Term
|
Definition
continous electronic waves that humans understand |
|
|
Term
|
Definition
only computers can understand |
|
|
Term
|
Definition
converting digital to analog |
|
|
Term
|
Definition
converting from analog to digital |
|
|
Term
|
Definition
Connectivity is the concept related to using computer networks to link people and resources. You can link and connect to large computers and the Internet providing access to extensive information resources. |
|
|
Term
|
Definition
Communications Systems transmit data from one location to another. Four basic elements are: •Send and receiving devices •Communication channel (transmission medium) •Connection (communication) devices •Data transmission specifications |
|
|
Term
|
Definition
Communications channels carry data from one computer to another. Physical Connections Physical connections use a solid medium to connect sending and receiving devices. These connections include telephone lines (twisted pair), coaxial cable, and fiber optic cable.
|
|
|
Term
|
Definition
Wireless connections use air rather than solid substances to connect devices. Four types of devices include: •Infrared –uses light waves over a short distance; line of sight communication. •Broadcast radio –uses transceivers to collect radio waves. Wi-Fi is standard. •Microwave –uses high frequency radio waves; line-of-sight communication; uses microwave stations and dishes; Bluetooth is a widely used short-range standard. •Satellite –microwave relay station in the sky to uplink and downlink data; GPS provides global positioning to track geographic locations. |
|
|
Term
|
Definition
Modems modulate (convert digital signals to analog) and demodulate. Transfer speed (rate) is measured in bits per second. Four types of conventional modems are external, internal, PC Card modem, and Wireless.
|
|
|
Term
|
Definition
Dial-up services are standard telephone lines and conventional modems, T1, T2, T3, and T4 support very high speed, all digital transmission. More affordable technologies include DSL (Digital Subscriber Line), cable modems, satellite/air, and cellular services (3G cellular networks). |
|
|
Term
|
Definition
Bandwidth is a measure of a communication channel’s width or capacity. Three bandwidths are voiceband (voice grade or low bandwidth), medium band (uses leased lines), and broadband (high- capacity transmissions). Protocols are rules for exchanging data. TCP/IP is a standard internet protocol.
|
|
|
Term
Networks- Nodes Client Server |
|
Definition
Computer networks connect two or more computers. Some specialized network terms include: •Node –any device connected to a network •Client –node requesting resources •Server –node providing resources; specialized servers such as application, communication, database, file, printer and Web servers are called dedicated servers. |
|
|
Term
|
Definition
•Hub –center or central node. •NIC (network interface cards) –LAN adapter card for connecting to a network. •NOS (network operating system) – controls and coordinates network operations. |
|
|
Term
Distributed Processing Host Computer Network Manager |
|
Definition
•Distributed processing –system where processing is located and shared at different locations. •Host computer –large centralized computer. •Network manager (administrator) – network specialist responsible for network operations.
|
|
|
Term
|
Definition
•Local area networks (LANs) connect nearby devices. •Home networks are LANs in homes. •Metropolitan area networks (MANs, regional networks) link office buildings within a city. •Wide area networks (WANs) can span worldwide and are the largest.
|
|
|
Term
|
Definition
network’s configuration= topology, Principal topologies are star networks , bus networks, ring network, hierarchical network
|
|
|
Term
network archive Strategies : Terminal Network System Client/server network sytem peer 2 peer network system |
|
Definition
a way of sharing information and resources. Common strategies include: •Terminal network system – centralized computer distributes power to several computers. •Client/Server network system –client computer request resources form server computers. •Peer-to-peer network system –each computer acts as both a server and a client. Gnutella supports peer-to-peer file sharing. |
|
|
Term
|
Definition
Intranets are private networks within an organization that resemble the Internet. Like the Internet, they use browsers, Web sites, and Web pages. Unlike the Internet, intranets are available only to those within the organization. |
|
|
Term
|
Definition
Extranets are similar to intranets, except that extranets connect more than one organization. Extranets are often used to connect suppliers and producers to increase efficiency. |
|
|
Term
|
Definition
A firewall is a security system to protect against external threats. It consists of both hardware and software. All communications into and out of an organization pass through a special security computer called a proxy server. |
|
|
Term
Identity Theft Mistaken Identity Freedom of Info Act |
|
Definition
Identity theft is the illegal assumption of someone’s identity for the purpose of economic gain. Mistaken identity occurs when an electronic profile of one person is switched with another.
Freedom of Information Act entitles individuals access to governmental records relating to them.
|
|
|
Term
|
Definition
computer ethics issues are privacy, accuracy, property, and access organizations monitor employee e-mail and computer files using special software |
|
|
Term
|
Definition
Many people believe that, while using the Web, as long as they are selective about disclosing their name and other personal information, little can be done to invade their privacy. |
|
|
Term
|
Definition
Spyware= secretly records and reports an individuals
activity on the Internet. Web bugs and Computer monitoring=sniffer programs, keystroke loggers
|
|
|
Term
|
Definition
Malicious Programs Malware includes viruses and Trojan Horses (enters a computer disguised as something else). Virus checkers alert users when certain viruses and worms enter their systems. |
|
|
Term
|
Definition
Denial of service attack (DoS) is an attempt to shut down or stop a computer system or network. It floods the computer or network with requests for information and data. Servers under attack are unable to respond to legitimate users.
|
|
|
Term
|
Definition
Theft takes many forms including stealing hardware, software, data, and computer time. Unauthorized copying of programs is called software piracy and protected by the SoftwareCopyright Act of 1980.
|
|
|
Term
Encrypting Biometric Scanning Ergonomics |
|
Definition
coding info so that only the user can read it device that checks for fignerprints or retinal scans Ergonomics is the study of human factors related to things people use, including computers. Aspects include: •Physical Health •Mental Health •Design Computers are being designed for easier and healthier use. There is a trend toward simplifyingfeatures offered in new models.
|
|
|
Term
|
Definition
•Cynicism •Naiveté •Frustration •Proactivity
|
|
|
Term
Organization Info Flow Functions |
|
Definition
a.) Accounting= Tracks all financial activity. This department records bills and other financial transactions. It also produces financial statements including budgets and forecasts of financial performance.
b) Marketing=Handles planning, pricing, promoting, selling and distributing goods and services to customers. They are also involved in creating a customer newsletter that is distributed via the corporate Web page
c) Human Resources= Finds and hires people and handles matters such as sick leave and retirement benefits. In addition, it is concerned with evaluation, compensation, and professional development.
d) Production= Takes in raw materials and people work to turn out finished goods or services. It may be a manufacturing activity or an operations activity.
e) Research= Conducts basic research and relates new discoveries to the firm’s current or new products department. Research people explore new ideas and use this knowledge to design new products.
|
|
|
Term
|
Definition
a) Supervisors Manage and monitor the employees and workers, those who actually produce goods and services. Thus, these managers have the responsibility relating to operational matters. They monitor day-to-day events and immediately take corrective action, if necessary. b) Middle management Deal with control, planning (also called tactical planning), and decision making. They implement the long-term goals or the organization. c.) Top management Concerned with long-range planning (also called strategic planning). They need information that will help them plan the future growth and direction or the organization.
|
|
|