1/79
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Antivirus
A computer program used to identify, isolate, and eliminate viruses by scanning files as they arrive, leave, or are executed. Is a type of utility software that looks for and eliminates viruses, trojans, worms, and other malware.
ASCII
(American Standard Code for Information Interchange) A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers.
Authentication
The process of verifying the identity of an entity that is attempting to access a device, network, or Web site.
Bitmap
An image, such as a digital photo, that is stored as a gridwork of colored dots. Based on pixels.
Blogosphere
The world of blogs and all their interconnections.
Boolean Operators
Named after mathematician George Boole; AND, OR, and NOT are used to formulate database queries.
Browser Cache
The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.
Code
One or more statements written as part of a computer program.
Common Carrier
A person or company, such as Delta Airlines or AT&T, that transports goods or data for the general public.
Compiler
Software that translates a program written in a high-level language into low-level instructions before the program is executed.
Compression
The process of shrinking the size of a file by removing data or recoding it more efficiently.
Computer Generations
First Generation: Vacuum Tubes.
Second Generation: Transistors.
Third Generation: Integrated Circuits.
Fourth Generation: Microprocessors.
Fifth Generation: Artificial Intelligence.
Computer Types
Supercomputer, Mainframe computer, Minicomputer, and Micro Computer, Workstation, PC
Cookie
A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user.
first-party cookie
A cookie generated by the Web page that is shown in the browser.
third-party cookie
A cookie that is generated by an ad or an entity other than the Web page that is shown in the browser.
CRT
Cathode ray tube, A type of display device that uses
electron beams within a vacuum tube to create images
on a fluorescent screen.
Cryptographic Key
A specific word, number, or phrase that must be used to encrypt or decrypt data.
Cyberwar
The use of hacking, computer viruses, bots, and other digital techniques to conduct politically motivated espionage or sabotage.
Data Breach
A situation in which data is accessed by unauthorized parties.
Data Types
The characteristics of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo.
Data Warehouse
A collection of information organized for analysis.
Decision Table
A tabular method for listing rules and specifying the outcomes for various combinations of rules.
Declarative Paradigm
An approach to the programming process in which a programmer writes a program by specifying a set of statements and rules that define the conditions for solving a problem.
Disaster Recovery Plan
A step-by-step plan that describes the methods used to secure equipment and data against disasters, and how to recover from fires, floods, and other such events.
Disk Partition
An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.
Disruptive Technologies
An invention that changes markets by replacing existing goods or services.
Domain
Short for fully qualified domain name; an identifying name by which host computers on the Internet are familiarly known (for example, nike.com).
Email Protocols
A system for sending messages from one digital device to another using protocols such as SMTP, POP, and IMAP.
Encapsulation
An object-oriented technique in which the internal details of an object are "hidden" in order to simplify their use and reuse.
Fact
In the context of Prolog programming, a statement incorporated into a program that provides basic information for solving a problem.
Feature Creep
An undesirable occurrence during information system development when users, customers, or designers attempt to add features after the final specifications have been approved.
File naming conventions
A set of rules, established by the operating system, that must be followed to create a valid file name.
Firewall
Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts.
HTML
Hyper Text Markup Language, is the most basic building block of the Web
HTTPS
Hypertext Transfer Protocol Secure, The protocol used to create secure connections for ecommerce by adding a layer of encryption.
Information Systems
The career field or academic major that focuses on developing computer systems and networks for businesses.
Intellectual Property
A legal concept that refers to ownership of intangible information, such as ideas.
IP
Internet Protocol, One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations. IPv4 offers 32-bit addresses, whereas IPv6 offers 128-bit addresses.
IPv6
Internet Protocol version 6, Internet addresses that are 128 bits in length.
JPEG
Joint Photographic Experts Group, A format that uses lossy compression to store bitmap images. JPEG (pronounced "JAY-peg") files have a .jpg extension.
Last Mile
A term used in the telecommunication industry to describe the wiring segment that connects a home or business to the common carrier's system.
Low-Level Languages
A programming language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations.
Machine Language
A low-level language written in binary code that the computer can execute directly.
Moore's Law
Gordon Moore's prediction that technological innovation would double the number of transistors in an integrated circuit every two years without raising its cost.
Multicore
A microprocessor that contains circuitry for more than one processing unit.
Multithreading
A technology that allows multiple parts, or threads, from a program to run simultaneously.
Naming Convention
A set of rules, established by the operating system, that must be followed to create a valid file name.
Network Topology
Refers to the structure and layout of network components, such as computers, connecting cables, and wireless signal paths. The physical structure of a network including its devices and connections.
Network Types
Personal area network (PAN), local area network (LAN), wireless LAN (WLAN), metropolitan area network (MAN), virtual private network (VPN), wide area network (WAN), virtual LAN (VLAN), home network
NoSQL Databases (Check it
A collection of technologies for efficiently working with very large data sets or big data.
Numbering Systems
binary (base-2), decimal (base-10), octal (base-8), and hexadecimal (base-16).
Password
Protect digital devices from unauthorized access, and they protect user accounts at online banks, Web sites, and app stores
Pirated Software
Software that is copied, sold, or distributed without permission from the copyright holder.
Printers
Electronic device that accepts text files or images from a computer and transfers them to a medium such as paper or film.
Procedural Paradigm
An approach to programming in which a programmer defines the steps for solving a problem.
Project Failure
when a project does not meet its goals and objectives
Private attribute
An attribute for an object, a class, or a record that can be accessed only from the program routine in which it is defined.
Pseudo Code
A notational system for algorithms that combines English and a programming language.
Public attribute
An attribute for an object, a class, or a record that can be accessed from any routine in a program.
RAM
Random access memory, Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.
ROM
Read-only memory, Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.
Ransomware
Malware that encrypts files as part of an exploit to extort money from victims who want to regain use of their files in unencrypted format.
Resumes
Is a document created and used by a person to present their background, skills, and accomplishments
Root Directory
The main directory of a disk.
Runtime Error
An error that occurs when a computer program is run.
Semiconductor
Substances, such as silicon or germanium, that can act as either a conductor or an insulator. Used in the manufacture of computer chips.
Shareware
a type of proprietary software that is initially shared by the owner for trial use at little or no cost
Social Engineering
Methods for tricking people into engaging in non-secure activities, such as clicking links and downloading infected files.
SQL Key Words
A collection of command words that issue instructions to an SQL database. SQL is a popular query language used by mainframes and microcomputers.
TCP
Transmission Control Protocol, The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets.
Throughput
Measures the volume of data that passes through a network in a given period. Throughput impacts how much data you can transmit in a period of time
Trojan
A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.
UDP
User Datagram Protocol, a protocol used on the internet as an alternative to TCP
V's of Big Data
Velocity, volume, value, variety and veracity. The size of the data can be considered to be big data is a constantly varying factor and newer tools are continuously being developed to handle this big data.
VoIP
Voice over Internet Protocol, Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.
Von Neuman
a design model for computers where the processing unit, memory, and input-output devices are interconnected through a single, central system bus
Web Crawler
The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.
Wiki
Software that allows users to collaborate to create, change, and link Web pages. Used for applications such as Wikipedia and open source project management.
WWW
World-Wide Web, a hypertext-based information system.