CTA 100 Final Ch 7-13

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/91

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

92 Terms

1
New cards

seconadarystorage

provides permanent or non volatile storage

2
New cards

media

physical material that holds the data and programs

3
New cards

capacity

measures how much a particular storage medium can hold

4
New cards

storage devices

hardware that reads data and programs from storage media ( moat write to storage media)

5
New cards

access speed

measures the amount of time required by the storage device to retrieve data and programs

6
New cards

RAID- redundant arrays of inexpensive disks

improve performance by expanding external storage, improving access speed, and providing reliable storage ( several are connected to one another)

7
New cards

optical disc

can hold over 128gb of data

8
New cards

lands

the 1s and 0s are represented by flat areas

9
New cards

pits

bumpy areas

10
New cards

optical disc drive

a laser that projects a tiny beam of light on these areas

11
New cards

compact discs (CD)

the first widely available optical format for PC users, store 700 MB of storage

12
New cards

digital versatile discs (DVD)

the standard for PCs; store 4.7 GB

13
New cards

blue ray discs (BD)

newest form; designs to store high def. video

14
New cards

read-only (ROM) discs

cannot be written on or erased by the user

15
New cards

write-once discs

can be written on once; after that the disc can be read many times but cannot be written or erased

16
New cards

re writable discs

disc surface is not permanently altered when data is recorded

17
New cards

twisted- pair cable

consists of copper wire that is twisted together ; standard telephone lines and Ethernet cables

18
New cards

coaxial cable

high frequency transmission cable, replaces the multiple wires of telephone lines; used to deliver tv signals as well as to connect to computers in a network

19
New cards

fiber-optic cable

transmit data as pulses of light through tiny tubes of glass;lighter and faster

20
New cards

bluetooth

short range radio communication standard that transmits data over short distances; up to 33 feet

21
New cards

wi-fi

uses high frequency signals to transmit data

22
New cards

microwave

communication uses high-frequency radio waves

23
New cards

WiMax

new standard that extends the range of Wi-Fi networks using microwave connections

24
New cards

celluar

communication uses multiple antennae to send and receive data within relatively small geographic regions

25
New cards

satellite

communication uses satellites orbiting about 22,000 miles above the earth as microwave relay stations

26
New cards

uplink

sending data to a satellite

27
New cards

downlink

receiving data from a satellite

28
New cards

analog signals

continuous electronic waves

29
New cards

digital signals

computers, in contrast, send and receive

30
New cards

DSL - digital subscriber line

is provided by companies using existing telephone lines to provide high-speed connections

31
New cards

ADSL - asymmetric digital subscriber

most widely used types of DSL

32
New cards

bandwidth

a measurement of the width or capacity of the communication channel

33
New cards

protocols

rules for exchanging data between computers

34
New cards

TCP/IP

identifying sending and receiving devices ; breaks up traffic packages into smaller parts and send it

35
New cards

node

any device that is connected to a network

36
New cards

network architecture

describes how a network is arranged and how resources are coordinated and shared

37
New cards

LAN

local area nwtwork located within close proximity

38
New cards

Home

local area network for home and apt use; typically wireless

39
New cards

WLAN

wireless local area network all communication passes through access point

40
New cards

PAN

personal area network; connects digital devices such as PDAs

41
New cards

MAN

metropolitan area network; typically spans cities with coverage up to 100 miles

42
New cards

VAN

wide area network for countrywide or worldwide coverage

43
New cards

star network

each device connected directly to a central network switch

44
New cards

firewall

consists of hardware and software that control access to a company's intranet and other internal networks

45
New cards

proxy server

most use softeare or a special computer

46
New cards

Intrusion detection systems (IDS)

work with firewalls to protect an organization's network

47
New cards

Virtual private networks (VPN)

create a secure private connection between a remote user and an organization;s internal network

48
New cards

privacy

what are the threats to personal privacy, and how can we protect ourselves?

49
New cards

security

how can access to sensitive information be controlled, and how can we secure hardware and software?

50
New cards

ethics

how do the actions of individual users and companies affect society?

51
New cards

freedom of information act

you are also entitled to look at your records held by government agencies

52
New cards

cracker

a computer criminal who creates and distributes malicious programs

53
New cards

viruses

programs that migrate through networks and operating systems, and most attach themselves to different programs and databases

54
New cards

cybercrime/ computer crime

any criminal offense that involves a computer and a network

55
New cards

malware

malicious software

56
New cards

computer fraud and abuse act

creating and knowingly spreading a virus is a very serious crime and a federal offense punishable

57
New cards

worms

programs that simply replicate themselves over and over again

58
New cards

trojan horses

programs that appear to be harmless; however they contain malicious programs; they are NOT viruses

59
New cards

zombies

computers infected by a virus, worm , or trojan horse that allows them to be remotely controlled for malicious purposes

60
New cards

cyberbullying

the use of the internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person

61
New cards

Firewalls

act as a security buffer between a corporation's private network and all external networks, including the internet

62
New cards

encryption

the process of coding information to make it unreadable expect those who have a special piece of information know as an encryption key

63
New cards

email encryption

protects email messages as they move across the internet

64
New cards

file encryption

protects sensitive files by encrypting them before they are stored on a hard drive

65
New cards

website encryption

secured web transactions

66
New cards

supervisors

manage and monitor the employees or workers

67
New cards

middle management

control, planning , and decision management ; long term goals of organization

68
New cards

top management

concerned with long term planning ; they need information to help them with future growth

69
New cards

transaction processing system ( TPS)/ data processing system (DPS)

helps an organization keep track of routine operations and records these events in a database

70
New cards

balance sheets

list the overall financial condition of an organization

71
New cards

income statements

show a company financial performance; income, expenses, and the difference between them for a specific time period

72
New cards

general ledger

keeps track of all summaries of all the foregoing transactions

73
New cards

character

is the most basic logical data element ; a single letter, number, or special character

74
New cards

field

group of related characters ( ex last name )

75
New cards

attribute

description or characteristic

76
New cards

entity

person, place, thing, or object

77
New cards

record

collection of related fields (payroll record)

78
New cards

table

is a collection of related records (payroll table)

79
New cards

sharing

information from one department can be readily shared

80
New cards

security ( databases)

users are given passwords or access only to the kind on information they need

81
New cards

less data redundancy

without a common database, individual departments have to create and maintain their own data, and data redundancy results

82
New cards

data integrity

when there are multiple sources of data, each source may have variations ( main street vs main st. )

83
New cards

relational databases

the data elements are stored in different tables, each of which consists of rows and columns

84
New cards

program

a list of instructions for the computer to follow to accomplish the task of processing data into information

85
New cards

machine language

first generation; 0s and 1s

86
New cards

assembly language

second generation; ( ADD )

87
New cards

high level procedural language

third generation; ( if, then)

88
New cards

task oriented language

fourth generation; english like ;SQUEL

89
New cards

problem and constraint language

fifth generation; english like

90
New cards

computer-aided software engineering (CASE)

provide some automation and assistance in program design, coding, and testing

91
New cards

object-oriented programming (OOP)

a process by which a program is organized into objects

92
New cards

primary key

uniquely identifies the record