Send a link to your students to track their progress
373 Terms
1
New cards
(Studying Systems) Document Collection
Good quality objective data, documentation may be limited
2
New cards
(Studying Systems) Interview
Detailed with key people, time, consuming
3
New cards
(Studying Systems) Questionairre
Reach large audiences quickly, may not be well designed and could get bad user input
4
New cards
(WAP?)
Provided by wireless router, allows wireless data transfer between device and network
5
New cards
*(Boolean Operators)* And
Put the two variables beside each other
6
New cards
*(Boolean Operators)* Know how to make
(Truth Table!)
7
New cards
*(Boolean Operators)* Logic of Operations
*N*ot operators, *P*aranthesis, *A*nd, *O*r
8
New cards
*(Boolean Operators)* NAND
Not (x and y)
9
New cards
*(Boolean Operators)* NOR
Not (x or y)
10
New cards
*(Boolean Operators)* Not
~
11
New cards
*(Boolean Operators)* Or
+
12
New cards
*(Boolean Operators)* XOR
Exclusive Or (one or the other but not both)
13
New cards
*(Logic Gates)* NOT Gate
14
New cards
*(Windows)* Memory Management
Windows Memory Diagnostics, Task Manager, Defrag, Virtual Memory
15
New cards
*(Windows)* Networking
Windows Network and Sharing Center
16
New cards
*(Windows)* Peripheral Communication
Device Manager
17
New cards
*(Windows)* Resource Monitoring and Management
Windows System Information, Task Manager
18
New cards
1.2.3 Social & Ethical Issues Associated with Networked World
- Loss of jobs due to computer automation - Digital divide: more confidence with computer use have higher chances for success than those who don't. - Distraction: limited face-to-face social interaction - Security issues - Privacy issues - Reliability - Copyright infringements - Globalization
19
New cards
A computing system is a
dynamic entity, used to solve problems and interact with its environment
20
New cards
A-D converter
Analog-digital converter; "digitizer"
21
New cards
address bus
pathway from memory to processing unit carrying addressin in memory to and from where data is transferred
22
New cards
Advantages/Disadvantages of Automatic Updates
+ Easier for inexperienced users + No software problems because of user not updating or forgetting to update + Always done on time - No choice for users to choose updates - May not be desired by certain users - May corrupt user files
23
New cards
Advantages/Disadvantages of Manual Updates
+ Gives users choice on whether or not to update + If update is badly made, it may prevent issues if users choose NOT to update - Important updates may not be done on time - Inexperienced users may forget to update which may lead to serious issues
24
New cards
analog data
continuous data
25
New cards
arithmetic and logic unit (ALU)
part of the CPU that performs arithmetic, logic, and similar operations
26
New cards
Arithmetic Logic Unit (ALU):
performs arithmetic and logic operations on data.
27
New cards
Bandwidth
Theoretical speed of data in media
28
New cards
binary search
list/array is divided into halves with half containing sought element again halved until it is found
29
New cards
bit
binary digit
30
New cards
Bit (b)
Binary Digit
31
New cards
Black box testing
Test the functionality of the application
32
New cards
Bluetooth
Uses microwave radio to exchange data at very low power levels. Frequencies change regularly.
33
New cards
BMP
files in bitmap form
34
New cards
Bottleneck
Created by slowest segment of network that affects above
35
New cards
bubble sort
...
36
New cards
buffer
portion of storage used to hold input or output data temporarily
37
New cards
Bus
Connects all devices through a common cable
38
New cards
bus
pathway used for sending signals between internal components of a computer; components may share same bus but can be transmitted simultaneously
39
New cards
Bus topology
bus network consists of single central cable which all computers and other devices connect
40
New cards
byte
8 bits
41
New cards
Byte (B)
8 Binary Digits
42
New cards
cache
part of main store between main memory and processor; holds copy of data and instructions that are likely to be used next by the processor; faster than main memory
43
New cards
check sum
sum generated using individual digits of a number and employed as an error-detecting device
44
New cards
Checksum
Extra digit added to numerical data (to make sure it is good when transmitted)
45
New cards
client
desktop computer or terminal used to access a computer-based system
46
New cards
Client
Requests service from above connected to same network
47
New cards
client-server
network architecture where a system is divided between server taskes performed on instructions received from clients requesting data
48
New cards
Coaxial Cable
Cheap to install, consists of two copper conductors. Used in networks as well as carrying TV signals.
49
New cards
compiler
translates a program into machine language, returning a list of syntax errors afterwards; produces an executable file that does not require the compiler
50
New cards
Control Unit
Acts as the stage unit to ensure that all the other components act in concert.
51
New cards
control unit
controls flow of data into CPU and its operation ?
52
New cards
CPU
contains ALU, control unit, and registers
53
New cards
CPU Scheduling:
The act of determining which process in memory is given access to the CPU so that it may execute.
54
New cards
Criticism of Saas Privacy:
Since you must send all your data to the ASP it allows them to access all your data, furthermore it makes the clients data more vulnerable to attack as hackers may hijack your connection.
55
New cards
data compression
method of reducing size of data; all redundancy is removed to reduce storage needed or to speed up transfer
56
New cards
Data Compression
Reduction of bits by encoding data using fewer bits than original file/representation
57
New cards
data integrity
correctness of data after processing, storage, or transmission
58
New cards
data packet
part of a transmitted message that is sent separately; might include check digits, destination adress, etc
59
New cards
Data Packet
Portion of messages that is transmitted through network. Has data such as check digits and destination address.
60
New cards
data security
method of ensuring that data is correct, safe, and cannot be read or accessed by those without permission
61
New cards
Debugging
It is done by the automatic program called debugger or the programmer(s)
62
New cards
Define a legacy system?
A system that continues to be used because of the cost of replacing or redesigning it but is large, monolithic, and difficult to modify.
63
New cards
Define term extranet
An external extension to a company's local network with limited access using internet protocols
64
New cards
Define the term concurrent processing.
Concurrent processing means to do more than one activity at the same time;
65
New cards
Define the term data packe?
A unit of data transmission; with a format
66
New cards
Definition - What does Legacy System mean?
A legacy system, in the context of computing, refers to outdated computer systems, programming languages or application software that are used instead of available upgraded versions.
67
New cards
defragmentation software
application that reads file segments from non-contiguous sections of a storage device and writes files to same device so that each file segment is contiguous
68
New cards
Describe one way that software developers can ensure that the users are aware of any available updates for their products.
When the software is installed and registered (a cookie is placed on the machine)in the machine. This software communicates with developer automatically on start up;Messages about updates are sent back to the machine and alerts are given; OR Send an email;With a link to the update;
69
New cards
Describe the need for change management
The need for change management is based on the need to make sure that new systems work with the old systems.
70
New cards
Describe three features of Saas?
Data is in the cloud/computing infrastructure, SW necessary for the activities in the client, access to SW is with thin client by web browsing
71
New cards
Describe two advantages to society of the increased availability of WiFi outside the home?
Social - keep up to date while away, Business - work away from home
72
New cards
DHCP
Protocol that allows server to automatically assign IP address to client device. Very effective and convenient.
73
New cards
digital data
discrete data (taken at intervals)
74
New cards
direct access file
file organized that a calculation provides the address of a record so the record may be directly accessed; records in file may be ordered or unordered
75
New cards
Direct changeover:
Replace system without testing.
76
New cards
Disadvantages of a legacy system
- The cost of maintaining an older system can be higher than maintaining a more updated version. The staff might not be familiar with such an outdated version of the system. - Tech support may no longer be available. - The data in the current system might not be compatible with newer systems and conversion may not be possible. - Legacy systems are usually more vulnerable to security threats due to lack of security patches. - Integration of newer systems may be a complicated process as the two systems may have completely different technologies
77
New cards
Disadvantages of data migration
*(1)* Migration addresses the possible obsolescence of the data carrier, but does not address the fact that certain technologies which run the data may be abandoned altogether, leaving migration useless.*(2)* Time consuming - migration is a continual process, which must be repeated every time a medium reaches obsolescence, for all data objects stored on a certain media. *(3)* Costly - an institution must purchase additional data storage media at each migration." -Wikipedia
78
New cards
Discuss the limitations of SaaS in relation to security.
*(1)* Security in storage; data is stored in server of provider, organization has no direct control of it, legalization in country of provider may be weaker than users, cases of provider's corruption loss are a risk to organization, *(2)* Security in transmission; applications running in site may require data in SaaS, longer transmission times and higher risk of attacks
79
New cards
Discuss the security characteristics of a VPMN
Authentication, tunneling, encrypted, location and IP are masked
80
New cards
disk cache
RAM set aside to speed up access to a hard drive
81
New cards
Distinguish between the use of two types of primary memory?
ROM \= Permanent Instructions, Ram \= Current Instructions
82
New cards
encryption
process of transforming data into meaningless form for added security
83
New cards
Error Checking
Process to determine error
84
New cards
Error Correction
Ability to repair error
85
New cards
examples of application software.
Word processor; spreadsheet; database management system; e-mail; web browser; CAD; graphic processing software;
86
New cards
examples of operation systems
windows, Apple IOS, Linux, Unix.
87
New cards
Explain one advantage and one disadvantage of carrying out a number of tasks concurrently.
Advantages:
Building could be finished faster; By doing some tasks concurrently, the overall time needed to complete the building will be reduced. Since construction workers are paid by the hour, getting the building done sooner will reduce the cost of the building.
Disadvantages:
Workers on concurrent tasks may get in each other's way; If the plumbers and the electricians are both working at the same time and both need to get at the same place at the same time, one will have to wait. Thus, it may take longer to do the electrical work while the plumbing is being done than it would take to do it alone.
Harder to supervise; The supervisor needs to look at the work being done and make sure that its being done correctly and explain what needs to be done, etc. If there are two (or more) sets of workers the supervisor will have to work harder to watch both of them at the same time.
88
New cards
Explain packet switching?
Files sent over a network are first broken into small parts of data. Each is sent individually and once all are received, they are reassembled. All packets must contain information to help this process, which is in the header. The header contains information such as the address, the senders address, position of data to put it back together, and error checking information (checksum). Packet switching is the process of
89
New cards
Explain the difference between a fat client and a thin client using the idea of a PC and a Chrome Book?
A *fat client* will perform the bulk of the processing required by the end user, such as a user using a program on their PC. Client hardware and software can be streamlined in a *thin client* setup where the bulk of the processing and software is managed directly by the server and the thin client is little more than a screen with a computer that has a graphics card and a network card, such as a chrome book.
90
New cards
Explain what is meant by *beta testing*?
*(1)* Testing prior to product's full release / last stage of testing, *(2)* To see if it works properly / complete functionality / usability, *(3)* Performed by end users (not designers)
91
New cards
Explain why an object is an example of abstraction?
*(1)* An object hides the details *(2)* but preserves the functionality
92
New cards
Explain why data may need to be compressed before transmission
Compression is commonly used to reduce file sizes and hence reduce the overall amount of data being transmitted (traffic). This is effective as long as the client receiving the data is powerful enough to decompress the data quickly. If not, then we can use lossy compression, where some details are simply removed (lost). A typical example is to send a low-resolution version of a video, say 320x200, rather than an HD (high definition) version at 1920x1080.
93
New cards
Explain why data transmission speeds can vary?
*(1)* The packets of a message may take different routes on their way to the final destination. *(2)* Therefore, they may arrive in a different order than the way they were sent. The packets must be put into the proper order once again, and then combined to form the original message. *(3)* A packet may make several intermediate hops between computers on various networks before it reaches its final destination. *(4)* Network devices called routers direct the packets as they move between networks. Intermediate routers don't plan out the packet's entire course. *(5)* Eventually a message reaches a router that knows where the destination machine is. If a path is blocked due to a down machine, or if a path currently has a lot of network traffic, a router might send a packet along an alternative route. *(6)* If a communication line spans a long distance, such as across an ocean, devices called repeaters are installed periodically along the line to strengthen and propagate the signal.
94
New cards
Extranet
External extension of Intranet by reaching into the internet. Includes all files, programs, etc a computer needs
95
New cards
fiber optic cables
cables used for networks made from fine strands of glass; can carry large amount of data at high speed; expensive
96
New cards
Fibre Optic Cable
Carries beam of light, used for data transmission and telephone lines. Higher speeds with high security but very expensive.
97
New cards
Firewall
Network security system that determines what data comes in/goes out of network or computer
98
New cards
GigaByte (GB)
2^30 Bytes
99
New cards
Good Put
Transfer rate of usable data
100
New cards
How are colors typically stored?
RGB, 8 Hexadecimal Digits (\#000000 is black for example)