arrives only when you use the app, downloaded and installed

Which OS is installed on more than 80% of the World’s personal computers? (Unit 6)
Microsoft Windows

Two of the most common open source and free software licenses are _. (Unit 6)
BSD and GPL

Which of the following is not a file-naming convention? (Unit 6)
Spaces are not allowed

An operating system’s __ capability supports a division of labor among all the processing units. (Unit 6)
Multiprocessing

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other. (Unit 6)
True

What are the main software categories? (Unit 6)
System, Development, and Application

There is a universal standard for categorizing software and various categorization schemes have few similarities. (Unit 6)
False

A feature called _ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. (Unit 6)
Word wrap

Software for PCs contains a _ program that guides you through the installation process.(Unit 6)
Setup

Which of the following is a file management utility? (Unit 6)
Both A and B

Which of the following types of operating systems would most likely be found on a laptop computer? (Unit 6)
Desktop operating system

Portable software does not require installation. (Unit 6)
True

The term service pack usually applies to firmware updates for hardware components. (Unit 6)
False

A formula, such as =B6+(C6*.1), does not contain software on a PC? (Unit 6)
False

All smartphones use the Android operating system. (Unit 6)
False

The main directory on a storage device is referred to as the _ directory. (Unit 6)
Root

Trojans depend on __ to spread. (Unit 7)
Social engineering

Which of the following would be considered spyware? (Unit 7)
A keylogger

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? (Unit 7)
PUP

Viruses spread themselves from one device to another. (Unit 7)
False

Spam accounts for approximately __ of all email. (Unit 7)
70%

Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software. (Unit 7)
False

Microsoft uses a service called Safe Browsing to alert users about sites to avoid. (Unit 7)
False

In addition to replicating itself, a virus self-distributing. (Unit 7)
False

A computer _ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. (Unit 7)
Virus

Spam sent by scammers often uses spoofed email addresses. (Unit 7)
True

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files. (Unit 7)
Heuristic analysis

Hackers can use ports to communicate with devices in botnets. (Unit 7)
True

Android devices automatically encrypt data stored on the device when a user activates the login password. (Unit 7)
False

RATs can be used to create a backdoor to a victim’s device that takes control of the device’s camera. (Unit 7)
True

When antivirus software detects malware, which of the following would not be a course of action you could take? (Unit 7)
Conduct a heuristic analysis

If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. (Unit 7)
True

IMSI catchers are operated by cellular service companies. (Unit 7)
True

A(n) ____ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. (Unit 7)
Online intrusion

Password managers can generate unique passwords that have very good entropy. (Unit 7)
True

Most trojans are not designed to replicate themselves. (Unit 7)
True

OS X devices include a utility that automatically encrypts data stored locally. (Unit 7)
True

If you use a password manager, what do you as the user need to remember? (Unit 7)
The master password

A botnet has a server that is controlled by hackers. (Unit 7)
True

A _ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker. (Unit 7)
RAT

Which type of device is the top target for ransomware? (Unit 7)
Smartphones

The dot-com bubble occurred between the years 2008 and 2010. (Unit 8)
False

The growth of the ICT industry has a generally upward trend. (Unit 8)
True

Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States. (Unit 8)
True

Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. (Unit 8)
False

Companies are classified into economic sectors according to the types of goods and services they provide. (Unit 8)
True

The terms outsourcing and offshoring are the same thing. (Unit 8)
False

ENIAC’s memory held programs but not data. (Unit 8)
False

Whistleblowing is risky under any circumstances. (Unit 8)
True

Radio technology is the basis for cell phones and Wi-Fi. (Unit 8)
True

Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. (Unit 8)
True

A computer that used an Intel 4004 microprocessor would be considered a fourth-generation computer. (Unit 8)
True

Moore’s law accurately described the rate of chip innovation for the last 50 years. (Unit 8)
True

Samuel Morse developed and patented a telegraph system. (Unit 8)
True

Colossus used binary arithmetic. (Unit 8)
True

ICT use in emerging nations lags behind its use in developed nations. (Unit 8)
True

Technology workers encompass jobs such as telephone cable installers and radio broadcasters. (Unit 8)
True

A manual calculator implements algorithms autonomously. (Unit 8)
False

The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers. (Unit 8)
True

Atanasoff-Berry Computer is often considered the first electronic digital computer. (Unit 8)
True

Certification alone is sufficient to qualify for a job in the IT industry. (Unit 8)
False

Horizontal market software is designed to meet the needs of a single industry while vertical market software meets the needs of many different industries. (Unit 9)
False

Detailed application specifications can be developed before or after selecting the hardware and software for an information system. (Unit 9)
False

The planning phase of a SDLC includes all of the following except _. (Unit 9)
Writing a requirements report

Industry standard tools for scheduling and project management include PERT, WBS, and __. (Unit 9)
Gantt charts

At an ecommerce site, the merchant’s ecommerce application carries out only the first and last stages of the payment process. (Unit 9)
True

Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers? (Unit 9)
B2C

A transaction processing system is characterized by its ability to: (Unit 9)
All of the above

Once you’ve released data to an information system, you still have control of its distribution or its security. (Unit 9)
False

A(n) _ is a group of people working together to accomplish a goal. (Unit 9)
Organization

Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher. (Unit 9)
True

As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly. (Unit 9)
False

In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list. (Unit 9)
False

JAD provides a structured methodology for planning and holding a series of meetings in which users and analysts jointly identify problems and look for solutions. (Unit 9)
True

Which of the following is not a characteristic of a management information system? (Unit 9)
Collect, display and modify transactions

The maintenance phase of a SDLC includes all of the following except _. (Unit 9)
Convert data

A(n) _ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer. (Unit 9)
Supply chain

Hacking accounts for about 90% of data breaches. (Unit 9)
False

Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers? (Unit 9)
TQM

Information systems designed for a specific industry or enterprise may use vertical market software. (Unit 9)
True

The design phase of a SDLC includes all of the following except _. (Unit 9)
Write requirements report

The goal of SCM is to supply customers with the right product at the right price. (Unit 9)
True

Which type of problem requires human intuition as the basis for finding a solution. (Unit 9)
Unstructured

In addition to sales, CRM, and SCM, ERP modules support business activities such as _. (Unit 9)
All of the above

Fraud alerts interfere with your ability to receive instant credit. (Unit 9)
False

Iterative SDLCs are often referred to as “agile methods” because they allow flexibility as development progresses. (Unit 9)
True

Which of the following is not a core CRM system? (Unit 9)
Payment gateway

System documentation contains step-by-step instructions for performing specific tasks. (Unit 9)
False

Three key concepts ensure good quality of service include all of the following except _. (Unit 9)
Convertibility

_ applications provide optimal information when they encompass customer support, marketing, and sales. (Unit 9)
CRM

The scope of an information system includes which of the following? (Unit 9)
Computers, communications networks, and data, people and products, policies and procedures

Which ecommerce classification encompasses consumers selling merchandise and services to each other? (Unit 9)
C2C

Acceptance testing is designed to verify that the new information system works as required. (Unit 9)
True

Human errors are mistakes made by computer operators. (Unit 9)
True

A major source of data for CRM is produced by loyalty programs. (Unit 9)
True

Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster. (Unit 9)
True

A(n) sort uses one field, to arrange records. A(n) sort arranges information by more than one field. (Unit 10)
Single-level, multi-level

Which of the following is not considered to be type of database client? (Unit 10)
All of the above are types of database clients

A table’s physical sort order is the order in which records are arranged on storage devices. (Unit 10)
True

Spreadsheet software offers database capabilities for establishing relationships between different record types. (Unit 10)
False

SQL keywords must be entered in all uppercase letters because they are case-sensitive. (Unit 10)
False

Which of the following would not be considered a database data type? (Unit 10)
SELECT

A lookup routine validates an entry by checking data in an in-house or third-party database. (Unit 10)
True

Which database data type is a collection of binary data stored in a single field of a database? (Unit 10)
BLOB

Which of the following is not one of the main activities associated with operational databases? (Unit 10)
Providing an executive dashboard for decision makers

In a key-value database, each data item has a key that is a unique identifier similar to a relational database key. (Unit 10)
True

A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure. (Unit 10)
False

The acronym __ refers to software that manages data stored in a database. (Unit 10)
DBMS

A(n) __ is the column of data in a database that is used as the basis for rearranging the data. (Unit 10)
Sort key

The goal of normalization is to minimize data redundancy. (Unit 10)
True

FileMaker Pro and Microsoft Access are DBMSs. (Unit 10)
True

Which database tool is best for simple flat files that involve calculations? (Unit 10)
Spreadsheet software

A _ solution for data storage adds resources to a single device, while a _ solution adds more devices to a system. (Unit 10)
Scale up, scale out

Modern database tools support ____, which entails separating data from the programs that manipulate data. (Unit 10)
Data independence

_ refers to a branch of data mining that analyzes current and historical data to predict future trends. (Unit 10)
Predictive analysis

Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures. (Unit 10)
True

One of the ways that databases are classified is by their structure. (Unit 10)
True

An efficiently designed database uses computed fields whenever possible because they do not require manual data entry. (Unit 10)
True

A DBMS feature known as __ ensures that transactions are updated in an orderly manner by establishing update rules. (Unit 10)
Serializability

In a relational database, relationships are specified by joining common data stored in records from different tables. (Unit 10)
True

A(n) _ database is used to collect, modify, and maintain data on a daily basis. (Unit 10)
Operational

A(n) _ is a software tool for specifying the content and format for a database report. (Unit 10)
Report generator

In the database, a(n) _ contains the smallest unit of meaningful information. (Unit 10)
Field

An emerging computing platform that is likely to drive innovation and disruption through the next decade called __ has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed. (Unit 10)
3rd platform

__ is a data analysis technique used by decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status. (Unit 10)
OLAP

A(n) __ is a specification that the database designer sets up to filter data entered into a particular field. (Unit 10)
Field validation rule

The SQL __ command allows you to temporarily join and simultaneously access the data in more than one table. (Unit 10)
JOIN

An API is a set of application or operating system functions that programmers can add to the programs they create. (Unit 11)
True

Prolog and other declarative languages were classified as fifth-generation languages. (Unit 10)
True

Algorithms are usually written in a format that is specific to a particular programming language. (Unit 11)
False

An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers. (Unit 11)
True

A(n) _ changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program. (Unit 11)
Sequence control structure

Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. (Unit 11)
True

As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers. (Unit 11)
True

Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and life-critical applications. (Unit 11)
False

Finding a value for a variable is referred to as _. (Unit 11)
Instantiation

Some software engineering activities overlap with the systems analysis and design activities. (Unit 11)
True

The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain. (Unit 11)
True

Which programming language is used for artificial intelligence applications and expert systems? (Unit 11)
Prolog

Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. (Unit 11)
False

A(n) __ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution. (Unit 11)
Algorithm

What is the term that refers to the sequence in which a computer executes program instructions? (Unit 11)
Flow control

A(n) _ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. (Unit 11)
VDE

The process of planning a computer program begins with a problem statement that clearly define the program’s purpose. (Unit 11)
True

Programmers insert documentation called facts into the program code. (Unit 11)
False

A(n) converts all the statements in a program in a single batch, and the resulting collection of instructions, called _, is placed in a new file. (Unit 11)
Complier, object code

A low-level language uses command words and grammar based on human languages. (Unit 11)
False

A low-level language has a low level of _ because it includes commands specific to a particular CPU or microprocessor family. (Unit 11)
Abstraction

The human-readable version of a program created in a high-level language by a programmer is called __. (Unit 11)
Source code

A(n) ____ tells a computer what to do based on whether a condition is true or false. (Unit 11)
Selection control structure

When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution. (Unit 11)
True

Which of the following is not a characteristic for a good problem statement? (Unit 11)
It contains detailed descriptions of the processes and tools that need to be developed

The _ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other. (Unit 11)
Object-oriented

Regarding OO programming, which of the following terms best matches with the term “method”? (Unit 11)
Main()

Procedural languages encourage programmers to approach problems by breaking the solution down to a series of steps. (Unit 11)
True

In Prolog, the _ describes the relationship between the . (Unit 11)
Predicate, argument

Declarative languages are commonly used for production applications. (Unit 11)

Structured English is a subset of the English language with limited selection of sentence structures that reflect processing activities. (Unit 11)
True

The __ in a problem statement is the information that is supplied to the computer to help it solve a problem. (Unit 11)
Known information

Which of the following is not a programming paradigm? (Unit 11)
Predictive

Prolog programming is all about facts and rules. (Unit 11)
True

The facts in a Prolog program are useful even without any rules. (Unit 11)
True

_-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications. (Unit 11)
Third

BBS
Bulletin Board System, early forms of online social networking in which user posts could be viewed asynchronously by other members of the bulletin board community.

blog
A publicly accessible series of posts on the Web. Blogs often reflect the views of the author and are periodically updated with new entries.

The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.
browser cache

A module of computer code that adds capabilities to a browser, such as the ability to block ads on Web pages.
extension

A modification of copyright practices, copyleft allows third-party copying and distribution as long as the copies have the same license as the original.
copyleft

A message sent from a Web server to a browser and stored on a user’s hard disk, usually containing information about the user.
Cookie

Based on 5 rights, copy right holders can grant or deny: attribution, Share alike, no deritvatives, public domain, noncommercial.

Licensing options that extend rights, such as creating derivatives, to someone other than the copyright owner.
Creative commons

An activity in which a group of people contribute, usually online, to solving a problem or completing a task.
crowd sourcing

(Cascading Style Sheets) Used in conjunction with HTML, a means of formatting the appearance of text and other elements of a Web page.
CSS

A collection of information that might be stored in more than one file or in more than one record type.
Database

A work, such as a translation or adaptation, that contains major elements of a previously copyrighted work.
Derivative work

An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.
disk partition

POP3 – Post Office Protocol and
IMAP- Internet message access protocol both manage incoming mail,
SMTP-Simple mail transfer protocol-Handles outgoing mail

POP3 – Post office protocal 3, A standard for retrieving email messages from an email server.

SMTP – Simple Mail transfer protocal, A communications protocol used to send email across a network or the Internet.

IMAP – Internet message access protocal, A protocol similar to POP that is used to retrieve email messages from an email server, but offers additional features, such as choosing which emails to download from the server.
Email protocols

A type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline.
EULA- End User License Agreements

A set of rules, established by the operating system, that must be followed to create a valid file name.
file-naming conventions

Using informal information such as street addresses to derive more formal geolocational data, such as GPS coordinates.
geocoding

Adding location data to photos, web sites, HTML documents, audio files, blog posts, and texts

Adding geographic data, such as GPS coordinates, to a file tag.
Geotagging

Social networking services, such as Yelp and Google Maps, that offer location-based interaction.
Geosocial Networking

Hyper Text Markup Language (HTML)
A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.

Specify how the document should appear when displayed in a browser window

A set of instructions, such as , inserted into an HTML document to provide formatting and display information to a Web browser.
HTML tags

A legal concept that refers to ownership of intangible information, such as ideas.

four categories are:
Intellectual property

trademarks, patents, copyrights, trade secrets.

Data that contains information about other data; file tags are an example of metadata.
metadata tag

A social media service for posting short asynchronous messages such as tweets.
microblogging

The ability of a computer or an operating system to support dual-core processors or multiple processors.
multiprocessing

The ability of a computer, a processor, or an operating system to run more than one program, job, or task at the same time.
multitasking

A technology that allows multiple parts or threads from a program to run simultaneously.
multithreading

Software that includes its source code, allowing programmers to modify and improve it.
Open source software

what happens on the disks and in circuits for memory
Physical storage

A software module that adds a specific feature to a system. In the context of browsers, a plugin adds the ability to display or play various additional file formats.
pluggin

designed for PCs and it runs from removable storage, such as USB flash drive
Portable software

Material that is not subject to copyright restrictions on its use and distribution.
public domain

main directory, can be subdivided into smaller lists

The main directory of a disk.
root directory

A collection of patches designed to correct bugs and/or add features to an existing software program.
service pack

A program module supplied with a software package for the purpose of installing the software.
setup program

Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.
shareware

uses geolocation to meet with people who are nearby and have similar interests

Connecting with other nearby users on a geosocial network.
social discovery

A visual model of the links between entities in a social network.
sociograms

Uniform Resource locator, the address of a webpage
URL

The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.
Web Crawler

A group of Web pages accessible at a specific Web address that holds a collection of information identified by a common domain name, such as www.cnn.com.
website

Information displayed by a Web browser that’s produced from an HTML document or generated on the fly from data in a database.
web page

Collaborative web application that provides tools that enable contributors to post, read, and modify content
wiki

WWW- collection of documents, images, and videos, and sound files linked together through HTTP
World wide Web

AAC
(Advanced Audio Coding )
A file format that provides highly compressed audio files with very little loss of sound quality and is promoted by Apple on its iTunes Web site.

ALU
(Arithmetic Logic Unit)
The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.

ARPANET
(Advanced Research Projects Agency Network) One of the first packet switching computer networks using TCP/IP, and the prototype for the Internet.

ASCII
(American Standard Code for Information Interchange)
A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers.

Bandwidth
The data transmission capacity of a communications channel. Digital signals are measured in bits per second; analog signals in hertz.

Binary
The representation of data using two states, such as off-on or 1-0.

BMP
(File Extension .bmp)
The native bitmap graphics file format of Microsoft Windows.

BN
(Backbone Network)
high-speed network that connects many networks.

Broadband
A term used to refer to communications channels that have bandwidth that equals or exceeds 25 Mbps.

CISC
(Complex Instruction Set Computer)
A general-purpose microprocessor chip designed to handle a wider array of instructions than a RISC chip.

Compression Types

Core
A core is part of a CPU that receives instructions and performs calculations, or actions, based on those instructions. A set of instructions can allow a software program perform a specific function. Processors can have a single core or multiple cores.

CPU
(Central Processing Unit)
The main processing circuitry, or “chip,” within a computer that contains the ALU, control unit, and registers.

Data Bus
An electronic pathway or circuit that connects electronic components (such as the processor and RAM) on a computer’s system board.

Device Driver
A type of system software that provides the computer with the means to control a peripheral device.

DNS Spoofing
(Domain Name System)
A malicious attack on the domain name system in which the IP address corresponding to a Web site is changed in order to redirect users to different locations.

Dynamic Address
Temporarily assigned IP addresses usually provided by an ISP.

Form Factor
The configuration of a computer’s system unit; examples include tower, mini-tower, and cube.

GIF
(Graphics Interchange Format)
A bitmap graphics file format, popularized by CompuServe, for use on the Web.

Handshake
A process where a protocol helps two network devices communicate.

IPv4
(Internet Protocol version 4)
Internet addresses that are 32-bit IP addresses.
(Base 10)

IPv6
(Internet Protocol version 6)
Internet addresses that are 128-bit IP addresses.
(Base 16)

JPEG
(Joint Photographic Experts Group)
A format that uses lossy compression to store bitmap images. JPEG (pronounced “JAY-peg”) files have a .jpg extension.

LAN
(Local Area Network)
An interconnected group of computers and peripherals located within a relatively limited area, such as a building or campus.

Laser Printer
A printer that uses laser-based technology, similar to that used by photocopiers, to produce text and graphics.

LCD
(Liquid Crystal Display)
Technology used for flat panel computer screens typically found on laptop computers.

LED
(Light Emitting Diode)
Either a display technology that uses LEDs to produce an image on the screen, or one that uses LEDs as backlighting.

MAC address
(Media Access Control Address)
A unique identifier similar to a serial number assigned to networking equipment at the time of manufacture.

Machine Language
A low-level language written in binary code that the computer can execute directly.

Magnetic Storage
A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating.

MAN
(Metropolitan Area Network) is a computer network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

Microprocessor Clock
A timing signal that sets the pace for executing instructions in a microprocessor.
e.g. 3.4GHz

OCR
(Optical Character Recognition)
The ability of a device or software to digitize text from printed sources.

MPEG
(Moving Picture Experts Group)
A family of highly compressed container file formats and codecs for digital multimedia; MPEG-1, MPEG-2, and MPEG-4.

Network Topology
The physical structure (layout) of a network including its devices and connections.

Niche Device
Device with a limited function or purpose??
e.g. Smart watch

OCR
(Optical Character Organization)
The ability of a device or software to digitize text from printed sources.

OS
(Operating System)
The software that controls the computer’s use of its hardware resources, such as memory and disk storage space.

Optical Storage
A technology that records data as light and dark spots on a CD, DVD, or other optical media.

Packet
A small unit of data transmitted over a network.

PAN
(Personal Area Network)
An interconnected group of personal digital devices located within a range of about 30 feet.

Pixelation
Describes the effect of increasing the size of an image until smooth edges become jagged.

PNG
(Portable Network Graphics)
A type of graphics file format similar to but newer than GIF and JPEG.

RAM
(Random Access Memory)
Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.

RAW
(File Extension .RAW)
In the context of digital graphics, a file that contains unprocessed image data directly from a digital camera’s sensors.

RFID
(Radio Frequency Identification)
A short-range wireless network technology commonly used to track products containing RFID tags.

ROM
(Read Only Memory)
Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.

Samping Rate
The number of times per second a sound is measured during the recording process.

Server
A computer or software on a network that supplies the network with data and storage.

SSD
(Solid State Drive)
A data storage device that utilizes erasable, re-writable circuitry.

MAN
(Metropolitan Area Network) is a computer network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).

TCP
(Transmission Control Protocol)
The protocol within TCP/ IP that is responsible for establishing a data connection between two hosts and breaking data into packets.

Convergence
The expansion of cloud computing, a process by which several technologies with distinct functionalities evolve to form a single product. Your computer plays movies. Your cell phone has a camera. Your clock has a radio.

Cloud computing
A process that provided access to information, applications, communications, and storage over the Internet.

Digital data
Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.

Analog data
Data that is measured or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand.

Compression
Any technique that recodes the data in a file so that it contains fewer bits

Lossy compression
Any data compression technique in which some of the data is sacrificed to obtain more compression.

Lossless compression
A compression technique that is able to reconstitute all of the data in the original file; hence lossless means that this compression technique does not lose data.

Compression is commonly referred to as “zipping”.
True

On laptops and desktop computers, the compression utility is accessed from the same screen used to manage files.
True

Pixel interpolation
A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged.

Data
In the context of computing and data management, data refers to the symbols that a computer uses to represent facts and ideas.

Information
A computer system that collects, stores, and processes information, usually within the context of an organization.

Bitmap
An image, such as a digital photo, that is stored as a grid work of colored dots.

A bitmap graphic is composed of a grid of tiny rectangular cells where each cell is a picture element, commonly called a pixel.
True

Vector graphics include standard shapes such as circles and rectangles.
True

Vector graphics
An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn.

Vector graphics vs. Bitmap graphics
Vector graphics resize better than bitmaps, require less storage space, are not as realistic as bitmap images, and editing an object is easier than in bitmap.

Vector graphics are used for line art, logos, simple illustrations, infographic elements, and diagrams.
True

_ are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space.
3-D graphics

Ray tracing
A technique by which light and shadows are added to a 3-D image.

Rendering
In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows.

Vectors
Lines and curves that form simple shapes.

Vectors form a wireframe that works like the framework for a tent.
True

Software
The instructions that direct a computer to perform a task, interact with a user, or process data.

Application software
A set of computer programs that help users perform a specific task such as word processing.

The primary purpose of _ is to help the computer system monitor itself in order to function efficiently (an example is a computer operating system or OS).
System software

_ are used for creating software applications, Web sites, operating systems, and utilities.
Development tools

When a computer “runs” software, it performs the instructions to carry out a task.
True

Operating system
The software that controls the computer’s use of its hardware resources, such as memory and disk storage space.

Storage
A term used for the components of a digital device designed to hold data permanently.

A data storage system has two main components: a and a .
Storage medium; storage device

Storage medium
The disk, tape, CD, or DVD that contains data.

Storage device
The mechanical apparatus that records and retrieves data from a storage medium.

Magnetic storage
Storage that represents data by magnetizing particles of an oxide-based surface coating.

A hard disk drive contains one or more platters and their associated read-write heads.
True

A _ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.
Hard disk platter

A read-write head mechanism in the disk drive magnetizes particles to write data, and senses the particles’ polarities to read data.
True

Access time
The average time it takes a computer to locate data on the storage medium and read it.

Data transfer rate
The amount of data a storage device can move per second from the storage medium to RAM.

CD, DVD, and Blu-ray (BD) technologies are classified as optical storage, which represents data as microscopic light and dark spots on the disc surface.
True

Optical storage
Storage that records data as light and dark spots on a CD, DVD, or other optical media.

Optical technologies are grouped into three categories:
Read-only, recordable, and rewriteable.

Read-only technology (ROM)
A technology that stores data permanently on a disc, which cannot be later added to or changed and can potentially store data for 100 years.

Recordable technology (R)
A technology that uses a laser to change the color in a dye laser sandwiched beneath the clear plastic disc surface; the laser creates dark spots that are read as pits.

Rewritable technology (RW)
A technology that uses phase change technology to alter a crystal structure on the disc surface; altering this structure creates patterns of light and dark spots resembling pits and lands.

Solid state storage
Storage that stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape.

Memory card
A flat, solid state storage medium commonly used to transfer files from digital cameras and media players to computers.

Solid state drive (SSD)
A package of flash memory that can be used as a substitute for a hard disk drive.

USB flash drive
A portable storage device that plugs directly into a computer’s system unit using a built-in USB connector.

Cloud storage
A storage area that is located on a remote server, usually on the Internet, rather than on a local storage device.

Remote storage is housed on an external device that can be accessed from a network.
True

Security and privacy risks
The risk that the more places your data is stored and the more networks on which it tavels, the more susceptible it becomes to hackers and spying agencies.

Service outages
When all the data stored on a cloud storage site become temporarily inaccessible.

Discontinuation of service
When a cloud storage provider has closed down their services with little warning.

ALU (Arithmetic logic unit)
The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.

Control unit
The part of the microprocessor that directs and coordinates processing.

CPU (Central processing unit)
The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions.

RAM (Random access memory)
A temporary holding area for data, application program instructions, and the operating system.

Most RAM is volatile, meaning it needs electrical power to hold data.
True

In RAM, microscopic electronic parts called _ hold the bits that represent data.
Capacitors

Higher RAM capacity adds to the expense of a device.
True

ROM (Read only memory)
A type of memory circuitry that is housed in a single integrated circuit on the system board.

ROM contains a small set of instructions and data called the _ which tell a digital device how to start.
Boot loader

Virtual memory
A computer’s use of hard disk storage to simulate RAM.

Volatile
A term that describes data (usually in RAM) that can exist only with a constant supply of power.

Nonvolatile
Any electronic component that does not require a constant supply of power to hold data.

Durability
Storage that has resistance to damage from handling and environmental factors such as dust, humidity, heat, and cold. Can be measured lifespan or in write cycles ( the number of times it can be written and revised).

Serial processing
Processing data one instruction at a time, completing one instruction before beginning another.

Dependability
Storage that is available when needed; not subject to breakdown, malfunction, network outages, or service interruptions. Can be measured by mean time failures (MBTF is the time a device is expected to function before failing). Cloud storage dependability can be measured by uptime (the percent of time the service is accessible).

Capacity
The amount of data that can be stored, usually measured in gigabytes (GB) or terabytes (TB).

Pipelining processing
A technology that allows a processor to begin executing an instruction before completing the previous instruction.

Parallel processing
The simultaneous use of more than one processor to execute a program.

Communications network
A collection of devices used to originate, send, route, and receive data transmissions.

Wired channels
Channels that transport data through wires and cables.

Wireless channels
Channels that transport data from one device to another without the use of cable or wires.

When you set up a wired connection, you don’t have to worry about hackers intercepting your data from outside your house.
True

A _ contains circuitry that converts the data-carrying signals from a digital device to signals that can travel over various communications channels.
Modem

A _ converts digital signals from a computer into audible analog signals that can travel over telephone lines.
Voiceband modem

A _ is a fixed Internet connection that uses a voiceband modem and the telephone company’s circuit-switched network to transport data between your computer and your ISP.
Dial-up connection

TCP (Transmission control protocol)
The protocol responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking).

IP (Internet protocol)
The protocol responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.

Private IP address
An IP address that cannot be routed over the Internet.

Public IP address
An IP address that can be routed over the Internet.

IPv4 (Internet Protocol version 4)
The Internet address standard which uses 32-bit addresses to identify Internet connected devices.

IPv6 (Internet Protocol version 6)
The Internet address that uses 128 bits for each address; produces billions and billions of unique Internet addresses.

LAN (Local area networks)
Networks that are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.

Ethernet
A wired network technology that is defined by IEEE 802.3 standards.

Ethernet was originally a bus topology in which computers were all strung along a cable like birds on a power line.
True

Internet backbone
The major communications links that form the core of the Internet.

Latency
The elapsed time for data to make a round-trip from point A to point B and back to point A.

Packet loss
Data that never reaches its destination or gets discarded because it arrives too late.

Packet
A parcel of data that is sent across a computer network; once at their destination, they are reassembled into the original message according to their sequence numbers.

Packet switching
A technology used by data communications networks, such as the Internet, where a message is divided into smaller units called packets for transmission.

Circuit switching
The method used by the telephone network to temporarily connect one telephone with another for the duration of a call.

The Web (The World Wide Web)
A collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.

The Web is the Internet.
False

Web server
An Internet-based computer that stores Web site content and accepts requests from browsers.

A _ typically contains a collection of related information organized and formatted so it can be accessed using a browser.
Web site

A _ is based on an HTML source document that is stored as a file on a Web server.
Web page

Hypertext
A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another.

Hypertext links
Words, phrases, or images on a Web page that, when clicked, take you to designated URLs.

Ted Nelson coined the term hypertext to describe a computer system that could store literary documents; link them in logical relationships; and allow users to comment on what they read.
True

Most URLs begin with http:// to indicate the Web’s standard communications protocol.
True

HTTP
A communication protocol that works with TCP/IP to get the elements for Web pages to a local browser.

The data that you transmit to a Web server can be secured if it is sent over an _ , which encrypts the data stream between client devices and servers.
HTTP Secure connection

Sites that use HTTP Secure are required to present an SSL certificate to the browser; this helps the browser verify that the site is not pretending to be another site.
True

HTTP Secure is based on HTTP and a public key encryption technology called SSL/TLS.
True

_ is a very clever process that requires one key to encrypt data, but a different key to decrypt it; the encryption key can’t be used to decrypt the message.
Public key encryption

Client-side scripts
A program code that is executed by a client’s browser, as opposed to being executed by the server.

Server-side scripts
A program code that is executed by a Web server in response to client data.

HTML document
A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.

HTML tags
A set of instructions, such as , inserted into an HTML document to provide formatting and display information to a Web browser.

HTML5
The current version of HTML.

HTML
The foundation for professionally designed corporate Web sites.

Search engine
A computer program designed to help people locate information on the Web by formulating simple queries consisting of one or more words called keywords or search terms.

Web crawler
The component of a search engine that combs the Web to gather data that’s representative of the contents of Web pages.

Indexer
The component of a search engine that processes the information gathered by the crawler into a list of keywords and URLs stored in a database.

Database
The component of a search engine that stores billions of index references to Web pages.

Query processer
The component of a search engine that allows you to access the database by entering search terms, and then produces a list of Web pages that contain content relevant to your query.

SMTP
(Simple Mail Transfer Protocol) A communications protocol used to send email across a network or the Internet.

POP3
(Post Office Protocol version 3) A standard for retrieving email messages from an email server.

IMAP
(Internet Message Access Protocol) A protocol similar to POP that is used to retrieve email messages from an email server, but offers additional features, such as choosing which emails to download from the server.

VOIP
(Voice over Internet Protocol) Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.

Webmail
An email system that allows users to access email messages using a browser.

Asynchronous
In the context of communications, such as email and text messaging, both parties need not be online at the same time.

Synchronous
A communications mode, such as VoIP, in which participants must be online at the same time.

Store-and-forward Technology
A technology used by communications networks in which a message, such as an email, is temporarily held in storage on a server until it is requested by a client computer.

RSS Reader
Software that can be used to set up and access an RSS feed.

Public Domain
Material that is not subject to copyright restrictions on its use and distribution.

Copyright
A form of legal protection that grants certain exclusive rights to the work’s creator or the owner of the copyright.

Trademark
A logo symbol or word used to represent a business.

Intellectual property
A legal concept that refers to ownership of intangible information, such as ideas.

IP Address
private IP address- An IP address that cannot be routed over the Internet.

public IP address- IP addresses that can be routed over the Internet (as opposed to private IP addresses that cannot)

(Internet Protocol) One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.

Metadata Tag
Data that contains information about other data; file tags are an example of metadata.

Hotspot Triangulation
The process of locating a device based on its distance from various hotspot servers.

User Interface
The software and hardware that enable people to interact with computers.

Pirated Software
Software that is copied, sold, or distributed without permission from the copyright holder.

Open Sources Software
Software that includes its source code, allowing programmers to modify and improve it.

Executable File
A file, usually with an .exe extension, containing instructions that tell a computer how to perform a specific task.

EULA
(end-user license agreements) A type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline.

Portable Software
Software designed to be stored on a flash drive or CD and does not require installation before it is used.

Local Application
Software that is stored on a local device and loaded from there into RAM when it runs.

Server Operating System
A type of operating system, sometimes called a network operating system, that provides management tools for distributed networks, email servers, and Web hosting sites.

Kernel
The core module of an operating system that typically manages memory, processes, tasks, and storage devices.

Buffer
Memory that is temporarily used to store input or other data until the processor is ready to use it.

Memory Leak
An undesirable state in which a program requests memory but never releases it, which can eventually prevent other programs from running.

File Shredder
Software designed to overwrite sectors of a disk with a random series of 1s and 0s to ensure deletion of data.

Database
A collection of information that might be stored in more than one file or in more than one record type.

Database Software
Software designed for entering, finding, organizing, updating, and reporting information stored in a database.

Service Pack
A collection of patches designed to correct bugs and/or add features to an existing software program.

Software Update
A section of code or a program module designed to correct errors or enhance security on an already installed software product.

Software Upgrade
A new version of a software product containing new features and designed to replace the entire earlier version of the product.

Physical storage Model
A representation of data as it is physically stored.

Logical storage model
A metaphor for the representation of stored files as, for example, a file cabinet containing folders.

Disk Partition
An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.

Absolute reference
In a worksheet formula, a cell reference (usually preceded by a $ symbol) that cannot change as a result of a move or copy operation.

Relative reference
In a worksheet, a cell reference that can change if cells change position as a result of a move or copy operation.

Keylogger
A program, sometimes part of a trojan, that records a person’s keystrokes, saves them, and then sends them to a system administrator or remote hacker.

Firewall
Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts.

Pharming
An exploit that redirects users to fake Web sites.

Phising
An email-based scam that’s designed to fool users into revealing confidential information.

Address Spoofnig
Using a fake IP or email address to conceal the origin of a packet or message.

Social Enginering
Methods for tricking people into engaging in non-secure activities, such as clicking on links and downloading infected files.

TLS
(Transport Layer Security) An update of the Secure Sockets Layer (SSL) protocol for encrypting data before it is transmitted over a network.

Malware
Programs such as viruses, worms, and bots designed to disrupt computer operations.

Evile Twin
A malicious wireless network or hotspot designed to look legitimate and ensnare unwary users looking for a free Internet connection.

Man-in-the-Middle
A malicious exploit in which messages between two people are intercepted without their knowledge.

Spyware
Any software that covertly gathers user information without the user’s knowledge, usually for advertising purposes.

Adware
Software that displays unwanted advertisements or analyzes user online behavior to create a profile used by advertisers.

Port Scan
An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port probe.

Botnet
A group of bots under the remote control of a botmaster, used to distribute spam and denial-of-service attacks.

Software License Single User
Legal permission for one person to use a particular software package.

Software Licence Multi-User
Legal permission for more than one person to use a particular software package.

Software Licence Site
A legal contract that defines the ways in which a user may use a computer program.

Commercial software
Copyrighted computer applications sold to consumers for profit.

Proprietary software
Software that carries restrictions on its use that are delineated by copyright, patents, or license agreements.

Public domain software
Software that is available for public use without restriction except that it cannot be copyrighted.

Demo ware software
Software that is supplied for free, but is limited in some way until you pay for it.

Freeware software
Copyrighted software that is given away by the author or copyright owner.

Shareware software
Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.

Jailbreak
Making unauthorized changes to an iPod, iPhone, or iPad to get apps from a source other than the official iTunes App Store.

Virtual machine
Software that creates an operating environment that emulates another computer platform (for example, Parallels Desktop creates a virtual PC on an Intel Macintosh computer).

Thin Client
A device or software that depends on software, storage, and other services provided by another device, such as a Web server.

Multithreading
A technology that allows multiple parts or threads from a program to run simultaneously.

Miltitasking
The ability of a computer, a processor, or an operating system to run more than one program, job, or task at the same time.

Multiprocessing
The ability of a computer or an operating system to support dual-core processors or multiple processors.

Ransomware
Malware that encrypts files as part of an exploit to extort money from victims who want to regain use of their files in unencrypted format.

Backdoor
A method typically used by hackers for surreptitiously accessing computers.

Trojan
A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.

Worm
computer worm -A software program designed to enter a computer system, usually a network, through security “holes” and then replicate itself and spread to other devices.

Internet worm -A type of malware that spreads over the Internet, usually by sending itself to random IP addresses.

mass-mailing worm- A worm that sends itself to every email address in the address book of an infected computer.

file-sharing worm- A type of malware that is distributed on file sharing networks, such as pirate music download sites.

Virus
A program designed to attach itself to a file, reproduce, destroy data, display an irritating message, or otherwise disrupt computer operations.

Virus signature
The unique computer code contained in a virus that security software uses to identify it.

Quarantined File
A file suspected to be infected with a virus that is moved to a special folder by antivirus software to prevent accidental access to it.

Rootkit
Software that conceals running processes; used by hackers to disguise security breaches and break-ins.

Dictionary Attack
A method of discovering a password by trying every word in an electronic dictionary.

Brute force Attack
A method of breaking encryption code by trying all possible encryption keys.

Authentication protocol
Passwords, user IDs, and biometric measures used to verify a person’s identity.

Cryptographic Key
A specific word, number, or phrase that must be used to encrypt or decrypt data.

Cryptographic Algorithim
A specific procedure for encrypting and decrypting data.

Encryption
The process of scrambling or hiding information so that it cannot be understood without the key necessary to change it back into its original form.

Decryption
The process of removing the encryption to produce clear text.

Plaintext
An original, unencrypted message.

Ciphertext
An encrypted message.

Digital Certificate
A file that verifies the identity of a device, usually used in the context of network-based servers sending an encryption key to a client device.

Confidentiality
The obligation not to disclose willingly any information obtained in confidence.

Code of Ethics
A set of guidelines designed to help professionals make on-the-job ethical decisions.

Information Techonlogy
(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data.

Comuter Science
A career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems.

Software Engineer
The process of developing software using systematic mathematical, engineering, and management techniques.

Systems Analyst
A computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems.

Computer Operator
A computer professional who works directly with and maintains mainframe computers or server arrays.

Network administaor
The person responsible for configuring and monitoring a computer network.

Database Administrator
A person who supervises database design, development, testing, and maintenance.

Computer Programmer
A person who designs, codes, and tests computer programs.

Security specialist
A computer professional who analyzes security threats, implements solutions, and develops policies and procedures to protect computer equipment and data.

CIO
(CIO) The highest-ranking executive responsible for information systems.
Chief Information Officer

1G
Computers that used vacuum tubes to process and store data, such as UNIVAC.

2G
Computers that use transistors for data processing and storage instead of vacuum tubes.

3G
Computers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing.

4G
Computers, such as today’s personal computers, servers, and mainframes, that use a general-purpose microprocessor for data processing.

Transistor
A computer processing technology created by Bell Laboratories in 1947; characterizes second-generation computers, which replaced vacuum tubes for data processing.

Vacuum Tube
An electronic device that controls the flow of electrons in a vacuum and represents binary data; used in the construction of first-generation computers.

Moore’s Law
Gordon Moore’s prediction that technological innovation would double the number of transistors in an integrated circuit every two years without raising its cost.

Disruptive Technlogy
An invention that changes markets by replacing existing goods or services.

Offshoring
The corporate practice of relocating production, manufacturing, or customer service to lower-cost overseas locations.

Outsourcnig
The corporate practice of using third-party contractors to supply raw goods, manufacturing, or services.

Dot-coms
A legacy term for companies formed mainly to offer goods and services online.

Digital Revolution
is an ongoing process of social, political, and economic change brought about by digital technology, such as microchips, computers, and the Internet.

Convergence
The expansion of cloud computing , a process by which several technologies with distinct functionalities evolve to form a single product. Your computer plays movies. Your cell phone has a camera. Your clock has a radio.

The Web
is a collection of linked documents, graphics, and audio that can be accessed over the Internet.

Cloud Computing
which provided access to information, applications, communications, and storage over the Internet.

Digital data
Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.

Analog Data
Data that is measured or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand.

Digitization
Converting non-digital information or media to a digital format through the use of a scanner, sampler, or other input device.

Compression
A ratio such as 5:1 indicating the amount of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.

Lossy
Any data compression technique in which some of the data is sacrificed to obtain more compression.

Lossless
A compression technique that is able to reconstitute all of the data in the original file; hence lossless means that this compression technique does not lose data.

Image Resolution
The number of pixels in an image, usually expressed as horizontal pixels × vertical pixels.

Aspect Ratio
The ratio of the width and height of an image or display screen.

Pixel Interpolation
A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged.

Audio Sampling Rate
The number of times per second a sound is measured during the recording process.

Data
In the context of computing and data management, data refers to the symbols that a computer uses to represent facts and ideas.

Information
A computer system that collects, stores, and processes information, usually within the context of an organization.

Bitmap
An image, such as a digital photo, that is stored as a grid work of colored dots.

Vector Graphics
An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn.

Realism
the rendering process can take into account the way that light shines on surfaces and creates shadows.

3-D Graphics
are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space.

Vectors
Lines and curves that form simple shapes.

Rendering
In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows.

Ease of Editing-
Ability to edit vector or bit map. Vector easier to edit

Resizing

  • Ability to resize vector or bitmap. Vector resizes proportionally while bitmap maintains resolution.

Ray Tracing
A technique by which light and shadows are added to a 3-D image.

Instruction Set
The collection of instructions that a CPU is designed to process.

Software-
The instructions that direct a computer to perform a task, interact with a user, or process data.

Application-
Computer programs that help users perform a specific task such as word processing.

Operating system-
The software that controls the computer’s use of its hardware resources, such as memory and disk storage space.

Form factor
The configuration of a computer’s system unit; examples include tower, mini-tower, and cube.

Mainframe
is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. Its processing circuitry is housed in a closet-sized cabinet.

Supercomputer
at the time of construction, one of the fastest computers in the world

Server-
A computer or software on a network that supplies the network with data and storage.

ALU
The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.

Control Unit-
The part of the microprocessor that directs and coordinates processing.

RAM
Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.

ROM-
Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.

Virtual Memory-
A computer’s use of hard disk storage to simulate RAM.

Magnetic-
A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating.

Optical-
A technology that records data as light and dark spots on a CD, DVD, or other optical media.

Cloud
A storage area that is located on a remote server, usually on the Internet, rather than on a local storage device.

Volatile-
A term that describes data (usually in RAM) that can exist only with a constant supply of power.

Nonvolatile
Any electronic component that does not require a constant supply of power to hold data.

Serial processing-
Processing data one instruction at a time, completing one instruction before beginning another.

Pipelining processing-
A technology that allows a processor to begin executing an instruction before completing the previous instruction.

Parallel Processing-
The simultaneous use of more than one processor to execute a program.

Network Node
In a network, a connection point; in a hierarchical database, a segment or record type.

TCP
The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets.

IP-
One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.

Private IP address
An IP address that cannot be routed over the Internet.

Public IP Address
IP addresses that can be routed over the Internet

DNS spoofing
A malicious attack on the domain name system in which the IP address corresponding to a Web site is changed in order to redirect users to different locations.

Symmetric connection
Any connection to the Internet in which the upstream speed is the same as the downstream speed

Asymmetric Connection
A network connection in which the download capacity is different from (usually faster than) the upload capacity.

ARPANET-
One of the first packet switching computer networks using TCP/IP, and the prototype for the Internet.

Internet Backbone
The major communications links that form the core of the Internet.

ISP-
Companies that provide Internet access to businesses, organizations, and individuals.

IXP
Nodes on the Internet where data from one service provider is transferred to a different service provider.

NIC
Circuitry, often on an expansion card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter.

Communication Protocols
A set of rules that ensures the orderly and accurate transmission and reception of data.

Physical protocols
Specify cable and signal standards for the channels that carry data

Transport protocols
Make sure data gets to its destination by establishing standards for dividing data into chunks, assigning addresses, and correcting errors

Arrival protocols-
Convert data into standard formats that can be used by applications, such as email, Web browsers, and Skype

Packet
A small unit of data transmitted over a network.

Circuit Switching-
The method used by the telephone network to temporarily connect one telephone with another for the duration of a call.

Packet Switching
A technology used by data communications networks, such as the Internet, where a message is divided into smaller units called packets for transmission.

Jitter
Deviations in the timing of a digital signal that can interfere with communications, especially voice over IP.

Packet Loss
A situation in which data bits are lost in transit, requiring them to be resent, which significantly increases the time required for an intact message to arrive at its destination.

Fixed internet access
Any Internet access service designed to be used from a fixed, non-portable location

Portable internet access
Any type of Internet service, such as portable satellite, that can be moved from one place to another.

Dial-Up
A connection that uses a phone line to establish a temporary Internet connection.

Cable-
A type of Internet connection offered to subscribers by cable television companies.

DSL
A high-speed Internet connection that uses existing telephone lines, requiring close proximity to a switching station.

Satellite
A high-speed Internet service that uses a geosynchronous or low-earth orbit satellite to send data directly to satellite dishes owned by individuals.

FTTH
A communication link that connects subscribers’ homes using fiber-optic cable.

Web Server-
A computer that listens for queries from Web browsers and transmits HTML documents over the Internet.

Web Site
A group of Web pages accessible at a specific Web address that holds a collection of information identified by a common domain name, such aswww.cnn.com.

Web Page-
Information displayed by a Web browser that’s produced from an HTML document or generated on the fly from data in a database.

Hypertext
A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another.

Hypertext Links
words, phrases, or images on a Web page that, when clicked, take you to designated URLs.

Web Browser
A program that communicates with a Web server and displays Web pages.

Browser Cache
The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.

Plugin
A software module that adds a specific feature to a system. In the context of browsers, a plugin adds the ability to display or play various additional file formats.

Browser Extension
A module of computer code that adds capabilities to a browser, such as the ability to block ads on Web pages.

Dynamic Web Page-
A way of displaying data from a database as customized Web pages, which are generated as the page is sent to the browser.

Static Web Page
A Web page that does not change once it is displayed on the screen by a browser.

Client-Side scripts
Program code that is executed by a client’s browser, as opposed to being executed by the server.

Server-Side Scripts
Program code that is executed by a Web server in response to client data.

HTML document
A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.

Markup Language
A language that provides text and graphics formatting through the use of tags.

HTML Tags
A set of instructions, such as , inserted into an HTML document to provide formatting and display information to a Web browser.

HTML5
The current version of HTML.

CSS-
Used in conjunction with HTML, a means of formatting the appearance of text and other elements of a Web page.

Search Engine optimization
Making modifications to a Web site to move it closer to the top of the list returned by search engines.

Web Crawler-
The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.

Search engine Indexer
The component of a search engine that reviews the Web pages brought back by a crawler and creates pointers to them so that they can be quickly accessed.

Database
A collection of information that might be stored in more than one file or in more than one record type.

Query Processor
The component of a search engine that examines keywords entered by users and fetches results that match the query.

Communications Network
A collection of devices used to originate, send, route, and receive data transmissions.

Communications Channel
Any pathway between the sender and receiver; channel may refer to a physical medium or a frequency.

Network Topology
The physical structure of a network including its devices and connections.

Data
symbols that represent people, events, things, and ideas.

Data Representation
form in which data is stored, processed, and transmitted

Know the difference between bits and bytes
1 byte = 8 bits
Bits are binary, only 2 states (0/1, +/-, light/dark)

Ripping
Digital Audio Extraction

Know about bitmap and vector graphics
Bitmap: Grid of rectangular cells (pixel)
Vector: form a wireframe that works like the framework for a
tent
Rendering: applying wireframe surface with color and
texture
Ray tracing: technique to add light and shadow

Microprocessor
integrated circuit designed to process instructions
Most important, usually most expensive

CPU (Central Processing Unit)
Where the computations are performed

ALU (Arithmetic Logic Unit)
Part of the CPU that performs logic operations

How are peripheral devices generally attached to computers?
3 I think, keyboard, mouse, screen

Application software
set of computer programs that helps a person carry out a task

system software
Help the computer system monitor itself in order to function efficiently
example: OS

ARM based processors
smartphones and tablets

x86 processors
An older processor that first used the number 86 in the model number and processes 32 bits at a time.

Network
a group of two or more computer systems linked together

LAN (Local Area Network)
type of network used to describe computers that are connected in a single physical location

PAN (Personal Area Network)
A network that connects two to three workstations with twisted pair cabling most often seen in small or home offices.

WAN (Wide Area Network)
network that connects several LANs in different locations

Different types of topologies

Connection speed, internet connection
Speed measured in bits, storage measured in bytes
(symmetrical, asymmetrical): refers to symmetry of up/down speed

HTTP (HyperText Transfer Protocol)
the protocol used for transmitting web pages over the Internet

HTTPS (HyperText Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.

URL composition
Case sensitive, no spaces, forward slashes

What do you need to do if you want to change your default browser?
change stuff

Browser cache (deleting contents of browser cache)
Store information regarding browser sessions

Private key, public key encryption

hat is usually the extension at the end of a compressed file name?
.zip

MIDI (Musical Instrument Digital Interface)
A set of standards that are used to represent music in digital form

Speech synthesis
The process by which computers produce sound that resembles spoken words

speech recognition
The process by which computers recognize voice patterns and words, and then convert them to digital data.

Color depth
The number of colors per pixel that can be contained in an image.

Supercomputer
a particularly powerful mainframe computer.

Instruction
How to do something

Instruction set
set of all operations that can be executed by a processor

what should programs be converted into for the microprocessor to read instructions?
Machine Language

RAM (Random Access Memory)
The workspace of your computer. It’s the area that stores the information and data for processing by the computer’s CPU.

ROM (Read Only Memory)
Chips that contain programming code and cannot be erased.

Local and expansion buses
Local: computer bus that connects directly, or almost directly, from the CPU to one or more slots on the expansion bus, faster than expansion

Expansion: provides an input/output pathway for transferring information between internal hardware, such as RAM or the CPU, and expansion devices such as a graphics card or sound card.

Bandwidth
Transmission capacity measure by bit rate

circuit switching
a dedicated connection is formed between two points and the connection remains active for the duration of the transmission

Packet switching
the transmission technology that divides blocks of text into packets

Static and dynamic IP (Internet Protocol) address
Static: permanent
Dynamic: temporarily assigned to a device
V4: 32 bit
V6: 128 bit

HTML (Hyper Text Markup Language)
The computer language that is used to create a website.

Internet
Global data communications network

World Wide Web
collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP

Webpage
based on an HTML source document that is stored as a file on a Web server

Browser
Software used to browse the world wide web

FTP (File Transfer Protocol)
A protocol used to move files and folders over a network or the Internet.

Plugin
a program that extends a browser’s ability to work with file formats

markup languages
authors mark up documents by inserting special instructions called HTML tags that specify how the document should appear when displayed in a browser window

Critical Path
The sequence of stages determining the minimum time needed for an operation especially when analyzed on a computer for a large organization

Colocation Center
Centers that dedicate information systems which several corporations lease space and equipment

Data Center
a specialized facility designed to hold and protect computer systems and data

Application Development Tool
Software that assists in the creation of new software

ERP
Enterprise Resource Planning; it is a suite of software modules that integrate major business activities

SDLC/Phases of the SDLC
An information system progresses through several phases as it is developed, used, and retired

order of phases
Analysis > Design > Implementation > Maintenance > Planning

main purpose
System Requirements Report > Application Specifications > Working System > Project Development Plan

Feature Creep
A tendency for product or project requirements to increase during development beyond those originally foreseen

JAD
Joint Application Design, A process used in the life cycle area of the dynamic systems development method to collect business requirements while developing new information systems for a company

BI
A technology driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions

Object-Oriented Methodology
treats an information system as a collection of objects that interact to accomplish tasks

UML
Unified Modeling Language, The current standard for object-oriented documentation

class diagram
provides the name of each object, a list of each object’s attributes, a list of methods, and an indication of the associations between objects

use case diagram
documents the users of an information system and the functions they perform

Sequence Diagram
depicts the detailed sequence of interactions that take place for a use case

System Conversion
the process of deactivating an old information system and activating a new one

Unit Testing
Each application module is completed undergoes this to ensure that it operates reliably and correctly

Integration Testing
Performed to ensure that the modules operate together correctly

System Testing
Ensures that all the hardware and software components work together

MRP
Material Requirements Planning, A production planning, scheduling, and inventory control system used to manage manufacturing processes.

Data Flow Diagram
The core documentation tool for project teams using structured methodology, graphically illustrates how data moves through an information system

Success Factors
They also serve as an evaluation checklist at the end of a project

Gantt Chart
shows the duration of development tasks as they occur over time

WBS – Work breakdown structure
Work breakdown structure, breaks a complete task into a series of subtasks

PERT -Program evaluation and review technique
Program evaluation and review technique, used for analyzing the time needed to complete each project task

JIT – Just-In-Time manufacturing
A methodology aimed primarily at reducing times within production system as well as response times from suppliers and to customers

Horizontal Market
Designed for common elements of many businesses

Vertical Market
Designed for a specific industry or enterprise

Turnkey System
A computer system that has been customized for a particular application

B2B and B2G
Websites such as FedBid, Oracle, & Ingram sell goods and services to other businesses or to the government

B2C (business-to-consumer)
Online storefronts such as Zappos, Amazon & Dell offer merchandise and services to consumers

C2C (consumer-to-consumer)
Consumers sell to each other at popular auction and list sites, such as eBay & TaoBao.

Fuzzy Logic
An expert system can deal with this type of data by working with confidence levels. These systems are designed to deal with data that is imprecise or problematic

Expert System
A computer system designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules

TPS (Transaction Processing System)
Transaction Processing System, provides a way to collect, process, store, display, modify or cancel transactions

DSS (decision support system)
Decision Support System helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios

Batch Processing
The processing of previously collected jobs in a si

OLTP (online transaction processing)
Online Transaction Processing System, a real-time method in which each transaction is processed as it is entered

Exception Report
contains information that is outside of normal or acceptable ranges

summary report
combines information that is outside of normal or acceptable ranges

Ad Hoc Report
A report that is created on the fly, displaying information in a table or a chart that is the result of a question that has not already been codified in a production report.

Database/Database Models
The underlying structure of a database

hierarchical
one-to-one and one-to-many relationships which are linked in a hierarchical structure

network
Conceived as a flexible way of representing objects and their relationships.

Relational
stores data in a collection of related tables

O-O
stores data as objects, which can be grouped into classes and defined by attributes and methods

DBMS (Database Management System)
software that manages data stored in a database

Data Independence
Entails separating data from the programs that manipulate it

Data Redundancy
The amount of data that is duplicated in a database

Normalization
helps database designers create a database structure that minimizes storage space and increases processing efficiency

Operational Database
Used to collect, modify, and maintain data on a daily basis

Data Warehouse
A large store of data accumulated from a wide range of sources within a company and used to guide management decisions

Big Data
The huge collections of data that are difficult to process, analyze, and manage using conventional database tools

Hadoop
An open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems

MapReduce
A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster

Data Mining
The practice of examining large databases in order to generate new information

Distributed Database
A database in which not all storage devices are attached to a common processor

Cardinality
The number of associations that can exist between two record types

Relationship
An association between data that’s sorted in different record types

ERD (Entity Relationship Diagram)
The relationship between record types can be depicted graphically

create
Create a database or table

insert
Add a record

update
Change data in a field

delete
Remove a record from a table

join
Use the data from two tables

SELECT
Search for records

High-Level Languages
command words and grammar based on human languages to provide a level of abstraction that hides the underlying low-level language

Low-Level Languages
a low level of abstraction because it includes commands specific to a particular CPU or microprocessor family

1st Generation
First machine languages programmers used

2nd Generation
Added a level of abstraction to machine languages by substituting abbreviated command words for binary numbers

3rd Generation
Conceived in the 1950s and used easy – to – remember command words

4th Generation
“High – Level” languages & more closely resemble human languages

5th Generation
Prolong language based on a declarative programming paradigm

Programming Paradigms
A way of conceptualizing and structuring the tasks a computer performs

Variable
A value that can change

Constant
A factor that remains the same throughout a program

Runtime Error
Occurs when a program runs instructions that the computer cant execute

Logic Error
A type of runtime error in the logic or design of the program

Syntax Error
When an instruction does not follow the syntax rules of the programming language

Source Code
readable version of a program created in a high-level language by a programmer

Object Code
The resulting collection of instructions placed in a new file

API
A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application or other service

Algorithm
A set of steps for carrying out a task that can be written down and implemented

Pseudocode
A notational system for algorithms that is less formal than a programming language

Structured English
A graphical representation of the way a computer should progress from one instruction to the next as it performs a task

Syntax
The set of rules that specify the sequence of keywords, parameters and punctuation in a program instruction

Interpreter
Converts and executes one statement at a time while the program is running

Compiler
Converts all statements in a program in a single batch

selection control structure
tells a computer what to do based on whether a condition is true or false

repetition control structure
directs the computer to repeat one or more instructions until a certain condition is met

Sequence control structure
changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program

Class
A template for a group of objects with similar characteristics

Object
A unit of data that represents an abstract or real-world entity, such as a person, place or thing

Class Hierarchy
The process of producing new classes with inherited attributes

Attribute
Defines the characteristics of a set of objects

Method
A segment of code that defines an action

Inheritance
Passing certain characteristics from one class to other classes

Polymorphism
The ability to redefine a method in a subclass

Encapsulation
One of two related but distinct notions, and sometimes to the combination thereof: A language mechanism for restricting direct access to some of the objects components.

Leave a Comment

Scroll to Top