How can we help?

You can also find more resources in our Help Center.

356 terms

MISY Final

STUDY
PLAY
plug-in
A ___ is a program that extends the capability of a browser.`
Output
___ is data that has been processed into a useful form.
Transports large number files, add storage space to notebook computer, easily store large audio/video files
Advantages of portable hard disks and removable hard disks
less than $100
A reasonable quality ink-jet printer costs ____.
drive
To write on a CDRW disc, users must has software and ____.
slower and more
Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.
filter
A ___ is a program that removes or blocks certain items from being displayed
virtual private network
A ____ provides a mobile user with secure connection to connection to company network server
primary key and unique name
In a relational database, each row has a ____ and each column has a _____.
channel
A comm ____ is a transmission media on which date, interactions, and info travel
Operations
___ refers to core activities of a business, involving creation, selling, and support of products
establishing goals and objectives
Planning, performed by managers, involves _____.
Coaxial
___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating
cookie
A ____ is a small text file that a web servers stores on a users computer.
Information theft
____ occurs when someone steals personal or confidential information.
redundant
High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.
hacker
A ____ is someone who tries to access a computer or network illegally.
solution algorithm
A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.
trackball
A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)
Enterprise
_____ commonly describes a business or venture of any size.
trusted
A ___ source is a company or person a user believes will not knowingly send a virus-infected file
CPU (Central Processing Unit)
The ___ interprets and carries out basic instructions that operate a computer
online meeting
An _____ allows users to share documents with others in real time.
Media players, digital cameras, smart phones, not laptops
Devices including ____, ____, _____, often have internal miniature hard disks.
anti-spam
An ______ program is filtering program that attempts to remove spam before it reaches a users inbox
B2B e-commerce
E-commerce that actually takes place between businesses is called _____
boot
A ____ drive is the drive from which a personal comp starts
Spyware
____ is a program placed on computer without users knowledge that secretly collects info about the user
DSL
____ uses a modem that sends digital data and info from a computer to a DSL line
backup
A _____ is a duplicate of a file, program, or disk that can be used if the original is lost
matches a company's requirements exactly
The advantage of custom software is that it _________.
Unauthorized
______ use is the use of a computer or its data for unapproved or illegal activities.
kernel
The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)
Project management
____ is the process of planning, scheduling, and then controlling the activities during system development cycle.
bay
A ____ is an opening inside the system unit in which additional equip can be installed.
worm
A ____ is malware that copies itself repeatedly
object code or program
The machine language version that results from compiling a 3GL is called the ______
media
A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos
Spam
___ is an unsolicited email sent to many recipients at once
Defender
In Windows 7, Windows ____ feature protects your comp from external threats
privacy
Info ____ refers to the right to deny or restrict the collect and use of info about users
syntax
A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.
Enterprise
_____ info is gathered in the ongoing operations of an enterprise-sized organization
antivirus
A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.
cycle
Organized set of program development activities is known as the program life development ______.
hot spot
A ____ is a wireless network that provides Internet connection to mobile devices
Validation
_____ is the process of comparing data with a set of rule to find out if data is correct
Virtual
With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.
Ethernet
_____ is a network standard that specifies no central device on the network should control when data can be transmitted
POS
The location in a retail store where a consumer pays for goods or services is ____.
misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure
Syntax errors will be cause by _____, ______, _______.
expert
An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.
Prototype
A _____ is a working model of a proposed system.
creep
Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`
turnaround
Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.
router
A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network
repository
In doc management system, a central library or ______ stores all documents within a company
reciprocal
An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.
Enterprise
______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.
Cloud
_____ storage is an internet service that provides storage to computer users
Data
____ is a collection of unprocessed items which can include text, numbers, images, audio and video.
spreadsheets, presentations, documents but NOT emails
Google Docs is a cloud storage provide for ____, ____, ____.
restore
If back file is used, a ____ program reverses the process and returns backed up files to original form
Malware
Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)
management
A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress
input
Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium
High-Availability
_____ systems continue running and performing tasks for at least 99% of the time.
POS
Most retail stores use ____ terminal to record purchases, credit, debit, and inventory
CMS (Content management system)
____ includes information about files and data called metadata
automatic updates
In operating system, ____ can fix bugs, enhance security, and modify device drivers.
Server 2008
Windows ____ is an upgrade to Windows 2003 Server.
CRM (Customer relationship management)
___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers
optical
An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
custom
____ software is application software developed by user or at users request
optical
An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process
assembler
To convert an assembly language source program into machine language, programmers use an ______.
operating systems and utility programs
Two types of system software are _____.
spyware
Internet ad firms often use ____ to collect info about users web habits
HRIS (human resource info system)
A _____ is a system that manages one or more human resource function
online trading
With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker
full backup
a _____ backup copies all of the files in a computer
sequential
Tape storage requires ___ access, which refers to reading or writing data consecutively
remover
A spyware ____ is a program that detects and deletes spyware and similar programs.
filtering
Content ____ is the process of restricting access to certain material on the web.
addiction
Comp ___ occurs when a computer consumes someones entire social life
comm channels
Two examples of ______ are cable television lines and telephone lines.
OMR (optical mark recognition)
____ is a technology that reads hand draw marks such as small circles or rectangles
trojan horse
A ____ does not replicate itself to other computers
Cloud
___ computing provides computing needs to computer users via Internet
CRM (customer relationship management)
____ systems manage info about costumers, interactions, past purchase, and interests.
802.11i
An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA
power source
A UPS connects between a computer and a _____
selective
A ____ backup (partial) allows user to choose specific files to backup
adapter
Some external peripherals have an AC ______, which is an external power supply.
theft
Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.
forensics
Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.
information
An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.
ERM (Employee Relationship Mgt)
A _____ system automates and manages much of the communications between employees and businesses
E-tail
___ occurs when retailers use web to sell their products or services
biometric
A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.
Email
____ is the transmission of messages and files via computer network
Fixed wireless
____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals
modem
A cable ___ allows access to high sped internet service through cable television network
POST (power on self test)
The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.
content filtering
Many businesses use __ to limit employees web access
registry
In the latest Windows conversion, the __ consists of several files that contain system configuration info.
encryption, web apps, passwords
Many cloud storage providers offer _____
Storage
____ holds data, instructions, and info for future use.
fiber-optic
The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals
POS
____ is a combo of an electric cash register, bar code reader, and printer.
piracy
Software ___ is an unauthorized and illegal duplication of copyrighted software.
printout
A hardcopy is also called a ____
debugging
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
hot spot
People connect wirelessly to the internet through a ____ using their mobile devices
library
On larger computers, tape cartridges are mounted in a separate cabinet called a tape ______
Authority
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
Computer Matching and Privacy Protection Act
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
dedicated
A ____ line is a type of always-on connection that is established between two communications devices.
have redundant data and isolate data
A major weakness of a lot of file processing systems is that they ____.
digital
A(n) ____ modem sends and receives data and information to and from a digital line.
access
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
7
Windows ___ is Microsofts fastest, most efficient operating system to date
ethical
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.
CDRW
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.
download
Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.
functional units
A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.
gigabyte
Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.
call
A(n) ____ is the intersection of a column and row in a worksheet.
WWW and email
____ are two of the more widely accessed Internet services.
map
An image ____ is a graphical image that points to one or more Web addresses.
verifies that each individual program works by itself
A unit test ____.
monitor
A(n) ____ is a display device that is packaged as a separate peripheral.
VoIP
____ enables users to speak to other users over the Internet.
topology
A network ____ refers to the layout of the computers and devices in a communications network.
Plug and Play
____ means the operating system automatically configures new devices as users install them.
do-while control structure
A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.
interface
A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.
form
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
cartridge
A tape ____ is a small, rectangular, plastic housing for tape.
formula
A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.
debug
A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.
flat panel
A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.
Tape
____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
extranet
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.
removable
A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.
Managers
____ are employees who are responsible for coordinating and controlling an organization's resources.
resident
The kernel is memory ____, which means it remains in memory while the computer is running.
open source
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
buses that eliminate the need to install cards in expansion slots
The USB (universal serial bus) and FireWire bus are ____.
reader/writer
A card ____ is a device that reads data, instructions, and information stored on flash memory cards.
use heel of hand as pivot point
To prevent repetitive strain injury, take all of the following precautions except ____.
Transport Layer Security TLS
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
image
A(n) ____ viewer is a utility that allows users to display, copy, and print the contents of a graphics file.
touch screen
A(n) ____ is a touch-sensitive display device that users interact with by touching the screen with a finger.
surge suppressor
A(n) ____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
planning
analysis
design
implementation
support
In sequence, most SYStem development life cycles contain five phases: ____.
hypermedia
A(n) ____ database is an application appropriate for an object-oriented database that contains text, graphics, video, and sound.
implementation
In the ____ phase, system developers perform four major activities: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
pipelining
With ____, the processor begins fetching a second instruction before it completes the machine cycle for the first instruction.
Access
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
Twisted pair
____ cable consists of one or more twisted-pair wires bundled together.
Formatting
____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
integrity
Data ____ identifies the quality of data in a database.
registers
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions.
management
Project leaders can use project ____ software to assist them in planning, scheduling, and controlling development projects.
KM (Knowledge management)
____ is the process by which an enterprise collects, archives, indexes, and retrieves its knowledge or resources.
an instruction that causes a program to perform a specific action
A command is ____.
startup folder
In Windows, the ____ contains a list of programs that open automatically when users boot the computer.
system clock
The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations.
detailed
____ report usually list just transactions.
cookies
____ is/are not considered spyware because a user knows it/they exist(s).
smart cards
One popular use of ____ is to store a prepaid amount of money, such as for student purchases on campus.
nonimpact
Some ____ printers spray ink, while others use heat or pressure to create images.
distribution
____ systems provide forecasting for inventory control, manage and track shipping of products, and provide information and analysis on inventory in warehouses.
bandwidth
The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
swap file
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.
chassis
The case of the system unit, sometimes called the ____, is made of metal or plastic and protects the internal electronic components from damage.
uninstaller
A(n) ____ is a utility that removes a program, as well as any associated entries in the system files.
smart
A(n) ____ card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card.
repetition
The ____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met.
copyright
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.
Wi Fi (Ethernet, powerline, phoneline)
Types of wired home networks include all of the following EXCEPT ____.
FireWire
A ____ port was formerly referred to as an IEEE 1394 port.
spike
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
OIS (operational info system)
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
characters per second (cps)
The speed of a dot-matrix printer is measured by the number of ____ it can print.
firewall
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
run-time error
One purpose of using test data is to try to cause a ____, which is an error that causes a program to stop running.
display
A(n) ____ is an output device that visually conveys text, graphics, and video information.
cache
Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
machine
Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a(n) ____ cycle.
coding
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
second oldest copy
With a three-generation backup policy, the parent is the ____.
netiquette
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
OLAP (online analytical processing)
Programs that analyze data, such as those in a DSS (decision support system), sometimes are called ____ programs.
instructing and authorizing others to perform the necessary work
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
write-protect notch (read/write head, sectors and tracks, capacity)
All of the following are characteristics of hard disks EXCEPT ____.
any program instructions that a program never executes
Dead code is _____.
DSS
A(n) ____ is an information system that helps users analyze data and make decisions.
RAM
____ is the most common type of volatile memory.
marketing
A(n) ____ information system is a system that serves as a central repository for the tasks of the marketing functional unit.
program development life cycle
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
AI (artificial intelligence)
____ is the application of human intelligence to computers.
facilitates communication between employees and the business
An ERM system ______.
USB
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an interface that can connect up to 127 different peripherals together with a single connector.
NAS (network area storage)
____ devices are servers connected to a network with the sole purpose of providing storage.
Phone 7
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of smart phones.
click stream
A(n) ____ is a collection of every action that users make as they move through a Web site.
e-form
A form that sends entered data across a network or the Internet is called a(n) ____.
OS X
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
tasking
A single user/single ____ operating system allows only one user to run one program at a time.
thin
____ clients are small, terminal-like computers that mostly rely on a server for data storage and processing.
system failure
One of the more common causes of ____ is an electrical power variation.
hub
A USB ____ is a device that plugs in a USB port on the system unit like the one in the accompanying figure and contains multiple USB ports in which users plug cables from USB devices.
data processing
Many people initially referred to the functions of a TPS (transaction processing system) as ____.
management
The purpose of memory ____ is to optimize the use of random access memory (RAM).
exception report
A(n) ____ identifies data outside of a normal condition.
lower costs and easier installation/modification (faster data transmission and smaller size, less susceptible to noise, better security for signals)
Fiber-optic cables have all of the following advantages over cables that use wire except ____.
Embedded CE
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
FTP (File transfer protocol)
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
session cookie
Web sites use a ____ to keep track of items in a user's shopping cart.
a named collection of stored data, instructions, or info
A file is _________.
CMOS (complementary metal oxide semiconductor)
During a cold boot on a personal computer, the POST (power-on self test) results are compared with data in a ____ chip.
RAID and a tape player, optical disc jukeboxes, Internet backup and NAS devices
An enterprise storage system may use ____.
server
An FTP ____ is a computer that allows users to upload and/or download files using FTP.
server
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
operational
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
recovery
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
dialog box
A(n) ____ is a window that provides information, presents available options, or requests a response.
tape (CDs, DVDs, Hard disks)
All of the following use direct access EXCEPT ____.
CD-RW
Instead of using CD-R, many users opt for ____, which is an erasable multisession disc users can write on multiple times.
capacity
____ is the number of bytes (characters) a storage medium can hold.
military intelligence, insurance agencies, law enforcement
Digital forensics is used by ____.
intrusion
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
the same on multiple operating systems
A cross-platform program is one that runs ____.
Secure Digital
A(n) ____ flash memory card has a storage capacity of 512 MB to 8 GB.
stylus
A(n) ____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
overvoltage
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
Web bug
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
blocks
Users can purchase a software program that selectively ____ cookies.
program
A _____ is a series of instructions that tells a computer what to do and how to do it.
VoIP
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter.
Secure HTTP
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
OCR
Many scanners include ____ software, which can read and convert text documents into electronic files.
HDTV
With ____, the broadcast signals are digitized when they are sent via over-the-air broadcasts from local television networks, satellite, or cable.
touchpad
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
incremental
A(n) ____ copies the files that have changed since the last full backup or last incremental backup.
online banking
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee's account such as the electric company or telephone company.
SAN (storage attached network)
A(n) ____ is a high-speed network with the sole purpose of providing storage to other servers to which it is attached.
oldest copy of the file
With a three-generation backup policy, the grandparent is the ____.
NetWare
Novell's ____ is a server operating system designed for client/server networks.
input
____ is any data and instructions entered into the memory of a computer.
database design
During ____, a systems analyst builds upon the data dictionary developed during the analysis phase.
the use of all capital letters is the equivalent of shouting
According to netiquette, Internet users should assume ____.
input
Audio ____ is the process of entering any sound into the computer such as speech, music, and sound effects.
periods
The components of a domain name are separated by ____.
multiprocessing
A(n) ____ operating system supports two or more processors running programs at the same time.
hot-swapping
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
hub
A ____ is a device that provides a central point for cables in a network.
DSL
____ is a technology that provides high-speed Internet connection using regular copper telephone lines.
anonymous
FTP sites can be ____, whereby anyone can transfer some, if not all, available files.
RAID
A group of two or more integrated hard disks is called a(n) ____.
single user/single tasking
Smart phones and other small computing devices often use a ____ operating system.
integrated
A(n) ____ circuit, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
barcode
A(n) ____ is an identification code that consists of a set of vertical lines and spaces of different widths.
output
A(n) ____ device is any hardware component that conveys information to one or more people.
offsite
____ means in a location separate from the computer site.
biometrics
____ is the technology of authenticating a person's identity by verifying a personal characteristic.
energy star
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
router
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.
multiuser
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
system
____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.
tactical
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
CompactFlash, Secure Digital and Memory Stick, xD Picture Card
Common types of flash memory cards include ____.
multiuser
A(n) ____ operating system enables two or more users to run programs simultaneously.
measuring performance and if necessary, taking corrective action
Controlling is an activity performed by managers that involves ____.
strategic
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company's overall goals and objectives.
peripheral
A(n) ____, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer.
enterprise-wide
General purpose, or ____ systems cross the boundaries of functional units and are used by one or more functional units in an enterprise.
zipped files
Compressed files, sometimes called ____.
special purpose terminals
____, such as POS terminals and automated teller machines, perform specific tasks and contain features uniquely designed for use in a particular industry.
platform
The operating system that a computer uses sometimes is called the ____.
knowledge workers
____, such as accountants, engineers, and other professionals, include individuals whose jobs center on the collection, processing, and application of information.
proposal
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
UNIX
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
blade
____ servers pack a complete computer server, such as a Web server or network server, on a single card.
HDTV
____ is the most advanced form of digital television.
procedure
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
the actions to be taken to restore full information processing operations
In a disaster recovery plan, the recovery plan specifies ____.
proprietary
____ software is privately owned software and limited to a specific vendor or computer model.
fault-tolerant
A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
DTV
Users are turning to ____ for crisper, higher-quality output than they can achieve with analog television.
CVS (comp vision syndrome)
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
broadcast
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
hoax
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
IP (internet protocol)
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
HTML
____ is a special formatting language that programmers use to format documents for display on the Web.
graphical user interface (GUI)
With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
inkjet printers, photo printers, laser printers, thermal printers, mobile, printers, label and postage printers (EXCEPT line printers and dot matrix printers)
Commonly used nonimpact printers include all of the following EXCEPT ____.
secondary
____ storage is the physical material on which a computer keeps data, instructions, and information.
recovery
If a hard disk is damaged, a computer can be booted from a(n) ____ disk, which is usually a CD that contains a few system files that will start the computer.
RSI (repetitive strain injury)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
implentation
The purpose of the ____ phase is to construct, or build, a new or modified system and then deliver it to the users.
KMS (knowledge management system)
Organizations implement ____ to assist in the task of knowledge management.
Memory Stick PRO Duo
A(n) ____ flash memory card has a storage capacity of 1 GB to 16 GB.
identifying and combining resources so that company can reach goals and objectives
Organizing is an activity performed by managers that includes ____.
availability
Uptime is a measure of ____.
grid
____ computing combines many servers and/or personal computers on a network to act as one large computer.
dial up connection
Although it is an inexpensive way for users to connect to the Internet, ____ is slower-speed technology.
UPS uninterruptible power supply
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
make disc denser by packing pits closer, use two layers of pits, be double sided
A storage technique that a DVD-ROM can use to achieve a higher storage capacity than a CD-ROM is to ____.
OCR (optical character recognition)
____ is a technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.
web
____ services include a relatively new set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
stand alone
A(n) ____ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
operating
A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
OS
A competing operating system to Windows Phone is Palm ____, which runs on Palm-powered PDAs and smart phones.
worksheet
When using spreadsheet software, the rows and columns collectively are called a(n) ____.
how a company uses backup files and equipment to resume information processing
In a disaster recovery plan, the backup plan specifies ____.
workflow
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
clock cycle
Each tick of the system clock equates to a ____.
clicking a button on the task bar, then a Start menu button, then a Lock menu button
With Windows, a warm boot can be performed by ____.
summary report
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
input
Voice ____ is the process of entering data by speaking into a microphone.
stores and manages files
A file server is a dedicated server that ____.
most recent copy of the file
With a three-generation backup policy, the child is the ____.
drive
Comparable to a tape recorder, a tape ____ reads and writes data and information on a tape.
BIOS
The ____ is firmware that contains a computer's startup instructions.
value
Many worksheet cells contain a number that can be used in a calculation, called a(n) ____.
noise
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
modem
The communications device that connects a communications channel to a sending or receiving device such as a computer is a(n) ____.
digital
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
ALU (arithmetic logic unit)
The ____ is the component of the processor that performs arithmetic, comparison, and other operations.
differential backup
A(n) ____ copies only the files that have changed since the full backup.
full backup
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
architecture
The overall technology strategy often is referred to as the information ____ of a company.
dictionary
The data ____ stores a data item's name, description, and other details about each data item.
platter
A(n) ____ is made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface.
pseudocode
____ uses a condensed form of English to convey program logic.
analyze requirements, design solution, validate design, implement design, test solution, and document solution
In sequence, the program development life cycle consists of six steps: ____.
design
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
feasibility
____ is a measure of how suitable the development of a system will be to a company.
memory
A(n) ____ card is a removable device that allows users to transfer data and information conveniently from mobile devices to their desktop computers.
pin
A ____ is a numeric password either assigned by a company or selected by a user.
OCR
Most ____ devices include a small optical scanner for reading characters and sophisticated software to analyze what is read.
broadband
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network.
appliance
A NAS (network attached storage) server often is called a storage ____ because it is a piece of equipment with only one function — to provide additional storage.
supply
The power ____ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires.
Grace Hopper
Naval officer ____, a pioneer in computer programming, was a prime developer of COBOL.
virtualization
____ is the practice of sharing or pooling computing resources, such as servers and storage devices.
preemptive
With ____ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
control
The ____ unit is the component of the processor that directs and coordinates most of the operations in the computer.
electronic communications privacy act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
blocker
A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
script kiddie
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
system
The ____ unit is a case that contains electronic components of the computer used to process data.
distributed
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.