Study sets matching "computer chapter 8"

Study sets
Classes
Users

Study sets matching "computer chapter 8"

31 terms
Computer Science Chapter 8
Accessor Method
Behavior
Class
Class Body
A method of a class that is used to determine the value of a…
The action and communication an object provides.
A data type that defines variables for the state of an object…
The variables, constructors, and methods that implement a cla…
Accessor Method
A method of a class that is used to determine the value of a…
Behavior
The action and communication an object provides.
102 terms
chapter 8-9 computer
chapter 8 Administrative Information S…
Administrative Information systems
hospital information system
*the major administrative information…
...
are mainly financial or administrative in nature, rather than…
is the major system utilized by a healthcare facility.
...
chapter 8 Administrative Information S…
...
Administrative Information systems
are mainly financial or administrative in nature, rather than…
12 terms
Computer Programming Chapter 8
Input Validation Password Requirements
Error Numbers
File Processing
Batch Processing Code
capital letters... lower case ... numbers... special characters... break…
codes
txt_text file, CSV-Comma Separated
read sequential data ... write to the database ... end of file
Input Validation Password Requirements
capital letters... lower case ... numbers... special characters... break…
Error Numbers
codes
18 terms
Computer Science Chapter 8
cohesion/cohesive
coupling
dependency
immutable
all interface features are closely related to the single conc…
the degree to which classes depend on each other
when one class needs services provided by another class
when a class doesn't have a mutator method
cohesion/cohesive
all interface features are closely related to the single conc…
coupling
the degree to which classes depend on each other
Computer Apps Chapter 8
sequential serial values
so that dates can be used in formulas
general
date and time
excell stores dates in ________
Why does excel sto dates in sequential serial values?
to view a serial value as an existing date, for,at the date a…
____ and ____ can be used in calculations
sequential serial values
excell stores dates in ________
so that dates can be used in formulas
Why does excel sto dates in sequential serial values?
26 terms
Chapter 8: Computer Science
Artificial Intelligence
Augmented Reality
Battlefield Robots
Bluetooth
When a computer performs actions that are characteristic of h…
When a computer generated image is overlayed on top of real-t…
A robot by the military to ensure that locations are safe pri…
A networking standard for a very short-range wireless connect…
Artificial Intelligence
When a computer performs actions that are characteristic of h…
Augmented Reality
When a computer generated image is overlayed on top of real-t…
37 terms
Computer Science Chapter 8
Analog signals
Analog-to-digital converter (ADC)
Digital Signals
Digital to analog converter (DAC)
continuous waves that vary in strength and quality; sound and…
simply a microchip that contains the circuitry to convert and…
one that includes discontinuous pulses in which the presence…
converts digital signal to analog
Analog signals
continuous waves that vary in strength and quality; sound and…
Analog-to-digital converter (ADC)
simply a microchip that contains the circuitry to convert and…
Computer Science chapter 8
Object
Index
Decrement
Increment
A collection of related data that comes with a set of methods…
variable or value used to select one of the members of an ord…
Decrease the value of a variable by one. The decrement operat…
Increase the value of a variable by one. The increment operat…
Object
A collection of related data that comes with a set of methods…
Index
variable or value used to select one of the members of an ord…
30 terms
Chapter 8 Computer Apps
GPS : Global positioning system
Receiving device
Network
Local area network (LAN)
A navigational system that uses satellites to find a location.
A device that picks up or receives a signal, from a communica…
A set of connected computers.
A network that connects devices in a limited geographical area.
GPS : Global positioning system
A navigational system that uses satellites to find a location.
Receiving device
A device that picks up or receives a signal, from a communica…
17 terms
Chapter 8 Computer Science
Actor Classes
Utility Classes
Cohesion
"uses" relationship
do work for the programmer (ex: scanner, random)
have no objects, only static methods
good - want the topics to be related - less confusion and mor…
when one class uses the other's instance fields, parameters,…
Actor Classes
do work for the programmer (ex: scanner, random)
Utility Classes
have no objects, only static methods
Chapter 8 Computer Science
Before you can perform a selection sor…
A(n) ________ search uses a loop to se…
When an array is sorted from highest t…
A binary search begins with the ______…
false
linear
descending
middle
Before you can perform a selection sor…
false
A(n) ________ search uses a loop to se…
linear
15 terms
Computers for ESL Students: Chapter 8
message
button
email
password
information that you type and send to another person using em…
a small rectangle that completes an action when you click it
electronic mail, a way to send information from one computer…
a personal word or combination of letters and numbers that le…
message
information that you type and send to another person using em…
button
a small rectangle that completes an action when you click it
60 terms
Computer Final Chapter 8
t
f
t
t
To date, most computer security problems have affected Window…
The term spam refers to viruses attached to email.
A botnet is a collection of zombie computers.
Pictures you download can carry viruses stored in a single pi…
t
To date, most computer security problems have affected Window…
f
The term spam refers to viruses attached to email.
10 terms
AP Computer Science Chapter 8
Recursion
decoration
dcorate
base case
is a programming technique in which a method calls itself
any ornament or adornment used to decorate something
the word is used to define the word decoration
the part of a recursion definition that is not recursive
Recursion
is a programming technique in which a method calls itself
decoration
any ornament or adornment used to decorate something
50 terms
Computer Science Chapter 8
What does OOP stand for?
What is the difference between C++ and…
OOP incorporates what 3 features?
How does OOP simulate real life?
Object Oriented Programming
C++ can be written without using any type of OOP. Java on the…
encapsulation, polymorphism, inheritance
by using a program style that treats a program as a group of…
What does OOP stand for?
Object Oriented Programming
What is the difference between C++ and…
C++ can be written without using any type of OOP. Java on the…
34 terms
Computers Chapter 8
Digital convergence
Digital Living Network Alliance
Telephony
Cellular (cell) phones
The use of a single unifying device to handle media, Internet…
An organization working to standardize different kinds of app…
The use of equipment to provide voice communications over a d…
All phones that use mobile, cellular technology
Digital convergence
The use of a single unifying device to handle media, Internet…
Digital Living Network Alliance
An organization working to standardize different kinds of app…
22 terms
Easy Computer Basics ~ Chapter 8
Microsoft Word
Microsoft Word Web App
For many users, the Word Web App is su…
SkyDrive App
The word processing program of choice.
A free web-based version you can access using Internet Explor…
even though it lacks some of the advanced features of the mor…
You can also open and edit existing Word documents using the…
Microsoft Word
The word processing program of choice.
Microsoft Word Web App
A free web-based version you can access using Internet Explor…
Computer Networking - Chapter 8 - Security in Computer Networks
Security Requirements
Integrity
Availability
Confidentiality and Privacy
Integrity, Availability, Confidentiality and Privacy, Authent…
Is what was received the same thing as what was sent?
Legal users should be able to use. Maintain hardware, update…
No snooping or wiretapping
Security Requirements
Integrity, Availability, Confidentiality and Privacy, Authent…
Integrity
Is what was received the same thing as what was sent?
7 terms
Chapter 8 computer vocab
Gigabyte
Hars Disk Drive
Head crash
incremental backup
1 billion bytes of storage for a device
storage device that contains one or more inflexible, circular…
hard disk failure when a read write head makes contact with t…
security copy that contains only files that have been altered.
Gigabyte
1 billion bytes of storage for a device
Hars Disk Drive
storage device that contains one or more inflexible, circular…
20 terms
Discovering Computer Fundamentals Chapter 8
Computer communications
global positioning system (GPS)
Collaboration software
network
a process in which two or more computers or devices transfer…
a navigation system that consists of one or more earth-based…
tools that enable users to share documents via online meeting…
a collection of computers and devices connected together via…
Computer communications
a process in which two or more computers or devices transfer…
global positioning system (GPS)
a navigation system that consists of one or more earth-based…
52 terms
Computer Forensics Chapter 8
Windows has a number of files. A progr…
__________ is a storage controller dev…
The Windows program that handles secur…
__________ is a Windows file that is a…
ntdetect.com
Ntbootdd.sys
lsass.exe
Hal.dll
Windows has a number of files. A progr…
ntdetect.com
__________ is a storage controller dev…
Ntbootdd.sys
AP Computer Science Chapter 8
Array
Size declarator
Subscript
Bounds Checking
Holds multiple values of the same data type simultaneously.
Indicates the number of elements or values an array can hold.
A number that identifies a certain element in an array.
Java checks automatically whether a number is within the boun…
Array
Holds multiple values of the same data type simultaneously.
Size declarator
Indicates the number of elements or values an array can hold.
Computer Networks: Chapter 8
Which network is the smallest?
What is the best protocol for transfer…
What is the least used topology?
What is the mapping of a physical netw…
LAN
TCP/IP
Ring
Topology
Which network is the smallest?
LAN
What is the best protocol for transfer…
TCP/IP
99 terms
Computer Concepts 2014 - Chapter 8
3-D graphics
AAC
AACS
Analog hole
A type of digital graphics format that displays a three-dimen…
(Advanced Audio Coding) A file format that provides highly co…
(Advanced Access Content System) A digital rights management…
Any device or technique that allows digital content to be cop…
3-D graphics
A type of digital graphics format that displays a three-dimen…
AAC
(Advanced Audio Coding) A file format that provides highly co…
11 terms
Computer Programming: Chapter 8
True/False: A linear search can only b…
When an array is sorted from highest t…
True/False: The number of comparisons…
Data that is sorted in descending orde…
False
descending
True
from highest to lowest value
True/False: A linear search can only b…
False
When an array is sorted from highest t…
descending
Computer Maintenance Chapter 8
Which unit is used to measure voltage?
Which unit is used to measure current?
Which unit is used to express the numb…
Which unit is used to measure resistan…
Volt
Ampere
Watt
Ohm
Which unit is used to measure voltage?
Volt
Which unit is used to measure current?
Ampere
6 terms
Computer science chapter 8
Analog vs digital
PandA
What is a binary system
What is the basic binary unit
Analog is continuous ... Digital is discrete
Presence and absence of some physical thing ... It is discrete
The use of two basic patterns
Bit
Analog vs digital
Analog is continuous ... Digital is discrete
PandA
Presence and absence of some physical thing ... It is discrete
50 terms
Computer Science Chapter 8
What does OOP stand for?
What is the difference between C++ and…
OOP incorporates what 3 features?
How does OOP simulate real life?
Object Oriented Programming
C++ can be written without using any type of OOP. Java on the…
encapsulation, polymorphism, inheritance
by using a program style that treats a program as a group of…
What does OOP stand for?
Object Oriented Programming
What is the difference between C++ and…
C++ can be written without using any type of OOP. Java on the…
Computer Tech Chapter 8
Online Pictures
Compressing
Shapes
Effects
Clip Art can be accessed by clicking on which button?
Decreasing the size of a picture file by reducing the resolut…
Lines, block arrows, stars, and banners are examples of what?
Which tools provide options for formatting shapes?
Online Pictures
Clip Art can be accessed by clicking on which button?
Compressing
Decreasing the size of a picture file by reducing the resolut…
30 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
17 terms
Computing Chapter 8
Each pixel on a computer display is fo…
RGB, the name for a color encoding met…
All colors with equal intensities of t…
Contrast is the size of the difference…
False
True
True
True
Each pixel on a computer display is fo…
False
RGB, the name for a color encoding met…
True
13 terms
Discovering Computers, Chapter 8
single-session
storage media
cloud
smart cards
Term used to describe a standard CD-ROM because manufacturers…
The physical material on which a computer keeps data, instruc…
An Internet service that provides storage to a computer or mo…
Can be used to store a prepaid amount of money, such as for s…
single-session
Term used to describe a standard CD-ROM because manufacturers…
storage media
The physical material on which a computer keeps data, instruc…
38 terms
Chapter 8 computer concepts
Domain name
Scanner
Server
URL
The initial part of a URL listing; The domain and name of the…
A device that reads text or illustrations on a printed page a…
A computer or device on a network that manages shared network…
The acronym for uniform resource locator, specifies the globa…
Domain name
The initial part of a URL listing; The domain and name of the…
Scanner
A device that reads text or illustrations on a printed page a…
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
29 terms
Computer Architecture Chapter 8
What are the two important streams use…
What is the difference between a cache…
What are the two techniques for writin…
What is Write Through?
Instruction Stream... Data Stream
Cache... -reading... -html... -cookies... -png?... Buffer... -write
Write Through... Write Back
When information is written to all levels of the cache
What are the two important streams use…
Instruction Stream... Data Stream
What is the difference between a cache…
Cache... -reading... -html... -cookies... -png?... Buffer... -write
20 terms
Computer 1A Chapter 8 Vocab
CD-ROM
sectors
WORM
hard disk
optical disk that users can read but not write on or erase
the operating system marks bad ones as unstable when a disk i…
format of a disk that can be written once and read many times
enclosed in an airtight, sealed case to protect it from conta…
CD-ROM
optical disk that users can read but not write on or erase
sectors
the operating system marks bad ones as unstable when a disk i…
23 terms
Computer Lit Chapter 8 Vocab
algorithm
bad sector
bot
clip
a set of rules a program follows in calculations or other pro…
a sector on a disk that does not record data reliably
a program that runs repetitive tasks
a segment of video or other media
algorithm
a set of rules a program follows in calculations or other pro…
bad sector
a sector on a disk that does not record data reliably
21 terms
Chapter 8 - Computer Reliability
Who/When was the Patriot Missile origi…
What/When is the Patriot Missile's sig…
With regards to the Patriot Missile, w…
With regards to the Patriot Missile, w…
Designed by US Army to shoot down airplanes during 1991 Gulf…
Failure occured during night of February 25 1991 when a Scud…
The Patriot Missile battery defending the area never even fir…
The missile battery did detect the incoming Scud missile but…
Who/When was the Patriot Missile origi…
Designed by US Army to shoot down airplanes during 1991 Gulf…
What/When is the Patriot Missile's sig…
Failure occured during night of February 25 1991 when a Scud…
20 terms
Computer 1A Chapter 8 Vocab
CD-ROM
sectors
WORM
hard disk
optical disk that users can read but not write on or erase
the operating system marks bad ones as unstable when a disk i…
format of a disk that can be written once and read many times
enclosed in an airtight, sealed case to protect it from conta…
CD-ROM
optical disk that users can read but not write on or erase
sectors
the operating system marks bad ones as unstable when a disk i…
25 terms
Chapter 8: Computer Networks
Any device connected to a network is c…
What is the central location of a netw…
What is the best protocol for transfer…
What is the least used topology?
Node
Hub
TCP/IP
Ring
Any device connected to a network is c…
Node
What is the central location of a netw…
Hub
18 terms
Chapter 8 Vocabulary COMPUTER APPS
Caption
Cell
Clip Art
Compress
A few descriptive words providing readers with information re…
The rectangles that are formed when rows and columns intersect.
A collection of media files available to insert in Microsoft…
Reduce the size of an object.
Caption
A few descriptive words providing readers with information re…
Cell
The rectangles that are formed when rows and columns intersect.
15 terms
Computer Literacy Chapter 8 Vocabulary
Administrative Rights
Administrator Account
Driver
Embedded Operating System
Permission to make changes on a computer system
A collection of information that determines which files you c…
A Small program that instructs the operating system on how to…
similar in principle to operating systems such as Windows or…
Administrative Rights
Permission to make changes on a computer system
Administrator Account
A collection of information that determines which files you c…
Computer science chapter 8 terms
Analog
Analog to digital converter chip
Base transceiver station
Bluetooth
Waves that illustrate the loudness of a sound or the brightne…
Converts analog signals into digital signals
A large communications tower with antennas amplifiers and rec…
A type of wireless technology that uses radio waves to transm…
Analog
Waves that illustrate the loudness of a sound or the brightne…
Analog to digital converter chip
Converts analog signals into digital signals
Computer Science chapter 8 vocab
Cohesive
Unified Modeling Language
Mutator method
Accessor method
all of its features are related to the concept that the class…
distinguishes between object diagrams and class diagrams
changes the state of an object
ask an object to compute a result, without changing the state
Cohesive
all of its features are related to the concept that the class…
Unified Modeling Language
distinguishes between object diagrams and class diagrams
38 terms
Computer Science Chapter 8 Vocabulary
counter
strokeWeight(thickness);
variable
point(x, y);
used in a while loop where we need to define a variable with…
this command lets you change how thick an outline is
use the same way in Java Script as they were in python; a way…
code for point
counter
used in a while loop where we need to define a variable with…
strokeWeight(thickness);
this command lets you change how thick an outline is
30 terms
Chapter 8 - Computer Systems
How does a bar code reader work?
How does a flatbed scanner work?
How does an RFID reader work?
How does a touch-sensitive screen work?
A bar code is a sequence of white and black bars that encodes…
A flatbed scanner has a glass pane illuminated from beneath b…
RFID uses radio frequencies to transmit data, a timing signal…
A touch-sensitive screen is a type of VDU that allows a user…
How does a bar code reader work?
A bar code is a sequence of white and black bars that encodes…
How does a flatbed scanner work?
A flatbed scanner has a glass pane illuminated from beneath b…
Chapter 8 study guide Computer concepts
access time
backup plan
burning
capacity
Measures amount of time it takes locate an and deliver an ite…
Specifies a schedule for copying/storing important data, info…
Process of writing on an optical disc
Number of bytes (characters) a storage medium can hold
access time
Measures amount of time it takes locate an and deliver an ite…
backup plan
Specifies a schedule for copying/storing important data, info…
99 terms
Computer Concepts 2014 - Chapter 8
3-D graphics
AAC
AACS
Analog hole
A type of digital graphics format that displays a three-dimen…
(Advanced Audio Coding) A file format that provides highly co…
(Advanced Access Content System) A digital rights management…
Any device or technique that allows digital content to be cop…
3-D graphics
A type of digital graphics format that displays a three-dimen…
AAC
(Advanced Audio Coding) A file format that provides highly co…
99 terms
Computer Concepts 2014 - Chapter 8
3-D graphics
AAC
AACS
Analog hole
A type of digital graphics format that displays a three-dimen…
(Advanced Audio Coding) A file format that provides highly co…
(Advanced Access Content System) A digital rights management…
Any device or technique that allows digital content to be cop…
3-D graphics
A type of digital graphics format that displays a three-dimen…
AAC
(Advanced Audio Coding) A file format that provides highly co…
19 terms
AP Computer Science Chapter 8
What makes the String class unusual?
How can you include a double quote cha…
Is "length".length() allowed syntax? I…
Define immutable objects.
It has two operators: + and +=
\"
Yes, it is valid and returns 6
Objects that after they are created, a string cannot be chang…
What makes the String class unusual?
It has two operators: + and +=
How can you include a double quote cha…
\"
2 of 10