Vocab 9 - 15 & Web 2.0 (Includes reversed cards as well) Flashcards

1
Q

Computer communications

A

A process in which two or more computers or devices transfer data, instructions, and information.

  • Sending device → Communications channel → Receiving device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computer security risk

A

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cybercrime

A

A Network or Internet-based illegal act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Security Risks

A
  • Internet and network attacks
  • unauthorized access and use
  • hardware theft (stealing a thumb drive or hard drive)
  • system failure (lightning strike)
  • infromation theft (stollen identity)
  • software theft (illegal copy)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data transmitted over networks

A

Has a higher degree of security risk than data kept on an organization’s premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

online security service

A

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Affects a computer negatively by altering the way the computer works <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Horse

A

A malicious program that hides within or looks like a legitimate program <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkit

A

Program that hides, creating a “back door” for a remote location to take full control of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symptoms of an infected computer include:

A
  • Runs much slower than usual
  • Available memory is less than expected
  • Files become corrupted
  • Screen displays unusual message or image
  • Music or unusual sounds play randomly
  • Existing programs and files disappear
  • Programs or files do not work properly
  • Unknown programs or files mysteriously appear
  • System properties change
  • Operating system does not boot (start up)
  • Operating system shuts down unexpectedly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:

A
  1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
  2. Never open an email attachment unless you are expecting it and it is from a trusted source.
  3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
  4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
  5. Scan all downloaded programs for viruses and other maleware.
  6. If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
  7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
  8. Install a personal firewall program.
  9. Stay informed about new virus alerts and virus hoaxes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

botnet

A

A group of compromised computers connected to a network

A compromised computer is known as a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS attack

A

A denial of service attack: disrupts computer access to Internet services

Distributed DoS (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

back door

A

A program or set of instructions in a program that allows remote attackers to bypass security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing

A

A technique intruders use to make their network or Internet transmission appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

firewall

A

Hardware and/or software that protects computers and networks from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Intrusion detection software

A
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior patterns or system breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Honeypot

A

Vulnerable computer that is set up to entice an intruder to break into it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Unauthorized access

A

The use of a computer or network without permission <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unauthorized use

A

The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The measures organizations take to help prevent unauthorized access and use:

A
  • Acceptable use policy
  • Disable file and printer sharing
  • Firewalls
  • Intrusion detection software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Access controls

A

Define who can access a computer, when they can access it, and what actions they can take:

  • Two-phase processes called identification and authentication
  • User name
  • Password
  • Passphrase
  • CAPTCHA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

possessed object

A
  • Any item that you must carry to gain access to a computer or computer facility.
  • Often are used in combination with a personal identification number (PIN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

biometric device

A

Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Digital forensics

A

The discovery, collection, and analysis of evidence found on computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Areas that use digital forensics

A
  • Law enforcement
  • Criminal prosecutors
  • Civil lawsuits, discovery
  • Military intelligence
  • Insurance agencies
  • Information security departments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hardware theft

A

The act of stealing computer equipment <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Hardware vandalism

A

The <!--StartFragment--> act of defacing or destroying computer equipment <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Software theft occurs when someone:

A
  • Steals software media
  • Intentionally erases programs
  • Illegally copies a program
  • Illegally registers and/or activates a program
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EULA

A

An End User License Agreement typically contains the following conditions:

  • Permitted to…
    • Install the software on a certain number of computers (usually one)
    • Make one copy of the software
    • Remove the software from your computer before giving it away or selling it
  • Not permitted to…
    • Install the software on a network
    • Give copies to friends or colleagues while continuing to use the software
    • Export the software
    • Rent or lease the software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Information theft

A

Occurs when someone steals personal or confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Encryption

A

A process of converting readable data into unreadable characters to prevent unauthorized access

  • Transposition
  • Substitution
  • Expansion
  • Compaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Transposition

A

Switch the order of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Substitution

A

Replace characters with other character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Expansion

A

Insert characters between existing characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Compaction

A

Remove characters and store elsewhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Public Key Encryption

A
  1. The sender creates a document to be email to the receiver.
  2. The sender uses the receiver’s public key to encrypt the message.
  3. The receiver uses his or her private key to decrypt the message.
  4. The receiver can read or print the message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

digital signature

A

An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

Often used to ensure that an impostor is not participating in an Internet transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Web browsers and Web sites use ________ techniques

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Popular security techniques include:

A
  • Digital Certificates
  • Transport Layer Security (TLS)
  • Secure HTTP
  • VPN (Virtual Private Network)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

system failure

A

The prolonged malfunction of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A variety of factors can lead to system failure, including:

A
  • Aging hardware
  • Natural disasters
  • Electrical power problems
  • Noise, undervoltages, and overvoltages
  • Errors in computer programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Two ways to protect from system failures caused by electrical power variations include ___________ and ____________.

A
  • surge protectors
  • uninterruptable power supplies (UPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

backup

A

Is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

To back up a file means to make a copy of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Offsite backups

A

Backups are stored in a location separate from the computer site

  • Cloud Storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Three-generation backup policy

A

Grandparent → Parent → Child

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Two backup categories:

A
  • Full backup
  • Selective backup
    • Differential
    • Incremental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Wireless Security

A

Wireless access poses additional security risks

About 80 percent of wireless networks have no security protection (“unsecured wireless network”)

“War driving” allows individuals to detect wireless networks while driving through an area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In additional to using firewalls, some safeguards improve security of wireless networks

A
  • Change the default SSID (Service Set Identifier)
  • A wireless access point should not broadcast an SSID
  • Configure WAP so only certain devices can access (e.g., MAC address configuration)
  • Use WPA or WPA2 security standards •(do not use WEP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Health Concerns of Computer Use

A

The widespread use of computers has led to health concerns

  • Repetitive strain injury (RSI)
    • Tendonitis
    • Carpal tunnel syndrome (CTS)
  • Computer vision syndrome (CVS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Ergonomics

A

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Computer addiction

A

Occurs when the computer consumes someone’s social life. Symptoms include:

  • Craves computer time
  • Overjoyed when at the computer
  • Unable to stop computer activity
  • Irritable when not at the computer
  • Neglects family and friends
  • Problems at work or school
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Computer ethics

A

Are moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Not all information on the Web is correct!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Intellectual property rights

A

Are the rights to which creators are entitled for their work <!--EndFragment-->

A copyright protects any tangible form of expression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

IT code of conduct

A

Is written guidelines that help determine whether a specific computer action is ethical or unethical <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IT Code of Conduct

A
  1. Computers may not be used to harm other people.
  2. Employees may not interfere with others’ computer work.
  3. Employees may not meddle in others’ computer files.
  4. Computers may not be used to steal.
  5. Computers may not be used to bear false witness.
  6. Employees may not copy or use software illegally.
  7. Employees may not use others’ computer resources without authorization.
  8. Employees may not use others’ intellectual property as their own.
  9. Employees shall consider the social impact of programs and systems they design.
  10. Employees always should use coputers in a way that demonstrates consideration and respect for fellow humans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Information privacy

A

Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

  • Huge databases store data online
  • It is important to safeguard your information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

cookie

A

A small text file that a Web server stores on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Web sites use cookies for many reasons, including:

A
  • Personalization of the experience
  • Store passwords
  • Assist with online shopping
  • Track site visits
  • Target advertisements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Spam

A

An unsolicited e-mail message or newsgroup posting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

E-mail filtering

A

Blocks e-mail messages from designated sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Anti-spam programs

A

Attempt to remove spam before it reaches your inbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Phishing

A

A scam that sends an official-looking e-mail that attempts to obtain your personal and financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Pharming

A

A scam that attempts to obtain your personal and financial information via spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

The 1970 Fair Credit Reporting Act

A

Limits the right to view a credit report to those with legitimate business needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Social engineering

A

Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naiveté <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Employee monitoring

A

Uses computers to observe, record, and review employees’ computer use during work on on breaks (if using an employer’s computer) <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Content filtering

A

The process of restricting access to certain material on the Web

Many businesses use content filtering

Internet Content Rating Association (ICRA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Web filtering software

A

Restricts access to specified Web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Digital forensics

A

The discovery, collection, analysis, and reporting of evidence found on computers and digital devices

  • Focuses on computers, digital devices, and networks
  • Digital evidence exists on a variety of computers
  • The forensic analysis of computers and digital devices specifically involves the examination of media, programs, and data and log files
  • Fastest growing discipline in the forensics field
  • Also referred to as computer forensics, network forensics, or cyberforensics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Digital forensics examiners must have:

A
  • Knowledge of the law
  • Technical experience with many types of hardware and software products
  • Superior communication skills
  • Familiarity with corporate structures and policies
  • A willingness to learn and update skills
  • A knack for problem solving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Digital forensics covers several overlapping areas:

A
  • Law enforcement
  • Homeland security
  • Businesses and other private sector organizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Digital Forensics in Action: Identity Theft

Steps

A
  1. Step 1: Gather materials to analyze
    • Computer media
    • Computers and peripherals
    • GPS receivers
    • Network hardware
    • Computer software
  2. Step 2: Transport the materials
  3. Step 3: Preserve the media
  4. Step 4: Extract evidence
  5. Step 5: Analyze evidence
    • ​Analyze mobile devices
    • Analyze chat room logs
    • Analyze browser history logs
  6. ​Step 6: Document results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Digital Forensics in Action: Spam Attacks

A

A digital forensics examiner might use the following techniques to locate the attacker and/or the computer network facilitating the attacks:

  1. Analyze network traffic
  2. Track packet routes
  3. Analyze Internet access provider logs
  4. Analyze a packet trace
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

computer security risk

A

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

cybercrime

A

Network or Internet-based illegal act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Names for Different Types of Cyber-Criminals

A
  • Hackers
  • Crackers
  • Script Kiddies
  • Corporate Spies
  • Unethical Employees
  • Cyberextortionists
  • Cyberterrorists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

online security service

A

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Wireless Internet access points

A

They allow people to connect wirelessly to the Internet from home, work, school, and in many public locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

GPS

A

Global Positioning System: is a navigation system comprising one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the GPS receiver’s geographic location

GPS receivers are:

  • Built into many mobile devices (like your phone so the police can find you when you call 911 for help)
  • Available as a handheld device
  • Available with motor vehicles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

collaborate

A

Many programs provide a means to ___________, or work together online, with others connected to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Collaboration software includes tools that:

A

… enable users to share documents via online meetings and communicate with other connected users. Examples:

  • Online meetings
  • Web conferences
  • Document management systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Web services enable programmers to:

A

… create applications that communicate with other remote computers over the Internet or on an internal business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

mashup

A

A Web application that combines services from two or more sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

network

A

A collection of computers and devices connected via communication devices and transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Network Advantages:

A
  • Facilitate communications
  • Share hardware
  • Share data
  • Share software
  • Transfer funds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

LAN

A

A Local Area Network: connects computers and devices in a limited geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

WLAN

A

A Wireless LAN: is a LAN that uses no physical connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

MAN

A

A Metropolitan Area Network: connects LANs in a metropolitan area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

WAN

A

A Wide Area Network: covers a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

network architecture

A

The design of computers, devices, and media on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

P2P

A

An Internet network on which users access each other’s hard disks and exchange files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Network Topology

A

Refers to the layout of the computers and devices in a network:

  • Star Network
  • Bus Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Intranet

A

An internal network that uses Internet technologies <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Extranet

A

Allows customers or suppliers to access part of its Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Network Communications Standards

A
  • Ethernet
  • TCP/IP
  • Wi-Fi
  • Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Ethernet

A

A network standard that specifies no computer controls when data can be transmitted <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

TCP/IP

A

A network standard that defines how messages are routed within a network <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Wi-Fi

A

Identifies any network based on the 802.11 standard that facilitates wireless communication.

  • Newest is 802.11ac (1 Gbps and higher)
  • Sometimes referred to as Wireless Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Bluetooth

A

Defines how two Bluetooth devices use short-range radio waves to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

RFID

A

Uses radio signals to communicate with a tag placed in or attached to an object, animal, or person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Communications software:

A
  • Helps users establish a connection to another computer or network
  • Manages the transmission of data, instructions, and information
  • Provides an interface for users to communicate with one another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

communications device

A

Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

digital modem

A

Sends and receives data and information to and from a digital line. Examples:

  • DSL modem
  • Cable modem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

NIC

A

A Network Interface Card enables a computer or device to access a network.

  • Available in a variety of form factors
  • Wireless network cards often have an antenna
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

WAP

A

A Wireless Access Point is a central communications device that allows computers and devices to transfer data wirelessly or to a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

router

A

Connects multiple computers or other routers and transmits data to its correct destination

  • Many routers are protected by a hardware firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

hub or switch

A

connects several devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Capabilities of home networks include:

A
  • •\Connecting to the Internet at the same time
  • Sharing a single high-speed Internet connection
  • Accessing files and programs on other computers
  • Sharing peripherals
  • Playing multiplayer games
  • Connecting game consoles to the Internet
  • Using VoIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Types of wired home networks:

A
  • Ethernet
  • Powerline cable
  • Phoneline
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Bandwidth

A

The amount of data that can travel over a communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Latency

A

The time it takes a signal to travel from one location to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Transmission media

A

Carry one or more signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Broadband media

A

Transmit multiple signals simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Physical Transmission Media

A
  • Twisted-pair cable
  • Coaxial cable
  • Fiber-optic cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Cellular radio

A

A form of broadcast radio that is used widely for mobile communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

communications satellite

A

Receives microwave signals from earth, amplifies them, and broadcasts the signals over a wide area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Database

A

Collection of data organized in a manner that allows access, retrieval, and use of that data <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Data

A

Collection of unprocessed items:

  • Text
  • Numbers
  • Images
  • Audio
  • Video <!--EndFragment-->
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Information

A

Processed data:

  • Documents
  • Reports
  • Audio
  • Images
  • Video <!--EndFragment-->
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Database software

A

Often called a database management system (DBMS), allows users to:

  • Create a database
  • Input, modify, and delete data
  • Sort and retrieve (extract) data
  • Create forms and reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Data integrity

A

Refers to the quality of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

GIGO

A

Garbage in, garbage out points out that the accuracy of a computer’s output depends on the accuracy of the input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Useful data and information should have the following characteristics:

A
  • Accurate
  • Verifiable
  • Timely
  • Organized
  • Accessible
  • Useful
  • Cost-effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The Hierarchy of Data

A

Data is organized in layers:

  • File
  • Tables/queries/reports
  • records
  • fields
  • characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

character

A

one byte:

  • Number
  • letter
  • space
  • punctuation mark
  • symbol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

field

A

A combination of one or more related characters:

  • Field name
  • Field size
  • Data type
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Common data types

A
  • Text (2013: Short Text)
  • Numeric
  • AutoNumber
  • Currency
  • Date
  • Memo (2013: Long Text)
  • Yes/No
  • Hyperlink
  • Object
  • Attachment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

record

A

A group of related fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

primary key

A

Uniquely identifies each record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

table (data file)

A

A collection of related records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Table maintenance

A

Refers to the procedures that keep data current:

  • Adding records
  • Modifying records
  • Deleting records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Maintaining Data

A
  • Users add new records to tables when they obtain new data
  • Users modify records to correct inaccurate data or update old date
  • When a record no longer is needed, a user deletes it from a table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Data Validation

A

Compares data with a set of rules or values to verify accuracy:

  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
  • Other checks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

File processing approach

A
  • Each department has its own set of files
  • Used for many years
  • Have data redundancy
  • Isolate data
  • Some use Excel for complex lists (not a “database”) <!--EndFragment-->
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Database approach

A
  • Programs and users share data
  • Reduce data redundancy
  • Improve data integrity
  • Easier access
  • Reduced development time
  • Can be more vulnerable <!--EndFragment-->
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

data dictionary

A

Contains data about each file in the database and each field in those files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

DBMS

A

Database Management System: provides several tools that allow data retrieval and maintenance

  • Query language
  • Query by example
  • Form
  • Report generator​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

query language

A

Consists of simple, English-like statements that allow users to specify the data to display, print or store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

QBE

A

Query by example: provides a GUI (Graphical User Interface) to assist users with data retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

form

A

A window on the screen that provides areas for entering or modifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

report generator

A

Allows users to design a report, retrieve data into the report, and display or print the report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Provides the means to ensure that only authorized users access data at permitted times by:

A
  • Access privileges
  • Principle of “least privilege”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

A DMBS provides techniques to restore the database in case it is damaged or destroyed:

A
  • Backup
  • Log
  • Recovery utility
  • Continuous backup <!--EndFragment-->
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

data model

A

Consists of rules and standards that define how the database organizes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

relational database

A

Stores data in tables comprising fields and records:

  • Each record (row) has a primary key
  • Each field (column) has a unique name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

relationship

A

A link between tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

SQL

A

Structured Query Language: is a query language that allows users to manage, update, and retrieve data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

OODB

A

An object-oriented database: stores data in objects

Examples of applications appropriate for an object-oriented database include:

  • Multimedia database
  • Groupware database
  • Computer-aided design database
  • Hypertext database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

multidimensional database

A

Can store data in more than two dimensions of data

  • Sometimes known as a hypercube
  • Can consolidate data much faster than a relational database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

data warehouse

A

A huge database that stores and manages the data required to analyze historical and current transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Databases on the Web allow you to:

A
  • Shop for products or services
  • Buy or sell stocks
  • Search for a job
  • Make airline reservations
  • Register for college classes
  • Check semester grades
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Database Design Guidlines

A
  • Determine the purpose of the database
  • Design the tables or files:
    • Design tables or files
    • Each table or file should contain data about one subject. The student table, for example, contains data about students.
  • Design the records and fields for each table or file.
    • Be sure every record has a unique primary key
    • Use separate fields for logically distinct items.
    • Do not create fields for information that can be derived from entries in other fields.
    • Allow enough space for each field.
    • Set default values for frequently entered data.
  • Determine the relationships amoung the tables or files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

DA

A

Database Analyst: Decides on proper field placement, defines data relationships, and identifies user access privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

DBA

A

Database Administrator: Creates and maintains data dictionaries, manages security, monitors performance, and maintains backup and recovery procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Employees should learn how …

A

to effectively use a database:

  • Use database tools
  • Identify new data for the database
  • Maintain the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

System development

A

A set of activities used to build an information system.<!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

system

A

A set of components that interact to achieve a common goal <!--EndFragment-->

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

IS

A

Information System: A collection of hardware, software, data, people, and procedures that work together to produce quality information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

System development activities are grouped into phases, collectively called:

A

the system development life cycle (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

SDLC

A

system development life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Three general system development guidelines:

A
  1. Group activities or tasks into phases
  2. Involve users
  3. Define standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Phases of System Development

A
  1. Planning
  2. Analysis
  3. Design
  4. Implementation
  5. Operation, Support, and Security
  6. Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

The planning phase – four major activities:

A
  1. Review and approve project requests
  2. Prioritize project requests
  3. Allocate resources
  4. Form a project development team
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Project management

A

The process of planning, scheduling, and controlling system development activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Aspects of project management:

A
  1. Project scope
  2. Required activities
  3. Activity time estimates
  4. Activity cost estimates
  5. Order of activities
  6. Concurrent Activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Gantt chart

A

A popular tool used to plan schedule relationships among project activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Feasibility

A

A measure of how suitable the development of a system will be to the organization

  • Operational feasibility
  • Schedule feasibility
  • Technical feasibility
  • Economic feasibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

analysis phase – two major activities:

A
  1. Preliminary investigation
    • Determine and define precise nature of the problem/improvement
    • Interview the user who submitted the request
  2. Detailed analysis
    • Study current system
    • Determine user requirements (wants and needs)
    • Recommend solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

During system development, members of the project team gather data and information using several techniques

A
  • Review documentation
  • Observe
  • Survey
  • Interview
  • Joint Application Development
  • Research
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

The design phase – two major activities:

A
  • Acquire hardware and software to meet requirements
  • Develop the details of the new or modified information system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

prototype

A

A (proof of concept) – a limited, working model of the proposed system

  • Prototypes have inadequate or missing documentation
  • Users tend to embrace the prototype as a final system
  • Prototypes should not eliminate or replace current system activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Implementation phase

A

Construct the new or modified system and deliver it. Common steps:

  • Develop programs
  • Install and test the new system
  • Train users
  • Convert to the new system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Operation, support, and security phase

A

Provide ongoing assistance for an Information System and its users after implementation. Common activities:

  • Perform maintenance activities
  • Monitor system performance
  • Assess system security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Enterprise computing

A
  • Comprehensive use of computers in networks (e.g., LANs and WANs)
  • Can include a series of interconnected networks
  • Involves a variety of operating systems, protocols, and network architectures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Types of enterprises include:

A
  • Retail
  • Manufacturing
  • Service
  • Wholesale
  • Government
  • Educational
  • Transportation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Most Enterprises are ____________ organizations

A

hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

In an Enterprise, personnel typically fall into one of four categories:

A
  1. Executive Management
  2. Middle Management
  3. Operational Management
  4. Non-management Employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Enterprise information

A

Information gathered in ongoing operations of an

  • Enterprise-sized organization
  • Business intelligence
  • Business process management
  • Business process automation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Managers

A

Coordinate resources by carrying out four activities:

  1. Planning
  2. Organizing
  3. Leading
  4. Controlling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Information System

A

A set of hardware, software, data, people, and procedures that work together to provide information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Enterprise functional units might include:

A
  • Accounting and Finance
  • Human Resources
  • Engineering or Product
  • Manufacturing
  • Marketing
  • Sales
  • Distribution
  • Customer Service
  • Information Technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Accounting software

A

Manages everyday transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Billing software

A

Helps the company reconcile purchases with customer payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Financial software

A

Helps managers budget, forecast, and analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Human Resources Information System

A

Manages one or more human resources functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Employee Relationship Management System

A

Manages communication between employees and the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

MRP

A

Material Requirements Planning - Uses software to help monitor and control processes related to production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

MRP II

A

Manufacturing Resource Planning II - is an extension of MRP that includes software to help with scheduling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Distribution Systems

A
  • Provide forecasting for inventory control
  • Manage and track shipping
  • Provide analysis and information on warehouse inventory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

CIM

A

Customer Interaction Management - software manages day-to-day customer interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

IT Department

A

Information Technology department - makes technology decisions for the enterprise:

  • Build or buy new Information Systems?
  • Has an Information System and its technology outlived useful life?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Web site management programs

A

Collect data designed to help organizations make informed decisions regarding Web presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

General purpose Information Systems categories:

A
  • Office Information System
  • Transaction Processing System
  • Management Information System
  • Decision Support System
  • Expert System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Batch processing vs. real-time online transaction processing

A

Batch processing can much longer to complete. The process for each is as follows:

  1. Batch processing
    1. Reservation requested
    2. Batch of reservations
    3. Process complete
  2. Real-time Online processing
    1. Reservation requested
    2. Process complete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Integrated Information Systems

A
  • Customer Relationship Management
  • Enterprise Resource Planning
  • Content Management Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Customer Relationship Management

A

Manages information about customer interactions, purchases, and interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Enterprise Resource Planning

A

Provides centralized, integrated software to help manage and coordinate ongoing activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Content Management Systems

A

Combine databases, software, and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

portal

A

A collection of links, content, and services presented on a Web page related to a job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

data warehouse

A

A huge database that stores and manages data required to analyze transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Workflow (or Flow Chart)

A

Identifies related steps involved in completing a project or business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

VPN

A

A Virtual Private Network - provides a secure connection to a network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Virtualization

A

Supports sharing or pooling computing resources:

  • Server virtualization
  • Storage virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Storage virtualization

A

Provides capability to create one logical storage device from many physical storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Server virtualization

A

Provides capability to partition a physical server logically into many virtual servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Cloud computing

A

Is an Internet-based service that provides computing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Grid computing

A

Combines many networked servers and/or personal computers to act as one computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

SAN

A

A Storage Area Network - is a high-speed network that provides storage to other servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

An Enterprise Storage System focuses on:

A
  • storage availability
  • protection
  • organization
  • backup

Strategy = consolidate storage

212
Q

blade server

A

Packs a complete computer server on a single card or blade rather than a system unit

  • Individual blades are inserted in a blade server chassis
213
Q

thin client

A

A small terminal-like computer that relies on a server for data storage and processing

214
Q

high-availability system

A

Continues running and performing tasks for at least 99 percent of the time

  • May include hot-swappable and redundant components
  • When a component fails, another component takes over and the system continues to function
215
Q

Uptime

A

Refers to working and available systems (vs. downtime)

Is a measurement in time or percentages of how long a system is working and available vs. how long it is down and unavailable.

216
Q

Scalability

A

A measure of how well an Information System, or computer hardware and software can grow to meet increasing performance demands or organization expansion requirements

217
Q

Interoperability

A

An Information System’s ability to share data and information with other Information Systems within an Enterprise

218
Q

Type of Backup: Full

A

Advantages:

  • Fastest recovery method.
  • All files are saved.

Disadvantages:

  • Longest backup time.
219
Q

Type of Backup: Differential

A

Advantages:

  • Fast backup method.
  • Requires minimal storage space to backup.

Disadvantages:

  • Recovery is time-consuming becaus the last full backup plus the differential backup are needed.
220
Q

Type of Backup: Incremental

A

Advantages:

  • Fastest backup method.
  • Requires minimal storage space to backup.
  • Only most recent changes saved.

Disadvantages:

  • Recovery is most time-consuming becaus the last full backup and all differential backup since the last full backup are needed.
221
Q

Type of Backup: Selective

A

Advantages:

  • Fast backup method.
  • Provides great flexibility

Disadvantages:

  • Difficult to manage individual file backups.
  • Least manageable of all the backup methods..
222
Q

Type of Backup: Continuous

A

Advantages:

  • The only real-time backup.
  • Very fast recovery of data.

Disadvantages:

  • Very expensive and requires a great amount of storage.
223
Q

Disaster Recovery Plan

A

Describes the steps a company would take to restore computer operations.

224
Q

Four major Disaster Recovery Plan components:

A
  1. Emergency plan
  2. Backup plan
  3. Recovery plan
  4. Test plan
225
Q

Job opportunities in the computer industry generally are available in one or more of these areas:

A
  • Business and Government IT
  • Hardware
  • Software
  • Service and repair
  • Sales
  • Education and training
  • IT Consulting
226
Q

Employees in IT:

A

(Information Technology):

  • Work as a team to meet information requirements of their organization.
  • Also keep computer operations and networks running
227
Q

Jobs in IT are usually in six main categories

A
  • Management
  • System development and programming
  • Technical services
  • Operations
  • Training
  • Security
228
Q

The hardware and equipment field

A

Consists of manufacturers and distributors of computers and technology-related hardware

  • Careers in this field are available with companies that design, manufacture, and produce computers and devices
229
Q

The computer software field

A

Consists of companies that develop, manufacture, and support software

Job titles include:

  • Project leader
  • Project manager
  • Desktop or mobile application programmer/developer
  • Technical lead
  • Software engineer
  • Computer scientist
230
Q

The service and repair field

A
  • Provides:
    • Preventive maintenance
    • Component installation
    • Repair services
  • Requires a knowledge of electronics
231
Q

Computer salespeople

A
  • Must possess a general understanding of computers and a specific knowledge of the products they are selling.
  • Some work for computer equipment and software manufacturers, while others work for retailers.
232
Q

Corporate trainers

A

Teach employees how to use software, design and develop systems, write programs, and perform other computer-related activities

233
Q

An IT consultant

A

Provides computer services to his or her clients

234
Q

Preparing for a Career in the Computer Industry -

Three broad disciplines produce the greatest number of entry-level employees

A
  • Computer Information Systems
  • Computer Science
  • Computer Engineering
235
Q

Computer information systems

A
  • Programming
  • Operating systems
  • Systems analysis and design
  • Databases
  • Networking
  • Web development
236
Q

Computer Science

A
  • Artificial intelligence
  • Data communications
  • Data and file structures
  • Operating systems
  • Application and systems programming
  • Systems analysis and design
237
Q

Computer Engineering

A
  • Application and systems programming
  • Data and file structures
  • Networks
  • Operating systems
238
Q

Tools for keeping up-to-date on industry trends and technologies and develop new skills

A
  • Professional organizations and personal networks
  • Professional growth and continuing education
  • Computer publications
  • Certification
239
Q

Professional Computer Organizations

A

Computer professionals with common interests and a desire to extend their proficiency form computer-related professional organizations

240
Q

user group

A

A collection of people with common interests in hardware or software

  • Groups can be an effective and rewarding way to learn about and continue career development
241
Q

Conferences, conventions, and trade shows

A

Are a great way to stay aware of new products and services. Example:

  • International Consumer Electronics Show (CES)
242
Q

Certification

A

Is the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area

243
Q

Computer certifications are available in these areas:

A
  • Application software
  • Operating systems
  • Programming
  • Hardware
  • Networking
  • Digital forensics
  • Security
  • The Internet
  • Database systems
244
Q

The World Wide Web has changed the way that people

A
  • Do business
  • Communicate
  • Share information
245
Q

The Web has evolved from:

A

A collection of Web sites to supporting Web applications

246
Q

Web 2.0 is characterized by

A

interactive applications

247
Q

Newer Web sites provide users with a rich browsing experience

A
  • Customizable layout
  • Bold graphics
  • Tabs
  • Additional services
248
Q

Web 2.0 is the result of several developments:

A
  • Connectivity almost everywhere
  • Mobile phones capable of accessing the Web
  • Web-based applications available for many devices
  • Web developers deploy new versions of software applications with no required user involvement
  • Society has embraced technological changes
249
Q

Online conversations

A
  • Blogs
  • Wikis
  • Sharing media
  • Collaboration
250
Q

Web 2.0 is often referred to as:

A

A read/write Web, or a Database-backed Web

  • Web applications read from or write to a database
251
Q

A Web server

A

Processes requests for Web pages sent over the Internet from a Web client

  • Known as Client-Server model
252
Q

Web 2.0 utilizes

A

Applications that connect people and technologies that link data

253
Q

The Internet makes it possible to:

A

Access information from any Internet-connected device

  • Web-based tools for collaboration
  • Web applications
  • Other technologies for sharing information
254
Q

Cloud computing

A

Describes how applications are stored and deployed on a network of Internet servers

  • Cloud requires the Internet
255
Q

Cloud computing service providers offer:

A

Server space and applications

  • Companies such as Google, Amazon, Microsoft, and Salesforce provide Cloud servers for individuals and businesses
256
Q

Cloud computing includes various Services – some examples are:

A
  • Infrastructure as a Service (IaaS)
    • Internet delivery of a networked computing structure
  • Platform as a Service (PaaS)
    • Delivery of a computing platform over the Internet
  • Software as a Service (SaaS)
    • Delivery of software applications over the Internet
257
Q

Infrastructure as a Service (IaaS)

A

Internet delivery of a networked computing structure

258
Q

Platform as a Service (PaaS)

A

Delivery of a computing platform over the Internet

259
Q

Software as a Service (SaaS)

A

Delivery of software applications over the Internet

260
Q

Cloud Categories

A
  1. Public Cloud
  2. Hybrid Cloud
  3. Private Cloud
  • Many Cloud storage providers offer limited storage for free, and charge an additional fee for more storage
261
Q

Using virtualization, one host machine can:

A

Operate as if it were several smaller servers

262
Q

Mashups

A
  • Are Web applications that combine content or data from multiple online sources
    • Content is continuously updated
    • Content is sourced from RSS Feeds and Web services
263
Q

Web 3.0

A
  • Is the term that describes emerging trends that link information in new way
    • Agents can make decisions and take actions based on a user preferences
  • Many describe Web 3.0 as the rise of the “Semantic Web”
    • Intelligent software tools can read Web pages and discern useful information from them
    • A Web of data
264
Q

Reverse?

A process in which two or more computers or devices transfer data, instructions, and information.

  • Sending device → Communications channel → Receiving device
A

Computer communications

265
Q

Reverse?

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A

computer security risk

266
Q

Reverse?

A Network or Internet-based illegal act

A

cybercrime

267
Q

Reverse?

  • Internet and network attacks
  • unauthorized access and use
  • hardware theft (stealing a thumb drive or hard drive)
  • system failure (lightning strike)
  • infromation theft (stollen identity)
  • software theft (illegal copy)
A

Computer Security Risks

268
Q

Reverse?

Has a higher degree of security risk than data kept on an organization’s premises

A

Data transmitted over networks

269
Q

Reverse?

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

A

online security service

270
Q

Reverse?

Affects a computer negatively by altering the way the computer works <!--EndFragment-->

A

Virus

271
Q

Reverse?

Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->

A

Worm

272
Q

Reverse?

A malicious program that hides within or looks like a legitimate program <!--EndFragment-->

A

Trojan Horse

273
Q

Reverse?

Program that hides, creating a “back door” for a remote location to take full control of the computer.

A

Rootkit

274
Q

Reverse?

  • Runs much slower than usual
  • Available memory is less than expected
  • Files become corrupted
  • Screen displays unusual message or image
  • Music or unusual sounds play randomly
  • Existing programs and files disappear
  • Programs or files do not work properly
  • Unknown programs or files mysteriously appear
  • System properties change
  • Operating system does not boot (start up)
  • Operating system shuts down unexpectedly
A

Symptoms of an infected computer include:

275
Q

Reverse?

  1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
  2. Never open an email attachment unless you are expecting it and it is from a trusted source.
  3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
  4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
  5. Scan all downloaded programs for viruses and other maleware.
  6. If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
  7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
  8. Install a personal firewall program.
  9. Stay informed about new virus alerts and virus hoaxes.
A

Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:

276
Q

Reverse?

A group of compromised computers connected to a network

A compromised computer is known as a zombie

A

botnet

277
Q

Reverse?

A denial of service attack: disrupts computer access to Internet services

Distributed DoS (DDoS)

A

DoS attack

278
Q

Reverse?

A program or set of instructions in a program that allows remote attackers to bypass security controls

A

back door

279
Q

Reverse?

A technique intruders use to make their network or Internet transmission appear legitimate.

A

Spoofing

280
Q

Reverse?

Hardware and/or software that protects computers and networks from intrusion

A

firewall

281
Q

Reverse?

  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior patterns or system breaches
A

Intrusion detection software

282
Q

Reverse?

Vulnerable computer that is set up to entice an intruder to break into it

A

Honeypot

283
Q

Reverse?

The use of a computer or network without permission <!--EndFragment-->

A

Unauthorized access

284
Q

Reverse?

The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->

A

Unauthorized use

285
Q

Reverse?

  • Acceptable use policy
  • Disable file and printer sharing
  • Firewalls
  • Intrusion detection software
A

The measures organizations take to help prevent unauthorized access and use:

286
Q

Define who can access a computer, when they can access it, and what actions they can take:

  • Two-phase processes called identification and authentication
  • User name
  • Password
  • Passphrase
  • CAPTCHA
A

Access controls

287
Q

Reverse?

  • Any item that you must carry to gain access to a computer or computer facility.
  • Often are used in combination with a personal identification number (PIN)
A

possessed object

288
Q

Reverse?

Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

A

biometric device

289
Q

Reverse?

The discovery, collection, and analysis of evidence found on computers and networks

A

Digital forensics

290
Q

Reverse?

  • Law enforcement
  • Criminal prosecutors
  • Civil lawsuits, discovery
  • Military intelligence
  • Insurance agencies
  • Information security departments
A

Areas that use digital forensics

291
Q

Reverse?

The act of stealing computer equipment <!--EndFragment-->

A

Hardware theft

292
Q

Reverse?

The <!--StartFragment--> act of defacing or destroying computer equipment <!--EndFragment-->

A

Hardware vandalism

293
Q

Reverse?

  • Steals software media
  • Intentionally erases programs
  • Illegally copies a program
  • Illegally registers and/or activates a program
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
A

Software theft occurs when someone:

294
Q

Reverse?

An End User License Agreement typically contains the following conditions:

  • Permitted to…
    • Install the software on a certain number of computers (usually one)
    • Make one copy of the software
    • Remove the software from your computer before giving it away or selling it
  • Not permitted to…
    • Install the software on a network
    • Give copies to friends or colleagues while continuing to use the software
    • Export the software
    • Rent or lease the software
A

EULA

295
Q

Reverse?

Occurs when someone steals personal or confidential information

A

Information theft

296
Q

Reverse?

A process of converting readable data into unreadable characters to prevent unauthorized access

  • Transposition
  • Substitution
  • Expansion
  • Compaction
A

Encryption

297
Q

Reverse?

Switch the order of characters

A

Transposition

298
Q

Reverse?

Replace characters with other character

A

Substitution

299
Q

Reverse?

Insert characters between existing characters

A

Expansion

300
Q

Reverse?

Remove characters and store elsewhere

A

Compaction

301
Q

Reverse?

  1. The sender creates a document to be email to the receiver.
  2. The sender uses the receiver’s public key to encrypt the message.
  3. The receiver uses his or her private key to decrypt the message.
  4. The receiver can read or print the message.
A

Public Key Encryption

302
Q

Reverse?

An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

Often used to ensure that an impostor is not participating in an Internet transaction

A

digital signature

303
Q

Reverse?

encryption

A

Web browsers and Web sites use ________ techniques

304
Q

Reverse?

  • Digital Certificates
  • Transport Layer Security (TLS)
  • Secure HTTP
  • VPN (Virtual Private Network)
A

Popular security techniques include:

305
Q

Reverse?

The prolonged malfunction of a computer

A

system failure

306
Q

Reverse?

  • Aging hardware
  • Natural disasters
  • Electrical power problems
  • Noise, undervoltages, and overvoltages
  • Errors in computer programs
A

A variety of factors can lead to system failure, including:

307
Q

Reverse?

  • surge protectors
  • uninterruptable power supplies (UPS)
A

Two ways to protect from system failures caused by electrical power variations include ___________ and ____________.

308
Q

Reverse?

Is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

To back up a file means to make a copy of it

A

backup

309
Q

Reverse?

Backups are stored in a location separate from the computer site

  • Cloud Storage
A

Offsite backups

310
Q

Reverse?

Grandparent → Parent → Child

A

Three-generation backup policy

311
Q

Reverse?

  • Full backup
  • Selective backup
    • Differential
    • Incremental
A

Two backup categories:

312
Q

Reverse?

Wireless access poses additional security risks

About 80 percent of wireless networks have no security protection (“unsecured wireless network”)

“War driving” allows individuals to detect wireless networks while driving through an area

A

Wireless Security

313
Q

Reverse?

  • Change the default SSID (Service Set Identifier)
  • A wireless access point should not broadcast an SSID
  • Configure WAP so only certain devices can access (e.g., MAC address configuration)
  • Use WPA or WPA2 security standards •(do not use WEP)
A

In additional to using firewalls, some safeguards improve security of wireless networks

314
Q

Reverse?

The widespread use of computers has led to health concerns

  • Repetitive strain injury (RSI)
    • Tendonitis
    • Carpal tunnel syndrome (CTS)
  • Computer vision syndrome (CVS)
A

Health Concerns of Computer Use

315
Q

Reverse?

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

A

Ergonomics

316
Q

Reverse?

Occurs when the computer consumes someone’s social life. Symptoms include:

  • Craves computer time
  • Overjoyed when at the computer
  • Unable to stop computer activity
  • Irritable when not at the computer
  • Neglects family and friends
  • Problems at work or school
A

Computer addiction

317
Q

Reverse?

Are moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Not all information on the Web is correct!

A

Computer ethics

318
Q

Reverse?

Are the rights to which creators are entitled for their work <!--EndFragment-->

A copyright protects any tangible form of expression

A

Intellectual property rights

319
Q

Reverse?

Is written guidelines that help determine whether a specific computer action is ethical or unethical <!--EndFragment-->

A

IT code of conduct

320
Q

Reverse?

  1. Computers may not be used to harm other people.
  2. Employees may not interfere with others’ computer work.
  3. Employees may not meddle in others’ computer files.
  4. Computers may not be used to steal.
  5. Computers may not be used to bear false witness.
  6. Employees may not copy or use software illegally.
  7. Employees may not use others’ computer resources without authorization.
  8. Employees may not use others’ intellectual property as their own.
  9. Employees shall consider the social impact of programs and systems they design.
  10. Employees always should use coputers in a way that demonstrates consideration and respect for fellow humans.
A

IT Code of Conduct

321
Q

Reverse?

Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

  • Huge databases store data online
  • It is important to safeguard your information
A

Information privacy

322
Q

Reverse?

A small text file that a Web server stores on your computer

A

cookie

323
Q

Reverse?

  • Personalization of the experience
  • Store passwords
  • Assist with online shopping
  • Track site visits
  • Target advertisements
A

Web sites use cookies for many reasons, including:

324
Q

Reverse?

An unsolicited e-mail message or newsgroup posting

A

Spam

325
Q

Reverse?

Blocks e-mail messages from designated sources

A

E-mail filtering

326
Q

Reverse?

Attempt to remove spam before it reaches your inbox

A

Anti-spam programs

327
Q

Reverse?

A scam that sends an official-looking e-mail that attempts to obtain your personal and financial information

A

Phishing

328
Q

Reverse?

A scam that attempts to obtain your personal and financial information via spoofing

A

Pharming

329
Q

Reverse?

Limits the right to view a credit report to those with legitimate business needs

A

The 1970 Fair Credit Reporting Act

330
Q

Reverse?

Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naiveté <!--EndFragment-->

A

Social engineering

331
Q

Reverse?

Uses computers to observe, record, and review employees’ computer use during work on on breaks (if using an employer’s computer) <!--EndFragment-->

A

Employee monitoring

332
Q

Reverse?

The process of restricting access to certain material on the Web

Many businesses use content filtering

Internet Content Rating Association (ICRA)

A

Content filtering

333
Q

Reverse?

Restricts access to specified Web sites

A

Web filtering software

334
Q

Reverse?

The discovery, collection, analysis, and reporting of evidence found on computers and digital devices

  • Focuses on computers, digital devices, and networks
  • Digital evidence exists on a variety of computers
  • The forensic analysis of computers and digital devices specifically involves the examination of media, programs, and data and log files
  • Fastest growing discipline in the forensics field
  • Also referred to as computer forensics, network forensics, or cyberforensics
A

Digital forensics

335
Q

Reverse?

  • Knowledge of the law
  • Technical experience with many types of hardware and software products
  • Superior communication skills
  • Familiarity with corporate structures and policies
  • A willingness to learn and update skills
  • A knack for problem solving
A

Digital forensics examiners must have:

336
Q

Reverse?

  • Law enforcement
  • Homeland security
  • Businesses and other private sector organizations
A

Digital forensics covers several overlapping areas:

337
Q

Reverse?

  1. Step 1: Gather materials to analyze
    • Computer media
    • Computers and peripherals
    • GPS receivers
    • Network hardware
    • Computer software
  2. Step 2: Transport the materials
  3. Step 3: Preserve the media
  4. Step 4: Extract evidence
  5. Step 5: Analyze evidence
    • ​Analyze mobile devices
    • Analyze chat room logs
    • Analyze browser history logs
  6. ​Step 6: Document results
A

Digital Forensics in Action: Identity Theft

Steps

338
Q

Reverse?

A digital forensics examiner might use the following techniques to locate the attacker and/or the computer network facilitating the attacks:

  1. Analyze network traffic
  2. Track packet routes
  3. Analyze Internet access provider logs
  4. Analyze a packet trace
A

Digital Forensics in Action: Spam Attacks

339
Q

Reverse?

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A

computer security risk

340
Q

Reverse?

Network or Internet-based illegal act.

A

cybercrime

341
Q

Reverse?

  • Hackers
  • Crackers
  • Script Kiddies
  • Corporate Spies
  • Unethical Employees
  • Cyberextortionists
  • Cyberterrorists
A

Names for Different Types of Cyber-Criminals

342
Q

Reverse?

A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities

A

online security service

343
Q

Reverse?

They allow people to connect wirelessly to the Internet from home, work, school, and in many public locations

A

Wireless Internet access points

344
Q

Reverse?

Global Positioning System: is a navigation system comprising one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the GPS receiver’s geographic location

GPS receivers are:

  • Built into many mobile devices (like your phone so the police can find you when you call 911 for help)
  • Available as a handheld device
  • Available with motor vehicles
A

GPS

345
Q

Reverse?

Many programs provide a means to ___________, or work together online, with others connected to a server

A

collaborate

346
Q

Reverse?

… enable users to share documents via online meetings and communicate with other connected users. Examples:

  • Online meetings
  • Web conferences
  • Document management systems
A

Collaboration software includes tools that:

347
Q

Reverse?

… create applications that communicate with other remote computers over the Internet or on an internal business network

A

Web services enable programmers to:

348
Q

Reverse?

A Web application that combines services from two or more sources

A

mashup

349
Q

Reverse?

A collection of computers and devices connected via communication devices and transmission media

A

network

350
Q

Reverse?

  • Facilitate communications
  • Share hardware
  • Share data
  • Share software
  • Transfer funds
A

Network Advantages:

351
Q

Reverse?

A Local Area Network: connects computers and devices in a limited geographical area

A

LAN

352
Q

Reverse?

A Wireless LAN: is a LAN that uses no physical connections

A

WLAN

353
Q

Reverse?

A Metropolitan Area Network: connects LANs in a metropolitan area

A

MAN

354
Q

Reverse?

A Wide Area Network: covers a large geographical area

A

WAN

355
Q

Reverse?

The design of computers, devices, and media on a network

A

network architecture

356
Q

Reverse?

An Internet network on which users access each other’s hard disks and exchange files

A

P2P

357
Q

Reverse?

Refers to the layout of the computers and devices in a network:

  • Star Network
  • Bus Network
A

Network Topology

358
Q

Reverse?

An internal network that uses Internet technologies <!--EndFragment-->

A

Intranet

359
Q

Reverse?

Allows customers or suppliers to access part of its Intranet

A

Extranet

360
Q

Reverse?

  • Ethernet
  • TCP/IP
  • Wi-Fi
  • Bluetooth
A

Network Communications Standards

361
Q

Reverse?

A network standard that specifies no computer controls when data can be transmitted <!--EndFragment-->

A

Ethernet

362
Q

Reverse?

A network standard that defines how messages are routed within a network <!--EndFragment-->

A

TCP/IP

363
Q

Reverse?

Identifies any network based on the 802.11 standard that facilitates wireless communication.

  • Newest is 802.11ac (1 Gbps and higher)
  • Sometimes referred to as Wireless Ethernet
A

Wi-Fi

364
Q

Reverse?

Defines how two Bluetooth devices use short-range radio waves to transmit data.

A

Bluetooth

365
Q

Reverse?

Uses radio signals to communicate with a tag placed in or attached to an object, animal, or person

A

RFID

366
Q

Reverse?

  • Helps users establish a connection to another computer or network
  • Manages the transmission of data, instructions, and information
  • Provides an interface for users to communicate with one another
A

Communications software:

367
Q

Reverse?

Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device

A

communications device

368
Q

Reverse?

Sends and receives data and information to and from a digital line. Examples:

  • DSL modem
  • Cable modem
A

digital modem

369
Q

Reverse?

A Network Interface Card enables a computer or device to access a network.

  • Available in a variety of form factors
  • Wireless network cards often have an antenna
A

NIC

370
Q

Reverse?

A Wireless Access Point is a central communications device that allows computers and devices to transfer data wirelessly or to a wired network

A

WAP

371
Q

Reverse?

Connects multiple computers or other routers and transmits data to its correct destination

  • Many routers are protected by a hardware firewall
A

router

372
Q

Reverse?

connects several devices

A

hub or switch

373
Q

Reverse?

  • •\Connecting to the Internet at the same time
  • Sharing a single high-speed Internet connection
  • Accessing files and programs on other computers
  • Sharing peripherals
  • Playing multiplayer games
  • Connecting game consoles to the Internet
  • Using VoIP
A

Capabilities of home networks include:

374
Q

Reverse?

  • Ethernet
  • Powerline cable
  • Phoneline
A

Types of wired home networks:

375
Q

Reverse?

The amount of data that can travel over a communications channel

A

Bandwidth

376
Q

Reverse?

The time it takes a signal to travel from one location to another

A

Latency

377
Q

Reverse?

Carry one or more signals

A

Transmission media

378
Q

Reverse?

Transmit multiple signals simultaneously

A

Broadband media

379
Q

Reverse?

  • Twisted-pair cable
  • Coaxial cable
  • Fiber-optic cable
A

Physical Transmission Media

380
Q

Reverse?

A form of broadcast radio that is used widely for mobile communications

A

Cellular radio

381
Q

Reverse?

Receives microwave signals from earth, amplifies them, and broadcasts the signals over a wide area

A

communications satellite

382
Q

Reverse?

Collection of data organized in a manner that allows access, retrieval, and use of that data <!--EndFragment-->

A

Database

383
Q

Reverse?

Collection of unprocessed items:

  • Text
  • Numbers
  • Images
  • Audio
  • Video <!--EndFragment-->
A

Data

384
Q

Reverse?

Processed data:

  • Documents
  • Reports
  • Audio
  • Images
  • Video <!--EndFragment-->
A

Information

385
Q

Reverse?

Often called a database management system (DBMS), allows users to:

  • Create a database
  • Input, modify, and delete data
  • Sort and retrieve (extract) data
  • Create forms and reports
A

Database software

386
Q

Reverse?

Refers to the quality of the data

A

Data integrity

387
Q

Reverse?

Garbage in, garbage out points out that the accuracy of a computer’s output depends on the accuracy of the input

A

GIGO

388
Q

Reverse?

  • Accurate
  • Verifiable
  • Timely
  • Organized
  • Accessible
  • Useful
  • Cost-effective
A

Useful data and information should have the following characteristics:

389
Q

Reverse?

Data is organized in layers:

  • File
  • Tables/queries/reports
  • records
  • fields
  • characters
A

The Hierarchy of Data

390
Q

Reverse?

one byte:

  • Number
  • letter
  • space
  • punctuation mark
  • symbol
A

character

391
Q

Reverse?

A combination of one or more related characters:

  • Field name
  • Field size
  • Data type
A

field

392
Q

Reverse?

  • Text (2013: Short Text)
  • Numeric
  • AutoNumber
  • Currency
  • Date
  • Memo (2013: Long Text)
  • Yes/No
  • Hyperlink
  • Object
  • Attachment
A

Common data types

393
Q

Reverse?

A group of related fields

A

record

394
Q

Reverse?

Uniquely identifies each record

A

primary key

395
Q

Reverse?

A collection of related records

A

table (data file)

396
Q

Reverse?

Refers to the procedures that keep data current:

  • Adding records
  • Modifying records
  • Deleting records
A

Table maintenance

397
Q

Reverse?

  • Users add new records to tables when they obtain new data
  • Users modify records to correct inaccurate data or update old date
  • When a record no longer is needed, a user deletes it from a table
A

Maintaining Data

398
Q

Reverse?

Compares data with a set of rules or values to verify accuracy:

  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
  • Other checks
A

Data Validation

399
Q

Reverse?

  • Each department has its own set of files
  • Used for many years
  • Have data redundancy
  • Isolate data
  • Some use Excel for complex lists (not a “database”) <!--EndFragment-->
A

File processing approach

400
Q

Reverse?

  • Programs and users share data
  • Reduce data redundancy
  • Improve data integrity
  • Easier access
  • Reduced development time
  • Can be more vulnerable <!--EndFragment-->
A

Database approach

401
Q

Reverse?

Contains data about each file in the database and each field in those files

A

data dictionary

402
Q

Reverse?

Database Management System: provides several tools that allow data retrieval and maintenance

  • Query language
  • Query by example
  • Form
  • Report generator​
A

DBMS

403
Q

Reverse?

Consists of simple, English-like statements that allow users to specify the data to display, print or store

A

query language

404
Q

Reverse?

Query by example: provides a GUI (Graphical User Interface) to assist users with data retrieval

A

QBE

405
Q

Reverse?

A window on the screen that provides areas for entering or modifying data

A

form

406
Q

Reverse?

Allows users to design a report, retrieve data into the report, and display or print the report

A

report generator

407
Q

Reverse?

  • Access privileges
  • Principle of “least privilege”
A

Provides the means to ensure that only authorized users access data at permitted times by:

408
Q

Reverse?

  • Backup
  • Log
  • Recovery utility
  • Continuous backup <!--EndFragment-->
A

A DMBS provides techniques to restore the database in case it is damaged or destroyed:

409
Q

Reverse?

Consists of rules and standards that define how the database organizes data

A

data model

410
Q

Reverse?

Stores data in tables comprising fields and records:

  • Each record (row) has a primary key
  • Each field (column) has a unique name
A

relational database

411
Q

Reverse?

A link between tables

A

relationship

412
Q

Reverse?

Structured Query Language: is a query language that allows users to manage, update, and retrieve data

A

SQL

413
Q

Reverse?

An object-oriented database: stores data in objects

Examples of applications appropriate for an object-oriented database include:

  • Multimedia database
  • Groupware database
  • Computer-aided design database
  • Hypertext database
A

OODB

414
Q

Reverse?

Can store data in more than two dimensions of data

  • Sometimes known as a hypercube
  • Can consolidate data much faster than a relational database
A

multidimensional database

415
Q

Reverse?

A huge database that stores and manages the data required to analyze historical and current transactions

A

data warehouse

416
Q

Reverse?

  • Shop for products or services
  • Buy or sell stocks
  • Search for a job
  • Make airline reservations
  • Register for college classes
  • Check semester grades
A

Databases on the Web allow you to:

417
Q

Reverse?

  • Determine the purpose of the database
  • Design the tables or files:
    • Design tables or files
    • Each table or file should contain data about one subject. The student table, for example, contains data about students.
  • Design the records and fields for each table or file.
    • Be sure every record has a unique primary key
    • Use separate fields for logically distinct items.
    • Do not create fields for information that can be derived from entries in other fields.
    • Allow enough space for each field.
    • Set default values for frequently entered data.
  • Determine the relationships amoung the tables or files.
A

Database Design Guidlines

418
Q

Reverse?

Database Analyst: Decides on proper field placement, defines data relationships, and identifies user access privileges

A

DA

419
Q

Reverse?

Database Administrator: Creates and maintains data dictionaries, manages security, monitors performance, and maintains backup and recovery procedures

A

DBA

420
Q

Reverse?

to effectively use a database:

  • Use database tools
  • Identify new data for the database
  • Maintain the database
A

Employees should learn how …

421
Q

Reverse?

A set of activities used to build an information system.<!--EndFragment-->

A

System development

422
Q

Reverse?

A set of components that interact to achieve a common goal <!--EndFragment-->

A

system

423
Q

Reverse?

Information System: A collection of hardware, software, data, people, and procedures that work together to produce quality information

A

IS

424
Q

Reverse?

the system development life cycle (SDLC)

A

System development activities are grouped into phases, collectively called:

425
Q

Reverse?

system development life cycle

A

SDLC

426
Q

Reverse?

  1. Group activities or tasks into phases
  2. Involve users
  3. Define standards
A

Three general system development guidelines:

427
Q

Reverse?

  1. Planning
  2. Analysis
  3. Design
  4. Implementation
  5. Operation, Support, and Security
  6. Repeat
A

Phases of System Development

428
Q

Reverse?

  1. Review and approve project requests
  2. Prioritize project requests
  3. Allocate resources
  4. Form a project development team
A

The planning phase – four major activities:

429
Q

Reverse?

The process of planning, scheduling, and controlling system development activities

A

Project management

430
Q

Reverse?

  1. Project scope
  2. Required activities
  3. Activity time estimates
  4. Activity cost estimates
  5. Order of activities
  6. Concurrent Activities
A

Aspects of project management:

431
Q

Reverse?

A popular tool used to plan schedule relationships among project activities

A

Gantt chart

432
Q

Reverse?

A measure of how suitable the development of a system will be to the organization

  • Operational feasibility
  • Schedule feasibility
  • Technical feasibility
  • Economic feasibility
A

Feasibility

433
Q

Reverse?

  1. Preliminary investigation
    • Determine and define precise nature of the problem/improvement
    • Interview the user who submitted the request
  2. Detailed analysis
    • Study current system
    • Determine user requirements (wants and needs)
    • Recommend solution
A

analysis phase – two major activities:

434
Q

Reverse?

  • Review documentation
  • Observe
  • Survey
  • Interview
  • Joint Application Development
  • Research
A

During system development, members of the project team gather data and information using several techniques

435
Q

Reverse?

  • Acquire hardware and software to meet requirements
  • Develop the details of the new or modified information system
A

The design phase – two major activities:

436
Q

Reverse?

A (proof of concept) – a limited, working model of the proposed system

  • Prototypes have inadequate or missing documentation
  • Users tend to embrace the prototype as a final system
  • Prototypes should not eliminate or replace current system activities
A

prototype

437
Q

Reverse?

Construct the new or modified system and deliver it. Common steps:

  • Develop programs
  • Install and test the new system
  • Train users
  • Convert to the new system
A

Implementation phase

438
Q

Reverse?

Provide ongoing assistance for an Information System and its users after implementation. Common activities:

  • Perform maintenance activities
  • Monitor system performance
  • Assess system security
A

Operation, support, and security phase

439
Q

Reverse?

  • Comprehensive use of computers in networks (e.g., LANs and WANs)
  • Can include a series of interconnected networks
  • Involves a variety of operating systems, protocols, and network architectures
A

Enterprise computing

440
Q

Reverse?

  • Retail
  • Manufacturing
  • Service
  • Wholesale
  • Government
  • Educational
  • Transportation
A

Types of enterprises include:

441
Q

Reverse?

hierarchical

A

Most Enterprises are ____________ organizations

442
Q

Reverse?

  1. Executive Management
  2. Middle Management
  3. Operational Management
  4. Non-management Employees
A

In an Enterprise, personnel typically fall into one of four categories:

443
Q

Reverse?

Information gathered in ongoing operations of an

  • Enterprise-sized organization
  • Business intelligence
  • Business process management
  • Business process automation
A

Enterprise information

444
Q

Reverse?

Coordinate resources by carrying out four activities:

  1. Planning
  2. Organizing
  3. Leading
  4. Controlling
A

Managers

445
Q

Reverse?

A set of hardware, software, data, people, and procedures that work together to provide information

A

Information System

446
Q

Reverse?

  • Accounting and Finance
  • Human Resources
  • Engineering or Product
  • Manufacturing
  • Marketing
  • Sales
  • Distribution
  • Customer Service
  • Information Technology
A

Enterprise functional units might include:

447
Q

Reverse?

Manages everyday transactions

A

Accounting software

448
Q

Reverse?

Helps the company reconcile purchases with customer payments

A

Billing software

449
Q

Reverse?

Helps managers budget, forecast, and analyze

A

Financial software

450
Q

Reverse?

Manages one or more human resources functions

A

Human Resources Information System

451
Q

Reverse?

Manages communication between employees and the business

A

Employee Relationship Management System

452
Q

Reverse?

Material Requirements Planning - Uses software to help monitor and control processes related to production

A

MRP

453
Q

Reverse?

Manufacturing Resource Planning II - is an extension of MRP that includes software to help with scheduling

A

MRP II

454
Q

Reverse?

  • Provide forecasting for inventory control
  • Manage and track shipping
  • Provide analysis and information on warehouse inventory
A

Distribution Systems

455
Q

Reverse?

Customer Interaction Management - software manages day-to-day customer interactions

A

CIM

456
Q

Reverse?

Information Technology department - makes technology decisions for the enterprise:

  • Build or buy new Information Systems?
  • Has an Information System and its technology outlived useful life?
A

IT Department

457
Q

Reverse?

Collect data designed to help organizations make informed decisions regarding Web presence

A

Web site management programs

458
Q

Reverse?

  • Office Information System
  • Transaction Processing System
  • Management Information System
  • Decision Support System
  • Expert System
A

General purpose Information Systems categories:

459
Q

Reverse?

Batch processing can much longer to complete. The process for each is as follows:

  1. Batch processing
    1. Reservation requested
    2. Batch of reservations
    3. Process complete
  2. Real-time Online processing
    1. Reservation requested
    2. Process complete
A

Batch processing vs. real-time online transaction processing

460
Q

Reverse?

  • Customer Relationship Management
  • Enterprise Resource Planning
  • Content Management Systems
A

Integrated Information Systems

461
Q

Reverse?

Manages information about customer interactions, purchases, and interests

A

Customer Relationship Management

462
Q

Reverse?

Provides centralized, integrated software to help manage and coordinate ongoing activities

A

Enterprise Resource Planning

463
Q

Reverse?

Combine databases, software, and procedures

A

Content Management Systems

464
Q

Reverse?

A collection of links, content, and services presented on a Web page related to a job

A

portal

465
Q

Reverse?

A huge database that stores and manages data required to analyze transactions

A

data warehouse

466
Q

Reverse?

Identifies related steps involved in completing a project or business process

A

Workflow (or Flow Chart)

467
Q

Reverse?

A Virtual Private Network - provides a secure connection to a network server

A

VPN

468
Q

Reverse?

Supports sharing or pooling computing resources:

  • Server virtualization
  • Storage virtualization
A

Virtualization

469
Q

Reverse?

Provides capability to create one logical storage device from many physical storage devices

A

Storage virtualization

470
Q

Reverse?

Provides capability to partition a physical server logically into many virtual servers

A

Server virtualization

471
Q

Reverse?

Is an Internet-based service that provides computing services

A

Cloud computing

472
Q

Reverse?

Combines many networked servers and/or personal computers to act as one computer

A

Grid computing

473
Q

Reverse?

A Storage Area Network - is a high-speed network that provides storage to other servers

A

SAN

474
Q

Reverse?

  • storage availability
  • protection
  • organization
  • backup

Strategy = consolidate storage

A

An Enterprise Storage System focuses on:

475
Q

Reverse?

Packs a complete computer server on a single card or blade rather than a system unit

  • Individual blades are inserted in a blade server chassis
A

blade server

476
Q

Reverse?

A small terminal-like computer that relies on a server for data storage and processing

A

thin client

477
Q

Reverse?

Continues running and performing tasks for at least 99 percent of the time

  • May include hot-swappable and redundant components
  • When a component fails, another component takes over and the system continues to function
A

high-availability system

478
Q

Reverse?

Refers to working and available systems (vs. downtime)

Is a measurement in time or percentages of how long a system is working and available vs. how long it is down and unavailable.

A

Uptime

479
Q

Reverse?

A measure of how well an Information System, or computer hardware and software can grow to meet increasing performance demands or organization expansion requirements

A

Scalability

480
Q

Reverse?

An Information System’s ability to share data and information with other Information Systems within an Enterprise

A

Interoperability

481
Q

Reverse?

Advantages:

  • Fastest recovery method.
  • All files are saved.

Disadvantages:

  • Longest backup time.
A

Type of Backup: Full

482
Q

Reverse?

Advantages:

  • Fast backup method.
  • Requires minimal storage space to backup.

Disadvantages:

  • Recovery is time-consuming becaus the last full backup plus the differential backup are needed.
A

Type of Backup: Differential

483
Q

Reverse?

Advantages:

  • Fastest backup method.
  • Requires minimal storage space to backup.
  • Only most recent changes saved.

Disadvantages:

  • Recovery is most time-consuming becaus the last full backup and all differential backup since the last full backup are needed.
A

Type of Backup: Incremental

484
Q

Reverse?

Advantages:

  • Fast backup method.
  • Provides great flexibility

Disadvantages:

  • Difficult to manage individual file backups.
  • Least manageable of all the backup methods..
A

Type of Backup: Selective

485
Q

Reverse?

Advantages:

  • The only real-time backup.
  • Very fast recovery of data.

Disadvantages:

  • Very expensive and requires a great amount of storage.
A

Type of Backup: Continuous

486
Q

Reverse?

Describes the steps a company would take to restore computer operations.

A

Disaster Recovery Plan

487
Q

Reverse?

  1. Emergency plan
  2. Backup plan
  3. Recovery plan
  4. Test plan
A

Four major Disaster Recovery Plan components:

488
Q

Reverse?

  • Business and Government IT
  • Hardware
  • Software
  • Service and repair
  • Sales
  • Education and training
  • IT Consulting
A

Job opportunities in the computer industry generally are available in one or more of these areas:

489
Q

Reverse?

(Information Technology):

  • Work as a team to meet information requirements of their organization.
  • Also keep computer operations and networks running
A

Employees in IT:

490
Q

Reverse?

  • Management
  • System development and programming
  • Technical services
  • Operations
  • Training
  • Security
A

Jobs in IT are usually in six main categories

491
Q

Reverse?

Consists of manufacturers and distributors of computers and technology-related hardware

  • Careers in this field are available with companies that design, manufacture, and produce computers and devices
A

The hardware and equipment field

492
Q

Reverse?

Consists of companies that develop, manufacture, and support software

Job titles include:

  • Project leader
  • Project manager
  • Desktop or mobile application programmer/developer
  • Technical lead
  • Software engineer
  • Computer scientist
A

The computer software field

493
Q

Reverse?

  • Provides:
    • Preventive maintenance
    • Component installation
    • Repair services
  • Requires a knowledge of electronics
A

The service and repair field

494
Q

Reverse?

  • Must possess a general understanding of computers and a specific knowledge of the products they are selling.
  • Some work for computer equipment and software manufacturers, while others work for retailers.
A

Computer salespeople

495
Q

Reverse?

Teach employees how to use software, design and develop systems, write programs, and perform other computer-related activities

A

Corporate trainers

496
Q

Reverse?

Provides computer services to his or her clients

A

An IT consultant

497
Q

Reverse?

  • Computer Information Systems
  • Computer Science
  • Computer Engineering
A

Preparing for a Career in the Computer Industry -

Three broad disciplines produce the greatest number of entry-level employees

498
Q

Reverse?

  • Programming
  • Operating systems
  • Systems analysis and design
  • Databases
  • Networking
  • Web development
A

Computer information systems

499
Q

Reverse?

  • Artificial intelligence
  • Data communications
  • Data and file structures
  • Operating systems
  • Application and systems programming
  • Systems analysis and design
A

Computer Science

500
Q

Reverse?

  • Application and systems programming
  • Data and file structures
  • Networks
  • Operating systems
A

Computer Engineering

501
Q

Reverse?

  • Professional organizations and personal networks
  • Professional growth and continuing education
  • Computer publications
  • Certification
A

Tools for keeping up-to-date on industry trends and technologies and develop new skills

502
Q

Reverse?

Computer professionals with common interests and a desire to extend their proficiency form computer-related professional organizations

A

Professional Computer Organizations

503
Q

Reverse?

A collection of people with common interests in hardware or software

  • Groups can be an effective and rewarding way to learn about and continue career development
A

user group

504
Q

Reverse?

Are a great way to stay aware of new products and services. Example:

  • International Consumer Electronics Show (CES)
A

Conferences, conventions, and trade shows

505
Q

Reverse?

Is the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area

A

Certification

506
Q

Reverse?

  • Application software
  • Operating systems
  • Programming
  • Hardware
  • Networking
  • Digital forensics
  • Security
  • The Internet
  • Database systems
A

Computer certifications are available in these areas:

507
Q

Reverse?

  • Do business
  • Communicate
  • Share information
A

The World Wide Web has changed the way that people

508
Q

Reverse?

A collection of Web sites to supporting Web applications

A

The Web has evolved from:

509
Q

Reverse?

interactive applications

A

Web 2.0 is characterized by

510
Q

Reverse?

  • Customizable layout
  • Bold graphics
  • Tabs
  • Additional services
A

Newer Web sites provide users with a rich browsing experience

511
Q

Reverse?

  • Connectivity almost everywhere
  • Mobile phones capable of accessing the Web
  • Web-based applications available for many devices
  • Web developers deploy new versions of software applications with no required user involvement
  • Society has embraced technological changes
A

Web 2.0 is the result of several developments:

512
Q

Reverse?

  • Blogs
  • Wikis
  • Sharing media
  • Collaboration
A

Online conversations

513
Q

Reverse?

A read/write Web, or a Database-backed Web

  • Web applications read from or write to a database
A

Web 2.0 is often referred to as:

514
Q

Reverse?

Processes requests for Web pages sent over the Internet from a Web client

  • Known as Client-Server model
A

A Web server

515
Q

Reverse?

Applications that connect people and technologies that link data

A

Web 2.0 utilizes

516
Q

Reverse?

Access information from any Internet-connected device

  • Web-based tools for collaboration
  • Web applications
  • Other technologies for sharing information
A

The Internet makes it possible to:

517
Q

Reverse?

Describes how applications are stored and deployed on a network of Internet servers

  • Cloud requires the Internet
A

Cloud computing

518
Q

Reverse?

Server space and applications

  • Companies such as Google, Amazon, Microsoft, and Salesforce provide Cloud servers for individuals and businesses
A

Cloud computing service providers offer:

519
Q

Reverse?

  • Infrastructure as a Service (IaaS)
    • Internet delivery of a networked computing structure
  • Platform as a Service (PaaS)
    • Delivery of a computing platform over the Internet
  • Software as a Service (SaaS)
    • Delivery of software applications over the Internet
A

Cloud computing includes various Services – some examples are:

520
Q

Reverse?

Internet delivery of a networked computing structure

A

Infrastructure as a Service (IaaS)

521
Q

Reverse?

Delivery of a computing platform over the Internet

A

Platform as a Service (PaaS)

522
Q

Reverse?

Delivery of software applications over the Internet

A

Software as a Service (SaaS)

523
Q

Reverse?

  1. Public Cloud
  2. Hybrid Cloud
  3. Private Cloud
  • Many Cloud storage providers offer limited storage for free, and charge an additional fee for more storage
A

Cloud Categories

524
Q

Reverse?

Operate as if it were several smaller servers

A

Using virtualization, one host machine can:

525
Q

Reverse?

  • Are Web applications that combine content or data from multiple online sources
    • Content is continuously updated
    • Content is sourced from RSS Feeds and Web services
A

Mashups

526
Q

Reverse?

  • Is the term that describes emerging trends that link information in new way
    • Agents can make decisions and take actions based on a user preferences
  • Many describe Web 3.0 as the rise of the “Semantic Web”
    • Intelligent software tools can read Web pages and discern useful information from them
    • A Web of data
A

Web 3.0