Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account


a potentially damaging computer program


copies itself repeatedly, using up resources and possibly shutting down computer or network

trojan horse

hides within or looks like legitimate program until triggered


destructive event, that is delivered

antivirus program

identifies and removes computer viruses

denial of service attack

an assault which disrupts computer access to an internet service such as the web or email

back door

a program or set of instructions in a program that allows users to bypass security controls when accessing a computer resource


a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

fire wall

security system consisting of hardware and/or software that prevents unauthorized intrusion

personal firewall

program that protects personal computer and its data from unauthorized intrusions

possessed object

item that you must carry to gain access to computer or facility

biometric device

authenticates person's identity using personal characteristics

software theft

act of stealing or illegally stealing software

business software alliance (BSA)

promotes better understanding of software privacy problems


process of converting plaintext (readable data) into ciphertext (unreadable characters)

certificate authority (CA)

authorized person or company that issues and verifies digital certificates

secure sockets layer (SSL)

provides encryption of all data that passes between client and internet server

surge protector

protects computer and equipment from electrical power disturbances

IT code of conduct

written guidelines that helps determine whether computer action is ethical


small text file on your computer that contains data about you


program placed on computer without user's knowledge


program that displays online advertisements


unsolicited e-mail message sent to many recipients

computer forensics

discovery, collection, and analysis of evidence found on computers and networks

computer vision syndrome (CVS)

eye and vision problems

carpal tunnel syndrome (CTS)

inflammation of nerve that connects forearm to palm


inflammation of tendon due to repeated motion


applied science devoted to comfort, efficiency, and safety in workplace

information system (IS)

hardware, software, data, people, and procedures that work together to produce quality information

system analyst

responsible for designing and developing information system

project team

formed to work on project from beginning to end

gantt chart

popular tool used to plan and schedule large, complex projects


measure of how suitable system development will be to the company

planning phase

begins when steering committee receives project request

analysis phase

conduct preliminary investigation

preliminary investigation

determine exact nature of problem or improvement and whether it is worth pursuing

process modeling

technique that describes processes that transform inputs into outputs

entity- relationship diagram (ERD)

tool that graphically shows connections among entities in system

data flow diagram (DFD)

tool that graphically shows flow of data in system

structured english

used to explain details of process

decision table

lists variety of conditions and actions that correspond to each condition

decision tree

shows conditions and actions graphically

data dictionary

stores name, description, and other details about each data item

object modeling

combines data with the process that act on data into single unit

unified modeling language (UML)

graphical tool for documenting system

turnkey solution

complete system provided by value added reseller

layout chart

input or output that contains programming like notations for data items

computer-aided software engineering (CASE)

software tools designed to support activities of system development cycle

implementation phase

construct or build new or modified system then deliver it to users

operation, support, and security phase

provides ongoing assistance after system in implemented

computer program

series of instructions that directs computer to perform tasks

assembly language

instructions made up of symbolic instructions codes, meaningful abbreviations and codes

procedural language

programmer writes instructions that tell computer what to accomplish and how to do it


designed for business applications


powerful language originally designed to write system software

Object-oriented programming language (OOP)

used to implement object-oriented design


checks for and responds to set of events


developed by sun microssystems; used just in time (JIT) compiler to convert bytecode into machine-dependent code


includes all elements of C, plus additional features for working with object oriented concepts; used to develop database and web applications


object oriented programming language based on C++; accepted as a stranded for web applications and XML-based web services; Microsoft intermediate language (MSIL)

Visual programming environment (VPE)

allows developers to drag and drop objects to build programs

visual studio

.NET is a set of technologies that allows program to run on internet


powerful program development tool; ideal for large-scale enterprise and web applications

nonprocedural language

the programmer writes english like instructions or interacts with a visual environment to retrieve data from files or a database

program development tools

user-friendly programs designed to assist both programmers and users in creating programs

RPG (report program generator)

nonprocedural language used for generating reports, accessing data, and updating data


non procedural language that allows access to data in database


uses condensed form of english to convey program logic


writing the code that translates the design into a program


rules that specify how to write instructions

extreme programming (XP)

coding and testing as soon as requirements are defined


located and correcting syntax and logic error, or bugs

online security service

website that evaluates your computer to check for internet and e-mail vulnerabilities


programs that act without a users knowledge and deliberately alter the computer's operations


instructions saved in software such as word processing or spread sheet program


antivirus program records information such as file size and file creation date in a separate inoculation file

virus hoax

e-mail message that warns users of a nonexistent virus, worm, or trojan


a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks

proxy server

server outside the company's network that controls which communications pass into the company's network

audit trail

records in a file both successful and unsuccessful access atempts


verifies that an individual is a valid user


verifies that the individual is the person he or she claims to be


unauthorized and illegal duplication of copyrighted software

license agreement

the right to use the software

uninterruptible power supply (UPS)

a device that contains surge protection circuits and one or more batteries that can provide power during a temporary permanent loss of power

full backup

copies all of the files in the computer

selective backup

users choose which folders and files to include in a backup

three-generation backup

preserve three copies of important files

information privacy

refers to the right of individuals and companies to deny or restrict the collect and use of information about them


is a scam in which a perpetrator sends an official looking e-mails message that attempts to obtain your personal financial information


a scam, where ta perpetrator attempts to obtain your personal and financial information, except they do so via spoofing

social engineering

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others

employee monitoring

use of computers to observe, record, and review an employee's use of a computer

content filtering

process of restricting access to certain material on the web

web filtering software

program that restricts access to specified web sites

system development cycle

a set of activities used to build an information system, the length of each activity varies from one system to the next


sets of rules and procedures a company expects employees to accept and follow

steering committee

a decision-making body in a company

project leader

manages and controls the budget and schedule of the project

project management

process of planning, scheduling, and then controlling the activities during the system development cycle

use case diagram

graphically shows how actors interact with the information system

class diagram

graphically shows classes and subclasses in a system

packaged software

prewritten software available for purchase

horizontal market software

meets needs of many companies

vertical market software

design for particular industry

custom software

matches the company's requirements exactly


having an outside source develop it for them


sample of input or output that contains actual data


working model of proposed system

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording