Vocab 9 - 15 & Web 2.0 Flashcards

1
Q

Computer communications

A

A process in which two or more computers or devices transfer data, instructions, and information.

  • Sending device → Communications channel → Receiving device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computer security risk

A

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cybercrime

A

A Network or Internet-based illegal act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Security Risks

A
  • Internet and network attacks
  • unauthorized access and use
  • hardware theft (stealing a thumb drive or hard drive)
  • system failure (lightning strike)
  • infromation theft (stollen identity)
  • software theft (illegal copy)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data transmitted over networks

A

Has a higher degree of security risk than data kept on an organization’s premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

online security service

A

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Affects a computer negatively by altering the way the computer works <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Horse

A

A malicious program that hides within or looks like a legitimate program <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkit

A

Program that hides, creating a “back door” for a remote location to take full control of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symptoms of an infected computer include:

A
  • Runs much slower than usual
  • Available memory is less than expected
  • Files become corrupted
  • Screen displays unusual message or image
  • Music or unusual sounds play randomly
  • Existing programs and files disappear
  • Programs or files do not work properly
  • Unknown programs or files mysteriously appear
  • System properties change
  • Operating system does not boot (start up)
  • Operating system shuts down unexpectedly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:

A
  1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
  2. Never open an email attachment unless you are expecting it and it is from a trusted source.
  3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
  4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
  5. Scan all downloaded programs for viruses and other maleware.
  6. If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
  7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
  8. Install a personal firewall program.
  9. Stay informed about new virus alerts and virus hoaxes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

botnet

A

A group of compromised computers connected to a network

A compromised computer is known as a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS attack

A

A denial of service attack: disrupts computer access to Internet services

Distributed DoS (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

back door

A

A program or set of instructions in a program that allows remote attackers to bypass security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing

A

A technique intruders use to make their network or Internet transmission appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

firewall

A

Hardware and/or software that protects computers and networks from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Intrusion detection software

A
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior patterns or system breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Honeypot

A

Vulnerable computer that is set up to entice an intruder to break into it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Unauthorized access

A

The use of a computer or network without permission <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unauthorized use

A

The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The measures organizations take to help prevent unauthorized access and use:

A
  • Acceptable use policy
  • Disable file and printer sharing
  • Firewalls
  • Intrusion detection software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Access controls

A

Define who can access a computer, when they can access it, and what actions they can take:

  • Two-phase processes called identification and authentication
  • User name
  • Password
  • Passphrase
  • CAPTCHA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

possessed object

A
  • Any item that you must carry to gain access to a computer or computer facility.
  • Often are used in combination with a personal identification number (PIN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

biometric device

A

Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Digital forensics

A

The discovery, collection, and analysis of evidence found on computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Areas that use digital forensics

A
  • Law enforcement
  • Criminal prosecutors
  • Civil lawsuits, discovery
  • Military intelligence
  • Insurance agencies
  • Information security departments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hardware theft

A

The act of stealing computer equipment <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Hardware vandalism

A

The <!--StartFragment--> act of defacing or destroying computer equipment <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Software theft occurs when someone:

A
  • Steals software media
  • Intentionally erases programs
  • Illegally copies a program
  • Illegally registers and/or activates a program
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EULA

A

An End User License Agreement typically contains the following conditions:

  • Permitted to…
    • Install the software on a certain number of computers (usually one)
    • Make one copy of the software
    • Remove the software from your computer before giving it away or selling it
  • Not permitted to…
    • Install the software on a network
    • Give copies to friends or colleagues while continuing to use the software
    • Export the software
    • Rent or lease the software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Information theft

A

Occurs when someone steals personal or confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Encryption

A

A process of converting readable data into unreadable characters to prevent unauthorized access

  • Transposition
  • Substitution
  • Expansion
  • Compaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Transposition

A

Switch the order of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Substitution

A

Replace characters with other character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Expansion

A

Insert characters between existing characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Compaction

A

Remove characters and store elsewhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Public Key Encryption

A
  1. The sender creates a document to be email to the receiver.
  2. The sender uses the receiver’s public key to encrypt the message.
  3. The receiver uses his or her private key to decrypt the message.
  4. The receiver can read or print the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

digital signature

A

An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

Often used to ensure that an impostor is not participating in an Internet transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Web browsers and Web sites use ________ techniques

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Popular security techniques include:

A
  • Digital Certificates
  • Transport Layer Security (TLS)
  • Secure HTTP
  • VPN (Virtual Private Network)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

system failure

A

The prolonged malfunction of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A variety of factors can lead to system failure, including:

A
  • Aging hardware
  • Natural disasters
  • Electrical power problems
  • Noise, undervoltages, and overvoltages
  • Errors in computer programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Two ways to protect from system failures caused by electrical power variations include ___________ and ____________.

A
  • surge protectors
  • uninterruptable power supplies (UPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

backup

A

Is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

To back up a file means to make a copy of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Offsite backups

A

Backups are stored in a location separate from the computer site

  • Cloud Storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Three-generation backup policy

A

Grandparent → Parent → Child

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Two backup categories:

A
  • Full backup
  • Selective backup
    • Differential
    • Incremental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Wireless Security

A

Wireless access poses additional security risks

About 80 percent of wireless networks have no security protection (“unsecured wireless network”)

“War driving” allows individuals to detect wireless networks while driving through an area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In additional to using firewalls, some safeguards improve security of wireless networks

A
  • Change the default SSID (Service Set Identifier)
  • A wireless access point should not broadcast an SSID
  • Configure WAP so only certain devices can access (e.g., MAC address configuration)
  • Use WPA or WPA2 security standards •(do not use WEP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Health Concerns of Computer Use

A

The widespread use of computers has led to health concerns

  • Repetitive strain injury (RSI)
    • Tendonitis
    • Carpal tunnel syndrome (CTS)
  • Computer vision syndrome (CVS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Ergonomics

A

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Computer addiction

A

Occurs when the computer consumes someone’s social life. Symptoms include:

  • Craves computer time
  • Overjoyed when at the computer
  • Unable to stop computer activity
  • Irritable when not at the computer
  • Neglects family and friends
  • Problems at work or school
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Computer ethics

A

Are moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Not all information on the Web is correct!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Intellectual property rights

A

Are the rights to which creators are entitled for their work <!--EndFragment-->

A copyright protects any tangible form of expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

IT code of conduct

A

Is written guidelines that help determine whether a specific computer action is ethical or unethical <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IT Code of Conduct

A
  1. Computers may not be used to harm other people.
  2. Employees may not interfere with others’ computer work.
  3. Employees may not meddle in others’ computer files.
  4. Computers may not be used to steal.
  5. Computers may not be used to bear false witness.
  6. Employees may not copy or use software illegally.
  7. Employees may not use others’ computer resources without authorization.
  8. Employees may not use others’ intellectual property as their own.
  9. Employees shall consider the social impact of programs and systems they design.
  10. Employees always should use coputers in a way that demonstrates consideration and respect for fellow humans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Information privacy

A

Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

  • Huge databases store data online
  • It is important to safeguard your information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

cookie

A

A small text file that a Web server stores on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Web sites use cookies for many reasons, including:

A
  • Personalization of the experience
  • Store passwords
  • Assist with online shopping
  • Track site visits
  • Target advertisements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Spam

A

An unsolicited e-mail message or newsgroup posting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

E-mail filtering

A

Blocks e-mail messages from designated sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Anti-spam programs

A

Attempt to remove spam before it reaches your inbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Phishing

A

A scam that sends an official-looking e-mail that attempts to obtain your personal and financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Pharming

A

A scam that attempts to obtain your personal and financial information via spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

The 1970 Fair Credit Reporting Act

A

Limits the right to view a credit report to those with legitimate business needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Social engineering

A

Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naiveté <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Employee monitoring

A

Uses computers to observe, record, and review employees’ computer use during work on on breaks (if using an employer’s computer) <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Content filtering

A

The process of restricting access to certain material on the Web

Many businesses use content filtering

Internet Content Rating Association (ICRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Web filtering software

A

Restricts access to specified Web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Digital forensics

A

The discovery, collection, analysis, and reporting of evidence found on computers and digital devices

  • Focuses on computers, digital devices, and networks
  • Digital evidence exists on a variety of computers
  • The forensic analysis of computers and digital devices specifically involves the examination of media, programs, and data and log files
  • Fastest growing discipline in the forensics field
  • Also referred to as computer forensics, network forensics, or cyberforensics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Digital forensics examiners must have:

A
  • Knowledge of the law
  • Technical experience with many types of hardware and software products
  • Superior communication skills
  • Familiarity with corporate structures and policies
  • A willingness to learn and update skills
  • A knack for problem solving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Digital forensics covers several overlapping areas:

A
  • Law enforcement
  • Homeland security
  • Businesses and other private sector organizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Digital Forensics in Action: Identity Theft

Steps

A
  1. Step 1: Gather materials to analyze
    • Computer media
    • Computers and peripherals
    • GPS receivers
    • Network hardware
    • Computer software
  2. Step 2: Transport the materials
  3. Step 3: Preserve the media
  4. Step 4: Extract evidence
  5. Step 5: Analyze evidence
    • ​Analyze mobile devices
    • Analyze chat room logs
    • Analyze browser history logs
  6. ​Step 6: Document results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Digital Forensics in Action: Spam Attacks

A

A digital forensics examiner might use the following techniques to locate the attacker and/or the computer network facilitating the attacks:

  1. Analyze network traffic
  2. Track packet routes
  3. Analyze Internet access provider logs
  4. Analyze a packet trace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

computer security risk

A

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

cybercrime

A

Network or Internet-based illegal act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Names for Different Types of Cyber-Criminals

A
  • Hackers
  • Crackers
  • Script Kiddies
  • Corporate Spies
  • Unethical Employees
  • Cyberextortionists
  • Cyberterrorists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

online security service

A

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Wireless Internet access points

A

They allow people to connect wirelessly to the Internet from home, work, school, and in many public locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

GPS

A

Global Positioning System: is a navigation system comprising one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the GPS receiver’s geographic location

GPS receivers are:

  • Built into many mobile devices (like your phone so the police can find you when you call 911 for help)
  • Available as a handheld device
  • Available with motor vehicles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

collaborate

A

Many programs provide a means to ___________, or work together online, with others connected to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Collaboration software includes tools that:

A

… enable users to share documents via online meetings and communicate with other connected users. Examples:

  • Online meetings
  • Web conferences
  • Document management systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Web services enable programmers to:

A

… create applications that communicate with other remote computers over the Internet or on an internal business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

mashup

A

A Web application that combines services from two or more sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

network

A

A collection of computers and devices connected via communication devices and transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Network Advantages:

A
  • Facilitate communications
  • Share hardware
  • Share data
  • Share software
  • Transfer funds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

LAN

A

A Local Area Network: connects computers and devices in a limited geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

WLAN

A

A Wireless LAN: is a LAN that uses no physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

MAN

A

A Metropolitan Area Network: connects LANs in a metropolitan area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

WAN

A

A Wide Area Network: covers a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

network architecture

A

The design of computers, devices, and media on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

P2P

A

An Internet network on which users access each other’s hard disks and exchange files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Network Topology

A

Refers to the layout of the computers and devices in a network:

  • Star Network
  • Bus Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Intranet

A

An internal network that uses Internet technologies <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Extranet

A

Allows customers or suppliers to access part of its Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Network Communications Standards

A
  • Ethernet
  • TCP/IP
  • Wi-Fi
  • Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Ethernet

A

A network standard that specifies no computer controls when data can be transmitted <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

TCP/IP

A

A network standard that defines how messages are routed within a network <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Wi-Fi

A

Identifies any network based on the 802.11 standard that facilitates wireless communication.

  • Newest is 802.11ac (1 Gbps and higher)
  • Sometimes referred to as Wireless Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Bluetooth

A

Defines how two Bluetooth devices use short-range radio waves to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

RFID

A

Uses radio signals to communicate with a tag placed in or attached to an object, animal, or person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Communications software:

A
  • Helps users establish a connection to another computer or network
  • Manages the transmission of data, instructions, and information
  • Provides an interface for users to communicate with one another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

communications device

A

Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

digital modem

A

Sends and receives data and information to and from a digital line. Examples:

  • DSL modem
  • Cable modem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

NIC

A

A Network Interface Card enables a computer or device to access a network.

  • Available in a variety of form factors
  • Wireless network cards often have an antenna
107
Q

WAP

A

A Wireless Access Point is a central communications device that allows computers and devices to transfer data wirelessly or to a wired network

108
Q

router

A

Connects multiple computers or other routers and transmits data to its correct destination

  • Many routers are protected by a hardware firewall
109
Q

hub or switch

A

connects several devices

110
Q

Capabilities of home networks include:

A
  • •\Connecting to the Internet at the same time
  • Sharing a single high-speed Internet connection
  • Accessing files and programs on other computers
  • Sharing peripherals
  • Playing multiplayer games
  • Connecting game consoles to the Internet
  • Using VoIP
111
Q

Types of wired home networks:

A
  • Ethernet
  • Powerline cable
  • Phoneline
112
Q

Bandwidth

A

The amount of data that can travel over a communications channel

113
Q

Latency

A

The time it takes a signal to travel from one location to another

114
Q

Transmission media

A

Carry one or more signals

115
Q

Broadband media

A

Transmit multiple signals simultaneously

116
Q

Physical Transmission Media

A
  • Twisted-pair cable
  • Coaxial cable
  • Fiber-optic cable
117
Q

Cellular radio

A

A form of broadcast radio that is used widely for mobile communications

118
Q

communications satellite

A

Receives microwave signals from earth, amplifies them, and broadcasts the signals over a wide area

119
Q

Database

A

Collection of data organized in a manner that allows access, retrieval, and use of that data <!--EndFragment-->

120
Q

Data

A

Collection of unprocessed items:

  • Text
  • Numbers
  • Images
  • Audio
  • Video <!--EndFragment-->
121
Q

Information

A

Processed data:

  • Documents
  • Reports
  • Audio
  • Images
  • Video <!--EndFragment-->
122
Q

Database software

A

Often called a database management system (DBMS), allows users to:

  • Create a database
  • Input, modify, and delete data
  • Sort and retrieve (extract) data
  • Create forms and reports
123
Q

Data integrity

A

Refers to the quality of the data

124
Q

GIGO

A

Garbage in, garbage out points out that the accuracy of a computer’s output depends on the accuracy of the input

125
Q

Useful data and information should have the following characteristics:

A
  • Accurate
  • Verifiable
  • Timely
  • Organized
  • Accessible
  • Useful
  • Cost-effective
126
Q

The Hierarchy of Data

A

Data is organized in layers:

  • File
  • Tables/queries/reports
  • records
  • fields
  • characters
127
Q

character

A

one byte:

  • Number
  • letter
  • space
  • punctuation mark
  • symbol
128
Q

field

A

A combination of one or more related characters:

  • Field name
  • Field size
  • Data type
129
Q

Common data types

A
  • Text (2013: Short Text)
  • Numeric
  • AutoNumber
  • Currency
  • Date
  • Memo (2013: Long Text)
  • Yes/No
  • Hyperlink
  • Object
  • Attachment
130
Q

record

A

A group of related fields

131
Q

primary key

A

Uniquely identifies each record

132
Q

table (data file)

A

A collection of related records

133
Q

Table maintenance

A

Refers to the procedures that keep data current:

  • Adding records
  • Modifying records
  • Deleting records
134
Q

Maintaining Data

A
  • Users add new records to tables when they obtain new data
  • Users modify records to correct inaccurate data or update old date
  • When a record no longer is needed, a user deletes it from a table
135
Q

Data Validation

A

Compares data with a set of rules or values to verify accuracy:

  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
  • Other checks
136
Q

File processing approach

A
  • Each department has its own set of files
  • Used for many years
  • Have data redundancy
  • Isolate data
  • Some use Excel for complex lists (not a “database”) <!--EndFragment-->
137
Q

Database approach

A
  • Programs and users share data
  • Reduce data redundancy
  • Improve data integrity
  • Easier access
  • Reduced development time
  • Can be more vulnerable <!--EndFragment-->
138
Q

data dictionary

A

Contains data about each file in the database and each field in those files

139
Q

DBMS

A

Database Management System: provides several tools that allow data retrieval and maintenance

  • Query language
  • Query by example
  • Form
  • Report generator​
140
Q

query language

A

Consists of simple, English-like statements that allow users to specify the data to display, print or store

141
Q

QBE

A

Query by example: provides a GUI (Graphical User Interface) to assist users with data retrieval

142
Q

form

A

A window on the screen that provides areas for entering or modifying data

143
Q

report generator

A

Allows users to design a report, retrieve data into the report, and display or print the report

144
Q

Provides the means to ensure that only authorized users access data at permitted times by:

A
  • Access privileges
  • Principle of “least privilege”
145
Q

A DMBS provides techniques to restore the database in case it is damaged or destroyed:

A
  • Backup
  • Log
  • Recovery utility
  • Continuous backup <!--EndFragment-->
146
Q

data model

A

Consists of rules and standards that define how the database organizes data

147
Q

relational database

A

Stores data in tables comprising fields and records:

  • Each record (row) has a primary key
  • Each field (column) has a unique name
148
Q

relationship

A

A link between tables

149
Q

SQL

A

Structured Query Language: is a query language that allows users to manage, update, and retrieve data

150
Q

OODB

A

An object-oriented database: stores data in objects

Examples of applications appropriate for an object-oriented database include:

  • Multimedia database
  • Groupware database
  • Computer-aided design database
  • Hypertext database
151
Q

multidimensional database

A

Can store data in more than two dimensions of data

  • Sometimes known as a hypercube
  • Can consolidate data much faster than a relational database
152
Q

data warehouse

A

A huge database that stores and manages the data required to analyze historical and current transactions

153
Q

Databases on the Web allow you to:

A
  • Shop for products or services
  • Buy or sell stocks
  • Search for a job
  • Make airline reservations
  • Register for college classes
  • Check semester grades
154
Q

Database Design Guidlines

A
  • Determine the purpose of the database
  • Design the tables or files:
    • Design tables or files
    • Each table or file should contain data about one subject. The student table, for example, contains data about students.
  • Design the records and fields for each table or file.
    • Be sure every record has a unique primary key
    • Use separate fields for logically distinct items.
    • Do not create fields for information that can be derived from entries in other fields.
    • Allow enough space for each field.
    • Set default values for frequently entered data.
  • Determine the relationships amoung the tables or files.
155
Q

DA

A

Database Analyst: Decides on proper field placement, defines data relationships, and identifies user access privileges

156
Q

DBA

A

Database Administrator: Creates and maintains data dictionaries, manages security, monitors performance, and maintains backup and recovery procedures

157
Q

Employees should learn how …

A

to effectively use a database:

  • Use database tools
  • Identify new data for the database
  • Maintain the database
158
Q

System development

A

A set of activities used to build an information system.<!--EndFragment-->

159
Q

system

A

A set of components that interact to achieve a common goal <!--EndFragment-->

160
Q

IS

A

Information System: A collection of hardware, software, data, people, and procedures that work together to produce quality information

161
Q

System development activities are grouped into phases, collectively called:

A

the system development life cycle (SDLC)

162
Q

SDLC

A

system development life cycle

163
Q

Three general system development guidelines:

A
  1. Group activities or tasks into phases
  2. Involve users
  3. Define standards
164
Q

Phases of System Development

A
  1. Planning
  2. Analysis
  3. Design
  4. Implementation
  5. Operation, Support, and Security
  6. Repeat
165
Q

The planning phase – four major activities:

A
  1. Review and approve project requests
  2. Prioritize project requests
  3. Allocate resources
  4. Form a project development team
166
Q

Project management

A

The process of planning, scheduling, and controlling system development activities

167
Q

Aspects of project management:

A
  1. Project scope
  2. Required activities
  3. Activity time estimates
  4. Activity cost estimates
  5. Order of activities
  6. Concurrent Activities
168
Q

Gantt chart

A

A popular tool used to plan schedule relationships among project activities

169
Q

Feasibility

A

A measure of how suitable the development of a system will be to the organization

  • Operational feasibility
  • Schedule feasibility
  • Technical feasibility
  • Economic feasibility
170
Q

analysis phase – two major activities:

A
  1. Preliminary investigation
    • Determine and define precise nature of the problem/improvement
    • Interview the user who submitted the request
  2. Detailed analysis
    • Study current system
    • Determine user requirements (wants and needs)
    • Recommend solution
171
Q

During system development, members of the project team gather data and information using several techniques

A
  • Review documentation
  • Observe
  • Survey
  • Interview
  • Joint Application Development
  • Research
172
Q

The design phase – two major activities:

A
  • Acquire hardware and software to meet requirements
  • Develop the details of the new or modified information system
173
Q

prototype

A

A (proof of concept) – a limited, working model of the proposed system

  • Prototypes have inadequate or missing documentation
  • Users tend to embrace the prototype as a final system
  • Prototypes should not eliminate or replace current system activities
174
Q

Implementation phase

A

Construct the new or modified system and deliver it. Common steps:

  • Develop programs
  • Install and test the new system
  • Train users
  • Convert to the new system
175
Q

Operation, support, and security phase

A

Provide ongoing assistance for an Information System and its users after implementation. Common activities:

  • Perform maintenance activities
  • Monitor system performance
  • Assess system security
176
Q

Enterprise computing

A
  • Comprehensive use of computers in networks (e.g., LANs and WANs)
  • Can include a series of interconnected networks
  • Involves a variety of operating systems, protocols, and network architectures
177
Q

Types of enterprises include:

A
  • Retail
  • Manufacturing
  • Service
  • Wholesale
  • Government
  • Educational
  • Transportation
178
Q

Most Enterprises are ____________ organizations

A

hierarchical

179
Q

In an Enterprise, personnel typically fall into one of four categories:

A
  1. Executive Management
  2. Middle Management
  3. Operational Management
  4. Non-management Employees
180
Q

Enterprise information

A

Information gathered in ongoing operations of an

  • Enterprise-sized organization
  • Business intelligence
  • Business process management
  • Business process automation
181
Q

Managers

A

Coordinate resources by carrying out four activities:

  1. Planning
  2. Organizing
  3. Leading
  4. Controlling
182
Q

Information System

A

A set of hardware, software, data, people, and procedures that work together to provide information

183
Q

Enterprise functional units might include:

A
  • Accounting and Finance
  • Human Resources
  • Engineering or Product
  • Manufacturing
  • Marketing
  • Sales
  • Distribution
  • Customer Service
  • Information Technology
184
Q

Accounting software

A

Manages everyday transactions

185
Q

Billing software

A

Helps the company reconcile purchases with customer payments

186
Q

Financial software

A

Helps managers budget, forecast, and analyze

187
Q

Human Resources Information System

A

Manages one or more human resources functions

188
Q

Employee Relationship Management System

A

Manages communication between employees and the business

189
Q

MRP

A

Material Requirements Planning - Uses software to help monitor and control processes related to production

190
Q

MRP II

A

Manufacturing Resource Planning II - is an extension of MRP that includes software to help with scheduling

191
Q

Distribution Systems

A
  • Provide forecasting for inventory control
  • Manage and track shipping
  • Provide analysis and information on warehouse inventory
192
Q

CIM

A

Customer Interaction Management - software manages day-to-day customer interactions

193
Q

IT Department

A

Information Technology department - makes technology decisions for the enterprise:

  • Build or buy new Information Systems?
  • Has an Information System and its technology outlived useful life?
194
Q

Web site management programs

A

Collect data designed to help organizations make informed decisions regarding Web presence

195
Q

General purpose Information Systems categories:

A
  • Office Information System
  • Transaction Processing System
  • Management Information System
  • Decision Support System
  • Expert System
196
Q

Batch processing vs. real-time online transaction processing

A

Batch processing can much longer to complete. The process for each is as follows:

  1. Batch processing
    1. Reservation requested
    2. Batch of reservations
    3. Process complete
  2. Real-time Online processing
    1. Reservation requested
    2. Process complete
197
Q

Integrated Information Systems

A
  • Customer Relationship Management
  • Enterprise Resource Planning
  • Content Management Systems
198
Q

Customer Relationship Management

A

Manages information about customer interactions, purchases, and interests

199
Q

Enterprise Resource Planning

A

Provides centralized, integrated software to help manage and coordinate ongoing activities

200
Q

Content Management Systems

A

Combine databases, software, and procedures

201
Q

portal

A

A collection of links, content, and services presented on a Web page related to a job

202
Q

data warehouse

A

A huge database that stores and manages data required to analyze transactions

203
Q

Workflow (or Flow Chart)

A

Identifies related steps involved in completing a project or business process

204
Q

VPN

A

A Virtual Private Network - provides a secure connection to a network server

205
Q

Virtualization

A

Supports sharing or pooling computing resources:

  • Server virtualization
  • Storage virtualization
206
Q

Storage virtualization

A

Provides capability to create one logical storage device from many physical storage devices

207
Q

Server virtualization

A

Provides capability to partition a physical server logically into many virtual servers

208
Q

Cloud computing

A

Is an Internet-based service that provides computing services

209
Q

Grid computing

A

Combines many networked servers and/or personal computers to act as one computer

210
Q

SAN

A

A Storage Area Network - is a high-speed network that provides storage to other servers

211
Q

An Enterprise Storage System focuses on:

A
  • storage availability
  • protection
  • organization
  • backup

Strategy = consolidate storage

212
Q

blade server

A

Packs a complete computer server on a single card or blade rather than a system unit

  • Individual blades are inserted in a blade server chassis
213
Q

thin client

A

A small terminal-like computer that relies on a server for data storage and processing

214
Q

high-availability system

A

Continues running and performing tasks for at least 99 percent of the time

  • May include hot-swappable and redundant components
  • When a component fails, another component takes over and the system continues to function
215
Q

Uptime

A

Refers to working and available systems (vs. downtime)

Is a measurement in time or percentages of how long a system is working and available vs. how long it is down and unavailable.

216
Q

Scalability

A

A measure of how well an Information System, or computer hardware and software can grow to meet increasing performance demands or organization expansion requirements

217
Q

Interoperability

A

An Information System’s ability to share data and information with other Information Systems within an Enterprise

218
Q

Type of Backup: Full

A

Advantages:

  • Fastest recovery method.
  • All files are saved.

Disadvantages:

  • Longest backup time.
219
Q

Type of Backup: Differential

A

Advantages:

  • Fast backup method.
  • Requires minimal storage space to backup.

Disadvantages:

  • Recovery is time-consuming becaus the last full backup plus the differential backup are needed.
220
Q

Type of Backup: Incremental

A

Advantages:

  • Fastest backup method.
  • Requires minimal storage space to backup.
  • Only most recent changes saved.

Disadvantages:

  • Recovery is most time-consuming becaus the last full backup and all differential backup since the last full backup are needed.
221
Q

Type of Backup: Selective

A

Advantages:

  • Fast backup method.
  • Provides great flexibility

Disadvantages:

  • Difficult to manage individual file backups.
  • Least manageable of all the backup methods..
222
Q

Type of Backup: Continuous

A

Advantages:

  • The only real-time backup.
  • Very fast recovery of data.

Disadvantages:

  • Very expensive and requires a great amount of storage.
223
Q

Disaster Recovery Plan

A

Describes the steps a company would take to restore computer operations.

224
Q

Four major Disaster Recovery Plan components:

A
  1. Emergency plan
  2. Backup plan
  3. Recovery plan
  4. Test plan
225
Q

Job opportunities in the computer industry generally are available in one or more of these areas:

A
  • Business and Government IT
  • Hardware
  • Software
  • Service and repair
  • Sales
  • Education and training
  • IT Consulting
226
Q

Employees in IT:

A

(Information Technology):

  • Work as a team to meet information requirements of their organization.
  • Also keep computer operations and networks running
227
Q

Jobs in IT are usually in six main categories

A
  • Management
  • System development and programming
  • Technical services
  • Operations
  • Training
  • Security
228
Q

The hardware and equipment field

A

Consists of manufacturers and distributors of computers and technology-related hardware

  • Careers in this field are available with companies that design, manufacture, and produce computers and devices
229
Q

The computer software field

A

Consists of companies that develop, manufacture, and support software

Job titles include:

  • Project leader
  • Project manager
  • Desktop or mobile application programmer/developer
  • Technical lead
  • Software engineer
  • Computer scientist
230
Q

The service and repair field

A
  • Provides:
    • Preventive maintenance
    • Component installation
    • Repair services
  • Requires a knowledge of electronics
231
Q

Computer salespeople

A
  • Must possess a general understanding of computers and a specific knowledge of the products they are selling.
  • Some work for computer equipment and software manufacturers, while others work for retailers.
232
Q

Corporate trainers

A

Teach employees how to use software, design and develop systems, write programs, and perform other computer-related activities

233
Q

An IT consultant

A

Provides computer services to his or her clients

234
Q

Preparing for a Career in the Computer Industry -

Three broad disciplines produce the greatest number of entry-level employees

A
  • Computer Information Systems
  • Computer Science
  • Computer Engineering
235
Q

Computer information systems

A
  • Programming
  • Operating systems
  • Systems analysis and design
  • Databases
  • Networking
  • Web development
236
Q

Computer Science

A
  • Artificial intelligence
  • Data communications
  • Data and file structures
  • Operating systems
  • Application and systems programming
  • Systems analysis and design
237
Q

Computer Engineering

A
  • Application and systems programming
  • Data and file structures
  • Networks
  • Operating systems
238
Q

Tools for keeping up-to-date on industry trends and technologies and develop new skills

A
  • Professional organizations and personal networks
  • Professional growth and continuing education
  • Computer publications
  • Certification
239
Q

Professional Computer Organizations

A

Computer professionals with common interests and a desire to extend their proficiency form computer-related professional organizations

240
Q

user group

A

A collection of people with common interests in hardware or software

  • Groups can be an effective and rewarding way to learn about and continue career development
241
Q

Conferences, conventions, and trade shows

A

Are a great way to stay aware of new products and services. Example:

  • International Consumer Electronics Show (CES)
242
Q

Certification

A

Is the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area

243
Q

Computer certifications are available in these areas:

A
  • Application software
  • Operating systems
  • Programming
  • Hardware
  • Networking
  • Digital forensics
  • Security
  • The Internet
  • Database systems
244
Q

The World Wide Web has changed the way that people

A
  • Do business
  • Communicate
  • Share information
245
Q

The Web has evolved from:

A

A collection of Web sites to supporting Web applications

246
Q

Web 2.0 is characterized by

A

interactive applications

247
Q

Newer Web sites provide users with a rich browsing experience

A
  • Customizable layout
  • Bold graphics
  • Tabs
  • Additional services
248
Q

Web 2.0 is the result of several developments:

A
  • Connectivity almost everywhere
  • Mobile phones capable of accessing the Web
  • Web-based applications available for many devices
  • Web developers deploy new versions of software applications with no required user involvement
  • Society has embraced technological changes
249
Q

Online conversations

A
  • Blogs
  • Wikis
  • Sharing media
  • Collaboration
250
Q

Web 2.0 is often referred to as:

A

A read/write Web, or a Database-backed Web

  • Web applications read from or write to a database
251
Q

A Web server

A

Processes requests for Web pages sent over the Internet from a Web client

  • Known as Client-Server model
252
Q

Web 2.0 utilizes

A

Applications that connect people and technologies that link data

253
Q

The Internet makes it possible to:

A

Access information from any Internet-connected device

  • Web-based tools for collaboration
  • Web applications
  • Other technologies for sharing information
254
Q

Cloud computing

A

Describes how applications are stored and deployed on a network of Internet servers

  • Cloud requires the Internet
255
Q

Cloud computing service providers offer:

A

Server space and applications

  • Companies such as Google, Amazon, Microsoft, and Salesforce provide Cloud servers for individuals and businesses
256
Q

Cloud computing includes various Services – some examples are:

A
  • Infrastructure as a Service (IaaS)
    • Internet delivery of a networked computing structure
  • Platform as a Service (PaaS)
    • Delivery of a computing platform over the Internet
  • Software as a Service (SaaS)
    • Delivery of software applications over the Internet
257
Q

Infrastructure as a Service (IaaS)

A

Internet delivery of a networked computing structure

258
Q

Platform as a Service (PaaS)

A

Delivery of a computing platform over the Internet

259
Q

Software as a Service (SaaS)

A

Delivery of software applications over the Internet

260
Q

Cloud Categories

A
  1. Public Cloud
  2. Hybrid Cloud
  3. Private Cloud
  • Many Cloud storage providers offer limited storage for free, and charge an additional fee for more storage
261
Q

Using virtualization, one host machine can:

A

Operate as if it were several smaller servers

262
Q

Mashups

A
  • Are Web applications that combine content or data from multiple online sources
    • Content is continuously updated
    • Content is sourced from RSS Feeds and Web services
263
Q

Web 3.0

A
  • Is the term that describes emerging trends that link information in new way
    • Agents can make decisions and take actions based on a user preferences
  • Many describe Web 3.0 as the rise of the “Semantic Web”
    • Intelligent software tools can read Web pages and discern useful information from them
    • A Web of data