Term
|
Definition
| allows computers to communicate and negotiate with customers through electronic funds transfers and electronic data interchange |
|
|
Term
|
Definition
| the removalof supply chain intermediaries |
|
|
Term
| ergonomics (human factors) |
|
Definition
| scientific application of information about humans to the dessign of objects, systems and environments that humans interact with (makes computers more comfortable through keyboards, mouses etc) |
|
|
Term
| assistive technology products include |
|
Definition
| public access, text to speech, dragon naturally speeking |
|
|
Term
|
Definition
| an assistive technology product that ensures public with disabilities have access to public accomidations |
|
|
Term
|
Definition
| an assistive technology product that is software that aids in reading documents through typed word to sound |
|
|
Term
| dragon naturally speeking |
|
Definition
| an asistive technology product that is a speech recognition program that allows the computer to use spoken commands |
|
|
Term
| social concerns with computer use include |
|
Definition
-child protection (protecting and preventing inappropriate material) -computer addiction -pornography (wide spread and addictive, said to be first use of e commerce) -dangerous information (banned books, political discussions, how to etc) |
|
|
Term
|
Definition
| the study and practice of using computing resources efficiently with a world wide perspective (buying green, save trees, recycle etc) |
|
|
Term
| "computer as the target" crime |
|
Definition
| crimes in which theft of intellectual property, marketing information, computerized files, and other info |
|
|
Term
| "computer as the instrument of the crime" crime |
|
Definition
| involves converting legitimate computer processes for illegitimate purposes |
|
|
Term
| "computer is incidental to other crimes" crime |
|
Definition
| not related to teh criminal act but assisted it to make it easier / faster |
|
|
Term
| "crimes associated with the prevelance of computers" crime |
|
Definition
| single presence of computers generate new versions of traditional crimes |
|
|
Term
| ways to protect data include |
|
Definition
-discard unnecessary materials -seperate job functions -allow audit checks of data and security systems |
|
|
Term
|
Definition
| a plan that is made to recover necesary information from a backup and recover a system fast and efficiently without downtime |
|
|
Term
|
Definition
| intput data > process data > output information |
|
|
Term
|
Definition
| processing of providing a context for data |
|
|
Term
|
Definition
|
|
Term
|
Definition
| using bits (1s and 0s) to make code and context and shit |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the american standard code for information interchange, states a standard for bit pattern representations |
|
|
Term
|
Definition
| when comensation techniques are used to reduce the number of bytes required to store certain kinds of data (used for faster transmission of data) |
|
|
Term
|
Definition
| one component of the computer that ties the rest together |
|
|
Term
| components of a motherboard |
|
Definition
|
|
Term
|
Definition
| the processor on teh motherboard |
|
|
Term
|
Definition
| main body of a computer that provides an enclosure of the important shit |
|
|
Term
| Central Processing Unit CPU |
|
Definition
| processes data by intrepreting and executing instructions that are contained in computer programs |
|
|
Term
|
Definition
| CPU manufactured wuth integrated circuits |
|
|
Term
|
Definition
| manager that keeps things organized and synchronized in teh system unit |
|
|
Term
|
Definition
| where the mathematical and logical operations are performed within the system unit |
|
|
Term
|
Definition
| processor that combines 2 or more independent processors into one package (also called chip level multiprocessing) |
|
|
Term
| processor speed is displayed in... |
|
Definition
|
|
Term
|
Definition
| one billion hertz (one billion cycles per second) |
|
|
Term
|
Definition
| instructions per second (one million per second, used to benchmark processors) |
|
|
Term
|
Definition
| floating point operations per second (performance based) |
|
|
Term
|
Definition
| a subsystem that transfers data between components |
|
|
Term
|
Definition
| temporary but fast storage |
|
|
Term
|
Definition
| within the computer and closely connected to the processor (programs are held here while running) |
|
|
Term
|
Definition
| the time between the processor initiating a request for a byte or word in memory until it is retrieved |
|
|
Term
|
Definition
| special high speed memory (not necessary to communicate with RAM) |
|
|
Term
|
Definition
| read only memory, hard to edit so its main uses are for distribution of firmware |
|
|
Term
|
Definition
| software closely related to hardware |
|
|
Term
|
Definition
| allows multitasking computers to think that teh computer has more primary memory that it actually has |
|
|
Term
| mainframe (category of computer) |
|
Definition
| used by large organizations for the use of bulk data processing |
|
|
Term
| super computer (computer category) |
|
Definition
| processes data exceptionally fast (forecastting and simulation) |
|
|
Term
| microcomputers (computer category) |
|
Definition
| personal coputers, one user, desktops adn laptops |
|
|
Term
| workstations (computer category) |
|
Definition
| powerful high end microcomputers used for applications requesting more power |
|
|
Term
| minicomputers (computer category) |
|
Definition
| multiple users for processign transactions |
|
|
Term
| types of input devices include |
|
Definition
keyboard mouse microphone camera scanner barcode readers card reader speech recognition |
|
|
Term
|
Definition
-mechanical (ball on bottom) -optical (light on bottom) -touchpad (on laptops used through tough) -trackball (rotating ball on top) |
|
|
Term
|
Definition
monitors graphic cards printers plotters speakers digital music players |
|
|
Term
|
Definition
| expressed in dot pitch and dots per inch |
|
|
Term
|
Definition
| number of individual pixels on display. given in ratios of horizontal x vertical |
|
|
Term
|
Definition
| the frequency with which the monitors display is refreshed |
|
|
Term
|
Definition
| array of colora a computer can display, (24 bit is up to 16million colors) |
|
|
Term
| 2 measures of printer performance are |
|
Definition
-DPI dots per minute -PPM pages per minute |
|
|
Term
|
Definition
-laser -ink jet -dot matrix (impact printer that runs back and forth and prints by impact) -photo printers (ink jets that are made to do high quality pics) -thermal printer (heated and shit, does receipts) |
|
|
Term
|
Definition
| devide that modulates a carriers signal to encode a computers digital data, and then demodulates the signal to decode the data |
|
|
Term
|
Definition
| used to trasmiit the modems signal to a computer (access point is the router and knows as WIFI) |
|
|
Term
|
Definition
| the master program controlling all resources within a computer |
|
|
Term
| tasks of operating systems |
|
Definition
process management memory management file system mapping file association |
|
|
Term
|
Definition
| runs programs and allocates memory, deals with running multiple processes, uses context switching |
|
|
Term
|
Definition
| when the OS tracks what is needed and what is available and then reallocates memory (virtual memory management) |
|
|
Term
|
Definition
| files must be managed and kept track of by teh OS, keep from fragmenting |
|
|
Term
|
Definition
| OS nagigating in a logical way of physical location of content to the logical content of a file |
|
|
Term
|
Definition
| al files that are the same type will have the same extension |
|
|
Term
|
Definition
| OS that multitasks teh ability to run several programs at once, opened door to many people unable to use command syntax |
|
|
Term
|
Definition
| OS that is used in servers and workstations, programmed in language C, open systems/free software, master program is Kernel, strings together small programs to do bigger shit |
|
|
Term
|
Definition
| OS like Unix, best example of open source development and free software, all programs are available to use by anybody, cameras/ps3/phones/mainframes/supercomputers |
|
|
Term
|
Definition
| OS that eliminated possibility of one program crashing others, unix style multitasking |
|
|
Term
|
Definition
| copies of different OS's can run on one computer at the same time |
|
|
Term
|
Definition
| scans and searchign for errors in files |
|
|
Term
|
Definition
| scans an entire disck drive and looks for segments of unused disk area (helps computer run better and prevent data loss) |
|
|
Term
|
Definition
| allows you to remove unused or little used files |
|
|
Term
|
Definition
| overcomes sluggishmess from background idle programs running in RAM |
|
|
Term
|
Definition
| extends amount of RAM available by external memory used as an addition cache |
|
|
Term
|
Definition
| allows users to control hundreds of teh computers individual components |
|
|
Term
|
Definition
| like an OS, enables other software to run properly |
|
|
Term
|
Definition
| like word processors, enables a user to perform a task |
|
|
Term
|
Definition
| devide drivers link software to hardware |
|
|
Term
|
Definition
| software is an intermediary between hardware and data (data=input and output) |
|
|
Term
| computer programing relationship |
|
Definition
| application software is usually written in high level programming language called source code and translated into machine language |
|
|
Term
|
Definition
| programs execute by users telling it what to do |
|
|
Term
|
Definition
| everything goes through the operating system |
|
|
Term
|
Definition
-used in computers cabinets or externel drives that are fast and store a large amount -round rotation plates called platters -sectors are pie shape part of platter -organizaed in rigns called tracks |
|
|
Term
|
Definition
| stores data on a rotating surface (1.44 MB's) |
|
|
Term
|
Definition
| USB drives and solid state (up to a few GB's) |
|
|
Term
| RAID redundant array of independent disks |
|
Definition
| technique that devides or replicates data among multiple hard drives (in tolerant computers, adds reduntand data, reduces data loss) |
|
|
Term
|
Definition
| replication of logical disk volumes onto seperate hard disks in real time to ensure continuous availability of data, helps disaster recovery |
|
|
Term
|
Definition
| optical storge device that contains data that is assessable to a computer from cd rom drive, stored by microscopic indentions called pits and read into bianary data, about 650 MB of data |
|
|
Term
|
Definition
| like a cd but 4-5 gb of storage |
|
|
Term
|
Definition
| unharmful data loss not intended to damage |
|
|
Term
|
Definition
|
|
Term
|
Definition
| an aggressive attempt to prevent ligittimate users of a service from using that service or the server its installed on |
|
|
Term
|
Definition
| protection of propriority information between employeed and viruses |
|
|
Term
|
Definition
| prevent through geolocation and order velocity monitoring |
|
|
Term
| how can a copany protect against fraud |
|
Definition
-information acquisition (does the business have a good reason to access info?) -storage (what computer security measures are placed aroun the systems storing personal data?) -data access (is personal identifying info available only to those that need to know) -data disposal (once data isnt needed is it disposed) -personnel (are background checks and shit done?) |
|
|
Term
|
Definition
| [iece of data stored in a text file on a computer |
|
|
Term
|
Definition
| cookie that accesses personal data and sends it to a server somewhere over the fucking rainbow |
|
|
Term
|
Definition
| virus attached to an email for transportation between computers |
|
|
Term
|
Definition
| written in scripted language and spread by inflecting documents and spreadsheets |
|
|
Term
|
Definition
| shitspread through emails |
|
|
Term
|
Definition
| travel through messaging networks |
|
|
Term
| file sharing networks worms |
|
Definition
| copy themselves to shared folders on hard disks |
|
|
Term
|
Definition
| use TCP/IP communication ports |
|
|
Term
|
Definition
| pretend to be something else to trick a user |
|
|
Term
|
Definition
| technique embedded in a program that enables recording and reporting of users key strokes |
|
|
Term
|
Definition
| trickign a person into giving away private account info |
|
|
Term
|
Definition
| tools used to monitor the activity of consumers at a website |
|
|
Term
|
Definition
| abuse of email or messaging networks to send unsolicited and undesired messages |
|
|
Term
|
Definition
| is a ocmputer attached to teh internet that has been compromised by a securiy hacker or trojan or virus |
|
|
Term
|
Definition
| set of software tools intended to conceal runnign proceses, files, or system data from the operating system |
|
|
Term
|
Definition
| when someone elses personal information is used to commit fraud or crimes |
|
|
Term
|
Definition
| crime and involves using illegally obtained information to committ fradulent tasks |
|
|
Term
| password hacking (cracking of passowrds) can be done by... |
|
Definition
-guessing -dumpster diving -shoulder surfing -brute force attack (going through options) -distionary attack (tries all combos likely to succeed) -packet sniffing (interccepting and logging traffic through a network) |
|
|
Term
|
Definition
| tomaintain a high standard of data quality and define acceptable behaviors |
|
|
Term
| what to consider when backing up files |
|
Definition
-schedule back ups -making multiple copues of backups -storage of backup copies should be physical and away from source -data compression is important when there is more data than media space |
|
|
Term
|
Definition
| process of obsuring information to make it unreadable without special knowledge |
|
|
Term
|
Definition
| using alogorithims to encrypt and decrypt |
|
|
Term
| electronic funds transfer |
|
Definition
| provides payments and collection of receipts using electronic networks and equipment |
|
|
Term
| electonic data interchange |
|
Definition
| thecomputerto computer interchange of structured information |
|
|
Term
|
Definition
| using computers and networks to automate commercial transactions |
|
|
Term
|
Definition
business to business business to comsumer customer to customer business to governmet citizen to government business to |
|
|
Term
| what lures businesses towards e commerce |
|
Definition
lower transaction costs larger purchases per transactions business cycle integration people shop in different ways larger catelogs enhanced customer interaction new business models |
|
|
Term
| 4 main types of intermediaries who participate in e commerce |
|
Definition
brokers auctioneers exchanges dealers and resellers |
|
|
Term
| success factors of e commerce |
|
Definition
market research interface documentation security inviting value incentive |
|
|
Term
|
Definition
unfulfilled expectations unsatisfactory web experience navigation motivation awkward proceesses security suitability |
|
|
Term
| fraud concerns related to e commerce |
|
Definition
stolen credit cards phishing click fraud auction adn retail schemes markt manipulation spam |
|
|
Term
|
Definition
| software as services model |
|
|
Term
|
Definition
|
|
Term
|
Definition
| sensor so small that it floats in teh air, monitors the environment |
|
|
Term
|
Definition
| system for collecting, storing, managing, and analyzing data which are referenced to the earth |
|
|
Term
|
Definition
| little medical things that patrol the body and repeal invaders, like an artificial immune system |
|
|
Term
|
Definition
| focus on learning on users interests and act on users behalf |
|
|
Term
|
Definition
| little deals that compare prices on the internet and disable viruses before they reach a computer |
|
|
Term
|
Definition
| basically an internet with more artificial shit |
|
|
Term
|
Definition
| family of digital video compression standards |
|
|
Term
|
Definition
| graphic interchange format (8 bit per pixel bitmap image format |
|
|
Term
|
Definition
| standard digital audio file format for storing sound data, allows audio recording to be captured and stored often on a cd |
|
|
Term
|
Definition
| allows peripheral devices to be connects without the need to plug expansion cords into the computers |
|
|
Term
|
Definition
| describes the process for attaching a new device to the computer system, allows the addition of a new device without requiring reconfiguration or manual installiation |
|
|
Term
|
Definition
| basic input/output system, small program run by a computer when first powered on, used to stabilize the machine and shti |
|
|
Term
| graphical user interfaces |
|
Definition
| allows users to navigate a computer using a mouse |
|
|