Video data - such as home movies, feature films, and television shows - is displayed using a collection of ______.
A(n) ___ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
CPU clock speed
One measurement of the speed of a CPU is the ___, which is rated in megahertz (MHz) or gigahertz (GHz).
A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one time.
The bus width and bus speed together determine the bus's ___ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
flash memory chips
____ have begun to replace ROM for storing system information, such as PC's BIOS.
The ___ is the section of the CPU that performs arithmetic involving integers and logical operations.
The ___ tries to predict what data and instructions will be needed and retrieves them ahead of time, in order to help avoid delays in processing.
In order to synchronize all of a computer's operations, a ____ - a quartz crystal located on the motherboard - is used
Some drive letters, such as the letter __ typically used w/ the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to a computer.
_____ means that data can be retrieved directly from any location on the storage medium, in any order.
Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.
Virtually all personal computers come with a(n) ____ that is used to store most programs and data.
The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called the ____.
CD-ROM discs and DVD-ROM discs are ____ optical discs and come prerecorded with commercial products.
Network attached storage (NAS)
____ devices are high-performance storage servers that are individually connected to a network to provide storage for the computers connected to that network.
Some smart cards today store ___ data - such as the characteristics of a finger print - int he card and use that data to ensure the authenticity of the card's user before authorizing the smart card transaction.
With a ___, the user touches the screen with his/her finger to select commands or otherwise provide input to the computer with which it is being used.
Optical mark readers (OMRs)
____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
One factor affecting digital camera quality is the number of pixels, measured in ___, used to store the data for each image.
Wireless displays connect to a computer using wireless networking connection such as Wi-Fi or ____.
____ form images by spraying tiny drops of liquid ink onto the page, one line printed at a time.
System software is usually divided into two categories: operating system software and ___ programs.
The ___ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
Small programs called ___ are used to communicate with peripheral devices, such as monitors, printers, and scanners.
Most operating systems have security features available, such as an integrated ___ to protect against unauthorized access via the Internet.
A ___ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the system.
When a software program is purchased, the buyer is acquiring a(n) ___ that permits him or her to use the software.
public domain software
There are 4 basic categories of software: commercial software, shareware, freeware, and _____.
absolute cell referencing
Although labels and constant values will be copied exactly to the new location, the way formulas behave when they are copied depends on whether they use relative cell referencing or ___.
A ____ is a question, or, in database terms, a request for specific information from the database.
____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.
A(n) ___ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases.
___ is a special type of large, integrated system that ties together all types of a company's activities such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.
Computer-aided manufacturing (CAM)
___ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes.
system development life cycle
Each phase of the ___ produces some type of documentation to pass on to the next phase.
When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ___.
___ programming focuses on the step-by-step instructions that tell the computer what to do to solve a problem.
In a(n) ___ check, the programmer "walks" through the program design, keeping track fo the values of any look counters and other variables in a tracing table to ensure the program does what it is intended to do.
___ are notes within the actual program code that identify key features and steps of the program but that are written in such a way that the computer knows to ignore them when the program is executed.
Rather than creating a complete object module for a program, a(n) ___ reads, translates, and executes the source program one line at a time.
___ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong variable name is used.
Application Lifecycle Management (ALM)
___ is a broad term to describe creating and managing an application throughout its entire lifecycle - from design through testing.
The field in a table that is used to relate that table to other tables is called the ____.
The ___ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
A(n) ___ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.
centralized database system
With a ___, a database is located in its entirety on a single computer, such as a server or mainframe computer.
A ___ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.
One objective of the ___ project was to create a computer network that would allow researchers located in different places to communicate with each other.
Internet service providers (ISPs)
___ are businesses or other organizations that provide Internet access to others, typically for a fee.
Application service providers (ASPs)
___ are companies that manage and distribute Web-based software services to customers over the Internet.
ICANN (Internet Corporation for Assigned Names and Numbers)
___ is charged with such responsibilities as IP address allocation and domain name management.
___ allows you to exchange real-time messages easily with people on you buddy list - a list of individuals that you specify.
The term ___ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his/her home, outside a Wi-Fi hotspot location, or near a local business).
Increasingly, USB security keys, also called USB security ____ - USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features - are being used.
A ___ is security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
virtual private network
A ___ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
A ___ is a malicious program that masquerades as something else - usually as some type of application program.
A computer ___ spreads by creating copies of its code and sending those copies to other computers via a network.
GIF images are always rectangular, but can use a(n) ___ background color to make the images appear to be nonrectangular.
When a Web page requires a very large image (such as to better show a product, home for sale, or featured piece of art), a(n) ____ can be used to save loading time.
A ___ is a small program inserted into a Web page that performs a specific task, such as changing the values in a stock portfolio, scrolling text or images across the screen, and so forth.
Web stie design
___ refers to the process of planning what your Web site will look like and how it will work.
creating the multimedia elements
The first basic step in the development process of a multimedia Web site is ___.
Most Web pages today are written in a _____ - a coding system used to define the structure, layout, and general appearance of the content of a Web page.
___ tags are similar to HTML tags, but there are stricter rules about how the markup tags are written.