Shared Flashcard Set

Details

CMPE 3
midterm 3 Chapters 7-10
194
Computer Science
03/13/2011

Additional Computer Science Flashcards

 


 

Cards

Term
create graphics
Definition
database programs can do all of the following except:
Term
computerized file cabinet
Definition
A(n) ______ is a good comparison to a database
Term
application
Definition
database software is an example of a(n):
Term
easy to secure because information from the database cannot be printed
Definition
advantages of databases include all of the following except:
Term
database program
Definition
software for organizing storage and retrieval of information is a(n):
Term
database
Definition
a collection of information stored in an organized form in a computer is a(n):
Term
tables
Definition
a relational database is composed of one or more:
Term
record
Definition
in a database table, a ______ is a collection of data fields
Term
record
Definition
in a customer database table, all of the information for one customer is kept in a:
Term
text field
Definition
in a customer database, a customer's surname would be keyed into a:
Term
computed
Definition
in a database, a _______ field shows results of calculations performed on data in other numeric fields
Term
numeric
Definition
the number of newspapers sold on May 30 would be kept in a ______ field
Term
importing
Definition
bringing data from a word processing program into a database program is known as:
Term
browsing
Definition
____ is perusing data in a database as if looking through pages in a notebook
Term
querying
Definition
when looking for a specific patient in a hospital's database, _______ is more efficient than browsing
Term
sorting
Definition
arranging all customer records in customer number order is an example of:
Term
report
Definition
an ordered list of specific records and specific fields printed in an easy-to-read format is known as a(n):
Term
exporting
Definition
The process of ____________ would be used when sending data from a database to a word processor so
that mailing labels could be produced.
Term
unambiguous
Definition
database queries must be:
Term
query language
Definition
the following is an example of:
select student_ID from students where major= business and credits >= 46
Term
personal information manager
Definition
PIM stands for:
Term
GIS
Definition
a(n) _____ combines data tables with demographic information
Term
DBMS
Definition
a ______ manipulates data in a large collection files and cross references those files
Term
database management system
Definition
a large corporation would use a _______ to keep records for many employees and customers along with all of its inventory data
Term
customer ID
Definition
for a customer database, a good choice of key field would be:
Term
uniquely identify a record
Definition
a key field must
Term
relational database
Definition
in a(n) _____, data from more than one table can be combined
Term
batch
Definition
______ processing is used when a large mail-order company accumulates orders and processes them together in one large set
Term
interactive
Definition
when making an airline reservation through the internet, you use _____ processing
Term
batch
Definition
producing invoices once a month is an example of _____ processing
Term
mainframe
Definition
in a typical client/server environment, the client can be any of the following expect a:
Term
processes a query from a client and then sends all the answers back to the client
Definition
in a client/server environment, the server:
Term
middleware
Definition
_______ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it
Term
locating trends and patters in information kept in large databases
Definition
data mining is:
Term
XML
Definition
____ is a new, powerful data description language used to construct web pages as well as access to query databases using the internet
Term
customers
Definition
a CRM system organizes and tracks information on:
Term
class
Definition
in an object-oriented database, every object is an instance of a
Term
natural
Definition
when a person uses language like ordinary English to query a database, it is known as a(n) _____ language query
Term
identity theft
Definition
the act of accessing data about other people through credit card information, credit bureau data, and public records and then using that data without permission is known as:
Term
libraries must turn over their patrons' records
Definition
an aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants:
Term
accumulates so much data that it is difficult to use efficiently
Definition
one disadvantage of data mining is that it:
Term
two or more computers that are linked together
Definition
a basic computer network can be described as:
Term
cables
Definition
the three essential components of every computer system include all of the following except:
Term
promotes independence so users have exclusive control over their own data and applications
Definition
all of the following are advantages of using a computer network except that it:
Term
wireless networks are generally faster than wired networks
Definition
all of the following statements are true except:
Term
hub
Definition
a(n) _____ broadcasts messages to all devices connected to a LAN
Term
switch
Definition
in a local area network, a ____ only transmits data to the destination node
Term
local area network
Definition
LAN stands for:
Term
geographical area
Definition
the primary difference between a LAN and a WAN is the:
Term
node
Definition
each individual computer and networked peripheral attached to a LAN is a:
Term
twisted pair
Definition
standard telephone cables containing copper wires are known as ______ cables
Term
generally faster than wired LAN
Definition
all of the following are true of a wireless network except:
Term
metropolitan area network
Definition
MAN stands for:
Term
backbone
Definition
the collection of common pathways between networks on a WAN is known as a:
Term
router
Definition
the device or program that forwards messages between networks is known as a:
Term
mesh network
Definition
a(n) _____ is often used to set up a temporary communications systems that requires no centralized router
Term
GPS
Definition
the US Department of Defense uses a(n) _____, which is a specialized network used to determine locations, maps, and directions using signals from satellites that are orbiting the earth
Term
GPS
Definition
the system of satellites used to determine any position on the earth is known as:
Term
bus
Definition
a set of parallel wires that carries digital signals among a computer's components is called a(n):
Term
ethernet
Definition
in the 1970's, Xerox developed ______, which continues to be a popular networking architecture
Term
user is connecting to a network through a phone line, television cable, or wireless link
Definition
remote access means that a:
Term
socket that enables information to move in and out
Definition
a port is a
Term
port
Definition
a newer PC will likely have an ethernet ____ on the main circuit board so it can directly connect to an ethernet network
Term
USB
Definition
a(n) _____ port is faster and more flexible than a traditional serial or parallel port
Term
network interface card
Definition
NIC stands for:
Term
NIC
Definition
a(n) ______ adds a special serial port to a computer so it can be directly connected to a network
Term
network cable
Definition
the NIC controls the flow of data between the computer's RAM and the:
Term
analog
Definition
a(n) _____ signal is represented by a continuous wave
Term
modem
Definition
a(n) _____ converts a message from digital to analog or from analog to digital
Term
digital
Definition
a voice message must be converted to a(n) ____ signal so it can be stored on a computer's hard drive
Term
megabits
Definition
____ is defined as millions of bits
Term
bandwidth
Definition
the term, ______, refers to the amount of information transmitted through a communication medium in a given amount of time.
Term
standard phone modem
Definition
a broadband connection could be any of the following except:
Term
fiber-optic
Definition
a(n) _____ cable uses light waves to transmit multimedia and voice data
Term
wireless connection
Definition
a(n) ____ uses radio waves to carry information at high speed
Term
bluetooth
Definition
a personal area network is possible because of the wireless technology known as:
Term
3G
Definition
_____ is new technology currently available in Japan, much of Europe, and some major US cities. it uses high-bandwidth connection to communicate multimedia over wireless networks
Term
protocol
Definition
the rules for how data is exchanged between network nodes is known as a(n):
Term
server
Definition
a _____ is a high-speed, high-end computer that shares data and other resources with client computers
Term
peer-to-peer network
Definition
a ____ is a configuration that allows every computer on the network to act as both a client and a server
Term
terminal emulation
Definition
____ software enables a computer to function as a simple input/output device for sending messages to a host computer
Term
file server
Definition
the ____ stores data and software that can to be shared by several users
Term
downloading
Definition
using a PC to copy software or data from a server, it is known as:
Term
site
Definition
when a business can legally copy software, to all of the computers they own, the company has a(n) _____ license:
Term
web bug
Definition
a(n) ______ is code embedded as a one-pixel graphics file in a web page or email message
Term
POP
Definition
most web-based email systems use ____ to retrieve mail and store the messages in a folder on a remote mail server
Term
web bug
Definition
a(n) ______ is an invisible piece of code that notifies the sender that an email was opened and may even record other information about the user's computer or email software
Term
USENET
Definition
a worldwide public newsgroup available on the internet is:
Term
USENET
Definition
a worldwide public newsgroup available on the internet is:
Term
do not have to be online at the same time
Definition
asynchronous communication is when the sender and recipient
Term
instant messaging
Definition
IM stands for:
Term
avatars
Definition
graphical bodies used to represent a person in a virtual meeting place are known as:
Term
telephony
Definition
_____ software and hardware allows a PC to act like a speakerphone
Term
online role-playing games involving hundreds of thousands of players
Definition
MMORPGs are:
Term
spam
Definition
unwanted junk email is known as
Term
phishing
Definition
____ is designed to capture sensitive financial information from the person visiting a website
Term
firewall
Definition
a ____ helps block unauthorized access to a computer
Term
WEP
Definition
the _____ encryption scheme improves the security of wireless networks
Term
VPN
Definition
____ is a secure electronic "tunnel" through the internet that prevents unauthorized access or eavesdropping
Term
department of defense
Definition
what was the department of the US government that developed the initial stages of the internet?
Term
1960s
Definition
in what decade was ARPANET developed
Term
the US government
Definition
ARPANET was funded by
Term
no one in particular
Definition
the internet is controlled by
Term
internet2
Definition
hundreds of universities, government entities, and research labs have formed?
Term
a few dozen computers at universities and government research centers
Definition
the first users of the internet were?
Term
the US government
Definition
much, or nearly all, of the cost of initially building and operating the internet was supplied by
Term
transmission control protocol/internet protocol
Definition
TCP/IP stands for
Term
standards not owned by any company
Definition
open standards refers to
Term
unique IP address
Definition
every host computer on the internet has a(n)
Term
static IP address
Definition
this address doesn't change every day
Term
dynamic IP address
Definition
this address changes temporarily as the application connect to the internet
Term
multicasting
Definition
the way in which information is transmitted to multiple internet-connected devices is called
Term
domain name system
Definition
the system that translates an IP address into an easier to remember name is the
Term
.army
Definition
all of the following are top-level domains except
Term
.bus
Definition
all of the following are top-level domains except
Term
.pro
Definition
a recently created additional top-level domain name is
Term
server
Definition
a URL can specify the IP address of the web ____ that houses a web page
Term
user name
Definition
in the e-mail address bowles@sou.edu "bowles" is the
Term
host computer in an educational domain
Definition
in the e-mail address bowles@sou.edu, "sou" is the
Term
country code
Definition
in the web address www.casamexicanca.com.mx, "mx" is a(n)
Term
direct satellite
Definition
the three basic categories of connection to the internet include all except
Term
direct connections
Definition
T1 and T3 connections are considered
Term
backbone network
Definition
in a large organization LANs may be connected through a
Term
modem
Definition
if you are at home and do not have a direct internet connection, you will most likely connect through a
Term
narrowband
Definition
telephone modem connection are also called ____ connections, because they offer little bandwidth compared to other types of connections
Term
telephone modems
Definition
broadband connections include all of the following except
Term
digital subscriber line
Definition
DSL stands for
Term
it cannot share signals with a telephone line of voice traffic
Definition
all of the following are disadvantages of a DSL connection except
Term
coaxial cables for television signals
Definition
cable modems use the same medias as
Term
wireless LAN connections
Definition
wi-fi technology refers to
Term
gateway
Definition
a ____ is a computer connected to two networks
Term
client/server
Definition
which model is used by internet applications
Term
asks for information
Definition
in a client/server model, a client program
Term
email server
Definition
a university might have a(n) ______ to manage the mail of students, faculty, and staff
Term
file transfer protocol
Definition
FTP stands for
Term
1991
Definition
the world wide web was introduced in
Term
uniform resource locator
Definition
URL stands for
Term
http
Definition
the protocol used to transfer web pages is
Term
tags
Definition
HTML commands, such as H1, are known as
Term
any word processor
Definition
web pages can be created using
Term
adobe acrobat
Definition
web authoring software includes all of the following except
Term
a domain name registry company
Definition
to register a business name and create a unique URL, a business pays a fee and goes to
Term
blog
Definition
an internet diary or grouping of ongoing commentaries is known a(n)
Term
plug-ins
Definition
downloadable software extensions that add new features to a browser are known as
Term
start with a plan
Definition
the first step when creating a web site should be to
Term
XML
Definition
what markup language includes all of the features of HTML and programming extensions
Term
spider
Definition
a software robot that systematically searches the web is a
Term
portals
Definition
yahoo!, MSN, and netscape are examples of
Term
pull technology
Definition
_____ is used when information is delivered to a client computer through a server at the clients request
Term
RSS
Definition
_____ is an XML form of sharing data
Term
peer-to-peer file sharing
Definition
using napster to make music files from one hard drive available to others rather than posting them on a central server is an example of
Term
85
Definition
in a survey of more than 500 companies and government agencies, ___ percent detected computer security breaches
Term
$377 Million
Definition
the survey showed that these businesses lost more than _____ due to security breaches
Term
trusted employee with no criminal record
Definition
the typical computer criminal is a(n)
Term
insiders
Definition
the majority of computer crimes are committed by
Term
spoofing
Definition
the common name for the crime of stealing passwords is
Term
internet fraud
Definition
the FBI's operation cyber loss was designed to crack down on
Term
identity theft
Definition
collecting personal information and effectively posing as another individual is known as the crime of
Term
social engineering
Definition
____ is the term for the use of deception to get someone's sensitive information
Term
malware
Definition
malicious software is known as
Term
trojan horse
Definition
a program that performs a useful task while simultaneously allowing destructive acts is
Term
virus
Definition
an intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a
Term
email virus
Definition
in 1999, the melissa virus was a widely publicized
Term
macro virus
Definition
this virus that attaches itself to macros is called
Term
worm
Definition
what type of virus uses computer hosts to reproduce itself
Term
microsoft server software
Definition
the code red worm attacked
Term
memory or disk space
Definition
the thing that eventually terminates a worm is a lack of
Term
time bomb
Definition
when a logic bomb is activated by a time-related event, it is known as a
Term
time bomb
Definition
a logic bomb that was created to erupt on Michelangelo's birthday is an example of a
Term
spybot
Definition
what is the name of an application program that gathers information and sends it to someone through the internet
Term
drive-by download
Definition
when you visit certain web sites spyware may be automatically downloaded. this is called a
Term
easier
Definition
standardization of microsoft programs and the windows operating system has made the spread of viruses
Term
a web pages in the HTML code
Definition
HTML viruses infect
Term
security patches
Definition
software programs that close potential security breaches in an operating system are known as
Term
a denial of service attack
Definition
when customers of a web site are unable to access it due to a bombardment of fake traffic, it is known as
Term
hacking
Definition
unauthorized access to computers is called
Term
cracking
Definition
criminal hacking is called
Term
webjackers
Definition
hackers who hijack legitimate web sites and redirect users to other sites are called
Term
biometrics
Definition
____ is the measurement of things such as finerprings and retinal scans used for security access
Term
passwords
Definition
what is the most common tool used to restrict access to a computer system
Term
123
Definition
the most common passwords in the US or britain include all of the following except
Term
firewall
Definition
hardware or software designed to guard against unauthorized access to a computer network is known as a(n)
Term
encryption
Definition
the scrambling of code is known as
Term
cryptosystem
Definition
if you want to secure a message, us a(n)
Term
UPS
Definition
to prevent the loss of data during power failures, us a(N)
Term
surge protector
Definition
a(n) ____ can shield electronic equipment from power spikes
Term
open all e-mail messages but open them slowly
Definition
all of these are suggestions for sage computing except
Term
PGP
Definition
freeware _____ encrypts data
Term
computer crime
Definition
___ is defines as any crime completed through the use of computer technology
Term
passwords
Definition
most computer systems rely solely on ____ for authentication
Term
privacy settings
Definition
creating strong computer security to prevent computer crime usually simultaneously helps protect
Term
100 billion dollars
Definition
over ____ was spent by businesses and government to repair problems in regard to Y2K
Term
autonomous system
Definition
what is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making
Term
reduce but not eliminate risks
Definition
security procedures can