Term
|
Definition
consists of the program that control or maintin the opeations of the computer and its devices. 2 types: operating systems, utility programs |
|
|
Term
|
Definition
part of system software, a set of programs contiaining instructions that work together to coordinate all the actvities amoung computer hardware resources Primary: boot comp., user interface, memory manager, scheduler, file manager Secondary: configure/manage devices, establish and manage network connecion, monitor performace, provide file mnagemnt, administer security |
|
|
Term
|
Definition
operating system function of starting or restarting computer. Cold boot: turning on comp that has been off Warm boot: using operating system to restart computer |
|
|
Term
|
Definition
single user system where user can work on two or more programs that reside in memory at the same time |
|
|
Term
|
Definition
multiuser system where two or more users can run programs that reside in memory at the same time |
|
|
Term
|
Definition
operating system that supports parallel processing with multiple processors |
|
|
Term
|
Definition
operating system function: keeps track of files on seconday storage, keeps track of various file systems, keeps working copies if file is open, magages file creations, up dates, and deletes |
|
|
Term
|
Definition
secondary operating system function, sending print jobs to buffer instead of directly to printer, print jobs line up in queue (ITC) |
|
|
Term
|
Definition
secondary operating system function, program that assesses an reports info about various comuter resources and devices |
|
|
Term
|
Definition
secondary job of operating system, password protection, virus protection, firewalls, spam protection, encryption, logs |
|
|
Term
|
Definition
part of system software, allows a use to perform maintenance-type tasks |
|
|
Term
|
Definition
utility program that performs functions related to file management: display list of files, organize files, copying/renaming/deleting/moving/sorting files and folders, creating shortcuts |
|
|
Term
|
Definition
utility program that reorganizes files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster |
|
|
Term
|
Definition
utility program tht detects and protects a comp from unauthorized intrusions |
|
|
Term
|
Definition
potentially damaging computer program that affects a computer negatively |
|
|
Term
|
Definition
hides within or looks like a leitimate program |
|
|
Term
|
Definition
copies itself repeatedly in memory or over a network |
|
|
Term
types of operating systems |
|
Definition
STAND-ALONE: complete operating system that works on a comp (multitasking), SERVER, EMBEDDED: resides on ROM chip on mobile device or electronic device |
|
|
Term
|
Definition
any type of hardware capable of transmitting data, instructions, and information between a sending device and a recieving device |
|
|
Term
GPS (global positioning system) |
|
Definition
muse of communication, navigation system that consists of one or more earth-based recievers that accept and analyze signals sent by satellites in order to determine the GPS reviever's geographic location |
|
|
Term
|
Definition
web application that combines services from two or more sources (services-create applications that communicate w/ other computers over internet or business network) |
|
|
Term
asynchronous communication |
|
Definition
speaker may speak at anytime |
|
|
Term
|
Definition
once message starts, it must flow continuously as it is spoken (video) |
|
|
Term
ATM (asynchrnous transfer mode) |
|
Definition
service that carries voice, data, video, and multimedia at extremely high speds, telephone network and internet |
|
|
Term
|
Definition
collection of computers and devices connected together via communications devices and transmission media: facilitating communications, sharing hardware, sharing data and info, sharing software, transferring funds |
|
|
Term
PSTN (public switched telephone network) |
|
Definition
worldwide telephone system, downstream faster thanupstream |
|
|
Term
|
Definition
design of computers, devices and media on a network |
|
|
Term
|
Definition
the layout of the computers and devices in a communications network ex: star, ring, bus |
|
|
Term
|
Definition
fire wall, intranet uses intrnet technology, extranet allows customers/supliers access part of its intranet |
|
|
Term
|
Definition
network communication standard that specifies no computer controls when data can be transmitted |
|
|
Term
|
Definition
network communication standard that defines how messages are routed from one end of a network to another |
|
|
Term
|
Definition
two bluetooth devices use short-range radio waves to transmit data |
|
|
Term
|
Definition
802.16, develeped by IEEE, towers can cover a 30 mile radius, two types are fixed wireless nd mobile wireless, provides wireless broadband internet access |
|
|
Term
|
Definition
help users establish a connectio to another computer or network, manage the transmission of data, instructions, and info, provides an interface for users to communicate with one another |
|
|
Term
|
Definition
connects multiple computers or other routers together and transmits data to its correct destination on a network, many are protected by a hardware firewall, can be used to set packet security rules |
|
|
Term
|
Definition
connects several devices in a nework together |
|
|
Term
|
Definition
communication channel, media transmit multiple signals simutaneously |
|
|
Term
|
Definition
communication channel, the time it takes a signal to travel from one location to another on a network |
|
|
Term
DBMS (database management system) |
|
Definition
allows users to create computerize database, add/modify/and delete data, sort and retrieve data, create forms and reports from data |
|
|
Term
|
Definition
utility program, makes files smaller, sometimes compressed files are calld zipped files |
|
|
Term
|
Definition
small program that tells an operating system how to communicate with a specific device |
|
|
Term
|
Definition
contains data about each file in the database and each field in those files |
|
|
Term
|
Definition
stores data in tables that consist of rows and columns |
|
|
Term
|
Definition
provides GUI to assist users with retrieveing data |
|
|
Term
OODB (object-oriented database) |
|
Definition
stores data in objects ex: multimedia database, groupware, hypertext, and computer aided design database |
|
|
Term
Multidimensional database |
|
Definition
can store data in more than two dimensions of data (aka hypercube), faster than relaional |
|
|
Term
|
Definition
huge database that stoes and manages the data required to analyze historical and current transactions |
|
|
Term
|
Definition
utility program, reorganizing a disk so that the files are stored in continuous sectors, thus speeding up disk access and performance of computer |
|
|
Term
|
Definition
websites with information that a webmaster makes available to users, primarily intended for traditionl desktop/laptop computers, pull-based, vendor driven web content; sites include: text, hyperlinks, images, audio, animation, video. yahoo, msn, aol |
|
|
Term
|
Definition
shift to facilitation of communication, collaboration, and information sharing, pull-based, user-driven: social networks, youtube, wikis, blogs. wikipedia, blogger, myspace,facebook, flicker. also software as a service: google apps, juice, delicious |
|
|
Term
|
Definition
science of classifying things |
|
|
Term
RSS (really simple syndication) |
|
Definition
specification that content agregators use to distribute content to subscribers, read content you want, no spam, no email box clutter/overflow, saves browsing time |
|
|
Term
|
Definition
historically the operating system, but with web 2.0 it is becoming the internet |
|
|
Term
|
Definition
not developed yet, ubiquitous technology, transparently serving us, push-based, machine to machine, huge searchable database |
|
|
Term
|
Definition
the process of converting readable data into unreadable chaacters to prevent unauthorized access |
|
|
Term
|
Definition
uses two keys - public key and private/secret key (known only to the recipeint of the message). john wants to send a secure message to jane, he uses jane's public key to encrypt the message, jane ten uses her private key to decrypt it |
|
|
Term
UPS (uninterruptabe power supplies) |
|
Definition
device that contains surge protected circuits and one or more batteries that can provide power during a temporary or permanent loss of power |
|
|
Term
|
Definition
an applid science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace |
|
|
Term
|
Definition
a small text file that a web server stores on your computer, used to: allow for personalization, store users' passwords, assist with online shopping, track how often users visit a site, target advertisements |
|
|
Term
|
Definition
a scam where a perpetrator attempts to obtain your personal and financial informaion via spoofing |
|
|
Term
ERD (entity-relationship diagram) |
|
Definition
tool that graphically shows the connections among entities in a system |
|
|
Term
|
Definition
developing, 13 different diagrams |
|
|
Term
|
Definition
(proof of concept) a working model of the proposed system, inadequate or missing documentation, users embrace pototype as final system |
|
|
Term
CAD (computer-aided design) |
|
Definition
uses a computer and special software to aid in enginering, dafting, and design |
|
|
Term
CIM (computer-integrated manufacturing) |
|
Definition
uses computers to integrate the many different operations of the manufacturing process |
|
|
Term
MRP and MRP II(material requirements planning) |
|
Definition
uses software to help monitor and control processes rated to production, MRP II is an extenson of MRP, includes software that helps in scheduling |
|
|
Term
CIM (customer interaction management) |
|
Definition
software manages the day-to-day interactions with customers |
|
|
Term
OIS (office information system) |
|
Definition
enables employees to perform tasks using computers and other electronic devices instead of manually, sometimes called (OA), users create graphics and documents, send messages, schedule appointments, and browse the web |
|
|
Term
TPS (transaction processing system) |
|
Definition
captures and proceses data from day-to-day transactions |
|
|
Term
EIS (executive infomation system) |
|
Definition
support needs of executive management |
|
|
Term
VPN (virtual private network) |
|
Definition
provides mobile users, vendors, and customers with a secure connection to the company network server |
|
|
Term
|
Definition
duplic data and implements duplication in different ways |
|
|
Term
|
Definition
duplicate writes to two disk systems |
|
|
Term
|
Definition
a file is broken into either 512 byte sectors or varying strip size or block size pieces and read/written across many disks simultaneously |
|
|
Term
MAN (metropolitan area network) |
|
Definition
high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communictions activity across that region |
|
|
Term
AI (artificial intelligence) |
|
Definition
the application of human intelligence to computers |
|
|
Term
|
Definition
microsoft's set of technologies that allows almost any type of program to run on the internet or an internal business network, as well as stand alone computers and mobile devices |
|
|
Term
|
Definition
program that assists in the management and tracking of all the activities in a business process from start to finish |
|
|
Term
|
Definition
online area in which users have written discussions about a particular subject |
|
|
Term
|
Definition
compromised computer whose owner is unaware the computer is being controlled remotely by an outsider |
|
|
Term
|
Definition
assult on a computer or network whose purpose is to disrupt computer access to an internet service such as the web or email |
|
|
Term
|
Definition
measure of how suitable the development of a system will be to the organization |
|
|
Term
WAP (wireless appliction protocol) |
|
Definition
network standard, specifically a protocol, that specifies how some wireless mobile devices such as smart phones can diplay the content of intenet services such as the web, email, and chat rooms |
|
|
Term
|
Definition
terminal used by retail stores to record purchases, process credit or debit cards, and update inventory |
|
|
Term
|
Definition
sharig information with other information systems within an enterprice |
|
|
Term
|
Definition
network that connects computers and devices in a limited geographical area such as home, school computer lab, office building, or closely positioned group of buildings |
|
|
Term
SFA (sales force automation) |
|
Definition
software that equips traveling salespeople with the electronic tool they need to be more productive |
|
|
Term
|
Definition
encrypted code that a person, web site, or orgaization attaches to an electronic message to verify the identity of the message sender |
|
|
Term
XML (extensible markup language) |
|
Definition
format for sharing data that allows web developers to create customized tags, as well as use predified tags |
|
|
Term
|
Definition
program placed on a computer without he user's knowledge that secretly collects information about the user |
|
|
Term
|
Definition
technology of authenticating a person's identity by verifying a personal characteristic |
|
|
Term
|
Definition
computer that controls access to the hardware, software, and other resources on a network and provides a centraized storage area for programs, data, and information |
|
|
Term
|
Definition
measure of how well computer hardware, software or an information system can grow to meeting increasing perfomance demands |
|
|
Term
HTML (hypertext markup language) |
|
Definition
special formatting language that programmers use to format documents for display on the web |
|
|
Term
|
Definition
network that covers a large geographic area (city, country, world) using a communications channel that combines many types of media such as telephone line, cables, and radio waves |
|
|
Term
SDLC (system development life cycle) |
|
Definition
1)analyze the requirement 2 design the solution 3 validate the design 4 implement the design 5 test the solution 6 document the solution |
|
|
Term
|
Definition
program or set of instructions in a program that allow uses to bypass security controls when accessing a program, computer or network |
|
|
Term
|
Definition
software that helps groups of people work together on projects and share information over a network |
|
|
Term
|
Definition
term used by developer of relational databases for record |
|
|
Term
|
Definition
java platform enterprise edition, platform for server programming in java programming language |
|
|
Term
|
Definition
aka voice over internet protocol (VoIP), general term for a family of transmission technologies for delivery of voice communications over IP networks such as internet |
|
|
Term
MMS (multimedia message service) |
|
Definition
picture and video messaging service |
|
|
Term
|
Definition
server that acts as an interediary for requests for clients seeking resources from other servers |
|
|
Term
|
Definition
refers to the ability of software to operate on more than one platform with identical functionality |
|
|
Term
CASE (computer aided software engineering) |
|
Definition
a category of software that provides a development environment for prgramming teams |
|
|
Term
|
Definition
installation of optical fiber from a telephone switch directly into the subscriber's home |
|
|
Term
BIOS (basic input/output system) |
|
Definition
part of system software load and execute the operating system |
|
|
Term
|
Definition
interactive language for text formatting and typesetting |
|
|
Term
VAN (value added network) |
|
Definition
network that provides specific service, such as legal research or access to a speciaized database |
|
|
Term
AUP (acceptable use policy) |
|
Definition
transit networks which restrict the use to network |
|
|
Term
|
Definition
links records together like a family tree such that each record type has only one owner |
|
|
Term
|
Definition
american standard code for information interchage, character sets used in most computers uses only the lower seven bits, replaced EBCDIC |
|
|
Term
|
Definition
communicates packets that are individually routed between nodes |
|
|
Term
RFI (radio frequency interference) |
|
Definition
electromagnetic radiation which is emitted by elctrical circuits carrying rapidly changing sinlas |
|
|
Term
SMS (short message sevice) |
|
Definition
a message service offered by cell phones |
|
|
Term
|
Definition
a type of data warehose designed primarily to address a specific function or department's needs |
|
|
Term
|
Definition
analysis of data in a database using tools which look for trends or anomalies without knowledge to the meaning of the data |
|
|
Term
|
Definition
hypertext transfer protocol |
|
|
Term
|
Definition
part of operating system, responsible for resource allocation |
|
|
Term
|
Definition
a shared or group intelligence that emerges from the collaboration and competition of individuals |
|
|
Term
|
Definition
graphically shows how actors (users) interact with information |
|
|
Term
|
Definition
is a set of activities used to build an information system |
|
|