INSY 2303 Final Exam UTA (Spring 2024)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

80 Terms

1
New cards

Antivirus

A computer program used to identify, isolate, and eliminate viruses by scanning files as they arrive, leave, or are executed. Is a type of utility software that looks for and eliminates viruses, trojans, worms, and other malware.

2
New cards

ASCII

(American Standard Code for Information Interchange) A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers.

3
New cards

Authentication

The process of verifying the identity of an entity that is attempting to access a device, network, or Web site.

4
New cards

Bitmap

An image, such as a digital photo, that is stored as a gridwork of colored dots. Based on pixels.

5
New cards

Blogosphere

The world of blogs and all their interconnections.

6
New cards

Boolean Operators

Named after mathematician George Boole; AND, OR, and NOT are used to formulate database queries.

7
New cards

Browser Cache

The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.

8
New cards

Code

One or more statements written as part of a computer program.

9
New cards

Common Carrier

A person or company, such as Delta Airlines or AT&T, that transports goods or data for the general public.

10
New cards

Compiler

Software that translates a program written in a high-level language into low-level instructions before the program is executed.

11
New cards

Compression

The process of shrinking the size of a file by removing data or recoding it more efficiently.

12
New cards

Computer Generations

First Generation: Vacuum Tubes.

Second Generation: Transistors.

Third Generation: Integrated Circuits.

Fourth Generation: Microprocessors.

Fifth Generation: Artificial Intelligence.

13
New cards

Computer Types

Supercomputer, Mainframe computer, Minicomputer, and Micro Computer, Workstation, PC

14
New cards

Cookie

A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user.

15
New cards

first-party cookie

A cookie generated by the Web page that is shown in the browser.

16
New cards

third-party cookie

A cookie that is generated by an ad or an entity other than the Web page that is shown in the browser.

17
New cards

CRT

Cathode ray tube, A type of display device that uses

electron beams within a vacuum tube to create images

on a fluorescent screen.

18
New cards

Cryptographic Key

A specific word, number, or phrase that must be used to encrypt or decrypt data.

19
New cards

Cyberwar

The use of hacking, computer viruses, bots, and other digital techniques to conduct politically motivated espionage or sabotage.

20
New cards

Data Breach

A situation in which data is accessed by unauthorized parties.

21
New cards

Data Types

The characteristics of data that can be entered into a field in a data file; data types include character, numeric, date, logical, and memo.

22
New cards

Data Warehouse

A collection of information organized for analysis.

23
New cards

Decision Table

A tabular method for listing rules and specifying the outcomes for various combinations of rules.

24
New cards

Declarative Paradigm

An approach to the programming process in which a programmer writes a program by specifying a set of statements and rules that define the conditions for solving a problem.

25
New cards

Disaster Recovery Plan

A step-by-step plan that describes the methods used to secure equipment and data against disasters, and how to recover from fires, floods, and other such events.

26
New cards

Disk Partition

An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.

27
New cards

Disruptive Technologies

An invention that changes markets by replacing existing goods or services.

28
New cards

Domain

Short for fully qualified domain name; an identifying name by which host computers on the Internet are familiarly known (for example, nike.com).

29
New cards

Email Protocols

A system for sending messages from one digital device to another using protocols such as SMTP, POP, and IMAP.

30
New cards

Encapsulation

An object-oriented technique in which the internal details of an object are "hidden" in order to simplify their use and reuse.

31
New cards

Fact

In the context of Prolog programming, a statement incorporated into a program that provides basic information for solving a problem.

32
New cards

Feature Creep

An undesirable occurrence during information system development when users, customers, or designers attempt to add features after the final specifications have been approved.

33
New cards

File naming conventions

A set of rules, established by the operating system, that must be followed to create a valid file name.

34
New cards

Firewall

Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts.

35
New cards

HTML

Hyper Text Markup Language, is the most basic building block of the Web

36
New cards

HTTPS

Hypertext Transfer Protocol Secure, The protocol used to create secure connections for ecommerce by adding a layer of encryption.

37
New cards

Information Systems

The career field or academic major that focuses on developing computer systems and networks for businesses.

38
New cards

Intellectual Property

A legal concept that refers to ownership of intangible information, such as ideas.

39
New cards

IP

Internet Protocol, One of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations. IPv4 offers 32-bit addresses, whereas IPv6 offers 128-bit addresses.

40
New cards

IPv6

Internet Protocol version 6, Internet addresses that are 128 bits in length.

41
New cards

JPEG

Joint Photographic Experts Group, A format that uses lossy compression to store bitmap images. JPEG (pronounced "JAY-peg") files have a .jpg extension.

42
New cards

Last Mile

A term used in the telecommunication industry to describe the wiring segment that connects a home or business to the common carrier's system.

43
New cards

Low-Level Languages

A programming language that requires a programmer to write instructions for specific hardware elements such as the computer processor, registers, and RAM locations.

44
New cards

Machine Language

A low-level language written in binary code that the computer can execute directly.

45
New cards

Moore's Law

Gordon Moore's prediction that technological innovation would double the number of transistors in an integrated circuit every two years without raising its cost.

46
New cards

Multicore

A microprocessor that contains circuitry for more than one processing unit.

47
New cards

Multithreading

A technology that allows multiple parts, or threads, from a program to run simultaneously.

48
New cards

Naming Convention

A set of rules, established by the operating system, that must be followed to create a valid file name.

49
New cards

Network Topology

Refers to the structure and layout of network components, such as computers, connecting cables, and wireless signal paths. The physical structure of a network including its devices and connections.

50
New cards

Network Types

Personal area network (PAN), local area network (LAN), wireless LAN (WLAN), metropolitan area network (MAN), virtual private network (VPN), wide area network (WAN), virtual LAN (VLAN), home network

51
New cards

NoSQL Databases (Check it

A collection of technologies for efficiently working with very large data sets or big data.

52
New cards

Numbering Systems

binary (base-2), decimal (base-10), octal (base-8), and hexadecimal (base-16).

53
New cards

Password

Protect digital devices from unauthorized access, and they protect user accounts at online banks, Web sites, and app stores

54
New cards

Pirated Software

Software that is copied, sold, or distributed without permission from the copyright holder.

55
New cards

Printers

Electronic device that accepts text files or images from a computer and transfers them to a medium such as paper or film.

56
New cards

Procedural Paradigm

An approach to programming in which a programmer defines the steps for solving a problem.

57
New cards

Project Failure

when a project does not meet its goals and objectives

58
New cards

Private attribute

An attribute for an object, a class, or a record that can be accessed only from the program routine in which it is defined.

59
New cards

Pseudo Code

A notational system for algorithms that combines English and a programming language.

60
New cards

Public attribute

An attribute for an object, a class, or a record that can be accessed from any routine in a program.

61
New cards

RAM

Random access memory, Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.

62
New cards

ROM

Read-only memory, Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.

63
New cards

Ransomware

Malware that encrypts files as part of an exploit to extort money from victims who want to regain use of their files in unencrypted format.

64
New cards

Resumes

Is a document created and used by a person to present their background, skills, and accomplishments

65
New cards

Root Directory

The main directory of a disk.

66
New cards

Runtime Error

An error that occurs when a computer program is run.

67
New cards

Semiconductor

Substances, such as silicon or germanium, that can act as either a conductor or an insulator. Used in the manufacture of computer chips.

68
New cards

Shareware

a type of proprietary software that is initially shared by the owner for trial use at little or no cost

69
New cards

Social Engineering

Methods for tricking people into engaging in non-secure activities, such as clicking links and downloading infected files.

70
New cards

SQL Key Words

A collection of command words that issue instructions to an SQL database. SQL is a popular query language used by mainframes and microcomputers.

71
New cards

TCP

Transmission Control Protocol, The protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets.

72
New cards

Throughput

Measures the volume of data that passes through a network in a given period. Throughput impacts how much data you can transmit in a period of time

73
New cards

Trojan

A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.

74
New cards

UDP

User Datagram Protocol, a protocol used on the internet as an alternative to TCP

75
New cards

V's of Big Data

Velocity, volume, value, variety and veracity. The size of the data can be considered to be big data is a constantly varying factor and newer tools are continuously being developed to handle this big data.

76
New cards

VoIP

Voice over Internet Protocol, Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.

77
New cards

Von Neuman

a design model for computers where the processing unit, memory, and input-output devices are interconnected through a single, central system bus

78
New cards

Web Crawler

The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.

79
New cards

Wiki

Software that allows users to collaborate to create, change, and link Web pages. Used for applications such as Wikipedia and open source project management.

80
New cards

WWW

World-Wide Web, a hypertext-based information system.