Get ahead with a $300 test prep scholarship
| Enter to win by Tuesday 9/24
Terms in this set (106)
Personal computers hosts several operating systems
One's and Zero's
Represents one character 8bits = 1 byte
2 or 3 paragraphs of texts
1/4 of Mp3
Computer software installed on read-only memory
computer code written by humans and understandable by humans
Outside the private network
Set of rules that programs on two communicating devices follow
the process of converting a poorly structured table into two or more well structured table(s)
movement from one network to another
day to day operation tasks.
unit of data being transmitted •
collaborative decisions and activities.
Transmission Control Protocol
breaks traffic up into packets and send each one along.
Addressing of the packet
Public IP Address
number that identifies a particular device!
Address on the Internet
vertical-market application software
computer hosts other server
Allows access from any computer a user has authorization to use
nonvolatile memory device
Flash drive memory stick and CD's
optical memory device
random access memory
Where CPU stores it's calculations. it is Volatile
horizontal-market application software
Collections of servers,
The cache and main memory are volatile.
A BYOD (bring your own device) policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business.
Program instructions for programs such as Microsoft Excel, are stored in the main memory of a computer.
The CPU stores results of computations on the hard drive.
The operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices.
In a closed source project, say Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors.
The cache and main memory are nonvolatile.
A 64-bit processor is needed to effectively utilize more than 4GB of memory.
The forked lines on the right side of a line on an E-R diagram that indicates a 1:N relationship between two entities is referred to as
DBMS is designed to process large organizational and workgroup databases.
The columns in a database are called
The purpose of a(n) ________ is to keep track of things.
data that describe data
Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called
the problem that exists in database applications when two users update the same data item, but only one of those changes is recorded?
Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
database management system?
forms are used to read, insert, modify, and delete data.
In a data model, a(n) ________ is something that a user wants to track.
processing the database
When you modify or delete data present in a database, you are
The rows in a database are called
Which of the following is a nonrelational data store developed by Facebook?
Relational databases represent relationships using
is a collection of forms, reports, queries, and programs that process a database.
A primary key used in a database is a
column or group of columns that identifies a unique row in a table
an enterprise DBMS?
He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.
the first step in transforming a data model into a relational database design.
creating a table for each entity
A data model is a
logical representation of database data
Every table in a normalized database has
Normalization is the process of combining two or more tables into a single table.
One of the functions of a DBMS is to provide tools to assist in the administration of the database.
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called
tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.
Which of the following is the distinguishing feature of a LAN as compared to a WAN
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
The IEEE 802.3 protocol standard is also known as
uses the Internet to create the appearance of private point-to-point connections.
protocols guarantees secure data transmission
connects a computer's or printer's circuitry to network wires?
Which of the following is true about a VPN?
It encrypts messages to ensure secure transmissions.
contains the URL of the Web page to find when a user clicks on it.
platform as service
Compared to in-house hosting, cloud-based hosting
minimizes the risk of investing in technology that will soon become obsolete
Which of the following is a benefit of in-house hosting?
in depth visibility of security and disaster preparedness
FTP is the protocol used between browsers and Web servers
TCP provides internet routing and IP provides reliable internet transport.
For two devices to communicate, they must use the same protocol.
Unlike HTTP, FTP does not have a secure version.
An intranet is a private internet that is used exclusively within an organization.
An ISP provides the customer with a legitimate Internet address.
The owner of a domain name is capable of changing the affiliated IP addresses at its discretion.
Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol
HTML is the most common language for defining the structure and layout of Web pages.
A university would use a WAN to connect its campuses in two cities.
If you had a private IP address for your computer, every time you moved it, the Internet would have to update its addressing mechanisms to route traffic to your new location.c
is a measure of the ratio of process outputs to inputs.
Information systems improve process quality by
controlling process flow
minimizes data duplication among departments
enterprise information systems
When an organization has inconsistent duplicated data, it is said to have a problem of
A stored procedure is a
computer program stored in a database that is used to enforce business rules
are formally defined, standardized processes that involve day-to-day operations.
The major benefit of enterprise application integration is that it
enables organizations to use existing applications
The primary purpose of an ERP system is
is a measure of how well a process achieves organizational strategy.
The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n)
inter-enterprise information system
Placing an order is an example of a structured process.
An ERP solution consists of application programs, databases, and business process procedures, but does not contain training and consulting.
In the customer acquisition phase of the customer life cycle, an organization categorizes its customers according to value and attempts to win back high-value customers.
Inter-enterprise information systems support one or more inter-enterprise processes
Relationship management processes increase the value of existing customers by selling them more product.