Cs FInals Flashcards
allows users
to access one another ‘s hard drives or cloud storage and
exchange files directly via a file shar in g program
peer-to-peer (P2P) networksometimes called a file sharing network,
allows users connected to a network to exchange money
from one account to another via transmission media.
Electronic funds transfer (EFT)
provide
home users with the following capabilities
Multiple users can share a single Internet connection.
* Files on each computer, such as photos, can be shared.
* Multiple computers can share a single hardware
resource, such as a pr in ter.
* Game consoles can connect to the Internet to facilitate
on line gamin g
Home Networks
can be small or
large and can exist in o ne or multiple buildings. Networks
provide the following advantages to businesses:
* Facili tate communication among employees
* Share hardware, such as printers and scann ers
* Share data, information, and software with one another
* Centra ll y store and back up cr itical informatio
Business networks
sends signals and data through
cables, wh i ch may have to travel through fl oors and walls
to connect to other n etwork devices.
wired network
sends signals
through airwaves and usually does not require cables.
wireless network
is a network standard
that defines how high-speed cellular transmissions use
broadcast radio to transmit data for mobile communications.
LTE (Long Term Evolution)
requires a combination of hardware and software to operate. Smaller networks usually require simple hardware and can rely on the operating system’s features to connect to other devices on the network,
network
Connects the sending device to transmission media
Communications device
Accepts the transmission of data, instructions, or information
Receiving device
Two basic categories of networks
are
home and business
typically
exist within a single building, are easy to install and
configure, and are accessed by only a few user
Home networks
meant to accommodate
many users and large amounts of data a nd can be spread
across many buildings
Business networks
Initiates an instruction to transmit data, instructions or information
Sending device
Means by which the data, instructions, or information travel
Sending device
Means by which the data, instructions, or information travel
transmission media, or communications channel
name of receiving data
downstream rate
name of sending
data).
upstream rate (
s a navigation system
that consists of one or more earth-based receivers that
accept and analyze signals sent by satellites in order to
determine the receiver’s geographic location.
GPS (global positioning system) i
Help users establish a connection to another computer,
mobile device, or network
* Manage the Transmission of data, instructions, and
information
* Provide an interface for users to communicate with one
another
Communications software
(the method by which computers and
devices are physicalJy arranged on a network)
topology
(the log ical d es i gn of all devices on a
network
network architecture
one or more comp uters
act as a server and the oth er co mputers on the network
request resour ces from the server
client/server network,
is a computer or mobile device on
the network that relies on the server for its reso urces.
client
netwo rk is a network archit ec tur e
that typica ll y connects a small number of computers,
often fewer than 10.
A peer-to-peer (P2P)
All de vices attach to a cent ral cable, called a bus, that carries t he data.
If the bus fails, the devices on the net work will no longer be ab le to
communicate .
Bus network
All devices interconnect with one another. If a single de vice on the
network fails, the rest of the net work wil l continue to function by
communicat ing via an alternate route.
Mesh network
(each device on the network is connected to every
other device on the network)
Full mesh topology
(each device
may or may not be connected to all other devices on the network)
partial mesh technology
Data travels from one device to the next in a sequential fashion
Ring network
Each device on the network is attached to a central device
Star network
is a type of P2P network where users share files with
one another over the Internet.
Internet peer-to-peer (Internet P2P) network
Networ ks are configured in all sizes
and can be defined by n ot only th e num ber of devices th ey
co nnect or ph ys i ca l/l ogical arrangeme nt but also by their
geographic footprint.
Geographic Reach
connects person al
digital devices within a range of approximately
30 feet
personal area network (PAN)
is a fo rm of personal area
n etwork th at consists of sma ll , li ghtweight biosensors
implanted in th e bod y
body area network (BAN)
specifies the amount of data your provider offers you per monht
data plan
define guidelin es that specify th e
way computers access a network, the type(s) of hardware
used, data transmi ss ion speeds, and the types of cable and
wireless technology used.
Network standards
is a standard that
outlines characteristics of how devices communicate on
a network, such as data format, coding schemes, error
handling, and the sequence in which data transfers over
the netwo rk .
protocol
standard controls how network
interface cards (1\TJCs), routers, and modems share access
to cabl es and phone lines, as well as dictates how to
transmit data.
Ethernet
that defines how business documents
travel across transmi ssi on media.
EDI (electronic
data interchange),
which is a set of protocols that is used by all computers
and devices on the Internet
TCP/IP
(Transmission Control Protocol/Internet Protocol),
omputers and devices that have the appropriate
wireless capability can communicate via radio waves with
other computers or devices using
Wifi
is a series of network standards that
specifies how two wireless devices communicate over the
air with each other.
- 11
is a network protocol that defines
how two Bluetooth devices use short-range radio waves
to transm it data.
Bluetooth
Devices communicat i ng with one another over a short range (usual ly less than 30 feet /9 meters)
BlueTooth
Remote controls or other data transmission within close proximity
IrDA
Used in credit cards, smartphones, and ticke ts to faci l itate close- range communication
NFC( near field communication)
is a network stand ard
that specifies how two UWB devices use short-range
radio waves to communicate at ru gh speeds with each
other.
UWB (ultra-wideband)
standard to
transmit data wirelessly to each other via infrared (IR)
li g ht waves
lrDA (Infrared Data Association)
is a protocol
that defines how a network uses radio signals to communicate
with a tag placed in or attached to an object, an animal, or a
person.
RFID (radio frequency Identificaiton
is a protocol,
based on RFID, that defines how a netwo rk uses
close-range radio signals to communi cate between two
devices or objects equipped wi th NFC t echn ol ogy
NFC (near field communications)
can be computers, tablets,
mobile phones, printers, game consoles, or smart home
devices
Nodes, or devices on a network,
also
called a broadband modem, is a commun ications device
that sends and receives data and information to and
from a digital line.
digital modem ,
uses a cable TV Connection
A cable modem
uses sta nd ard copper telephone
wir ing
DSL modem
is a broadband modem that sends
digital data and information from a computer to an
ISDN li ne
ISDN (Integrated Services Dig ital
Network) modem
is a type of always-on physical connection
that is established between two communications
devices.
dedicated line
is
a process that combines multiple anal og or digital signals
into a single signal over a shared medium, such as a cable.
Multiplexing
enters a building through a single line, usually
a coaxial cable, which connects to a modem
that typically attaches to your computer via an
Ethernet cable
The CATV signal
transmits on existing
standard copper phone wiring.
DSL (Digital Subscriber Line)
is a type of DSL that
supports faster downstream rates than upstream
rates
ADSL (asymmetric digital subscriber line)
refers
to both a circuit-switched te lephone network
system and a set of communication standards
used to transmit data, voice, and signal i ng.
ISDN (Integrated Services Digital Network)
uses fiber-optic
cable to provide extremely high-speed Internet
access to a user’s physical permanent location
FTTP (Fiber to the Premises)
use
multiplexing so that multiple signals share the
line.
Digital T-carrier lines
provide very fast data transfer
rates. Only medium to large companies usual ly can
afford the investment in ___________ lines because
these lines are so expensive.
T-carrier lines
which is an amplifier used to
im prove reception and extend the range, for your
wireless rout er or wireless access point.
booster , (repeater)
Ga i ns admin istra tor-leve l, or root-level, access to a computer or network without the system or users detecti ng its
presence
Rootkit
devices are one or more hard drives that
connect directly to a network and provide a centralized
location for storing programs and data on large and
small networks.
network attached storage (NAS)
a series of numbers and/or letters some-
times also referred to as a network security key, to encrypt
data sent between devices
wireless network key,
constantly assesses the status of a network and
sends an email or text message, usually to the network
administrator, when it detects a problem.
Network monitoring
software
software monitors and logs packet traffic
for later analysis. Packet sniffing can detect problems, such
as why network traffic is flowing slowly
packet sniffer
, which occurs when cyberthieves tap into home
routers or cable modems or other Internet access points
to intercept a paid Internet service
IP hijacking
which occurs when
cyberthieves exp loit Bluetooth devices that have been paired. Hackers can intercept the signa ls, then ta ke control and read or download persona l data,
place calls, monitor con versations, re view text and ema il messages, and modi fy contacts
Bluebugging,
is to plan, design,
purchase equipment for, set up, secure, and maintain a
network
network administrator
It developed a code
of ethics for system operators that provides standards for
network administrators.
USENIX
have access to vast amounts of data that needs to be protected.
Network administrator
provider is a third-pa rty business that prov ides networking services, such as EDI services,
secure data and information transfer, storage, or email programs.
value-added network (VAN )
which is a pane in a program window that
lets you move between objects
navigation pane,
is a crucial component of most organizations,
Data
are relied upon to perform the critical job of
organizing this data, making it easily accessible when
needed, and ensuring the data is kept safe and secure
databases
or database program, is software that
allows you to create, access, and manage a database.
database management
system (DBMS),
is a field that
uniquely identifies each record in a table, such as Student
ID
primary key
occurs when you store the
same data in more than one place.
Data redundancy
that
acts as a portal fo r a database, enables governme nt agenci es ,
schools, and compani es to share information with a wide
audienc
database service, or a website
class ify data in a hierarchy. Each higher level
of data consists of one or more it ems from the lower leve l
Information technology (IT)
professionals
in Access, is a collection of related
records stored on a storage medium, such as a hard drive,
or on cloud storage
data file, ca ll ed a table
In the ASCII
coding scheme, each byte re presents a
Single character
is a combination of one or
more related characters or byt es and is th e small es t unit
of data a user accesses
field
uniquely identifi es
each fi eld
field name
is a group of related fields
record
is the highest level in the data hierarchy,
as it contains fields and records
table
extracts data from a database
based on specified criteria, or conditions, for one or
more fields
A query
, where each field was spaced
out on the screen to make it easier to interact with and
understand.
data entry form
specifies the kind of data a field can contain and how the field is used
data type
Unique number automatically assigned
by the DBMS to each added record
AutoNumber
Lengthy text entries, which may or may not
include separate paragraphs; also called l ong tex
Memo
Photo, audio, video, or a document created
in other programs or apps, such as word processing
or spreadsheet, stored as a sequence of bytes in the
database; also called BLOB
Object
, contains data about each table in the database and each field
in those tables
data dictionary, sometimes called a repository
is the process of comp aring data w ith a set of
rules or va lues to determine if the data meets certain crite-
ria)
validation
is a popular query language that allows users to manage, update,
and retrieve data
Structured Query
Language
consists of simple,
Englis h- like statements that allow users to specify the data
they want to display, print, store, update, or delete.
query language
a feature that has a graphical user inter-
face to assist users with retrieving data
query by
example (QBE),
, allows users to design a report on the screen,
retrieve data into the report design
report writer, also called a report
generator
which is a listing
of activities that modify the contents of the database.
log,
uses logs and/or backups, and
either a rollforward or a rollback technique, to restore
a database when it becomes damaged or destroyed
recovery utility
the DBMS uses
the log to reenter changes made to the database since the
last save or backup.
rollforward, also called forward recovery,
the DBMS uses the log to undo any changes
made to the database during a certain period.
rollback, also called backward
recovery,
is a backup plan in which changes
are backed up as they are made.
Continuous backup
shows how data in one table relates to data
in another table and is one of th e main advantages of using
a database.
relationship
is a field in one table that
contains data from the primary key in another table.
foreign key
connects each record in
one table to one or more records in another table.
one-to-many relationship
is restricted to exactly one
record in the table on each si de of the relationship
one-to-one relationship
allows more than one
record on the left side of the relationship to be con-
nected to more than one record on the ri ght side of the
relationship
many-to-many relationship
resolve many of the weaknesses of relational
databases.
NoSQL databases or nonrelational
databases
(also ca ll ed
key-value stores) create any number of key-value pairs for
each record.
Key-value databases
consists of two related items:
a constant that defines tl1e set (the key) and a variable that
belongs to the set (the va lue).
key-value pair
The screenshots in this module show a database
in Access. Access is designed to work with relational
databases, so it more specifically is called a
relational
database management system (RDBMS )
Th is means the DBMS runs on servers owned by a
cloud provider, and users access the database remotely
through a browser
database as a service (DBaaS ).
is part of a split database that contains
the user interface and other objects, but not the tables that are
needed for an application
front-end database
, is part of a split
database that contains table objects and is stored on a file
server that all users can access.
back-end database,
sometimes simply called the backend
work with the back-end
components to ensure a company’s business data is safe,
secure, and well-managed
database administrators (DBAs)
is a database
object that is created based on a field or combination of
fields.
index
is a series (or chai n) of records stored in encrypted blocks across a netwo rk.
blockchain
is the process of presenting data graphically
in the form of charts, maps, or oth er pictorial formats in order to
understand the resulting information easily
Data visualization
This check t es ts the data in two
or mor e associated fi elds to ensur e th at the relationship
is logical and their data is in the co rrect format.
Consistency check
ver ifi es
that a required fi eld contains data.
completeness check
is a number(s) or char-
acter(s) that is appended to or inserted in a primary
key value.
check digit
when enabled, requires
the user to add information to a particular fie ld and will
not allow the user to leave a field blank
Presence check
fie ld properties can be
used to va li date data entry.
Field property check
requires
the user to enter information unique to that record
Uniqueness check
Access allows the use of an input mask to
control how data is formatted in a field
Format check
is a field property that provid es a visual guide for users
as they enter data. Figure 10-20 shows the Input Mask
wizard.
input mask
is a tool that guides you through the
steps of a process or task by asking a series of questions
or presenting options.
wizard
This check can be enforced
by using a data type that allows users to choose from a
preexisting list, such as a list of days of the week.
Multiple Choice check
starts as soon as the database is
created and lasts as long as the database is used.
Database maintenance
implies the need to protect a database
from unauthorized acces
Confidentiality
refers to protecting data from unauthorized
changes
integrity
indicates the need to ensure that data is
accessible by authorized users when needed
Availability
large and compl ex data sources th at defy traditional
data processing method
Big data
3 “v’s” of big data +2 extra
Volume
variety
Velocity
Value
Veracity
Th e m ass ive amo unt of data that must be
stored and analyzed
Volume
The different formats in which this data can
exist, such as music or video fil es, photos, social media
texts, financial transactions, IoT sensor data, and more
Variety
Th e fact that this data is often generated and
received at high speeds
Velocity
The helpfulness of the data in making strategic
decisions
Value
H ow accurately this data reflects reality
Veracity
The processes and technologies used to do this analysis
are called
business intelligence (BI)
BI systems might collect data from existing databases (such
as a product database) and from live data streams (such as an
online transaction processing system) into a central repository
called a
data warehouse.
which is a
collection of both structured and unstructured data
data lake,
that provide at-a-glance views, with
live updates as data continues to pour in
dashboards
processes help to inform business decisions and strategies
data analytics
occurs when a compa ny uses the technology in t ended for one purpose fo r an entirely differe nt
purpose.
Function creep
is th e process of creating information
systems or p rograms and apps from the id ea stage to
distribution to users.
Development
is a
collection and summary of th e data, information, and
deliverables spec ifi c to the project.
Documentation
occurs when one ac ti vity h as led to another th at
was not planned originall y; thus, the scope of th e project
now has grown
Scope creep, al so called feature
creep,
of a project includes its goals,
o bj ectives, and e xp ecta ti ons of the project
scope
which
is the process of recogniz in g when a change in th e project
h as occurred, taking actions to react to th e change, and
planning for opporUlruties because of th e change
change management,
refers to
th e focus on th e user’s reaction to a nd in teraction with
a pro d uc t, includ in g its efficien cy, effectiveness, and
ease of use.
User experience (UX)
is a se ries of statemen ts that inst ructs a program or app
how to complete a task .
macro
T he set of activities used to
build an app is ca ll ed th e
software development life
cycle (SDLC)
what is The sldc (in order)
Plan
Analyze
Design
Implement
Support and Secure
for a project begi ns with a request
for the project and is triggered by the devel opment of
the project documentation
planning phase
consists of two major components:
conducting a prel i minary investigati on and performing
detailed analysis.
analysis phase
is the measure of the suitability
of the devel opment process to the individual project at
any given time
Feasibility
measures how well the product
will work and whether it will meet the requirements of
the users
Operational feasibility
determines if the deadlines for
project phases are reasonable. Issues with schedule
feasibility might lead to the project’s timeline being
extended or the scope of the features to be scal ed
back.
Schedule feasibility
measures whether the developers
have the skills and resources, as we ll as the number of
programmers, to complete the features of the product.
Technical feasibility
is to use the data gathered during the feasibility
study and detailed analysis to present a solution to the
need or request
system proposal
is when the project team acquires the
necessary hardware and programming tools, as well as
develops the details of the finished product
design phase
is
a working model that demonstrates the functionality of
the program or app.
prototype
is to build
the product and deliver it to users.
implementation phase
, the user stops using the old
product and begins using the new product on a certain
date.
direct conversion
consists of running the old product
alongside the new product for a specified time. Results
from both products are compared.
Parallel conversion
each location converts at a
separate time.
phased conversion,
only one location in the
organization uses the new product so that it can be tested
pilot conversion,
the product
receives necessary maintenance, such as fixing errors or
improving its functionality.
support and security phase,
each function is tested to ensure it works
Creating Sys te ms and Applications
properly.
testing process,
testers
perform the testing and report any issues to the
developers.
Quality assurance
uses a linear, structured
development cycle
Predictive development
takes each
step individually and completes it before continuing to the
next phase
waterfall method
also called adaptive development,
incorporates flexibility in the goals and scope of the
project.
Agile development,
uses a
condensed or shortened development process to
produce a quality product.
Rapid application development (RAD )
encourages collaboration between the
devel opment and operation
DevOps
is any tangible item , such as
a chart, diagram, report, or program file
deliverable
is the
process of planning, scheduling, and then controllin g
the activities during system devel op ment
Project management
developed by Henry L. Gantt, is a bar
chart that uses horizontal bars to show project phases or
activities
Gantt chart,
short for Program Evaluation a nd Review
Technique chart, analyzes the time required to complete
a task and identifies the minimum time required for an
entire project
PERT chart,
, consists of a series of
lengthy, structured group meetings in which users and
IT professionals work together to design or develop an
app li cation
joint-application design
GAD) session, or focus group
an organization
usually forms a _________ to work on the project from
beginning to end.
Project team
is
responsible for designing and developing an information
system.
systems analyst
The goal of ___________ is to deliver an acceptable
system to the user in an agreed-upon time frame, while
maintaining costs
project management
A person dedicated to coord i nating project components and ensuring that each member is
progressing as planned
Project manager
Develops the program’s user interface, including colors, fonts, and layou
Designer
Writes code or uses a product development app to create the program’s specifications
Programmer
Review every aspect and functional ity of a prog ram to ensure it works as intended
Tester
Interacts with customers and users of t he product to assist them with any issues that arise
IT department
identifies the required
product(s).
request for quotation (RFQ)
, the vendor selects
the product(s) that meets specified requirements and
then quotes the price(s)
request for proposal (RFP)
is an organization that purchases products from
manufacturers and then resells these products to the
public - offering additional services with the product
value-added reseller
(VAR)
is a professional who is hired based on technical expertise,
including service and advice.
IT consultant
is a set of words,
abbreviations, and symbols that a programmer or
developer uses to create instructions for a program or
app.
Programming language
are first generation language; their
instructions use a series of binary digits
Machine languages
the programmer uses
symbolic instruction codes, such as A for add, M for
multiply, and L for load
assembly language,
use a seri es of English-like words
to write instructions, such as ADD for addition, or PRINT
for printing.
Procedural languages
provide a graphical
environment in which the programmer uses a combination
of English-like instructions, graphics, icons, and symbols
to create code.
Fourth generation languages, or 4GLs,
was
an attempt to create programs that solve problems without
requiring the programmer to write algorithms.
Fifth generation languages, or SGLs,
is a text editor designed for
programming.
source code editor
to test code in one
section, or an entire program, to determine any errors
and provide suggestions to fix them.
debuggers
is a separate program that converts the
entire source program into machine language before
executing it.
compiler
translates and executes one statement at
a time. Interpreters do not produce or store object code
interpreter
is an application that provides multiple
pro gramming tools in one environment.
integrated development environment
(IDE).
is a set of
programming tools that includes a programming
interface, compiler, debugger, and more.
software development kit (SDK)
is anothe r web-based tool
programmers use to archive and ho st source code
code repository
tools to impleme nt objects in a program
object-oriented programming
(OOP)
is an item that can contain both
data and the procedures that read or manipulate that
data.
object
is a type of object that defines the
format of the object and the actions an object can perform.
class
defines the behavior of an
objec
method
looks at common security practices and
ensures that the app or system meets the recommended
criteria
security audit
developers attempt to break
into the app or system.
penetration testing,
uses automated tools
that test a system by using unexpected input to ensure
the app or system does not crash
Fuzz testing (also ca ll ed fuzzing)
prerelease versions of
the product, ca ll ed a
beta version,
verifies that each in dividual program or
object works by itself.
unit test
verifies that all programs in an appli cation
work together properly
systems test
verifies that an application works
with other applications.
integration test
is performed by end users and
checks the new system to ensure that it works wi th
actual data
acceptance test
is a set of evolving principles that developers
should fo ll ow to enhance UX
Ethical design
is an ale rt se nt
throu gh th e user ‘s device ‘s notifications, or by email
or te xt, th at may let users know abo ut new fe atur es or
re mind th em w hen a game boost er is available.
push notification
which is sent in response to a user ‘s actions or request)
pull notification,
is a process or set of rules used in
prob lem-solving, such as calculations.
algorithm
is a named location in memory used to store
information, such as a value, that is used in a program
variable
is an environment that allows software developers to test their prog rams wi th fictitious data without adversely affecting
other programs, information systems, or data.
sandbox
you must develop a solid, detailed plan for the website, called a
website plan or design plan.
are the results you want your website to accomplish within a specific time frame
Goals
are those methods you will use to accomplish the website’s goals.
Objectives
summarizes your website’s goals and objectives to ensure they meet the audience’s expectations and needs.
purpose statement
is a suggestion or offer that requires the website visitor to interact with the website by purchasing a product
A call-to-action (CTA)
is a research-based overview that includes information about potential website visitors’ demographic and psychographic characteristics
target audience profile
include gender, age group, educational level, income, location, and other characteristics that define who your website visitors are
Demographic characteristics
include social group affiliations, lifestyle choices, purchasing preferences, and political affiliations
Psychographic characteristics
is the main webpage around which a website is built that opens every time you start a browser and is the anchor for the entire website
home page
subsidiary pages provide detailed content and interest
subsidiary pages
, which is the page that a browser navigates to when you click a link in an ad, email message, or other online promotion from a different website.
landing page
is information that is relevant, informative, and timely; accurate and of high quality; and usable.
Value-added content
unlike static information, updates periodically and can appear on a website’s pages when triggered by a specific event, such as the time of day or by visitor request.
Dynamically generated content,
refers to tools to allow search engines to better find or index your website.
Search engine optimization (SEO)
are HTML specification tags that tell search engines what data to use.
Meta tags
is a series of pages originally developed to present scenes graphically for a movie or television program
storyboard
is a diagram that shows steps or processes and is used to determine the paths users will take to find subsidiary pages
flowchart
should clearly identify its target, which is the webpage or content to which the link points.
text link
assigns a link to a visual element, such as an illustration or a photograph.
image link
can group links in menus, bars, tabs, or a combination of techniques.
Navigation areas
is an evaluation that generally takes place in a structured environment, such as a testing laboratory
usability test
studies use various technologies to analyze the movement of visitors’ eyes
Eye-tracking
, an analytical tool that uses color to represent data
heat maps
is software used to create plain (ASCII) text files.
text editor
is a text editor enhanced with special features that easily insert HTML tags and their attributes.
HTML editor
is a coding system that uses tags to provide instructions about the appearance, structure, and formatting of a document
A markup language
is a predesigned model webpage that you can customize for fast website or webpage creation and updating
web template
is a tool used to create professional-looking websites, by dragging and dropping predefined elements to their desired locations on a page, without coding.
website builder
is software that provides website creation and administrative tools that enable the management of web content development, including authoring, reviewing, editing, and publishing.
content management system (CMS)
The templates, style sheets, and other frequently used content elements, such as a logo graphic, are stored in a database called a
content repository.
is an object, such as a web app, that is embedded in a webpage and provides access to resources that are stored elsewhere.
widget
is a third-party program that extends the built-in functionality of an application or browser.
plug-in
is programming code that performs a series of commands and can be embedded in a webpage.
script
that is, scripts that run in a browser to control a webpage’s behavior and often make it interactive.
client-side scripts,
written in HTML to describe the content of information on a webpage.
tags,
is a markup language that uses both predefined and customized tags to facilitate the consistent sharing of information, especially within large groups.
Extensible Markup Language (XML)
or additional information needed to completely specify the tag.
attributes
indicate the different sections of a webpage. HTML supports six levels of headings.
Headings
identify the location of resources in the current website.
Relative references
identify the location of resources from other websites.
Absolute references
display a collection of items in a list format, with each list item preceded by a bullet symbol
Unordered lists
by default, precede each list item with a number.
Ordered lists,
can include audio, photos, or videos stored on media sharing websites; media content, such as online calendars, documents, and slideshows
Multimedia content
items on a website, you place a copy of an object created in a source file into a destination file so that a one-way connection to the source program becomes part of the destination file
embed
Include this attribute to play the audio or video automatically when the page loads (may not work on mobile devices)
autoplay
Include this attribute to display audio or video controls, such as play, pause, and volume; if you do not include this option, the only way to stop playing the audio is to close the page
Controls
uses rules to standardize the appearance of webpage content by defining styles for elements, such as font, margins, positioning, background colors, and more.
cascading style sheet (CSS)
are specifications that define one or more formatting properties and their values (declarations) for specific HTML tags (selectors).
Style rules
You also can create style sheets using
CSS editor software.
, within <style> and </style> tags placed in the head section of an HTML document,
embedded styles
, specified as a style attribute of most HTML tags within the body section.
inline style
is a group of related fonts.
font family
to encrypt data that helps protect consumers and businesses from fraud and identity theft when conducting commerce on the Internet.
Transport Layer Security (TLS)
, which is an organization that sells and manages domain names.
domain registrar
is a measure of a web host’s reliability. It could be costly to you if your website goes down due to an issue with your hosting provider;
Uptime
is a term commonly used to describe the capacity of a communication channel.
Bandwidth
involves collecting, measuring, evaluating, and reporting how your website is used.
Web analytics
, which is the sequence of pages or activities the user performs on the website.
click path or clickstream
gets users to spend long periods of time engaging and encourages them to return for future visits.
Sticky content
are the number of times an ad is visible to users on a webpage, regardless of whether the user clicks or interacts with the ad.
Impressions
rate is the number of times users click the ad to go to the sponsor’s website.
click-through
computer that you use to edit your website is called your
local computer
(a web server on the Internet
remote web server
with a vendor specifies that you receive commission on any sales that are generated by users of your website.
affiliate agreement
consists of groups of users and developers who create guidelines about usage, tools, and education regarding web accessibility
Web Accessibility Initiative (WAI)
provides preventive mainte-
nance, component installation, and repair services to
customers
Technology
service and repair field
program includes the study
of compute rs and tech nology and how they are used
computer science
Ide ntifies business requi rements,
stra t egies, and solutions for cloud
storage and se rvices that meet a
company’s goals or needs
Cloud architect
Develops art ificial-int ell ige nce-
ba sed machines and prog rams
based on data analysis to mimic
huma n thought pro cesses
Cognitive Engineer
Spec ifies the structu re, interface,
and req uirem ents of a large-scale
da t abase; de t ermi nes security and
permissions for users
Database Designer
, or relying on outside companies to perform certain tasks
outsourcing
refers to the use of teclmology by a
company’s employees to meet the needs of a large business.
Enterprise computing
ma nages one or more administrative human
resources funct ions, such as main tai ning and managing employee benefits, schedules, and payroll.
human resources information system (HRIS )
aids in the development and testing of product des ig ns,
and often includes CAD (computer-aided design)
Computer-aided engineering (CAE )
) monitors and controls inventory, material purchases, and
other processes related to manufacturing operations
Material Requirements Planning (MRP
is an extension of MRP that also includes prod-
uct packaging and shipping, machine scheduling, fi na ncia l planning, demand fo recasting, tracking
labor producti vity, and monitoring product quality
Manufacturing Resource Planning II (MRP II)
helps salespeople manage customer contacts, schedule customer
meetings, log customer inte ractio ns, manage product information, and place customer orders
Salesforce automation (SFA )
manages informa tion about custome rs, past
purchases, interests, and the day -to -da y interactions, such as phone calls, email messages, web
communications, and Internet messa gi ng sessions
Customer relationship management (CRM )
integ rates MRP II with
the information flow across an organization to manage
and coordinate th e ongoing activities of th e enterprise
Enterprise
Resource Planning (ERP)
is an in formation system
th at ca ptures and processes data from day-to-day
business activities.
transaction
processing system (TPS)
, the computer
collects data over time and processes all tran sa ctions
la ter, as a group.
batch processing
the computer processes each transaction as
it is entered
online transaction processing
(OLTP),
is an information system that
generates accurate, timely, and organized information
management
information system (MIS)
helps users analyze information and make decisions.
decision support system
(DSS)
Programs that analyze data, such
as those in a decision support system, sometimes are
called
online analytical processing (OLAP
is an informa-
tion system that captures and stores the knowledge of
human experts and then imitates hum an reasoning and
decision making.
expert system
is the comb in ed subject knowledge and
experiences of the human experts.
knowledge base
are a set of logical judgments that are applied to the
knowledge base each time a user describes a situation to
the expert system.
inference rules
system manages the fl ow of goods
and services of a business
supply chain
management (SCM)
your knowledge
in a specific area to employers or potential employers.
certification demonstrates
vary in scope from a narrow focus
with an emph asis on the repair of a specific device to an
integrated hardware solution that addresses a company’s
current and future technology needs.
Hardware certifications
certifications focus on the discovery, co ll ection,
and analysis of evidence on computers and networks
Data analysis
is acquired through years of experience
and training because so many variables exist for a total
network solution
Network expertise
These
certifications focus on particular ski lls of the user, the
operator, the system administrator, and the software
engineer.
Operating System Certifications
These certifications usually are supported with
training programs that prepare applicants for the certification
test.
Programmer/Developer Certifications
measure a candidate’s ability to
identify and co ntr ol security risks associated with any
eve nt or action that could cause a loss of or damage
to comp uter hard wa re, software, data, information, or
processing capability
Security certifications
, or working from home, can mutually
benefit emp loyers and em ployees
Telecommuting
shows exampl es of your wor k.
Graphic artists and other digital media pro ducers may
use a portfo li o to de mon strate their abilities, style, and
past work
portfolio