ITEC Flashcards

1
Q

refers to the physical elements of a computer. This is also
sometimes called the machinery or the equipment of the computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

commonly known as programs or apps, consists of all the
instructions that tell the hardware how to perform a task. These
instructions come from a ____ developer in the form that will be
accepted by the platform (operating system + CPU) that they are based
on.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Helps run the computer hardware and computer
system itself. It includes operating systems, device
drivers, diagnostic tools and more. ______ is almost always preinstalled on your computer.

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allows users to accomplish one or more tasks. It
includes word processing, web browsing and almost any other task for
which you might install software.

A

Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ______ is a type of software that manages data files in a computer system. It has limited capabilities and is designed to manage individual or group files, such as special office documents and records. It may display report details, like owner, creation date, state of completion and similar features useful in an office environment.

A

file management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A file management system is also known as a

A

file manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the process of using computing
techniques and technologies to transmit or transfer
electronic or analog data from one computer node to another.

A

Data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data is transferred in the form of _______ over a digital or analog medium, and the process enables digital or analog communications and its movement between devices

A

bits and bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data transfer is also known as

A

data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to protective digital privacy measures that are applied to prevent unauthorized
access to computers, databases and websites. It also protects data from corruption. ___
is
an essential aspect
of
IT
for
organizations of every size and type.

A

Data
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data security is also known as ____ or ____.

A

information security
(IS) or computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____, in computing, is a group of two or more
devices that can communicate. In practice, a _____
consists of a number of different computer
systems connected by physical and/or wireless
connections. The scale can range from a single PC
sharing out basic peripherals to massive data centers
located around the World, to the Internet itself.
Regardless of scope, all networks allow computers
and/or individuals to share information and resources.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ is a maintenance strategy
driven by predictive analytics. The solutions are
used for detecting failure patterns or anomalies,
but are only deployed when there is high
probability of imminent failure.

A

Predictive maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This helps in
deploying limited resources, maximizing device or
equipment uptime, enhancing quality and supply
chain processes, and thus improving the overall
satisfaction for all the stakeholders involved.

A

Predictive Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of buying and selling
online or electronically. This term may refer to
online retail as a whole, or more specifically the
transaction type.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A business that has a physical store that customers
can go to rather than just having an online
presence.

A

Brick and Mortar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of selling services or products to
another business, which typically then sells to the
consumer.

A

Business to Business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of selling services or products directly from the business to
the consumer

A

Business to Consumer (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Typically a slogan or phrase, this is the action you are persuading the user
to take. Sometimes it can be “shop now, buy today, get a quote,” or
typically anything that leaves the audience with something to do. The
call-to-action is often the instruction on what to do next, such as placing
an order or inquiring further

A

Call-to-Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Arguably one of the most crucial part of E-commerce.

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ___ is
the process of transforming or “converting” the user to a customer. This
is not always a financial transaction. Often, the ____ takes place
when a visiting user requests a quote, fills out a contact form, or places
an order. It can be revenue driven, but not necessarily. The _____
depends solely on what your organization has decided to track

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ______ often referred to as a “sales funnel,” is the path the
visitor takes until the end conversion. It is called a funnel, because there
is a larger surface area for users to enter the _____ (meaning
there are multiple entrance points) but it still takes users to the same end
point or conversion.

A

Conversion Funnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These are text files sent to a user’s browser related to how the customer
interacts with the website. Often users will get a pop-up that requests
that the user “shares ___.” After confirmation, the information in
these text files is sent back over to the server, based on how the user
responded and interacted with the site.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The number of visitors who transformed into paying customers divided
by the total number of visits to the page overall.

A

Conversion Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

this day has more deals and
discounts than any other day of the year. Some claim in the last few years
that ____ has exceeded Black Friday in overall sales

A

Cyber Monday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The main page or main URL for a website. This is often the “homepage”
or root portion of the web address.

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

One of the most popular eCommerce sites that allow sales to occur between consumers in an auction format. In this particular site, one consumer takes on the role of “seller,” and the other user is the “buyer.”
There are many online merchants who also sell through ___ as an
alternative sales channel to their own site

A

eBay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Engaging your audience with products and services promoted through
email. These email lists usually consist of users that have signed up or
expressed an interest in the site or organization

A

Email Marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Digital media piracy is a prominent unethical
practice undertaken with computers. Piracy is the
illegal distribution of music, movies, books and
other intellectual media. Because the internet is
such a vast network, catching pirates is not always
easy. Piracy is an illegal infringement on copyrights
held by the owners of the media. Businesses using
information obtained through piracy may receive a
cease-and-desist letter from the media owner at the
very least. Fines and legal recourse may follow.

A

Media Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A
common example of ___ occurs when a
business uses a well-known song for an instructional
or promotional YouTube video without obtaining the
rights or providing proper attribution.

A

media piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

is an illegal infringement on copyrights
held by the owners of the media.

A

Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Thieves like to use the anonymity of the internet to attack businesses. By
hacking into a company’s main server, cyber attackers can hold a
business hostage. This type of cyber
attack can happen to any business or organization anywhere in the
world. Reducing susceptibility to this unethical computer use requires
constant updates to server security platforms including protection from
spyware, malware and viruses.

A

Ransom ware Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The hacker encrypts the entire website, shutting the
business down until the business owners pay the hackers a fee – the
ransom – in what is called a ____ attack.

A

denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Along with protecting a business against ransomware, businesses must
protect consumer information. ____ concerns consumers.
Companies of all sizes are susceptible to data breaches. Major companies
from leading industries have been hacked with consumer personal
information stolen. Hackers obtain everything from names, dates of birth
and Social Security information to addresses and other contact
information that is used to create phony accounts. Not properly
protecting private information is costly to businesses and can result in
legal fines and private lawsuits.

A

Identify Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Some hackers don’t steal the information but
instead hack systems to divert financial information
input away from the company to steal money. For
example, a hacker might redirect the donation
system of a non profit organization and have the
money sent to an offshore account controlled by
the hacker. This unethical practice essentially tricks
a website buyer into thinking a website transaction
is complete when, in fact, the business never gets
notice of the sale, and the money is lost offshore

A

Financial Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Competitors use any number of methods to gain
access to proprietary information that other
companies pay millions to develop. Theft often
includes patented or patent-pending information.
____ is often achieved by
internal moles or contract workers who have access
to a company’s computer server. While security
protocols with virus protection usually help prevent
external theft, it is difficult to protect against
internal infractions.

A

Intellectual Property Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

allows a party who believes that his
copyright has been infringed to send a notice of infringement demanding
that the website host remove the content.

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The “safe harbor” provisions of
the DMCA protect Internet service providers and website hosts from
liability associated with copyrighted material that may be posted on their
website by third parties.

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

one of the major modern copyright laws governing the use
of copyrighted material over the Internet.

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The ___ provisions of
the DMCA protect Internet service providers and website hosts from
liability associated with copyrighted material that may be posted on their
website by third parties.

A

“safe harbor”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A ,___ is an electronic device that accept data (input) and, process data arithmetically and logically, produce information (output).

A

computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

input

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

output

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

It includes not only the computer proper but also the cables, connectors, power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and printers.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

is also called components.

A

Internal Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

It includes:
CPU
Motherboard
RAM > ROM

A

Internal Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

It is the brains of the computer. Most of calculations take place here.
Two typical components of a are Arithmetic Logic Unit (ALU) Control Unit (CU)

A

Central Processing Unit
(CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Is the main circuit board of a microcomputer. It contains the CPU, memory, expansionbslots and all the controllers required to control standard hardware devices.

A

Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

is the place in a computer where the operating system, application programs, and data in current use are kept.

It is a temporary memory and can be compared to a person’s short-term memory

A

RANDOM ACCESS MEMORY (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to. It contains the programming that allows a computer to start up or regenerate each time it is turned on.

A

Read-only memory, or ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

consists of external devices by which we give information and instructions to the computer.

A

Input Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Examples:
Keyboard
Mouse
Scanner

A

Input Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The set of typewriter-like keys that enables you to enter data into a computer

A

Keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A device that controls the movement of the cursor or pointer on a display screen

A

Mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A device that can read text or illustrations printed on paper and translate the information into a form the computer can use.

A

Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

consists of internal and external devices that transfer information from the computer’s CPU to the computer user.

A

Output Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Examples:
Monitor
Printer
Speaker

A

Output Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A display screen used to present output from computer video camera, VCR or other video girerator

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5” by 11” sheets of paper.

A

Printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

allow hardware devices to communicate with each other.

A

Connecting Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Examples:
Modem
LAN Card

A

Connecting Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

connect a personal or portable computer to dial-up networks through a regular telephone line

A

Modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A _________ card is used to provide wireless Internet access to computer users in home or roamingbnetworks.

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A computer ______ is any type of hardware that stores data.

A

Storage Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Examples:
Hard disc
Floppy Disc
CD ROM

A

Storage Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A magnetic dak on which you can store computer data. The term __ is used to distinguish it from a soft, or Floppy disk.

A

Hard Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A flexible plastic disk coated with magnetic material and covered by a protective jacket, used primarily by computers to store data magnetically

A

Floppy Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

___ is a CD that can be mad by a computer with an optical drive

A

CD-ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A set of instructions that enables physical components of a computer to work in a synchronize way is known as .

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Computers cannot do any useful work without instructions from

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

This set of instructions is often called a ____

A

program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

helps in running the computer hardware and the computer system

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Examples:
Operating systems
Device drivers

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

is a computer program allowing higher-level computer programs to interact with a hardware device

A

Device Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

An ___ is an interface between hardware and user; it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

is computer software designed to help the user to perform specific tasks.

A

Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

It allows one to surf the Web. Example
Google
Internet Explorer

A

Web Browsing Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Allows users to create, edit a document.

Example: MS Word

A

Word Processing Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Allows users to create document and perform calculation

Example: MS Excel etc

A

Spreadsheet Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Allows users to store and retrieve vast amount of data.

Example: MS Access etc.

A

Database Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Allows users to create visual presentation.

Example: Power Point

A

Presentation Graphics Software

82
Q

helps in the management of computer hardware and application software. It performs a small range of tasks.

A

Utility Software

83
Q

It detect computer files whose contents are stored on the hard disk in disjointed fragments, and move the fragments together to increase efficiency.

A

Disk Defragmentor

84
Q

This utility make a copy of all information stored on a disk, and resture either the entire disk or selected files

A

Backup

85
Q

can divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive

A

Disk Partitions

86
Q

This is one of the most commonly known and popularly used forms of computer software. These software come in forms of tools that assist a programmer in writing computer Programs

A

Programming Software

87
Q

The tools that help the programmers in instructing a computer system include

A

text editors
compilers
interpreters

88
Q

LibreOffice Writer

A

• Totally Free
• Full-featured word processor
• Fully compatible with Word formats - can read and write both .doc and .docx files
• Provides for collaboration using the Track Changes and Comments features
• You must download the entire suite of products, Writer is not available separately
• Works on: Windows, Mac, Linux

89
Q

• This isn’t your typical word processing software. It’s kind of a cross between a word processor and notes application. Aimed primarily at authors and creative writers, it has a wide range of users, including: bloggers, students taking class notes or researching and writing reports or other written assignments, teachers
organizing material for courses, etc. Windows only

A

SmartEdit Writer

90
Q

• offers many applications, including , an online word processor similar to Google Docs.
• The free version is very generous with its features.
• Some free features: up to 25 invited collaborators, desktop synchronization, 5GB storage space with 1GB
file upload limit, and more…
• is primarily an online service, however it is possible to work offline as well. Changes made while
offline, sync automatically the next time you connect to the internet
• Works on: All OS - through web interface

A

Zoho Docs

91
Q

• Another free, open source application suite
• LibreOffice branched off from OpenOffice
• The interface of LO and OO are so similar, that if you know one, you shouldn’t have any trouble using the
other
• Currently, LibreOffice is more actively developed
• Works on: Windows, Mac, Linux

A

Open Office

92
Q

• primarily offers online software, however they do have a free desktop version. It has a nice,
modern interface.
• also includes spreadsheet and presentations
• Works on: Windows, Linux, Mac

A

OnlyOffice

93
Q

• Like LibreOffice, this is also a suite. The Word Processor, also called Writer, is one component. Others
include Presentations and Spreadsheet.
• The free version displays small ads
• Two additional levels (which remove the ads and offer more features) are paid upgrades
• has a nice, sleek interface and allows multiple documents to be opened in tabs rather than separate
windows
• Works on: Windows, Linux, IOS, Android

A

WPS Office Free

94
Q

• is certainly a capable, widely-used option.
• You must be online and have a Google account to use
• It works with Google Drive cloud storage
• You may invite others to view, comment, or collaborate on a document
• Integrates with Google Slides and Sheets
• Full integration with other Google products is only available through G Suite, a monthly subscription
• Works on: All OS - through web interface

A

Google Docs

95
Q

is a wide network of data centers (made up of large storage computers called file
servers) throughout the world that can store your information and retrieve it for you from
anywhere you can obtain an Internet connection.

A

cloud

96
Q

tools that are used and accessed exclusively over the Internet rather than
installed on a single computer

A

Cloud Computing

97
Q

the year word processor was introduced

A

1970’s

98
Q

is software or a device that allows
users to create, edit, and print documents. It enables
you to write text, store it electronically, display it on a
screen, modify it by entering commands and characters
from the keyboard, and print it.
 Of all computer applications, _____ is the
most common. Today, most ,____ are
delivered either as a cloud service or as software that
users can install on a PC or mobile device.

A

word processor

99
Q

is an essential skill for both school and
work. Students will learn to touch type using a personal
computer. It speed and accuracy are
emphasized. Learn to use a popularword processing
program while formatting business correspondence,
basic reports, and simple tables. No computer
experience necessary. Additional content may include
graphic design, internet, webpage production and
presentation

A

Keyboarding

100
Q

is a technique in computing
technology by which specialized software and systems
are created to identify, distinguish and authenticate the
voice of an individual speaker.

A

Voice recognition

101
Q

evaluates the voice biometrics of an
individual, such as the frequency and flow of their voice
and their natural accent.

A

Voice recognition

102
Q

Voice recognition is also known as

A

speaker recognition

103
Q

is usually in the form of an image such as a
picture of handwritten text that is fed to a patternrecognition software, or as real-time recognition using a
camera for optical scanning

A

input

104
Q

is the ability of a computer or
device to take as input handwriting from sources such
as printed physical documents, pictures and other
devices, or to use handwriting as a direct input to a
touchscreen and then interpret this as text.

A

Handwriting recognition

105
Q

is the ability of a computer or a mobile
device to read handwriting as actual text. The most common use
case in today’s mobile world is handwriting recognition as a direct
input to a touchscreen through a stylus or finger. This is useful as it
allows the user to quickly jot down numbers and names for
contacts as compared to inputting the same information via the
onscreen keyboard. This is because most people are more
comfortable with writing and can do it quickly. This feature may
not be native to most smartphones or tablets, but many
applications for handwriting recognition are available.

A

Handwriting recognition

106
Q

printed documents and using opticalcharacter-recognition
(OCR) software to convert
the scanned documents into text characters. Using
voice-recognition
software
to
convert
spoken words into text characters.

A

Scanning

107
Q

is the most mainstream
technique used for handwriting recognition. This is done by
scanning a handwritten document and then converting it into a
basic text document. This also works by taking a picture of a
handwritten text. ___ is basically a form of image recognition
that is meant to recognize handwriting instead of faces or shapes
such as landmarks.

A

Optical character recognition (OCR)

108
Q

are typically used in multiplepage documents to display descriptive information. In
addition to page numbers, a header or footer can
contain information such as: The document name, the
date and/or time you created or revised the document,
an author name, a graphic, a draft or revision number.

A

Headers And Footers

109
Q

A program that displays data (text &
numbers) in a table called a worksheet

A

spreadsheet

110
Q

Uses of Spreadsheet
Prepare budgets
Financial statements
Inventory management
Create charts

A
111
Q

A grid with columns & rows; the term __ is used interchangeably with spreadsheet

A

worksheet

112
Q

The intersection of a row and column

A

Cell

113
Q

What 3 things can you type
into a cell?

A

Label
Value
Formula

114
Q

A group of cells that are closely together

A

cell range

115
Q

Vertical arrangements of cells; identified by letters

A

columns

116
Q

Horizontal arrangement of cells; identified by numbers

A

Rows

117
Q

A tab that identifies each open worksheet in a spreadsheet program, located in the lower left corner of the screen

A

Worksheet tab

118
Q

This is a column letter & row number combination, such as A1, B2

A

Cell Address

119
Q

Displays the name of the active cell or range

A

Name Box

120
Q

Displays the data or formula
stored in the active cell

A

Formula Bar

121
Q

The cell in which you are currently working (normally the cell is surrounded by a black
border)

A

active cell

122
Q

A built-in formula that is a shortcut for common calculations such as addition and average

A

Function

123
Q

Instruct the computer as to Operations Symbol what mathematical operations to perform

A
124
Q

Tool that changes the width
of the columns on a spreadsheet

A

column width tool

125
Q

Tool that changes the height of rows on a spreadsheet

A

Row height tool

126
Q

Used to copy data &
formulas to another cell; and create a series

A

Fill Handle Tool

127
Q

Automatically creates a formula to add a series of numbers in a spreadsheet

A

Auto Sum Tool

128
Q

Graphic representations used to compare & contrast worksheet data

A

Chart

129
Q

arranges records from A to Z or smallest to largest

A

Sort Ascending

130
Q

Programs that required several other machines – keyboards, monitors, disks, computers, and
printers – to create documents.

A

Word processor

131
Q

provides a page design layout into which you can place your content.

A

template

132
Q

A ____ is a collection of data stored electronically, usually organized and structured in some form.

A

database

133
Q

___ can be very simple – a text file or a CSV file

A

Databases

134
Q

A _____ is the software used to interact between the database and an application that uses the database.

A

DataBase Management System (DBMS)

135
Q

Data in databases is usually stired as

A

tables

136
Q

Focus on display – tables have no basis of “identity” for data

A

HTML tables

137
Q

• Focus on positional data – fields are arranged and calculated based on their position in the spreadsheet

A

Spreadsheets

138
Q

• Focus on the data itself – metadata is used to identify data fields

A

Databases

139
Q

• A file that stores all the information. The format depends on the type of the Database )text, relational, graph, etc.)

A

Level 1 – The actual database

140
Q

Level 2

A

The DataBase Management System (DBMS)

141
Q

– interaction between data and
an application
LEVEL 2

A

The DataBase Management System (DBMS)

142
Q

Any software package that is built on top of the other 2 layers that provides interaction with the user. A web app, a mobile app, BI/ERP, etc

A

Level 3 – Application

143
Q

Level 3

A

Application

144
Q

DISADVANTAGES OF FILE STORAGE

A

• Redundancy
• Inconsistency
• Mixture of data
• Hard to maintain and manage
• No concurrency support

145
Q

The actual data used by the application

A

User Data

146
Q

The structure (schema) of the data, including table names, column names and types, and constraints over the column(s)

A

Meta data

147
Q

Meta data on user settings or functions of the application

A

Application meta data

148
Q

used for performance improvement and maintenance. Logs, tracks, security, etc

A

Index and other overhead data:

149
Q

CONTENTS OF A DATABASE

A

• User data
• Medadata
• Application metadata
• Index and other
overhead

150
Q

• 4 essential properties that a DBMS has to implement to effectively interact with a database

A

ACID

151
Q

• A query is a result of a request to the database for information or for modification.
• is the language most relational databases (the most common for of databases) use for interaction with the data

A

SQL

152
Q

SQL

A

Structured Query Language

153
Q

The 4 major operations performed on the database

A

CRUD – Create, Read, Update, Delete

154
Q

CRUD

A

Create, Read, Update, Delete

155
Q

ACID

A

• Atomicity
• Consistency
• Isolation
• Durability

156
Q

transactions are either all or none (commit/rollback

A

Atomicity

157
Q

only valid data is saved

A

Consistency

158
Q

transactions should not affect each other

A

Isolation

159
Q

written data will not be lost

A

Durability

160
Q

Example of ACID

A

Bank Transactions

161
Q

Most of the challenges related to ACID compliance come from

A

multiple users/concurrent use of the database

162
Q

describes the relationships among different
kinds of data

A

relational database

163
Q

Captures ideas like those defined in the Affinity and Collection rules
• Allows software to answer queries about them

A

Relational Database

164
Q

• Any relational DB can be described in
• But it is not the case that every __ description defines a relational DB

A

XML

165
Q

are the building blocks of relational databases

A

Tables (formally called ‘relations’)

166
Q

Rows may also be called

A

‘tuples’

167
Q

Columns may also be called

A

‘fields’

168
Q

are theoretical constructs that help us in conceptualization of relations

A

Entities

169
Q

Anything that can de identified by a fixed number of its characteristics (attributes)
• Attributes have names and values
• Attributes have a data type

A

Entities

170
Q

A relational database table can be empty

A

NULL instance

171
Q

An __ could be defined by a relation (table) or be spread across several relations

A

entity

172
Q

Order of the rows and columns matter in databases

T OR F

A

F

173
Q

Freedom to move the data is limited to exchanging entire rows or exchanging entire columns

T OR F

A

T

174
Q

Properties of Entities

A

Uniqueness
Atomic Data
Keys

175
Q

• Values stored for attributes
• Not decomposable into any smaller parts. Separate fields for street, city, state, postal code
• “Only ___” rule relaxed for certain types of data. Dates, times, currency

A

atomic data

176
Q

• No two rows can be the same
• Two rows can have the same value for some attributes, just not all attributes

A

Uniqueness

177
Q

Any set of attributes for which all attribute values are different is called a

A

candidate key

178
Q

Unique Identifier made of one or more columns to uniquely identify rows in a table.

A

Primary key

179
Q

If the primary key contains more than one column, it can be called as well.

A

‘composite key’

180
Q

is the primary key of another table, which is referenced in the current table

A

Foreign Key

181
Q

It’s the key to establish the relationship between the two tables, and through DBMS, to impose referential integrity

A

Foreign Key

182
Q

Surrogate key is a

A

unique column

183
Q

Added to a relation to use as the primary key when there is a lack of a natural column that serves as the primary key, or when the composite key needs to be replaced for various reasons.

A

Surrogate Key

184
Q

is usually in the form of an auto increment numeric value, and of no
meaning to the user, and thus could often be hidden in the table, form. or other entity for internal use.

A

Surrogate key

185
Q

are often used in the place of composite keys to add more flexibility to the table

A

Surrogate keys

186
Q

way to define a table

A

Database schema

187
Q

Collection of table definitions that gives the name of the table, lists the attributes and their data types, and identifies the primary key

A

Database Schema

188
Q

A ___ is a collection of database tables

A

database

189
Q

Main use of database is to

A

look up information

190
Q

Five fundamental operations that can be performed on tables:

A

Select, Project, Union, Difference, Product

191
Q

Combines two tables (that have the same set of attributes

A

Union

192
Q

Remove from one table the rows also listed in a second table (remove from Table1 any rows also in Table2)

A

Difference

193
Q

Gives the cartesian product of the two tables – one instance of a row in Table2
added to each instance of a row in Table1

A

Product

194
Q

The five basic operations (select, project,+, -, x ) are all we need to make any relational table

T OR F

A

T

195
Q

One combination is so commonly wanted and useful that we name it and provide it as a direct operation

A

Join

196
Q

• Combines two tables (like the Product operation) but doesn’t necessarily produce all pairings
• If the two tables each have fields with a common data type, the new table combines only the rows from the given tables that match on the fields
• When match is true for a row from each table it produces a result row that is their concatenation

A

Joins

197
Q

(stored on disk)

A

Physical database

198
Q

is the process of restructuring a
relational database in accordance with a series of so- called normal forms in order to
reduce data redundancy and improve data integrity.

A

Database Normalization

199
Q

NORMALIZATION was first proposed by ___ as an integral part of his relational model.

A

Edgar F. Codd

200
Q

entails organizing the columns (attributes) and tables (relations) of a database to ensure that their dependencies are properly enforced by database integrity constraints. It is accomplished by applying some formal rules either by a process of synthesis (creating a new database design) or decomposition (improving an existing database design).

A

Normalization

201
Q

is the process of decomposition,so all business concepts can be modeled with clear logical relationships

A

Normalization