Final Exam Flashcards
Antivirus (Ch7)
is a type of utility software that looks for and eliminates viruses, trojans, worms, and other malware
ASCII (Ch1)*
[American Standard Code for Information Interchange]
- A code that represents characters as a series of 1s and 0s.
- Most computers use ASCII code to represent text, making it possible to transfer data between computers.
Authentication (Ch7, lecture)
such as passwords, PINs, and fingerprint scanners, are the first line of defense against data thieves and snoopers.
Bitmap formats (Ch1)*
formats (know sizes)
- BMP
- RAW
- TIFF
- JPEG (smallest)
- GIF
- PNG
Blogosphere (Ch5)
all the blogs and their interconnections—is influential; blogs and other Internet-based news outlets have the potential to reach mass audience
Boolean Operators (Ch10)*
- Logical
- used for true/false and yes/no data
Code (Ch11)
source code: human-readable version of a program created in a high-level language by a programmer
program code: able to use a text editor, program editor, or graphical user interface to code computer programs
Common Carrier (Ch8)
(google)
entity who provides wired/wireless communication services to general public for a fee
Compiler (Ch11)
compiler converts all the statements in a program in a single batch, and the resulting collection of instructions, called object code, is placed in a new file
Compression (Ch1)*
- two categories:
(1) lossless: provides a way to compress data and reconstitute it into its original state
(2) lossy: throws away some of the original data during the compression process
Cookie (Ch4)
is a small chunk of data generated by a Web server and stored as a text file in memory or on disk
Web sites use cookies to:
- Monitor your path through a site
- Gather information
- Collect personal information
- Verify that you have logged into a site using a valid ID
Databases (Ch10)
Operational databases:
-collect, modify, and maintain data on a daily basis
Analytical databases:
collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions
object database:
-stores data as objects, which can be grouped into classes and defined by attributes and methods
Relational databases:
-are organized according to a schema, which is a blueprint for its structure; rows, columns, and tables of a database are part of its schema
Data Warehouse (Ch10)
.
Decision Table (Ch11)*
-a tabular method for visualizing and specifying rules based on multiple factors
Declarative Paradigm (Ch11)
describes aspects of a problem that lead to a solution
- procedural: detail how to solve a problem
- object oriented : defines objects, classes and methods
- declarative: describes the problem
Disaster Recovery Plan (Ch9)
is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs
Disk Partition (Ch6)
is a section of a hard disk drive that is treated as a separate storage unit; most hard drives are configured with a single partition that contains the OS, programs, and data.
Domain (Ch3)*
- (edit) It’s hard to remember the string of numbers in an IP address
- (edit) most Internet destinations also have an easy-to-remember domain name, such as nike.com
Email protocols (Ch5)
- POP3 (Post Office Protocol version 3)
- IMAP (Internet Message Access Protocol):manage incoming mail
- SMTP (Simple Mail Transfer Protocol) handles outgoing mail
Encapsulation (Ch11)*
(google) referring to networking, taking data from one protocol and translating it into another protocol, so the data can continue across a network
(edit) bundling of data with the methods that operate on that data. occurs only in object oriented.
Errors (Ch11)
runtime error:
occurs when a program runs instructions that the computer can’t execute
logic error:
is a type of runtime error in the logic or design of the program
syntax error:
occurs when an instruction does not follow the syntax rules of the programming language
Fact (Ch11)*
is a statement that provides the computer with basic information for solving a problem
File naming conventions (Ch6)*
When saving a file, you must provide a valid file name that adheres to specific rules.
CAN USE: A–Z (letters) 0–9 . (period) _ (underscore) - (dash)
CANT USE: < (less than) > (greater than) \: (colon) / (forward slash) \ (backslash) | (vertical bar) ? ( question mark) * (asterisk) " (double quote)
Firewall (Ch7)
a device or software that is designed to block unauthorized access while allowing authorized communications