Transports large number files, add storage space to notebook computer, easily store large audio/video files
Advantages of portable hard disks and removable hard disks
slower and more
Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.
virtual private network
A ____ provides a mobile user with secure connection to connection to company network server
primary key and unique name
In a relational database, each row has a ____ and each column has a _____.
___ refers to core activities of a business, involving creation, selling, and support of products
___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating
High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.
A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.
A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)
A ___ source is a company or person a user believes will not knowingly send a virus-infected file
CPU (Central Processing Unit)
The ___ interprets and carries out basic instructions that operate a computer
Media players, digital cameras, smart phones, not laptops
Devices including ____, ____, _____, often have internal miniature hard disks.
An ______ program is filtering program that attempts to remove spam before it reaches a users inbox
____ is a program placed on computer without users knowledge that secretly collects info about the user
The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)
____ is the process of planning, scheduling, and then controlling the activities during system development cycle.
object code or program
The machine language version that results from compiling a 3GL is called the ______
A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos
A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.
A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.
Organized set of program development activities is known as the program life development ______.
With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.
_____ is a network standard that specifies no central device on the network should control when data can be transmitted
misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure
Syntax errors will be cause by _____, ______, _______.
An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.
Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`
Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.
A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network
In doc management system, a central library or ______ stores all documents within a company
An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.
______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.
____ is a collection of unprocessed items which can include text, numbers, images, audio and video.
spreadsheets, presentations, documents but NOT emails
Google Docs is a cloud storage provide for ____, ____, ____.
If back file is used, a ____ program reverses the process and returns backed up files to original form
Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)
A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress
Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium
In operating system, ____ can fix bugs, enhance security, and modify device drivers.
CRM (Customer relationship management)
___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers
An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process
To convert an assembly language source program into machine language, programmers use an ______.
HRIS (human resource info system)
A _____ is a system that manages one or more human resource function
With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker
OMR (optical mark recognition)
____ is a technology that reads hand draw marks such as small circles or rectangles
CRM (customer relationship management)
____ systems manage info about costumers, interactions, past purchase, and interests.
An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA
Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.
Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.
An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.
ERM (Employee Relationship Mgt)
A _____ system automates and manages much of the communications between employees and businesses
A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.
____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals
POST (power on self test)
The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.
In the latest Windows conversion, the __ consists of several files that contain system configuration info.
The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
Computer Matching and Privacy Protection Act
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
A ____ line is a type of always-on connection that is established between two communications devices.
have redundant data and isolate data
A major weakness of a lot of file processing systems is that they ____.
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.
Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.
A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.
Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.
A network ____ refers to the layout of the computers and devices in a communications network.
Plug and Play
____ means the operating system automatically configures new devices as users install them.
do-while control structure
A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.
A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.
A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.
A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.
____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.
A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.
____ are employees who are responsible for coordinating and controlling an organization's resources.
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
buses that eliminate the need to install cards in expansion slots
The USB (universal serial bus) and FireWire bus are ____.
A card ____ is a device that reads data, instructions, and information stored on flash memory cards.
use heel of hand as pivot point
To prevent repetitive strain injury, take all of the following precautions except ____.
Transport Layer Security TLS
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
A(n) ____ viewer is a utility that allows users to display, copy, and print the contents of a graphics file.
A(n) ____ is a touch-sensitive display device that users interact with by touching the screen with a finger.
A(n) ____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
In sequence, most SYStem development life cycles contain five phases: ____.
A(n) ____ database is an application appropriate for an object-oriented database that contains text, graphics, video, and sound.
In the ____ phase, system developers perform four major activities: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
With ____, the processor begins fetching a second instruction before it completes the machine cycle for the first instruction.
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions.
Project leaders can use project ____ software to assist them in planning, scheduling, and controlling development projects.
KM (Knowledge management)
____ is the process by which an enterprise collects, archives, indexes, and retrieves its knowledge or resources.
In Windows, the ____ contains a list of programs that open automatically when users boot the computer.
The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations.
One popular use of ____ is to store a prepaid amount of money, such as for student purchases on campus.
____ systems provide forecasting for inventory control, manage and track shipping of products, and provide information and analysis on inventory in warehouses.
The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.
The case of the system unit, sometimes called the ____, is made of metal or plastic and protects the internal electronic components from damage.
A(n) ____ is a utility that removes a program, as well as any associated entries in the system files.
A(n) ____ card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card.
The ____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met.
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.
Wi Fi (Ethernet, powerline, phoneline)
Types of wired home networks include all of the following EXCEPT ____.
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
OIS (operational info system)
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
characters per second (cps)
The speed of a dot-matrix printer is measured by the number of ____ it can print.
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
One purpose of using test data is to try to cause a ____, which is an error that causes a program to stop running.
Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a(n) ____ cycle.
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
OLAP (online analytical processing)
Programs that analyze data, such as those in a DSS (decision support system), sometimes are called ____ programs.
instructing and authorizing others to perform the necessary work
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
write-protect notch (read/write head, sectors and tracks, capacity)
All of the following are characteristics of hard disks EXCEPT ____.
A(n) ____ information system is a system that serves as a central repository for the tasks of the marketing functional unit.
program development life cycle
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an interface that can connect up to 127 different peripherals together with a single connector.
NAS (network area storage)
____ devices are servers connected to a network with the sole purpose of providing storage.
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of smart phones.
A(n) ____ is a collection of every action that users make as they move through a Web site.
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
A single user/single ____ operating system allows only one user to run one program at a time.
____ clients are small, terminal-like computers that mostly rely on a server for data storage and processing.
A USB ____ is a device that plugs in a USB port on the system unit like the one in the accompanying figure and contains multiple USB ports in which users plug cables from USB devices.
Many people initially referred to the functions of a TPS (transaction processing system) as ____.
lower costs and easier installation/modification (faster data transmission and smaller size, less susceptible to noise, better security for signals)
Fiber-optic cables have all of the following advantages over cables that use wire except ____.
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
FTP (File transfer protocol)
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
CMOS (complementary metal oxide semiconductor)
During a cold boot on a personal computer, the POST (power-on self test) results are compared with data in a ____ chip.
RAID and a tape player, optical disc jukeboxes, Internet backup and NAS devices
An enterprise storage system may use ____.
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
A(n) ____ is a window that provides information, presents available options, or requests a response.
Instead of using CD-R, many users opt for ____, which is an erasable multisession disc users can write on multiple times.
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
A(n) ____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter.
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
Many scanners include ____ software, which can read and convert text documents into electronic files.
With ____, the broadcast signals are digitized when they are sent via over-the-air broadcasts from local television networks, satellite, or cable.
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
A(n) ____ copies the files that have changed since the last full backup or last incremental backup.
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee's account such as the electric company or telephone company.
SAN (storage attached network)
A(n) ____ is a high-speed network with the sole purpose of providing storage to other servers to which it is attached.
During ____, a systems analyst builds upon the data dictionary developed during the analysis phase.
the use of all capital letters is the equivalent of shouting
According to netiquette, Internet users should assume ____.
Audio ____ is the process of entering any sound into the computer such as speech, music, and sound effects.
A(n) ____ operating system supports two or more processors running programs at the same time.
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
____ is a technology that provides high-speed Internet connection using regular copper telephone lines.
single user/single tasking
Smart phones and other small computing devices often use a ____ operating system.
A(n) ____ circuit, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
A(n) ____ is an identification code that consists of a set of vertical lines and spaces of different widths.
____ is the technology of authenticating a person's identity by verifying a personal characteristic.
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
CompactFlash, Secure Digital and Memory Stick, xD Picture Card
Common types of flash memory cards include ____.
measuring performance and if necessary, taking corrective action
Controlling is an activity performed by managers that involves ____.
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company's overall goals and objectives.
A(n) ____, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer.
General purpose, or ____ systems cross the boundaries of functional units and are used by one or more functional units in an enterprise.
special purpose terminals
____, such as POS terminals and automated teller machines, perform specific tasks and contain features uniquely designed for use in a particular industry.
____, such as accountants, engineers, and other professionals, include individuals whose jobs center on the collection, processing, and application of information.
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
____ servers pack a complete computer server, such as a Web server or network server, on a single card.
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
the actions to be taken to restore full information processing operations
In a disaster recovery plan, the recovery plan specifies ____.
____ software is privately owned software and limited to a specific vendor or computer model.
A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
Users are turning to ____ for crisper, higher-quality output than they can achieve with analog television.
CVS (comp vision syndrome)
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
IP (internet protocol)
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
____ is a special formatting language that programmers use to format documents for display on the Web.
graphical user interface (GUI)
With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
inkjet printers, photo printers, laser printers, thermal printers, mobile, printers, label and postage printers (EXCEPT line printers and dot matrix printers)
Commonly used nonimpact printers include all of the following EXCEPT ____.
____ storage is the physical material on which a computer keeps data, instructions, and information.
If a hard disk is damaged, a computer can be booted from a(n) ____ disk, which is usually a CD that contains a few system files that will start the computer.
RSI (repetitive strain injury)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
The purpose of the ____ phase is to construct, or build, a new or modified system and then deliver it to the users.
KMS (knowledge management system)
Organizations implement ____ to assist in the task of knowledge management.
identifying and combining resources so that company can reach goals and objectives
Organizing is an activity performed by managers that includes ____.
____ computing combines many servers and/or personal computers on a network to act as one large computer.
dial up connection
Although it is an inexpensive way for users to connect to the Internet, ____ is slower-speed technology.
UPS uninterruptible power supply
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
make disc denser by packing pits closer, use two layers of pits, be double sided
A storage technique that a DVD-ROM can use to achieve a higher storage capacity than a CD-ROM is to ____.
OCR (optical character recognition)
____ is a technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.
____ services include a relatively new set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
A(n) ____ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
A competing operating system to Windows Phone is Palm ____, which runs on Palm-powered PDAs and smart phones.
how a company uses backup files and equipment to resume information processing
In a disaster recovery plan, the backup plan specifies ____.
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
clicking a button on the task bar, then a Start menu button, then a Lock menu button
With Windows, a warm boot can be performed by ____.
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
The communications device that connects a communications channel to a sending or receiving device such as a computer is a(n) ____.
ALU (arithmetic logic unit)
The ____ is the component of the processor that performs arithmetic, comparison, and other operations.
The overall technology strategy often is referred to as the information ____ of a company.
The data ____ stores a data item's name, description, and other details about each data item.
A(n) ____ is made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface.
analyze requirements, design solution, validate design, implement design, test solution, and document solution
In sequence, the program development life cycle consists of six steps: ____.
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
A(n) ____ card is a removable device that allows users to transfer data and information conveniently from mobile devices to their desktop computers.
Most ____ devices include a small optical scanner for reading characters and sophisticated software to analyze what is read.
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network.
A NAS (network attached storage) server often is called a storage ____ because it is a piece of equipment with only one function — to provide additional storage.
The power ____ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires.
____ is the practice of sharing or pooling computing resources, such as servers and storage devices.
With ____ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
The ____ unit is the component of the processor that directs and coordinates most of the operations in the computer.
electronic communications privacy act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
The ____ unit is a case that contains electronic components of the computer used to process data.