data/information
Computers process ____ to create ___________.
Input device
Any hardware component that allows you to enter data and instructions
into a computer (i.e. keyboard, mouse, microphone, scanner, webcam)
Output device
Any hardware component that conveys information to one
or more people (i.e. printer, monitor, speakers)
System unit
A case that contains the electronic components of the computer that
are used to process data.
Mother board
Where is the circuitry of the system unit located?
Storage device
Holds data, instructions, and information for future use.
Storage media
USB flash drives, hard disks, optical
discs, DVD disc, and memory cards are examples of?
Storage device
records(writes) and/or retrieves (reads) items to and from
storage media (i.e. DVD drive)
Communications device
A hardware
component that enables a computer to send
The internet
Combination of NSFnet and ARPANET gave birth to?
Dial-up internet
What service? Modem in the computer connects to the internet via a
standard telephone line that transmits data and information using an
analog signal.
Top-level domain
Last section of a domain name (.com, .net, .org)
Application software
programs designed to make users more productive and/or assist them
with personal tasks.
Multi-core processor
A single chip with two or more separate processor cores.
Dual-core processor
A chip that contains two separate processor cores.
Quad-core processor
Control unit
Directs and coordinates most of the operations in the computer.
Interprets each instruction issued by
a program and then initiates the appropriate
action to carry out the instruction.
Registers
A processor contains small, high-speed storage
locations, called _________ that temporarily hold
data and instructions.
1. Fetching
2. Decoding
3. Executing
4. Storing
Steps in the machine cycle?
Machine cycle
For every instruction, a processor repeats a
set of four basic operations, which comprise
a _______ _____
Pipelining
The processor begins fetching a second instruction before it completes
the machine cycle for the first instruction. This is called?
system clock
The processor relies on a small quartz crystal circuit called the ______
_____ to control the timing of all computer operations.
Volatile/nonvolatile
The system unit contains two types of memory:
________ and ___________.
temporary/permanent
Volatile memory is _________
and nonvolatile memory is _________.
volatile
RAM is the most common type of ________ memory.
RAM
Also called main memory, it consists of memory chips that can be read
from and written to by the processor and other devices.
Static RAM
Faster and more reliable than any variation of DRAM chips. These chips
do not have to be re-energized as often as DRAM chips.
Memory cache
Helps speed the processes of the computer because it stores frequently
used instructions and data.
cache
Computers improve their processing times with?
L1 (Quicker & smaller capactiy) --> L2 (slower and larger capacity) -->
L3 (separate chip) --> RAM
The cache cycle
ROM
___ is nonvolatile, which means its contents are not lost when power is
removed from the computer.
Firmware
ROM chips that contain permanently written data, instructions, or
information.
Flash memory
A type of nonvolatile memory that can be erased electronically and
rewritten, similar to EEPROM.
Flash
Most computers use _____ memory to hold their startup
instructions because it allows the computer
easily to update its contents.
off
0 in data representation means ___
on
1 in data representation means __
Bit
Another name for a binary digit (0 and 1)
Bit
Smallest unit of data a computer can process.
Byte
A name for when 8 bits for together.
256
A byte can represent ___ individual characters.
Coding scheme
The combination of 0s and 1s that represent characters are defined by
patterns called a ______ ______.
ASCII
What is the most widely used coding scheme to represent data?
Program
A series of related instructions that tells a computer what tasks to
perform and how to perform them.
Command
An instruction that causes a program to perform a specific action.
User Response
an instruction a user issues by
replying to a question displayed by a program.
Storage device
Computer hardware that records and/or retrieves items to and from
storage media.
Reading
The process of transferring items from a storage
medium into memory.
System software
The programs that control or maintain the operations of the computer
and its devices.
Warm boot
The process of using the operating system to restart a computer.
Boot drive
The drive from which your personal computer boots (starts).
Utility programs
System software that allows a user to perform maintenance-type tasks,
usually related to managing a computer, its devices, or its programs.
Network
A collection of computers and devices connected
together via communications devices and transmission
media.
Communications software
(1) help users establish a connection
to another computer or network;
(2)manage the transmission of data, instructions,
and information;
(3) provide an interface
for users to communicate with one another.
Communications
_____________ software works with the network standards and protocols
just discussed to ensure data moves
through the network or the Internet correctly.
Communications software
_____________ ________ helps users establish an Internet
connection using wizards, dialog boxes, and other on-screen messages.
Another allows home and small office users to configure wired and
wireless networks and connect devices to an existing network.
Communications device
any type of hardware capable of transmitting data, instructions, and
information between a sending device
and a receiving device.
dial-up modem
Communications device that can convert digital signals to analog
signals and analog signals to digital signals, so that data can travel
along an analog telephone line.
digital modem
Communications device that sends and receives data and information
to and from a digital line. Three types of digital modems are ISDN
modems, DSL modems, and
cable modems.
wireless modem
Uses the cell phone network to connect to the Internet wirelessly from a
notebook computer, a smart phone, or other mobile device.
Network card
A communications device that enables a computer or device that does
not have built-in networking capability to
access a network.
Router
Communications device that connects multiple computers or other
routers together and transmits data to its correct destination on a
network.
Physical
Uses wires. Twisted-pair cable, coaxial cable, and fiber-optic cable are
all part of ________ transmission media.
Database
Collection of data organized in a manner that allows access, retrieval,
and use of that data.
database
Computers process data in a ________ into
information.
Character/field/record/file
What does the hierarchy of of data consist of?
character
In the ASCII coding scheme, each byte represents a
single _________, which can be a number (4), letter (R), space,
punctuation mark (?), or other symbol (&).
field
A _____ is a combination of one or more
related characters or bytes and is the smallest
unit of data a user accesses.
Record
A group of related fields.
Primary key
A field that uniquely identifies each record in a
file.
data file
Collection of related records stored on a storage medium such as a hard
disk or optical disc.
File maintenance
The procedures that keep data current.
adding/modifying/deleting
File maintenance procedures
include ______ records to, _________ records in,
and ________ records from a file.
processing
In a typical file __________ system each department or area within an
organization has its own set of files.
database
When an organization uses a ________ approach, many programs and
users share the data in the database.
complex
A database can be more _______ than a file processing
system.
vulnerable
Data in a database can be more __________
than data in file processing systems.
Computer crime
Any illegal act involving a computer
generally is referred to as a ________ _____.
Cybercrime
Online or Internet-based illegal acts.
Crimeware
Software used by cybercriminals
Hacker
Someone who accesses a computer or network illegally.
Cracker
Someone who accesses a computer or network illegally but has the
intent of destroying data, stealing
information, or other malicious action.
Script kiddie
Has the same intent as a cracker but does not have the technical skills
and knowledge. Often use prewritten hacking and cracking programs to
break into computers.
Cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
Cyberterrorist
Someone who uses the Internet or network to destroy or damage
computers for political reasons.
file/printer
To protect your personal computer from unauthorized intrusions, you
should disable ____ and _______ sharing on your Internet connection.
Identification
Verifies that an individual is a valid user.
Authentication
Verifies that the individual is the person he or she claims to be.
Piracy
Unauthorized and illegal duplication of copyrighted software.
license agreements
To protect themselves from software piracy,
software manufacturers issue users _______ __________.
License agreement
The right to use the software.
backup
Duplicate of a file, program, or disk that can be used if the original is
lost, damaged, or destroyed.
Information privacy
The right of individuals and companies to deny or restrict
the collection and use of information about them.
Cookies
A small text file that a Web server stores on your computer.
Cookie
______ files typically contain data about you,
such as your user name or viewing preferences.
Spam
An unsolicited e-mail message or newsgroup posting sent to many
recipients or newsgroups at once.
Phishing
A scam in which a perpetrator sends an official looking e-mail message
that attempts to obtain your personal and financial information.
Pharming
A scamwhere a perpetrator attempts to obtain your
personal and financial information, except they do so via spoofing. That
is, when you type a Web address in the Web browser, you are
redirected to a phony Web site that looks legitimate.
Clickjacking
An object that can be clicked on a Web site, such as a button, image, or
link, contains a malicious program.
Spyware
A program placed on a computer without the user's knowledge that
secretly collects information about the user.
Adware
A program that displays an online advertisement in a banner or pop-up
window on Web pages, e-mail messages, or other Internet services.
Social engineering
Gaining unauthorized access or obtaining confidential information by
taking advantage of the trusting human nature of some victims and the
naivety of others.
Employee monitoring
The use of computers to observe, record, and review an
employee's use of a computer, including communications
such as e-mail messages, keyboard activity (used to measure
productivity), and Web sites visited.
Content filtering
The process of restricting access to certain material
on the Web.
System
A set of components that interact
to achieve a common goal.
System development
A set of activities used to build an information system.
3. Design
4. Implementation
5. Operation, support, and security
PADIO
These are called?
Systems analyst
Responsible for designing and developing an information system.
Project management
The process of planning, scheduling, and then controlling the activities
during system development.
system
The goal of project management is to deliver an acceptable ______ to
the user in an agreed-upon time frame, while maintaining costs.
Machine language
Known as the first generation of programming languages, is the only
language the computer directly recognizes.
Assembly language
The second generation of programming languages, a programmer
writes instructions using symbolic instruction codes.
Source program
The program that contains the language instructions,
or code, to be converted to machine language.
C program language
What programming language was designed for writing system
software?
Java
An object-oriented programming language developed by Sun
Microsystems.
C++
An object oriented programming language that is an
extension of the C programming language.
C# (pronounced SEE-Sharp)
An object-oriented programming language based on C++ that was
developed primarily by Anders Hejlsberg, Microsoft chief architect and
distinguished engineer.
F# (pronounced F-Sharp)
A programming language that combines the benefits of an objectoriented language with the benefits of a functional language.
Visual Studio
Microsoft's suite of program development tools that assists
programmers in building programs for Windows,
Windows Mobile, or operating systems that support .NET.
Visual basic
A programming language that allows programmers easily to build
complex task-oriented object-based pro grams.
Visual C++
A programming language based on C++.
Visual C#
Delphi
A powerful program development tool that is ideal for building largescale enterprise and Web applications
in a RAD environment.
PowerBuilder
Powerful program development RAD tool that is best suited for Webbased, .NET, and largescale enterprise object-oriented applications.
4GL
A nonprocedural language that enables users and programmers to
access data in a database.
programming
Ada, ALGOL, APL, Basic...are all Classic ___________ languages.
HTML
A special formatting language that programmers use to format
documents for display on the Web.
Javascript
An interpreted language that allows a programmer to add dynamic
content and interactive elements to a Web page.
3.
4.
5.
6.
Validate design
Implement design
Test solution
Document solution
Portal
A collection of links, content, and services presented on a Web page
and designed to guide users to information they likely are to find
interesting for their particular job function.
Data warehouse
A huge database that stores and manages the data required to analyze
historical and current transactions.
Extranet
The portion of a company's network that allows customers or suppliers
of a company to access parts of an enterprise's intranet.
Enterprise technologies
Portals, data warehouses, communications, extranets, web services,
service oriented architecture, document management systems,
workflow, virtual private network are all?
Virtualization
The practice of sharing or pooling computing resources, such as servers
and storage devices.
Cloud computing
An Internet service that provides computing needs
to computer users.
Grid computing
Combines many servers and/or personal computers on a network, such
as the Internet, to act as one large computer.