Shared Flashcard Set

Details

CMPE3 Final (Ch. 7-10)
N/A
71
Computer Science
Undergraduate 3
12/12/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Unambiguous
Definition
Database queries must be
Term
Uniquely identify a record
Definition
A key field must
Term
Importing
Definition
Bringing data from a word processing program into a database program is known as
Term
Application
Definition
Database software is an example of a(n)
Term
Numeric
Definition
The number of newspapers sold on May 30 would be kept in a ________ field
Term
Libraries must turn over their patrons' records
Definition
An aspect of the USA Patriot Act is the requirement that when presented with appropriate warrants
Term
Computerized file cabinet
Definition
A(n) ________ is a good comparison to a database
Term
Batch
Definition
________ processing is used when a large mail-order company accumulates orders and processes them together in one large set
Term
Accumulates so much data that it is difficult to use efficiently
Definition
One disadvantage of data mining is that it
Term
Text field
Definition
In a customer database, a customer's surname would be keyed into a
Term
Record
Definition
In a customer database table, all of the information for one customer is kept in a
Term
Browsing
Definition
________ is perusing data in a database as if looking through pages in a notebook
Term
Create graphics
Definition
Database programs can do all of the following EXCEPT
Term
Query language
Definition
The following is an example of:
Select Student_ID From Students Where Major = Business and Credits >= 46
Term
Natural
Definition
When a person uses language like ordinary English to query a database, it is known as a(n) ________ language query.
Term
Database
Definition
A collection of information stored in an organized form in a computer is a(n)
Term
Personal Information Manager
Definition
PIM stands for
Term
Middleware
Definition
________ is connectivity software that hides the complex interaction between client and server computers and creates a three-tier design separating actual data from the programming logic used to access it.
Term
Spam
Definition
Unwanted junk email is known as
Term
Socket that enables information to move in or out
Definition
A port is a
Term
Terminal emulation
Definition
________ software enables a computer to function as a simple input/output device for sending messages to a host computer.
Term
Standard phone modem
Definition
A Broadband connection could be any of the following EXCEPT:
Term
3G
Definition
________ is new technology currently available in Japan, much of Europe, and some major US cities. It uses high-bandwidth connections to communicate multimedia over wireless networks.
Term
A user is connecting to a network through phone line, television cable, or wireless link
Definition
Remote access means that a
Term
Twisted pair
Definition
Standard telephone cables containing copper wires are known as ________ cable
Term
GPS
Definition
The system of satellites used to determine any position on the Earth is known as
Term
Network interface card
Definition
NIC stands for
Term
Server
Definition
A ________ is a high-speed, high-end computer that shares data and other resources with client computers
Term
Analog
Definition
A(n) ________ signal is represented by a continuous wave
Term
Avatars
Definition
Graphical bodies used to represent a person in a virtual meeting place are known as
Term
Web bug
Definition
A(n) ________ is code embedded as a one-pixel graphics file in a Web page or email message
Term
POP
Definition
Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server.
Term
Bluetooth
Definition
A personal area network is possible because of the wireless technology known as
Term
Online role-playing games involving hundred of thousands of players
Definition
MMORPGs are
Term
WEP
Definition
The ________ encryption scheme improves the security of wireless networks
Term
NIC
Definition
A(n) ________ adds a special serial port to a computer so it can be directly connected to a network
Term
Coaxial cables for television cables
Definition
Cable modems use the same media as
Term
Department of defense
Definition
What was the department of the U.S. government that developed the initial stages of the Internet?
Term
Narrowband
Definition
Telephone modem connections are also called ________ connections, because they offer little bandwidth compared to other types of connections.
Term
A few dozen computers at universities and government research centers
Definition
The first users of the Internet were
Term
Gateway
Definition
A ________ is a computer connected to two networks
Term
Country code
Definition
In the Web address www.casamexicana.com.mx, mx is a(n)
Term
Standards not owned by any company
Definition
Open standards refers to
Term
.army
Definition
All of the following are top-level domains EXCEPT
Term
Peer-to-peer file sharing
Definition
Using Napster to make music files from one hard drive available to others rather than posting them on a central server is an example of:
Term
Email server
Definition
A university might have a(n) ________ to manage the mail of students, faculty, and staff
Term
Host computer in an educational domain
Definition
In the e-mail address bowles@sou.edu, sou is the
Term
Backbone network
Definition
In a large organization LANs may be connected through a
Term
A domain name registry company
Definition
To register a business name and create a unique URL, a business pays a fee and goes to
Term
Pull technology
Definition
________ is used when information is delivered to a client computer through a server at the clients request.
Term
Portals
Definition
Yahoo!, MSN, and Netscape are examples of
Term
Direct satellite
Definition
The three basic categories of connection to the Internet include all EXCEPT
Term
.bus
Definition
All of the following are top-level domains EXCEPT
Term
Static IP address
Definition
This address doesnt change every day
Term
Identity theft
Definition
Collecting personal information and effectively posing as another individual is known as the crime of
Term
Security patches
Definition
Software programs that close potential security breaches in an operating system are known as
Term
100 billion dollars
Definition
Over ________ was spent by businesses and government to repair problems in regard to Y2K
Term
A trusted employee with no criminal record
Definition
The typical computer criminal is a(n)
Term
Encryption
Definition
The scrambling of code is known as
Term
Memory or disk space
Definition
The thing that eventually terminates a worm is a lack of
Term
Malware
Definition
Malicious software is known as
Term
Cracking
Definition
Criminal hacking is called
Term
Virus
Definition
An intentionally disruptive program that spreads from either from program-to-program or from disk-to-disk is known as a
Term
Autonomous system
Definition
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?
Term
A web page in the HTML code
Definition
HTML viruses infect:
Term
Firewall
Definition
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)
Term
Passwords
Definition
Most computer systems rely solely on ________ for authentication
Term
Trojan horse
Definition
A program that performs a useful task while simultaneously allowing destructive acts is a
Term
Biometrics
Definition
________ is the measurement of things such as fingerprints and retinal scans used for security access
Term
Microsoft server software
Definition
The Code Red worm attacked
Term
Email virus
Definition
In 1999, the Melissa virus was a widely publicized
Supporting users have an ad free experience!