MISY Final

Created by jnolfi 

Upgrade to
remove ads

plug-in

A ___ is a program that extends the capability of a browser.`

Output

___ is data that has been processed into a useful form.

Transports large number files, add storage space to notebook computer, easily store large audio/video files

Advantages of portable hard disks and removable hard disks

less than $100

A reasonable quality ink-jet printer costs ____.

drive

To write on a CDRW disc, users must has software and ____.

slower and more

Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.

filter

A ___ is a program that removes or blocks certain items from being displayed

virtual private network

A ____ provides a mobile user with secure connection to connection to company network server

primary key and unique name

In a relational database, each row has a ____ and each column has a _____.

channel

A comm ____ is a transmission media on which date, interactions, and info travel

Operations

___ refers to core activities of a business, involving creation, selling, and support of products

establishing goals and objectives

Planning, performed by managers, involves _____.

Coaxial

___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating

cookie

A ____ is a small text file that a web servers stores on a users computer.

Information theft

____ occurs when someone steals personal or confidential information.

redundant

High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.

hacker

A ____ is someone who tries to access a computer or network illegally.

solution algorithm

A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.

trackball

A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)

Enterprise

_____ commonly describes a business or venture of any size.

trusted

A ___ source is a company or person a user believes will not knowingly send a virus-infected file

CPU (Central Processing Unit)

The ___ interprets and carries out basic instructions that operate a computer

online meeting

An _____ allows users to share documents with others in real time.

Media players, digital cameras, smart phones, not laptops

Devices including ____, ____, _____, often have internal miniature hard disks.

anti-spam

An ______ program is filtering program that attempts to remove spam before it reaches a users inbox

B2B e-commerce

E-commerce that actually takes place between businesses is called _____

boot

A ____ drive is the drive from which a personal comp starts

Spyware

____ is a program placed on computer without users knowledge that secretly collects info about the user

DSL

____ uses a modem that sends digital data and info from a computer to a DSL line

backup

A _____ is a duplicate of a file, program, or disk that can be used if the original is lost

matches a company's requirements exactly

The advantage of custom software is that it _________.

Unauthorized

______ use is the use of a computer or its data for unapproved or illegal activities.

kernel

The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)

Project management

____ is the process of planning, scheduling, and then controlling the activities during system development cycle.

bay

A ____ is an opening inside the system unit in which additional equip can be installed.

worm

A ____ is malware that copies itself repeatedly

object code or program

The machine language version that results from compiling a 3GL is called the ______

media

A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos

Spam

___ is an unsolicited email sent to many recipients at once

Defender

In Windows 7, Windows ____ feature protects your comp from external threats

privacy

Info ____ refers to the right to deny or restrict the collect and use of info about users

syntax

A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.

Enterprise

_____ info is gathered in the ongoing operations of an enterprise-sized organization

antivirus

A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.

cycle

Organized set of program development activities is known as the program life development ______.

hot spot

A ____ is a wireless network that provides Internet connection to mobile devices

Validation

_____ is the process of comparing data with a set of rule to find out if data is correct

Virtual

With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.

Ethernet

_____ is a network standard that specifies no central device on the network should control when data can be transmitted

POS

The location in a retail store where a consumer pays for goods or services is ____.

misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure

Syntax errors will be cause by _____, ______, _______.

expert

An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.

Prototype

A _____ is a working model of a proposed system.

creep

Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`

turnaround

Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.

router

A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network

repository

In doc management system, a central library or ______ stores all documents within a company

reciprocal

An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.

Enterprise

______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.

Cloud

_____ storage is an internet service that provides storage to computer users

Data

____ is a collection of unprocessed items which can include text, numbers, images, audio and video.

spreadsheets, presentations, documents but NOT emails

Google Docs is a cloud storage provide for ____, ____, ____.

restore

If back file is used, a ____ program reverses the process and returns backed up files to original form

Malware

Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)

management

A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress

input

Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium

High-Availability

_____ systems continue running and performing tasks for at least 99% of the time.

POS

Most retail stores use ____ terminal to record purchases, credit, debit, and inventory

CMS (Content management system)

____ includes information about files and data called metadata

automatic updates

In operating system, ____ can fix bugs, enhance security, and modify device drivers.

Server 2008

Windows ____ is an upgrade to Windows 2003 Server.

CRM (Customer relationship management)

___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers

optical

An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.

custom

____ software is application software developed by user or at users request

optical

An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process

assembler

To convert an assembly language source program into machine language, programmers use an ______.

operating systems and utility programs

Two types of system software are _____.

spyware

Internet ad firms often use ____ to collect info about users web habits

HRIS (human resource info system)

A _____ is a system that manages one or more human resource function

online trading

With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker

full backup

a _____ backup copies all of the files in a computer

sequential

Tape storage requires ___ access, which refers to reading or writing data consecutively

remover

A spyware ____ is a program that detects and deletes spyware and similar programs.

filtering

Content ____ is the process of restricting access to certain material on the web.

addiction

Comp ___ occurs when a computer consumes someones entire social life

comm channels

Two examples of ______ are cable television lines and telephone lines.

OMR (optical mark recognition)

____ is a technology that reads hand draw marks such as small circles or rectangles

trojan horse

A ____ does not replicate itself to other computers

Cloud

___ computing provides computing needs to computer users via Internet

CRM (customer relationship management)

____ systems manage info about costumers, interactions, past purchase, and interests.

802.11i

An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA

power source

A UPS connects between a computer and a _____

selective

A ____ backup (partial) allows user to choose specific files to backup

adapter

Some external peripherals have an AC ______, which is an external power supply.

theft

Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.

forensics

Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.

information

An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.

ERM (Employee Relationship Mgt)

A _____ system automates and manages much of the communications between employees and businesses

E-tail

___ occurs when retailers use web to sell their products or services

biometric

A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.

Email

____ is the transmission of messages and files via computer network

Fixed wireless

____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals

modem

A cable ___ allows access to high sped internet service through cable television network

POST (power on self test)

The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.

content filtering

Many businesses use __ to limit employees web access

registry

In the latest Windows conversion, the __ consists of several files that contain system configuration info.

encryption, web apps, passwords

Many cloud storage providers offer _____

Storage

____ holds data, instructions, and info for future use.

fiber-optic

The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals

POS

____ is a combo of an electric cash register, bar code reader, and printer.

piracy

Software ___ is an unauthorized and illegal duplication of copyrighted software.

printout

A hardcopy is also called a ____

debugging

The process of locating and correcting syntax and logic errors in a program is known as ____ the program.

hot spot

People connect wirelessly to the internet through a ____ using their mobile devices

library

On larger computers, tape cartridges are mounted in a separate cabinet called a tape ______

Authority

A certificate ____ is an authorized person or company that issues and verifies digital certificates.

Computer Matching and Privacy Protection Act

The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.

dedicated

A ____ line is a type of always-on connection that is established between two communications devices.

have redundant data and isolate data

A major weakness of a lot of file processing systems is that they ____.

digital

A(n) ____ modem sends and receives data and information to and from a digital line.

access

A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.

7

Windows ___ is Microsofts fastest, most efficient operating system to date

ethical

An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.

CDRW

A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.

download

Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.

functional units

A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.

gigabyte

Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.

call

A(n) ____ is the intersection of a column and row in a worksheet.

WWW and email

____ are two of the more widely accessed Internet services.

map

An image ____ is a graphical image that points to one or more Web addresses.

verifies that each individual program works by itself

A unit test ____.

monitor

A(n) ____ is a display device that is packaged as a separate peripheral.

VoIP

____ enables users to speak to other users over the Internet.

topology

A network ____ refers to the layout of the computers and devices in a communications network.

Plug and Play

____ means the operating system automatically configures new devices as users install them.

do-while control structure

A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.

interface

A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.

form

A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.

cartridge

A tape ____ is a small, rectangular, plastic housing for tape.

formula

A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.

debug

A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.

flat panel

A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.

Tape

____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.

extranet

Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.

removable

A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.

Managers

____ are employees who are responsible for coordinating and controlling an organization's resources.

resident

The kernel is memory ____, which means it remains in memory while the computer is running.

open source

Linux is ____ software, which means its code is provided for use, modification, and redistribution.

buses that eliminate the need to install cards in expansion slots

The USB (universal serial bus) and FireWire bus are ____.

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set