Term
|
Definition
| consists of the program that control or maintin the opeations of the computer and its devices. 2 types: operating systems, utility programs |
|
|
Term
|
Definition
| part of system software, a set of programs contiaining instructions that work together to coordinate all the actvities amoung computer hardware resources Primary: boot comp., user interface, memory manager, scheduler, file manager Secondary: configure/manage devices, establish and manage network connecion, monitor performace, provide file mnagemnt, administer security |
|
|
Term
|
Definition
| operating system function of starting or restarting computer. Cold boot: turning on comp that has been off Warm boot: using operating system to restart computer |
|
|
Term
|
Definition
| single user system where user can work on two or more programs that reside in memory at the same time |
|
|
Term
|
Definition
| multiuser system where two or more users can run programs that reside in memory at the same time |
|
|
Term
|
Definition
| operating system that supports parallel processing with multiple processors |
|
|
Term
|
Definition
| operating system function: keeps track of files on seconday storage, keeps track of various file systems, keeps working copies if file is open, magages file creations, up dates, and deletes |
|
|
Term
|
Definition
| secondary operating system function, sending print jobs to buffer instead of directly to printer, print jobs line up in queue (ITC) |
|
|
Term
|
Definition
| secondary operating system function, program that assesses an reports info about various comuter resources and devices |
|
|
Term
|
Definition
| secondary job of operating system, password protection, virus protection, firewalls, spam protection, encryption, logs |
|
|
Term
|
Definition
| part of system software, allows a use to perform maintenance-type tasks |
|
|
Term
|
Definition
| utility program that performs functions related to file management: display list of files, organize files, copying/renaming/deleting/moving/sorting files and folders, creating shortcuts |
|
|
Term
|
Definition
| utility program that reorganizes files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster |
|
|
Term
|
Definition
| utility program tht detects and protects a comp from unauthorized intrusions |
|
|
Term
|
Definition
| potentially damaging computer program that affects a computer negatively |
|
|
Term
|
Definition
| hides within or looks like a leitimate program |
|
|
Term
|
Definition
| copies itself repeatedly in memory or over a network |
|
|
Term
| types of operating systems |
|
Definition
| STAND-ALONE: complete operating system that works on a comp (multitasking), SERVER, EMBEDDED: resides on ROM chip on mobile device or electronic device |
|
|
Term
|
Definition
| any type of hardware capable of transmitting data, instructions, and information between a sending device and a recieving device |
|
|
Term
| GPS (global positioning system) |
|
Definition
| muse of communication, navigation system that consists of one or more earth-based recievers that accept and analyze signals sent by satellites in order to determine the GPS reviever's geographic location |
|
|
Term
|
Definition
| web application that combines services from two or more sources (services-create applications that communicate w/ other computers over internet or business network) |
|
|
Term
| asynchronous communication |
|
Definition
| speaker may speak at anytime |
|
|
Term
|
Definition
| once message starts, it must flow continuously as it is spoken (video) |
|
|
Term
| ATM (asynchrnous transfer mode) |
|
Definition
| service that carries voice, data, video, and multimedia at extremely high speds, telephone network and internet |
|
|
Term
|
Definition
| collection of computers and devices connected together via communications devices and transmission media: facilitating communications, sharing hardware, sharing data and info, sharing software, transferring funds |
|
|
Term
| PSTN (public switched telephone network) |
|
Definition
| worldwide telephone system, downstream faster thanupstream |
|
|
Term
|
Definition
| design of computers, devices and media on a network |
|
|
Term
|
Definition
| the layout of the computers and devices in a communications network ex: star, ring, bus |
|
|
Term
|
Definition
| fire wall, intranet uses intrnet technology, extranet allows customers/supliers access part of its intranet |
|
|
Term
|
Definition
| network communication standard that specifies no computer controls when data can be transmitted |
|
|
Term
|
Definition
| network communication standard that defines how messages are routed from one end of a network to another |
|
|
Term
|
Definition
| two bluetooth devices use short-range radio waves to transmit data |
|
|
Term
|
Definition
| 802.16, develeped by IEEE, towers can cover a 30 mile radius, two types are fixed wireless nd mobile wireless, provides wireless broadband internet access |
|
|
Term
|
Definition
| help users establish a connectio to another computer or network, manage the transmission of data, instructions, and info, provides an interface for users to communicate with one another |
|
|
Term
|
Definition
| connects multiple computers or other routers together and transmits data to its correct destination on a network, many are protected by a hardware firewall, can be used to set packet security rules |
|
|
Term
|
Definition
| connects several devices in a nework together |
|
|
Term
|
Definition
| communication channel, media transmit multiple signals simutaneously |
|
|
Term
|
Definition
| communication channel, the time it takes a signal to travel from one location to another on a network |
|
|
Term
| DBMS (database management system) |
|
Definition
| allows users to create computerize database, add/modify/and delete data, sort and retrieve data, create forms and reports from data |
|
|
Term
|
Definition
| utility program, makes files smaller, sometimes compressed files are calld zipped files |
|
|
Term
|
Definition
| small program that tells an operating system how to communicate with a specific device |
|
|
Term
|
Definition
| contains data about each file in the database and each field in those files |
|
|
Term
|
Definition
| stores data in tables that consist of rows and columns |
|
|
Term
|
Definition
| provides GUI to assist users with retrieveing data |
|
|
Term
| OODB (object-oriented database) |
|
Definition
| stores data in objects ex: multimedia database, groupware, hypertext, and computer aided design database |
|
|
Term
| Multidimensional database |
|
Definition
| can store data in more than two dimensions of data (aka hypercube), faster than relaional |
|
|
Term
|
Definition
| huge database that stoes and manages the data required to analyze historical and current transactions |
|
|
Term
|
Definition
| utility program, reorganizing a disk so that the files are stored in continuous sectors, thus speeding up disk access and performance of computer |
|
|
Term
|
Definition
| websites with information that a webmaster makes available to users, primarily intended for traditionl desktop/laptop computers, pull-based, vendor driven web content; sites include: text, hyperlinks, images, audio, animation, video. yahoo, msn, aol |
|
|
Term
|
Definition
| shift to facilitation of communication, collaboration, and information sharing, pull-based, user-driven: social networks, youtube, wikis, blogs. wikipedia, blogger, myspace,facebook, flicker. also software as a service: google apps, juice, delicious |
|
|
Term
|
Definition
| science of classifying things |
|
|
Term
| RSS (really simple syndication) |
|
Definition
| specification that content agregators use to distribute content to subscribers, read content you want, no spam, no email box clutter/overflow, saves browsing time |
|
|
Term
|
Definition
| historically the operating system, but with web 2.0 it is becoming the internet |
|
|
Term
|
Definition
| not developed yet, ubiquitous technology, transparently serving us, push-based, machine to machine, huge searchable database |
|
|
Term
|
Definition
| the process of converting readable data into unreadable chaacters to prevent unauthorized access |
|
|
Term
|
Definition
| uses two keys - public key and private/secret key (known only to the recipeint of the message). john wants to send a secure message to jane, he uses jane's public key to encrypt the message, jane ten uses her private key to decrypt it |
|
|
Term
| UPS (uninterruptabe power supplies) |
|
Definition
| device that contains surge protected circuits and one or more batteries that can provide power during a temporary or permanent loss of power |
|
|
Term
|
Definition
| an applid science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace |
|
|
Term
|
Definition
| a small text file that a web server stores on your computer, used to: allow for personalization, store users' passwords, assist with online shopping, track how often users visit a site, target advertisements |
|
|
Term
|
Definition
| a scam where a perpetrator attempts to obtain your personal and financial informaion via spoofing |
|
|
Term
| ERD (entity-relationship diagram) |
|
Definition
| tool that graphically shows the connections among entities in a system |
|
|
Term
|
Definition
| developing, 13 different diagrams |
|
|
Term
|
Definition
| (proof of concept) a working model of the proposed system, inadequate or missing documentation, users embrace pototype as final system |
|
|
Term
| CAD (computer-aided design) |
|
Definition
| uses a computer and special software to aid in enginering, dafting, and design |
|
|
Term
| CIM (computer-integrated manufacturing) |
|
Definition
| uses computers to integrate the many different operations of the manufacturing process |
|
|
Term
| MRP and MRP II(material requirements planning) |
|
Definition
| uses software to help monitor and control processes rated to production, MRP II is an extenson of MRP, includes software that helps in scheduling |
|
|
Term
| CIM (customer interaction management) |
|
Definition
| software manages the day-to-day interactions with customers |
|
|
Term
| OIS (office information system) |
|
Definition
| enables employees to perform tasks using computers and other electronic devices instead of manually, sometimes called (OA), users create graphics and documents, send messages, schedule appointments, and browse the web |
|
|
Term
| TPS (transaction processing system) |
|
Definition
| captures and proceses data from day-to-day transactions |
|
|
Term
| EIS (executive infomation system) |
|
Definition
| support needs of executive management |
|
|
Term
| VPN (virtual private network) |
|
Definition
| provides mobile users, vendors, and customers with a secure connection to the company network server |
|
|
Term
|
Definition
| duplic data and implements duplication in different ways |
|
|
Term
|
Definition
| duplicate writes to two disk systems |
|
|
Term
|
Definition
| a file is broken into either 512 byte sectors or varying strip size or block size pieces and read/written across many disks simultaneously |
|
|
Term
| MAN (metropolitan area network) |
|
Definition
| high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communictions activity across that region |
|
|
Term
| AI (artificial intelligence) |
|
Definition
| the application of human intelligence to computers |
|
|
Term
|
Definition
| microsoft's set of technologies that allows almost any type of program to run on the internet or an internal business network, as well as stand alone computers and mobile devices |
|
|
Term
|
Definition
| program that assists in the management and tracking of all the activities in a business process from start to finish |
|
|
Term
|
Definition
| online area in which users have written discussions about a particular subject |
|
|
Term
|
Definition
| compromised computer whose owner is unaware the computer is being controlled remotely by an outsider |
|
|
Term
|
Definition
| assult on a computer or network whose purpose is to disrupt computer access to an internet service such as the web or email |
|
|
Term
|
Definition
| measure of how suitable the development of a system will be to the organization |
|
|
Term
| WAP (wireless appliction protocol) |
|
Definition
| network standard, specifically a protocol, that specifies how some wireless mobile devices such as smart phones can diplay the content of intenet services such as the web, email, and chat rooms |
|
|
Term
|
Definition
| terminal used by retail stores to record purchases, process credit or debit cards, and update inventory |
|
|
Term
|
Definition
| sharig information with other information systems within an enterprice |
|
|
Term
|
Definition
| network that connects computers and devices in a limited geographical area such as home, school computer lab, office building, or closely positioned group of buildings |
|
|
Term
| SFA (sales force automation) |
|
Definition
| software that equips traveling salespeople with the electronic tool they need to be more productive |
|
|
Term
|
Definition
| encrypted code that a person, web site, or orgaization attaches to an electronic message to verify the identity of the message sender |
|
|
Term
| XML (extensible markup language) |
|
Definition
| format for sharing data that allows web developers to create customized tags, as well as use predified tags |
|
|
Term
|
Definition
| program placed on a computer without he user's knowledge that secretly collects information about the user |
|
|
Term
|
Definition
| technology of authenticating a person's identity by verifying a personal characteristic |
|
|
Term
|
Definition
| computer that controls access to the hardware, software, and other resources on a network and provides a centraized storage area for programs, data, and information |
|
|
Term
|
Definition
| measure of how well computer hardware, software or an information system can grow to meeting increasing perfomance demands |
|
|
Term
| HTML (hypertext markup language) |
|
Definition
| special formatting language that programmers use to format documents for display on the web |
|
|
Term
|
Definition
| network that covers a large geographic area (city, country, world) using a communications channel that combines many types of media such as telephone line, cables, and radio waves |
|
|
Term
| SDLC (system development life cycle) |
|
Definition
| 1)analyze the requirement 2 design the solution 3 validate the design 4 implement the design 5 test the solution 6 document the solution |
|
|
Term
|
Definition
| program or set of instructions in a program that allow uses to bypass security controls when accessing a program, computer or network |
|
|
Term
|
Definition
| software that helps groups of people work together on projects and share information over a network |
|
|
Term
|
Definition
| term used by developer of relational databases for record |
|
|
Term
|
Definition
| java platform enterprise edition, platform for server programming in java programming language |
|
|
Term
|
Definition
| aka voice over internet protocol (VoIP), general term for a family of transmission technologies for delivery of voice communications over IP networks such as internet |
|
|
Term
| MMS (multimedia message service) |
|
Definition
| picture and video messaging service |
|
|
Term
|
Definition
| server that acts as an interediary for requests for clients seeking resources from other servers |
|
|
Term
|
Definition
| refers to the ability of software to operate on more than one platform with identical functionality |
|
|
Term
| CASE (computer aided software engineering) |
|
Definition
| a category of software that provides a development environment for prgramming teams |
|
|
Term
|
Definition
| installation of optical fiber from a telephone switch directly into the subscriber's home |
|
|
Term
| BIOS (basic input/output system) |
|
Definition
| part of system software load and execute the operating system |
|
|
Term
|
Definition
| interactive language for text formatting and typesetting |
|
|
Term
| VAN (value added network) |
|
Definition
| network that provides specific service, such as legal research or access to a speciaized database |
|
|
Term
| AUP (acceptable use policy) |
|
Definition
| transit networks which restrict the use to network |
|
|
Term
|
Definition
| links records together like a family tree such that each record type has only one owner |
|
|
Term
|
Definition
| american standard code for information interchage, character sets used in most computers uses only the lower seven bits, replaced EBCDIC |
|
|
Term
|
Definition
| communicates packets that are individually routed between nodes |
|
|
Term
| RFI (radio frequency interference) |
|
Definition
| electromagnetic radiation which is emitted by elctrical circuits carrying rapidly changing sinlas |
|
|
Term
| SMS (short message sevice) |
|
Definition
| a message service offered by cell phones |
|
|
Term
|
Definition
| a type of data warehose designed primarily to address a specific function or department's needs |
|
|
Term
|
Definition
| analysis of data in a database using tools which look for trends or anomalies without knowledge to the meaning of the data |
|
|
Term
|
Definition
| hypertext transfer protocol |
|
|
Term
|
Definition
| part of operating system, responsible for resource allocation |
|
|
Term
|
Definition
| a shared or group intelligence that emerges from the collaboration and competition of individuals |
|
|
Term
|
Definition
| graphically shows how actors (users) interact with information |
|
|
Term
|
Definition
| is a set of activities used to build an information system |
|
|