Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
163 Cards in this Set
- Front
- Back
User Interface
|
controls how data and instructions are entered and how information is displayed. there are 2 types
|
|
What are the two types of user interfaces?
|
graphical user interface (GUI)
command-line interface |
|
Virtual Memory
|
a concept in which the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM
|
|
server operating system
|
organizes and coordinates how multiple users access and share network resources
|
|
Windows 7
|
Microsoft's fastest, most efficient operating system to date
|
|
Mac OS X
|
a multitasking GUI operating system available only for Apple computers
|
|
UNIX
|
a multitasking operating system that is flexible and powerful
|
|
Linux
|
popular, UNIX-type operating system that is open source software, which means its code is open for the public for use, modification, and redistribution
|
|
What are various Server Operating Systems?
|
Windows Server 2008
UNIX Linux Solaris Novell's NetWare |
|
Solaris
|
a server operating system that is specifically designed for e-commerce applications
|
|
Novell's NetWare
|
server operating system designed for client/server networks
|
|
What are several Embedded Operating systems?
|
Windows embedded CE
Windows Mobile Palm OS iPhone OS Google Android |
|
Windows Embedded CE
|
scaled down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality such as VoIP phones, cameras, ATM, point-of-sale terminals, picture frames, handheld navigation devices, and portable media devices
|
|
Windows Mobile
|
operating system based on Windows Embedded CE, works on smart phones and PDAs
|
|
Palm OS
|
operating system used on smart phones and PDAs
|
|
iPhone OS
|
operating system for iPhone and iPod touch
|
|
Embedded Linux
|
scaled-down Linux OS for smart phones, PDAs, and other devices
|
|
Symbian OS
|
open source multitasking OS designed for smart phones
|
|
Web filtering software
|
restricts access to certain material on the web
|
|
What are the components requires for successful communication?
|
1. sending device
2. communications channel 3. receiving device |
|
groupware
|
software that helps groups of people work together and share information over a network
|
|
collaborate
|
work online with others
|
|
Web services
|
standardized software that enables programmers to create applications that communicate with other remote computers over a network
|
|
What are types of dedicated lines?
|
IDSN lines
DSL FTTP T-carrier ATM |
|
IDSN lines
|
set of standards for digital transmission over standard copper telephone lines
|
|
T-carrier line
|
long-distance digital telephone line that carries multiple signals over a single comms line
|
|
ATM
(Asynchronous Transfer Mode) |
a service that carries voice, data, video, and multimedia at extremely high speeds
|
|
Home network
|
can use phone lines or WiFi
Most homes use WiFi which can transmit to distances up to 1,500 feet |
|
Twisted pair cable
(Transmission media) |
consists of one or more twisted-pair wires bundled together
|
|
Fiber-optic cable
|
consists of thin strand of plastic or glass that use light to transmit signals.
|
|
Broadcast radio
|
distributes radio signals thru the air or space
|
|
Cellular radio
|
a form of broadcast radio that is used widely for mobile communications
|
|
Microwaves
|
radio waves that provide a high-speed signal transmission
|
|
What are the qualities of valuable information?
|
accurate, verifiable, timely, organized, accessible, useful, and cost-effective.
|
|
Accurate information
|
error free
|
|
verifiable info
|
can be proven as correct or incorrect
|
|
timely info
|
has an age suited to its use
|
|
organized info
|
arranged to suit the needs and requirements of the decision maker
|
|
accessible info
|
available when the decision maker needs it
|
|
useful info
|
has meaning to the person who receives it
|
|
cost-effective info
|
should give more value than it costs to produce
|
|
character
|
number, letter, space, punctuation, or other symbol.
*1 byte (8 bits) |
|
field
|
a combination of one or more related characters and is the smallest unit of data a user accesses
|
|
record
|
a group of related fields
|
|
data file
|
a collection of related records stored on a storage medium
|
|
File processing approach (system)
|
each department or area withing an organization has its own set of data files
|
|
What are the 2 weaknesses of the file processing approach (system)
|
1. redundancy
2. isolated files |
|
database approach
|
many programs and users share the data in a database
|
|
What are some advantages to the database approach?
|
1. reduces data redundancy
2. improves data integrity 3. permits easier access 4. reduces development time |
|
What are some disadvantages to the database approach?
|
1. more complex requiring special training, more storage computer memory and processing power
2. more vulnerable |
|
data dictionary
|
contains data about each file in the database and each field within those files
|
|
What are some DBMS retrieving and maintaining functions?
|
1. query language
2. query by example 3. forms 4. report generators |
|
query language
|
simple English like statements that allow user to specify the data to display, print, or store
|
|
query by example (QBE)
|
has a graphical user interface that assists users in retrieving data
|
|
form
|
a window on the screen that provides areas for entering or modifying data
|
|
report generator
|
allows users to design a report on the screen, retrieve data into the report design, and then display or print the report
|
|
database log
|
a listing of activities that changes the contents of the database
|
|
recovery utility
|
uses the logs and/or backups to restore the database
|
|
continuous backup
|
a backup plan in which all data is backed up whenever a change is made
|
|
data model
|
consists of rules and standards that define how the database organizes data
|
|
What are the 3 most popular data models?
|
1. relational
2. object-oriented 3. multidimensional |
|
relational database
|
stores data in tables that consist of rows and columns.
|
|
What does a relational developer refer to file, record and field as?
|
file: relation
record: tuple field: attribute |
|
What does a relational user refer to file, record, and field as?
|
file:table
record:row field: column |
|
Structures Query Language SQL
|
allows users to manage, update, and retrieve data in a relational database
|
|
object-oriented database (OODB)
|
stores data in objects
|
|
object
(in reference to databases) |
an item that contains data, as well as the actions that read or process the data
|
|
object query language OQL
|
often used by object-oriented databases to manipulate and retrieve data
|
|
multidimensional database
|
stores data in dimensions and allows users to access and analyze and view of the database data
|
|
data warehouse
|
huge database system that stores and manages the data required to analyze historical and current transactions
uses multidimensional databases |
|
How do you interact with Web Databases?
|
links to a form on a web page. to access you fill in the form, or enter search text on a web page
|
|
database analyst (DA)
|
focuses on the meaning and the usage of data. Decides on the placement of fields, defines the relationships among data, and identifies users' access and privileges
|
|
database administrator (DBA)
|
requires a more technical inside view of the data. creates and maintains the data dictionary, manages security, monitors performance, and check backup and recovery procedures.
|
|
worm
|
copies itself repeatedly
|
|
what does installing a firewall and/or intrusion detection software defend against?
|
botnet
denial of service attack improper use of a back door spoofing |
|
what can access control include?
|
user name
password possessed object biometric device |
|
Software piracy
|
unauthorized and illegal duplication of copyrighted software
|
|
What are some way companies attempt to prevent information theft?
|
encryption
digital signature digital certificate certificate authority |
|
system failure
|
prolonged malfunction of a computer.
|
|
uninterruptible power supply (UPS)
|
contains surge protection circuits and one or more batteries that can provide power during a power loss.
|
|
repetitive strain injury (RSI)
|
injury or disorder of the muscles, nerves, tendons, ligaments, and joints
tendonitis and carpal tunnel |
|
How do you prevent health-related disorders?
|
1. take frequent breaks
2. use precautionary exercises and techniques 3. incorporate ergonomics when planning |
|
cookie
|
a file the a web server stores on a computer to collect data about the user
|
|
spyware
|
a program placed on a computer that secretly collects data about a user
|
|
adware
|
a program that displays an online advertisment in a banner or pop-up window
|
|
phishing
|
scam which the perpetrator sends an official looking email message that attempts to obtain a user's personal financial info
|
|
social engineering
|
gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
|
|
What are the six steps of the Program Development Life-Cycle
|
1. Analyze requirements
2. Design Solution 3. Validate Design 4. Implement Design 5. Test Solution 6. Document Solution |
|
What are the 5 phases of the System Development Life-Cycle
|
1. Planning
2. Analysis 3. Design 4. Implementation 5. Operation, Support, & Security |
|
Planning Phase
|
project request reviewed and approved - requests are prioritized, resources allocated, and a project development team is formed
|
|
repetitive strain injury (RSI)
|
injury or disorder of the muscles, nerves, tendons, ligaments, and joints
tendonitis and carpal tunnel |
|
How do you prevent health-related disorders?
|
1. take frequent breaks
2. use precautionary exercises and techniques 3. incorporate ergonomics when planning |
|
cookie
|
a file the a web server stores on a computer to collect data about the user
|
|
spyware
|
a program placed on a computer that secretly collects data about a user
|
|
adware
|
a program that displays an online advertisment in a banner or pop-up window
|
|
phishing
|
scam which the perpetrator sends an official looking email message that attempts to obtain a user's personal financial info
|
|
social engineering
|
gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
|
|
What are the six steps of the Program Development Life-Cycle
|
1. Analyze requirements
2. Design Solution 3. Validate Design 4. Implement Design 5. Test Solution 6. Document Solution |
|
What are the 5 phases of the System Development Life-Cycle
|
1. Planning
2. Analysis 3. Design 4. Implementation 5. Operation, Support, & Security |
|
Planning Phase
|
project request reviewed and approved - requests are prioritized, resources allocated, and a project development team is formed
|
|
Analysis Phase
|
preliminary investigation (feasibility study) conducted to determine the exact nature of the problem or improvement and detailed analysis is performed to study how the current system works, determine users' requirements, and recommend a solution.
|
|
Design Phase
|
and necessary hardware and software are acquired, and the details of the new or modified information system are developed
|
|
Implementation Phase
|
new or modified system is constructed and delivered to the users
|
|
Operation, Support, & Security Phase
|
ongoing assistance is provided for the information system and its users after the system is implemented
|
|
system development
|
a set of activities used to build an information system.
|
|
project management
|
the process of planning, scheduling, and then controlling the activities during system development
|
|
What is the goal of project management?
|
to deliver an acceptable system to the user in an agreed-upon time frame
|
|
feasibility
|
a measure of how suitable the development of a system will be to the organization
|
|
programming language
|
a set of words, abbreviations, and symbols that enables a programmer to communicate instructions to a computer
|
|
low-level language
|
programming language that runs only on one type of computer
|
|
procedural languages
|
third-generation language (3GL)
high-level languages that can run on many different computers and OS. a programmer writes instructions that tell the computer what accomplish and how to do it |
|
What is a major benefit of object-oriented programming (OOP) language
|
the ability to reuse and modify existing objects, allowing programmers to create applications faster
|
|
What are the 4 types of OOP languages
|
1. Java
2. C# 3. F# 4. C++ |
|
Rapid application development (RAD)
|
a method of developing software which the programmer writes and implements a program in segments instead of waiting until the entire program is completed
often used in conjunction with OOP |
|
Visual Studio
|
Microsoft's suite of program development tools including:
Visual Basic Visual C++ Visual C# |
|
4GL (fourth generation language
|
non-procedural language that users and programmers use to access the data in a database
*SQL is a popular 4GL |
|
application generator
|
creates source code, or machine code from a specification of the required functionality, and a macro
|
|
macro
|
series of statements that instructs a program how to complete a task
|
|
Hypertext Markup Language (HTML)
|
special formatting language used to format documents for display on the Web
|
|
dynamic HTML (DHTML)
|
aka scripting language
used to add interactivity to Web pages |
|
Popular languages for developing web pages
|
1. Ruby on Rails
2. Ajax 3. API |
|
Ruby on Rails
|
open source framework that provides technologies for developing object-oriented, database driven Web sites
|
|
Ajax (Asynchronous JavaScript and XML)
|
method of creating interactive Web applications designed to provide immediate response to user requests
*updates only changes to Web page |
|
API (application programming interface)
|
collection of tools that programmers use to interact with the environment such as a Web site or OS
|
|
Types of Web page authoring software
|
Dreamweaver
Expression Web Flash Share Point Designer |
|
Control structure
|
depicts the logical order of program instructions.
|
|
What are the 3 basic control structures?
|
1. sequence
2. selection 3. repetition |
|
What are some tools and techniques business managers use?
|
business intelligence (BI)
business process mngmnt (BPM) business proc. automation (BPA) |
|
Accounting information systems
|
Manage everyday transactions & help budget, forecast, & analyze
|
|
distribution systems
|
control inventory and manage shipping
|
|
office information system (OIS)
|
enables employees to perform tasks using computers and other electronic devices, instead of manually
|
|
transaction processing system (TPS)
|
captures and processes data from day-to-day business activities
|
|
management info system (MIS)
|
generates accurate, timely, and organized info, so users can make decisions, solve problems, or track progress
|
|
decision support system (DSS)
|
helps users analyze data and make decisions
|
|
expert system
|
captures and stores the knowledge of human experts and then imitates human reasoning and decision making
|
|
enterprise resource planning (ERP)
|
provides applications to help manage and coordinate ongoing activities
|
|
content management system (CMS)
|
organizes and allows access to carious forms of documents and files
|
|
What are types of technologies used throughout an enterprise?
|
portals
communications data warehouses extranets Web services service-oriented architectures workflow virtual private networks |
|
extranet
|
allows customers or suppliers to access part of an enterprise's intranet
|
|
Web services
|
allow businesses to create products and B2B interactions
|
|
service-oriented architecture
|
helps increase communications between diverse information systems
|
|
workflow applications
|
assists in the management and tracking of the activities in a business process
|
|
virtual private network (VPN)
|
provides users with a secure connection to a company's network server
|
|
virtualization
|
the practice of sharing or pooling computing resources, such as servers and storage devices
|
|
server virtualization
|
provides the capability to divide a physical server logically into many virtual servers
|
|
storage virtualization
|
provides the capability to create a single logical storage device from many physical storage devices
|
|
cloud computing
|
Internet service that provides computing needs to users
|
|
grid computing
|
often used in research environments, combines many servers and/or personal computers on a network to act as one large computer
|
|
enterprise hardware
|
allows large organizations to manage and share info and data using devices geared for maximum availability and efficiency
|
|
redundant array of independent disks (RAID)
|
a group of integrated disks that duplicates data, instructions, and info to improve data reliability
|
|
network attached storage (NAS)
|
server that provides storage for users and information systems
|
|
storage area network (SAN)
|
provides storage to other servers
|
|
enterprise storage system
|
consolidates storage so that operations run efficiently
|
|
blade servers
|
pack a complete computer server on a single card, or blade, rather than a system unit
|
|
differential backup
|
copies only files that have been changed since the last full backup
|
|
incremental backup
|
copies only files that have changed since the last incremental backup
|
|
selective backup
|
aka partial backup
allows users to backup specific files |
|
continuous data protection (CDP)
|
all data is backed up whenever a change is made
|
|
What are the components of a disaster recovery plan
|
1. Emergency Plan
2. Backup Plan 3. Recovery Plan 4. Test Plan |
|
Emergency Plan
|
specifies the steps to be taken immediately after disaster strikes
|
|
Backup Plan
|
specifies how a company uses backup files and equipment to resume information processing
|
|
Recovery Plan
|
identifies the actions to be taken to restore full information processing operations
|
|
Test Plan
|
contains information for simulating disasters and recording an organization's ability to recover
|