Final Exam Flashcards

1
Q

Antivirus (Ch7)

A

is a type of utility software that looks for and eliminates viruses, trojans, worms, and other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASCII (Ch1)*

A

[American Standard Code for Information Interchange]

  • A code that represents characters as a series of 1s and 0s.
  • Most computers use ASCII code to represent text, making it possible to transfer data between computers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication (Ch7, lecture)

A

such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bitmap formats (Ch1)*

A

formats (know sizes)

  • BMP
  • RAW
  • TIFF
  • JPEG (smallest)
  • GIF
  • PNG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blogosphere (Ch5)

A

all the blogs and their interconnections—is influential; blogs and other Internet-based news outlets have the potential to reach mass audience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Boolean Operators (Ch10)*

A
  • Logical

- used for true/false and yes/no data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Code (Ch11)

A

source code: human-readable version of a program created in a high-level language by a programmer

program code: able to use a text editor, program editor, or graphical user interface to code computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common Carrier (Ch8)

A

(google)

entity who provides wired/wireless communication services to general public for a fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compiler (Ch11)

A

compiler converts all the statements in a program in a single batch, and the resulting collection of instructions, called object code, is placed in a new file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compression (Ch1)*

A
  • two categories:
    (1) lossless: provides a way to compress data and reconstitute it into its original state
    (2) lossy: throws away some of the original data during the compression process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cookie (Ch4)

A

is a small chunk of data generated by a Web server and stored as a text file in memory or on disk

Web sites use cookies to:

  • Monitor your path through a site
  • Gather information
  • Collect personal information
  • Verify that you have logged into a site using a valid ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Databases (Ch10)

A

Operational databases:
-collect, modify, and maintain data on a daily basis

Analytical databases:
collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions

object database:
-stores data as objects, which can be grouped into classes and defined by attributes and methods

Relational databases:
-are organized according to a schema, which is a blueprint for its structure; rows, columns, and tables of a database are part of its schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Warehouse (Ch10)

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decision Table (Ch11)*

A

-a tabular method for visualizing and specifying rules based on multiple factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Declarative Paradigm (Ch11)

A

describes aspects of a problem that lead to a solution

  • procedural: detail how to solve a problem
  • object oriented : defines objects, classes and methods
  • declarative: describes the problem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disaster Recovery Plan (Ch9)

A

is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disk Partition (Ch6)

A

is a section of a hard disk drive that is treated as a separate storage unit; most hard drives are configured with a single partition that contains the OS, programs, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Domain (Ch3)*

A
  • (edit) It’s hard to remember the string of numbers in an IP address
  • (edit) most Internet destinations also have an easy-to-remember domain name, such as nike.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Email protocols (Ch5)

A
  • POP3 (Post Office Protocol version 3)
  • IMAP (Internet Message Access Protocol):manage incoming mail
  • SMTP (Simple Mail Transfer Protocol) handles outgoing mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Encapsulation (Ch11)*

A

(google) referring to networking, taking data from one protocol and translating it into another protocol, so the data can continue across a network
(edit) bundling of data with the methods that operate on that data. occurs only in object oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Errors (Ch11)

A

runtime error:
occurs when a program runs instructions that the computer can’t execute

logic error:
is a type of runtime error in the logic or design of the program

syntax error:
occurs when an instruction does not follow the syntax rules of the programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fact (Ch11)*

A

is a statement that provides the computer with basic information for solving a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

File naming conventions (Ch6)*

A

When saving a file, you must provide a valid file name that adheres to specific rules.

CAN USE:
A–Z (letters)
0–9 
. (period)
_ (underscore)
- (dash)
CANT USE:
< (less than) 
> (greater than) 
\: (colon) 
/ (forward slash) 
\ (backslash) 
| (vertical bar) 
? ( question mark) 
* (asterisk)
" (double quote)
24
Q

Firewall (Ch7)

A

a device or software that is designed to block unauthorized access while allowing authorized communications

25
High-Level Languages (Ch11)
uses command words and grammar based on human languages to provide a level of abstraction that hides the underlying low-level language Fourth-generation languages are considered “high-level” languages
26
HTML (Ch4)
[Hypertext Markup Language] | the standard markup language for specifying how browsers display Web pages aka a markup language
27
HTTPS (Ch4)
[Hypertext Transfer Protocol Secure] - secure connection - lock symbol: the site's certificate is valid and it's identity has been verified by a trusted third-party authority
28
Intellectual Property (Ch5)
All of the creations that materialize from the mind or intellect ``` There are four categories of intellectual property: Patents Trademarks Copyrights Trade secrets ```
29
IP (Ch3)
[Internet Protocol] | -permanently assigned IP addresses called static addresses
30
IPv6 (Ch3)*
IPv6 – (Internet Protocol version 6); - uses 128 bits for each address; produces billions and billions of unique Internet addresses - (edit) 4 digit hexadecimal; letters and numbers IPv4 – (Internet Protocol version 4); - is the Internet address standard; uses 32-bit addresses to identify Internet connected devices - (edit) only uses numbers
31
Last Mile (Ch7)
(google) the last mile of cable is the last sections that are not upgraded to fiber optic, namely to people’s homes and to some businesses.
32
Low-Level Languages (Ch11)
has a low level of abstraction because it includes commands specific to a particular CPU or microprocessor family
33
Machine Language (Ch2)
instructions for programs are held in memory
34
Mainframe (Ch2)*
- a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users - (edit) slower computer with a massive database, but much slower processing - looks like a closet sized cabinet; used to provide centralized storage, processing and management for large amounts of data
35
Mini Computer (Ch8)*
- from biggest to smallest: super, main frame, mini, micro | - (edit) servers and workstations
36
Micro Computer (Ch8)*
- smallest of computers | - (edit) everything else - phones, tablets, microwaves, washing machines, etc.
37
MIS (Ch9)*
[management information system] - good for businesses - (edit) helps managers make decisions from analytics
38
Moore’s Law (Ch8)
Gordon Moore, co-founder of Intel Corp., predicted that technological innovation would double the number of transistors in an integrated circuit every two years without raising its cost
39
Naming Conventions (Ch6)
.
40
Network Topology (Ch3)
- Point-to-point topology: using expansion ports (usb) - Star topology: either as a full mesh or a partial mesh - bus topology: linear sequence
41
NoSQL Databases (Ch10)
is the key-value data model; each data item has a key that is a unique identifier similar to a relational database key such as CustomerID
42
OS’s strength/weaknesses (Ch6)
.
43
Pirated Software (Ch6)
People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies. - Software marked NFR (not for resale) - Handwritten labels on CD - Poor graphics
44
Procedural Paradigm (Ch11)
- sometimes called an imperative paradigm | - to conceptualize the solution to a problem as a sequence of steps
45
Project Failure (Ch10, lecture)
(google) 1. Feature/Scope creep – adding too many features – causes the other two 2. Over budget – too much money 3. Over time – fails to hit the deadlines
46
Private attribute (Ch11)
can be accessed only from the routine in which it is defined
47
Public attribute (Ch11)
is available for use by any routine in the program
48
RAM/ROM (Ch2)*
RAM: (random access memory) -is a temporary holding area for data, application program instructions, and the operating system ROM: (read-only memory) - non volatile - is a type of memory circuitry that is housed in a single integrated circuit on the system board. - contains a small set of instructions and data called the boot loader which tell a digital device how to start
49
Resumes (Ch8, lecture)
Job seekers need to produce resumes in a variety of formats, including the following: Print, Email, HTML, LinkedIn, Online Job service, Web portfolio (a hypertext version of your resume)
50
Semiconductor (Ch2)
such as silicon and germanium, are substances with properties between those of a conductor (like copper) and an insulator (like wood)
51
Social Engineering (Ch7)
deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
52
Super Computer (Ch2)*
- considered the fastest computers in the world at the time of construction. - (edit) mostly owned by the gov. - can tackle complex tasks other computers cannot - typical use includes breaking codes, modeling weather systems, and simulating nuclear explosions
53
TCP (Ch3)
(Transmission Control Protocol) - is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order - verifying that the data was not corrupted while in transit (a process called error checking)
54
TPS (Ch9)*
(transaction processing system) - involves payment - provides a way to collect, process, store, display, modify, or cancel transactions.
55
V’s of Big Data (Ch10)
```  High Volume  High Velocity  Diversified Variety  Unknown Veracity  Low-density Value (low-density data refers to large volumes of data containing unimportant details) ```
56
VoIP (Ch5)
(Voice over Internet Protocol) | is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls
57
Web Crawler (Ch4)
(also referred to as a Web spider) is a computer program that is automated to methodically visit Web sites