Term
|
Definition
Makes everything easier, better, and faster. Najes a worker more efficient throughout the day. |
|
|
Term
|
Definition
What a person or company specializes in (i.e. a window manufacturer specializes in making windows. |
|
|
Term
|
Definition
A computer uses input to process and store data in order to produce output. |
|
|
Term
|
Definition
Computers that exist within devices sich as microwaves and thermometers. |
|
|
Term
What is the fastest supercomputer in the world and how fast is it? |
|
Definition
The fastest supercomputer in the world is named Titan, and it has a max speed of 17.58 pf. |
|
|
Term
|
Definition
one quadrillion calculations per second. |
|
|
Term
|
Definition
A web of interconnected computer networks invented in 1969. There is no central authority, and it was invented for communications during the Cold War. |
|
|
Term
|
Definition
The set of properties for transmitting data between devices. |
|
|
Term
|
Definition
TCP/IP is the way computers communicate on the net. |
|
|
Term
|
Definition
|
|
Term
What does VOIP stand for? |
|
Definition
Voice over internet protocol |
|
|
Term
What does HTTP stand for? |
|
Definition
Hyper Text Transfer Protocol |
|
|
Term
What does HTML stand for? |
|
Definition
|
|
Term
What is the World Wide Web? |
|
Definition
Is software that transfers graphics, video, text, etc.It was created by Sir Tim Burners Lee in the late 80's early 90's in order to transfer info. |
|
|
Term
What is the difference between data and information? |
|
Definition
Data is input, it is raw facts and figures, information is output (Information is data that has been processed). |
|
|
Term
|
Definition
The Cloud is internet storage where one places a file(s) in the cloud and it is stored "somewhere". |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
A text file stored on your computer by a web browser.
Can I.D. user, passwords, and they can even create custom web pages. |
|
|
Term
|
Definition
Software that allows the system to interact with third party peripheral devices. |
|
|
Term
|
Definition
When a user reboots a computer that is already running. |
|
|
Term
|
Definition
The process of loading an operating system into a computers memory. |
|
|
Term
|
Definition
The particular type of processor model and operating system on which a computer is based. |
|
|
Term
|
Definition
Automatically configures a new hardware component on a computer. |
|
|
Term
|
Definition
Several applications bundled together into a single large package. |
|
|
Term
|
Definition
The tiny pieces of silicon that houses millions of microminiature electronic circuits. |
|
|
Term
How many bites are in a Kilobyte? |
|
Definition
|
|
Term
Every brand of computer has its own binary language called: |
|
Definition
|
|
Term
|
Definition
Electrical date roadways through which bits are transmitted within the CPU and other components of the motherboard. |
|
|
Term
A group of 8 bits is called a byte.
True or False? |
|
Definition
|
|
Term
The CPU conists of two parts: ALU and the control unit.
True or False? |
|
Definition
|
|
Term
Cache is upgradeable.
True or False? |
|
Definition
|
|
Term
Which kind of device reads numbers printed at the bottom of checks? |
|
Definition
A magnetic ink character reader. |
|
|
Term
This technology can be used to automatically charge drivers' accounts for a toll when he/she passes through: |
|
Definition
Radio Frequency Identification |
|
|
Term
|
Definition
A display device made up of two plates of glass separated by a layer of substance in which light is manipulated. |
|
|
Term
Data or information that is displayed on a printer is: |
|
Definition
|
|
Term
|
Definition
The amount of space between adjacent pixels. |
|
|
Term
|
Definition
Devices that control the position of the cursor on the screen and allow the user to select options displayed on the screens. |
|
|
Term
|
Definition
Refers to an image's clarity and sharpness, and it is measured in DPI. |
|
|
Term
|
Definition
Science that makes working conditions and equipment safer. |
|
|
Term
What are the three network topology? |
|
Definition
|
|
Term
|
Definition
A short-distance wireless standard is used to link cell phones, PDAs and computers at distances up to 30 feet. |
|
|
Term
In a public key encryption, only the reciever of an encrypted message knows the private key needed to decrpt the message.
True or False? |
|
Definition
|
|
Term
Communication signals represented in binary format are: |
|
Definition
|
|
Term
What are the two principle ways networks are structured: |
|
Definition
Peer-to-Peer
and
Client-server |
|
|
Term
|
Definition
If an organization's internal private network uses the same infrastructure and standards of the internet.
|
|
|
Term
|
Definition
Any device that is attached to a network. |
|
|
Term
|
Definition
An attack that disables a computer or network by making so many requests of it that it overloads it and keeps other users from accessing it. |
|
|
Term
|
Definition
The process of altering readable data into unreadable form to prevent unauthorized access. |
|
|
Term
A refrigerator that allows you to send email is an example of: |
|
Definition
|
|
Term
|
Definition
The number of times a song is measured and converted to a digital value. |
|
|
Term
A digital cameras resolution is expressed in: |
|
Definition
|
|
Term
|
Definition
|
|
Term
A record is a collection of related |
|
Definition
|
|
Term
What are examples of relationl database terminology? |
|
Definition
Qualities, attributes, and relations. |
|
|
Term
|
Definition
Computer-assisted process of sifting through and analyzing vast amount of data to extract maning and discover new knowledge. |
|
|
Term
A field within a record that is chose to uniquely identify the record is the main field.
True or False? |
|
Definition
|
|
Term
A database analyst is responsible for coordinating and managing all the activities of a database.
True or False? |
|
Definition
|
|
Term
|
Definition
The person who coordinates all activities and needs for an organizations database. |
|
|
Term
What is the turning test? |
|
Definition
It is used to determine if computers have achieved the level of human intelligence. |
|
|
Term
What is an inference engine? |
|
Definition
Software that searches an expert system's knowledge base and produces conclusions. |
|
|
Term
|
Definition
A form of smart software that monitors work patterns, asks questions and performs work tasks on the user's behalf. |
|
|
Term
|
Definition
Description of the structure of a database. |
|
|
Term
A limited working system developed to test design concepts is a data flow model.
True or False? |
|
Definition
|
|
Term
The point of structured programming is to make programs take up less space on a hard drive.
True or False? |
|
Definition
|
|
Term
Object-oriented programming is not procedural.
True or False? |
|
Definition
|
|
Term
|
Definition
The step-by-step process followed during systems an analysis and design. |
|
|
Term
|
Definition
Using workstations, CASE tools and other software to build working models of system components so that they can be quickly tested and evaluated. |
|
|
Term
|
Definition
A programmer must follow the rules for coding a particular programming language. |
|
|
Term
|
Definition
Locating or removing errors from a computer. |
|
|
Term
Which type of language translator to converts the enture high-level language input into machine language to be expected later? |
|
Definition
|
|
Term
|
Definition
A collection of related components that interact to perform a task or accomplish a goal. |
|
|
Term
If a company simply quits using the old system and begins using the new one, this type of system conversion is called: |
|
Definition
|
|
Term
If parts of the news system are introduced at different times, this type of system conversion is called: |
|
Definition
|
|
Term
If only a few users try out the new system until its reliability has been proven this type of system conversion is called: |
|
Definition
|
|
Term
A computer is taken over secretly and covertly and programmed to respond to instructions sent remotely is called a:
|
|
Definition
|
|
Term
|
Definition
When malicious software is implanted in your computer that redirects your computer to an imposter web page. |
|
|
Term
|
Definition
A collection of data organized to meet the users' standards. |
|
|
Term
|
Definition
Designs and implements
coordinates and controls
Responsible for:
System Security
Back-up
monitoring |
|
|
Term
|
Definition
The structure of a database; controls access to the data within; it also enables the storage, modification, and extraction of data. |
|
|
Term
ERP (Enterprise Resource Planning) |
|
Definition
Integrates business processes such as manufacturing, human resources, marketing, and financial planning (Oracle and SAP) |
|
|
Term
|
Definition
A collection of large amounts of data from a variety of sources.
Supports a company's reporting and analysis activities. |
|
|
Term
|
Definition
The miniaturized circuitry of a computer processor. |
|
|
Term
|
Definition
A tiny electronically operated switch that can alternate between on and off. |
|
|
Term
First Step in the Machine Cycle |
|
Definition
|
|
Term
The Second Step in the Machine Cycle |
|
Definition
|
|
Term
The Third Step in the Machine Cycle |
|
Definition
Arithmetic Logic Unit:
Execute |
|
|
Term
The Fourth Step in the Machine Cycle |
|
Definition
|
|
Term
The Final Step in the Machine Cycle: |
|
Definition
|
|
Term
What is the Machine Cycle? |
|
Definition
The series of operations performed to execute a program instruction within the CPU. |
|
|
Term
|
Definition
Uses a special scanner that reads "bubble" marks and converts them into computer-usable form. (Scantrons) |
|
|
Term
|
Definition
Software scanned text from images (pictures and the text) to an editable format |
|
|
Term
|
Definition
The storage for the execution unit of a CPU. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Wide Area Network
Spans a large geographic area. |
|
|
Term
|
Definition
|
|